Time to stop blaming employees and enlist their help.
Large organizations should delegate endpoint security to a group dedicated to malware prevention, detection, and response across all technology areas.
Strong next-generation cybersecurity must be aligned with identity knowledge and enhancements.
Applications, endpoints, networks, and servers will enforce security policies related to identity and data security.
Data feeds from all IT systems will finally produce an end-to-end view of enterprise security for risk management and incident detection/response.
Enterprise organizations should selectively bolster defenses based upon threat intelligence and industry trends.
Large organizations need help monitoring user behavior activity, alternative endpoints, threat intelligence, and sensitive data.
Data collection, analysis tools, and hiring staff top the list of actions.
Sourcefire, architecture, and services place Cisco in the catbird seat for emerging enterprise cybersecurity requirements if Cisco remains aggressive.
Enterprise organizations benefit by monitoring user activity and improving identity and access management (IAM) processes.
FireEye, IBM, and Symantec announcements move the cybersecurity industry in this inevitable direction.
Symantec statement must be put in context of endpoint defense-in-depth.
Many organizations lack the right skills, budgets, and security analysis tools.
New services can help enterprises assess and mitigate risk in the cyber supply chain.
Revenue growth in advanced malware detection and response and other cybersecurity services will change industry marketing and investment.
Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s information security service. With over 25 years of technology industry experience, Jon is widely recognized as an expert in all aspects of information security and is often called upon to help customers understand a CISO's perspective and strategies. Recently, Jon has been an active participant with cybersecurity issues, legislation, and technology within the U.S. federal government.
© 2015 by The Enterprise Strategy Group, 20 Asylum Street, Milford, MA 01757 508.482.0188