Tag Archives: technology

My latest Gartner Research:SWOT: Huawei Data Center Business, Worldwide

27 September 2017  |  Huawei’s data center business has grown rapidly worldwide, but it has so far been unable to penetrate North America. Technology business unit leaders responsible for data center business should use this note to decide how to compete or partner with Huawei….

Gartner clients can access this research by clicking here.




Facebooktwittergoogle_plusredditpinterestlinkedinmail

My latest Gartner Research: Competitive Landscape: Secure Web Gateways

12 September 2017  |  The secure web gateway market is still transforming toward SaaS deployments as CASB and DNS services capabilities add new challenges to traditional providers. Technology strategic planners must pay attention to these new concepts to compete effectively in the future “as-a-service” market….

Gartner clients can access this research by clicking here.


Facebooktwittergoogle_plusredditpinterestlinkedinmail

My latest Gartner Research: SWOT: Palo Alto Networks, Network Security, Worldwide

While growing commoditization and execution issues led to some sustainable growth setbacks in 2016, Palo Alto Networks is well-placed to become the largest firewall provider. Technology product management leaders should further strengthen management capabilities and prioritize firmware releases….

Gartner clients can read this research by clicking here.


Facebooktwittergoogle_plusredditpinterestlinkedinmail

My latest Gartner Research: Competitive Landscape: Threat Intelligence Services, Worldwide, 2017

26 July 2017  |  Technology product management leaders must focus on demonstrating how products and services bring relevancy and actionability in order to better succeed in a highly fragmented and increasingly competitive marketplace….

Gartner clients can access this research by clicking here.


Facebooktwittergoogle_plusredditpinterestlinkedinmail

My latest Gartner research: Market Opportunity Map: Security and Risk Management Software, Worldwide

20 April 2017  |  The security software market is transforming through four vectors: analytics, adoption of SaaS and managed services, expanded ecosystems, and regulations. Technology business unit leaders must realign their product and go-to-market strategies to address these key forces….

Gartner clients can access this research by clicking here.


Facebooktwittergoogle_plusredditpinterestlinkedinmail

My latest Gartner research: Forecast Analysis: Information Security, Worldwide, 4Q16 Update

11 April 2017  |  The overall global information security market is forecast to grow at a compound annual growth rate of 7.8% through 2020. This document, aimed at technology strategic planners, discusses the key highlights and associated assumptions for the fourth-quarter forecast….

Gartner clients can access this research by clicking here.


Facebooktwittergoogle_plusredditpinterestlinkedinmail

My latest Gartner Research: Cool Vendors in Security for Technology and Service Providers, 2016

The boundaries of information security are fast expanding. These Cool Vendors are pioneering new directions and potential opportunities in the security market. TSP product managers and CMOs looking to partner with these vendors should examine their innovative security technologies.

Gartner customers can read this research by clicking here.


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] Hacking Critical Infrastructure: A How-To Guide

http://www.defenseone.com/technology/2015/07/hack-critical-infrastructure/118756/ By Patrick Tucker Defense One July 31, 2015 Cyber-aided physical attacks on power plants and the like are a growing concern. A pair of experts is set to reveal how to pull them off — and how to defend against them. How easy would it be to pull off a catastrophic cyber attack on, say, a nuclear power plant? At next week’s Black Hat and Def Con cybersecurity conferences, two security consultants will describe how bits might be used to disrupt physical infrastructure. U.S. Cyber Command officials say this is the threat that most deeply concerns them, according to a recent Government Accountability Office report. “This is because a cyber-physical incident could result in a loss of utility service or the catastrophic destruction of utility infrastructure, such as an explosion,” the report said. The most famous such attack is the 2010 Stuxnet worm, which damaged centrifuges at Iran’s Natanz nuclear enrichment plant. (It’s never been positively attributed to anyone, but common suspicion holds that it was the United States, possibly with Israel.) Scheduled to speak at the Las Vegas conferences are Jason Larsen, a principal security consultant with the firm IOActive, and Marina Krotofil, a security consultant at the European Network for Cyber Security. Larsen and Krotofil didn’t necessarily hack power plants to prove the exploits work; instead Krotofil has developed a model that can be used to simulate power plant attacks. It’s so credible that NIST uses it to find weakness in systems. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail