Featured Content from Doug Cahill

img4.png

[ESG Research Report] The Visibility and Control Requirements of Cloud Application Security

ESG’s cloud security research was designed to gain insights into the awareness of, requirements for, and future plans with regard to cloud security. Participating organizations were required to be using cloud services in production, with individual respondents responsible for or highly familiar with their company’s cloud security requirements, challenges, and subsequent plans. Survey participants represented a wide range of industries including manufacturing, financial services, health care, communications and media, retail, government, and business services. For more details, please see the Research Methodology and Respondent Demographics sections of this report.

img4.png

[ESG Research Report] The Visibility and Control Requirements of Cloud Application Security

ESG’s cloud security research was designed to gain insights into the awareness of, requirements for, and future plans with regard to cloud security. Participating organizations were required to be using cloud services in production, with individual respondents responsible for or highly familiar with their company’s cloud security requirements, challenges, and subsequent plans. Survey participants represented a wide range of industries including manufacturing, financial services, health care, communications and media, retail, government, and business services. For more details, please see the Research Methodology and Respondent Demographics sections of this report.

135903506.jpg

[ESG Blog] The Case for a Security Operations and Analytics Platform Architecture (SOAPA) - Includes Video

Improving threat detection efficacy and the operational efficiency of doing so has been at odds due to a number of factors including how the adoption of cloud services and worker mobility has expanded the attack surface area, the acute shortage of cybersecurity skills, and the proclivity to employ a series of disparate, disintegrated point tools...

135903506.jpg

[ESG Blog] The Case for a Security Operations and Analytics Platform Architecture (SOAPA) - Includes Video

Improving threat detection efficacy and the operational efficiency of doing so has been at odds due to a number of factors including how the adoption of cloud services and worker mobility has expanded the attack surface area, the acute shortage of cybersecurity skills, and the proclivity to employ a series of disparate, disintegrated point tools...

img2.png

[ESG Brief] The Importance of Securing Cloud Application Data

The broad adoption of cloud applications, often driven by a line of business outside of the visibility and control of corporate IT, provides organizations with compelling business agility, but also puts corporate data assets at risk. Organizations need purposeful security controls that embrace and enable the use of such cloud apps while also securing cloud-resident data with a rich data loss prevention (DLP) policy lexicon.

img2.png

[ESG Brief] The Importance of Securing Cloud Application Data

The broad adoption of cloud applications, often driven by a line of business outside of the visibility and control of corporate IT, provides organizations with compelling business agility, but also puts corporate data assets at risk. Organizations need purposeful security controls that embrace and enable the use of such cloud apps while also securing cloud-resident data with a rich data loss prevention (DLP) policy lexicon.

Cybersecurity Will Be Front and Center for AWS reInvent

 
dark-reading.jpg

“Organizations today are finding that traditional approaches are failing to keep pace with the rapidly evolving threat landscape, putting intellectual property and other data assets at risk..."

Read the entire article at Dark Reading

Some of our clients: