Data security, security policies, and integration top the list of problems.
In order to accurately assess organizations’ mobile computing adoption, strategies, and security, ESG recently surveyed 242 members of IT and security personnel working at enterprise-class (1,000 employees or more) organizations in North America. All respondents were responsible for mobile computing initiatives, operations, and security.
Enterprise organizations proclaim that cybersecurity initiatives are one of their highest priorities. Should fuel the rhetoric at the RSA Conference.
ESG data indicates that many enterprise organizations are not only consuming commercial threat intelligence, but also using it to improve risk management. In fact, advanced organizations seem to include security intelligence as a best practice as they claim to get a lot of value from external security intelligence. While this is encouraging, the fact remains that not all security intelligence is created equally. New independent security intelligence services from providers like Norse are starting to emerge in the market. This type of intelligence can provide real-time, detailed intelligence focused on cybercriminal activities. Enterprise organizations can use this type of focused data to make timely risk management decisions, automate security operations, and improve incident detection/response.
Soon-to-be-published ESG research indicates lots of acute needs at enterprise for information security professionals at large and small organizations
Enterprise security professionals point to problems with integration, scale, and support for various mobile device types.
Commander-in-chief eschews cybersecurity in State of the Union speech and misses a golden opportunity to reassure the American people.
ESG research points to lack of control, privacy, and lack of security visibility.
Lots of ways for VMware to pivot off this acquisition.
ESG data indicates that enterprise organizations are either cybersecurity skill “haves” or “have nots.”
POS malware used for Target attack whistled past endpoint security.
Security teams point to problems with skills, malware knowledge, and forensics.
This ESG Lab review documents hands-on testing of RSA Enterprise Compromise Assessment Tool (ECAT), a signature-less malware detection tool with a focus on endpoint compromise assessment and monitoring.
Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s information security service. With over 25 years of technology industry experience, Jon is widely recognized as an expert in all aspects of information security and is often called upon to help customers understand a CISO's perspective and strategies. Recently, Jon has been an active participant with cybersecurity issues, legislation, and technology within the U.S. federal government.
© 2015 by The Enterprise Strategy Group, 20 Asylum Street, Milford, MA 01757 508.482.0188
Enter your email address, and click subscribe