Featured Content from Jon Oltsik

ESG Research Report

[ESG TechTruth] Organizations are Offloading Endpoint Security to Managed Security Service Providers

Citing potential benefits like improved incident detection and response, as well as cost reduction, more than half of enterprise organizations are already using a managed security service in some capacity to protect their endpoints.

ESG Research Report

[ESG TechTruth] Organizations are Offloading Endpoint Security to Managed Security Service Providers

Citing potential benefits like improved incident detection and response, as well as cost reduction, more than half of enterprise organizations are already using a managed security service in some capacity to protect their endpoints.

ESG Brief

[ESG Infographic] Protecting Your Network

Information security is often described as a constantly accelerating treadmill: Cyber adversaries advance their attack methods and security vendors ramp up their countermeasures. In the meantime, security professionals are expected to keep up with developments on both sides and understand the ramifications of these changes for their organization’s information security policies, procedures, and controls.

ESG Brief

[ESG Infographic] Protecting Your Network

Information security is often described as a constantly accelerating treadmill: Cyber adversaries advance their attack methods and security vendors ramp up their countermeasures. In the meantime, security professionals are expected to keep up with developments on both sides and understand the ramifications of these changes for their organization’s information security policies, procedures, and controls.

ESG Infographic

[ESG Brief] Year of the Information Security Tipping Point?

A majority of organizations plan to increase information security spending this year—especially in industries such as retail, transportation/logistics, manufacturing, and communications & media.

ESG Infographic

[ESG Brief] Year of the Information Security Tipping Point?

A majority of organizations plan to increase information security spending this year—especially in industries such as retail, transportation/logistics, manufacturing, and communications & media.

ESG TechTruth

[ESG Research Report] The Endpoint Security Paradox

In order to accurately assess organizations’ endpoint security technologies, policies, and processes, ESG surveyed 340 IT and information security professionals representing large midmarket (500 to 999 employees) and enterprise-class (1,000 employees or more) organizations in North America. All respondents were responsible for evaluating, purchasing, and managing endpoint security technology products and services.

ESG TechTruth

[ESG Research Report] The Endpoint Security Paradox

In order to accurately assess organizations’ endpoint security technologies, policies, and processes, ESG surveyed 340 IT and information security professionals representing large midmarket (500 to 999 employees) and enterprise-class (1,000 employees or more) organizations in North America. All respondents were responsible for evaluating, purchasing, and managing endpoint security technology products and services.

2016 Predictions for Cybersecurity

networksasia.png

“IoT introduces an avalanche of new devices, network traffic, and protocols to the mix,” writes Jon Oltsik, senior principal analyst at The Enterprise Strategy Group. “The security team will need the right skills and tools to identify IoT devices, secure IoT data and traffic, and recognize the difference between legitimate and suspicious communications.”

Read the entire article at Networks Asia

Some of our clients: