Most Recent Blogs

That was Fast! HPE Closes SimpliVity Acquisition

Posted: February 24, 2017   /   By: Terri McClure   /   Tags: nutanix, Simplivity, HPE, dell-emc, hyperconverged


GettyImages-588266018.jpgThat was fast! HPE only announced it planned to acquire hyperconverged software vendor SimpliVity on January 17, and it closed exactly one month later, on February 17. Why the hurry? Because they need to!

You can't let a market get away from you, and hyperconverged is a fast growing market. When ESG surveyed IT managers responsible for cloud infrastructure decisions, we learned that hyperconverged systems are playing a huge role in IT's plans. When ESG surveyed IT managers responsible for cloud infrastructure, we found that 85% of them are using or plan to adopt hyperconverged solutions. 

Read More

NY State Cybersecurity Regulations: Who Wins?

Posted: February 23, 2017   /   By: Jon Oltsik   /   Tags: cybersecurity, CISO, IAM, encryption, SOAPA, financial services, DFS 23 NYCRR 500

hero-newyork.jpgAs you probably know by now, on February 16, the State of New York’s Department of Financial Services (DFS) finalized its new cybersecurity regulations which take effect on March 1, 2017. 

Read More

The Big Data Bubble Rises

Posted: February 21, 2017   /   By: Nik Rouda   /   Tags: Big Data

bubble.jpgAs the father of two girls, I have deep appreciation for a fascination with bubbles. They are easy to make, they're shiny, and they float carelessly with the breeze. That said, a big bubble is much harder to create and more fragile than dozens of little ones. The loss is felt more acutely.

Read More

New York State Cybersecurity Rules and the Skills Shortage

Posted: February 21, 2017   /   By: Jon Oltsik   /   Tags: cybersecurity, regulations, 23 NYCRR 500

GettyImages-483118009.jpgWhile the cybersecurity industry was knee-deep in vision, rhetoric, and endless cocktail parties at the RSA Conference, the State of New York introduced new cybersecurity regulations for the financial services industry. The DFS regulations (23 NYCRR 500) go into effect next week on March 1, 2017. Here’s a link to a pdf document describing the regulations. 

Anyone who has reviewed similar cybersecurity regulations will find requirements in 23 NYCRR 500, so while the regulations are somewhat broader than other similar stipulations, there are obvious common threads. In reviewing the document, however, section 500.10 caught my eye. Here is the text from this section:

Read More

The Contemporary Opportunity for Traditional IT Hardware (Video)

Posted: February 21, 2017   /   By: Mark Peters   /   Tags: Storage, IT Infrastructure

Mark_Peters.pngDespite the fact that most things in the big wide world of infrastructure actually change relatively slowly in the practical air of data centers, we nonetheless love to talk about actual and impending changes in far more hyperbolic and dramatic ways. I guess cataclysmic statements are more exciting than pragmatic progress!?

Anyhow, while I am certainly a believer in the value of many, varied types of cloud deployments, I am certainly not a believer in the meteor-hits-earth type of prognostications about the end of on-premises infrastructure, neither by type nor location! Traditional hardware is not going away - at least not for the foreseeable future.

Read More

RSA 2017 - Security Pains for Software Providers and Government

Posted: February 17, 2017   /   By: Dan Conde   /   Tags: Cloud Computing, cybersecurity, networking

IMG_20170216_150533328.jpg

As the RSA Conference continues to grow, I saw two ends of the spectrum related to solving security problems. At one end is a software provider, AutoDesk, which is figuring out how to provide security while they adopt cloud computing, SaaS, open source, and CI/CD methods. At the other end were the challenges of the US Federal government in delivering cybersecurity in an always connected world.

Read More

RSA - Detaching Hype from Reality

Posted: February 16, 2017   /   By: Dan Conde   /   Tags: Cloud Computing, cybersecurity, networking

IMG_20170215_111235349.jpg

As the RSA Conference continues to grow, along with interest in cybersecurity, many solutions presented at the show strive to rise above the fray of similar messages and voices. Of interest in the last few years have been the application of AI, machine learning, and big data analytics to the problem of improving security.

That is a fine thing, provided it is not treated as a magic bullet. If it gets overhyped, there will be a danger of backlash.

 

Read More

In and Around the 2017 RSA Conference

Posted: February 15, 2017   /   By: Jon Oltsik   /   Tags: cybersecurity, endpoint security, security analytics, security operations, SOAPA

ASan_Francisco_Cable_Car.jpgs you may have guessed from my blogs, I was really excited about this year’s RSA Security Conference. At the end of January, I wrote a blog about my expectations for endpoint security at RSA. I followed up with another ditty about network security banter at this year’s show and concluded the series with a blog about security analytics and operations talk at RSA. 

Yup, I was all set to head to San Francisco at the end of last week when fate and personal issues jumped in. Alas, I had to cancel my plans.    

Despite my geographic separation, I continue to monitor RSA from afar. Here are a few stories that jumped out at me as of now:

Read More

Y Evolve Your Data Protection Strategy in 2017 (Video)

Posted: February 10, 2017   /   By: Jason Buffington   /   Tags: Backup, data protection, BC/DR (business continuity/disaster recovery), High Availability, copy data management,, data mangement

Y2017.jpegToday’s message is brought to you by the letter “Y” and the numbers “1” and “7.”

Most data protection conversations are evolving from “backup” to “recovery” – and to do that, you need to evolve from simply using backup mechanisms to a combination of backups, snapshots, and replicas. And some vendors are there (YAY)!

But then, many vendors, and providers, and partners, and IT teams get stuck at a crossroads – where their data protection strategy must further evolve down one of two paths, with very few vendors able to offer journeys down both long and winding roads: Data Management & Data Availability.

Here is a short video on Y and how your data protection technologies must evolve.

Read More

Highlights from Spark Summit East

Posted: February 10, 2017   /   By: Nik Rouda   /   Tags: big data and analytics, spark summit, apache spark

event_speaker.jpgOver the last couple of days, I've enjoyed meeting with business and technology leaders around Apache Spark. Hosted in Boston this time, the Spark Summits in general have become great forums to learn about what's new, what's working, and what's coming up next. Here are my quick takes if you weren't able to attend (and missed the thunder snowstorm, WHAT?!?) Highlights included:

Read More

Posts by Topic

see all