If you’re like most IT professionals, you’ve noticed that your roster of third-party providers continues to grow.
- PilotHouse Vendor Rating
- Contact Center and Customer Engagement
- Cloud and Data Center
- Cost Models and Total Cost of Ownership
- Enterprise Trusted Advisor
- IT Innovation, Transformation, and Enterprise Technology
- Mobile and Network Services
- Security, Risk Management, and Compliance Research Initiatives
- Unified Communications and Collaboration
Enterprise Connect 2015 proved a popular venue for contact center and customer engagement announcements.
At the 25th anniversary Enterprise Connect this week in Orlando Microsoft took a bit of a gamble, walking away from the “Lync” name for its unified communications platform that it had adopted just
LogRythm Update Spotlights Security Big Data
LogRythm has updated its Security Information and Event Management (SIEM) platform to bring big-data style analytics to the problem of analyzing security data. This underscores a problem many IT departments face: ramping up use of logging and security monitoring creates enormous new volumes of data to evaluate, and looking at them separately is not sufficient. Modern attacks typically work across several angles of approach on an environment, and all the malign traffic is hidden among thickets of benign traffic. Analysis has to span sources of data to uncover such attacks.
Finding the meaning of information derived by analysis of unprecedented volumes of data from many sources is the heart of big data. Fewer than a 30% of companies have a big data initiative currently; of them, fewer than 8% have focused on security data specifically.
BTA Bottom Line:
If your security policies and tools are pushing you into a big-data environment, explicitly approach it as such, not just a security or compliance problem. Kick off a big security data project, assign an owner, bring in the storage folks, set data-management ¬and security goals, and carve out some of the security budget to fund.