Five Disturbing Trends in IoT Security for 2018, and What You Can Do About Them

Size: px
Start display at page:

Download "Five Disturbing Trends in IoT Security for 2018, and What You Can Do About Them"

Transcription

1 Gartner Security & Risk Management Summit 2018 June 4 7 / National Harbor, MD gartner.com/us/securityrisk Five Disturbing Trends in IoT Security for 2018, and What You Can Do About Them Earl Perkins Vice President, Gartner Research Ruggero Contu Director, Gartner Research Saniye Burcu Alaybeyi Director, Gartner Research 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. For more information, info@gartner.com or visit gartner.com. EVTM_851_353762

2 Five Disturbing Trends in IoT Security for 2018, and What You Can Do About Them Published: 31 October 2017 ID: G Analyst(s): Earl Perkins, Ruggero Contu, Saniye Burcu Alaybeyi As Internet of Things deployments increase, security and risk management leaders should make note of key IoT security trends caused by these deployments, and of resulting actions needed. Key Challenges IoT product and service vendors are paying little attention to scenario- or vertical-specific requirements for IoT security. Common security patterns for vertical-focused IoT deployments do not exist. Organizations acquired the skills to adjust to extended digital security impacts caused by IoT. Regulatory and market pressures to address specific vertical needs for IoT security are growing. Technical standards and frameworks for IoT security are almost nonexistent or beta editions, as is security testing and certification. Recommendations To develop an IoT strategy and advance it with organizations engaged in IoT projects, security and risk management leaders must: Develop methods for matching providers to specific IoT security scenarios by imitating cases from OT and physical security. Use common security patterns by scenario, then modify patterns based on required business outcomes. Train for new in-house skill sets for support of critical assets and environments, and evaluate managed and cloud-based security services for less risky support activities. Adopt security testing and certification services for required or recommended certifications. Use the service when driven by your regulatory or contractual requirements.

3 Prepare to rearchitect as standards change. Consider your dependence on the notable immaturity of those proprietary standards and compensate with existing standards available. Table of Contents Introduction... 2 Analysis...3 Develop Methods for Matching Vendor and Service Providers to IoT Security Scenarios and Vertical Requirements... 3 Recognize and Use Common Security Patterns by Scenario, Vertical and Layers to Address IoT Security Needs... 4 Gartner Recommended Reading... 8 List of Figures Figure 1. IoT Planning Pattern Components... 5 Figure 2. Organizations Defining IoT Standards...7 Introduction Very few technological events in history have had the type of impact that Internet of Things (IoT) has made on the technology fabric of business today. IoT security attempts to address the protection and threat from a growing numbers of IoT devices and systems in industrial, commercial and consumer environments. The use of IoT security remains surprisingly small, yet it remains one of the highest concerns consistently among executives in the industry today (see "IoT Technology Disruptions: A Gartner Trend Insight Report"). Trends in IoT security reflect the movement of the markets and provide indicators to security and risk managers (SRMs). These trends can help SRMs make more effective decisions when addressing the use of IoT devices and systems in their organization. These trends cover key areas such as: Verticalization (where there are specific security requirements for specific verticals) Design of secure end-to-end IoT deployments Organization and skills requirements The impact of evolving IoT security standards This appraisal provides some key actions in response to some of those evolving trends. Page 2 of 10 Gartner, Inc. G

4 Analysis Develop Methods for Matching Vendor and Service Providers to IoT Security Scenarios and Vertical Requirements The market for securing IoT devices is no longer nascent, but remains in the early stages of evolution. There are areas of growth to address unique aspects of IoT devices and impact, such as: Embedded security functions within the device (e.g., application execution environments, encryption) Securing cloud-based applications in IoT through expanded uses of cloud access security brokers (CASBs) The security implications of expanded wireless network types in existing end-to-end IoT networks (e.g., Z-Wave, ZigBee) Impacts include: Increases in scale of data amounts and device counts Diversity of systems across engineering and information-centric requirements Fit-for-purpose functions of devices Type of data and data flows generated Product and service providers, both new and old, are responding with their own methods of IoT security in digital business initiatives, regardless of scenario- or vertical-specific requirements. Traditional IT security vendors tend to reshape existing offerings, while new market entrants choose particular layers of security to address specific verticals or specific requirements. SRMs engaged in product or service evaluation and selection must recognize: When there are unique IoT requirements due to the device, the network or the scenario. Where there are traditional IT security requirements that can be addressed with modification to their existing IT security. This means, for example, creating methods of vendor matching against requirements using skills provided by outside agents, or developing more targeted scenarios for proofs of concept testing. Mobile security methods for handling limited resource capability can also be extended to wearable technologies, particularly nomadic ones. This includes techniques for trusted execution environments, encryption methods that may incorporate firmware or securing wireless communications across different frequency types. OT security methods involving trust zone segmentation in networks, extended proprietary standards support and experience in multiple platform environments are also useful. Highly decentralized accountability and responsibility for security controls and operations are useful, as well. Gartner, Inc. G Page 3 of 10

