Insight

  • The Need for Speed: Amazon buys E8

    GettyImages-160820951The Israeli tech news site, Globes, reported today that Amazon is acquiring the NVMe flash storage start-up, E8. The report mentions the deal is estimated to be between $50 and $60 million. However, the article also notes that other sources estimate the deal might have been for less.  

    So, why is Amazon buying E8?

    At this time, I have not seen an official statement from Amazon. I speculate, however, that this is a technology, rather than a business, acquisition, something that offers high performance NVMe storage that fits Amazon’s hyperscale architecture. E8’s technology may be delivered as an ultra-fast storage tier. Or Amazon may use the technology in future versions of Outposts. Either presents a fascinating opportunity for Amazon and its customers.  

    I do not, however, have to speculate on E8’s technology. We at ESG evaluated E8’s technology a couple of years ago.

    Here are some of the highlights from our report.

    • E8’s design leverages standard, readily available hardware. The solution we validated was a 2U enclosure supplied by an Intel whitebox ODM.
    • The E8 solution that ESG validated leveraged RDMA over Converged Ethernet (RoCE) for high performance, low latency storage network performance.
    • The E8 client software on the host server handles multi-pathing, including path failover, and can accommodate dual Ethernet switches for network redundancy. This technology means Amazon doesn’t have to wait for NVMe multi-pathing support to solidify.
    • E8 delivers incredibly efficient storage performance. In our testing, E8’s software, along with the RoCE protocol, added only about 10us of additional latency in a host request on an NVMe drive. The 2U E8-D24 storage array was able to deliver over 10 million IOPS for a 100% random read workload and over 43 GB/sec of throughput for large block read operations.

    What does this mean going forward?

    Amazon got a solid, high performance storage technology that, if the article’s estimate is accurate, was still relatively cheap. I assume that given E8’s start-up nature, Amazon does not have a ton of established on-premises customers to support. When I compare this to Google’s move for Elastifile that I wrote about few weeks prior, there are both similarities and differences.

    In both cases, a public cloud service provider acquired an on-premises focused storage startup to augment their storage offerings. This alone could change the storage market; there is a new crop of tech buyers out there. It will be interesting to see if the venture capital community gets more bullish of storage startups.

    From the outside, Elastifile makes slightly more sense. Both are excellent technologies, but high-performance scale-out file systems are incredibly complex to build and could be considered a weakness among current cloud storage portfolios. While E8’s performance efficiency is stellar, Amazon might have been able to build something similar, or good enough, by leveraging newer hardware with some adjustments to their existing technology.

    Does E8 represent a strategy shift at Amazon from build to buy for storage technologies? Or is the rising interest in high performance workloads, such as machine learning, driving Amazon to seek out performance advantages wherever it can? Time will offer more insight. In the meantime, E8 is solid technology and I expect Amazon to put it to good use.

  • SOAPA Video with SAS Software (Part 1)

    Stu Bradley, VP of fraud and security intelligence stopped by the Enterprise Strategy Group video studio to participate in our latest SOAPA video. 

    If you are a cybersecurity professional and you don’t know SAS, I strongly suggest you watch this video (and part 2 which is posted here). SAS Software has had a leadership role in data analytics for years and is now applying its craft to cybersecurity. In part 1 of this SOAPA video, Stu and I discuss:

