Sergey Nivens - Fotolia
The enterprise threat intelligence strategy is rapidly developing, and it appears to be a team effort. Jon Oltsik, senior analyst at Enterprise Strategy Group, said threat intelligence feeds are becoming a popular way for organizations to share information with each other. According to an ESG survey of 1,000 IT pros, 65% of organizations are using external threat intelligence as part of their information security analytics. Most organizations gear threat strategies toward vulnerability and malware detection. Oltsik predicted many CISOs will want to centralize the information and prepare reports to use for business and management initiatives.
Read what Olstik said about the maturation of intelligence feeds in the enterprise market.
The Internet of Things: The main idea
The Internet of Things (IoT) continues to be a hot topic in IT circles, said Harish Taori, an analyst at Current Analysis. Taori described IoT as everyday objects being connected to the Internet and accessed through Internet protocols and Web addresses. He mentioned the connection between IoT and mobile-to-mobile (M2M) technology. Industries such as healthcare, retail and transportation were first to recognize the benefits and implement M2M technology. Taori predicted these same industries will be the first to develop network business models to improve efficiency when IoT starts flooding the network with traffic from multiple sources and devices. The main beneficiaries of IoT, Taori said, are consumers.
Read Taori's explanation of IoT and how it will impact both consumers and businesses.
Data analytics as a service offers companies of all sizes a competitive edge
Enterprise Management Associates blogger John Myers said cloud-based "x" as a service applications -- such as infrastructure as a service or platform as a service (PaaS) -- are popular among medium-sized businesses with 500 or fewer employees because they either don't have the staff to handle the technology equipment, or they don't have the space.
Data analytics as a service, on the other hand, is something that could be beneficial to everyone. To think of it one way, Meyers said it would be like combining PaaS with database as a service and software as a service. The initial goal would be to tailor or standardize a sales process or customer relationship management framework. The ultimate goal, Meyers said, is to gain a competitive edge.
See the EMA business analytics pyramid to learn how to predict the revenue-generating potential of products.
MPLS WAN versus Internet VPN overlay
PacketLife blogger Jeremy Stretch answered the question of whether it's a good idea to switch from a Multiprotocol Label Switching (MPLS) WAN to an Internet virtual private network (VPN) overlay. In terms of overall quality of service and reliability, the MPLS WAN is the better option. However, it is also much more expensive. A broadband Internet circuit with a VPN overlay is a fine option as well, although you might experience some congestion if the circuit doesn't provide enough throughput. If you are in a situation where you must switch from an MPLS WAN to an Internet VPN overlay, ease into the new setup. Stretch recommended keeping the MPLS WAN around in the beginning in case you have any problems with the transition.
Read what else Stretch has to say about the benefits of both an MPLS WAN and Internet VPN overlay.
Dig deeper on Network Security Monitoring and Analysis