The Group-based Policy (GBP) project is an evolving open source project that is beginning to influence commercial products. Inspired by concepts from Cisco’s Application Centric Infrastructure, the project was designed for OpenStack and OpenDaylight to provide infrastructure policy and has emerged as a platform that can become a foundation for commercial products for policy-based networking, as well as other areas, such as service chaining. GBP’s generalized approach shows that it is not tied to any particular vendor and stands alone as an independent project with industry influence. GBP needs to continue accepting contributions from a variety of vendors and extending its reach.
To fully understand the state of cybersecurity at enterprise organizations, it’s worthwhile to review a bit of history. In the early days of Internet connectivity, information security was viewed as a necessary evil, so enterprise security budgets tended to be pretty stingy. CEOs didn’t want good security, they wanted “good enough” security, so they were only willing to provide minimal funding.
For years, endpoint security was defined by antivirus software and a few leading vendors like Kaspersky Lab, McAfee (Intel Security), Sophos, Symantec, and Trend Micro. This perception has changed over the past few years. CISOs are now demanding endpoint profiling, advanced threat detection, and forensic capabilities, opening the door for other vendors like Bit9/Carbon Black, Cisco, Confer, FireEye, ForeScout, Great Bay Software, Guidance Software, Invincea, Palo Alto, RSA, SentinelOne, Tanium, etc.
In this ESG On Location Video, ESG's Dan Conde, Jon Oltsik, and Brian Garrett report from Cisco Live 2015 in San Diego CA.
I’ve been meaning to write this blog since returning from San Francisco in April and I’ve finally gotten around to it. With the dangerous threat landscape and seemingly endless string of data breaches, there was quite a bit of industry bashing at this year’s RSA conference. Discussions featured numerous sound bites accusing the cybersecurity industry of "being stuck in the dark ages," and claiming that the industry "has failed its customers." Pretty strong stuff.
This ESG Lab review documents hands-on testing of the ability of the VCE Vblock System and VCE Technology Extension for EMC Isilon storage to drive value from video surveillance as part of an overall security strategy. Testing focused on the functionality, security, simplicity, and performance of the converged VCE solution, which is designed to provide a scalable, flexible, end-to-end platform for video surveillance deployments.
In anticipation of CiscoLive in San Diego, I posted a blog last week describing my thoughts on Cisco’s cybersecurity portfolio. After attending the event this week, I’m ready to further elaborate on these opinions by grading Cisco Cybersecurity in a number of areas...
A few short years ago, Cisco was deep in the cybersecurity doldrums. In spite of years of market leadership with products like Cisco PIX firewalls, IronPort (e-mail security), and IDS/IPS blades on Catalyst switches, the company seemed to have squandered its enviable market position. Alas, Cisco had swung and missed on security management (MARS) and endpoint (Okena) and had fallen behind companies like Fortinet, Juniper, and Palo Alto in its own network security backyard.
I participated in the Cyber Exchange Forum earlier today, an event sponsored by the Advanced Cyber Security Center (ACSC). The featured speaker was Sean Kanuck, National Intelligence Officer for Cyber Issues, Office of the Director of National Intelligence. In this role, Sean directs the production of national intelligence estimates (for cyber-threats), leads the intelligence community (IC) in cyber analysis, and writes personal assessments about strategic developments in cyberspace.
Based upon anecdotal evidence, I estimate that the average large enterprise organization uses more than 70 different security tools from an assortment of vendors. As they say in Texas, “that dog don’t hunt.” In other words, it’s nearly impossible to maintain strong security hygiene or establish best practices when the security organization is chasing cybersecurity optimization on a tool-by-tool basis.
Here’s a scenario we’ve all encountered: You go to a nice restaurant to enjoy a meal and the whole experience turns sour. The service is terrible, your entrée arrives before your salad, and your food is overcooked and virtually inedible.
Cybersecurity systems suffer from compartmentalization. Vulnerability management systems know which software revisions are installed on which systems, but have no idea how endpoints and servers are connected together. Similarly, an anti-malware gateway can perform static and dynamic analysis on a suspicious file but doesn’t know if a user downloaded analogous malware when she was connected to the Internet on a public network.
Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s information security service. With over 25 years of technology industry experience, Jon is widely recognized as an expert in all aspects of information security and is often called upon to help customers understand a CISO's perspective and strategies. Recently, Jon has been an active participant with cybersecurity issues, legislation, and technology within the U.S. federal government.
© 2015 by The Enterprise Strategy Group, 20 Asylum Street, Milford, MA 01757 508.482.0188