Dan Kirsch

Daniel Kirsch is a Senior Analyst. Dan’s research areas include: governance, security, mobility and privacy.

February 1, 2018

How Intelligent is your Machine Learning Application?

There is a tremendous amount of excitement and hype around machine learning. Machine Learning (ML) and Artificial Intelligence (AI) are often trumpeted as cure-alls that can help businesses anticipate and prepare for the future. In reality, we are just beginning to see these technologies evolve into commercially viable offerings. The real value of machine learning […]

December 1, 2016

Understanding the Business Implications of the GDPR

With the growing importance of data analytics, businesses are discovering that they must walk a fine line  in how they handle and manage customer data. Data privacy both  from both regulatory and reputational standpoints is requiring companies to move cautiously. The latest round of regulations, including the EU’s GDPR, comes with stiff financial penalties for […]

October 13, 2015

Why partnerships are key to building Internet of Things solutions

In a recent Hurwitz survey of companies building IoT solutions, one key finding made a big impression on me: More than 90% of respondents work with one or more partners to develop and manufacture their IoT solutions. Looking deeper into the survey findings, I could find many reasons why companies are finding partnerships essential to […]

October 1, 2013

Splunk Offers a Powerful Platform — Will They Capitalize on the Opportunity for Growth?

Godfrey Sullivan’s Keynote for this year’s Splunk User Conference had the audience buzzing with excitement as Splunk Version 6 and Splunk Cloud were announced.  Both offerings are intended to allow business users to gain more actionable insight from Splunk’s ability to capture, store and search nearly any type of log-data.  Fraud detection for financial services companies was […]

January 30, 2013

The Emergence of Big Data Security Intelligence

What’s Driving Big Data Security Intelligence? There is a new generation of security offerings that can anticipate threats and prevent them in real-time.  This new generation of offerings is emerging because of an increase level of risk.  Traditionally, security systems have worked by collecting and analyzing logs and then setting alerts to trigger action when […]

July 31, 2012

Strategies to confront the rising democratization of IT

How employee’s use of cloud services are changing the way IT handles security Cloud computing has given business users the power to use sophisticated cloud services without the need to go through IT.  Well-meaning employees do not think about the potential risks associated with the cloud.  Software as a Service (SaaS) offerings like Facebook, Dropbox […]

May 2, 2012

Device Management Strategies Must Adapt to New User Expectations

The Rise of BYOD Workplaces Bring your own device (BYOD) to work is a growing trend across all industries.  The idea that an employee, customer, or partner will access your network with any device they choose was unheard of only a few years ago it wasn’t long ago that companies had strict policies on what […]

December 21, 2011

Holes in Endpoint Security

There is an avalanche of devices and end points that employees, customers and partners are beginning to utilize as they conduct even routine business transactions. An end point device might be a PC, smart phone or even a flash drive. The challenges of IT security are complicating the ability of organizations to protect their intellectual […]

October 20, 2011

IBM Rethinks its Security Strategy

IBM is making a major push to try to establish leadership in the broad market for security, compliance, and governance.  The company’s latest foray is significant with the  acquisition of Q1 Labs.   On its own, this is an important acquisition because the company has developed significant intellectual property in security intelligence products in vital areas […]