Gartner Blog Network

Category: 'policy' Blog Posts

from the Gartner Blog Network

Detailed SIEM Use Case Example

by Anton Chuvakin  |  September 24, 2013

During inquiries, I am handling a lot of questions about SIEM use cases, what they are, where to get them, how to create them, how to document them, evolve them,...

Read more »

Endpoint Threat Detection & Response Deployment Architecture

by Anton Chuvakin  |  August 5, 2013

Now that we have a name [ETDR], let’s talk deployment strategies. On what systems in your organization do you want to deploy the tools that simplify your security incident response...

Read more »

Incident Plan vs Incident Planning?

by Anton Chuvakin  |  July 23, 2013

“You MUST have an incident response plan!!!” Thus screamed plenty of security incident response guidance, including some of my own. However, whatever happened to “no plan survives contact with the...

Read more »

Is That An Incident In Your Pocket - Or Are You Just Happy to See Me?

by Anton Chuvakin  |  July 8, 2013

Here are some real-world examples of what some organizations consider to be a security incident (most of these are taken off Universities’ publicly posted security incident plans – these are...

Read more »

MDM Critical Capabilities and the Magic Quadrant

by Phillip Redman  |  June 4, 2013

I've been blogging for Gartner for 4 years now. I've noticed that my submissions are pretty non-existent in the Spring every year. That's because I am working on our big...

Read more »

Mobile Device Management: Moving From Tactical To Strategic

by Phillip Redman  |  May 28, 2013

We published the latest MDM MQ last week. It's a five month research process, starting with over 120 companies claiming MDM support. We did a deeper dive with almost 60...

Read more »

If Apple Won't Do It, Somebody Else Should

by Phillip Redman  |  February 14, 2013

In a survey from December 2012, 63% of respondents said that  iOS will be their primary enterprise platform in the next twelve months, if it isn't already.  There's no doubt...

Read more »

Can Containers Control Content?

by Phillip Redman  |  January 25, 2013

Over the last quarter--I've been getting a lot of questions around the capabilities of managing and securing content and enforcing policy on enterprise and third-party (application store) apps.  We often end...

Read more »

On Nebulous Security Policies

by Anton Chuvakin  |  August 29, 2012

We interrupt our regular programming (on SIEM this quarter) in order to briefly talk about security policy. In particular, about unrealistic, crazy, unimplementable policies that nobody even intends to comply...

Read more »

CTIA Wireless Conference 2012: Changing Of The Guard

by Phillip Redman  |  May 11, 2012

It's funny--my first CTIA conference I went to in the mid-1990's had kind of a start-up feel to it.  There weren't a lot of big name companies there, not in...

Read more »