Cybersecurity & Networking

  • Melinda Marks

    About

    Practice Director Melinda Marks leads ESG’s analyst team focused on cybersecurity. Melinda covers technologies that help organizations scale safely while adopting faster cloud-native development cycles.

    With more than 20 years of experience in technology marketing and strategy, Melinda is passionate about conveying product value and differentiation and driving revenue.

    Prior to joining Enterprise Strategy Group, Melinda was chief marketing and strategy officer for Soluble, a startup focused on automating application security testing for developers (acquired by Lacework). She was also VP of Marketing at Armorblox, VP of Marketing at Styra, and head of marketing for StackRox (acquired by Red Hat). Her experience includes running competitive/market intelligence and product marketing teams at Tenable and running global communications for four years at Qualys. She also spent many years at VMware, where she built its original customer reference program, led product PR, and was on the core planning team for VMworld since its inception.

    Melinda is a Synopsys Outreach Foundation board member. She holds a bachelor’s degree in English from the University of California at Berkeley.

    Areas of Expertise

    • API Security
    • Application Security
    • Cloud Security Posture Management
    • Cloud Workload Protection Platforms
    • Cloud-native Technologies
    • Container Security
    • Secure DevOps (DevSecOps)
    • Web Application Security Testing (SAST, DAST, IAST, SCA)

    Connect with Melinda Marks

    Request Briefing

    Quoation Mark

    Security solutions are evolving rapidly to meet the needs of rapid modern software development lifecycles and digital transformation leveraging cloud platforms.”

    Melinda Marks
    Practice Director, Cybersecurity
    Vertical Pills

    Survey Results

    2024 Cloud Security Platforms and DevSecOps

    This Complete Survey Results presentation focuses on the scope of cloud-native application development environments, including the top challenges associated with securing cloud-native applications and the security solutions in place to protect cloud infrastructure and applications. Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client […]

    Read More

    Melinda Has Appeared In

  • Aaron Tan

    About

    As Enterprise Strategy Group’s regional director of analyst services for APAC, Aaron Tan helps clients identify and quantify key market trends on a wide range of technology topics, including cloud infrastructure, DevOps, business applications, and cybersecurity in the Asia-Pacific region.

    Aaron also serves as Editor in Chief, APAC at ESG’s parent company, TechTarget.

    Aaron is a seasoned media and information professional who has been involved in technology implementations in the public sector and has nearly two decades of experience covering B2B technology for leading media companies. He has held various managerial roles in the Singapore public sector, including the National Library Board of Singapore and the Infocomm Media Development Authority.

    Aaron holds a bachelor’s degree in Communications from Nanyang Technological University Singapore and a master’s degree in Information Science from Syracuse University in Syracuse, New York.

    Areas of Expertise

    • Application Modernization & DevOps
    • Business Applications
    • Cloud Computing
    • Cybersecurity
    • DevOps
    • IaaS/Cloud
    • IoT
    • Networking & 5G
    • Storage

    Connect with Aaron Tan

    Request Briefing

    Quoation Mark

    The growing use of public cloud services in Asia-Pacific has not only drawn cloud suppliers to the region but also integration platform players who provide the glue that ties cloud services together in a multi- cloud and hybrid IT environment.”

    Aaron Tan
    Regional Director Analyst Services, APAC
  • Alex Arcilla

  • Managing the Endpoint Vulnerability Gap

    Requirements from widespread work-from-anywhere policies have escalated the need for endpoint management and security convergence. IT and security teams require new mechanisms capable of providing common visibility, assessment, mitigation of software and configuration vulnerabilities, threat prevention, and support for threat investigation and response activities.

    Learn more about these trends with the infographic, Managing the Endpoint Vulnerability Gap.

  • The Cloud Data Security Imperative

    Digital transformation initiatives and remote work have further accelerated the migration of data assets to cloud stores. However, organizations are finding that sensitive data is now distributed across multiple public clouds. The use of disparate controls has led to a lack of consistent visibility and control, putting cloud-resident data at risk of compromise and loss. TechTarget’s Enterprise Strategy Group recently surveyed IT, cybersecurity, and DevOps professionals in order to gain insights into these trends.

    Learn more about these trends with the infographic, The Cloud Data Security Imperative.

  • Cloud Entitlements and Posture Management Trends

    Organizations are moving applications to the cloud and embracing digital transformation strategies to speed development cycles and better serve employees, partners, and customers. However, the subsequent faster release cycles and broad internet exposure increase the number of potential security incidents caused by misconfigurations, so security teams are looking for efficient ways to drive actions that reduce those risks.

    Learn more about these trends with the infographic, Cloud Entitlements and Posture Management Trends.

  • Megatrends in the technology industry—highlighted by the need to address increased complexity vis-à-vis platform convergence and vendor consolidation while investing in digital transformation initiatives—set the stage for integrated partner solutions. While the demand for these solutions is strong, there can be challenges at every stage of the buyer’s journey.

    Learn more about these trends with the infographic, The Buyer’s Journey to Integrated Solutions from Strategic Partners.

  • Managing the Endpoint Vulnerability Gap

    Research Objectives

    Requirements from widespread work-from-anywhere policies have escalated the need for endpoint management and security convergence. IT and security teams need broad management, prevention, detection, and response capabilities that span endpoint devices and operating environments that are often outside of their control, which is driving many to desire convergence between management and security capabilities to simplify implementation, ongoing management, and risk mitigation.

    IT and security teams require new mechanisms capable of providing common visibility, assessment, mitigation of software and configuration vulnerabilities, threat prevention, and support for threat investigation and response activities. These management and security activities are deeply intertwined, requiring integrated workflows between IT and security teams.

    In order to gain further insights into these trends, TechTarget’s Enterprise Strategy Group surveyed 381 IT and cybersecurity decision makers involved with endpoint management and security technologies and processes at midmarket (100 to 999 employees) and enterprise (1,000 or more employees) organizations in North America (US and Canada).

    This study sought to answer the following questions:

    • Approximately what percentage of employees work remotely, in either a remote or home office?
    • On average, approximately how many endpoint devices does each employee in an organization interact with daily?
    • How do organizations characterize the state of endpoint security and management in terms of level of difficulty?
    • Approximately what percentage of organizations’ endpoints are actively monitored?
    • Approximately what percentage of total endpoints do organizations consider to be unmanaged or have only a limited ability to manage/secure?
    • Have organizations experienced some type of cyber-attack in which the attack itself started through an exploit of an unknown, unmanaged, or poorly managed endpoint?
    • How many different tools and technologies do organizations use for endpoint management and security?
    • Have organizations consolidated the teams or individuals responsible for endpoint management and endpoint security?
    • What has driven or is driving the consolidation of endpoint management and security? What are the biggest impediments for greater consolidation of endpoint management and security?
    • Do organizations use desktop or application virtualization? What percentage of total PCs/client access devices has been virtualized via desktop or application virtualization solutions, and how is this expected to change over the next three years?
    • What specific types of employees are the initial and/or primary users of desktop or application virtualization environments?
    • What actions do organizations believe would most improve their endpoint management and security?

    Survey participants represented a wide range of industries including manufacturing, technology, financial services, and retail/wholesale. For more details, please see the Research Methodology and Respondent Demographics sections of this report.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Our personal and professional lives are reliant on technology. But the sensitive data we share and store online is more vulnerable to cyberthreats than ever before. From credit card numbers and medical records to private messages and intellectual property, encrypting data is essential to safeguard our information from prying eyes and unauthorized access. Without encryption, we risk exposing our most valuable assets to malicious actors who seek to exploit our online vulnerabilities.

    Read my blog to learn more about the coming encryption revolution.

  • Since returning from RSA Conference 2023, I’ve collected my thoughts from the massive sensory input that comes from this four-day, 625-vendor, 700-speaker cybersecurity conference. Upwards of 45,000 people attended this year’s RSA Conference—a massive increase over last year’s 26,000 attendees.

    Read my blog for my thoughts on RSAC 2023.

  • Managed Detection and Response Trends

    Research Objectives

    • Determine how, where, and why MDR services are used to support security programs.
    • Isolate specific MDR use cases, and the organizational profiles of those businesses that require them.
    • Understand what technology is expected from MDR and how organizations want to work together with MDR providers.
    • Establish if and what industry megatrends are impacting MDR provider selection.

    (more…)

  • The Cloud Data Security Imperative

    Research Objectives

    Digital transformation initiatives and remote work have further accelerated the migration of data assets to cloud stores. However, organizations are finding that sensitive data is now distributed across multiple public clouds. The use of disparate controls has led to a lack of consistent visibility and control, putting cloud-resident data at risk of compromise and loss.

    What is necessary to secure cloud-resident data? Organizations need solutions that support data loss detection and prevention capabilities across a range of cloud applications and services. These solutions need cloud-native controls that provide a unified approach across disparate cloud data stores via API integration.

    To gain insights into modern processes for securing cloud-resident data, TechTarget’s Enterprise Strategy Group surveyed 387 IT, cybersecurity, and DevOps professionals responsible for evaluating, purchasing, testing, deploying, and operating hybrid cloud data security technology products and services at organizations in North America.

    This study sought to answer the following questions:

    • Are organizations using separate data security controls for on-premises and cloud environments? Do they plan to unify this protection in the future?
    • How much of organizations’ sensitive data is cloud-resident today, and how much will be in 12-24 months?
    • How are organizations identifying and classifying sensitive data? How confident are organizations that they have the necessary tools in place to discover and classify all their public cloud-resident data?
    • Have organizations lost cloud-resident sensitive data and, if so, how and why?
    • What policies do organizations currently employ to protect data assets associated with the use of cloud services?
    • How do organizations compare the security associated with protecting their cloud-resident sensitive data with the security associated with protecting their organization’s on-premises sensitive data?
    • Who are the key stakeholders who influence and make cloud data security purchasing decisions?
    • Do organizations have an individual or group designated as “cloud security architects”? What areas of responsibility are, or will likely be, assigned to cloud security architects?
    • What types of data security controls are currently in use, which are viewed as most important, and which ones are buyers prioritizing?
    • What types of native data security controls provided by CSPs do customers currently and plan to use?
    • From what type of vendor do buyers plan to purchase cloud data security controls?
    • How do organizations view the pros and cons of best-of-breed point tools versus consolidated suites/platforms?
    • What is the role of resellers, integrators, and managed service providers in data security?
    • Relative to other areas of cybersecurity, how do organizations expect their data security spending to change, if at all, over the next 12-24 months? What tasks do organizations consider to be the highest priorities to implement to protect cloud-resident sensitive data?

      Survey participants represented a wide range of industries including manufacturing, technology, financial services, and retail/wholesale. For more details, please see the Research Methodology and Respondent Demographics sections of this report.
    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.