Security groups point to cybersecurity training, software patching, and system hardening.
CISOs should think about privacy, culture, and third-party relationships.
Integration, analytics, services, identity, and "C-level" messages....
Enterprises want choices, integration, and specific types of data feeds. Will vendors acquiesce?
Vendors need better understanding and empathy about CISOs, security professionals, and business objectives.
Mobility and consumerization are having a hard and fast impact on IT. We are no longer in a “command and control” world in which IT dictates which tools employees use (hardware as well as software): More end-users are choosing their own hardware platforms and software applications in lieu of the IT-sanctioned business tools provided by their companies, and IT is sprinting to catch up. These end-users are looking to tackle issues like data sharing, portability, and access from multiple intelligent endpoint devices, creating a conundrum for IT as it has to balance business enablement, ease of access, and collaborative capacity with the need to maintain control and security of information assets.
Device introduction marks the intersection between biometrics commodification and consumerization.
CISOs need tighter control and improved security intelligence/analytics.
Combination of carrots, sticks, investment, and education.
Critical infrastructure organizations most vocal about the need for federal cybersecurity help
Strengths: Integration, architecture, and end-to-end coverage. Weakness: Market visibility.
Vendors must focus in these areas to help enterprise organizations with security efficacy and operational efficiency.
Architecture aligns detection with prevention and remediation to streamline security operations.
Packet and meta data capture analysis is helping large organizations accelerate malware detection and remediation.
Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s information security service. With over 25 years of technology industry experience, Jon is widely recognized as an expert in all aspects of information security and is often called upon to help customers understand a CISO's perspective and strategies. Recently, Jon has been an active participant with cybersecurity issues, legislation, and technology within the U.S. federal government.
© 2015 by The Enterprise Strategy Group, 20 Asylum Street, Milford, MA 01757 508.482.0188