SOAPA Video with McAfee (Part 2)

In part 2 of our SOAPA video, Jason Rolleston, Vice President of product marketing for security operations products at McAfee, and I chatted about:

  1. Security analytics and operations. Analytics and operations are foundational elements of SOAPA, so I asked Jason to tell me about McAfee’s strategy in each area. Rolleston points out that there is more security data than ever, so finding the signals within the noise is more difficult than ever. McAfee is moving beyond event correlation for security analytics, putting a lot of resources into machine learning for anomaly detection. McAfee believes it has an advantage by applying machine learning across technologies. On the operations side, McAfee wants to help analysts take more effective and efficient actions, so it is investing in automation capabilities with Investigator, Active Response, Sandboxing, etc.
Topics: Cybersecurity McAfee endpoint security SIEM DLP SOAPA

SOAPA Video with Bay Dynamics (Part 2)

Jerry Skurla, CMO at Bay Dynamics, stopped by the ESG studio a few weeks ago to chat about SOAPA. In part 2 of our video, we discuss:

  1. The role of machine learning. Enterprise organizations are embracing artificial intelligence for cybersecurity but remain confused about what it does and how they benefit. Jerry talks about machine learning and its ability to understand “normal” behavior. When it does find anomalies, they can be further categorized into benign or real issues. In this way, machine learning can help reduce all the noise in security operations – a welcome advancement.
Topics: Cybersecurity DLP SOAPA UEBA

A Multitude of Mobile Security Issues

The Black Hat USA conference takes place next week. If it's anything like RSA and Interop, there will be a fair amount of discussion about BYOD and mobile device security. Yup, a lot of hype but this is a topic worth discussing as nearly every enterprise organization and CISO I speak with is struggling here.

Topics: Apple Microsoft End-User Computing Check Point MDM Cisco Information and Risk Management McAfee mobile Security and Privacy google BYOD android Good Technology Juniper Networks Black Hat trend micro Symantec Anti-malware Interop MobileIron DLP RSA Security Conference iPad

Document-based Security Standards: The Time is Now

I first heard the term de-perimeterization years ago from my friends at the Jericho Forum, a UK-based organization of security professionals. Back then the focus was on securing IT when it crossed organizational boundaries. In other words, a highly-secure network perimeter offers little protection if my business applications, services, and sensitive data are consumed by users working at other organizations, with different security policies and controls, residing outside the firewall.

Topics: Microsoft Check Point Information and Risk Management McAfee Enterprise Software Security and Privacy android Content Management trend micro Search Symantec RSA NIST DLP iPad Archiving Windows