News Stay informed about the latest enterprise technology news and product updates.

SN blogs: Why an enterprise security plan is more than using technology

SN blogs: This week, analysts discuss what it takes to secure a network, end-user themes for 2014 and why hyper-convergence is tricky for vendors.

Security is more than technology

Current Analysis enterprise security analyst Paula Musich explains that an enterprise security plan requires more than having the best technology. Good security requires professionals who can properly analyze the data that technology produces as well as a robust process in place to handle incidents when they occur. Musich cites Target as an example of technology that did its job by alerting the company that a breach had occurred only to see that the retailer's staffers failed to follow a process to keep the incident from snowballing. Musich emphasizes that having all three elements—investment, people and processes—is important because security needs to succeed 100% of the time, whereas the bad guys only need to get it right once.

Read what Musich says about the three-legged stool of security.

For vendors, simplicity will be key

Enterprise Strategy Group research associate Kyle Prigmore says that simpler, more efficient tools will be a main focus of vendors in 2014. End-users desire a simple interface that doesn't require a lot of time-consuming configuration. One big reason why simplicity is important? The continued security skills shortage. IT administrators need to spend more time dealing with problems and preventing attacks rather than setting up devices.

Read the four endpoint themes Prigmore says to look out for in 2014.

Hyper-convergence, easier said than done

VirtualizedGeek blogger Keith Townsend discusses the potential political discrepancies that large companies could experience when trying to implement converged infrastructure technology across a traditional organizational chart.  Townsend explains that even for the vendor, knowing to whom to market could be difficult. For example, a traditional organization separates server from storage, each with its own leaders. To whom does the vendor market its products or services when those products have both server and storage capabilities? Townsend said that's just where the confusion starts. While the "all-in-one" convergence package sounds simple – which it can be for smaller organizations where IT departments are used to working across silos – it is more challenging to implement than one might think.

Read more about the operational challenges of hyper-convergence according to Townsend .

Equinix offers carrier-neutral WAN service

Current Analysis analyst Joel Stradling touts Equinix's new service, Performance Hub, which allows companies to restructure their wireless area networks around their own data centers. Stradling says that having carrier-neutral WAN improves efficiency, application delivery and allows easier access to the cloud. Yet, he writes, the concept does not make managing complex network infrastructure easier to deal with. Overall, Stradling says it's worthwhile to look into Performance Hub for low-cost, high performance access to the cloud and cloud services.

Read the benefits of Performance Hub according to Stradling.

This was last published in March 2014

Dig Deeper on Network Security Best Practices and Products

Join the conversation


Send me notifications when other members comment.

Please create a username to comment.

What end-user themes are you expecting to see in 2014?
Overall, I see the partitioning of work and non work activities becoming more important, and ways in which organizations can allow for that to happen will encourage adoption or avoidance of tools and technologies. For most of us, the idea of carrying two devices to do work or do things in our personal lives is far less appealing than having organizations tailor workflows and usage that allows us to utilize the tools we already have.