In order to assess the current state of the server virtualization market, ESG recently surveyed 463 North America-based senior IT professionals representing large midmarket (500 to 999 employees) and enterprise-class (1,000 employees or more) organizations. All respondents were personally responsible for managing or overseeing IT products, services, and strategies and their organizations had to be current users of server virtualization technology. Additionally, respondents were required to have in-depth knowledge of at least one virtualization adjacent technology area—including server, storage, and networking infrastructure; information security; or business applications—in the context of server virtualization technology.
Mobile devices are everywhere! Unfortunately, this means that confidential data that was once limited to Windows PCs is now available to Blackberrys, Droids, and iPhones. Many vendors are introducing mobile security tools for confidential data protection, but ESG research data indicates that establishing strong confidential data security policies for mobile devices provides a strong foundation for secure and productive mobile device use.
Whether you are a global systems integrator, IT vendor professional services group, cloud/XaaS provider, or boutique consulting firm, aligning your services with customer needs is a requirement for growth and success. However, fully understanding where the majority of clients are in their technology lifecycles can be a difficult and time-consuming process. Leveraging a research-backed maturity model provides the requisite insight and knowledge to drive tight alignment between service offerings and end-user needs.
Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s information security service. With over 25 years of technology industry experience, Jon is widely recognized as an expert in all aspects of information security and is often called upon to help customers understand a CISO's perspective and strategies. Recently, Jon has been an active participant with cybersecurity issues, legislation, and technology within the U.S. federal government.
© 2015 by The Enterprise Strategy Group, 20 Asylum Street, Milford, MA 01757 508.482.0188
Enter your email address, and click subscribe