Gartner Blog Network

Posts from Date:   2011-8

Building Context-Aware Security: VMware Acquires PacketMotion

by Neil MacDonald  |  August 27, 2011

VMware quietly disclosed it has acquired PacketMotion in this recent blog post by Dean Coza of VMware. We identified PacketMotion as a cool vendor in Gartner in this 2009 research for clients. Essentially, PacketMotion uses standard Intel-based hardware appliances  (as well as a virtualized probe implementation that runs inside of virtualized environments) to deliver full […]

Read more »

It’s Time for Security to Ascend

by Neil MacDonald  |  August 24, 2011

As I research into the future of adaptive security infrastructure, I am convinced that the future of information security lies in software, not hardware. If you think about it for a bit, most of information security policy enforcement is in the form of software already – it’s just embodied (entombed?) in physical hardware. Unfortunately, the […]

Read more »

The Single Most Important Way to Improve Endpoint Security

by Neil MacDonald  |  August 23, 2011

Run more of your Windows users without administrator rights. I’ve talked about this several times before – including here, here and here. While it may not be feasible to remove administrator rights from all users, it is an absolutely achievable goal to continue to improve the percentage of Windows users running without administrator rights year […]

Read more »

Full Drive Encryption is not just for Laptops

by Neil MacDonald  |  August 22, 2011

I’ve had two discussions with clients today already on the role of full drive encryption ( FDE technologies such as Microsoft’s BitLocker, McAfee Total Protection, Sophos/Utimaco, Symantec PGP, Check Point, Trend/Mobile Armor etc) for fixed desktops. Full drive encryption should be considered mandatory for laptops and most organizations have implemented this – either with Windows […]

Read more »

Protecting Intellectual Property in Source Code Requires a Two Prong Strategy

by Neil MacDonald  |  August 5, 2011

I had a discussion with a client today looking to protect sensitive intellectual property in their source code. I discussed two primary areas of risk: 1) that the developers (some of which were offshored) might take the code and 2) once the code was distributed to customers, it might be reverse engineered or copied Addressing […]

Read more »

Microsoft’s Forefront Endpoint Protection – Is it “Good Enough”?

by Neil MacDonald  |  August 4, 2011

Licensing changes for Microsoft’s enterprise endpoint antimalware protection solution that were announced in March at Microsoft’s MMS conference take affect this month. If you are licensed under Microsoft’s Core Client Access License program, it now includes CALs for Forefront Endpoint Protection. For many organizations that are already licensed under Core CAL, this means that FEP […]

Read more »