SOAPA Video with FireEye (Part 2)

Paul Nguyen, VP of product strategy at FireEye, stopped by the ESG studio recently to talk about how the company is moving forward with SOAPA. In part 2 of our video, Paul and I chewed the fat on topics like:

  1. Security operations best practices. FireEye has vast institutional security operations experience, built on the back of managed services, professional services, threat intelligence expertise, etc. Given this, I asked how FireEye can build upon this knowledge in its product set. Paul mentioned that Helix has its roots in FireEye’s SOCs and managed defense offerings and is designed to provide a similar unified experience for the security analysts of its customers.
Topics: Cybersecurity FireEye SOAPA Helix

Catching Up with Symantec

When Symantec and Veritas joined forces, Symantec Vision (its customer and analyst event) was a regular spring ritual. Like the swallows coming back to Capistrano, I made an annual pilgrimage to Las Vegas, parked myself at the MGM or Venetian, and spent a few days catching up on the latest Symantec buzz.

Topics: Cybersecurity Symantec SOAPA

SOAPA Video with FireEye (Part 1)

Paul Nguyen, VP of product strategy at FireEye, stopped by the ESG studio recently to talk about how the company is moving forward with SOAPA. Paul and I discussed things like:

  1. Technology integration. Through its history, FireEye has grown through acquisition, purchasing companies like iSight Partners, Mandiant, and nPulse. Heck, Paul joined FireEye because of its acquisition of Invotas in 2016. While each of these products can stand on its own, FireEye realized that it could deliver a lot more by stitching all these products together in a common platform. Paul spends a lot of his time figuring out how to combine the elements of each product into a FireEye security operations cocktail to maximize customer value. 
Topics: Cybersecurity FireEye security analytics SOAPA security operations center

Talking Cybersecurity (ESG 360 Video Series)

IT has probably never been more complex and demanding than today: even as approaches such as convergence, myriad clouds, containers and software-definition (etc.) seek to make operations simpler, so to a degree such elements can also obfuscate some of the underlying subtleties and opportunities of the foundational components. After all, while it’s great to focus on purchasing - for instance - application service levels or business outcomes, some understanding of the IT elements (and considerations or choices) that contribute to those is also often useful. That is the purpose of this video discussion series: it offers ESG’s subject matter experts discussing some of the key trends, drivers, and considerations across various IT areas. We aim to do it succinctly and to deliver it in engaging, plain English - while also tying each technology area back to its eventual potential to positively impact both IT and business results.

Topics: Cybersecurity ESG 360 Video Series

Containers are Here! What About Container Security?

The industry is gaga for container technologies like Docker and for good reason. According to ESG research, containers make up about 19% of hybrid cloud production workloads today, but in just 2 years’ time, containers will make up one-third of hybrid cloud production workloads. 

Not surprisingly, rapid growth and proliferation of application containers have led to several security issues:

Topics: Cybersecurity cloud security containers docker container security

It’s Time to Think Harder About Security Data Management

Organizations are running into scalability problems as they collect, process, and analyze more security data. It’s time for enterprise security data management.

Topics: Cybersecurity

The Evolution of Security Operations Automation and Orchestration

The market for security operations automation and orchestration products is rapidly maturing. The most recent proof point of this maturation was Splunk’s acquisition of Phantom in February, but other vendors like FireEye (acquired Invotas), IBM (acquired Resilient), Microsoft (acquired Hexadite), and Rapid7 (acquired Komand) saw the light and bought into this market over the past few years.

Topics: Cybersecurity ICOPs SOAPA SOAR

Cloud Computing Security Chaos Continues at RSA Conference 2018

My esteemed colleague, Doug Cahill, did a great job at the RSA Conference with a killer presentation on hybrid cloud security. Unfortunately, Doug’s presentation occurred on Thursday afternoon, when many conference attendees were catching flights home, packing up their booths, or recovering at a bar somewhere else in San Francisco. Despite the timing, about 150 souls showed up, but I’m guessing that Doug’s conference room would have been overflowing if his presentation was on Tuesday rather than Thursday.

Topics: Cybersecurity RSA Security Conference cloud security Doug Cahill

What is a Cybersecurity Technology Platform Anyway?

At last week’s RSA Conference, you couldn’t walk more than 10 feet on the show floor without a security vendor pitching you on its technology “platform.” Yup, Check Point, Cisco, FireEye, Forcepoint, Fortinet, McAfee, Palo Alto Networks, Symantec, Trend Micro, Webroot, and lots of others are now busy pitching platforms and will continue to do so. 

Okay, but what is the actual definition of this term? In general, vendors use the word “platform” to describe an integrated amalgamation of point products that creates a common and interoperable architecture. It’s safe to say that all vendors agree upon this platform characteristic. Beyond this basic functionality, however, there doesn’t seem to be much consensus on security technology platform requirements.

Topics: Network Security Cybersecurity endpoint security cloud security security technology platform

RSA 2018: Securing (y)our Data, (y)our IT…and the World -- includes video

This year’s RSA Conference in San Francisco was held under the theme of “Now Matters.” To play off those semantics, one could clearly see the continuing shift in this industry from it being (in the past) all about matters of IT security, to (now) a world where IT security really matters. That’s not just playing with words - it’s impossible to over-state the importance of the endeavor that this event reflects and represents; but equally the burgeoning user needs and vibrant vendor competition creates a giddy atmosphere, in all senses of the word.

Topics: Storage Cybersecurity RSA Security Conference