Gartner Blog Network

Lawrence Pingree
Research Director
2 years with Gartner
16 years IT industry

Lawrence Pingree's responsibilities include coverage of security technologies and the cloud security space. His main focus is on conducting research targeted at the security aspects of products in the data center… Read Full Bio

Software Defined Perimeter Technology is More than a Fancy VPN

by Lawrence Pingree  |  September 23, 2015

It’s been a while since I’ve blogged, but I wanted to expand a bit on how Software Defined Perimeter technology works. The key reason that this technology helps reduce the network attack surface is that before SDP is deployed onto a host, the  default TCP/IP stack will automatically strip, parse and process all headers/packets and […]

Read more »

Are Software Defined Perimeters (SDP) in your Future?

by Lawrence Pingree  |  April 30, 2015

Increasingly, we are seeing solutions emerge to address advanced threats that have penetrated the internal network (even internal threats) – most solutions focus on micro-segmentation,  network behavior analysis or multi-domain analytics.  I continue to have clients that are working to perform internal network and cloud-based  segmentation of their networks for security purposes. There are many ways […]

Read more »

Top 5 things AR professionals should consider when doing a Vendor Briefing

by Lawrence Pingree  |  February 4, 2015

1. Be prepared to share remotely. Briefings are a professional pitch to an influential party. Imagine you are pitching to the CEO of a large company, this is the impact that you want to make from an impression standpoint. This means that you must be prepared ahead of time. Vendor briefings should include a presentation deck […]

Read more »

2015 is the year of Offensive Deceptions

by Lawrence Pingree  |  December 23, 2014

During the past, security technologies have largely focused on detection and blocking mechanisms to respond to attacks.   Security of course must continuously evolve to detect and defend against attacker strategies, and these past strategies must continue to include new capabilities as well as old to properly defend against the array of attack techniques. A new emerging […]

Read more »

Conflict of interest or not?

by Lawrence Pingree  |  September 3, 2014

I had an interesting question posed during inquiry today. The question was: Client: “Is it a conflict of interest to have a technology provider that specializes in virtual sandbox malware detection also perform incident response and forensic activities?” Me: At first glance, my thought was that as long as there is no official attestation of […]

Read more »

A taste of data on some advanced threat search term results

by Lawrence Pingree  |  August 21, 2014

I was just curious so I picked some search terms that I felt could be relevant to Gartner customers that are attempting to find advanced threat detection solutions. Below is a sample of what Gartner Search Analytics can do. Below is a sorted list of search terms that I pulled from our search analytics tool. […]

Read more »

Four quick steps security practitioners must take to enable the intelligence aware future

by Lawrence Pingree  |  July 31, 2014

Threat intelligence sharing and exchanges are emerging across the security industry. But there are a few hangups we as security practitioners must overcome in order for us to move the needle in our favor against the attackers. 1. You must get over the paranoia associated with sharing your threat intelligence data. 2. Engage with your […]

Read more »

Security Practitioners – Stop being a pwnie pawn!

by Lawrence Pingree  |  July 9, 2014

Although I haven’t written to my blog in quite some time, I wanted to take a moment to address a major issue that I believe continues to plague organizations globally. Far too often, security practitioners face IT management or business executives that either fail to or refuse to implement prevention measures due to concerns of […]

Read more »

My team’s research next year… Intelligence Aware Security Controls (IASC)

by Lawrence Pingree  |  October 31, 2013

Hi Folks, I wanted to give you a brief intro to a new concept emerging for Gartner’s security technology and service provider audience. The concept we will be using for next year’s theme is “Intelligence Aware Security Controls (IASC)” pronounced “I ASK”. This concept will be elaborated much more in our research in 2014 and […]

Read more »

How do you define “defense in depth”?

by Lawrence Pingree  |  August 29, 2013

I’ve had some recent conversations that lead me to believe there may be some misunderstanding of the term defense in depth. Some practitioners may propose that this is a simple architecture that translates into a specific finite set of products and architectures. In a note I wrote last year (which is currently being updated) I […]

Read more »