5 Recognize and Use Common Security Patterns by Scenario, Vertical and Layers to Address IoT Security Needs Traditional IT security has created a set of common security "patterns" for general-purpose platforms based on the server or variants such as mobile phones and tablets (see "Don't Let Your IoT Projects Fail: Use the Right IoT Security Pattern to Protect Them"). Those platforms are capable of running different applications no matter the requirement, whether customer relationship management or enterprise resource planning, for example. The information-centric design using processing, memory, data storage and user interfaces has served organizations in this manner for decades. IT security has evolved to develop a layered approach addressing data, application, platform, network and endpoint requirements, regardless of the business purpose. IoT devices are not exclusively general-purpose platforms. Some device classes, particularly simple sensor and actuator-based platforms, are fit-for-purpose. Some possess little or no data storage, but have memory and processing. Some have very little memory or processing, but are networked to transmit and receive data to initiate physical actions in machinery, for example. These fit-forpurpose platforms can and do alter the security patterns of established IT security. This requires an extension or new approach to providing end-to-end IoT security where such devices or systems are involved. SRMs should build a security pattern that addresses the IT portion of an end-to-end IoT initiative and use this pattern as a starting point, noting the following: The business outcome desired The device type used and its limitations The data flow it generates and receives for early indicators of modifications required For example, if a device cannot reliably store keys as part of an authentication strategy, it may require a vendor-specific appliance, human-machine interface (HMI)/mobile device application, aggregator or gateway. This will serve as an intermediate key storage and management point for those devices. It may also require the introduction of proprietary solutions temporarily as the markets evolve to standardization. Other qualifications for building a security pattern (see Figure 1): Are physically exposed to the public and the internet (may power up everything that might cause trouble). Has to stay secure for a decade or more Has accessible power, connections and even places to stick things in Contractor back doors (so you don't forget how to access systems you build) Page 4 of 10 Gartner, Inc. G

6 Figure 1. IoT Planning Pattern Components Source: Gartner (October 2017) Train for Skill Sets in Long-Term Digital Security Management and Support In-House While IT security has served all types of industries for decades, there have been at least two distinctive cultures that have made use of computing technologies: An information-centric culture that uses IT security An engineering culture that uses some IT security, as well as specialized systems that may require OT security for asset-intensive industries such as utilities, transportation and manufacturing (see "Market Guide for Operational Technology Security"). IoT itself is a successor to some of the same characteristics as OT. This is particularly true in areas of endpoint security where OT utilizes sensors and actuators routinely to manage physical state changes in machines and environments. IT and OT security organizations are converging in most asset-intensive enterprises. IoT initiatives are accelerating the convergence due to similar requirements to OT. Even in nonengineering organizations, IoT has introduced the physical state change concerns. SRMs should acquire IoT security skill sets and modify organizations to adjust to a new reality, leveraging experiences of industrial automation and control organizations in highly decentralized implementations. These support high-availability and real-time systems. Large-scale multimedia and telecommunications organizational structures also serve as starting points for managed and hosted security service providers if the scenario matches that scale of deployment. Gartner uses the term "digital" security to highlight the use of IoT devices and systems in both information- and engineering-focused organizations. SRMs must leverage the knowledge learned Gartner, Inc. G Page 5 of 10

7 from IT/OT convergence in developing strategic support for the digital security reality IoT brings. However, the potential complexity of IoT security environments is likely to strain current security departments. It will require ruthless prioritization of strategic security support requirements versus more common and less critical requirements, causing SRMs to aggressively seek operations support and management from third parties to augment staffing. Cultural changes that must occur due to multiple parties within the organization that have not communicated or worked together in the past. Organizations that have different missions must also undergo shifts in accountability, responsibility and awareness. Adopt Security Testing and Certification Services for Required or Recommended Certifications Regulatory concerns regarding the impact of IoT on industrial, commercial and consumer environments is growing. Media reports and technical reports of compromises of those devices are increasing. Early indicators in utilities and healthcare in several nations are fueling the debate around some security certifications of devices, particularly consumer and healthcare devices. 1, 2 These services are growing under regulatory and market pressures to: Address specific vertical needs for IoT security. Provide some level of standardization for different industries, though this still remains voluntary as of this date. As more industry vertical frameworks are published, the services will become more structured and standardized, a necessity in the evolving IoT security industry. 3 Gartner urges SRMs to use these security testing and certification services as starting points for tool and service evaluation in early IoT initiatives. Even if the services are not acquired, the structure and approach used can be useful in shaping internal testing or certification process. Monitor the evolution of regulations and guidance within your company's vertical to assess possible timeframes. Continue to monitor incidents and threats both within and outside of your vertical. This monitoring is needed to assess possible impacts on regulatory movements within your vertical as a result. Prepare to Rearchitect as Standards Change, Considering Your Dependence on the Immaturity of Those Standards and Compensating With Existing Standards While there are evolving IoT technical standards and protocols, specific security standards for IoT are lagging (see "Hype Cycle for IoT Standards and Protocols"). There are IoT industry verticals and broader vendor ecosystems that drive proprietary security for those environments. For example, these environments include consortia such as the Industrial Internet Consortium (IIC) for industrial and ecosystems from Google or Samsung. Efforts in established standards bodies such as the GlobalPlatform efforts, IEEE, ISO/IEC, OASIS or W3C are primarily in the working group stage. These institutions are working with standards bodies as well (see Figure 2 and "Make the Best of Your IoT Consortia Engagement"). Page 6 of 10 Gartner, Inc. G

