Delta-V Awards - 2016 Edition - The Top Five

Ladies and gentlemen, data scientists of all ages, here is the big finale to 2016. The ne plus ultra companies that have accelerated and improved their positions in the big data and analytics marketplace. It's been no easy task to select, much less rank, all the top 20. I'd like to also note once more that there are many, many other worthy companies ticking right along and executing on their vision, earning new customers, and generally succeeding. And yes, it's all a bit subjective, but I truly believe these are ones that have made the most progress. Here are my final five choices:

Topics: Analytics Big Data Data Management Teradata MapR Amazon Web Services delta-v awards google cloud platform Confluent

Delta-V Awards - 2016 Edition - 10 to 6

New to this year's Delta-V citations? Check out our previous winners ranked 20 to 16 here and 15 to 11 here. As we move into the top 10 count down, it's probably worth a reminder that these 20 companies were chosen for their impact on the big data and analytics market. They aren't necessarily ESG clients, either, in fact fewer than half have done any official project work with me in the past year. It's all about recognizing innovation, pure and simple. That said, let's roll right into the next quintet!

Topics: Analytics Big Data Data Management Oracle bluedata delta-v awards Cask Qubole ClearDB

Looking Back to Look Forward on Cybersecurity

By now, everyone in our industry has provided 2017 cybersecurity predictions and I’m no exception. I participated in a 2017 infosec forecast webcast with industry guru Bruce Schneier, and ESG also published a video where I exchanged cybersecurity prophecies with my colleague Doug Cahill.

Topics: Network Security Cybersecurity endpoint security NIST cloud security ISSA

Delta-V Awards - 2016 Edition - 15 to 11

If you're just joining us now, please see the previous post for winner numbers 20 to 16. We'll continue to recognize the top 20 companies that accelerated the big data and analytics marketplace this year with a countdown from 15 to 11 here:

Topics: Big Data Data Management Data Analytics

Delta-V Awards - 2016 Edition - 20 to 16

It's that time again. Time to reflect on the year that was. And what a year it was for big data and analytics, with many massive advances in the technologies that power our understanding of the world around us. I don't know about you, but I certainly need a better understanding of the world. Thankfully, the industry continues to deliver innovations and gives me plenty of choices for recognizing those companies whose efforts are changing the velocity of insights. An introduction to the Delta-V awards and past winners can be found here. 

Topics: Big Data Data Management Data Analytics

ESG 2017 Predictions - Enterprise Mobility (Video)

The pace of technology change and fascinating business innovations were the highlights of 2016, but I think we are just starting to see how mobility is impacting the world. I’m excited to watch the blending of old and new technology inside of businesses as they look to deliver a high quality secure experience for end-users in 2017. My curiosity is piqued in many areas for the coming year, but I took a moment to highlight these topics in the following video.

  • Cloud-hosted workspaces
  • Threat management enablement
  • A new generation of IT decision makers
Topics: Enterprise Mobility 2017 predictions

High Demand Cybersecurity Skills in 2017

As I’ve written many times, the cybersecurity skills shortage is the biggest cybersecurity issue we face today. Not only are there too few bodies to fill the cybersecurity jobs, but a recent series of research reports from ESG and the Information Systems Security Association (ISSA) indicates that many currently employed cybersecurity professionals are overworked, not managing their careers proactively, and not receiving the proper amount of training to stay ahead of increasingly dangerous threats. Yikes!

Topics: Cybersecurity cybersecurity skills shortage CISO cloud security application security security analyst security engineer penetration testing

…and they wonder why IT partners aren’t seeing blue skies in the cloud

 

Our vendor clients tell us they have a problem: How do I get my partners to sell more of my cloud solutions? Recent announcements by the big cloud providers may point to some reasons why.

#1: On day one of the recent re:Invent conference, Andy Jassy, CEO of Amazon Web Services (AWS) sent a warning shot to the room full of IT partners: 

"The reality is we are going to direct business to our partners who are committed and who really understand the platform because our customers want partners who understand the details of our platform," he said. "I'm not suggesting that you shouldn't have other partners, that you should dump your other partnerships, but I am saying that I think a strategy of hedging is the wrong one for this time.”

Translation: Nice to see you, but you better get on the AWS train or risk being marginalized!

Topics: channel cloud channel partner

Driving Infrastructure Value (includes Video)

 

As a lover of analogies I often find that I am using comparisons to cars and other vehicles in this job; having spent decades concentrating on the data storage market it has consistently been convenient to compare various product releases to various car brands and/or types - thus we can see Rolls Royce or Toyota Camry type products, or perhaps compare the general purpose attributes of an SUV-type storage system against those of something more akin to the storage equivalent of a sports car or truck. Everyone uses cars - and vehicular transport more generally - and so it's a very easy and colorful way to get the point across.

Topics: Storage hybrid cloud Converged Infrastructure infrastructure build or buy

New Research Reveals Cybersecurity Skills Shortage Impact

When it comes to the cybersecurity skills shortage, I am somewhat of a “Chicken Little” as I’ve been screaming about this issue for the last 5 years or so. As an example, ESG research conducted in early 2016 indicated that 46% of organizations said that they have a problematic shortage of cybersecurity skills.

Topics: Cybersecurity cybersecurity skills shortage NICE NIST ISSA

Predictions For Storage in 2017 (Video)

 

In all the excitement of Thanksgiving...that rolls to Black Friday...that increasingly seems to merge with Christmas, it's good to remember another tradition for this time of the year.....it's time to make some industry predictions!

The data storage industry is my main "beat" - and one way or another has been for three decades - so it is fascinating to watch it changing so dramatically. Some of the changes are probably somewhat obscured from those users that are - perfectly justifiably - still on the venerable "iterative-technology-generations-track," but the changes need to be watched closely by everyone because they hold huge potential for better business outcomes - which means that in a few years the traditional approaches to storage probably won't actually be a choice, even by default.

