New protection, detection, and monitoring requirements may alter the antivirus status quo.
Security executives have a tough road ahead to improve security monitoring, analytics, operations, and business enablement.
Merger adds security intelligence, endpoint forensics, and services to FireEye market momentum
Lots of opportunity in network security, data security, security services, and strong authentication in 2014.
Risks assessments, application testing, access controls, and proactive planning top the list.
CISOs need to improve forensic investigations, root cause analysis, and security intelligence monitoring.
Endpoint security, security analytics, and process automation top the “to-do” list.
Strong enterprise demand will be counterbalanced by confusion and planning requirements.
Lots of market upside, budget dollars – and yes, competition.
New tools must improve technology and employee accuracy and efficiency.
Security groups point to cybersecurity training, software patching, and system hardening.
CISOs should think about privacy, culture, and third-party relationships.
Integration, analytics, services, identity, and "C-level" messages....
Enterprises want choices, integration, and specific types of data feeds. Will vendors acquiesce?
Vendors need better understanding and empathy about CISOs, security professionals, and business objectives.
Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s cybersecurity service. With almost 30 years of technology industry experience, Jon is widely recognized as an expert in all aspects of cybersecurity and is often called upon to help customers understand a CISO's perspective and strategies.
© 2016 by The Enterprise Strategy Group, 20 Asylum Street, Milford, MA 01757 508.482.0188