8 Figure 2. Organizations Defining IoT Standards Source: Gartner (October 2017) Organizations should be pragmatic in their use of technical standards and frameworks for IoT security at this stage. There are some available, but consider the current vendors' dependence on specific proprietary ecosystems and the notable immaturity of those standards. SRMs should start with the industry vertical to identify and review consortia efforts at the framework level. Choose the technical standards group with working groups specific to your IoT scenario to determine progress and efforts. Participate in those groups where you have specific requirements you wish to ensure are part of final standards. Some notable industry consortia and standards bodies (not comprehensive) for frameworks and standards today specific to IoT security include Industrial Internet Consortium (IIC) Institute for Electrical and Electronics Engineers (IEEE) International Standards Organization/International Electrotechnical Commission (ISO/IEC) Internet Engineering Task Force (IETF) IoT Cybersecurity Alliance IoT Security Foundation Open Web Application Security Project (OWASP) Other consortia have different areas of IoT under consideration with smaller initiatives around security. Future Gartner research will address IoT security standards in further detail. Recommendations for SRMs: Pursue a dual strategy of IT security standardization for those layers or patterns used within your initiatives and layers required for endpoints or networks supporting IoT devices. Gartner, Inc. G Page 7 of 10

9 Evaluate the approaches during proofs of concept. Design any final deployment, taking into account the possible temporary nature of standards as they develop. Mind this particularly in embedded security and wireless security for IoT devices, and in identity management implications for those devices. Acronym Key and Glossary Terms IEEE Institute of Electrical and Electronics Engineers IETF IEC/ISO OASIS W3C Internet Engineering Task Force International Electrotechnical Commission/International Standards Organization Organization for the Advancement of Structured Information Research World Wide Web Consortium Gartner Recommended Reading Some documents may not be available as part of your current Gartner subscription. "Market Trends: Move Cybersecurity Into the Core of Vertical Industry Strategies" "Don't Let Your IoT Projects Fail: Use the Right IoT Security Pattern to Protect Them" "Market Trends: Grow Your IoT Security Business by Investing in Real-Time Discovery, Visibility and Control" "Address Cybersecurity Challenges Proactively to Ensure Success With Outsourced IoT Initiatives" "Forecast: IoT Security, Worldwide, 2016" "IoT Technology Disruptions: A Gartner Trend Insight Report" "Market Guide for Operational Technology Security" "Hype Cycle for IoT Standards and Protocols" "Make the Best of Your IoT Consortia Engagement" Evidence 1 K.J. Higgens. "New Internet of Things Security-Certification Program Launched." Dark Reading. 25 May "Cybersecurity, Securing and Protecting Products, Software and Infrastructure Against Cybersecurity Risks." Underwriter Laboratories. Page 8 of 10 Gartner, Inc. G

10 3 "Industrial Internet Security Framework Technical Report." Industrial Internet Consortium. Gartner, Inc. G Page 9 of 10

11 GARTNER HEADQUARTERS Corporate Headquarters 56 Top Gallant Road Stamford, CT USA Regional Headquarters AUSTRALIA BRAZIL JAPAN UNITED KINGDOM For a complete list of worldwide locations, visit Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without Gartner s prior written permission. If you are authorized to access this publication, your use of it is subject to the Gartner Usage Policy posted on gartner.com. The information contained in this publication has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information and shall have no liability for errors, omissions or inadequacies in such information. This publication consists of the opinions of Gartner s research organization and should not be construed as statements of fact. The opinions expressed herein are subject to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner is a public company, and its shareholders may include firms and funds that have financial interests in entities covered in Gartner research. Gartner s Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research organization without input or influence from these firms, funds or their managers. For further information on the independence and integrity of Gartner research, see Guiding Principles on Independence and Objectivity. Page 10 of 10 Gartner, Inc. G

Fifteen Best Practices for a Successful Data Center Migration

Fifteen Best Practices for a Successful Data Center Migration Fifteen Best Practices for a Successful Data Center Migration Published: 6 March 2017 ID: G00324187 Analyst(s): Henrique Cecci Data center migrations are often complex and risky. These best practices will

More information

Securing BYOD With Network Access Control, a Case Study

Securing BYOD With Network Access Control, a Case Study Research G00226207 29 August 2012 Securing BYOD With Network Access Control, a Case Study Lawrence Orans This Case Study highlights how an organization utilized NAC and mobile device management solutions

More information

How to Bring Skype for Business Online Into the Meeting Room

How to Bring Skype for Business Online Into the Meeting Room How to Bring Skype for Business Online Into the Meeting Room Published: 12 September 2017 ID: G00341344 Analyst(s): Tom Eagle, Mike Fasciani For infrastructure and operations leaders seeking a truly "unified"

More information

U.S. Telecom Market's Future Depends on Carrier Capex

U.S. Telecom Market's Future Depends on Carrier Capex AV-16-2652 U.S. Telecom Market's Future Depends on Carrier Capex Published: 8 May 2002 Analyst(s): Tim Smith Capital expenditure (capex) plans announced by major U.S. carriers indicate that 2002 and 2003

More information

User Survey Analysis: Next Steps for Server Virtualization in the Midmarket

User Survey Analysis: Next Steps for Server Virtualization in the Midmarket User Survey Analysis: Next Steps for Server Virtualization in the Midmarket Gartner RAS Core Research Note G00207375, James A. Browning, Alan Dayley, 21 October 2010, RV2A411012011 Approximately 30% of

More information

Get Ready for the Revival of Large Data Centers

Get Ready for the Revival of Large Data Centers Research Publication Date: 4 August 2006 ID Number: G00142079 Get Ready for the Revival of Large Centers Rakesh Kumar Although large data centers declined in importance in recent years, they will return

More information

Prepare for Your Windows 7 Migration Crunch

Prepare for Your Windows 7 Migration Crunch Research Publication Date: 24 June 2010 ID Number: G00200733 Prepare for Your Windows 7 Migration Crunch Charles Smulders, Stephen Kleynhans The necessity to migrate off Microsoft Windows XP and Windows

