Applications, endpoints, networks, and servers will enforce security policies related to identity and data security.
Data feeds from all IT systems will finally produce an end-to-end view of enterprise security for risk management and incident detection/response.
Enterprise organizations should selectively bolster defenses based upon threat intelligence and industry trends.
Large organizations need help monitoring user behavior activity, alternative endpoints, threat intelligence, and sensitive data.
Data collection, analysis tools, and hiring staff top the list of actions.
Sourcefire, architecture, and services place Cisco in the catbird seat for emerging enterprise cybersecurity requirements if Cisco remains aggressive.
Enterprise organizations benefit by monitoring user activity and improving identity and access management (IAM) processes.
FireEye, IBM, and Symantec announcements move the cybersecurity industry in this inevitable direction.
Symantec statement must be put in context of endpoint defense-in-depth.
Many organizations lack the right skills, budgets, and security analysis tools.
New services can help enterprises assess and mitigate risk in the cyber supply chain.
Revenue growth in advanced malware detection and response and other cybersecurity services will change industry marketing and investment.
Central management and migration across a multitude of form factors is critical.
Changes in threat landscape and security technology demand creativity beyond vanilla cybersecurity.
Could mean security woes and bad news for Microsoft while opening creative opportunities for security vendors and service providers.
Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s information security service. With over 25 years of technology industry experience, Jon is widely recognized as an expert in all aspects of information security and is often called upon to help customers understand a CISO's perspective and strategies. Recently, Jon has been an active participant with cybersecurity issues, legislation, and technology within the U.S. federal government.
© 2014 by The Enterprise Strategy Group, 20 Asylum Street, Milford, MA 01757 508.482.0188
Enter your email address, and click subscribe