Thinking about Identity Management for the RSA Security Conference

With February behind us, the cybersecurity industry is about to experience a push toward the annual RSA Security Conference in San Francisco. I expect around 50,000 people to attend this year. It ought to be crowded, loud, and extremely passionate.

Topics: Cloud Computing Cybersecurity IAM Enterprise Mobility

Video: What Networks Do for IT Organizations

ESG conducted research on what network infrastructure provides for organizations by surveying 300 IT professionals responsible for evaluating, purchasing, and managing networking technologies.

Are networks cost centers and simply a form of plumbing? Or do they provide some other capabilities that can actually generate revenue or provide security insights?

Topics: Networking

Why Splunk Acquired Phantom

Early this morning, I received news that Splunk had announced its intention to acquire Phantom for $350m. Just as IBM purchased Resilient Systems a few years ago, Splunk decided to add a dedicated security operations automation and orchestration tool set to its SIEM platform.

Topics: Cybersecurity SIEM SOAPA security operations center

GDPR Is Coming and Many Organizations Aren’t Ready

Each year, ESG surveys around 700 cybersecurity and IT professionals as part of its annual IT spending intentions research. In this year’s survey, ESG asked respondents several questions about GDPR readiness. Here’s what we found out:

  1. While 11% of organizations are completely prepared for GDPR (i.e., would be ready if it went into effect tomorrow), 33% say they are mostly prepared (i.e., most work done but some tasks left to accomplish), and 44% claim they are somewhat prepared (i.e., organization has identified all the steps to meet the GDPR deadline but are early in the process of completing all tasks).
Topics: Cybersecurity regulatory compliance GDPR

Highlights from ESG’s Enterprise On-premises Infrastructure Spending Trends Research (Video)

ESG conducted research on the spending intentions of 651 IT decision makers to determine how 2018 may differ from previous years.

We found out that the majority of organizations were largely going to keep their infrastructure spend flat or even reduce the amount they spend on infrastructure. For many organizations this can be attributed to two initiatives – Hyperconverged and Cloud.

Topics: Networking IT Spending Intentions hyperconverged infastructure on-premises architecture

What’s on CISO's Minds in 2018?

I’ve just begun a research project on CISO priorities in 2018. What I’m finding so far is that CISOs are increasing their focus in several areas including the following:

  1. Business risk. Yes, CISOs have always been employed to protect critical business assets but in the past, this was really executed with a bottom-up perspective – from IT and security infrastructure up to business processes. Fast forward to 2018 and CISOs are moving to a top down view from business processes down to the technology. This broadens their view of risk and mandates that security controls work collectively to protect ALL the technologies used to accomplish business processes. This is a profound change that challenges even the best CISOs and security organizations.
Topics: Cybersecurity risk management data security CISO identity management security awareness training

The State of Constant Change in Endpoint Security

Endpoint security is one of the most dynamic areas of cybersecurity and one that is in a state of constant change. To combat both the relatively pedestrian and more sophisticated range of attacks, most organizations, according to research conducted by the Enterprise Strategy Group, are implementing multiple compensating measures. The actions taken to improve endpoint security are across the dimensions of processes, skills, and technologies. In fact, ESG’s research reveals that 69% of organizations regularly reevaluate the effectiveness of their endpoint security strategies. Why all the attention on endpoint security? The epidemic levels of ransomware experienced in 2016 through 2017 and that are sure to extend into this year served as a catalyst for many IT and cybersecurity professionals to rethink how they secure their endpoints.

Topics: Cybersecurity endpoint security

Systems Management With Today’s Security Threats

With the rise in security threats, like cyberattacks and malware, enterprise IT needs to have comprehensive systems management. The needs for a systems management solution are these three key attributes:

Topics: Systems Management

2018 Enterprise Mobility Spending Trends Video

As part of ESG’s 2018 IT spending intentions research, IT decision makers were asked about their spending plans for enterprise mobility technology over the next 12 months. In this video, you'll learn about where enterprises are focusing their mobility spending, spending priorities, and changes in spending.

Topics: IT Spending Intentions Enterprise Mobility

“Gotta Have” Endpoint Security Suite Functionality

The movement toward next-generation endpoint security has accelerated over the last few years for a simple reason – cybersecurity professionals aren’t happy with the efficacy of existing antivirus tools. This market demand has led to a wave of investment and innovation from vendors like Carbon Black, CrowdStrike, Cylance, Morphisec, SentinelOne, and many others.

Topics: Cybersecurity endpoint security antivirus EDR endpoint security suite next-generation endpoint security