Most Recent Blogs

Oracle Removes the Line Between Cloud & On-premises Storage

Posted: March 29, 2017   /   By: Mark Peters   /   Tags: Oracle, cloud computing, v8.7, cloud converged storage, ZFS


connected_cloud.jpgSo Oracle just announced the new 8.7 version of the OS that powers its ZFS storage systems; I try to avoid writing about specific product news too often in this blog because a) you can get product news elsewhere and b) product news is usually just iterative and rarely does it contain that much deeper industry insight. But stick with me here, as this does get way more interesting than the move from version 8.6 to version 8.7 might suggest.

To give a “you are here” starting point, the ZFS platform has been improving for years now and is a storage system to be reckoned with – its lickety-spit speed just got further enhanced with added flash pools and its tight integration with all-things-Oracle makes databases and apps verily sing. While the meatier part of the news is pretty well conveyed in the new moniker Oracle is using for its offering – “Cloud Converged Storage” – even that doesn’t quite do justice to the required-data-revolution-made-manifest that is represented here.  

Read More

RIP Raimund Genes, Trend Micro CTO

Posted: March 28, 2017   /   By: Jon Oltsik   /   Tags: Network Security, cybersecurity, endpoint security, cybercrime

speaker.jpgI learned this past Saturday that my good friend and Trend Micro CTO, Raimund Genes, passed away suddenly last week. Raimund was only 54.

Read More

Toward Strategic and Proactive Threat Intelligence Programs

Posted: March 27, 2017   /   By: Jon Oltsik   /   Tags: cybersecurity, threat intelligence, TAXII, STIX, cyber threat intelligence, ISAC

Threat_Intel.jpgIn 2015, ESG did an in-depth research project on cyber threat intelligence usage at enterprise organizations (i.e., more than 1,000 employees). The goal of this project was to determine how large firms were using threat intelligence, what challenges they faced, how they were addressing these challenges, and what their strategies were moving forward.

  • The research revealed that many threat intelligence programs were relatively immature – 40% of threat intelligence programs had been in place less than 2 years at that time. Cybersecurity professionals were also asked to identify the top objectives for their organization’s threat intelligence program. The top results were as follows:
Read More

IBM Interconnect 2017: Sharpening IBM's Enterprise Focus

Posted: March 27, 2017   /   By: Edwin Yuen   /   Tags: IBM, Cloud Computing, IBM Connect, big data and analytics

cloudy_sky.jpgIt certainly is an exciting time in the cloud landscape, with all the major vendors starting their summer show season and making their major announcements. At first glance, it can be a confusing world, with all the vendors giving similar messaging and along with it, promoting extremely similar features and functions.

One of the prime differences between the cloud vendors is how they are reaching out to and marketing at enterprise customers. For the "new," cloud-born vendors, much of their work started either with consumer applications or by getting new, emerging companies to use their services. Great examples of this would be Amazon Web Services (AWS) and Google Cloud. AWS certainly has ramped up its enterprise focus over the past two years, with a growing enterprise sales force and new purchasing options. As I noted in my blog about Google Next 2017, Google has made a significant shift with a new go-to-market effort for enterprise customers and new product announcements with a distinct enterprise product set. Both of these companies are leveraging their innovations and targeting enterprises with them.

Read More

Software-defined Perimeters: An Architectural View of SDP

Posted: March 27, 2017   /   By: Dan Conde   /   Tags: networking


Software-defined perimeters (SDP) is an emerging security architecture that restricts network access and connections between allowed elements. With origins in defense IT infrastructure and spreading to enterprise use, it promises to help mitigate a broad set of security vulnerabilities that afflict IT infrastructure protected by conventional perimeter security. SDP serves to identify the source and destination of a network connection and assumes that there is no trust between potential participants and that a secure connection is only granted when explicitly permitted.

Read More

Google Cloud and the Network Engineer

Posted: March 23, 2017   /   By: Dan Conde   /   Tags: Cloud Computing, networking


Using a cloud platform like Google's can enable network engineers to shift to a strategic focus.
As enterprises move their workloads to cloud providers such as Google, network engineers may wonder what role they will play in the future. Of course, they will continue to have a role in campus networking – running wireless access points, or WANs (in particular SD-WANs) to connect far-flung offices. But what about in the data center as their workloads move to the cloud?

Read the rest on Network Computing.

Read More

'Hybrid IT' Is Great – Unless It’s Just Pretend

Posted: March 22, 2017   /   By: Mark Peters   /   Tags: hybrid IT

hybrid-it.jpgPretty much every IT practitioner I talk with agrees that “hybrid IT” is going to be the norm for the foreseeable future. Conceptually I agree…and I recently blogged about a very simple way to look at this hybrid IT world that will underpin the delivery of contemporary applications (take a look at that video blog, "The Three-legged IT Stool").

Read More

Wi-Fi Calling - a Big Win and a Big Loss

Posted: March 22, 2017   /   By: Dan Conde   /   Tags: Cloud Computing, networking


Wi-Fi calling promises to help people who have crappy mobile phone coverage. I had a good experience and a crappy experience. Here's what happened. 

I go on a mini-rant on networking configurations.

I was visiting an office building with a colleague and I lost coverage deep in the building, and so did my colleague, who had a different phone and carrier than me. He had a conference call to make. One choice was to go outside but it wasn't ideal so he switched to Wi-Fi calling and it all worked fine within the building.  

Read More

Cloud Security: Still a Work in Progress

Posted: March 21, 2017   /   By: Jon Oltsik   /   Tags: Cloud Computing, cybersecurity, CISO, cloud security

cloud_lock.jpgA few years ago, ESG (and other) research indicated that security concerns posed the biggest impediment for more pervasive use of cloud computing. What happened next? Business executives and CIOs found that cloud agility, flexibility, and potential cost savings were too good to pass up, creating a “cloud or bust” mentality. Naturally, CISOs had to do their best and go along for the ride whether they were ready or not.

So, how’s cloud security going at this point? ESG research indicates it is still a work in progress. As part of a recent survey, cybersecurity professionals were presented with a series of statements about cloud security and asked whether they agreed or disagreed with each one. Here are some of the results:

Read More

Strata Data Conference Gets Good

Posted: March 20, 2017   /   By: Nik Rouda   /   Tags: Strata+Hadoop World, Strata Data conference

Big_data_future.jpgLast week we saw the rebranding of Strata + Hadoop World as the new Strata Data Conference. This name change reflects the nature of the content, which is decreasingly about specific Hadoop projects and increasingly about how to get analytics value from any data anywhere. Beyond that, the show reinforced several key themes I've been predicting for some time.

Read More

Posts by Topic

see all