Technology and skills are there but private sector affinity is still lacking.
New security and mobility requirements will make EVAS a network requirement.
Network access control has been around for a decade, and the global recession and years of vendor consolidation certainly took a toll on NAC solutions. But NAC is not fading away. Instead, NAC has evolved into a new and stronger market segment called EVAS (Endpoint Visibility, Access, and Security). CISOs should place NAC in their legacy file and begin to assess EVAS as part of their security strategies.
Over the last few years, security professionals continue to fall farther and farther behind with security controls and incident detection. Why? Many organizations approach cybersecurity with an array of signature-based tools, perimeter gateways, disjointed processes, and limited security resources/skills. These legacy tactics can no longer keep up with increasingly dangerous threats. CISOs can improve situational awareness with the right big data security analytics to help with controls adjustments, incident detection, problem isolation, and remediation. EnCase Analytics, with all the requirements of a big data security analytics solution, will provide built-in algorithms, ad-hoc query capabilities, and security technology integration in order to help organizations accelerate, automate, and streamline overall cybersecurity operations. Additionally, by focusing on the often neglected area of endpoint artifacts, EnCase Analytics can help security-conscious organizations benefit from proactive assessment of the security risks and gain complete visibility into their security posture.
Many enterprise organizations claim that they already consider security data collection and analysis as “big data,” but they don’t have security analytics solutions capable of addressing their scalability, performance, or operational needs. ESG believes that tactical security analytics solutions and compliance-centric SIEM tools are no match for today’s big data security analytics needs. Leading vendors are addressing this gap with real-time and asymmetric big data security analytics systems built for scale and intelligence. IBM is one of few vendors offering an integrated approach that spans the entire continuum of enterprise security analytics needs.
Synergistic acquisition will complement existing RSA business and open new doors.
Organizations may use static, dynamic, or other types of testing tools to validate the security of their web applications, but does all that testing really make a difference? According to ESG research, it does. This research brief looks at the relationship between the use of application security testing tools and the confidence levels that organizations report about the security of their web applications.
Best solutions will collect, process, analyze, and correlate data in three key areas.
Mainstream enterprises need algorithms, intelligence, automation, and collaboration to succeed.
Strong vision, but Cisco must back it up with competitive products, sales/marketing, and user education.
Loss of IT control requires more security oversight, policy management, enforcement and analytics.
Pointing the cybersecurity finger at China won’t solve our problems.
Privacy aside, is this program really worthwhile?
The balance of security processes and skills is lopsided in most organizations. Network security trumps server security at most organizations in a number of ways, from IT experience to the common perception that networks simply require more expansive security efforts than servers. ESG investigated the state of network and server security at midmarket and enterprise organizations, and considered the ramifications for organizations that expend more security resources on their networks at the expense of their servers.
Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s information security service. With over 25 years of technology industry experience, Jon is widely recognized as an expert in all aspects of information security and is often called upon to help customers understand a CISO's perspective and strategies. Recently, Jon has been an active participant with cybersecurity issues, legislation, and technology within the U.S. federal government.
© 2014 by The Enterprise Strategy Group, 20 Asylum Street, Milford, MA 01757 508.482.0188
Enter your email address, and click subscribe