Howard Holton, Author at Gigaom https://gigaom.com/author/howardholtan/ Your industry partner in emerging technology research Thu, 11 Jul 2024 16:15:01 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.3 https://gigaom.com/wp-content/uploads/sites/1/2024/05/d5fd323f-cropped-ff3d2831-gigaom-square-32x32.png Howard Holton, Author at Gigaom https://gigaom.com/author/howardholtan/ 32 32 CxO Decision Brief: Real-Time Data Processing and Analytics https://gigaom.com/report/cxo-decision-brief-real-time-data-processing-and-analytics/ Tue, 02 Jul 2024 16:31:37 +0000 https://gigaom.com/?post_type=go-report&p=1033962/ This GigaOm CxO Decision Brief commissioned by Cogility. Cogility’s Cogynt is a continuous intelligence software platform for real-time data stream processing and

The post CxO Decision Brief: Real-Time Data Processing and Analytics appeared first on Gigaom.

]]>
This GigaOm CxO Decision Brief commissioned by Cogility.

Cogility’s Cogynt is a continuous intelligence software platform for real-time data stream processing and behavioral analytics. The integrated platform approach addresses the inefficiencies and high costs associated with conventional, ad hoc tooling to build in-house real-time situational awareness and decision support applications.

By combining stream data processing from high volume and diverse sources and employing a patented expert-system-based AI (one of the earliest true AI systems designed to mimic the decisions made by a human expert) in an integrated package, Cogynt allows organizations to deliver continuous intelligence solutions faster and with minimal engineering overhead. The no-code model authoring allows subject matter experts to improve continuous intelligence product efficacy and delivery. Its standout feature, hierarchical complex event processing (HCEP), transforms raw data streams and complex behavioral analytics into predictive and actionable intelligence, setting it apart in the sector.

Cogynt’s key components include:

  • Flexible data integration engine: Aggregates data from diverse sources for real-time analytics.
  • Hierarchical complex event processor (HCEP): Levels of stateful, computational pattern-matching logic to determine high-confidence intelligence with full traceability.
  • No-code authoring: GUI experts, business analysts, and data scientists visually create models of computational logic that streamline development and are self-documenting.
  • Visualization and reporting tools: Provides a user-friendly interface for visualizing complex data and generating BI dashboards and reports.
  • AI and machine learning: Enhances data processing with sophisticated insights.

The post CxO Decision Brief: Real-Time Data Processing and Analytics appeared first on Gigaom.

]]>
Putting It All Together: Getting Started with Your Zero Trust Journey https://gigaom.com/2024/07/02/putting-it-all-together-getting-started-with-your-zero-trust-journey/ Tue, 02 Jul 2024 15:00:13 +0000 https://gigaom.com/?p=1033596 Welcome to the final post in our zero trust blog series! Throughout this series, we’ve explored the key components, best practices, and

The post Putting It All Together: Getting Started with Your Zero Trust Journey appeared first on Gigaom.

]]>
Welcome to the final post in our zero trust blog series! Throughout this series, we’ve explored the key components, best practices, and strategies for building a comprehensive zero trust architecture. We’ve covered everything from the fundamentals of zero trust to the critical roles of data security, identity and access management, network segmentation, device security, application security, monitoring and analytics, automation and orchestration, and governance and compliance.

In this post, we’ll summarize the key insights and best practices covered throughout the series and provide guidance on how to get started with your own zero trust implementation. We’ll also discuss some of the common challenges and pitfalls to avoid, and provide resources for further learning and exploration.

Key Insights and Best Practices for Zero Trust

Here are some of the key insights and best practices covered throughout this series:

  1. Zero trust is a mindset, not a product: Zero trust is not a single technology or solution, but a comprehensive approach to security that assumes no implicit trust and continuously verifies every access request.
  2. Data security is the foundation: Protecting sensitive data is the primary objective of zero trust, and requires a combination of data discovery, classification, encryption, and access controls.
  3. Identity is the new perimeter: In a zero trust model, identity becomes the primary control point for access, and requires strong authentication, authorization, and continuous monitoring.
  4. Network segmentation is critical: Segmenting networks into smaller, isolated zones based on data sensitivity and user roles is essential for reducing the attack surface and limiting lateral movement.
  5. Device security is a shared responsibility: Securing endpoints and IoT devices requires a collaborative effort between IT, security, and end-users, and involves a combination of device management, authentication, and monitoring.
  6. Applications must be secure by design: Securing modern application architectures requires a shift-left approach that integrates security into the development lifecycle, and leverages techniques such as secure coding, runtime protection, and API security.
  7. Monitoring and analytics are the eyes and ears: Continuous monitoring and analysis of all user, device, and application activity is essential for detecting and responding to threats in real-time.
  8. Automation and orchestration are the backbone: Automating and orchestrating security processes and policies is critical for ensuring consistent, scalable, and efficient security operations.
  9. Governance and compliance are business imperatives: Aligning zero trust initiatives with regulatory requirements, industry standards, and business objectives is essential for managing risk and ensuring accountability.

By keeping these insights and best practices in mind, organizations can build a more comprehensive, effective, and business-aligned zero trust architecture.

Getting Started with Your Zero Trust Journey

Implementing zero trust is not a one-time project, but an ongoing journey that requires careful planning, execution, and continuous improvement. Here are some steps to get started:

  1. Assess your current security posture: Conduct a thorough assessment of your current security posture, including your network architecture, data flows, user roles, and security controls. Identify gaps and prioritize areas for improvement based on risk and business impact.
  2. Define your zero trust strategy: Based on your assessment, define a clear and comprehensive zero trust strategy that aligns with your business objectives and risk appetite. Identify the key initiatives, milestones, and metrics for success, and secure buy-in from stakeholders across the organization.
  3. Implement in phases: Start with small, targeted initiatives that can demonstrate quick wins and build momentum for larger-scale implementation. Focus on high-priority use cases and data assets first, and gradually expand to other areas of the environment.
  4. Leverage existing investments: Wherever possible, leverage your existing security investments and tools, such as identity and access management, network segmentation, and endpoint protection. Integrate these tools into your zero trust architecture and automate and orchestrate processes where possible.
  5. Foster a culture of zero trust: Educate and engage employees, partners, and customers on the principles and benefits of zero trust, and foster a culture of shared responsibility and accountability for security.
  6. Continuously monitor and improve: Continuously monitor and measure the effectiveness of your zero trust controls and processes, using metrics such as risk reduction, incident response time, and user satisfaction. Use these insights to continuously improve and optimize your zero trust architecture over time.

By following these steps and leveraging the best practices and strategies covered throughout this series, organizations can build a more secure, resilient, and business-aligned zero trust architecture that can keep pace with the ever-evolving threat landscape.

Common Challenges and Pitfalls to Avoid

While zero trust offers many benefits, it also presents some common challenges and pitfalls that organizations should be aware of and avoid:

  1. Lack of clear strategy and objectives: Without a clear and comprehensive strategy that aligns with business objectives and risk appetite, zero trust initiatives can quickly become fragmented, inconsistent, and ineffective.
  2. Overreliance on technology: While technology is a critical enabler of zero trust, it is not a silver bullet. Organizations must also focus on people, processes, and policies to build a truly comprehensive and effective zero trust architecture.
  3. Inadequate visibility and control: Without comprehensive visibility and control over all user, device, and application activity, organizations can struggle to detect and respond to threats in a timely and effective manner.
  4. Complexity and scalability: As zero trust initiatives expand and mature, they can quickly become complex and difficult to manage at scale. Organizations must invest in automation, orchestration, and centralized management to ensure consistent and efficient security operations.
  5. Resistance to change: Zero trust represents a significant shift from traditional perimeter-based security models, and can face resistance from users, developers, and business stakeholders. Organizations must invest in education, communication, and change management to foster a culture of zero trust and secure buy-in from all stakeholders.

By being aware of these common challenges and pitfalls and taking proactive steps to avoid them, organizations can build a more successful and sustainable zero trust architecture.

Conclusion

Zero trust is not a destination, but a journey. By adopting a mindset of continuous verification and improvement, and leveraging the best practices and strategies covered throughout this series, organizations can build a more secure, resilient, and business-aligned security posture that can keep pace with the ever-evolving threat landscape.

However, achieving zero trust is not easy, and requires a significant investment in people, processes, and technology. Organizations must be prepared to face challenges and setbacks along the way, and to continuously learn and adapt based on new insights and experiences.

As you embark on your own zero trust journey, remember that you are not alone. There is a growing community of practitioners, vendors, and thought leaders who are passionate about zero trust and are willing to share their knowledge and experiences. Leverage these resources, and never stop learning and improving.

We hope that this series has been informative and valuable, and has provided you with a solid foundation for building your own zero trust architecture. Thank you for joining us on this journey, and we wish you all the best in your zero trust endeavors!

Additional Resources:

The post Putting It All Together: Getting Started with Your Zero Trust Journey appeared first on Gigaom.

]]>
Discovering Disruptions in Technology – Mohan Atreya https://gigaom.com/video/discovering-disruptions-in-technology-mohan-atreya/ Tue, 02 Jul 2024 13:16:28 +0000 https://gigaom.com/?post_type=go-video&p=1034025 COO Howard Holton speaks with Mohan Atreya of Rafay Systems on the nature of AI in the market, most notably attempting to

The post Discovering Disruptions in Technology – Mohan Atreya appeared first on Gigaom.

]]>
COO Howard Holton speaks with Mohan Atreya of Rafay Systems on the nature of AI in the market, most notably attempting to separate the fact from the fiction.

The post Discovering Disruptions in Technology – Mohan Atreya appeared first on Gigaom.