More information

2018 Trends in Hosting & Cloud Managed Services

2018 Trends in Hosting & Cloud Managed Services PREVIEW 2018 Trends in Hosting & Cloud Managed Services DEC 2017 Rory Duncan, Research Director, Managed Services & Hosting Penny Jones, Principal Analyst - MTDC & Managed Services Aaron Sherrill, Senior

More information

How to Create, Deploy, & Operate Secure IoT Applications

How to Create, Deploy, & Operate Secure IoT Applications How to Create, Deploy, & Operate Secure IoT Applications TELIT WHITEPAPER INTRODUCTION As IoT deployments accelerate, an area of growing concern is security. The likelihood of billions of additional connections

More information

I D C T E C H N O L O G Y S P O T L I G H T

I D C T E C H N O L O G Y S P O T L I G H T I D C T E C H N O L O G Y S P O T L I G H T P ow e ring Digital Transfor m a t i o n T h r ough the C l o u d - R e a d y E n t e r p rise September 2016 Adapted from Developing a Cloud Strategy for Digital

More information

Riverbed Acquisitions Broaden Customer Options for Acceleration and ADC

Riverbed Acquisitions Broaden Customer Options for Acceleration and ADC Research Publication Date: 29 September 2011 ID Number: G00219067 Riverbed Acquisitions Broaden Customer Options for Acceleration and ADC Joe Skorupa, Mark Fabbi This research discusses the impact of Riverbed's

More information

Innovation policy for Industry 4.0

Innovation policy for Industry 4.0 Innovation policy for Industry 4.0 Remarks from Giorgio Mosca Chair of Cybersecurity Steering Committee Confindustria Digitale Director Strategy & Technologies - Security & IS Division, Leonardo Agenda

More information

Ending the Confusion About Software- Defined Networking: A Taxonomy

Ending the Confusion About Software- Defined Networking: A Taxonomy Ending the Confusion About Software- Defined Networking: A Taxonomy This taxonomy cuts through confusion generated by the flood of vendor SDN announcements. It presents a framework that network and server

More information

SOC 2 examinations and SOC for Cybersecurity examinations: Understanding the key distinctions

SOC 2 examinations and SOC for Cybersecurity examinations: Understanding the key distinctions SOC 2 examinations and SOC for Cybersecurity examinations: Understanding the key distinctions DISCLAIMER: The contents of this publication do not necessarily reflect the position or opinion of the American

More information

Modern Database Architectures Demand Modern Data Security Measures

Modern Database Architectures Demand Modern Data Security Measures Forrester Opportunity Snapshot: A Custom Study Commissioned By Imperva January 2018 Modern Database Architectures Demand Modern Data Security Measures GET STARTED Introduction The fast-paced, ever-changing

More information

Industry Research. Government in the Clouds

Industry Research. Government in the Clouds Industry Research Publication Date: 20 May 2010 ID Number: G00200519 Government in the Clouds Andrea Di Maio, Massimiliano Claps Over the last year or so, "cloud computing" has become one of the most hyped

More information

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and

More information

THE INSIDE-OUT APPROACH. Enabling an Open, Scalable Data Center IoT

THE INSIDE-OUT APPROACH. Enabling an Open, Scalable Data Center IoT THE INSIDE-OUT APPROACH Enabling an Open, Scalable Data Center IoT TWO STAGE POWER DISTRIBUTION The Next Wave of Disruption With an impact that extends from transportation to healthcare to manufacturing

More information

Government IT Modernization and the Adoption of Hybrid Cloud

Government IT Modernization and the Adoption of Hybrid Cloud Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments

More information

2017 Trends in Datacenter and Critical Infrastructure

2017 Trends in Datacenter and Critical Infrastructure PREVIEW 2017 Trends in Datacenter and Critical Infrastructure DEC 2016 Rhonda Ascierto, Research Director, Datacenter Technologies & Eco-Efficient IT Andy Lawrence, Research Vice President - Datacenter

More information

Q&A TAKING ENTERPRISE SECURITY TO THE NEXT LEVEL. An interview with John Summers, Enterprise VP and GM, Akamai

Q&A TAKING ENTERPRISE SECURITY TO THE NEXT LEVEL. An interview with John Summers, Enterprise VP and GM, Akamai TAKING ENTERPRISE SECURITY TO THE NEXT LEVEL An interview with John Summers, Enterprise VP and GM, Akamai Q&A What are the top things that business leaders need to understand about today s cybersecurity

More information

IoT & SCADA Cyber Security Services

IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087 Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 22, 144 Edward St Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au www.riotsolutions.com.au

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

Security in India: Enabling a New Connected Era

Security in India: Enabling a New Connected Era White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile

More information

Connected & Automated Vehicle Activities

Connected & Automated Vehicle Activities MDOT State Highway Administration Connected & Automated Vehicle Activities National Rural ITS Conference October 2018 MDOT s CAV Working Group MDOT s CAV Working Group Open discussions on CAV with TBUs,

More information

Cisco Connected Factory Accelerator Bundles

Cisco Connected Factory Accelerator Bundles Data Sheet Cisco Connected Factory Accelerator Bundles Many manufacturers are pursuing the immense business benefits available from digitizing and connecting their factories. Major gains in overall equipment

More information

A SERVICE ORGANIZATION S GUIDE SOC 1, 2, & 3 REPORTS

A SERVICE ORGANIZATION S GUIDE SOC 1, 2, & 3 REPORTS A SERVICE ORGANIZATION S GUIDE SOC 1, 2, & 3 REPORTS Introduction If you re a growing service organization, whether a technology provider, financial services corporation, healthcare company, or professional

More information

THE INCREASING NEED FOR GPUS IN VDI

THE INCREASING NEED FOR GPUS IN VDI THE INCREASING NEED FOR GPUS IN VDI NVIDIA GPUS IN DELL EMC VDI COMPLETE ADDRESS GROWING PERFORMANCE NEEDS SUMMARY Enterprise adoption of Virtual Desktop Infrastructure (VDI) strengthened over the past

More information

DISRUPTIVE TECHNOLOGIES IN THE DATACENTER

DISRUPTIVE TECHNOLOGIES IN THE DATACENTER DISRUPTIVE TECHNOLOGIES IN THE DATACENTER Ten Technologies Driving a Wave of Change Are there new technologies out there that could disrupt the economics and infrastructure of the modern datacenter and

More information

Cognizant Cloud Security Solution

Cognizant Cloud Security Solution CLOUD SECURITY OVERVIEW Cognizant Cloud Security Solution Transform your security operation to protect your business across public and hybrid cloud environments. December 2017 The advantages of moving

More information

Vulnerability Assessments and Penetration Testing

Vulnerability Assessments and Penetration Testing CYBERSECURITY Vulnerability Assessments and Penetration Testing A guide to understanding vulnerability assessments and penetration tests. OVERVIEW When organizations begin developing a strategy to analyze

More information

NEXT-GENERATION DATACENTER MANAGEMENT

NEXT-GENERATION DATACENTER MANAGEMENT NEXT-GENERATION DATACENTER MANAGEMENT From DCIM to DCSO Sometimes described as the operating or ERP system for the datacenter, datacenter infrastructure management (DCIM) is a technology that helps operators

More information

Closing the Hybrid Cloud Security Gap with Cavirin

Closing the Hybrid Cloud Security Gap with Cavirin Enterprise Strategy Group Getting to the bigger truth. Solution Showcase Closing the Hybrid Cloud Security Gap with Cavirin Date: June 2018 Author: Doug Cahill, Senior Analyst Abstract: Most organizations

More information

Scalent Acquisition Adds FBI to Dell's Software Portfolio

Scalent Acquisition Adds FBI to Dell's Software Portfolio Research Publication Date: 11 August 2010 ID Number: G00205707 Scalent Acquisition Adds FBI to Dell's Software Portfolio Donna Scott, Andrew Butler By acquiring Scalent, Dell is sending the message to

More information

How to Select and Implement DCIM Tools

How to Select and Implement DCIM Tools G00231935 How to Select and Implement DCIM Tools Published: 29 May 2012 Analyst(s): Rakesh Kumar Data center infrastructure management (DCIM) is an emerging category of center efficiency and management

More information

Web Services Take Root in Banks and With Asset Managers

Web Services Take Root in Banks and With Asset Managers Strategic Planning, M. Knox, W. Andrews, C. Abrams Research Note 18 December 2003 Web Services Take Root in Banks and With Asset Managers Financial-services providers' early Web services implementations

More information

Bringing Cybersecurity to the Boardroom Bret Arsenault

Bringing Cybersecurity to the Boardroom Bret Arsenault SESSION ID: CXO-T11 Bringing Cybersecurity to the Boardroom Bret Arsenault Corporate Vice President & CISO Microsoft Security has Transcended from to a an 3 How Microsoft Approaches Security Reinventproductivity

More information

Get more out of technology starting day one. ProDeploy Enterprise Suite

Get more out of technology starting day one. ProDeploy Enterprise Suite Enterprise Suite Get more out of technology starting day one 1 Secure the path to a future-ready data center The landscape faced by IT managers and business leaders today can be daunting to navigate. Continually

More information

IDC FutureScape: Worldwide Security Products and Services 2017 Predictions

IDC FutureScape: Worldwide Security Products and Services 2017 Predictions IDC FutureScape: Worldwide Security Products and Services 2017 Predictions Sean Pike, Program Vice President, Robert Ayoub, Research Director IDC Web Conference December, 7, 2016 Logistics Submit any questions

More information

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services Sponsored by: Cisco Services Author: Leslie Rosenberg December 2017 Predictive Insight, Automation and Expertise Drive Added Value for Managed Services IDC OPINION Competitive business leaders are challenging

More information

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security LTI Security Intelligent & integrated Approach to Cyber & Digital Security Overview As businesses are expanding globally into new territories, propelled and steered by digital disruption and technological

More information

Addressing the elephant in the operating room: a look at medical device security programs

Addressing the elephant in the operating room: a look at medical device security programs Addressing the elephant in the operating room: a look at medical device security programs Ernst & Young LLP Presenters Michael Davis Healthcare Leader Baltimore +1 410 783 3740 michael.davis@ey.com Esther

More information

Oracle Buys Palerra Extends Oracle Identity Cloud Service with Innovative Cloud Access Security Broker

Oracle Buys Palerra Extends Oracle Identity Cloud Service with Innovative Cloud Access Security Broker Oracle Buys Palerra Extends Oracle Identity Cloud Service with Innovative Cloud Access Security Broker October 14, 2016 Copyright 2016, Oracle and/or its affiliates. All rights reserved. Oracle is currently

More information

Open Source Cloud Platforms: OpenStack

Open Source Cloud Platforms: OpenStack Open Source Cloud Platforms: OpenStack This Market Monitor overview report on the OpenStack marketplace provides updated vendor estimates through Q3 2016. OpenStack, the open source cloud project, was

More information

FICON Drives Fibre Channel Security

FICON Drives Fibre Channel Security FICON Drives Fibre Channel Security Research Brief Abstract: FICON products for mainframes impact the Fibre Channel switch market as FICON requirements drive improvements in security, benefiting all Fibre

More information

Symantec Business Continuity Solutions for Operational Risk Management

Symantec Business Continuity Solutions for Operational Risk Management Symantec Business Continuity Solutions for Operational Risk Management Manage key elements of operational risk across your enterprise to keep critical processes running and your business moving forward.

