Featured Content ESG Cybersecurity

img6.png

[ESG/ISSA Research Report] Through the Eyes of Cyber Security Professionals: An Annual Research Report (Part 2)

Today’s cyber security professionals reside on the frontline of a perpetual battle, tasked with applying limited resources to outthink would be cyber-attackers and defend their organizations against everything from embarrassing website defacement through unseemly ransomware extortion to devastating data breaches.

img6.png

[ESG/ISSA Research Report] Through the Eyes of Cyber Security Professionals: An Annual Research Report (Part 2)

Today’s cyber security professionals reside on the frontline of a perpetual battle, tasked with applying limited resources to outthink would be cyber-attackers and defend their organizations against everything from embarrassing website defacement through unseemly ransomware extortion to devastating data breaches.

img1.png

[ESG/ISSA Research Report] The State of Cyber Security Professional Careers: An Annual Research Report (Part 1)

In order to assess the experiences, careers, and opinions of cyber security professionals, ESG and ISSA surveyed 437 cyber security professionals representing organizations of all sizes and across all industries and geographic locations. Survey respondents were also ISSA members.

img1.png

[ESG/ISSA Research Report] The State of Cyber Security Professional Careers: An Annual Research Report (Part 1)

In order to assess the experiences, careers, and opinions of cyber security professionals, ESG and ISSA surveyed 437 cyber security professionals representing organizations of all sizes and across all industries and geographic locations. Survey respondents were also ISSA members.

img2.png

[ESG Research Report] A Cybersecurity Perspective on Identity and Access Management

In order to explore identity and access management security practices and challenges further, ESG surveyed 335 IT and information security professionals representing enterprise-class (1,000 employees or more) organizations in North America.

img2.png

[ESG Research Report] A Cybersecurity Perspective on Identity and Access Management

In order to explore identity and access management security practices and challenges further, ESG surveyed 335 IT and information security professionals representing enterprise-class (1,000 employees or more) organizations in North America.

img3.png

[ESG Research Report] The Visibility and Control Requirements of Cloud Application Security

ESG’s cloud security research was designed to gain insights into the awareness of, requirements for, and future plans with regard to cloud security. Participating organizations were required to be using cloud services in production, with individual respondents responsible for or highly familiar with their company’s cloud security requirements, challenges, and subsequent plans. Survey participants represented a wide range of industries including manufacturing, financial services, health care, communications and media, retail, government, and business services. For more details, please see the Research Methodology and Respondent Demographics sections of this report.

img3.png

[ESG Research Report] The Visibility and Control Requirements of Cloud Application Security

ESG’s cloud security research was designed to gain insights into the awareness of, requirements for, and future plans with regard to cloud security. Participating organizations were required to be using cloud services in production, with individual respondents responsible for or highly familiar with their company’s cloud security requirements, challenges, and subsequent plans. Survey participants represented a wide range of industries including manufacturing, financial services, health care, communications and media, retail, government, and business services. For more details, please see the Research Methodology and Respondent Demographics sections of this report.

img4.png

[ESG Lab Review] Threat Stack Cloud Security Platform

This ESG Lab Review examines the Threat Stack Cloud Security Platform. The report validates Threat Stack’s ability to provide cloud-native security monitoring to defend against internal and external threats and data loss while enabling organizations to automate compliance and enhance operational efficiency, all in real time.

img4.png

[ESG Lab Review] Threat Stack Cloud Security Platform

This ESG Lab Review examines the Threat Stack Cloud Security Platform. The report validates Threat Stack’s ability to provide cloud-native security monitoring to defend against internal and external threats and data loss while enabling organizations to automate compliance and enhance operational efficiency, all in real time.

Expectations for RSA 2017

 

Some of our clients: