SOAPA Services Opportunities Abound

Security operations is changing, driven by a wave of diverse data types, analytics tools, and new operational requirements. These changes are initiating an evolution from monolithic security technologies to a more comprehensive event-driven software architecture (along the lines of SOA 2.0) where disparate security technologies connect via enterprise-class middleware for things like data exchange, message queueing, and risk-driven trigger conditions. ESG refers to this as a Security Operations and Analytics platform architecture or SOAPA.    

When speaking, or writing about SOAPA, I often compare this evolution to an analogous IT trend in the 1990s. Way back then, large organizations abandoned standalone departmental applications in favor of a more integrated software architecture, ERP. This transition resulted in a new generation of business applications acting as a foundation for greater automation, efficiency, and profitability.

Topics: Cybersecurity CISO mssp managed security services SOAPA

Take-aways from RSA

As expected, the 2016 RSA Conference was bigger than ever—more attendees, presentations, exhibitors, etc. Since I live in the cybersecurity space, there were few surprises, but there were a few major highlights to this year’s show.

Topics: Cybersecurity multi-factor authentication managed security services

What's Driving Enterprise Security Strategy?

ESG recently published a new research report titled, Security Management and Operations: Changes on the Horizon. As part of the survey, ESG asked 315 security professionals working at enterprise organizations (i.e., more than 1,000 employees) to identify the most important factors driving their organization’s information security strategy in 2012.

The top two responses were quite predictable: 55% said “protecting sensitive data and intellectual property (IP)” while 50% pointed to regulatory compliance. What is interesting is the responses beyond these two traditional security drivers:

  • 41% said “addressing new types of threats”
  • 39% said “improving/automating security operations”
  • 38% said “addressing security issues created by the use of mobile devices”
  • 35% said “improving our ability to analyze security data and detect attacks in progress”
  • 33% said “aligning security policies and controls with business processes”
Topics: IBM Big Data End-User Computing Information and Risk Management FireEye McAfee Security and Privacy BYOD malware SIEM RSA Invincea Security Management Damballa APT security operations managed security services Countertack