ESG research points to lack of control, privacy, and lack of security visibility.
Lots of ways for VMware to pivot off this acquisition.
ESG data indicates that enterprise organizations are either cybersecurity skill “haves” or “have nots.”
POS malware used for Target attack whistled past endpoint security.
Security teams point to problems with skills, malware knowledge, and forensics.
This ESG Lab review documents hands-on testing of RSA Enterprise Compromise Assessment Tool (ECAT), a signature-less malware detection tool with a focus on endpoint compromise assessment and monitoring.
New protection, detection, and monitoring requirements may alter the antivirus status quo.
Security executives have a tough road ahead to improve security monitoring, analytics, operations, and business enablement.
Merger adds security intelligence, endpoint forensics, and services to FireEye market momentum
Lots of opportunity in network security, data security, security services, and strong authentication in 2014.
Risks assessments, application testing, access controls, and proactive planning top the list.
CISOs need to improve forensic investigations, root cause analysis, and security intelligence monitoring.
Endpoint security, security analytics, and process automation top the “to-do” list.
Strong enterprise demand will be counterbalanced by confusion and planning requirements.
Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s information security service. With over 25 years of technology industry experience, Jon is widely recognized as an expert in all aspects of information security and is often called upon to help customers understand a CISO's perspective and strategies. Recently, Jon has been an active participant with cybersecurity issues, legislation, and technology within the U.S. federal government.
© 2015 by The Enterprise Strategy Group, 20 Asylum Street, Milford, MA 01757 508.482.0188
Enter your email address, and click subscribe