In this ESG Video Capsule, ESG Senior Analyst Jon Oltsik summarizes some key findings from his recently released research report on Network Security Trends in the Era of Cloud and Mobile Computing.
Hacker tactics are varied, sophisticated, and built for success. This report should be required reading for everyone in the cybersecurity domain.
Numerous market ramifications as network security moves away from the networking organization toward the infosec domain.
Endpoint security tools moving beyond AV, putting a $10 billion market in play.
Wall Street and enterprise customers demand bold actions as soon as possible.
Network security skills and staffing continue to lag at enterprise organizations. Time to sound the alarm?
Integration and services needed for cybersecurity efficacy and operations efficiency.
Malware detection, prevention, and response activities are quickly bringing endpoint and network security together.
Great read for those who want to understand what might happen as a result of a devastating cyber-attack on critical infrastructure.
Data center security is in a perilous position. Large organizations have been using server virtualization technology for nearly 10 years and are currently testing/deploying private cloud platforms like OpenStack and VMware vCloud, and using cloud-based infrastructure from Amazon, IBM, Rackspace, and others. In spite of this progress, however, many firms continue to rely on perimeter security technologies and architectures based on physical security products like network firewalls, IDS/IPS, and other L4-7 technologies to protect physical and virtual servers. This creates significant risk to the enterprise, as legacy security tools don’t offer the right levels of agility, flexibility, efficacy, and visibility for today’s virtual data centers. CISOs need to address this precarious situation by introducing virtual network security services into their data center security strategies. Virtual network security services can offer L4-7 security controls and provide network security visibility for virtual workloads regardless of network topology, workload mobility, or physical location. Virtual network security services can also offer cloud-like orchestration with central control, software-based provisioning, and a variety of security controls that provide the ability to align with workload privacy and security requirements.
Wave of security breaches illustrates the need to step back before moving forward.
Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s information security service. With over 25 years of technology industry experience, Jon is widely recognized as an expert in all aspects of information security and is often called upon to help customers understand a CISO's perspective and strategies. Recently, Jon has been an active participant with cybersecurity issues, legislation, and technology within the U.S. federal government.
© 2015 by The Enterprise Strategy Group, 20 Asylum Street, Milford, MA 01757 508.482.0188
Enter your email address, and click subscribe