Gartner Blog Network

Anton Chuvakin
Research VP and Distinguished Analyst
5+ years with Gartner
17 years IT industry

Anton Chuvakin is a Research VP and Distinguished Analyst at Gartner's GTP Security and Risk Management group. Before Mr. Chuvakin joined Gartner, his job responsibilities included security product management, evangelist… Read Full Bio

Security Architecture Frameworks – Yay or Nay?

by Anton Chuvakin  |  October 24, 2018

This post is about a topic that few of us ponder often: security architecture frameworks. We have some exciting research plans in this area, hence this blog series. Perhaps one can say that dumb people think of boxes, smart people think of processes, wise people think of architectures? OK, I just made it up, so […]

Read more »

Anonymous Guest Post: More Vendor Briefing Advice

by Anton Chuvakin  |  October 22, 2018

A little bird landed on my desk, and it had the below clutched in its little beak. The text looks like it was written by a fellow analyst: Dear Vendor: Thanks so much for your briefing today. You obviously put a lot of work into your slide deck. However, you forgot that here in Gartner […]

Read more »

Our “How to Architect and Deploy a SIEM Solution” Publishes

by Anton Chuvakin  |  October 18, 2018

We just published our “How to Architect and Deploy a SIEM Solution” paper. Avid readers of our research will recognize that some of the content actually comes from our world-famous “Security Information and Event Management Architecture and Operational Processes.” It was updated a few times – last in 2016, and then has gotten too obese […]

Read more »

Network Anomaly Detection Track Record in Real Life?

by Anton Chuvakin  |  October 15, 2018

As I allude here, my long-held impression is that no true anomaly-based network IDS (NIDS) has ever been successful commercially and/or operationally. There were some bits of success, to be sure (“OMG WE CAN DETECT PORTSCANS!!!”), but in total, they (IMHO) don’t quite measure up to SUCCESS of the approach. In light of this opinion, […]

Read more »

My Top 7 Popular Gartner Blog Posts for September 2018

by Anton Chuvakin  |  October 2, 2018

Most popular blog posts from my Gartner blog during the past month are: Our Security Orchestration and Automation (SOAR) Paper Publishes (SOAR research) SIEM Use Cases – And Other Security Monitoring Use Cases Too! (security monitoring research) Popular SIEM Starter Use Cases (SIEM research) Detailed SIEM Use Case Example (SIEM research) 2018 Popular SIEM Starter […]

Read more »

Can We Have NDR, Please?

by Anton Chuvakin  |  September 28, 2018

We have EDR (thanks Anton!), but can we also have NDR – if only to make the world of acronyms more consistent? Instead, today we have NIDS (detection that is assumed to be signature-based), NTA (detection by learning and baselining, and praying to AI gods). We also have not-quite-accepted acronym of NFT or Network Forensics […]

Read more »

NTA: The Other IDS?

by Anton Chuvakin  |  September 20, 2018

Have you ever wondered why academic literature – however silly much of infosec academic research is – always talks about “signature-based IDS” (“misuse”) and “anomaly-based IDS” (“abuse”), but most industry people instantly assume that “IDS = signature-based IDS”? Is this because anomaly-based IDS never worked well in the real world … or for some other […]

Read more »

Our 2018 Update to “How to Plan, Design, Operate and Evolve a SOC” Publishes

by Anton Chuvakin  |  September 17, 2018

As Augusto already announced awhile ago, we have updated our “how to SOC” paper for 2018. His post even includes our main guidance visual (!), made that much more awesome by our new co-author, Anna. The paper is still titled “How to Plan, Design, Operate and Evolve a SOC.” In any case, I wanted to […]

Read more »

My Top 7 Popular Gartner Blog Posts for August 2018

by Anton Chuvakin  |  September 13, 2018

Most popular blog posts from my Gartner blog during the past month are: Our Security Orchestration and Automation (SOAR) Paper Publishes (SOAR research) SIEM Use Cases – And Other Security Monitoring Use Cases Too! (security monitoring research) Does Vulnerability Assessment Even Matter? (vulnerability management research) Popular SIEM Starter Use Cases (SIEM research) Detailed SIEM Use […]

Read more »

Next Research: Deception and Network Traffic Analysis

by Anton Chuvakin  |  September 6, 2018

While I am away at the Summit, I wanted to whip up a very quick blog post announcing our Q4 2018 research plans. Given how long Vendor Briefing lead times are, we’d rather squeal now So: DECEPTION: We will update our 2016 “Applying Deception Technologies and Techniques to Improve Threat Detection and Response” (update) DECEPTION: […]

Read more »