Category Archives: Security

Software Fueling Dell’s Transformation to Solutions Provider; Interview with Dell Software’s General Manager, Data Protection, Brett Roscoe, Part VI

By | Big Data, Cloud, Data Center Management, Data Protection, Database, DCIG Sponsored Analysis, Security | No Comments

Think “Dell” and you may think “PCs,” “servers,” or, even more broadly, “computer hardware.” If so, you are missing out on one of the biggest transformations going on among technology providers today as, over the last 5+ years, Dell has acquired multiple software companies and is using that intellectual property (IP) to drive its internal turnaround. In this sixth installment of my interview series with Brett Roscoe, General Manager, Data Protection for Dell Software, we discuss how these software acquisitions are fueling Dell’s transformation from a hardware provider into becoming a solutions provider.

Read More

DCIG 2014-15 Security Information and Event Management (SIEM) Appliance Buyer’s Guide Now Available

By | Buyer's Guides, Governance Risk and Compliance, Information Classification, Information Governance, Litigation Readiness, Security, SIEM, Threat Assessment | No Comments

DCIG is pleased to announce the availability of its DCIG 2014-15 Security Information and Event Management (SIEM) Appliance Buyer’s Guide. In this Buyer’s Guide, DCIG weights, scores and ranks 29 SIEM appliances respectively from nine (9) different providers. Like all previous DCIG Buyer’s Guides, this Buyer’s Guide provides the critical information that all size organizations need when selecting a SIEM appliance to help provide visibility into their security posture by providing usable and actionable information.

Read More

2014 Mobile Data Management Buyer’s Guide Now Available

By | DCIG, Electronic Discovery, Encryption, Governance Risk and Compliance, Information Classification, Information Governance, Information Management, Key Management, Security, Threat Assessment | No Comments

DCIG is pleased to announce the release of its 2014 Mobile Data Management (MDM) Buyer’s Guide that weight, score and rank over 100 features. Like previous Buyer’s Guides, this Buyer’s Guide provides the critical information that organizations need when selecting Mobile Data Management software to help meet the security, compliance and Bring-Your-Own-Device (BYOD) challenges in an ever increasing mobile enterprises.

Read More

New Solutions to Antivirus are Pushing Defense-in-Depth to the Network Edge

By | DCIG, Security, Threat Assessment | No Comments

Security-in-depth is rarely discussed without including desktop antivirus with antivirus software being a cornerstone of corporate network protection since the advent of the computer virus. The danger that antivirus software presents is that within most organizations it presents the last line of defense so any threat capable of breaching this defense has the ability to wreak havoc within the enterprise.

Read More

Threat Detection is the Next Frontier in Data Security: Final Thoughts from Symantec Vision 2013

By | DCIG, Security, Threat Assessment | No Comments

In the last few years security has shifted from being an issue that organizations only deal with when a crisis occurs to one with which they must now daily confront. This is putting pressure on organizations to stop taking a knee jerk reaction as their means of ongoing security management and instead adopt a systematic approach to effectively deal with both external and internal threats. The problems that internal threats present and why they are so difficult to detect were openly discussed this past Wednesday morning during that morning’s keynote at Symantec Vision 2013.

Read More

BYOD and MDM Drive Need for a New Buyer’s Guide

By | DCIG, Encryption, Security | No Comments

Information Technology Divisions (I.T.) traditionally does not deal with securing a device that has not been issued and controlled by them. Bring Your Own Device (BYOD) has exploded across industries. Rapid adoption of iPhone and Android devices displaced Blackberry Enterprise Server (BES) in the mobile enterprise email space. Adoption of new devices drives the need for Mobile Device Data Management software to assert control.

Read More

Locking Down the Enterprise Cloud while Keeping It Simple and Easy to Use; Interview with GroupLogic, Part II

By | Application Delivery, DCIG, Governance Risk and Compliance, Information Governance, Information Management, SaaS, Security | No Comments

In part 2, we continue our discussion with GroupLogic’s Anders Lofgren, Vice President of Marketing and Product Management, by exploring licensing options and how the enterprise mobility space has opened up a new market for the company. As well, we dig deeper into activEcho and learn how it is designed to provide flexible and secure file-sync-and-sharing in the enterprise IT organization while being as simple and easy to use as one of the most popular–but unsecure–consumer grade file-sync-and-share cloud services today.

Read More

GroupLogic Cash Flow Positive Prior to Release of activEcho for File-Sync-and-Share

By | Application Delivery, Governance Risk and Compliance, Information Classification, Information Management, Security, Uncategorized | No Comments

Earlier this year, DCIG interviewed the executive team at GroupLogic. GroupLogic shared with us how they approach the market for “enterprise file sharing” or what DCIG has been calling File-Sync-and-Share. In addition, we had the privilege of talking to Chris Broderick, CEO of GroupLogic who covered some of the company’s history.

Read More

The Coming Identity Based Network Management Revolution; Interview with Blackridge Technology CTO John Hayes, Part III

By | DCIG, Security, Threat Assessment | No Comments

Since the advent of the TCP/IP protocol, network administrators have had a major blind spot: the ability to reliably determine the identity of an individual device or user. BlackRidge’s new Eclipse™ solution, built on BlackRidge’s patented Transport Access Control (TAC), uses client drivers or gateway appliances to insert unique identity information to every TCP packet. In this third and final post in our blog interview series, BlackRidge Technology CTO John Hayes and I discuss where BlackRidge is heading and the challenge of managing infrastructures from the perspective of devices rather than networks.

Read More

Symantec Vision 2012 Exposes Attendees to the Real Threat of Today’s Constant Barrage of Attacks

By | DCIG, Information Management, Security, Threat Assessment | No Comments

The keynote given by Symantec’s CEO Enrique Salem this past Tuesday and the series of presentations that followed exposed every attendee at Symantec Vision 2012 to just how dangerous today’s internet world really has become. Yet the larger threat that every business faces is not putting in place a solution to address them. Rather it is the danger that dealing with these threats will cause organizations to take their eyes off of the ball and fail to focus on where their business needs to go next.

Read More

The Three Practical Use Cases for Network Layer Identification; Interview with BlackRidge Technology CTO John Hayes Part I

By | DCIG, Security, Threat Assessment | No Comments

Followers of my previous blog entries should recognize the next company in DCIG’s Executive Interview series. I have previously discussed both the technical and operational impact of BlackRidge Technology’s patented breakthrough technology known as Transport Access Control (TAC). Today, BlackRidge announces their first product, Eclipse, based on their TAC technology. I begin a discussion of this release, in the form of a multi-part interview series, with BlackRidge Technology’s CTO John Hayes.

Read More

Amazon Fixes Dropbox Enterprise Gap; File Share and Synch Takes Off

By | Big Data, DCIG, Security, STaaS | 4 Comments

Amazon announced their Storage Gateway (beta) on January 25th, about two days before my article on VMWare and Citrix squaring off in the “Dropbox for Enteprise” market. In my article I noted that VMWare and Citrix are exploiting a based limitation of Dropbox, Evernote and Box introduced by supporting a Consumerization of IT (CoIT) product. Consumer-based file-share-and-synch applications cannot be installed in a company’s data center. As file-share-synch drives cloud adoption in the enterprise, vendors emerge from all corners.

Read More

Payload and Event Reporting by MetaFlows CEO Livio Ricciulli, Part III

By | DCIG, SaaS, Security, Threat Assessment | No Comments

MetaFlows is a network security monitoring tool implementing some unique capabilities in today’s ever-changing security environment. They are allowing security administrators access to not only aggregated threat information for their own network, but are also alerting them to potential global threats in their enterprise spaces. I am finishing up my interview today with MetaFlows CEO Livio Ricciulli, looking at how they are able to aggregate threat information while maintaining security in a cloud-based solution.

Read More

Network Security Performance Tuning by MetaFlows CEO Livio Ricciulli, Part II

By | Big Data, DCIG, SaaS, Security, Threat Assessment | No Comments

Network security monitoring is a constantly changing environment of both tools and methodologies. Most of them today, however, have used a lone “cowboy” mentality where datacenter solutions operate independently. MetaFlows is changing that. Today, I am continuing my interview with MetaFlows CEO Livio Ricciulli, discussing how their product is optimizing network security monitoring and performance.

Read More

Network Security Monitoring delivered through a “Software as a Service” Model by MetaFlows CEO Livio Ricciulli, Part I

By | Big Data, SaaS, Security, Threat Assessment, Uncategorized | 3 Comments

Enterprise organizations face the daily challenge of ever-growing threats to their network and IT infrastructure. Not only are these threats growing, but they are constantly changing as well, forcing companies to adapt by changing not only their tools but also their training. Today, I’m talking with MetaFlows CEO Livio Ricciulli about how MetaFlows is addressing these problems by delivering network security monitoring using the “Software as a Service” model.

Read More

Cable Labeling, the Cloud, Encryption and Virtual Server Backup Topics Make It Into DCIG’s Top 10 for 2011

By | DCIG, Encryption, Key Management, Quantum Data Protection, Virtualization | One Comment

Today I continue to reveal the Top 10 most read blog entries on DCIG’s website in 2011 with these four (4) entries typifying the two extremes of topics that DCIG’s readers tend to read the most. At one end of the spectrum are two forward looking blog entries on topics that every organization are examining now: the cloud and virtual server backup. At the other end of the spectrum are two older blog entries on the topics of cable labeling and encryption for which organizations continue to need relevant information.

Read More

Information Governance 2012: Data Science, not Storage and Security, is Required to Manage Big Data

By | @NOSQL, DCIG, Electronic Discovery, Governance Risk and Compliance, Information Classification, Information Governance, Information Management, Security, SRM | No Comments

Information managers can expect data storage companies to drive significant campaigns around Big Data as we enter 2012. Storage is the least of anyone’s concerns, according to The Economist Intelligence Unit (EIU) report Big Data: Harnessing a game-changing asset. Information Governance in 2012 requires Data Science strategy and practitioners be added to all business teams.

Read More

Symantec Experiencing a Time of Profound Meaningful Change

By | Cloud Computing, DCIG, Security, Storage Management, Virtualization | No Comments

As part of his opening remarks during his keynote on Tuesday morning, Symantec’s CEO Enrique Salem shared a comment that was made to him by a Symantec user, “We are in the middle of a time of profound meaningful change.” Truer words were never spoken as enterprises of all sizes are facing a broad spectrum of technology changes that are unequaled in this modern era of computing.

Read More