]]>
Governance and Compliance: Aligning Zero Trust with Business Requirements https://gigaom.com/2024/07/01/governance-and-compliance-aligning-zero-trust-with-business-requirements/ Mon, 01 Jul 2024 15:00:43 +0000 https://gigaom.com/?p=1033594 Welcome back to our zero trust blog series! In our previous post, we explored the critical role of automation and orchestration in

The post Governance and Compliance: Aligning Zero Trust with Business Requirements appeared first on Gigaom.

]]>
Welcome back to our zero trust blog series! In our previous post, we explored the critical role of automation and orchestration in a zero trust model and shared best practices for building a comprehensive automation and orchestration strategy. Today, we’re turning our attention to another essential aspect of zero trust: governance and compliance.

In a zero trust model, security is not just a technical concern, but a business imperative. With the increasing complexity and interconnectedness of modern IT environments, organizations must ensure that their zero trust initiatives are aligned with regulatory requirements, industry standards, and business objectives.

In this post, we’ll explore the role of governance and compliance in a zero trust model, discuss the key frameworks and standards involved, and share best practices for building a comprehensive governance and compliance strategy.

The Role of Governance and Compliance in Zero Trust

In a traditional perimeter-based security model, governance and compliance often focus on meeting specific regulatory requirements and industry standards, such as HIPAA, PCI-DSS, or ISO 27001. However, in a zero trust model, governance and compliance must be more holistic and integrated, ensuring that security controls are consistently applied across the entire environment and aligned with business objectives.

Governance and compliance play a critical role in enabling zero trust by:

  1. Ensuring consistency and accountability: Establishing clear policies, procedures, and roles and responsibilities for zero trust initiatives, ensuring that all stakeholders are aligned and accountable.
  2. Aligning with regulatory requirements: Ensuring that zero trust controls and processes are aligned with relevant regulatory requirements and industry standards, such as GDPR, CCPA, or NIST 800-207.
  3. Enabling risk management: Providing a framework for identifying, assessing, and mitigating risks associated with zero trust initiatives, ensuring that security controls are prioritized based on business impact.
  4. Facilitating continuous improvement: Establishing metrics, benchmarks, and feedback loops for measuring the effectiveness of zero trust controls and driving continuous improvement.

By applying these principles, organizations can create a more holistic, integrated, and business-aligned approach to zero trust that can meet the demands of modern compliance and risk management.

Key Frameworks and Standards for Zero Trust Governance and Compliance

To build a comprehensive governance and compliance strategy for zero trust, organizations must align with relevant frameworks and standards, including:

  1. NIST SP 800-207: A comprehensive framework for designing and implementing zero trust architectures, including guidance on governance, risk management, and compliance.
  2. Cybersecurity Framework (CSF): A framework for managing and reducing cybersecurity risk, including guidance on governance, risk assessment, and continuous improvement.
  3. ISO 27001: An international standard for information security management systems (ISMS), including requirements for governance, risk management, and compliance.
  4. GDPR and CCPA: Regulations for protecting personal data and ensuring privacy rights, including requirements for data protection, consent management, and breach notification.
  5. PCI-DSS: A standard for securing payment card data, including requirements for access control, network segmentation, and monitoring.

By aligning with these frameworks and standards, organizations can ensure that their zero trust initiatives are consistent, compliant, and effective in managing risk and meeting business objectives.

Best Practices for Zero Trust Governance and Compliance

Implementing a zero trust approach to governance and compliance requires a comprehensive, multi-layered strategy. Here are some best practices to consider:

  1. Establish a governance framework: Establish a clear governance framework for zero trust initiatives, including policies, procedures, roles and responsibilities, and metrics for success. Ensure that the framework is aligned with relevant regulatory requirements and industry standards.
  2. Conduct regular risk assessments: Conduct regular risk assessments to identify and prioritize risks associated with zero trust initiatives, including technical, operational, and compliance risks. Use these assessments to inform the design and implementation of zero trust controls.
  3. Implement continuous monitoring and auditing: Implement continuous monitoring and auditing of zero trust controls and processes, using tools such as SIEM, IDS/IPS, and vulnerability scanners. Ensure that monitoring and auditing are aligned with relevant regulatory requirements and industry standards.
  4. Establish clear incident response and reporting procedures: Establish clear incident response and reporting procedures for zero trust initiatives, including roles and responsibilities, communication channels, and escalation paths. Ensure that procedures are aligned with relevant regulatory requirements and industry standards.
  5. Foster a culture of compliance and accountability: Foster a culture of compliance and accountability across the organization, through regular training, awareness campaigns, and clear communication of policies and procedures. Ensure that all stakeholders understand their roles and responsibilities in maintaining a zero trust posture.
  6. Continuously improve and adapt: Continuously measure and improve the effectiveness of zero trust controls and processes, using metrics, benchmarks, and feedback loops. Adapt governance and compliance strategies based on changing business requirements, risk landscapes, and regulatory environments.

By implementing these best practices and continuously refining your governance and compliance posture, you can ensure that your zero trust initiatives are consistent, compliant, and effective in managing risk and meeting business objectives.

Conclusion

In a zero trust world, governance and compliance are essential for aligning security with business objectives and ensuring consistent, effective risk management. By establishing clear policies, procedures, and roles and responsibilities, conducting regular risk assessments, and fostering a culture of compliance and accountability, organizations can build a more holistic, integrated, and business-aligned approach to zero trust.

However, achieving effective governance and compliance in a zero trust model requires a commitment to aligning with relevant frameworks and standards, implementing continuous monitoring and auditing, and continuously improving and adapting based on changing business requirements and risk landscapes.

As you continue your zero trust journey, make governance and compliance a top priority. Invest in the tools, processes, and skills necessary to build a comprehensive governance and compliance strategy, and regularly assess and refine your approach to keep pace with evolving regulatory requirements and industry standards.

In the final post of this series, we’ll summarize the key insights and best practices covered throughout the series and provide guidance on how to get started with your own zero trust implementation.

Until then, stay compliant and keep governing!

Additional Resources:

The post Governance and Compliance: Aligning Zero Trust with Business Requirements appeared first on Gigaom.

]]>
The Good, The Bad, & The Techy – With Special Guest, Ryan Litwin https://gigaom.com/video/the-good-the-bad-the-techy-with-special-guest-ryan-litwin/ Fri, 28 Jun 2024 17:45:04 +0000 https://gigaom.com/?post_type=go-video&p=1033678 CTO Howard Holton is joined by Ryan Litwin, an industry specialist with over 30 years of experience under his belt.

The post The Good, The Bad, & The Techy – With Special Guest, Ryan Litwin appeared first on Gigaom.

]]>
CTO Howard Holton is joined by Ryan Litwin, an industry specialist with over 30 years of experience under his belt.

The post The Good, The Bad, & The Techy – With Special Guest, Ryan Litwin appeared first on Gigaom.

]]>
Automation and Orchestration: The Backbone of Zero Trust https://gigaom.com/2024/06/28/automation-and-orchestration-the-backbone-of-zero-trust/ Fri, 28 Jun 2024 15:00:54 +0000 https://gigaom.com/?p=1033535 Welcome to the next installment of our zero trust blog series! In our previous post, we explored the critical role of monitoring

The post Automation and Orchestration: The Backbone of Zero Trust appeared first on Gigaom.

]]>
Welcome to the next installment of our zero trust blog series! In our previous post, we explored the critical role of monitoring and analytics in a zero trust model and shared best practices for building a comprehensive monitoring and analytics strategy. Today, we’re shifting our focus to another key enabler of zero trust: automation and orchestration.

In a zero trust model, security must be dynamic, adaptive, and continuous. With no implicit trust granted to any user, device, or application, organizations must be able to quickly and consistently enforce security policies, detect and respond to threats, and maintain a robust security posture across a complex, ever-changing environment.

In this post, we’ll explore the role of automation and orchestration in a zero trust model, discuss the key technologies and processes involved, and share best practices for building a comprehensive automation and orchestration strategy.

The Role of Automation and Orchestration in Zero Trust

In a traditional perimeter-based security model, security processes are often manual, reactive, and siloed. Security teams must manually configure and enforce policies, investigate and respond to alerts, and coordinate across multiple tools and teams to remediate incidents.

However, in a zero trust model, this approach is no longer sufficient. With the attack surface expanding and the threat landscape evolving at an unprecedented pace, organizations must be able to automate and orchestrate security processes across the entire environment, from identity and access management to network segmentation and incident response.

Automation and orchestration play a critical role in enabling zero trust by:

  1. Enforcing consistent policies: Automating the configuration and enforcement of security policies across the environment, ensuring that all users, devices, and applications are subject to the same rules and controls.
  2. Accelerating threat detection and response: Orchestrating the collection, analysis, and correlation of security data from multiple sources, enabling faster detection and response to potential threats.
  3. Reducing human error and inconsistency: Minimizing the risk of human error and inconsistency by automating repetitive, manual tasks and ensuring that policies and processes are applied consistently across the environment.
  4. Enabling continuous monitoring and optimization: Continuously monitoring the environment for changes and anomalies, and automatically adapting policies and controls based on new information and insights.

By applying these principles, organizations can create a more agile, adaptive, and efficient security posture that can keep pace with the demands of a zero trust model.

