McAfee’s Vision at MPower

I wrapped up my 3-week tour of the cybersecurity industry with a stop in Las Vegas for McAfee MPower. Here are a few of my takeaways from the event: McAfee now positions itself as, “the device to cloud security company.” What this really means is that McAfee will focus on the security of endpoints, cloud assets (i.e., IaaS, PaaS, and SaaS), and the security services that connect the two together (i.e., DLP, CASB, proxy services,...

Read More

The True Value of SaaS and Managed Service Offerings

SaaS companies carry huge valuations when compared with traditional licensed software companies. It took me forever to figure out why, but I did. At first blush, one might believe that Wall Street values subscription revenue over one-time revenue—and truth be told, they do. Why? Because it’s a hell of a lot more predictable revenue stream for a company to manage than ad hoc revenue. I get that, but the gap is still too big for what,...

Read More

DTW18 & Connecting The DoTs (Part 3 of 3)

LAS VEGAS: Of all the leading IT vendors, Dell has done the best job of ‘keeping it simple’, and ruthlessly embracing that mantra in everything it does, and the product launches at last week’s Dell Technologies World 2018 were no exception. Given its major brands — Dell, Dell EMC, Pivotal, RSA, SecureWorks, Virtustream, and VMware — and leadership in 22 product categories, the opportunity was there to release a flood of...

Read More

CA: Connecting the DoTs

To help address the emerging multi-trillion-dollar app-driven digital transformation business phenomenon, CA Technologies made more than 20 new and enhanced product announcements at CA World ‘17. That might seem like a lot, but not when you consider that even after decades of consolidating and rationalizing its software portfolio, the ISV still lists 192 separate products on its website (courtesy of the approximately 70 companies...

Read More

Time to Embrace a Security Management Plane in the Cloud

There’s an old saying that change is the enemy of security. To avoid disruptive changes, many cybersecurity professionals strive for tight control of their environment and this control extends to the management of security technologies. Experienced cybersecurity professionals often opt to install management servers and software on their networks so that management and staff “owns” their technologies and can control everything they...

Read More