    1. SAS’s role in cybersecurity. I wanted to give the cybersecurity community a bit of background on SAS before digging into SOAPA-specific content. Stu summarizes the SAS cybersecurity position by talking about the need for flexible security analytics. The goal here is to make it easy for the SOC team to tap into security analytics and drive business outcomes. This makes sense since job-one for every CISOs is to protect critical business assets. 
    2. SAS customers. Who are they? Stu says that they come in all shapes and sizes, but their main goal is to accelerate threat detection while decreasing the volume of false positive security incidents. In other words, customers call on SAS to help them with high-fidelity, real-time, and actionable security alerts. This has positive ramifications for threat prevention, detection, and response. 
    3. It’s all about the data. In my interactions with SAS, I’ve been impressed with the company’s knowledge and guidance around data modeling and data management for cybersecurity analytics. Stu talks about the need to enrich the data, providing the right context for security analysts. When I pressed Stu on how he defines data enrichment, he offered a great example of data enrichment around user authentication anchored by NetFlow data. SAS has the right emphasis, as data synthesis is the “holy grail” of cybersecurity analytics. 
    4. Risk management. Cyber-risk analytics is an under-appreciated use case for SOAPA but it’s one of SAS’s focus area. SAS uses unsupervised machine learning to model entity behavior using a multi-pass approach to model creation. Stu claims that this really improves the model, giving analysts a birds-eye view of risk. CEOs and business executives are clamoring for better cyber-risk metrics, so SAS has a great opportunity here.

    While many security vendors approach security analytics with an alarmist perspective, Stu really demonstrates SAS’s deep knowledge and experience with data analytics that happen to be applied to cybersecurity. This made for a refreshing conversation. 

    Many thanks to Stu Bradley and SAS for participating in the ESG SOAPA video series. 

  • Security Analytics: It’s All About the Data

    GettyImages-1054713428Over the past five years, we’ve seen an explosion in security data collection, processing, and analysis. As part of a recent security analytics research project, ESG found that 28% of organizations claimed that they were collecting, processing, and analyzing significantly more security data than they did 2 years ago, while another 49% were collecting, processing, and analyzing somewhat more data during the same timeframe.

    (more…)

  • GettyImages-1132596369Black Hat has gotten a lot bigger over the past few years, so many security insiders now compare Black Hat to the RSA Security Conference circa 2012 or so.

    This is an accurate comparison from an attendance perspective but there is still a fundamental difference between the shows. In my humble opinion, RSA is an industry event, while Black Hat is more of a cybersecurity professional gathering. The focus is on cyber-adversary tactics, techniques, and procedures (TTPs), threat intelligence, and defensive playbooks. Rather than host lavish cocktail parties, vendors who participate in Black Hat must roll up their sleeves and demonstrate their technology acumen to gain street cred with this crowd.

    In the past, a vendor’s technology prowess was usually used as an introduction to some type of security hardware or software. Technically savvy vendors would bond with security analysts as a means for pitching the latest products. In 2019, however, security technical gurus are looking for more than cool security technology alone – they are looking for help.

    What’s going on? A global cybersecurity skills shortage, that’s what. ESG research indicates that 53% of organizations say they have a problematic shortage of cybersecurity skills. Furthermore, the recently published research report from ESG and the information systems security association (ISSA) indicates that 73% of organizations have been impacted by the cybersecurity skills shortage. Sixty-six percent of those impacted say the cybersecurity skills shortage has increased the workload on the infosec team, 47% say the cybersecurity skills shortage has led to the inability to learn or use cybersecurity technologies to their full potential, and 41% have had to hire and train junior employees rather than hire more experienced staff.

    There’s one more implication around the cybersecurity skills shortage – nearly one-third (32%) of organizations have had to increase their use of professional/managed services because they remain understaffed and lack advanced cybersecurity skills. Like I said, organizations can no longer toe the cybersecurity line alone – they need help.

    This brings me back to Black Hat. Yes, there will still be plenty of geeky technologies on display in areas like security analytics and threat detection/response. That said, I predict that managed services will be one of the main themes at Black Hat 2019.

    It’s worth noting that managed security services are already making a big inroad at enterprise organizations. According to ESG research, 51% of large firms are already using some type of managed threat detection and response service (MDR) today, while another 42% will do so in the next 12 to 18 months or are interested in doing so. The research also points to the top reasons for adopting MDR:

    • 32% of organizations needed a rapid improvement in threat detection and response and thought an MDR service would be more expeditious than deploying threat detection and response technologies.
    • 29% of organizations were already working with a managed security service provider so it was easy to add MDR services as part of their contract.
    • 28% of organizations admit that MDR services can do a better job at threat detection and response than they can.
    • 27% of organizations say that they tried to deploy some type of threat detection and response technology but found that operating this technology was beyond their ability.

    Black hat has always been a bully pulpit for security vendors known for their strong technology and threat intelligence knowledge – CrowdStrike, FireEye, Kaspersky Lab, Palo Alto Networks, Trend Micro, etc. These and other firms will maintain a staring role, but given the rapid adoption of managed services, look for others like Accenture, Booz Allen Hamilton, IBM, KPMG, SecureWorks, and Unisys to elbow their way into the spotlight. The new vendor mantra at Black Hat may be, “how can we help?”

    Security professionals must resist the temptation to limit their Black Hat focus to security technology bits and bytes. Rather, they should prepare for this transition by bolstering their ability to qualify and manage third-party security service providers and coming to terms with the fact that they need help. As former President Barack Obama said, “Don’t be afraid to ask for help when you need it. Asking for help isn’t a sign of weakness, it’s a sign of strength. It shows you have the courage to admit when you don’t know something, and to learn something new.”

  • network-traffic-analysisWhen it comes to threat detection and response, understanding network behavior really matters. According to ESG research, 87% of organizations use network traffic analysis (NTA) tools for threat detection and response, and 43% say that NTA is a “first line of defense” for detecting and responding to threats.  

    (more…)

  • Bridging the Cyber-risk Management Gap

    GettyImages-551995965According to ESG research, 74% of cybersecurity professionals believe that cyber-risk management is more difficult today than it was two years ago. Respondents point to an expanding attack surface, an increase in software vulnerabilities, and more sophisticated tactics, techniques, and procedures (TTPs) from cyber-adversaries.

    Okay, so there’s a cyber-risk management gap at most organizations–so what are they going to do about it? The research indicates that:

    (more…)

  • file-storageToday, Google Cloud announced that it has entered into a definitive agreement to acquire Elastifile. For those of you who are not familiar the emerging storage firm or why Google might want to acquire the company, let me help break it down.

    (more…)

  • The Three Pillars of DevSecOps

    three-pillarsJerry Garcia once said the Grateful Dead is like black licoriceyou either love them or hate them. Well, I have finally been able to make a connection between the Dead and cybersecurity as it sure seems to me that “DevSecOps” is the Grateful Dead of cybersecurityyou either love it or hate it.

    (more…)

  • Modern Network Security Transformation

    network-securityEarly in my high-tech career, SUN Microsystems was thought of as a computing visionary. SUN coined an intriguing company tagline early on, “the network is the computer.” What did this mean? That IT infrastructure was linked together in a loosely coupled architecture, tied together via networking technologies like Ethernet cables and the TCP/IP protocol. Thus, it was critical to engineer the network correctly to maximize network availability, performance, and business benefits.

    (more…)

  • Data Protection Conversation with Actifio (Video)

    In this latest edition of Data Protection Conversations, I speak with David Chang, Senior Vice President of Products at Actifio. We discuss the company’s data protection announcements from Actifio Data Driven 2019, held in Boston.

  • Hardrock JamCyber Pros Join Together for a Night of Classic Rock

    In conjunction with the AWS re:Inforce conference last week, ESG hosted an evening of classic rock, where we invited our clients to join us on the stage at the Hard Rock Café Boston for a classic rock jam night. While a few of the musicians knew each other, most did not, yet they jumped right in to perform tunes from bands like Led Zeppelin, Billy Squier, Pat Benatar, AC/DC, and many more.

    (more…)

  • Report from AWS re:Inforce 2019

    cybersecurityI spent the last few days at AWS re:Inforce 2019, here in Boston. It was my first AWS event and I came away with a few strong impressions:

    (more…)