The Race for Mobile Data Security

A. Braunberg
A. Braunberg

Summary Bullets:

  • Regardless of device, data protection is critical.
  • Current product/service choices are diverse to the point of being a bit daunting.

I have blogged a good bit lately about our recent mobility survey data.  One of the takeaways, as I have noted, is that enterprises are resigned to (and perhaps beginning to embrace) the consumerization of IT and the need to provide a degree of choice in mobile device support.  What this tends to mean is that Apple and Android smartphones and tablets are increasingly accessing resources from corporate networks.  However, while enterprise IT/security teams might have lost the battle, they still plan on winning the war; and the war has always really been about data protection. Continue reading “The Race for Mobile Data Security”

Big Blue and Big Security

A. Braunberg
A. Braunberg

Summary Bullets

  • A “Smarter Planet” is not necessarily a safer planet
  • Analytics will become an increasingly important component of security solutions

I spent an interesting couple of days this week at IBM Software’s Connect event. The yearly analyst event brings together IBM’s software brands to talk strategy and trends. This was the first year that IBM invited security analysts to the event: a nod to the formation of a standalone Security Systems division within IBM Software. IBM has had a checkered past in the security markets (most notably with the poorly-executed ISS acquisition), but I came away from the event with the feeling that the company has a strategy in place that realistically addresses IBM’s strengths and weaknesses. Continue reading “Big Blue and Big Security”

Network Equipment Vendors Well Positioned in Mobility Deals

A. Braunberg
A. Braunberg

Summary Bullets

  • Network equipment vendors are well positioned to be preferred providers of enterprise mobility solutions.
  • These vendors should not ignore a place on mobile endpoints, however and should deliver secure connectivity, management and security.

I introduced a few data points from Current Analysis’ recent Mobility Survey in my last mobility blog post post (see “Addressing the Adoption of Tablets and Smartphones in the Enterprise,” October 27, 2011). The takeaway from that post was that enterprises are strongly inclined to purchase tablets and smartphones for employees to use at work and that these organizations want to manage those devices. That data leads to an obvious follow up: what vendors benefit from enterprise purchase of these devices? Continue reading “Network Equipment Vendors Well Positioned in Mobility Deals”

Addressing the Adoption of Tablets and Smartphones in the Enterprise

A. Braunberg
A. Braunberg

Summary Bullets:

  • At a high level, U.S. businesses are taking similar strategic approaches to the introduction of both tablets and smartphones into the enterprise.
  • Not surprisingly, the majority of survey respondents want to buy these devices and manage them.

Current Analysis recently completed a survey of enterprises in the U.S. to determine strategic direction for the adoption of tablets and smartphones in enterprise networks. While it is often assumed that enterprises will approach the adoption of tablets and smartphones differently (with tablets treated as simple laptop replacements), our research suggests this is not the case. Continue reading “Addressing the Adoption of Tablets and Smartphones in the Enterprise”

Intel’s Hardware-Assisted Security

A. Braunberg
A. Braunberg

Summary Bullets:

  • ‘Hardware-assisted security’ is Intel’s preferred phrase to describe how security features in its silicon can be used to deliver additional functionality to new or enhanced software-based threat protection products.
  • McAfee has been working hard to make Intel’s vision a reality, first with last month’s DeepSAFE announcement and then this week with the first look at Deep Defender and Deep Commander.

Last month, Intel and McAfee made a bit of a stir with their announcement of DeepSAFE technology that provides a foundational element for McAfee software to leverage security features in Intel silicon.  DeepSAFE is important to Intel, because it helps to justify the McAfee acquisition.  It got the market’s attention, because the technology was described repeatedly as “game-changing.”  Well, fast forward to this week and Intel/McAfee have released the first products that build on the DeepSAFE technology: Deep Defender and Deep Control.  Deep Defender monitors system activity (i.e., CPU and memory) to detect and block rootkits.  Deep Control is a plug-in for McAfee’s ePO management system that leverages Intel’s Active Management Technology to allow some very cool remote management and update capabilities on devices running Intel Core i5 vPro and Core i7 vPro processors.

Continue reading “Intel’s Hardware-Assisted Security”

Context is King

A. Braunberg
A. Braunberg

Summary Bullets:

  • Security is a data management problem and context is metadata
  • Context drives better policy management and better policies drive better risk management

Context is a word you hear an awful lot these days when talking to security vendors. Everything it seems needs to be put into context, and by that security vendors typically mean that knowing the who, what, when, where and why of network traffic is very useful in determining the “legitimacy” of that traffic. It’s kind of like when firewalls became stateful, the realization that it’s better not to look at each packet in a complete vacuum. Context is the back story, if you will, of each packet traversing a network. Viewed from a data perspective, context is metadata.

Continue reading “Context is King”