Key Technologies and Processes for Zero Trust Automation and Orchestration

To build a comprehensive automation and orchestration strategy for zero trust, organizations must leverage a range of technologies and processes, including:

  1. Security orchestration, automation, and response (SOAR): Platforms that enable the automation and orchestration of security processes across multiple tools and systems, such as incident response, threat hunting, and vulnerability management.
  2. Infrastructure as code (IaC): Tools and practices that enable the automated provisioning, configuration, and management of infrastructure using code, such as Terraform, Ansible, and CloudFormation.
  3. Continuous integration and continuous deployment (CI/CD): Processes and tools that enable the automated building, testing, and deployment of applications and infrastructure, such as Jenkins, GitLab, and Azure DevOps.
  4. Policy as code: Practices and tools that enable the definition and enforcement of security policies using code, such as Open Policy Agent (OPA) and HashiCorp Sentinel.
  5. Robotic process automation (RPA): Tools that enable the automation of repetitive, manual tasks across multiple systems and applications, such as UiPath and Automation Anywhere.

By leveraging these technologies and processes, organizations can build a comprehensive, automated, and orchestrated approach to zero trust that can adapt to changing business requirements and threat landscapes.

Best Practices for Zero Trust Automation and Orchestration

Implementing a zero trust approach to automation and orchestration requires a comprehensive, multi-layered strategy. Here are some best practices to consider:

  1. Identify and prioritize use cases: Identify the key security processes and use cases that can benefit from automation and orchestration, and prioritize them based on their impact and feasibility. Focus on high-value, high-volume processes first, such as incident response and policy enforcement.
  2. Establish a centralized automation platform: Implement a centralized platform, such as a SOAR or IaC tool, to manage and orchestrate automated processes across the environment. Ensure that the platform can integrate with existing tools and systems and can scale to meet the needs of the organization.
  3. Implement policy as code: Define and enforce security policies using code, leveraging tools such as OPA and Sentinel. Ensure that policies are version-controlled, tested, and continuously updated based on new requirements and insights.
  4. Automate testing and validation: Automate the testing and validation of security controls and policies, leveraging tools such as Terraform Sentinel and Inspec. Ensure that tests are run continuously and that results are used to drive improvements and optimizations.
  5. Monitor and measure effectiveness: Continuously monitor and measure the effectiveness of automated processes and orchestrations, using metrics such as mean time to detect (MTTD), mean time to respond (MTTR), and false positive rates. Use these insights to continuously improve and optimize processes and policies.
  6. Foster collaboration and communication: Foster collaboration and communication between security, operations, and development teams, leveraging tools such as ChatOps and collaboration platforms. Ensure that all teams are aligned on the goals and processes of automation and orchestration and that feedback and insights are continuously shared and acted upon.

By implementing these best practices and continuously refining your automation and orchestration posture, you can build a more agile, adaptive, and efficient approach to zero trust that can keep pace with the demands of the modern threat landscape.

Conclusion

In a zero trust world, automation and orchestration are the backbone of the security organization. By automating and orchestrating key security processes and policies, organizations can enforce consistent controls, accelerate threat detection and response, reduce human error and inconsistency, and enable continuous monitoring and optimization.

However, achieving effective automation and orchestration in a zero trust model requires a commitment to leveraging the right technologies and processes, fostering collaboration and communication between teams, and continuously monitoring and optimizing effectiveness. It also requires a shift in mindset, from a reactive, manual approach to a proactive, automated approach that can adapt to changing business requirements and threat landscapes.

As you continue your zero trust journey, make automation and orchestration a top priority. Invest in the tools, processes, and skills necessary to build a comprehensive automation and orchestration strategy, and regularly assess and refine your approach to keep pace with evolving threats and business needs.

In the next post, we’ll explore the role of governance and compliance in a zero trust model and share best practices for aligning zero trust initiatives with regulatory requirements and industry standards.

Until then, stay vigilant and keep automating!

Additional Resources:

The post Automation and Orchestration: The Backbone of Zero Trust appeared first on Gigaom.

]]>
Discovering Disruptions in Technology with Tyler Shields of Traceable https://gigaom.com/video/discovering-disruptions-in-technology-with-tyler-shields-of-traceable/ Fri, 28 Jun 2024 13:44:31 +0000 https://gigaom.com/?post_type=go-video&p=1033677 COO Howard Holton is joined by Tyler Shields of Traceable to discuss the desegregation of applications.

The post Discovering Disruptions in Technology with Tyler Shields of Traceable appeared first on Gigaom.

]]>
COO Howard Holton is joined by Tyler Shields of Traceable to discuss the desegregation of applications.

The post Discovering Disruptions in Technology with Tyler Shields of Traceable appeared first on Gigaom.

]]>
GigaOm Solution Brief: Cogility https://gigaom.com/report/gigaom-solution-brief-cogility/ Thu, 27 Jun 2024 19:13:34 +0000 https://gigaom.com/?post_type=go-report&p=1033249/ This GigaOm Solution Brief was commissioned by Cogility and is based on the GigaOm Radar Report for Streaming Data Platforms, 2024. Solution

The post GigaOm Solution Brief: Cogility appeared first on Gigaom.

