Demonstrates transition in security analytics Over the past few years, a number of independent Security Information and Event Management (SIEM) vendors were acquired by bigger players. In late 2010, HP scooped up market leader ArcSight for $1.5 billion. Last year, McAfee purchased Nitro Security while IBM acquired Q1 Labs.In each of these deals, large vendors were using these acquisitions to bolster existing security offerings, replace legacy SIEM platforms, or filling holes in their portfolios to grow their security businesses. Kind of like your local general contractor buying a few new Chevy vans and some extension ladders.This consistent pattern is what makes Tibco’s acquisition of LogLogic this past April so fascinating. Tibco isn’t a security technology vendor at all but rather describes itself as, “a provider of infrastructure software for companies to use on-premise or as part of cloud computing environments.” Hmm, so did the folks at Tibco suffer from temporary insanity when they grabbed LogLogic? Not at all. In fact, this deal really demonstrates some vision on Tibco’s part. The deal makes a ton of sense because:1. Security management is moving toward an enterprise software architecture. In the past, threat management, risk management, and SIEM tools tended to be deployed and operate independently. Given today’s threat landscape, IT complexity, and security requirements however, the existing army of discrete point is no longer adequate for large enterprises. What’s needed? Tight integration between centralized command-and-control, distributed enforcement technologies, intelligence-gathering sensors, and real-time situational awareness. In other words, security technologies need to be tightly integrated together with a common software infrastructure in order to exchange application-layer messages across the enterprise — exactly what Tibco provides. 2. Security = big data analytics. Large organizations are collecting, processing, and analyzing a growing mountain of data — logs, events, packet capture, etc. This type of scaling requirement is simply beyond the scope of many security-focused SIEM tools and security vendors but it is a core skill set for Tibco.3. Security intelligence extends to the cloud. As large organizations embrace SaaS in lieu of internal applications or burst processing capacity to the cloud, security intelligence must come along for the ride. Tibco is well down this road at the business application level giving it the cloud integration chops to apply to burgeoning cloud security integration requirements. Given this emerging sophisticated security software architecture, the list of potential competitors here is pretty thin. IBM can match Tibco in terms of software integration technologies, enterprise software architecture skills, and a leading SIEM platform. HP, McAfee, and RSA don’t have the wealth of software integration assets but these vendors understand enterprise requirements, have strong security portfolios and are headed in the right direction. That’s about it.The risk here is that in spite of all of its strengths, information security is simply too foreign and doesn’t align with core Tibco skills and execution. Maybe, but you have to give the folks at Tibco kudos for recognizing a tangential and potentially lucrative opportunity and having the chutzpah to jump into next-generation security intelligence with both feet. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe