Gartner Blog Network

Anton Chuvakin
Research VP and Distinguished Analyst
5+ years with Gartner
17 years IT industry

Anton Chuvakin is a Research VP and Distinguished Analyst at Gartner's GTP Security and Risk Management group. Before Mr. Chuvakin joined Gartner, his job responsibilities included security product management, evangelist… Read Full Bio

Our “How to Architect and Deploy a SIEM Solution” Publishes

by Anton Chuvakin  |  October 18, 2018

We just published our “How to Architect and Deploy a SIEM Solution” paper. Avid readers of our research will recognize that some of the content actually comes from our world-famous “Security Information and Event Management Architecture and Operational Processes.” It was updated a few times – last in 2016, and then has gotten too obese […]

Read more »

Network Anomaly Detection Track Record in Real Life?

by Anton Chuvakin  |  October 15, 2018

As I allude here, my long-held impression is that no true anomaly-based network IDS (NIDS) has ever been successful commercially and/or operationally. There were some bits of success, to be sure (“OMG WE CAN DETECT PORTSCANS!!!”), but in total, they (IMHO) don’t quite measure up to SUCCESS of the approach. In light of this opinion, […]

Read more »

My Top 7 Popular Gartner Blog Posts for September 2018

by Anton Chuvakin  |  October 2, 2018

Most popular blog posts from my Gartner blog during the past month are: Our Security Orchestration and Automation (SOAR) Paper Publishes (SOAR research) SIEM Use Cases – And Other Security Monitoring Use Cases Too! (security monitoring research) Popular SIEM Starter Use Cases (SIEM research) Detailed SIEM Use Case Example (SIEM research) 2018 Popular SIEM Starter […]

Read more »

Can We Have NDR, Please?

by Anton Chuvakin  |  September 28, 2018

We have EDR (thanks Anton!), but can we also have NDR – if only to make the world of acronyms more consistent? Instead, today we have NIDS (detection that is assumed to be signature-based), NTA (detection by learning and baselining, and praying to AI gods). We also have not-quite-accepted acronym of NFT or Network Forensics […]

Read more »

NTA: The Other IDS?

by Anton Chuvakin  |  September 20, 2018

Have you ever wondered why academic literature – however silly much of infosec academic research is – always talks about “signature-based IDS” (“misuse”) and “anomaly-based IDS” (“abuse”), but most industry people instantly assume that “IDS = signature-based IDS”? Is this because anomaly-based IDS never worked well in the real world … or for some other […]

Read more »

Our 2018 Update to “How to Plan, Design, Operate and Evolve a SOC” Publishes

by Anton Chuvakin  |  September 17, 2018

As Augusto already announced awhile ago, we have updated our “how to SOC” paper for 2018. His post even includes our main guidance visual (!), made that much more awesome by our new co-author, Anna. The paper is still titled “How to Plan, Design, Operate and Evolve a SOC.” In any case, I wanted to […]

Read more »

My Top 7 Popular Gartner Blog Posts for August 2018

by Anton Chuvakin  |  September 13, 2018

Most popular blog posts from my Gartner blog during the past month are: Our Security Orchestration and Automation (SOAR) Paper Publishes (SOAR research) SIEM Use Cases – And Other Security Monitoring Use Cases Too! (security monitoring research) Does Vulnerability Assessment Even Matter? (vulnerability management research) Popular SIEM Starter Use Cases (SIEM research) Detailed SIEM Use […]

Read more »

Next Research: Deception and Network Traffic Analysis

by Anton Chuvakin  |  September 6, 2018

While I am away at the Summit, I wanted to whip up a very quick blog post announcing our Q4 2018 research plans. Given how long Vendor Briefing lead times are, we’d rather squeal now So: DECEPTION: We will update our 2016 “Applying Deception Technologies and Techniques to Improve Threat Detection and Response” (update) DECEPTION: […]

Read more »

In 2018, What Is Security Architecture?

by Anton Chuvakin  |  August 31, 2018

Summer is a less busy time here in terms of client calls [hey … you can book an analyst call for tomorrow … even with me :-)], so we get more time to think about big things. Here is one: security architecture. Expect more interesting research from our team on modern security architecture in the […]

Read more »

More on Security Data Lakes – And FAIL!

by Anton Chuvakin  |  August 29, 2018

Naturally, all of you have read my famous “Why Your Security Data Lake Project Will FAIL!” [note: Anton’s ego wrote this line :-)] Today I read a great Gartner note on data lake failures in general (“How to Avoid Data Lake Failures” [Gartner access required]). Thus, I wanted to share a few bits that, in […]

Read more »