Network security is a top area of investment for many organizations looking to build up their defenses against cyber-attacks. At the same time, software-defined networking (SDN) is maturing and solutions are becoming capable of supporting networking functionality. Will organizations leverage SDN as a platform to deliver network security services? What impact will this have on existing processes and organizational dynamics?
High energy, strong community, scary cybersecurity situation.
CISOs must prioritize identity, data security, and security monitoring, and strive for a “single-pane-of-glass” across enterprise IT, SaaS, PaaS, and IaaS.
Cybersecurity event brings together an army of infosec nerds with a focus on threats, vulnerabilities, and innovative defenses.
Lots of money, lots of opportunity, and lots of risk. VCs should abandon status quo investment strategies and look toward services, industry solutions, middleware, and data security.
Enterprises should prepare for, and take advantage of, the consumerization of authentication technology.
In April, Trend Micro announced additions and updates to its Complete User Protection solution and changes to its licensing model that focus on improving its compatibility with cloud computing. Trend Micro’s strategy aids partners in protecting their customers from unnecessary upselling or licensing confusion, while allowing customers to combine on-premises security solutions with cloud-based security services. This strategy can put Trend Micro at a competitive advantage moving forward, provided it educates the market aggressively as to the true extent and benefits of its endpoint security portfolio.
Security analytics growth will drive growth in PCAP appliances, analytics distribution networks, SDN, and middleware.
A plethora of intelligence feeds are driving new products, services, and enterprise threat intelligence strategy.
CISO responsibilities are expanding and must be supported with the right skill sets, technologies, and industry recognition.
High demand will drive new intelligence, services, tools, and executive cybersecurity skill sets.
Sampling security data is no longer adequate or necessary – CISO mindsets are due for a change.
Time to stop blaming employees and enlist their help.
Large organizations should delegate endpoint security to a group dedicated to malware prevention, detection, and response across all technology areas.
Strong next-generation cybersecurity must be aligned with identity knowledge and enhancements.
Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s information security service. With over 25 years of technology industry experience, Jon is widely recognized as an expert in all aspects of information security and is often called upon to help customers understand a CISO's perspective and strategies. Recently, Jon has been an active participant with cybersecurity issues, legislation, and technology within the U.S. federal government.
© 2014 by The Enterprise Strategy Group, 20 Asylum Street, Milford, MA 01757 508.482.0188
Enter your email address, and click subscribe