News Stay informed about the latest enterprise technology news and product updates.

Networking blogs: FireEye nets Mandiant to cap cybersecurity strategy

This week's networking blogs examine the impact of FireEye's stealth acquisition of Mandiant and how the NSA gets its info.

FireEye acquires Mandiant to enhance security capabilities

FireEye Inc. has been a top player in the cybersecurity strategy space for some time, but with its recent acquisition of Mandiant Corp., it gains an even stronger foothold as it continues to develop its malware detection model. With Mandiant, FireEye gains network and endpoint visibility and coverage, additional security intelligence, and professional services that will help grow FireEye's business, according to Enterprise Strategy Group senior principal analyst Jon Oltsik. FireEye will also likely take advantage of Mandiant's existing relationships with government agencies to enjoy the benefits of future cybersecurity spending.

The relationship is symbiotic. While FireEye receives many benefits from the acquisition, it is also providing Mandiant with a business-focused sales team who can take Mandiant's federal security terminology and translate it for technology professionals.

Read more about the details of the Mandiant acquisition.

National Security Agency follows mandate to track data

Regardless of the political winds blowing around the National Security Agency (NSA), it has a mandate by the federal government to keep watch on phone calls and data packets entering or leaving the United States, as well as to signal intelligence of any targeted person on U.S. soil. From a technical perspective, it is easier to capture all data leaving and entering the United States than it is to target a specific person, writes Packet Pushers blogger Ken Matlock. Matlock details how the NSA might get this data, including the use of telephone surveillance, and offers his thoughts on whether the agency's actions might indeed indicate a possible breach in privacy.

Read more about Matlock's opinions on NSA surveillance and call records.

Five resolutions for networking professionals

Enterprise Management Associates Vice President Jim Frey offers five resolutions for networking professionals in 2014. First, Frey suggests that engineers get more comfortable with programming to get a better handle on the flock of application programming interfaces coming down the pipe. Frey also suggests having a network change and configuration management system so that when an outage occurs, it can be repaired as quickly as possible. Additionally, Frey says to make it a point to get to know the IT development team. As infrastructure continues on the path of virtualization, the operations and application development teams will be working together more closely, he writes.

Get a more detailed explanation of Frey's resolutions for networking professionals.

The hybrid cloud to expand in 2014

Archimedius blogger Gregory Ness urges networking professionals to think beyond the traditional use of the hybrid cloud and start noticing how the approach could be used to enhance enterprise efficiency. The hybrid cloud will continue to be an important tool for enterprises as it develops into its own operating model. Being able to move information more fluidly within a cloud platform will ensure agility and flexibility, Ness says. The next 12 months will be a pivotal year for new hybrid cloud models as IT becomes less technical and more strategic.

Read more about Ness' vision of the new hybrid cloud operation model.

Dig Deeper on Network Security Monitoring and Analysis

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.