As part of its annual IT spending intentions research, ESG asks IT professionals around the world to identify areas where they have a problematic shortage of IT skills. Over the past three years, information security skills topped this list. In 2014, 25% of all surveyed organizations said they had a problematic shortage of infosec skills.
In 2014, SDN gained a lot of momentum and many organizations are already piloting SDN or planning deployment projects for next year. Good news for network security because SDN holds a lot of promise for improving the role of the network with incident prevention, detection, and response.
The website, Urban Dictionary, defines the expression “don’t poke the bear” as follows:
A phrase of warning used to prevent oneself or others from asking or doing something that might provoke a negative response from someone or something else.
Earlier this year, ESG published a research report titled, Network Security Trends In the Era of Cloud and Mobile Computing. As part of this report, ESG surveyed 321 security professionals working at enterprise organizations (i.e., more than 1,000 employees) about their networking and network security strategies.
Over the last few months, I’ve talked to a number of CISOs and security analytics professionals about threat intelligence as I’m about to dig into this topic with some primary research.
One of the things I’ve learned is that large enterprises are consuming lots of open source and commercial threat intelligence feeds. In some cases, these feeds are discrete services from vendors like iSight Partners, Norse, or Vorstack. Alternatively, they also purchase threat intelligence along with products from security vendors like Blue Coat, Check Point, Cisco, FireEye, Fortinet, IBM, McAfee, Palo Alto Networks, Symantec, Trend Micro, Webroot, and a cast of a thousand others.
In the past, cybersecurity was thought of as an IT problem where CISOs were given meager budgets and told to handle IT security with basic technical safeguards and a small staff of security administrators. Fast forward to 2014 and things have certainly changed now that business mucky-mucks read about data breaches in the Wall Street Journal on a daily basis.
Okay, I admit that I’m a geek and have read numerous books on the history of IT and the Internet. Katie Hafner’s Where Wizards Stay up Late, The Origins of the Internet is a particular favorite of mine.
Ask a security professional in North America to describe Trend Micro and you will likely hear about antivirus software and a grouping of vendors that also includes McAfee and Symantec. Funny, but you’d get a completely different answer if you asked the same question in Brazil, Germany, or Japan. In these geographies, you’d hear about a billion dollar-plus enterprise-class security leader with a full portfolio of products, partnerships, and managed services.
With the glitz of Las Vegas as a background, Intel Security (aka McAfee) held its annual FOCUS event last week attracting analysts, customers, and the press alike.
In September 2014, RSA announced the release of RSA ECAT 4.0, an endpoint security analytics solution aimed at improving organizations’ ability to detect, prioritize, investigate, and remediate threats. In a move toward integration, ECAT rounds out RSA’s product line alongside its web threat detection, GRC, and IAM solutions for data protection, security analytics, and now endpoint security as well. This approach to endpoint security widens RSA’s footprint in the enterprise security market, providing customers with end-to-end integration between their networks and endpoints.
Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s information security service. With over 25 years of technology industry experience, Jon is widely recognized as an expert in all aspects of information security and is often called upon to help customers understand a CISO's perspective and strategies. Recently, Jon has been an active participant with cybersecurity issues, legislation, and technology within the U.S. federal government.
© 2015 by The Enterprise Strategy Group, 20 Asylum Street, Milford, MA 01757 508.482.0188
Enter your email address, and click subscribe