Cybersecurity, Mobility, and the Expanding Perimeter (Video)

As businesses lose control of devices and rapidly adopt cloud consumption models, identity and data have become the new perimeter for IT operations and information security teams to secure and protect. My colleague Jon Oltsik and I sit down together to highlight how mobility, identity, and security are creating technology challenges, organizational barriers, and business risks as the security perimeter expands at a faster pace than business can keep up with. The discussion sparks attention towards the IT vendors that are attempting to enhance security postures from within a silo as opposed to the new purview business are dealing with today.

Topics: Cybersecurity identity and access management Enterprise Mobility

The Internet of Identities: Coming Soon and Bringing Massive IAM Changes

My colleague Mark Bowker has a concept called the Internet of identities. How does this differ from the Internet of Things? The Internet of Things is about, well things – devices, controllers, actuators, etc. But these things will perform tasks, collect data, connect to other devices, etc. In other words, each device will have an identity with multiple attributes, and each of these attributes must be understood to enable good things to occur and block bad things from happening. Thus, the Internet of identities.

Topics: Cybersecurity IoT Mark Bowker IAM Enterprise Mobility

Microsoft Top of Mind for Business after Attending Ignite (Video)

Attendees walked away from Microsoft Ignite and Envision with plentiful ideas and possibilities. This year's event was rich in vision, innovation and business strategy, and aligns well with where businesses remain challenged with cloud, mobility, and security initiatives. Microsoft raised its game and the volume to the enterprise customer and did an admirable job shifting Microsoft to the top of minds of IT pros and business executives.

While Microsoft has made strides in the market, the company also needs to remain humble and empathize with its customers. For example, if a customer is on the latest version of Windows 10 and has strategically positioned apps in Azure while using Microsoft identity and conditional access, then they will have set themselves up with a strong security posture, but not all businesses have achieved this desired state. The onus is then on Microsoft to transform its go-to-market partners and system integrators to help create the market traction and execution success.

Topics: Microsoft Enterprise Mobility Microsoft Ignite

Microsoft Ignite Enterprise Mobility and Security Highlights

For enterprise IT shops that may have been dismissive of Microsoft as they plan and implement their mobility strategies, