Motivated by Advanced Persistent Threats (APTs), insider attacks, and the ominous threat landscape, many large organizations are investing in new database security controls. This is a good start, but ESG believes that databases must become part of an overall security strategy and not simply secured in isolation. To maximize protection while streamlining operations, a database security strategy should encompass people, processes, and technology while tightly integrating into the overall enterprise security architecture.
Bipartisan rhetoric sounds good but cybersecurity action is likely to languish.
Pity the poor CISO working in small enterprise organizations. Faced with a dangerous threat landscape and a multitude of new IT initiatives, security executives are forced to address new security requirements with legacy point tools, short-staffed security groups, and manual processes. This can’t—and won’t—work for long. What’s needed are new intelligent, automated, and tightly integrated security management systems that are designed for both compliance automation and incident detection/response. Available solutions are few and far between, but eIQ is one vendor offering this type of next-generation functionality today.
Common market and skills, complementary technologies, and opportunities for services play.
New SIEM functionality from LogRhythm baselines behavior for anomaly detection and security automation
Many CISOs are in a no-win situation. On the one hand, they face a dangerous threat landscape and need to secure new IT initiatives such as cloud computing, mobile computing, and social media. On the other hand, they continue to rely on discrete point tools, under-staffed organizations, and manual processes as the basis of their security defenses. This mismatch leads to ever-increasing risk to organizations and IT assets—an unacceptable situation. ESG believes that information security discontinuity is driving fundamental changes across enterprise security that encompasses people, process, and technology. As this transition occurs, IBM may be one of few vendors with the appropriate enterprise products, resources, and expertise to address new enterprise security requirements.
Familiar caution is welcome but perpetual inaction is the real problem.
ESG surveyed security professionals to find out about their current and planned use of third-party professional or managed security service providers to fulfill some or all of their organizations’ security requirements. The research revealed that many organizations are increasing their use of security services for multiple reasons, and most of those reasons relate to the ongoing security skills gap and staff shortage. The most requested security services? Security design and threat management.
Oh, you didn't know if was national cybersecurity awareness month? You are not alone -- and that is a real shame, if you ask me.
Growth of Advanced Malware Detection/Prevention (AMD/P) technology will impact standard antivirus software.
Over the past few years, Advanced Persistent Threats (APTs) have altered the threat landscape, creating new requirements for enterprise information security. While many organizations have responded with additional funding or new security technologies, they still tend to rely on traditional security strategies like adding traditional layers of defense or hardening systems—a good start, but inadequate for APT protection. To address new types of sophisticated and targeted threats, large organizations need new processes and tools for continuous monitoring and detailed, broad situational awareness. CounterTack provides security technologies that were designed for these very requirements.
Nearly three-quarters of organizations expect to be the target of Advanced Persistent Threats (APTs) in the near future. Information security vendors have come forward with new products to spot and stop APTs, and they each approach the task in different ways. This research brief reviews the different types of advanced malware detection and prevention products available today, and provides advice on the one type of product each enterprise organization should implement quickly to protect its assets from APTs.
Enterprise organizations want more automation, integration, intelligence, and scale from security software.
Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s information security service. With over 25 years of technology industry experience, Jon is widely recognized as an expert in all aspects of information security and is often called upon to help customers understand a CISO's perspective and strategies. Recently, Jon has been an active participant with cybersecurity issues, legislation, and technology within the U.S. federal government.
© 2015 by The Enterprise Strategy Group, 20 Asylum Street, Milford, MA 01757 508.482.0188
Enter your email address, and click subscribe