Gartner® Hype Cycle™ for Network Security, 2021

Published by Cloudflare

Over the last year, organizations have had to transition from primarily on-premises to primarily remote working. As a result, many security teams scaled up reliance on their VPN and began exploring new approaches to network security. 

Unfortunately, these teams face a variety of overlapping approaches to choose from. Zero Trust network access (ZTNA), Secure Access Service Edge (SASE) and Security Service Edge (SSE) all offer important benefits and include a variety of associated technologies. What direction should organizations look based on their progress in digital transformation? 

We believe The Gartner Hype Cycle for Network Security has the answers. It describes how organizations have digitized and consolidated cloud-based network security controls through technologies like SASE and ZTNA. 

Register to download it now, and you’ll learn:

  • Where newly added network security technologies such as SASE and its associated technologies fall on this year’s Hype Cycle.
  • The benefits of pursuing a consolidation strategy in network security and the technologies required for security teams to achieve that consolidation.
  • The business impact, drivers, obstacles and user recommendations involved in deploying SSE.

Gartner, Hype Cycle for Network Security, 2021, Shilpi Handa, Pete Shoard, 14 July 2021

Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

GARTNER and HYPE CYCLE are registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved.

Download Now


Required fields*

Please agree to the conditions

By requesting this resource you agree to our terms of use. All data is protected by our Privacy Notice. If you have any further questions please email

Related Categories Hardware, Mobile Devices, BYOD, Server, Data Storage & Management , Data Centers, Software & Applications , Applications, SaaS, Databases, Networking & Connectivity , Network Security, Operating System, Big Data, BYOD, Compliance, Data Centers, Virtualization, Data Loss Prevention (DLP), Disaster Recovery, Email Security, Firewall, Event Management, VPN, Malware, Network Security, Security Solutions, Security Management, Hybrid Cloud, Cloud Platforms, SaaS, ERP, BYOD, Android, Apple, Data Centre & Infrastructure , Big Data, Databases, Firewall, VPN, Data Centers, Server, Storage, Virtualization, Email & Communication Technologies , Email Security, Email Security, Data Storage & Management , Data Storage, NAS, SAN, Service Providers, Cloud Security, Cloud Applications, Collaboration, Cloud, Analytics, DevOps, Machine Learning, AIM, Connectivity, Mobile Workforce, IT Infrastructure, SASE, SD-WAN, SASE, Network Infrastructure, Private Networks, Backhaul, Internet of Things (IoT), IOT, DDoS attacks, Server, Software, Budget, Threat Intelligence