Cybersecurity, Mobility, and the Expanding Perimeter

As businesses lose control of devices and rapidly adopt cloud consumption models, identity and data have become the new perimeter for IT operations and information security teams to secure and protect. My colleague Jon Oltsik and I sit down together to highlight how mobility, identity, and security are creating technology challenges, organizational barriers, and business risks as the security perimeter expands at a faster pace than business can keep up with. The discussion sparks attention towards the IT vendors that are attempting to enhance security postures from within a silo as opposed to the new purview business are dealing with today. To read the complete article, CLICK...

Read More

Identity Management To-Do List Aligns…

My colleague Mark Bowker just completed some comprehensive research on identity and access management (IAM) challenges, plans, and strategies at enterprise organizations. As a cybersecurity professional, I welcome this data. Identity management should be a major component of an enterprise risk management strategy, yet IAM technology decisions are often treated tactically or left to application developers or IT operations staff who don’t always prioritize security in their planning. The ESG data suggest a change in the IAM weather – large organizations seem to be prioritizing security as part of their IAM strategies. ESG asked 273 to identify the initiatives that will be part of their IAM strategies over the next 24 months. The data reveals: To read the complete article, CLICK...

Read More

…Compuware Introduces Topaz on AWS…

If you asked me three years ago what I thought of Compuware, I would have described it as “a point product company in managed decline.” At the time, Compuware was bifurcated between mainframe point solutions and application performance management software. Sales had softened; it was slow to release new products; and its portfolio was “stagnant.” In short, the company was struggling. But, in late 2014, everything changed for Compuware with a cash investment infusion; the hiring of a new, more focused management team; major changes in company culture (including a stronger emphasis on innovation); and the introduction of a new strategy with a strong focus on Development/Operations or DevOps, build/deploy; data management and cybersecurity. Accordingly, I wrote a report at the end of 2015 that described the new Compuware. Nearly two years later, I see Compuware as a company focused on making it easy for customers to consume its product offerings – while at the same time being optimized to create new products and services. Its two most recent announcements include expanded Topaz on AWS (Amazon Web Services) solutions support for CloudBees Jenkins Enterprise. To read the complete article, CLICK HERE NOTE: This column was originally published in the Pund-IT...

Read More

…Security Operations Automation before Orchestration

Based upon numerous conversations with CISOs, there is widespread interest in automating and orchestrating security operations. In fact, lots of enterprises are already doing so. According to ESG research, 19% of enterprise organizations have already deployed security operations automation/orchestration technologies “extensively,” while another 39% of enterprises have done so on a limited basis. Now we tend to lump automation and orchestration together, but there are vast differences between the two. In a recent survey on security operations, ESG defined these term as follows: To read the complete article, CLICK...

Read More

What’s Holding Back Enterprise Security…

Last week, I wrote a blog about the rapid cycle of innovation happening with security technologies today – I’ve never experienced a time when every element of the security stack is transforming. New security technologies are arriving at an opportune time. According to ESG research, 69% have increased their cybersecurity budgets in 2017 and my guess is that they will continue to increase investment in 2018. And when asked which BUSINESS initiatives will drive the most IT spending, 39% of organizations responded, “increasing cybersecurity protection.” This means that business executives are buying into the need for cybersecurity improvements all around. So, it seems like transformative security technologies are arriving at the right place and time, right? Not so fast. Many of the technology changes I wrote about last week remain in their genesis stage and haven’t been deployed yet for several reasons including: To read the complete article, CLICK...

Read More