Cybersecurity & Networking

  • Dave Gruber

    About

    Principal Analyst Dave Gruber helps product marketing and management leaders develop winning strategies in highly competitive markets.

    Prior to joining Enterprise Strategy Group, Dave held executive leadership roles at successful endpoint and application security companies. Most recently, he was the VP of Product Marketing at Carbon Black through its IPO, and previously he was VP of Products at Black Duck Software (acquired by Synopsys) where he led product marketing and product management.

    In his current analyst role, Dave researches CISOs’ and security teams’ most pressing needs, working together with security vendors to develop successful product and go-to-market strategies, positioning, and messaging. Building on a strong technical background with early roles in enterprise application development, Dave became interested in figuring out why some products were more successful than others, which eventually led him to senior roles in software product management and product marketing.

    Dave has appeared in Cybersecurity News, SC, InfoSecurity, TechRepublic, Dark Reading, RSAC, and ITPro Today, among others. He holds a BS in Computer Science from the University of Maine in Orono.

    Areas of Expertise

    • All Things Security Operations
    • Leveraging AI in SecOps
    • Managed Detection & Response
    • MidMarket Cybersecurity Strategies
    • Ransomware Security Strategies
    • Security Analytics
    • SIEM, SOAR
    • The XDR Movement
    • Threat Detection & Response
    • Threat Intelligence

    Connect with Dave Gruber

    Request Briefing

    Quoation Mark

    Converging disparate tools into a smaller number of mini platforms is helping reduce complexity while increasing efficacy through more tightly integrated security controls and operational workflows.”

    Dave Gruber
    Principal Analyst, Ransomware, SecOps & Services
    Vertical Pills

    Research Report

    The Triad of Security Operations Infrastructure: XDR, SIEM, and MDR

    Security operations grow more difficult each year due to issues such as the persistent threat landscape, a growing attack surface, and the volume and complexity of security alerts. Additionally, many SOC teams remain understaffed and lack advanced security operations skills. To address these challenges, CISOs are open to evaluating new technologies in areas like advanced […]

    Read More

    Dave Has Appeared In

  • Melinda Marks

    About

    Practice Director Melinda Marks leads ESG’s analyst team focused on cybersecurity. Melinda covers technologies that help organizations scale safely while adopting faster cloud-native development cycles.

    With more than 20 years of experience in technology marketing and strategy, Melinda is passionate about conveying product value and differentiation and driving revenue.

    Prior to joining Enterprise Strategy Group, Melinda was chief marketing and strategy officer for Soluble, a startup focused on automating application security testing for developers (acquired by Lacework). She was also VP of Marketing at Armorblox, VP of Marketing at Styra, and head of marketing for StackRox (acquired by Red Hat). Her experience includes running competitive/market intelligence and product marketing teams at Tenable and running global communications for four years at Qualys. She also spent many years at VMware, where she built its original customer reference program, led product PR, and was on the core planning team for VMworld since its inception.

    Melinda is a Synopsys Outreach Foundation board member. She holds a bachelor’s degree in English from the University of California at Berkeley.

    Areas of Expertise

    • API Security
    • Application Security
    • Cloud Security Posture Management
    • Cloud Workload Protection Platforms
    • Cloud-native Technologies
    • Container Security
    • Secure DevOps (DevSecOps)
    • Web Application Security Testing (SAST, DAST, IAST, SCA)

    Connect with Melinda Marks

    Request Briefing

    Quoation Mark

    Security solutions are evolving rapidly to meet the needs of rapid modern software development lifecycles and digital transformation leveraging cloud platforms.”

    Melinda Marks
    Practice Director, Cybersecurity
    Vertical Pills

    Survey Results

    2024 Cloud Security Platforms and DevSecOps

    This Complete Survey Results presentation focuses on the scope of cloud-native application development environments, including the top challenges associated with securing cloud-native applications and the security solutions in place to protect cloud infrastructure and applications. Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client […]

    Read More

    Melinda Has Appeared In

  • Aaron Tan

    About

    As Enterprise Strategy Group’s regional director of analyst services for APAC, Aaron Tan helps clients identify and quantify key market trends on a wide range of technology topics, including cloud infrastructure, DevOps, business applications, and cybersecurity in the Asia-Pacific region.

    Aaron also serves as Editor in Chief, APAC at ESG’s parent company, TechTarget.

    Aaron is a seasoned media and information professional who has been involved in technology implementations in the public sector and has nearly two decades of experience covering B2B technology for leading media companies. He has held various managerial roles in the Singapore public sector, including the National Library Board of Singapore and the Infocomm Media Development Authority.

    Aaron holds a bachelor’s degree in Communications from Nanyang Technological University Singapore and a master’s degree in Information Science from Syracuse University in Syracuse, New York.

    Areas of Expertise

    • Application Modernization & DevOps
    • Business Applications
    • Cloud Computing
    • Cybersecurity
    • DevOps
    • IaaS/Cloud
    • IoT
    • Networking & 5G
    • Storage

    Connect with Aaron Tan

    Request Briefing

    Quoation Mark

    The growing use of public cloud services in Asia-Pacific has not only drawn cloud suppliers to the region but also integration platform players who provide the glue that ties cloud services together in a multi- cloud and hybrid IT environment.”

    Aaron Tan
    Regional Director Analyst Services, APAC
  • Alex Arcilla

  • Managing the Endpoint Vulnerability Gap

    Requirements from widespread work-from-anywhere policies have escalated the need for endpoint management and security convergence. IT and security teams require new mechanisms capable of providing common visibility, assessment, mitigation of software and configuration vulnerabilities, threat prevention, and support for threat investigation and response activities.

    Learn more about these trends with the infographic, Managing the Endpoint Vulnerability Gap.

  • The Cloud Data Security Imperative

    Digital transformation initiatives and remote work have further accelerated the migration of data assets to cloud stores. However, organizations are finding that sensitive data is now distributed across multiple public clouds. The use of disparate controls has led to a lack of consistent visibility and control, putting cloud-resident data at risk of compromise and loss. TechTarget’s Enterprise Strategy Group recently surveyed IT, cybersecurity, and DevOps professionals in order to gain insights into these trends.

    Learn more about these trends with the infographic, The Cloud Data Security Imperative.

  • Cloud Entitlements and Posture Management Trends

    Organizations are moving applications to the cloud and embracing digital transformation strategies to speed development cycles and better serve employees, partners, and customers. However, the subsequent faster release cycles and broad internet exposure increase the number of potential security incidents caused by misconfigurations, so security teams are looking for efficient ways to drive actions that reduce those risks.

    Learn more about these trends with the infographic, Cloud Entitlements and Posture Management Trends.

  • Megatrends in the technology industry—highlighted by the need to address increased complexity vis-à-vis platform convergence and vendor consolidation while investing in digital transformation initiatives—set the stage for integrated partner solutions. While the demand for these solutions is strong, there can be challenges at every stage of the buyer’s journey.

    Learn more about these trends with the infographic, The Buyer’s Journey to Integrated Solutions from Strategic Partners.

  • Managing the Endpoint Vulnerability Gap

    Research Objectives

    Requirements from widespread work-from-anywhere policies have escalated the need for endpoint management and security convergence. IT and security teams need broad management, prevention, detection, and response capabilities that span endpoint devices and operating environments that are often outside of their control, which is driving many to desire convergence between management and security capabilities to simplify implementation, ongoing management, and risk mitigation.

    IT and security teams require new mechanisms capable of providing common visibility, assessment, mitigation of software and configuration vulnerabilities, threat prevention, and support for threat investigation and response activities. These management and security activities are deeply intertwined, requiring integrated workflows between IT and security teams.

    In order to gain further insights into these trends, TechTarget’s Enterprise Strategy Group surveyed 381 IT and cybersecurity decision makers involved with endpoint management and security technologies and processes at midmarket (100 to 999 employees) and enterprise (1,000 or more employees) organizations in North America (US and Canada).

    This study sought to answer the following questions:

    • Approximately what percentage of employees work remotely, in either a remote or home office?
    • On average, approximately how many endpoint devices does each employee in an organization interact with daily?
    • How do organizations characterize the state of endpoint security and management in terms of level of difficulty?
    • Approximately what percentage of organizations’ endpoints are actively monitored?
    • Approximately what percentage of total endpoints do organizations consider to be unmanaged or have only a limited ability to manage/secure?
    • Have organizations experienced some type of cyber-attack in which the attack itself started through an exploit of an unknown, unmanaged, or poorly managed endpoint?
    • How many different tools and technologies do organizations use for endpoint management and security?
    • Have organizations consolidated the teams or individuals responsible for endpoint management and endpoint security?
    • What has driven or is driving the consolidation of endpoint management and security? What are the biggest impediments for greater consolidation of endpoint management and security?
    • Do organizations use desktop or application virtualization? What percentage of total PCs/client access devices has been virtualized via desktop or application virtualization solutions, and how is this expected to change over the next three years?
    • What specific types of employees are the initial and/or primary users of desktop or application virtualization environments?
    • What actions do organizations believe would most improve their endpoint management and security?

    Survey participants represented a wide range of industries including manufacturing, technology, financial services, and retail/wholesale. For more details, please see the Research Methodology and Respondent Demographics sections of this report.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Our personal and professional lives are reliant on technology. But the sensitive data we share and store online is more vulnerable to cyberthreats than ever before. From credit card numbers and medical records to private messages and intellectual property, encrypting data is essential to safeguard our information from prying eyes and unauthorized access. Without encryption, we risk exposing our most valuable assets to malicious actors who seek to exploit our online vulnerabilities.

    Read my blog to learn more about the coming encryption revolution.

  • Since returning from RSA Conference 2023, I’ve collected my thoughts from the massive sensory input that comes from this four-day, 625-vendor, 700-speaker cybersecurity conference. Upwards of 45,000 people attended this year’s RSA Conference—a massive increase over last year’s 26,000 attendees.

    Read my blog for my thoughts on RSAC 2023.

  • Managed Detection and Response Trends

    Research Objectives

    • Determine how, where, and why MDR services are used to support security programs.
    • Isolate specific MDR use cases, and the organizational profiles of those businesses that require them.
    • Understand what technology is expected from MDR and how organizations want to work together with MDR providers.
    • Establish if and what industry megatrends are impacting MDR provider selection.

    (more…)