Gartner® Report

Reach Recognized in Gartner® Emerging Tech Report on Domain-Specific Language Models for SecOps

In its January 2026 report, Gartner highlights how domain-specific language models (DSLMs) are transforming security operations by improving accuracy, automation, and operational efficiency. Unlike general-purpose AI models, DSLMs are trained on cybersecurity-specific data, enabling deeper understanding of security controls, configurations, and threats. Gartner explains that DSLMs enable organizations to continuously assess exposure, automate remediation, and operationalize preemptive cybersecurity.

In this report, you will learn:

  • What domain-specific language models (DSLMs) are and why they are essential
    for modern security operations
  • How DSLMs enable autonomous risk identification, prioritization, and remediation
  • How Reach has been recognized as a Tech Innovator


Gartner, Emerging Tech: Tech Innovators in Domain-Specific Language Models for SecOps, By Esha Bhatia, 30 January 2026
GARTNER is a trademark of Gartner, Inc. and/or its affiliates.
Gartner does not endorse any company, vendor, product or service depicted in its publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner publications consist of the opinions of Gartner’s business and technology insights organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this publication, including any warranties of merchantability or fitness for a particular purpose

Reach is committed to protecting and respecting your privacy, and we’ll only use your personal information to administer your account and to provide the products and services you requested from us. From time to time, we would like to contact you about our products and services, as well as other content that may be of interest to you. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Trusted by leading security teams

Aristocrat logoAutodesk Logomps white logoNutanix logo

Success Stories

Reach customers share results

Discover how organizations like yours are closing security gaps, maximizing their tools, and reducing complexity with Reach - a unified platform with AI-powered virtual assistants to help teams improve posture and performance. These are their stories.

jay wilson

Jay Wilson

CIO & CISO

“We simply didn’t have the time in the day to do this kind of analysis. Reach made it possible in minutes.”
Read the Case Study
huy

Huy Ly

Head of Global IT Security/Infrastructure

“Security talent is limited. That’s why I partner with innovators; people willing to build with me. Reach fit that mindset perfectly.”
Read the Case Study
Raymond Winder

Ray Winder

Director of Information Security

Autodesk Logo
“We found value almost immediately once we deployed Reach. It only took a few minutes to integrate the product in the Autodesk environment.”
Read the Case Study
Joe Masud

Joe Masud

VP Security Architecture

“Reach Remediations have been a game-changer for our team. They simplify the process of identifying what needs to be done and provide detailed, actionable guidance to get it done efficiently. It’s like having a trusted guide for optimizing our security posture, saving us time.”
Read the Case Study
Sebastian Goodwin

Sebastian Goodwin

Former VP & CISO

Nutanix logo
“Reach has really shined a light on our blind spots and told us things we didn’t know our products could do. I think of Reach as a cheat code for our security products.”
Read the Case Study
arrow left
arrow right

Getting Started with Reach

To join the community of customers enjoying the benefits of Reach and learn more about how it can transform your security posture, visit:

Just Released: AI Buyer’s Guide for Security Architects
Get the Guide
arrow rightarrow right
Just Released: AI Buyer’s Guide for Security Architects
Get the Guide
arrow rightarrow right