Lots of market upside, budget dollars – and yes, competition.
New tools must improve technology and employee accuracy and efficiency.
Security groups point to cybersecurity training, software patching, and system hardening.
CISOs should think about privacy, culture, and third-party relationships.
Integration, analytics, services, identity, and "C-level" messages....
Enterprises want choices, integration, and specific types of data feeds. Will vendors acquiesce?
Vendors need better understanding and empathy about CISOs, security professionals, and business objectives.
Device introduction marks the intersection between biometrics commodification and consumerization.
CISOs need tighter control and improved security intelligence/analytics.
Combination of carrots, sticks, investment, and education.
Critical infrastructure organizations most vocal about the need for federal cybersecurity help
Strengths: Integration, architecture, and end-to-end coverage. Weakness: Market visibility.
Vendors must focus in these areas to help enterprise organizations with security efficacy and operational efficiency.
Architecture aligns detection with prevention and remediation to streamline security operations.
Packet and meta data capture analysis is helping large organizations accelerate malware detection and remediation.
Collaborative community adds value to Splunk software and tools.
Lack of knowledge leads to ineffective malware defenses and lengthy detection timeframes.
Q&A is meant to cut through vendor spin and help users understand and benefit from big data security analytics.
IT scale and sophisticated malware make insider attacks more difficult to prevent and detect.
DHS/Mitre standards could help users and security technology vendors benefit from an avalanche of security intelligence.