More information

Enabling Innovation in the Digital Economy

Enabling Innovation in the Digital Economy White Paper Business Agility Enabling Innovation in the Digital Economy Business Agility White Paper Enabling Innovation in the Digital Economy Five Steps to Implementing a Software-defined Infrastructure

More information

Open Source Cloud Platforms: OpenStack

Open Source Cloud Platforms: OpenStack Open Source Cloud Platforms: OpenStack This Market Monitor overview report on the OpenStack marketplace provides updated vendor estimates through Q2 2017. OpenStack, the open source cloud project, was

More information

Strong Security Elements for IoT Manufacturing

Strong Security Elements for IoT Manufacturing Strong Security Elements for IoT Manufacturing LANCEN LACHANCE VICE PRESIDENT PRODUCT MANAGEMENT GLOBALSIGN WHAT YOU WILL LEARN TODAY 1 2 3 Examining of security risks with smart connected products Implementing

More information

FOR FINANCIAL SERVICES ORGANIZATIONS

FOR FINANCIAL SERVICES ORGANIZATIONS RSA BUSINESS-DRIVEN SECURITYTM FOR FINANCIAL SERVICES ORGANIZATIONS MANAGING THE NEXUS OF RISK & SECURITY A CHANGING LANDSCAPE AND A NEW APPROACH Today s financial services technology landscape is increasingly

More information

COM I. Keene, B. Hafner

COM I. Keene, B. Hafner I. Keene, B. Hafner Research Note 23 December 2002 Commentary The Telecommunications and Networking Hype Cycle New networking technologies and services continue to stream into the telecommunications marketplace.

More information

EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved.

EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved. EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT An Insight Cyber White Paper Copyright Insight Cyber 2018. All rights reserved. The Need for Expert Monitoring Digitization and external connectivity

More information

Hybrid networking & mission critical Internet

Hybrid networking & mission critical Internet Hybrid networking & mission critical Internet Hybrid Will Be the New Normal for Next Generation Enterprise WAN Public cloud services and mobility are driving business needs where the Internet and MPLS

More information

HPE BRIDGES TRADITIONAL AND NEW IT

HPE BRIDGES TRADITIONAL AND NEW IT HPE BRIDGES TRADITIONAL AND NEW IT WITH COMPOSABLE INFRASTRUCTURE NEW CATEGORY OF INFRASTRUCTURE PROMISES TO DRIVE EFFICIENCY FOR TRADITIONAL WORKLOADS AND OPERATIONAL VELOCITY FOR NEXT-GENERATION APPLICATIONS

More information

Enterprise Data Architecture: Why, What and How

Enterprise Data Architecture: Why, What and How Tutorials, G. James, T. Friedman Research Note 3 February 2003 Enterprise Data Architecture: Why, What and How The goal of data architecture is to introduce structure, control and consistency to the fragmented

More information

Run the business. Not the risks.

Run the business. Not the risks. Run the business. Not the risks. RISK-RESILIENCE FOR THE DIGITAL BUSINESS Cyber-attacks are a known risk to business. Today, with enterprises becoming pervasively digital, these risks have grown multifold.

More information

Six Myths About Business Continuity Management and Disaster Recovery

Six Myths About Business Continuity Management and Disaster Recovery Research Publication Date: 16 March 2005 ID Number: G00126538 Six Myths About Business Continuity Management and Disaster Recovery Josh Krischer, Donna Scott, Roberta J. Witty There is no "one size fits

More information

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments White Paper The Emerging Role of a CDN in Facilitating Secure Cloud Deployments Sponsored by: Fastly Robert Ayoub August 2017 IDC OPINION The ongoing adoption of cloud services and the desire for anytime,

More information

eplus Managed Services eplus. Where Technology Means More.

eplus Managed Services eplus. Where Technology Means More. eplus Managed Services We Believe Managed Services Broker IT Innovation Superior IT Solutions IT Service Excellence Clear Business Outcomes Exceed Customer Expectations Customers tell us they need managed

More information

Better together. KPMG LLP s GRC Advisory Services for IBM OpenPages implementations. kpmg.com

Better together. KPMG LLP s GRC Advisory Services for IBM OpenPages implementations. kpmg.com Better together KPMG LLP s GRC Advisory Services for IBM OpenPages implementations kpmg.com KPMG A leader in GRC services KPMG LLP (KPMG) is the U.S. member firm of the KPMG global network of professional

More information

Getting Off Windows XP Is More Important Than Windows Vista vs. Windows 7

Getting Off Windows XP Is More Important Than Windows Vista vs. Windows 7 Research Publication Date: 12 March 2009 ID Number: G00165756 Getting Off Windows XP Is More Important Than Windows Vista vs. Windows 7 Michael A. Silver, Stephen Kleynhans For most organizations, skipping

More information

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient? Canada Highlights Cybersecurity: Do you know which protective measures will make your company cyber resilient? 21 st Global Information Security Survey 2018 2019 1 Canada highlights According to the EY