]]>
This GigaOm Solution Brief was commissioned by Cogility and is based on the GigaOm Radar Report for Streaming Data Platforms, 2024.

Solution Overview

Cogility specializes in predictive analytics and operational intelligence. Its platform, Cogynt, enables real-time analysis of voluminous and complex data, offering actionable insights to enhance decision-making and operational efficiency.

Cogynt is an integrated “continuous intelligence” platform that employs patented hierarchical complex event processing (HCEP). This technology transforms data streams into actionable insights and continuous risk assessments. Instead of querying data, users receive proactive findings prioritized by risk or opportunity.

Cogynt features a no-code authoring environment, empowering data scientists and subject matter experts (SMEs) to create structured analytic solutions without writing code. The platform comprises several applications tailored to different user needs:

  • Authoring Tool: Connects to data sources, creates models, and deploys them as Apache Flink jobs using a built-in Flink Kubernetes Operator. Model deployment is fully automated, eliminating the need for users to know how to program or manage Flink operations.
  • ModelDoc: Automatically generates documentation for models created by data scientists and SMEs.
  • Data Management Tool: Manages data connectors and entry forms for data ingestion.
  • Workstation: Analysts can investigate findings, collaborate on case files, and produce reports using the Report Builder.
  • Apache Superset: Enables decision makers to create customizable dashboards to assess Cogynt’s effectiveness.
  • User Management: Manages users, roles, and permissions.
  • Audit Viewer: Provides auditors with a review of user actions and changes.
  • Delivery Tool: Automates the creation and deployment of infrastructure into self-hosted virtual private clouds.

How to Read This Report

The GigaOm Solution Brief concisely analyzes a vendor’s offering in a specific market. It builds on the framework developed in GigaOm’s Key Criteria and Radar reports and outlines how a vendor performs against three primary decision criteria:

  • Key features differentiate solutions and highlight the primary criteria to consider when evaluating a streaming data platform solution.
  • Emerging features show how well each vendor implements capabilities that are not yet mainstream but are expected to become more widespread and compelling within the next 12 to 18 months.
  • Business criteria provide insight into the nonfunctional requirements that factor into a purchase decision and determine a solution’s impact on an organization.

The specific decision criteria applied in this report are summarized below. The corresponding report, GigaOm Key Criteria for Evaluating Streaming Data Platforms, provides more detailed descriptions. The corresponding report, GigaOm Radar for Streaming Data Platforms, provides a complete vendor comparison.

Purchase Considerations and Use Cases

Cogynt is available as a vendor-hosted platform or a self-managed Kubernetes cluster within the customer’s virtual private cloud, licensed via an annual subscription.

Cogynt’s no-code Authoring Tool allows technical and non-technical users to create streaming data applications. It is ideal for large enterprises and specialized use cases, though it is not targeted at SMBs. Cogynt has been successfully used in Department of Defense (DoD) counter-insider threat-detection programs, commercial cybersecurity, insurance underwriting assessments, case file management, financial services, logistics, and risk assessment.

Table 1. Target Market and User Segment Comparison

Target Market and User Segment Comparison

Target Market

User Segment

Vendor

SMB Large Enterprise Specialized Developer Data Analyst Business User
Cogility

The post GigaOm Solution Brief: Cogility appeared first on Gigaom.

]]>
Monitoring and Analytics: The Eyes and Ears of Zero Trust https://gigaom.com/2024/06/27/monitoring-and-analytics-the-eyes-and-ears-of-zero-trust/ Thu, 27 Jun 2024 15:00:01 +0000 https://gigaom.com/?p=1033533 Welcome back to our zero trust blog series! In our previous post, we took a deep dive into API security and explored

The post Monitoring and Analytics: The Eyes and Ears of Zero Trust appeared first on Gigaom.

]]>
Welcome back to our zero trust blog series! In our previous post, we took a deep dive into API security and explored best practices for securing this critical component of modern application architectures. Today, we’re turning our attention to another essential aspect of zero trust: monitoring and analytics.

In a zero trust model, visibility is everything. With no implicit trust granted to any user, device, or application, organizations must continuously monitor and analyze all activity across their environment to detect and respond to potential threats in real-time.

In this post, we’ll explore the role of monitoring and analytics in a zero trust model, discuss the key data sources and technologies involved, and share best practices for building a comprehensive monitoring and analytics strategy.

The Role of Monitoring and Analytics in Zero Trust

In a traditional perimeter-based security model, monitoring and analytics often focus on detecting threats at the network boundary. However, in a zero trust model, the perimeter is everywhere, and threats can come from any user, device, or application, both inside and outside the organization.

