“Gotta Have” Endpoint Security Suite Functionality

The movement toward next-generation endpoint security has accelerated over the last few years for a simple reason – cybersecurity professionals aren’t happy with the efficacy of existing antivirus tools. This market demand has led to a wave of investment and innovation from vendors like Carbon Black, CrowdStrike, Cylance, Morphisec, SentinelOne, and many others.

Topics: Cybersecurity endpoint security antivirus EDR endpoint security suite next-generation endpoint security

Change is Constant

The one constant in IT is change. This aphorism applies not only to the technology, but to people, processes, and organizations. Like the rest of IT, ESG’s validation services have been undergoing change.

In my last few blogs, I wrote about benchmarking tools and performance analysis because, for a long time, these were significant parts of our validation process.

Topics: Cybersecurity Networking ESG Lab software-as-a-service (SaaS) economic validation

Ransomware Research Highlights (Video)

Ransomware incidents reached epidemic levels in 2016 with high profile attacks on health care organizations highlighting the operational impacts of cyber extortion by impeding the ability of some targeted organizations to deliver patient care. Cybercriminals continued to employ tried and true attack vectors and methods, principally phishing, to execute a transactional ransomware business model across multiple industries. 

Topics: Cybersecurity ransomware

Cloud Computing Chaos Is Driving Identity Management Changes

I was recently reminded of something a CISO said to me a few years ago. This security executive mentioned that his organization was struggling to maintain tight security controls in an era of cloud computing and mobility. As a result, his organization had increased its focus in two areas: Identity management and data security. He stated, “with the rise of cloud and mobility, identity and data security are the new security perimeters.” 

I mentioned this conversation to my colleague Mark Bowker who covers identity management at ESG. Mark responded that the CISO's conclusions are clearly characterized in some recent ESG research data. For example, 61% of respondents believe IAM is more difficult today than it was 2 years ago. Why are things more difficult? Survey respondents pointed to cloud computing and mobility as two primary drivers but also mentioned increasing cyber-threats, and the lack of a comprehensive IAM strategy.

Topics: Cybersecurity identity management MFA SSO IDaaS

Enterprise Plans for Security Automation and Orchestration

With the global cybersecurity skills shortage hanging over them, CISOs are turning toward security automation and orchestration technologies to improve staff productivity. This is happening faster and wider than most people realize. According to ESG research, 19% of enterprise organizations have already deployed technologies for security automation and orchestration extensively, 39% have done so on a limited basis, and 26% are engaged in a project to automate/orchestrate security operations. 

Topics: Cybersecurity SIEM security operations and analytics security automation security orchestration

Best of Breed

Over the last few years I’ve been fascinated by the ever-interesting cybersecurity market. It’s the latest wild, wild west of technology frontiers. It’s a massive market, that is perfect in many ways—for me and ESG at least. Maybe not so much for you poor folk trying to deal with it.

Topics: Cybersecurity endpoint security

Artificial Intelligence and Cybersecurity: The Real Deal

If you want to understand what’s happening with AI and cybersecurity, look no further than this week’s news. On Monday, Palo Alto Networks introduced Magnifier, a behavioral analytics solution that uses structured and unstructured machine learning to model network behavior and improve threat detection. Additionally, Google’s parent company Alphabet announced Chronicle, a cybersecurity intelligence platform that throws massive amounts of storage, processing power, and advanced analytics at cybersecurity data to accelerate the search and discovery of needles in a rapidly growing haystack. 

Topics: Cybersecurity SIEM machine learning artificial intelligence SOAPA

SOAPA Video with Bay Dynamics (Part 2)

Jerry Skurla, CMO at Bay Dynamics, stopped by the ESG studio a few weeks ago to chat about SOAPA. In part 2 of our video, we discuss:

  1. The role of machine learning. Enterprise organizations are embracing artificial intelligence for cybersecurity but remain confused about what it does and how they benefit. Jerry talks about machine learning and its ability to understand “normal” behavior. When it does find anomalies, they can be further categorized into benign or real issues. In this way, machine learning can help reduce all the noise in security operations – a welcome advancement.
Topics: Cybersecurity DLP SOAPA UEBA

Endpoint Detection and Response (EDR) Is Coming – In One Form or Another

A few years ago (2016), my esteemed colleague Doug Cahill and I spoke with 30 enterprise organizations on their endpoint security requirements and strategies. Based upon these discussions, we came up with a concept called the endpoint security continuum. 

On one end of the continuum lies advanced threat prevention. This software is sometimes referred to as “next-generation AV” because it uses technologies like machine learning and threat intelligence integration to improve the threat prevention capabilities of traditional AV products. 

Topics: Cybersecurity antivirus software SOAPA EDR

Key Cybersecurity Findings from ESG’s 2018 IT Spending Intentions Research (Video)

ESG recently completed our annual IT spending intentions research in which the study gauged not only spending plans, but top of mind IT and cybersecurity considerations for economic buyers. With strengthening cybersecurity tools and process being the most important IT meta-trend, and cybersecurity the largest area of projected incremental spend, this video blog explores the dynamics that are driving cybersecurity priorities, including: 

Topics: Cybersecurity cybersecurity skills shortage IT Spending Intentions ransomware SOAPA GDPR