More information

Angela McKay Director, Government Security Policy and Strategy Microsoft

Angela McKay Director, Government Security Policy and Strategy Microsoft Angela McKay Director, Government Security Policy and Strategy Microsoft Demographic Trends: Internet Users in 2005.ru.ca.is.uk.nl.be.no.de.pl.ua.us.fr.es.ch.it.eg.il.sa.jo.tr.qa.ae.kz.cn.tw.kr.jp.mx.co.br.pk.th.ph.ng.in.sg.my.ar.id.au

More information

SOC for cybersecurity

SOC for cybersecurity April 2018 SOC for cybersecurity a backgrounder Acknowledgments Special thanks to Francette Bueno, Senior Manager, Advisory Services, Ernst & Young LLP and Chris K. Halterman, Executive Director, Advisory

More information

Oracle bakes security into its DNA

Oracle bakes security into its DNA Publication Date: 16 Nov 2018 Product code: INT003-000287 Maxine Holt Ovum view Summary At the inaugural Oracle Security Summit held at the company s stunning Santa Clara campus in September 2018, analysts

More information

Transforming your IT infrastructure Journey to the Cloud Mike Sladin

Transforming your IT infrastructure Journey to the Cloud Mike Sladin Transforming your IT infrastructure Journey to the Cloud Mike Sladin Director, Global Strategic Partners, APJ Symantec Corporation IT Infrastructure Transformation Journey Business Agility IT as a Service

More information

Big data privacy in Australia

Big data privacy in Australia Five-article series Big data privacy in Australia Three actions you can take towards compliance Article 5 Big data and privacy Three actions you can take towards compliance There are three actions that

More information

Sage Data Security Services Directory

Sage Data Security Services Directory Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time

More information

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies

More information

Microsoft's New Vision for Communications and Collaboration in Office 365 Impacts Microsoft Teams and Skype for Business Customers

Microsoft's New Vision for Communications and Collaboration in Office 365 Impacts Microsoft Teams and Skype for Business Customers (https://www.gartner.com/home) LICENSED FOR DISTRIBUTION Microsoft's New Vision for Communications and Collaboration in Office 365 Impacts Microsoft Teams and Skype for Business Customers Published: 01

More information

A Data-Centric Approach to Endpoint Security

A Data-Centric Approach to Endpoint Security A Data-Centric Approach to Endpoint Security September 28, 2017 Eric Ogren Senior Analyst, Security 451 Research Bill Bradley Director of Product Marketing Digital Guardian About Eric Ogren Eric Ogren

More information

High Availability For Private Clouds

High Availability For Private Clouds High Availability For Private Clouds Executive Summary When moving from traditional IT to private cloud, there is generally a tradeoff between elasticity and availability, so only applications that do

More information

Virtualization Reality

Virtualization Reality Virtualization Reality Gartner RAS Core Research Note G00205779, Philip Dawson, 30 July 2010, RA7 05012011 Virtualization continues to deliver IT savings and efficiencies, and is the foundation for many

More information

ProDeploy Suite. Accelerate enterprise technology adoption with expert deployment designed for you

ProDeploy Suite. Accelerate enterprise technology adoption with expert deployment designed for you Accelerate enterprise technology adoption with expert deployment designed for you 1 Shift resources to innovate and drive better business outcomes The landscape faced by IT managers and business leaders

More information

Security in a Converging IT/OT World

Security in a Converging IT/OT World Security in a Converging IT/OT World Introduction Around the winter solstice, darkness comes early to the citizens of Ukraine. On December 23, 2015, it came a little earlier than normal. In mid-afternoon,

More information

Symantec Security Monitoring Services

Symantec Security Monitoring Services 24x7 real-time security monitoring and protection Protect corporate assets from malicious global threat activity before it impacts your network. Partnering with Symantec skilled and experienced analysts

More information

Critical Infrastructure Protection for the Energy Industries. Building Identity Into the Network

Critical Infrastructure Protection for the Energy Industries. Building Identity Into the Network Critical Infrastructure Protection for the Energy Industries Building Identity Into the Network Executive Summary Organizations in the oil, gas, and power industries are under increasing pressure to implement

More information

Vertical Market Trends: Western Europe, (Executive Summary) Executive Summary

Vertical Market Trends: Western Europe, (Executive Summary) Executive Summary Vertical Market Trends: Western Europe, (Executive Summary) Executive Summary Publication Date: 21 March 2003 Authors Cathy Tornbohm Peter Redshaw This document has been published to the following Marketplace

More information

RSA INCIDENT RESPONSE SERVICES

RSA INCIDENT RESPONSE SERVICES RSA INCIDENT RESPONSE SERVICES Enabling early detection and rapid response EXECUTIVE SUMMARY Technical forensic analysis services RSA Incident Response services are for organizations that need rapid access

More information

The Gartner Security Information and Event Management Magic Quadrant 2010: Dealing with Targeted Attacks

The Gartner Security Information and Event Management Magic Quadrant 2010: Dealing with Targeted Attacks The Gartner Security Information and Event Management Magic Quadrant 2010: Dealing with Targeted Attacks Mark Nicolett Notes accompany this presentation. Please select Notes Page view. These materials

More information

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief RSA Solution Brief Managing Risk Within Advanced Security Operations RSA Solution Brief How do you advance your security operations function? Increasingly sophisticated security threats and the growing

More information

Should You Use Liberty or Passport for Digital Identities?