Topics: Storage 2017 predictions

Why CISOs Succeed and Why They Leave

Earlier this year, ESG and the Information Systems Security Association (ISSA) published a research report titled, The State of Cyber Security Careers. The report was based on a survey of 437 cybersecurity professionals, the clear majority of which were ISSA members.

Topics: Cybersecurity CISO CSO CEO

Threats and Industry Dynamics on the 2017 Cybersecurity Radar Screen (Video)



It was another notable year in cybersecurity, including the politically motivated DNC hack and WikiLeaks postings, ransomware rising to epidemic levels as this form of cybercrime grew to a $1B+ business, and the to-be-determined motivation behind the IoT botnet DDoS attack on Dyn’s DNS service. It was also a year that saw major industry moves with Symantec and BlueCoat merging and private equity taking an increasingly larger role with McAfee and RSA going private and the largest security reseller, Optiv, changing PE owners. 

With 2016 in the rear view mirror, it’s time to look ahead to 2017. The unpredictable twists and turns of the recent election in the States makes me disinclined to make predictions, so let’s call these items on the radar screen. My colleague Jon Oltsik and I share what we have on our radar screen for the coming year across the spectrum of threats, governmental regulations, industry dynamics, and more in this two-part video series. All the best in 2017!

Topics: Cybersecurity US government ransomware cyber-attacks 2017 predictions

A Slimmer HPE Means There’s More to “Discover?" (Includes Video)

As is now traditional, HPE follows the US Thanksgiving celebrations with its Discover event in Europe. Just last week thousands of loyal HPE users, potential users, and a bunch of market watchers turned up in London's Docklands to hear what the company had to show and tell.

Taking a hint from the [surprising] local weather, HPE sported a decidedly sunny disposition all week. Perhaps that's to be expected after the HP split and the more recent - ongoing – spin-out/mergers of the software and services parts of the business. This is clearly a middle-aged company that has shed weight...the question now is how nimble and nifty it can be while remaining both valuable and invaluable to its customers. I add some extra commentary below, but first please take a look at the video blog I put together at Discover - a quick skim across a very large pond.

Topics: Storage London HPE HPE Discover Hewlett Packard Enterprise

Trump Cybersecurity Dos and Don’ts (Part 2)

Given recent cybersecurity incidents like the Google Android data breach, the DDoS attack on Dyn and the data breach of the DNC, President-elect Donald Trump will find cybersecurity policy a top priority when he takes office in January.

What should Mr. Trump do and what should he avoid? In my last blog, I presented some recommendations for the “do” column. Alternatively, here is a list of things President Trump should eschew in his administration’s cybersecurity agenda. The “don’t” column includes the following:

Topics: Cybersecurity Donald Trump POTUS

How Two Different Approaches to Common Management of Clouds are Delivering Hybrid Cloud

 

This is part 5, the last in a series of blogs that I have been doing on systems management and hybrid cloud. For those new to this series, I have been writing about the need to better define hybrid cloud and I have laid out three types of hybrid cloud:

  • Common Platform – Where the base infrastructure/virtualization platform are the same, allowing the common use of existing management tools and processes.
  • Common Applications/APIs – Where the end applications or application APIs are the same, allowing common applications to be developed across different platforms.
  • Common Management – Where the management tools have the capability to manage all the different environments, with a common interface and process.

In this part, I’m going to cover what many people define as hybrid cloud, which is using a common management layer to manage across disparate cloud environments. This management architecture, which I call common management hybrid cloud, is the one that most vendors are pushing and the one companies are either familiar with or are already implementing. What is interesting about this type of hybrid cloud is how the management software vendors are approaching the same basic concept of cross or multi-cloud management.

Topics: hybrid cloud Systems Management

With Trust Established, Security Less of a Focus at AWS re:Invent 2016

Security has been a pillar of the Day 1 keynote in each of the four AWS re:Invents I’ve attended, with new partners and services rolled out to assuage concerns that the cloud isn’t secure and to convey that AWS takes security very, very seriously. Not this year. Security was a modest part of the Day 2 keynote. As a security analyst, I couldn’t help but feel a bit bummed out, but I get it—there’s a bigger context here: the maturity of cloud adoption and its role in contemporary business models.

Topics: Cybersecurity AWS Trust AWS re:Invent

Time to Stop Buying IT Hardware for Your Data Center

I recently attended AWS re:Invent, and while I have seen some pretty impressive business use cases that have bent their strategies toward the cloud, I walked away truly wondering why businesses would ever purchase a piece of IT infrastructure again. Let’s face it, managing IT infrastructure has been one of the most difficult and specialized jobs of IT, and most IT organizations do an amazing job at managing complex architectures, but why continue to do so?

Topics: cloud Enterprise Mobility

Trump Cybersecurity Dos and Don’ts

President-elect Donald Trump ran a campaign focused on national security and making America great again through economic reform. Clearly both goals should include policies and programs to bolster the nation’s cybersecurity capabilities. This shouldn’t be an abstract concept to Mr. Trump after an election cycle featuring Russian hacks and WikiLeaks posts. 

To reinforce this priority, it is also worth noting that in a pre-election survey by ESG research, 49% of cybersecurity professionals said that cybersecurity is a critical issue and should be the top national security priority for the next President while 45% said cybersecurity is a very important issue and should be one of the top national security priorities for the next President. If those citizens on the front-line see cybersecurity as a major priority, this should speak volumes to the President-elect. 

Topics: Cybersecurity NICE nsa NIST NSF Barack Obama Donald Trump United States of America