ESG/ISSA Research Report: The Life and Times of Cybersecurity Professionals

Abstract:

In order to assess the experiences, careers, and opinions of cybersecurity professionals, ESG/ISSA surveyed 343 cybersecurity professionals representing organizations of all sizes, across all industries and geographic locations. Survey respondents were also ISSA members.

Survey participants represented a wide range of industries including health care, IT, financial services, manufacturing, business services, communications and media, and government.

Topics: Cybersecurity ISSA

ESG Master Survey Results: The Evolution of Endpoint Security Controls and Suites

Abstract:

ESG’s Master Survey Results provide the complete output of syndicated research surveys in graphical format. In addition to the data, these documents provide background information on the survey, including respondent profiles at an individual and organizational level. It is important to note that these documents do not contain analysis of the data.

This Master Survey Results presentation focuses on the endpoint security operations landscape, including current approaches, challenges, and planned strategies.

Topics: Cybersecurity

ESG Brief: The Role of Endpoint Detection and Response in Improving Endpoint Security Posture

Abstract:

As cyberthreats increase in frequency and complexity, it becomes more of a strategic imperative for businesses to strengthen their endpoint security postures. Many organizations do so by supplementing traditional antivirus (AV) products with layered preventative and endpoint detection and response (EDR) controls. The desired outcomes of employing additional controls are to improve both threat detection efficacy and the operational efficiency of managing endpoint security solutions and responding to incidents. To realize greater efficiencies, many organizations are adopting endpoint security-as-a-service (SECaaS) and managed endpoint security services to mitigate threats and close the cybersecurity talent gap.

Topics: Cybersecurity Security

ESG Research Report: Cybersecurity Analytics and Operations in Transition

ABSTRACT

Given an increasing focus on security analytics and operations, ESG initiated a primary research project in early 2017 to assess the state of the market. In pursuit of this goal, ESG surveyed 412 IT and information security professionals representing large mid-market (500 to 999 employees) and enterprise-class (1,000 employees or more) organizations in North America and Western Europe. Respondents surveyed for this project had intimate knowledge and direct involvement in their organizations’ security analytics and operations people, processes, and technologies.

Download the complimentary abstract.
Topics: Cybersecurity SOAPA

ESG Brief: The Challenge of Delivering Secure Workspaces

Abstract:

The central role of the endpoint in cybersecurity attack chains and the spate of ransomware attacks has created a strategic imperative to secure these devices and the users who operate them. Knowledge worker mobility and bring-your-own-device (BYOD) policies have further complicated endpoint security with virtual workspaces being employed as a location- and device-agnostic secure desktop environment. But in the push and pull of knowledge worker experience and securing their access to and use of corporate assets, which wins out?

Topics: Cybersecurity Enterprise Mobility

ESG Research Report: The Shifting Cybersecurity Landscape

Abstract:

The cybersecurity industry is populated with a plethora of vendors offering discrete solutions representing a fragmented market, historically absent of dominant leaders. The influx of venture capital funding, and, more recently, the participation of private equity firms, have contributed to a growing number of players vying for buyer mindshare and budget. However, notable M&A activity, including Symantec’s acquisition of BlueCoat, and the TPG Capital-led spinout of Intel Security, coupled with anecdotal customer feedback about point tool fatigue, indicate the cybersecurity market is at a tipping point, one that could lead to centers of power, vendor-centric ecosystems, and the emergence of a small group of enterprise-class cybersecurity vendors. These dynamics were the impetus for ESG to conduct research on both the rise of enterprise-class cybersecurity vendors and the requirements of enterprise-ready cybersecurity platforms.

Topics: Cybersecurity

ESG Research Report: 2017 IT Spending Intentions Survey

Abstract:

In order to assess IT spending priorities over the next 12-18 months, ESG recently surveyed 641 IT professionals representing midmarket (100 to 999 employees) and enterprise-class (1,000 employees or more) organizations in North America and Western Europe. All respondents were personally responsible for or familiar with their organizations’ 2016 IT spending as well as their 2017 IT budget and spending plans at either an entire organization level or at a business unit/division/branch level.

Topics: Storage Cybersecurity Data Management & Analytics Data Protection Networking IT Spending Intentions Converged Infrastructure Enterprise Mobility Systems Management Cloud Platforms & Services

ESG Brief: 2017 Cybersecurity Spending Trends

Abstract:

IT spending for cybersecurity products and services continues to accelerate in 2017 as business and IT executives grapple with the dangerous threat landscape, compounded by the increasing use of cloud services that expand the attack surface area. Nevertheless, the fact that cybersecurity is once again a top business priority clearly indicates that organizations intend to spend to protect themselves from risk and compromise.

Topics: Cybersecurity

ESG Brief: Login VSI: Mitigating VDI Performance Issues and Enhancing Productivity with Login PI

Abstract:

Being able to look into an organization’s VDI environment in real time can be challenging at best for IT. Without the right type of solution to monitor and manage virtualized environments, user productivity can be compromised due to unforeseen performance and reliability challenges, which can negatively impact the quality of experience. Login VSI’s recent improvements to its workspace management solution, Login PI, are giving organizations across industries an opportunity to mitigate potential issues before they can impact user productivity, resulting in an increase in IT’s ability to achieve and scale VDI implementations with a high degree of confidence.

Topics: Cybersecurity Endpoint & Application Virtualization Private Cloud Infrastructure Networking Enterprise Mobility

ESG/ISSA Research Report: Through the Eyes of Cyber Security Professionals: Annual Research Report (Part II)

Abstract:

Today’s cyber security professionals reside on the frontline of a perpetual battle, tasked with applying limited resources to outthink would be cyber-attackers and defend their organizations against everything from embarrassing website defacement through unseemly ransomware extortion to devastating data breaches. Alarmingly, cyber security professionals often accept this challenge knowing they are undermanned for the fight. According to ESG research, 46% of organizations claim to have a problematic shortage of cyber security skills.

Topics: Cybersecurity