DLP or eRM? Wrong question; today's enterprise data security requirements are such that organizations need both technologies to improve security, efficiency, and governance. As more and more organizations demand data security safeguards everywhere, vendors will respond with merged DLP/eRM data security suites-or concede the enterprise market to those that do.
In May 2009, President Obama stated his intention to appoint a cybersecurity coordinator to monitor, manage, and organize cybersecurity efforts in the U.S. federal government. While this position remains vacant today, ESG has compiled a list of 10 high priorities for the cybersecurity coordinator when he or she is appointed.
A recent ESG Research Brief revealed that valuable databases are often protected by an ad hoc combination of IT groups and manual processes. Clearly, these weaknesses make databases vulnerable, but are there specific types of database security threats that increase the risk of a data breach? Yes. ESG’s data also points to a pattern of enterprise data breaches and identifies specific database risks concerning security professionals. The good news is that large organizations have made database security a 2009 priority, but the question remains: Is this action a case of too little, too late?
There is no longer a question as to whether large organizations need log management solutions. But as log management and analysis needs evolve, legacy products can't scale, accommodate uncommon log file formats, or provide the right level of real-time or historical analysis. These requirements are driving a transition to a new model called log management warehousing. Similar to "top-down" data warehousing, log management warehousing will evolve to become a centralized enterprise service over the next few years.
Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s information security service. With over 25 years of technology industry experience, Jon is widely recognized as an expert in all aspects of information security and is often called upon to help customers understand a CISO's perspective and strategies. Recently, Jon has been an active participant with cybersecurity issues, legislation, and technology within the U.S. federal government.
© 2015 by The Enterprise Strategy Group, 20 Asylum Street, Milford, MA 01757 508.482.0188
Enter your email address, and click subscribe