Gartner Blog Network

Category: 'Information Security' Blog Posts

from the Gartner Blog Network

Is your security program a roadblock?Read Now

My Top 7 Popular Gartner Blog Posts for March

by Anton Chuvakin  |  April 14, 2015

Most popular blog posts from my Gartner blog during the past month are: Killed by AI Much? A Rise of Non-deterministic Security! (security analytics research) SIEM/ DLP Add-on Brain? (security...

Read more »

The Future Is Here ... And It Is ... Network? Endpoint?

by Anton Chuvakin  |  April 9, 2015

We lost the network – MUST focus on the endpoints! We lost the endpoint – MUST focus on the network! We lost the network – MUST focus on the endpoints!...

Read more »

Speaking at Gartner Security & Risk Management Summit 2015

by Anton Chuvakin  |  April 7, 2015

Gartner Security & Risk Management Summit 2015 is coming soon [well, for some definition of "soon" :-)]! Here is my traditional blog post summarizing my speaking at this event (Washington,...

Read more »

Seven Ways to IT Risk Management Success

by John Wheeler  |  April 1, 2015

With all the hype and hysteria around the mounting cyber-security threats, companies are seeking to strengthen their management of IT risk. The Wall Street Journal reported last week that some...

Read more »

Why Does Access Certification Even Have to Exist Any Longer?

by Brian Iverson  |  March 30, 2015

This is the sixth installment in a series of posts that I am writing on my impressions of the current state of IGA, based on analysis of the 2015 edition of the Critical Capabilities for Identity...

Read more »

Why an Identity Repository Should Not Be Treated as an Account Repository

by Brian Iverson  |  March 25, 2015

With identity governance and administration (IGA), the identity repository is intended to track identity-related information for people who are authorized to access managed systems. Unfortunately, most IGA products on the market...

Read more »

The Sorry State of IGA Policy Management

by Brian Iverson  |  March 25, 2015

This is the fifth installment in a series of posts that I am writing on my impressions of the current state of IGA, based on analysis of the 2015 edition of the Critical Capabilities for Identity...

Read more »

Good Workflow Support in IGA Requires More than a Graphical Editor

by Brian Iverson  |  March 23, 2015

This is the fourth installment in a series of posts that I am writing on my impressions of the current state of IGA, based on analysis of the 2015 edition of the Critical Capabilities for...

Read more »

Is "One-Stop Shopping" for Access Requests Finally a Credible Objective with IGA?

by Brian Iverson  |  March 20, 2015

This is the third installment in a series of posts that I am writing on my impressions of the current state of IGA, based on analysis of the 2015 edition of the Critical Capabilities for...

Read more »

Our Team Is Hiring Again - Second Position Open: Join Gartner GTP Now!

by Anton Chuvakin  |  March 19, 2015

Our team at Gartner is HIRING for one more role! Join Security and Risk Management Strategies (SRMS) team at Gartner for Technical Professionals (GTP)! Excerpts from the job descriptions (#1...

Read more »