Gartner Blog Network

Category: 'Information Security' Blog Posts

from the Gartner Blog Network

Our Intelligence Lead Defenses Must Evolve

by Lawrence Pingree  |  November 15, 2017

  Threat intelligence has been a hot topic during the past few years. Back in 2015, I introduced research titled "Intelligent and Automated Security Controls Impact the Future of the Security...

Read more »

On Wild Security Maturity Overestimation

by Anton Chuvakin  |  November 13, 2017

Want to know what my absolute #1 insight that I learned working at Gartner for 6+ years is? No jokes, this is serious! Any guesses from the audience? In any...

Read more »

Network Segmentation

by Andrew Lerner  |  November 9, 2017

One thing that comes up all the time with clients is how to segment their network(s).  There’s no simple answer to this, and we often see organizations over- and under-segmenting their...

Read more »

SOAR and Ticketing: Friends, Frenemies or the Same thing?

by Anton Chuvakin  |  November 3, 2017

We continue our journey through SOAR mysteries with this one: what is the relationship between case management (aka ticketing) and SOAR? So far, we have encountered these views (overdramatized for...

Read more »

My Top 7 Popular Gartner Blog Posts for October 2017

by Anton Chuvakin  |  November 2, 2017

Most popular blog posts from my Gartner blog during the past month are: SIEM Use Cases – And Other Security Monitoring Use Cases Too! (security monitoring research) Popular SIEM Starter...

Read more »

New Research: IoT Platforms, Devices and Identity Management

by Mark Diodati  |  November 2, 2017

New Research: IoT Platforms, Devices and Identity Management Gartner just published my latest research note. It focuses on the intersection of the IoT platform and identity management—for both devices and...

Read more »

Our 2017 SIEM Research Papers Publish

by Anton Chuvakin  |  October 31, 2017

Our Summer of SIEM is now fully over since all documents we developed have published. All documents below require Gartner GTP subscription. They are: “SIEM Technology Assessment” [2017 UPDATE] reviews...

Read more »

SOAR and "Curve-jumping" in Security Operations

by Anton Chuvakin  |  October 20, 2017

Lets think about this together -- can you really jump to the “next curve” in security, or do you have to travel the entire journey from the old ways to...

Read more »

Your Security Operations Maturity - and Your MSSP

by Anton Chuvakin  |  October 17, 2017

Contrary to what some people think, using MSSP is not just for losers low-maturity organizations and SMBs. For sure, we do see a lot of MSSP usage by clients who...

Read more »

How is Threat Deception Client interest evolving from last year?

by Lawrence Pingree  |  October 17, 2017

Last year, I published a quick rundown of the searches on Gartner.com for Distributed Deception Platform providers using the provider name as a search term. I decided to take a...

Read more »