Konstantin Sutyagin - Fotolia

News Stay informed about the latest enterprise technology news and product updates.

IBM not in financial crisis

SN blogs: This week, one analyst discusses the importance of incident detection and response; another speculates on the benefits of SDN and DevOps.

After IBM reported low third quarter earnings, speculation immediately began that Big Blue was heading in the same direction as it was in 1993 when the company was in financial crisis. But, according to Steve Lohr, veteran technology columnist for The New York Times, this is not the case. IBM, Lohr notes, is still a profitable business that is expected to earn $16 billion by the end of the year. Yes, this is $3 billion less than IBM racked up in 2013, but the company is by no means in a financial crisis. Lohr concedes that some of IBM's fiscal performance is due to its share buyback program. But he also points to key investments that IBM has made that look promising, "IBM has made multibillion-dollar investments in fields that are growing rapidly, including data analytics, cloud computing and its Watson artificial intelligence technology."

Read what else Lohr had to say about IBM.

BitSight and AnubisNetworks acquisition bridges business and technology

Enterprise Strategy Group senior analyst Jon Oltsik says the recent acquisition of cyber-security rating service provider AnubisNetworks by Cambridge, Mass.-based BitSight Technologies will be transformative to the security industry. Why? Oltsik says this transaction merges business with technology. BitSight provides data that business analysts can understand and use -- information displayed in business metrics rather than technical language. On the other side, AnubisNetworks takes these metrics and develops security defense plans that CISOs care about. Oltsik cites ESG research that indicates there is a future for a partnership like this one. As he explains, "29% of enterprises rate commercial threat intelligence as 'highly effective' in helping them mitigate cyber security risk."

Read the details of the partnership, according to Oltsik.

Security spending should focus on incident detection specifically

Current Analysis analyst Paula Musich says that not only should cyber security spending be increasing, but specifically, it should be increasingly devoted to incident detection and response. According to a study by the Ponemon Institute that was backed by HP Enterprise Security, the average annual cost of a breach is $7.6 million, but can be as high as $60 million. Moreover, the number of successful attacks a year a company faces each year has more than doubled since 2010, growing from 50 to 122. The longer it takes to contain an attack, the more money is lost. Since attacks are becoming more sophisticated, Musich says it's better for enterprises to focus their spending on ways to prevent them rather than how to fight them once they have already happened.

Read the other research findings that Musich discusses.

A focus on SDN and DevOps can get in the way of good network management

PacketPushers blogger Steven Iveson is still not sold on the SDN and DevOps hype. While he agrees that speed, agility and ease of use are great things to have when managing a network, if you have too many new tools that you aren't sure how to use, it can actually be more time consuming. Iveson wonders, "Is any of what's available today useful from a network perspective? Sorry but no … How can you secure them? What kind of security, session and transaction control is available? How do you deal with more than one?” He says his feelings might be based on current disillusionment; he still is looking for a product that he can use that doesn't involve "reinventing the wheel every week."

Read more of Iveson’s perspective on the new network architecture.

Dig Deeper on Network management and monitoring

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

SearchITChannel

Close