Should You Use Liberty or Passport for Digital Identities? Select Q&A, J. Pescatore, A. Litan Research Note 12 August 2003 Should You Use Liberty or Passport for Digital Identities? Federated digital identities, such as from the Liberty Alliance and Microsoft

More information

IoT, Cloud and Managed Services Accelerating the vision to reality to profitability

IoT, Cloud and Managed Services Accelerating the vision to reality to profitability Dubrovnik, Croatia, South East Europe 20-22 May, 2013 IoT, Cloud and Managed Services Accelerating the vision to reality to profitability M. Abdul Munim Cloud and Managed Services Program Lead EMEAR Region

More information

zapnote Analyst: Jason Bloomberg

zapnote Analyst: Jason Bloomberg zapthink zapnote ZAPTHINK ZAPNOTE Doc. ID: ZTZN-1198 Released: August 21, 2006 DATADIRECT XQUERY 2.0 ENABLING XQUERY FOR VERY LARGE MESSAGES Analyst: Jason Bloomberg Abstract As the quantity of XML in

More information

THE SIX ESSENTIAL CAPABILITIES OF AN ANALYTICS-DRIVEN SIEM

THE SIX ESSENTIAL CAPABILITIES OF AN ANALYTICS-DRIVEN SIEM THE SIX ESSENTIAL CAPABILITIES OF AN ANALYTICS-DRIVEN SIEM Modern threats demand analytics-driven security and continuous monitoring Legacy SIEMs are Stuck in the Past Finding a mechanism to collect, store

More information

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Remarks of Marcus Sachs, Senior Vice President and the Chief Security Officer North American Electric Reliability

More information

Next-Generation SOA Infrastructure. An Oracle White Paper May 2007

Next-Generation SOA Infrastructure. An Oracle White Paper May 2007 Next-Generation SOA Infrastructure An Oracle White Paper May 2007 Next-Generation SOA Infrastructure INTRODUCTION Today, developers are faced with a bewildering array of technologies for developing Web

More information

Modernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure

Modernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure Modernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure An IDC InfoBrief, Sponsored by IBM April 2018 Executive Summary Today s healthcare organizations

More information

Build Your Zero Trust Security Strategy With Microsegmentation

Build Your Zero Trust Security Strategy With Microsegmentation Why Digital Businesses Need A Granular Network Segmentation Approach GET STARTED Overview The idea of a secure network perimeter is dead. As companies rapidly scale their digital capabilities to deliver

More information

ForeScout Extended Module for Splunk

ForeScout Extended Module for Splunk Enterprise Strategy Group Getting to the bigger truth. ESG Lab Review ForeScout Extended Module for Splunk Date: May 2017 Author: Tony Palmer, Senior Lab Analyst Abstract This report provides a first look

More information

MITIGATE CYBER ATTACK RISK

MITIGATE CYBER ATTACK RISK SOLUTION BRIEF MITIGATE CYBER ATTACK RISK CONNECTING SECURITY, RISK MANAGEMENT & BUSINESS TEAMS TO MINIMIZE THE WIDESPREAD IMPACT OF A CYBER ATTACK DIGITAL TRANSFORMATION CREATES NEW RISKS As organizations

More information

Cylance Axiom Alliances Program

Cylance Axiom Alliances Program Alliances Program Cylance Axiom Alliances Program Program Overview The Cylance Axiom Alliances Program is a community of cybersecurity solution providers working together to deliver a prevention-first

More information

Symantec Data Center Transformation

Symantec Data Center Transformation Symantec Data Center Transformation A holistic framework for IT evolution As enterprises become increasingly dependent on information technology, the complexity, cost, and performance of IT environments

More information

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK. Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK. In today s escalating cyber risk environment, you need to make sure you re focused on the right priorities by

More information

Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation

Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation Think Cloud Compliance Case Study Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation Customer details : Collector Bank - Sweden 329 employees www.collector.se/en Banking

More information

ServiceNow Indicator Based Continuous Control Management

ServiceNow Indicator Based Continuous Control Management May 2018 ServiceNow Indicator Based Continuous Control Management Innovation in Automated Control Management INNOVATOR 2017 SOLUTIONPERSPECTIVE Governance, Risk Management & Compliance Insight 2018 GRC

More information

Software-Defined WAN Does Not Grow on WAN Alone

Software-Defined WAN Does Not Grow on WAN Alone MARKET FORECAST Software-Defined WAN Does Not Grow on WAN Alone OCT 2017 Jim Duffy, Senior Analyst, Networking Software-defined WAN is expected to undergo robust growth over the next few years, fueled

More information

DEVELOP YOUR TAILORED CYBERSECURITY ROADMAP

DEVELOP YOUR TAILORED CYBERSECURITY ROADMAP ARINC cybersecurity solutions DEVELOP YOUR TAILORED CYBERSECURITY ROADMAP Getting started is as simple as assessing your baseline THE RIGHT CYBERSECURITY SOLUTIONS FOR YOUR UNIQUE NEEDS Comprehensive threat

More information

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT 2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT THYCOTIC 2018 GLOBAL CHANNEL PARTNER SURVEY Channel Partner survey highlights client cybersecurity concerns and opportunities for

More information

In Accountable IoT We Trust

In Accountable IoT We Trust In Accountable IoT We Trust AIOTI WG3 Security & Privacy-in-IoT Taskforces, and H2020 CSA CREATE-IoT & LSPs AG Trust in IoT Arthur van der Wees Managing Director Arthur s Legal, the global tech-by-design

More information