As Research Director for the Business Technology and Software group at Current Analysis, Andrew manages the Enterprise Security, Data Center Infrastructure, and Enterprise Network Systems coverage. As the lead analyst for Enterprise Security coverage, he focuses on the market and technology dynamics that are transforming the industry, including virtualization, mobility, the consumerization of IT, embedding of security into the broader IT fabric, and a shift to data centric security.
Regardless of device, data protection is critical.
Current product/service choices are diverse to the point of being a bit daunting.
I have blogged a good bit lately about our recent mobility survey data. One of the takeaways, as I have noted, is that enterprises are resigned to (and perhaps beginning to embrace) the consumerization of IT and the need to provide a degree of choice in mobile device support. What this tends to mean is that Apple and Android smartphones and tablets are increasingly accessing resources from corporate networks. However, while enterprise IT/security teams might have lost the battle, they still plan on winning the war; and the war has always really been about data protection. Continue reading “The Race for Mobile Data Security”→
A “Smarter Planet” is not necessarily a safer planet
Analytics will become an increasingly important component of security solutions
I spent an interesting couple of days this week at IBM Software’s Connect event. The yearly analyst event brings together IBM’s software brands to talk strategy and trends. This was the first year that IBM invited security analysts to the event: a nod to the formation of a standalone Security Systems division within IBM Software. IBM has had a checkered past in the security markets (most notably with the poorly-executed ISS acquisition), but I came away from the event with the feeling that the company has a strategy in place that realistically addresses IBM’s strengths and weaknesses. Continue reading “Big Blue and Big Security”→
At a high level, U.S. businesses are taking similar strategic approaches to the introduction of both tablets and smartphones into the enterprise.
Not surprisingly, the majority of survey respondents want to buy these devices and manage them.
Current Analysis recently completed a survey of enterprises in the U.S. to determine strategic direction for the adoption of tablets and smartphones in enterprise networks. While it is often assumed that enterprises will approach the adoption of tablets and smartphones differently (with tablets treated as simple laptop replacements), our research suggests this is not the case. Continue reading “Addressing the Adoption of Tablets and Smartphones in the Enterprise”→
‘Hardware-assisted security’ is Intel’s preferred phrase to describe how security features in its silicon can be used to deliver additional functionality to new or enhanced software-based threat protection products.
McAfee has been working hard to make Intel’s vision a reality, first with last month’s DeepSAFE announcement and then this week with the first look at Deep Defender and Deep Commander.
Last month, Intel and McAfee made a bit of a stir with their announcement of DeepSAFE technology that provides a foundational element for McAfee software to leverage security features in Intel silicon. DeepSAFE is important to Intel, because it helps to justify the McAfee acquisition. It got the market’s attention, because the technology was described repeatedly as “game-changing.” Well, fast forward to this week and Intel/McAfee have released the first products that build on the DeepSAFE technology: Deep Defender and Deep Control. Deep Defender monitors system activity (i.e., CPU and memory) to detect and block rootkits. Deep Control is a plug-in for McAfee’s ePO management system that leverages Intel’s Active Management Technology to allow some very cool remote management and update capabilities on devices running Intel Core i5 vPro and Core i7 vPro processors.
Context is a word you hear an awful lot these days when talking to security vendors. Everything it seems needs to be put into context, and by that security vendors typically mean that knowing the who, what, when, where and why of network traffic is very useful in determining the “legitimacy” of that traffic. It’s kind of like when firewalls became stateful, the realization that it’s better not to look at each packet in a complete vacuum. Context is the back story, if you will, of each packet traversing a network. Viewed from a data perspective, context is metadata.