Gartner Blog Network

Category: 'policy' Blog Posts

from the Gartner Blog Network

Detailed SIEM Use Case Example

by Anton Chuvakin  |  September 24, 2013

During inquiries, I am handling a lot of questions about SIEM use cases, what they are, where to get them, how to create them, how to document them, evolve them,...

Read more »

Endpoint Threat Detection & Response Deployment Architecture

by Anton Chuvakin  |  August 5, 2013

Now that we have a name [ETDR], let’s talk deployment strategies. On what systems in your organization do you want to deploy the tools that simplify your security incident response...

Read more »

Incident Plan vs Incident Planning?

by Anton Chuvakin  |  July 23, 2013

“You MUST have an incident response plan!!!” Thus screamed plenty of security incident response guidance, including some of my own. However, whatever happened to “no plan survives contact with the...

Read more »

Is That An Incident In Your Pocket - Or Are You Just Happy to See Me?

by Anton Chuvakin  |  July 8, 2013

Here are some real-world examples of what some organizations consider to be a security incident (most of these are taken off Universities’ publicly posted security incident plans – these are...

Read more »

MDM Critical Capabilities and the Magic Quadrant

by Phillip Redman  |  June 4, 2013

I've been blogging for Gartner for 4 years now. I've noticed that my submissions are pretty non-existent in the Spring every year. That's because I am working on our big...

Read more »

Why do you classify?

by Jay Heiser  |  May 29, 2013

Gartner clients have a lot of questions about the topic of data classification. It is a primary concept that has long been enshrined in the canon of computer security, yet...

Read more »

Mobile Device Management: Moving From Tactical To Strategic

by Phillip Redman  |  May 28, 2013

We published the latest MDM MQ last week. It's a five month research process, starting with over 120 companies claiming MDM support. We did a deeper dive with almost 60...

Read more »

Hack back, jack?

by Jay Heiser  |  March 20, 2013

It would be the rare soul indeed, who, after spending hours or even days cleaning up from a hack, didn’t feel the strong red rage of revengeful urges. And how...

Read more »

Including, but not limited to

by Jay Heiser  |  February 28, 2013

Any time your internal policies include the lawyerly language “Includes, but not limited to…”, it should be a sign that somebody needs to reexamine the text.  This is often a...

Read more »

If Apple Won't Do It, Somebody Else Should

by Phillip Redman  |  February 14, 2013

In a survey from December 2012, 63% of respondents said that  iOS will be their primary enterprise platform in the next twelve months, if it isn't already.  There's no doubt...

Read more »