Mark Bowker

Mark Bowker

Senior Analyst Mark Bowker focuses on all things related to virtualization and cloud computing. Mark researches cloud and virtualization technologies and evaluates the impact the solutions have (or will have) on IT strategy and the broader marketplace. His other research areas include data center management, application workload deployment in next-generation data centers, and the external influences driving adoption of data center technologies.

Recent Posts by Mark Bowker:

ESG at RSA: Identity, No Passwords, and Email Security (Video)

In this video, ESG analysts Mark Bowker and Jon Oltsik run through some of the top topics they will be tuning into at RSA Conference 2018. Mark and Jon home in on how identity has become the control plane and how the software-defined perimeter is impacting the CISO's decision making process and future investments. 

Topics: Cybersecurity identity and access management RSA Security Conference software-defined perimeter

2018 Enterprise Mobility Spending Trends Video

As part of ESG’s 2018 IT spending intentions research, IT decision makers were asked about their spending plans for enterprise mobility technology over the next 12 months. In this video, you'll learn about where enterprises are focusing their mobility spending, spending priorities, and changes in spending.

Topics: IT Spending Intentions Enterprise Mobility

Okta and ServiceNow Help Solve Organizational Pressures

There are two primary problems with managing identity:

  • Fractured user authentication across networks, applications, and devices.
  • Organizational gaps between IT operations and information security.
Topics: ServiceNow Okta

2018 Goodbye Password....Hello Bots and Machine Learning

2018-mobility-predictions.jpgBusinesses can no longer compromise security for user experience and should look to strengthen security while improving productivity. Doug Cahill and I share our insights into how companies have the opportunity to improve their security posture while embracing mobility.

Topics: Cybersecurity machine learning Enterprise Mobility 2018 Predictions

Say Goodbye to Passwords in 2018

Passwords. They’ve always been an ongoing IT issue, but that subject is becoming exceptionally serious as organizations strive to support a rapidly growing mobile workforce using ever-increasing numbers of devices, and consuming more and more applications from external cloud platforms. Passwords are:

  • Easily forgotten and easy to guess.
  • Used across multiple devices and locations resulting in an expanded attack surface.
  • A significant expense and drain on IT resources.
  • Difficult to enter on mobile devices.
Topics: Cybersecurity multi-factor authentication Enterprise Mobility Fast Identity Online Alliance

ESG360 Video: Who Owns Identity and Access Management (IAM)?

Mobility and cybersecurity. While those two areas may have very different roles inside an IT organization and business, they both play integral parts in identity and access management. Given that, I’m always getting asked, “Who owns IAM?”

Topics: Cybersecurity identity and access management Enterprise Mobility

Why Companies Need to Protect Their Employees’ Corporate Identities (Video)

More and more people are proactively protecting their personal identities. But it’s not only individuals that must take steps to keep their identities safe. Companies must also be vigilant about protecting corporate identities. Between fraud and identity theft, and bad actors committing nefarious acts while impersonating a company’s CEO, the integrity of a company can easily be compromised.

Topics: Cybersecurity identity Enterprise Mobility

Who Owns Identity and Access Management (IAM)? (Video)

When it comes to identity and access management (IAM), the cloud, mobility initiatives, and app dev are driving chaos. Security risks are on the rise due to the expanded perimeter, and though IT operations shoulders a great deal of IAM responsibility, who actually owns identity and access management?

The answer isn’t clear-cut. It actually depends on a number of things, including: an organization’s maturity, its security posture, and how aggressively the company is pursuing identity and access management strategies.

Topics: identity and access management Enterprise Mobility

How Is Identity and Access Management (IAM) Changing (Video)

With growing numbers of people using personal devices for work, most organizations no longer have ultimate control over their employees' devices. Today, it’s essential for CISOs and other security professionals to provide their employees with safe and secure access to the corporate data, applications, and devices they need to perform their jobs. Across industries, organizations are dealing with this challenging lack of corporate control, combined with the necessity of ensuring security, and providing employees with easy access.

Topics: Security identity and access management Enterprise Mobility

Synchronoss Technologies Welcomes New CEO, Glenn Lurie (and a Potential Boost to Business)

Synchronoss is excited about having Glenn Lurie as its new CEO—and no wonder. With some business “speed bumps” at Synchronoss, Lurie’s leadership experience and business relationships (after all, he was AT&T’s Mobility and Consumer Operations President and CEO) will give Synchronoss an opportunity to tune its focus in the market, and potentially create significant partnerships with technology, media, and telecommunications (TMT) ecosystems. Lurie clearly recognizes the multiple market opportunities Synchronoss has right in front of it, and is able to swiftly connect the dots between Synchronoss innovation, TMT ecosystems, and the digital transformation increasing numbers of companies are undergoing. 

Topics: Synchronoss