Lots of money, lots of opportunity, and lots of risk. VCs should abandon status quo investment strategies and look toward services, industry solutions, middleware, and data security.
Enterprises should prepare for, and take advantage of, the consumerization of authentication technology.
In April, Trend Micro announced additions and updates to its Complete User Protection solution and changes to its licensing model that focus on improving its compatibility with cloud computing. Trend Micro’s strategy aids partners in protecting their customers from unnecessary upselling or licensing confusion, while allowing customers to combine on-premises security solutions with cloud-based security services. This strategy can put Trend Micro at a competitive advantage moving forward, provided it educates the market aggressively as to the true extent and benefits of its endpoint security portfolio.
Security analytics growth will drive growth in PCAP appliances, analytics distribution networks, SDN, and middleware.
A plethora of intelligence feeds are driving new products, services, and enterprise threat intelligence strategy.
CISO responsibilities are expanding and must be supported with the right skill sets, technologies, and industry recognition.
High demand will drive new intelligence, services, tools, and executive cybersecurity skill sets.
Sampling security data is no longer adequate or necessary – CISO mindsets are due for a change.
Time to stop blaming employees and enlist their help.
Large organizations should delegate endpoint security to a group dedicated to malware prevention, detection, and response across all technology areas.
Strong next-generation cybersecurity must be aligned with identity knowledge and enhancements.
Applications, endpoints, networks, and servers will enforce security policies related to identity and data security.
Data feeds from all IT systems will finally produce an end-to-end view of enterprise security for risk management and incident detection/response.
Enterprise organizations should selectively bolster defenses based upon threat intelligence and industry trends.
Large organizations need help monitoring user behavior activity, alternative endpoints, threat intelligence, and sensitive data.
Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s information security service. With over 25 years of technology industry experience, Jon is widely recognized as an expert in all aspects of information security and is often called upon to help customers understand a CISO's perspective and strategies. Recently, Jon has been an active participant with cybersecurity issues, legislation, and technology within the U.S. federal government.
© 2015 by The Enterprise Strategy Group, 20 Asylum Street, Milford, MA 01757 508.482.0188
Enter your email address, and click subscribe