Monday 9th June 2025
Fresh from the buzz of InfoSecurity Europe Expo 2025, one thing is clear: security automation has officially stepped out of the shadows and into the spotlight. This year’s expo wasn’t just a showcase of incremental updates—it was a signal that automation, exposure management, and data pipeline innovation are now central to modern cybersecurity strategies.
From the rise of SOAR platforms to the emergence of niche players pushing the boundaries of authentication and log optimisation, the event highlighted a market in motion—and this blog unpacks the key trends shaping that momentum.
Security Automation: From Niche to Necessity
The security automation landscape is evolving rapidly—and it’s no longer just a niche capability. It’s becoming a strategic imperative. At the forefront of this shift are brands like Torq, whose strong branding and visibility have made them a go-to for security vendors looking to streamline internal operations. Their success is emblematic of a broader trend: automation is no longer a “nice to have”—it’s foundational.
While generalist automation players have been in the game for a while, the latter is now pivoting more aggressively into the SOAR (Security Orchestration, Automation, and Response) space. And it’s easy to see why. SOAR is one of the fastest-growing segments in cybersecurity, with a competitive field that includes both homegrown and acquired solutions: Splunk Phantom, Google SecOps SOAR (via SIEMplify), Palo Alto Cortex XSOAR (via Demisto), Rapid7 InsightConnect, and offerings from IBM, Securonix, and others.
Even newer entrants like Mindflow are gaining traction, signalling that innovation in this space is far from over.
CTEM Vendors: Clustered and Competitive
Continuous Threat Exposure Management (CTEM) vendors were out in force, and their proximity to the Bytes stand made for some productive conversations. XM Cyber, Axonius, Cymulate, and Rapid7 all had a strong presence, reinforcing the growing importance of exposure management in modern security strategies.
Lymbic AI: Innovation at the Edge
Among the sea of familiar faces and incremental updates, Lymbic AI stood out.
Their Neuroprint technology—offering brainwave-based, continuous, deepfake-resistant authentication—was one of the few truly novel innovations on display. It’s niche, no doubt, with a target market limited to high-security environments like GCHQ, MoD, and nuclear facilities. But it’s a reminder that genuine innovation still exists in cybersecurity, even if it’s not always scalable.
Log Optimisation and the Rise of Data Pipeline Management
Vendors like Gurucul and Cribl are carving out a space in security-focused log optimisation. Cribl, in particular, would likely have drawn a crowd had they exhibited this year. Their absence was felt—but also telling. Expect a surge in Data Pipeline Management (DPM) vendors next year. If current trends hold, we could see 5–6 players in this space by 2026, and double that by 2027.
Final Thoughts
Security automation is no longer a back-office function—it’s a boardroom conversation. Whether it’s SOAR, CTEM, or DPM, the tools we choose today will define how resilient we are tomorrow. And while the market is crowded, there’s still room for bold ideas and breakout innovation.
______________________________
Would you like to discuss any of the topics covered? Reach out to your dedicated Bytes Account Manager, or email [email protected].
Want to keep informed? Sign up to our Newsletter