Blog Posts Tagged with "Gartner"

888605c6c25c19e41bbbb986ea6d43c1

Another Paradigm Shift - I'm Getting Motion Sickness

July 08, 2013 Added by:Jim Palazzolo

Before you protect the data, find the data. Before you create security controls, find the assets. Before you think about the future, find the blueprints for today. Before you attempt to know others, know yourself first.

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

UP and to the RIGHT: Strategy and Tactics of Analyst Influence

July 23, 2012 Added by:Ben Rothke

If up and to the right is the desired Magic Quadrant location, how does one get there? For many tech firms, they often are clueless. In this book, Stiennon provides clear direction. For those looking to make the expedition to the land of Gartner, this book is a veritable Berlitz Guide on how to make the journey...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Gartner: Top Predictions for 2012 and Beyond

January 02, 2012 Added by:Bill Gerneglia

"Instead of requesting that a third-party security vendor conduct testing on the enterprise's behalf, the enterprise will be satisfied by a cloud provider's certificate stating that a reputable third-party security vendor has already tested its applications."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Chertoff Warns of Threat from Small Hacker Collectives

June 21, 2011 Added by:Headlines

“We can have networks that can cause... existential damage without a nation-state involved. With the confluence of globalization and technology, these groups now have the ability to cause the kind of damage that used to involve national effort. We got a taste of this on 9/11..."

Comments  (1)

7377f47f95a1202ea8d330061b674dea

Gartner Security and Risk Management Summit 2011

June 14, 2011 Added by:Lawrence Pingree

Increases in the complexity and volume of targeted attacks coupled with the necessity for companies to address compliance issues continues to support healthy security market growth. We will be examining the key security issues at the upcoming Gartner Security and Risk Management Summit...

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

On Gartner's SIEM Magic Quadrant 2011

May 29, 2011 Added by:Anton Chuvakin

I think the concept of Magic Quadrant is brilliant. However, many wrong SIEM purchase decisions I’ve seen made usually stem from the decision maker’s own ignorance and not from whatever document or market visualization he has in his possession. Keep this in mind…

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Qualys Receives Highest Rating in Gartner Report

May 04, 2011 Added by:Headlines

Qualys can deliver security and compliance in an integrated solution that easily interfaces with existing security solutions without the significant cost and complexity associated with deploying and maintaining traditional enterprise software...

Comments  (0)

1961d93172f8088a077c52e638e31f41

Gartner Report: Critical Capabilities for SIEM

January 02, 2011 Added by:Heather Howland

This research will help project managers, who are responsible for selecting a security information and event management (SIEM) solution, evaluate products from 12 of the major vendors in the segment...

Comments  (0)

7af56c65866a442699d6dd1dfb02b528

Behavior Based Transaction Verification – More of the Same

November 17, 2010 Added by:Eli Talmor

Gartner continues to recommend fraud detection that monitors user behavior. This method captures and analyzes the user’s Web traffic, including login, navigation and transactions, and can spot abnormal access patterns that indicate an automated program is accessing the application..

Comments  (0)