In order to accurately assess organizations’ network security policies, processes, organizations, and technologies, ESG recently surveyed 397 security professionals representing enterprise-class (1,000 employees or more) organizations in North America. All respondents were responsible for or directly involved in the planning, implementation, or operations of their organization’s network security policies, processes, or technical safeguards.
Great potential but too much hype and confusion are getting in the way.
PCI and other regulations will drive this behavior, but CIOs/CISOs need to build an incident response program with the same focus, discipline, and rigor as BC/DR.
Network security is a top area of investment for many organizations looking to build up their defenses against cyber-attacks. At the same time, software-defined networking (SDN) is maturing and solutions are becoming capable of supporting networking functionality. Will organizations leverage SDN as a platform to deliver network security services? What impact will this have on existing processes and organizational dynamics?
High energy, strong community, scary cybersecurity situation.
CISOs must prioritize identity, data security, and security monitoring, and strive for a “single-pane-of-glass” across enterprise IT, SaaS, PaaS, and IaaS.
Cybersecurity event brings together an army of infosec nerds with a focus on threats, vulnerabilities, and innovative defenses.
Lots of money, lots of opportunity, and lots of risk. VCs should abandon status quo investment strategies and look toward services, industry solutions, middleware, and data security.
Enterprises should prepare for, and take advantage of, the consumerization of authentication technology.
In April, Trend Micro announced additions and updates to its Complete User Protection solution and changes to its licensing model that focus on improving its compatibility with cloud computing. Trend Micro’s strategy aids partners in protecting their customers from unnecessary upselling or licensing confusion, while allowing customers to combine on-premises security solutions with cloud-based security services. This strategy can put Trend Micro at a competitive advantage moving forward, provided it educates the market aggressively as to the true extent and benefits of its endpoint security portfolio.
Security analytics growth will drive growth in PCAP appliances, analytics distribution networks, SDN, and middleware.
A plethora of intelligence feeds are driving new products, services, and enterprise threat intelligence strategy.
CISO responsibilities are expanding and must be supported with the right skill sets, technologies, and industry recognition.
High demand will drive new intelligence, services, tools, and executive cybersecurity skill sets.
Sampling security data is no longer adequate or necessary – CISO mindsets are due for a change.
Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s information security service. With over 25 years of technology industry experience, Jon is widely recognized as an expert in all aspects of information security and is often called upon to help customers understand a CISO's perspective and strategies. Recently, Jon has been an active participant with cybersecurity issues, legislation, and technology within the U.S. federal government.
© 2015 by The Enterprise Strategy Group, 20 Asylum Street, Milford, MA 01757 508.482.0188