The sharing of threat intelligence is a hot topic these days. When I do conference speeches, I typically ask how many organizations see value in sharing, and most in the room will raise their hand. Next, I ask how many organizations are actually sharing threat intelligence, and roughly 25% to 30% in the room raises their hand. When our 2014 Security Survey data comes in, I will have some empirical data to quote, but anecdotally, there seems to be more interest than action when it comes to sharing. I wrote about some of the challenges around sharing in “Four Best Practices To Maximize The Value Of Using And Sharing Threat Intelligence.” Trust is at the epicenter of sharing and just like in "Meet the Parents," you have to be in the circle of trust. You can enable sharing, but automating trust does take time.
A common inquiry I get from clients has some of the following flavors:
“We’ve chosen a new ITSM tool and need help moving to it. Who can help us?”
“We want to choose a new ITSM product and an implementation provider at the same time. How do I know which implementation providers work with a particular ITSM product?”
“We don’t have the resources to automate our processes. Who can help us with that by applying best practices?”
“We want to work with someone who has developed industry specific best practices. Who really delivers that?”
“We need to revolutionize the way we are delivering services so we can focus on what really matters to the company. Is there an implementation service provider who can help get us there from where we are today?”
Vendors across the board are building tools to add context-driven personalization features to mobile apps. Specifically, we see new offerings from vendors in personalization, mobile analytics, API management, predictive analytics, artificial intelligence, and the digital agencies for product and content recommendations, in-app messages, and voice-driven digital assistance.
Marketers and developers are jumping at these solutions because creating more personalized digital experiences will be critical to remaining competitive. And as CIOs rationalize a larger software platform strategy, these solutions will plug specific mobile engagement gaps along the way.
Want to hear more? In our new brief, Vendors Scramble To Enable Contextual Mobile Moments,we examine how different groups of vendors extend their capabilities to compete in the arms race to deliver contextual mobile apps and provide guidance for CIOs on managing the myriad solutions entering their organization.
Critical infrastructure is frequently on my mind, especially the ICS/SCADA within the energy sector. I live in Texas; oil and natural gas are big here ya'll. I'm just a short distance away from multiple natural gas drilling sites. I cannot help but think about the risks during the extraction and transport of this natural gas. North Texas has seen an attempt to bomb the natural gas infrastructure. In 2012, Anson Chi attempted to destroy an Atmos Energy pipeline in Plano, Texas. As a security and risk professional, I wonder about the potential cyber impacts an adversary with Chi's motivations could have.
The other day, I met with the strategy director of a European telco. Let’s call him Art. We shared an informal discussion about the future of telcos. Personally, I am fairly skeptical about the prospects of telcos to recover ground – in particular in Europe.
Consumers are more concerned about the apps they use and the devices that they have than what connectivity they use, as I outline in the report The Future Of Over-The-Top Services. Forrester’s Customer Experience Index, which measures consumer perceptions of telco services, shows telcos near the bottom of all sector readings.
On the business side, data from Forrester’s Business Technographics® Global Networks And Telecommunications Survey, 2014 shows that business users trust systems integrators and independent solution specialists more than telcos with almost all voice and data service, because they feel that telcos don’t understand their specific business requirements as well.
Add an unfavorable regulatory environment — which, under the umbrella of the net neutrality debate, is about to close the door on commercial relationships regarding quality connectivity between content and network providers — and it becomes difficult to be wildly optimistic about the future of telcos. Yet, this is not where our discussion ended. Art pointed to three major issues where telcos will need shock therapy:
Forrester has just published its annual European Tech Market Outlook (see "At Last, A Tech Market Recovery In Europe"), and we are projecting modest growth of 2.3% in euros in 2014 for European business and government purchases of technology goods and services, with an acceleration to 4.9% in 2015. There are some bright spots in the European tech market:
Spending on technology that supports customer facing processes (e.g,, customer relationship management, marketing automation, mobile applications, eCommerce solutions, Web content management, etc.) will rise by over 10% as firms put priorities on technologies that help them directly win, serve, and retain more empowered customers;
The United States Department of Homeland Security (DHS) plans to sponsor important research in cybersecurity over the next three to five years through the Broad Agency Announcement (BAA) process. The US Federal government’s participation in cybersecurity is one of false starts. Members of each of the branches of government have made statements on the need for improved cybersecurity but very little has been done, at least in any public sense, to help the private sector deal with an onslaught of cyberattacks. At the same time, the National Security Agency (NSA) has been actively spying on private sector companies and their customers. This has sent mixed messages.
Encouragingly, the DHS is now making money available to fund research in cybersecurity with the goal of solving some of the toughest cybersecurity issues. The amount of money is small compared to the enormity of the cybersecurity problem, but it is a step in the right direction. This report will focus on what the money funds and what it means to commercial enterprises and their customers. Look for this report to publish in early August.
The last few days have been eventful in the cloud gateway space and should provide I&O organizations more incentive to start evaluating gateways. Yesterday, EMC announced its acquisition of cloud gateway startup TwinStrata which will allow EMC customers to move on-premise data from EMC arrays to public cloud storage providers. Today, Panzura launched a free cloud gateway and their partner Google is adding 2TB of free cloud storage for a year to entice companies to kick the tires on a gateway. Innovation and investment in this area does not appear to be slowing down. CTERA locked in an additional $25 million in VC funding last week to accelerate the sales and marketing efforts to support its cloud gateway and file sync & share products.
Though the cloud gateway market has grown slowly so far, this technology category is about to become mainstream. Cloud Gateways are disruptive since they can facilitate data migration from on-premises to a public cloud storage service to create a true hybrid cloud storage environment. Basically, a cloud gateway is a virtual or physical storage appliance which looks like a NAS or block storage device to users and applications on-premises, but can write data back to a public cloud storage service using the native APIs of that cloud.
A number of use cases have emerged for cloud gateways including:
The enterprise network is the ugly duckling of enterprise technology landscape, looked at disparagingly by CIOs and often ignored by the business. The enterprise network is much less exciting than all the fancy projects like cloud, mobility, and big data.
Yet the enterprise network represents the vital underpinning for all these projects and increasingly evolves into a business-critical asset for companies looking to succeed in the age of the customer. It becomes the nervous system of the digital business. It facilitates deeper customer engagement by connecting manufacturers, sellers, and buyers of products in new ways, and it helps drive more operational efficiencies as it supports closer collaboration and connects previously disjointed assets. For most business leaders, the network infrastructure isn't much more than a utility, such as electricity or plumbing, while most CIOs don't know how to monetize it. This is a business challenge for the connected business as:
The enterprise network enables business success in the age of the customer. Customer engagement, internal collaboration, and the emergence of digital products and services all rely on a quality network infrastructure. Moreover, network data and business intelligence turn the network into an asset for monetization. As a result, the enterprise network no longer functions as a commodity but becomes a key function for success in the age of the customer.