Lots of ways for VMware to pivot off this acquisition.
ESG data indicates that enterprise organizations are either cybersecurity skill “haves” or “have nots.”
POS malware used for Target attack whistled past endpoint security.
Security teams point to problems with skills, malware knowledge, and forensics.
This ESG Lab review documents hands-on testing of RSA Enterprise Compromise Assessment Tool (ECAT), a signature-less malware detection tool with a focus on endpoint compromise assessment and monitoring.
New protection, detection, and monitoring requirements may alter the antivirus status quo.
Security executives have a tough road ahead to improve security monitoring, analytics, operations, and business enablement.
Merger adds security intelligence, endpoint forensics, and services to FireEye market momentum
Lots of opportunity in network security, data security, security services, and strong authentication in 2014.
Risks assessments, application testing, access controls, and proactive planning top the list.
CISOs need to improve forensic investigations, root cause analysis, and security intelligence monitoring.
Endpoint security, security analytics, and process automation top the “to-do” list.
Strong enterprise demand will be counterbalanced by confusion and planning requirements.
Lots of market upside, budget dollars – and yes, competition.
Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s cybersecurity service. With almost 30 years of technology industry experience, Jon is widely recognized as an expert in all aspects of cybersecurity and is often called upon to help customers understand a CISO's perspective and strategies.
© 2015 by The Enterprise Strategy Group, 20 Asylum Street, Milford, MA 01757 508.482.0188