Most Recent Blogs

Fundamental Differences Between Securing Workloads and Endpoints

Posted: November 05, 2015   /   By: Doug Cahill   /   Tags: Cybersecurity, endpoint

arms_upraised@RANT ON

OK, full disclosure - this is one of my pet peeves, so let me get this out of the way right out the gate: in my humble opinion, a server workload is not an endpoint. Sure, they’re all hosts, but what I think of as an endpoint is different in so many ways from a workload, including computing characteristics, their respective role in the cyber security kill chain, not to mention buying centers. Defining an endpoint as broadly as "anything with an IP address" fails to acknowledge these differences. As such, as an industry, we should be mindful to make note of these distinctions when referring to what types of hosts are being secured.

Read More

Cutting Through Endpoint Security Marketing Hype is a Challenge for Buyers and Vendors Alike

Posted: March 18, 2015   /   By: Kyle Prigmore   /   Tags: Information Security, endpoint, endpoint security, IT buyers, IT Spending Intentions, skills shortage, IT purchasing, IT skills, security spending

HandsHoldingLockEndpoint security is a fast-paced, dynamic market right now. The amount of funding, M&A, and general product development is moving at what can feel like a blurring speed, and separating the facts from the marketing language can be a challenge.

For a thought experiment, imagine for a moment you are a CIO/CISO/equivalent in charge of the security budget.  You are a little behind, maybe updating from an AV-only environment to a more advanced endpoint solution. How do you go about selecting a vendor? How do you begin quantifying your organizational needs? 

Read More

Yet Another Proof Point for Network and Endpoint Security Integration

Posted: October 17, 2014   /   By: Jon Oltsik   /   Tags: Information Security, End-User Computing, IT Infrastructure, network, Networking, Information and Risk Management, endpoint, Security and Privacy

As I’ve mentioned many times in my blog, there is a lot of evidence suggesting a trend toward the amalgamation of endpoint and network security.

Here’s another recent data point that supports this further. ESG recently published a new research report titled Network Security Trends in the Era of Cloud and Mobile Computing. The report is based upon a survey of security professionals working at enterprise organizations (i.e., more than 1,000 employees). ESG asked them: “Is your organization engaged in any type of project to integrate anti-malware and analytics technologies on networks and endpoints?” Nearly one-quarter (22%) said, “yes, extensively,” while another 39% responded, “yes, somewhat.”

Read More

Why Doesn't IT Back Up BYOD?!

Posted: September 17, 2014   /   By: Jason Buffington   /   Tags: Backup, Data Protection, JBuff, Information and Risk Management, endpoint, BYOD

ESG recently started offering TechTruths... single nuggets of data and the analyst perspectives of why they matter. Check out all of them via the link above, but here is my favorite so far on BYOD data protection:

Read More

Enterprise Organizations Are Taking Steps to Improve Cybersecurity Analytics

Posted: May 27, 2014   /   By: Jon Oltsik   /   Tags: IBM, Big Data, Cisco, Information and Risk Management, FireEye, Dell, endpoint, Security and Privacy, Security, SIEM, Narus, Mandiant, Cybereason, LogRhythm, 21CT, Leidos, ISC8, Blue Coat, RSA Security, Lancope, netSkope, SDN, click security, Bit9, cybercrime, Carbon Black

Last week, online retail giant eBay announced that it was hacked between February and March of this year with stolen login credentials of an eBay employee. This gave the hackers access to the user records of 145 million users including home addresses, e-mail addresses, dates of birth, and encrypted passwords. It appears that the hackers made copies of this data so eBay is advising all users to change their passwords.

Read More

Endpoint Themes

Posted: March 26, 2014   /   By: Kyle Prigmore   /   Tags: Information Security, Information and Risk Management, endpoint, Security and Privacy, Security, endpoint security

Here are some trends to keep an eye on (in no particular order):

Read More

Businesses Report Significant Use of Desktop Virtualization Technology

Posted: November 12, 2013   /   By: Mark Bowker   /   Tags: Cloud Computing, End-User Computing, Endpoint & Application Virtualization, endpoint, mobile, mobile device, desktop virtualization, migration

Desktop virtualization is an alternative PC delivery model in which applications, operating systems, user data, profiles, and/or entire end-user environments are encapsulated and delivered to or executed on a remote endpoint device. The various desktop virtualization delivery models allow for centralized management, hosting, and/or execution, as well as syncing capabilities that enable local execution on an endpoint device.

Read More

Mobile Device Security Reality

Posted: March 30, 2012   /   By: Jon Oltsik   /   Tags: Information and Risk Management, endpoint, Security and Privacy, BYOD, mobile device, consumerization of IT

You've heard the same things I have: "You can't control mobile device proliferation." "Most large organizations are being forced to create BYOD programs." "You need to let new employees work with their own devices and use social networking sites if you want to recruit them."

Read More

Posts by Topic

see all