Identity Management To-Do List Aligns…

My colleague Mark Bowker just completed some comprehensive research on identity and access management (IAM) challenges, plans, and strategies at enterprise organizations. As a cybersecurity professional, I welcome this data. Identity management should be a major component of an enterprise risk management strategy, yet IAM technology decisions are often treated tactically or left to application developers or IT operations staff who don’t always prioritize security in their planning. The ESG data suggest a change in the IAM weather – large organizations seem to be prioritizing security as part of their IAM strategies. ESG asked 273 to identify the initiatives that will be part of their IAM strategies over the next 24 months. The data reveals: To read the complete article, CLICK...

Read More

Enterprise Networks and Telco Clouds on a Collision Course

The Internet of Things will move more processing to telecom suppliers’ facilities. Network engineers have traditionally treated networks managed by their telecom suppliers as outside their immediate domain of concern. The telco network was brought into the data center, appropriate routes or peering set up, and that was it. Enterprise workloads typically don’t run directly on telco networks for many reasons, including governance or compliance requirements. Now, emerging technologies such as the Internet of Things are starting to require workloads to be located within telecom service providers’ facilities. To read the complete article, CLICK...

Read More

…Security Operations Automation before Orchestration

Based upon numerous conversations with CISOs, there is widespread interest in automating and orchestrating security operations. In fact, lots of enterprises are already doing so. According to ESG research, 19% of enterprise organizations have already deployed security operations automation/orchestration technologies “extensively,” while another 39% of enterprises have done so on a limited basis. Now we tend to lump automation and orchestration together, but there are vast differences between the two. In a recent survey on security operations, ESG defined these term as follows: To read the complete article, CLICK...

Read More

Storage…The Impact of CI/HCI…

ESG recently completed in-depth research on the state of the storage market; its own technologies and market trends as well as its key intersections to other notable IT implementations and shifts. We are presenting some of the extended highlights from the findings in multiple ESG Briefs (each focused on a particular topic), as well as tighter summaries of those Briefs in accompanying ESG videos. These will be rolling out over the next few weeks and we’ll capture all the available links in these blogs each time a new piece is posted.    To read the complete article, CLICK...

Read More

How Enterprise Organizations Benefit from SOAPA

I’ve written about SOAPA for almost a year now, here’s a link to the original blog I posted last November. The concept seems to be catching on in the industry. I’ve had lots of industry leaders participate in SOAPA videos with me and there are many more videos in the works. I’m happy to say that SOAPA isn’t just an analyst idea or industry buzzword. In fact, 21% of enterprise organizations say that they are very active in integrating security operations technologies and creating a security operations architecture is one of their highest priorities, while another 50% are somewhat active in this area. Security pros are moving to SOAPA for several reasons: To read the complete article, CLICK...

Read More