To mitigate these risks, zero trust requires organizations to take a comprehensive, data-driven approach to monitoring and analytics. This involves:

  1. Continuous monitoring: Collecting and analyzing data from all relevant sources, including users, devices, applications, and infrastructure, in real-time.
  2. Behavioral analytics: Using machine learning and other advanced analytics techniques to identify anomalous or suspicious behavior that may indicate a potential threat.
  3. Automated response: Leveraging automation and orchestration tools to quickly investigate and remediate potential threats, minimizing the impact of security incidents.
  4. Continuous improvement: Using insights from monitoring and analytics to continuously refine and optimize security policies, controls, and processes.

By applying these principles, organizations can create a more proactive, adaptive security posture that can detect and respond to threats faster and more effectively than traditional approaches.

Key Data Sources and Technologies for Zero Trust Monitoring and Analytics

To build a comprehensive monitoring and analytics strategy for zero trust, organizations must collect and analyze data from a wide range of sources, including:

  1. Identity and access management (IAM) systems: Data on user identities, roles, and permissions, as well as authentication and authorization events.
  2. Endpoint detection and response (EDR) tools: Data on device health, configuration, and activity, as well as potential threats and vulnerabilities.
  3. Network security tools: Data on network traffic, including flow logs, packet captures, and intrusion detection and prevention system (IDPS) events.
  4. Application performance monitoring (APM) tools: Data on application performance, errors, and potential security issues, such as injection attacks or data exfiltration attempts.
  5. Cloud security posture management (CSPM) tools: Data on cloud resource configurations, compliance with security policies, and potential misconfigurations or vulnerabilities.

To collect, process, and analyze this data, organizations can leverage a range of technologies, including:

  1. Security information and event management (SIEM) platforms: Centralized platforms for collecting, normalizing, and analyzing security event data from multiple sources.
  2. User and entity behavior analytics (UEBA) tools: Advanced analytics tools that use machine learning to identify anomalous or suspicious behavior by users, devices, and applications.
  3. Security orchestration, automation, and response (SOAR) platforms: Tools that automate and orchestrate security processes, such as incident response and remediation, based on predefined playbooks and workflows.
  4. Big data platforms: Scalable platforms for storing, processing, and analyzing large volumes of structured and unstructured security data, such as Hadoop, Spark, and Elasticsearch.

By leveraging these data sources and technologies, organizations can build a comprehensive, data-driven monitoring and analytics strategy that can detect and respond to threats in real-time.

Best Practices for Zero Trust Monitoring and Analytics

Implementing a zero trust approach to monitoring and analytics requires a comprehensive, multi-layered strategy. Here are some best practices to consider:

  1. Identify and prioritize data sources: Identify all relevant data sources across your environment, and prioritize them based on their level of risk and criticality. Focus on collecting data from high-risk sources first, such as IAM systems, EDR tools, and critical applications.
  2. Establish a centralized logging and monitoring platform: Implement a centralized platform, such as a SIEM or big data platform, to collect, normalize, and analyze security event data from multiple sources. Ensure that the platform can scale to handle the volume and variety of data generated by a zero trust environment.
  3. Implement behavioral analytics: Leverage UEBA tools and machine learning algorithms to identify anomalous or suspicious behavior by users, devices, and applications. Focus on detecting behavior that deviates from established baselines or patterns, such as unusual login attempts, data access patterns, or network traffic.
  4. Automate incident response and remediation: Implement SOAR tools and automated playbooks to quickly investigate and remediate potential threats. Ensure that playbooks are aligned with zero trust principles, such as least privilege access and continuous verification.
  5. Continuously monitor and refine policies and controls: Use insights from monitoring and analytics to continuously refine and optimize security policies, controls, and processes. Regularly review and update policies based on changes in the threat landscape, business requirements, and user behavior.
  6. Foster a culture of continuous improvement: Encourage a culture of continuous learning and improvement across the organization. Regularly share insights and lessons learned from monitoring and analytics with stakeholders, and use them to drive ongoing enhancements to the zero trust strategy.

By implementing these best practices and continuously refining your monitoring and analytics posture, you can better protect your organization’s assets and data from the risks posed by evolving threats and changing business requirements.

Conclusion

In a zero trust world, monitoring and analytics are the eyes and ears of the security organization. By continuously collecting and analyzing data from all relevant sources, organizations can detect and respond to potential threats faster and more effectively than ever before.

However, achieving effective monitoring and analytics in a zero trust model requires a commitment to leveraging the right data sources and technologies, implementing behavioral analytics and automation, and fostering a culture of continuous improvement. It also requires a shift in mindset, from a reactive, perimeter-based approach to a proactive, data-driven approach that assumes no implicit trust.

As you continue your zero trust journey, make monitoring and analytics a top priority. Invest in the tools, processes, and skills necessary to build a comprehensive monitoring and analytics strategy, and regularly assess and refine your approach to keep pace with evolving threats and business needs.

In the next post, we’ll explore the role of automation and orchestration in a zero trust model and share best practices for using these technologies to streamline security processes and accelerate incident response.

Until then, stay vigilant and keep your eyes and ears open!

