The New Endpoint Security Market…

Venture capital investments in cybersecurity companies are aggressive these days but yesterday’s news was startling nonetheless. First, Cylance announced a round of $120 million led by Blackstone Tactical Opportunities. Cylance says that the funding will help it expand sales and marketing initiatives and extend its global footprint. Not to be outdone, Cylance archenemy CrowdStrike announced a round of $200m, led by General Atlantic...

Read More
CA’s BTCS2.1: Where Do We GrOw From Here?
Jun14

CA’s BTCS2.1: Where Do We GrOw From Here?

At last week’s second annual Built to Change Summit CA Technologies updated analysts and journalists on where it and the markets it’s pursuing — primarily DevSecOps, with a heaping helping of mainframe — are, where they’re going, and how the software toolmaker will grab a bigger slice of the rapidly growing digital transformation (DT) pie, which is being largely driven by software, and more specifically, applications....

Read More

Cisco Security Synopsis from CiscoLive

Cisco held its annual customer event this week in Orlando FLA and invited the industry analysts to attend. CEO Chuck Robbins highlighted the company’s commitment to security in his CiscoLive keynote while other executives elaborated on more security product and services details. After a few days of meetings, I believe Cisco’s cybersecurity strategy focuses on: Product integration. Cisco wants a common cybersecurity product...

Read More

Talking Cloud Cybersecurity…

In this discussion, part of ESG’s ongoing 360 Video Series, Doug Cahill talks about not just the intricacies of cloud security – both of applications for Saas models and of infrastructure for IaaS – but also the opportunities that doing cloud security well can afford a business. It’s not simply a matter of ever more “padlocks on doors” but rather is a matter of making cloud security part of an integrated process; this is...

Read More

…Network Security Policy Management for Hybrid Clouds

As organizations embraced the public cloud over the past few years, security teams were on the hook to modify network security policies and implement security controls to protect cloud-based workloads. The goal was simple: Protect cloud-based workloads with network security polices and controls that were equal to or better than existing safeguards for physical and virtual servers in corporate data centers. This turned out to be far...

Read More