Automation generally, and artificial intelligence specifically, render today’s cybersecurity stacks ineffective.
Previously, stopping 99% of attacks and leaving the 1% for armed human hunters to deal with was, if not ideal, at least feasible. With AI, that all goes away because adversaries can scale up phishing and other attacks at unprecedented rates, which overwhelms the ability of humans. This creates a wider gap between exfiltration times, which are shrinking, and mean time to remediation, giving even greater advantage to attackers. As such, the only way to fight AI is with AI.
Moreover, the ever-expanding number of tools in an organization’s security stack continues to exacerbate the problem. According to Palo Alto Networks Inc., the answer is a complete makeover of the cybersecurity stack where consolidating multiple tools into a single platform and gaining comprehensive access to the right data, simplifies security operations and enables AI to operate in real time.
In this Breaking Analysis, we collaborate with Zeus Kerravala and share insights from this past week’s Palo Alto Networks Ignite conference in New York City. We’ll share what we heard from key executives, including an intimate analyst roundtable with Chief Executive Nikesh Arora. And we’ll test the premise put forth by Palo that platformization is the answer to your security challenges.
Tech spending expectations have softened
Our research indicates that the information technology spending landscape remains in flux, driven by shifting economic conditions, policy uncertainty, and ongoing fallout from government tariffs. Recent data from Enterprise Technology Research underscores these dynamics. In the wake of COVID, annual IT spending expectations exceeded 7%.
However, as interest rates tightened, those forecasts plummeted below 3% before rebounding to 3.4% toward the end of 2023. Expectations for 2024 have fluctuated considerably — initially settling at 3.9% and then rising to 5.3% in January, only to moderate again in April, based on preliminary ETR data, to roughly the mid-3% range, pending final survey results (see below).
We believe the volatility in global trade policies and supply chains continues to dampen purchasing confidence. Higher tariffs mean organizations must pass added costs down the value chain, creating an inflationary cycle that complicates technology procurement. Certain industry executives have highlighted attempts to mitigate these pressures by diversifying supply sources — yet these diversification strategies sometimes require further diversification of their own, underscoring the complexity of maintaining stable input costs.
The question arises: Is cybersecurity investment insulated from this macro volatility? Historically, cybersecurity has proven more resilient than other IT segments because of its essential role in safeguarding critical data. With trends such as cloud expansion, hybrid work and the rapid rise of AI, companies are proliferating sensitive data across a broader surface area, creating new vulnerabilities that require ongoing protection. While we believe that continued innovation and necessity may spare cyber from the worst effects of tightening budgets, it is not entirely immune. Even security spending can come under scrutiny when macro pressures and policy-induced uncertainties persist.
In our view, the next few quarters will prove pivotal. As organizations navigate tariff complexities, supply chain realignments, and shifting economic signals, we expect cybersecurity to remain a priority — but watch carefully for more selective spending patterns that favor tools delivering clear, quantifiable risk reduction. Ultimately, while the broader market adjusts to evolving economic and policy realities, our data suggests that security’s strategic importance keeps it near the top of IT leaders’ agendas — even if overall budget growth undergoes further revisions.
Cyber stocks outperform tech overall but headwinds remain
A review of recent cyber stock performance provides a useful lens into market sentiment around security investments. Over the past six months, leading cybersecurity names have generally outperformed broader market indices, even in the face of tariff tensions and other macro uncertainties. A basket of cybersecurity equities, represented by the BUG ETF, has beaten the Nasdaq Composite in this timeframe. Within this group, however, Palo Alto Networks has underperformed top peers thanks to concerns over competitive pressures, annual recurring revenue momentum and investor confidence in Palo’s “platformization” strategy.
Some organizations are betting on large-scale, integrated security platforms to streamline the management of numerous cybersecurity tools, which often total dozens or more within a single enterprise. We believe platformization holds promise for reducing complexity and improving operational efficiency — particularly for companies seeking to unify threat data across endpoints, networks and cloud workloads. At the same time, this path is not without challenges. The migration from a sprawling multivendor environment to a cohesive platform can lengthen sales cycles and raise questions about how to retire incumbent point products.
Moreover, there is an inherent tension in claiming to be both “best-of-breed everywhere” and a single-platform provider. Our data suggests that no one vendor can excel in every sub-discipline of security — especially when new domains such as zero trust network access or ZTNA, secure access service edge SASE, or application programming interface security emerge rapidly. In our opinion, enterprises are more likely to adopt a hybrid approach, embracing platform consolidation where it makes sense while augmenting with specialized solutions that address evolving threats and plug holes better then broad platforms.
Nevertheless, many executives within top security firms, emphasized by Palo Alto Networks at Ignite NYC, are declaring a new era in which cybersecurity becomes an “AI play” rather than a collection of siloed tools. As security threats evolve, the thinking goes, those vendors with robust AI-driven capabilities to correlate massive data sets will gain a decisive advantage. We believe this shift is underway but may take years to mature fully.
In the near term, we see cybersecurity investments continuing at a steady pace, with leading providers that can demonstrate clear AI-driven outcomes standing out. Though best-of-breed innovation shows no sign of disappearing entirely, platform leaders that deliver meaningful integration and automation are well-positioned to capture share and drive recurring revenue.
As always, macro factors such as tariffs, global policy shifts and overall IT spending sentiment will influence the sector’s trajectory. However, based on our research, cybersecurity remains among the more resilient areas of enterprise tech investment, buoyed by an ongoing wave of emerging threats and a growing appetite for AI-fueled defenses.
A crowded cyber arena: blessing or curse?
Despite vocal vendor marketing around consolidation, the cybersecurity landscape remains exceedingly crowded, with new entrants frequently emerging to address specialized threats. To illustrate this point, we often cite the chart shown below from ETR’s quarterly Technology Spending Intentions Survey (TSIS) survey, which contains preliminary data from more than 1,600 respondents. It highlights how organizations are allocating security budgets across various vendors and underscores just how many options exist for enterprises today.
Understanding the chart
- Vertical axis (Net Score): This metric represents spending momentum. It is the net percentage of customers increasing their spend on a given platform when netting out those reducing it. Note that this is an account-based measure, not a revenue figure.
- Horizontal axis (Overlap): Reflects the degree of vendor penetration among the surveyed accounts within the sector, helping to show how widely each platform is adopted across the respondent base.
- Filtering: Only vendors with at least 100 respondents (N ≥ 100) appear, so the data intentionally focuses on larger or more widely adopted players and under represents how crowded the market really is.
- Preliminary data: Final numbers may shift as ETR completes its survey and reaches approximately 1,800 total responses. However, the early directional signals are worth noting.
Key observations
- Microsoft’s dominance: Microsoft Corp. sits at the far upper-right corner, showing a nearly ubiquitous respondent base — eclipsing other vendors in terms of account penetration. Microsoft’s footprint is no surprise, but seeing the numbers laid out underscores just how pervasively Microsoft solutions remain embedded in enterprise security portfolios.
- Overall crowd of competitors: A single glance at the slide reveals how saturated this market is, with numerous players clustered around the net score and overlap axes. In our view, the intense competition reflects growing security requirements and the demand for specialized capabilities.
- Standouts above 40%: A net score of 40% or higher is considered “highly elevated.” Only a handful of vendors achieve this benchmark, including Microsoft, Wiz Inc. and a few others near the line such as Zscaler Inc. and Netskope Inc. Some vendors hovering in the mid-30s also show strong momentum and are notable.
- Changing fortunes for CrowdStrike: Historically, CrowdStrike Holdings Inc. consistently exceeded the 40% net score mark. Following the incident in mid-July of last year, however, it dipped below 20% but has rebounded as the company has worked with buyers to make them whole. The data implies that many customers paused or delayed additional CrowdStrike investments, keeping spending on their CrowdStrike platforms flat until they could negotiate their best terms. Nonetheless, the company appears to be recovering in the eyes of the market, and we believe its renewed growth could accelerate if it maintains strong execution.
- Google and Palo Alto tight in the pack: Google LLC and Palo Alto appear close together in the chart, indicating similar levels of account penetration and spending momentum. Google was added to this sector after its acquisition of Mandiant. Its Wiz acquisition will further bolster its position in our view. Though Palo Alto remains strong, its net score position places it a notch below certain leaders. We believe further execution on platform strategies — and deeper leverage of AI — could help it regain a more pronounced lead.
- Cisco’s large footprint: Cisco Systems Inc., like Microsoft, commands a significant installed base, reflecting its broad enterprise presence. Our data suggests that this position may be translating into continued security spend, although the extent of overlap with other platforms is also notable, as many enterprises blend Cisco security with point solutions from emerging providers.
The impact of AI in cybersecurity
What we show below is the same XY graphic but we filtered the data on those accounts heavily investing in AI. If the premise is AI companies are the ones that will succeed in cyber, we wanted to see how “turning on” ML/AI in the ETR data impacted spending profiles.
AI’s growing influence on cyber: The Google-Palo Alto dynamic
If artificial intelligence is becoming a central focus in the cybersecurity sector, how will it reshape competitive alignments and fuel M&A activity. A fresh view of ETR’s preliminary data from over 900 survey respondents specifically filtered for organizations making sizable investments in machine learning reveals notable shifts as shown below. When isolating on “AI-centric” accounts, both Google and Palo Alto show improved positions relative to the broader enterprise sample, with Palo Alto’s net score rising into the mid-30% range — an increase from its sub-30% placement in the unfiltered data. As well, Google’s penetration increases relative to Palo’s when compared with the previous chart.
Key observations
- Elevated positions in AI-heavy accounts
- Palo Alto’s upward move: An emphasis on AI-driven product development and cloud security investments appears to strengthen Palo Alto’s standing with enterprises prioritizing machine learning initiatives.
- Google’s expansion: Google separates even further to the right on the chart, indicating higher penetration among these AI-forward respondents. Google’s increasing security foothold is directly thanks to its Mandiant acquisition and ongoing investments in analytics and threat intelligence. Though many criticize the acquisition as a questionable cultural fit, we believe it’s a viable strategy for Google Cloud to focus on cyber as a differentiator.
- Context around Wiz and Prisma Cloud
Palo Alto’s cloud security strategy faced serious turbulence when Wiz, a fast moving, born-in-the-cloud competitor siphoned share from its portfolio, prompting internal restructuring, layoffs and technical rewrites. In our opinion, continued innovation around machine learning could reinforce Palo Alto’s position, particularly as the cloud security market shifts toward more integrated, AI-driven approaches. But Wiz with its popularity and Google’s AI expertise make a formidable combination. - Google’s security ambitions
We believe search-related revenue pressures and intensifying competition in cloud infrastructure have prompted Google to seek growth in high-impact enterprise markets. With security ranking as a top board-level priority, Google’s resources and talent in AI give it a more compelling path to build or acquire next-generation capabilities. Google’s perceived overpayment for a high-potential asset such as Wiz could be offset if these acquisitions accelerate the company’s push into a massive and strategic market. - Emergence of AI-native security
As the conversation around best-of-breed versus platform continues, the general belief is that next-gen security will hinge less on product categories like firewalls and more on AI engines that correlate myriad data streams in real time. We believe larger integrated players — Microsoft, Cisco, Google — are best equipped to invest heavily in these capabilities. Meanwhile, the largest pure-play security providers such as Palo, CrowdStrike and Zscaler can retain their edge if they can demonstrably integrate advanced AI into their platforms without sacrificing the specialized capabilities that drew customers in the first place. - Implications for the competitive landscape
Historically, Google has struggled to become a dominant enterprise player. Nevertheless, if cybersecurity indeed becomes “an AI play,” large tech providers with sophisticated data science and engineering capabilities stand to capture outsized opportunity. In our opinion, this intensifies the pressure on established security specialists to double down on AI R&D and potentially seek strategic partnerships or acquisitions of their own.
We believe the cybersecurity sector is on the cusp of an AI-driven evolution, where success hinges on building robust data pipelines, delivering seamless product integrations, and correlating threats at machine speed. Though these developments open the door for established cloud giants to disrupt the status quo, the final winners will be those who can rapidly demonstrate tangible, AI-based threat detection and response outcomes at scale. Ultimately, the marketplace — already crowded — is poised to get even more competitive as vendors race to embed advanced AI solutions and differentiate on their ability to manage risk in an increasingly complex digital landscape.
We believe the market will remain fluid as organizations weigh one-stop-shop platform strategies against adopting specialized point tools for targeted needs. In our opinion, vendors that demonstrate consistent, high net scores will be those that can not only provide best-of-breed innovations but also integrate seamlessly with existing ecosystems. Ongoing developments in AI and automation are poised to shape these dynamics further.
Our research suggests that the cybersecurity sector is still experiencing robust investment levels. However, continuous market shifts — such as macroeconomic changes, tariff uncertainties, and evolving threat vectors — could alter spending patterns. Despite these challenges, the data indicates that security budgets remain among the most stable in enterprise IT, as organizations race to keep pace with an expanding threat landscape and an accelerating wave of digital transformation.
Where Palo Alto sees competition and why platformization matters
Below is a list of key topics that came out of Ignite and the an intimate round table with Arora that we’ll review in this next section.
Our research indicates that Palo Alto continues to face formidable competition from various quarters in the cybersecurity market. Vendors spanning legacy network stalwarts, emergent AI-driven security firms, and best-of-breed specialists each pose different challenges. We believe this competitive backdrop sets the stage for a bigger debate: can a single, integrated platform truly replace multiple, standalone security tools?
1. Multiple competitors from all sides
Taking Microsoft out of the ETR data and isolating on a few key Palo competitors shows a somewhat clearer picture as shown below.
- Google and cloud security: Google, bolstered by strategic acquisitions and AI expertise, is making security a top enterprise priority. In our opinion, if security becomes an “AI play,” Google’s data science capabilities and deep engineering bench could allow it to carve out meaningful share — particularly in cloud security services.
- CrowdStrike’s specialized edge: CrowdStrike is often cited for having a best-of-breed product focus in endpoint protection and extended detection and response or XDR. Some practitioners praise its highly effective threat detection capabilities, though the company is increasingly pitching its own platform story.
- Cisco’s renewed push: Historically strong in networking, Cisco is re-emphasizing security as a core pillar. Our data suggests that Cisco’s large installed base could smooth the path for more integrated security offerings, though it remains to be seen how effectively the company will unify its various tools under a cohesive architecture.
- Other security specialists: Firms such as Zscaler (SASE), Wiz (cloud posture management) and multiple emerging players in browser-based security continue to expand rapidly. Each occupies a distinctive niche, making the competitive landscape especially crowded.
2. Platformization versus best-of-breed
Palo Alto’s strategy hinges on the premise that a unified security platform — covering everything from network firewalls to advanced cloud security tools — will ultimately outcompete a patchwork of point solutions. The argument is that integrating threat intelligence, AI and data ingestion into a single solution can reduce costs, curb complexity and yield better security outcomes.
However, as shown below, survey data from ETR shows a majority of organizations plan to add, not reduce, the number of security vendors in their environment. In our opinion, this reflects the unrelenting emergence of new threats and new tools, making many buyers hesitant to put all their eggs in one platform basket. That said, the upside for a fully realized platform approach could be enormous if adoption accelerates, as even a small share shift can translate to billions in incremental spending. Note: ETR will be updating this survey prior to this year’s RSA Conference.
3. Data ingestion economics and the AI imperative
One of Palo Alto’s central claims is that consolidating security data onto a single platform avoids redundant ingestion costs. The organization emphasizes that ingesting data multiple times — across numerous standalone tools — becomes prohibitively expensive. Instead, Palo Alto proposes ingesting data once, applying AI-based analytics, and then making those insights available across all security domains. While this is as strong argument, as shown in the previous slide, the market dynamics create friction to the strategy.
Nonetheless, we see AI as the defining catalyst of future cyber competition and Palo is an engineering-focused company with a commitment to R&D and M&A. Attackers are applying advanced machine learning to breach systems and defenders must do likewise to keep pace. Large, diversified providers stand out here, as they can feed enormous data sets into AI engines to detect advanced threats more quickly. Still, the question remains whether a single vendor can master every aspect of security — endpoint, identity, cloud posture and beyond — at the highest level of precision.
4. Browser security and posture management
Conversation around secure browsers indicates this may be another wave of innovation to watch. Our research suggests that earlier browser-isolation approaches created poor user experiences. New entrants, however, like Island, are leveraging AI to detect phishing and other threats in real time without disrupting workflow. Meanwhile, posture management has quickly morphed into multiple categories — cloud posture, identity posture, data posture. Many analysts predict that these sub-markets will eventually consolidate, but how quickly remains unclear. Practitioners still see distinct posture tools as necessary for new and evolving threat vectors.
5. Quantum threats and long-term disruption
Though quantum computing could one day break today’s encryption standards, executives such as Arora point out that current cyber defenses are already challenged by non-quantum threats. In our opinion, quantum is a long-term concern; many security leaders are instead focusing on near-term issues like supply chain risks, AI-driven hacking and compliance with shifting regulatory landscapes.
The implication is that today anyway, adversaries don’t need quantum to wreak havoc; they can do just fine with existing tools.
6. Execution challenges and growth targets
Palo Alto is widely credited for expanding its share in a massive security market. Under Arora’s leadership, the company has expanded its share of a $100 billion market from around 1% and is headed toward 10% share. It hopes to continue growing its proportion of the overall pie, citing aspirations for a deep double-digit percentage share (Arora often cites 40%) that would make it a “de facto standard.”
Our view is that achieving even 15% would validate Palo’s consolidation strategy. However this leap will require continued strong execution — particularly around AI innovations, seamless integrations among its product lines, and an efficient go-to-market strategy.
Competitors such as CrowdStrike and Zscaler will rely more on ecosystem approaches and partnerships to affect their own versions of consolidation/platformization.
Final thoughts
We believe Palo Alto’s focus on platformization and AI-driven integration is bold and well-suited to the company’s scale. The approach promises simplicity, data efficiency and reduced latency in threat detection, potentially generating material returns for both customers and investors. At the same time, the momentum behind best-of-breed solutions remains strong. Large enterprises often gravitate to specialized tools — especially when those tools demonstrate superior performance in targeted domains.
The next few years will test whether platformization can reach critical mass. Those providers that successfully unify diverse security functions, harness advanced AI, and execute well will be poised to seize market share. Yet high-velocity innovation, continuous vendor arrivals and the entrenched habits of security practitioners mean the market’s evolution remains unpredictable. In our view, it’s this tension between innovation and inertia, between platform advocates and best-of-breed believers, that defines the cybersecurity story today.
The reality is that both scenarios can be true. Palo, for example, could double its market share within the next four to five years, which in our view would validate its platform strategy. At the same time, it’s likely that more point solutions will come to market and do a better job filling certain gaps than will a single platform.
What do you think? Are you able to consolidate your security stack and reduce the number of vendors you’re managing? How do you see AI fitting into the future of cyber? Is it a “do-over” as we and others have posited? Or will it be an iterative evolution? And in your view, is security solvable?
As always, we appreciate the feedback. Let us know what you think and thanks for reading.
Image: cliff1126/Pixabay
Disclaimer: All statements made regarding companies or securities are strictly beliefs, points of view and opinions held by News Media, Enterprise Technology Research, other guests on theCUBE and guest writers. Such statements are not recommendations by these individuals to buy, sell or hold any security. The content presented does not constitute investment advice and should not be used as the basis for any investment decision. You and only you are responsible for your investment decisions.
Disclosure: Many of the companies cited in Breaking Analysis are sponsors of theCUBE and/or clients of Wikibon. None of these firms or other companies have any editorial control over or advanced viewing of what’s published in Breaking Analysis.
Your vote of support is important to us and it helps us keep the content FREE.
One click below supports our mission to provide free, deep, and relevant content.
Join our community on YouTube
Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.
THANK YOU