Gartner Blog Network

SIEM, Detection & Response: Build or Buy?

by Augusto Barros  |  July 27, 2017

As Anton already blogged (many times) and twitted about, we are working to refresh some of our SIEM research and also on a new document about SaaS SIEM. This specific...

Read more »

Speed of Transformation at Capital Markets using Artificial Intelligence

by Moutusi Sau  |  July 27, 2017

By Moutusi Sau July 27, 2017 The impact of Artificial Intelligence on capital markets has never been as profound as the present times. Artificial Intelligence has taken the world of...

Read more »

It's Time to Integrate a Mobile App Strategy Into Your Application Strategy

by Deacon Wan  |  July 27, 2017

Most organizations treated mobile as an independent silo.  But mobile apps are increasingly creating overlap and redundancy, and silo projects are not sharing best practices across broader development teams. Treating...

Read more »

Can we Trust “Black Box” Machine Learning when it comes to Security or is there a Better Way?

by Avivah Litan  |  July 27, 2017

Machine learning is relatively new to security. It first went mainstream a few years ago in a few security domains such as UEBA, network traffic analytics and endpoint protection. Several...

Read more »

New Data and Analytics Research: Product Data Syndication and AI Strategy for CDO's

by Andrew White  |  July 27, 2017

My colleague Simon Walker just published Product Data Syndication Needs an End-to-End Strategy for Digital Business Success. Publication and synchronization of product data with sell-side partners is a critical competency for...

Read more »

Apresentando no Gartner Security Summit Brasil 2017

by Augusto Barros  |  July 26, 2017

(excuse me for the post in Portuguese...) O Gartner Security & Risk Management Summit de São paulo está chegando! Já estou no Brasil para o evento, que acontece entre os...

Read more »

SIEM or Log Management?

by Anton Chuvakin  |  July 26, 2017

Welcome to 2002! Let’s discuss a timely topic … and, no, its not Y2K – that one is fortunately over. The topic is: SIEM vs log management. Yes, really! In...

Read more »

The Middle East cannot continue to throw money at Cybersecurity!

by Sam Olyaei  |  July 25, 2017

The Middle East is at a crossroads in cybersecurity practices. Home to more than half of the world's natural gas and oil reserves, coupled with future megaevents such as Expo...

Read more »

Retention, Growth and CX Expectations

by Hank Barnes  |  July 25, 2017

In today's tech markets, with more and more offerings delivered as a service, the focus is increasingly on retention and growth within existing accounts.   And, they are usually used...

Read more »

From Moneyball to Grand Slam Information-Based Business Models

by Doug Laney  |  July 24, 2017

In 2003, Michael Lewis published the best-seller, Moneyball: The Art of Winning an Unfair Game, featuring the nouveau analytics-based approach to evaluating baseball players developed by the Oakland Athletics' general manager,...

Read more »