Quick Search
New Reports
  • Jan 23, 2018
    Rather than block exploits and malware, EDR focuses on monitoring endpoints to detect suspicious activities and capture data for forensic and security investigations.
      ESG Blog: Endpoint Detection and Response (EDR) Is Coming - In One Form or Another Author: Jon Oltsik   A few years ago (2016), my esteemed colleague Doug Cahill and I spoke with 30 enterprise organizations on their endpoint securi…
  • Jan 22, 2018
    In this video blog, ESG’s cybersecurity analysts, Jon Oltsik and myself, share some of the cybersecurity developments on our radar screen that we expect to be especially relevant in 2018
      ESG Blog: 2018 Cybersecurity Radar Screen (Video) Author: Doug Cahill   In this video blog, ESG’s cybersecurity analysts, Jon Oltsik and myself, share some of the cybersecurity developments on our radar screen that we expect…
  • Jan 22, 2018
    ESG recently completed our annual IT spending intentions research in which the study gauged not only spending plans, but top of mind IT and cybersecurity considerations for economic buyers.
      ESG Blog: Key Cybersecurity Findings from ESG’s 2018 IT Spending Intentions Research (Video) Author: Doug Cahill   ESG recently completed our annual IT spending intentions research in which the study gauged not only spending…
  • Jan 19, 2018
    Bay Dynamics CMO, Jerry Skurla, stopped by ESG to discuss how the company participates in security operations and analytics platform architecture (SOAPA).
      ESG Blog: SOAPA Video with Bay Dynamics (Part 1) Author: Jon Oltsik   Bay Dynamics CMO, Jerry Skurla, stopped by ESG to discuss how the company participates in security operations and analytics platform architecture (SOAPA). In…
  • Jan 19, 2018
    Doug Cahill and I share our insights into how companies have the opportunity to improve their security posture while embracing mobility.
      ESG Blog: 2018 Goodbye Password....Hello Bots and Machine Learning Author: Mark Bowker   Businesses can no longer compromise security for user experience and should look to strengthen security while improving productivity. Doug…