Kicking off the process for this year’s “Magic Quadrant for Security Awareness Computer-Based Training”
I’m happy to say that we (my co-author Joanna Huisman and myself) just formally kicked-off our 2016 process for gathering data for our Security Awareness Computer-Based Training (CBT) Magic Quadrant.
A few things are changing this year. Most notably, we’ve tightened-up the inclusion criteria and we are adjusting the weightings to a few of the dimensions that we rate on. Another considerable addition this year is that we are able to take into account end-user feedback via Gartner’s Peer Insights platform. To that end, this is my personal invitation for you to provide feedback on your security awareness CBT vendor. You can view some of the current reviews here, and then click the big orange “write a review” button at the top when you are ready to submit your review. We’ve only had this market on Peer Insights for about a month and your reviews will be hugely valuable to me, future buyers, and even to the vendors who are looking to better engage the market.
Also – if you are a security awareness CBT vendor, you have the ability to engage your clients and encourage them to submit reviews for your product. Go here for more information.
Joanna and I are really looking forward to working through the process this year as we create the updated MQ. This is a market that we are both extremely passionate about; and we know that there is a resurgence of interest and optimism in the topic of security awareness in general (see chart below from a survey that we conducted late last year). ….those pesky humans keep getting in the way of our security! This increased interest and optimism is working in concert with some great technology innovations and a much better understanding of how to leverage psychological factors to influence behavior.
Gartner clients can view the 2015 version of the Magic Quadrant for Security Awareness Computer-Based Training here.
All the best!
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.