Mark Bowker

Mark Bowker

Senior Analyst Mark Bowker focuses on all things related to virtualization and cloud computing. Mark researches cloud and virtualization technologies and evaluates the impact the solutions have (or will have) on IT strategy and the broader marketplace. His other research areas include data center management, application workload deployment in next-generation data centers, and the external influences driving adoption of data center technologies.

Recent Posts by Mark Bowker:

Why Companies Need to Protect Their Employees’ Corporate Identities (Video)

More and more people are proactively protecting their personal identities. But it’s not only individuals that must take steps to keep their identities safe. Companies must also be vigilant about protecting corporate identities. Between fraud and identity theft, and bad actors committing nefarious acts while impersonating a company’s CEO, the integrity of a company can easily be compromised.

Topics: Cybersecurity identity Enterprise Mobility

Who Owns Identity and Access Management (IAM)? (Video)

When it comes to identity and access management (IAM), the cloud, mobility initiatives, and app dev are driving chaos. Security risks are on the rise due to the expanded perimeter, and though IT operations shoulders a great deal of IAM responsibility, who actually owns identity and access management?

The answer isn’t clear-cut. It actually depends on a number of things, including: an organization’s maturity, its security posture, and how aggressively the company is pursuing identity and access management strategies.

Topics: identity and access management Enterprise Mobility

How Is Identity and Access Management (IAM) Changing (Video)

With growing numbers of people using personal devices for work, most organizations no longer have ultimate control over their employees' devices. Today, it’s essential for CISOs and other security professionals to provide their employees with safe and secure access to the corporate data, applications, and devices they need to perform their jobs. Across industries, organizations are dealing with this challenging lack of corporate control, combined with the necessity of ensuring security, and providing employees with easy access.

Topics: Security identity and access management Enterprise Mobility

Synchronoss Technologies Welcomes New CEO, Glenn Lurie (and a Potential Boost to Business)

Synchronoss is excited about having Glenn Lurie as its new CEO—and no wonder. With some business “speed bumps” at Synchronoss, Lurie’s leadership experience and business relationships (after all, he was AT&T’s Mobility and Consumer Operations President and CEO) will give Synchronoss an opportunity to tune its focus in the market, and potentially create significant partnerships with technology, media, and telecommunications (TMT) ecosystems. Lurie clearly recognizes the multiple market opportunities Synchronoss has right in front of it, and is able to swiftly connect the dots between Synchronoss innovation, TMT ecosystems, and the digital transformation increasing numbers of companies are undergoing. 

Topics: Synchronoss

Cybersecurity, Mobility, and the Expanding Perimeter (Video)

As businesses lose control of devices and rapidly adopt cloud consumption models, identity and data have become the new perimeter for IT operations and information security teams to secure and protect. My colleague Jon Oltsik and I sit down together to highlight how mobility, identity, and security are creating technology challenges, organizational barriers, and business risks as the security perimeter expands at a faster pace than business can keep up with. The discussion sparks attention towards the IT vendors that are attempting to enhance security postures from within a silo as opposed to the new purview business are dealing with today.

Topics: Cybersecurity identity and access management Enterprise Mobility

Identity and Access Management (IAM) Has Been in Babysitting Mode for Years...Something Must Change!

IAM creates the first link in the “chain of trust” when a user, device, or a connected thing authenticates with a trusted source. Establishing this initial handshake is critical since it initializes the path to access and authorization—no wonder IAM has quickly become a renewed focal point for IT operations and information security professionals. To that end, ESG recently completed an IAM research study to validate existing business pain points around authentication, IAM professional white board priorities, and opportunities for IAM vendors to differentiate themselves amongst the countless tools littering a complex IAM landscape that are leading to buyer confusion.

Topics: identity and access management

Microsoft Top of Mind for Business after Attending Ignite (Video)

Attendees walked away from Microsoft Ignite and Envision with plentiful ideas and possibilities. This year's event was rich in vision, innovation and business strategy, and aligns well with where businesses remain challenged with cloud, mobility, and security initiatives. Microsoft raised its game and the volume to the enterprise customer and did an admirable job shifting Microsoft to the top of minds of IT pros and business executives.

While Microsoft has made strides in the market, the company also needs to remain humble and empathize with its customers. For example, if a customer is on the latest version of Windows 10 and has strategically positioned apps in Azure while using Microsoft identity and conditional access, then they will have set themselves up with a strong security posture, but not all businesses have achieved this desired state. The onus is then on Microsoft to transform its go-to-market partners and system integrators to help create the market traction and execution success.

Topics: Microsoft Enterprise Mobility Microsoft Ignite

Top Three VDI Challenges (Video)

VDI is alive and well as it helps businesses transition to Windows 10, simplify patching and updating, and deliver secure workspaces. However, when I speak with IT pros, they share common challenges that still need to be addressed by the IT vendors. While these VDI challenges have been consistent, IT vendors have an opportunity to provide further clarity for their customers. The IT vendors can also take the opportunity to help IT pros cross organizational boundaries with metrics and educational tools that help arm the IT pros with language, value propositions, and benefit analysis that tones down the IT speak and amplifies the value to the business. 

Topics: VDI Cloud Platforms & Services virtual desktop infrastructure

Microsoft Ignite Enterprise Mobility and Security Highlights

For enterprise IT shops that may have been dismissive of Microsoft as they plan and implement their mobility strategies, Ignite proved that it is time to pay attention. Let’s face it, Microsoft has had to play catch up, but this is the first time I have seen validation of enterprise customer success, business success, and technology innovation. Here are a few highlights I’m seeing here at the event.

Topics: Microsoft Cybersecurity Enterprise Mobility Microsoft Ignite

Microsoft Ignite: What to Expect

Keeping up with the pace of change that Microsoft is delivering to the market is not a simple task for average IT professional. Since unfortunately not every IT & business professional can track every new innovation coming out of the Redmond, WA campus, events like Ignite help to accelerate the learning curve and offer an opportunity for many IT pros to advance their training and certification.

Topics: Enterprise Mobility Microsoft Ignite