Additional Resources:

The post Monitoring and Analytics: The Eyes and Ears of Zero Trust appeared first on Gigaom.

]]>
Redefining Cybersecurity: Leveraging AI for Proactive Defense https://gigaom.com/2024/06/26/redefining-cybersecurity-leveraging-ai-for-proactive-defense/ Wed, 26 Jun 2024 20:07:22 +0000 https://gigaom.com/?p=1033517 In an age where cyber threats are growing exponentially, traditional security measures are no longer sufficient. At RSAC 2024, Cisco’s Jeetu Patel

The post Redefining Cybersecurity: Leveraging AI for Proactive Defense appeared first on Gigaom.

]]>
In an age where cyber threats are growing exponentially, traditional security measures are no longer sufficient. At RSAC 2024, Cisco’s Jeetu Patel and Tom Gillis made a compelling case for the transformative power of AI in cybersecurity during their keynote presentation, “The Time is Now: Redefining Security in the Age of AI.” Their insights provide a roadmap for how AI can enhance cybersecurity, moving defenses from reactive to proactive.

The Critical Role of AI in Cybersecurity

Consider the overwhelming flood of data that cybersecurity analysts face daily. Information pours in from numerous sources, systems, and Common Vulnerabilities and Exposures (CVEs). The sheer volume and complexity can paralyze even the most skilled teams. This is where AI comes into play, acting as a sophisticated filter that consolidates, connects, and summarizes vast amounts of data. It not only identifies patterns and anomalies but also provides actionable insights tailored to specific environments.
For example, AI can transform the tedious task of CVE analysis by summarizing essential details and highlighting critical areas that need immediate attention. This enables analysts to focus on the most pressing threats, rather than getting lost in data.

Implementing AI: Governance and Strategy

However, integrating AI into cybersecurity isn’t just about adopting new technology. It requires careful planning and governance to ensure its effectiveness and ethical use. Here are some key considerations for successful implementation:

  1. Quality of Information: Feeding AI systems with high-quality, relevant data is crucial. This involves continuously updating threat intelligence to keep the AI’s analysis accurate and timely.
  2. Data Appropriateness and Rights: Ensuring the data used is appropriate and within legal and ethical boundaries protects privacy and maintains compliance.
  3. Audience Tailoring: Information must be tailored to different stakeholders within the organization, ensuring it is relevant and understandable for each group.
  4. Alignment of Value and Risk: Identifying where valuable systems and data are located and aligning them with risk assessments helps prioritize resources and efforts.

Enhancing Efficiency and Communication

One of the most transformative aspects of AI in cybersecurity is its ability to enhance efficiency and communication. AI can act as an intermediary, transforming technical information into accessible language tailored to the recipient’s role and technical understanding. This personalized interaction ensures that everyone, from technical staff to executive leaders, receives the information they need in a way that makes sense to them.

Imagine a scenario where AI not only analyzes threats but also crafts communications that consider the recipient’s technical level and concerns. For example, a CISO might receive a high-level summary of a threat with strategic recommendations, while a network engineer receives a detailed technical breakdown and specific actions to take. This personalized approach ensures that the information is relevant and actionable for each individual, enhancing overall organizational response.

Overcoming Challenges

Despite its potential, the adoption of AI in cybersecurity comes with challenges. One significant risk is the rush to implement AI technologies driven by FOMO (fear of missing out), which can lead to unnecessary risks. Companies must adopt a strategic, phased approach to integrating AI, starting with small pilot projects and gradually scaling up based on proven results.

Key Challenges and Mitigation Strategies:

  1. Over-Reliance on AI: While AI can significantly enhance cybersecurity, over-reliance can lead to complacency. Maintaining a balance between AI-driven and human oversight is essential.
  2. Data Privacy and Security: Handling sensitive information requires stringent controls to prevent breaches and misuse. Ensuring data privacy and security is paramount.
  3. Ethical Considerations: AI systems must operate within ethical boundaries, avoiding biases and ensuring fair treatment of all data subjects.

The Future of AI in Cybersecurity

AI is poised to become a cornerstone of cybersecurity, not just by enhancing threat detection and response but by transforming how organizations interact with security data. The future lies in AI’s ability to provide personalized, context-aware insights that are tailored to each user’s needs and technical level. This personalized approach will make security information more relevant, understandable, and actionable, driving better decision-making and more effective responses to cyber threats.

AI is not just a tool but a game-changer in the cybersecurity landscape, enabling us to anticipate and neutralize threats before they materialize.

By embracing AI thoughtfully and strategically, organizations can significantly enhance their cybersecurity defenses, streamline operations, and improve communication. As AI technologies continue to advance, they will play a crucial role in shaping the next generation of cybersecurity strategies, ensuring that organizations remain resilient in the face of evolving threats.

The post Redefining Cybersecurity: Leveraging AI for Proactive Defense appeared first on Gigaom.

]]>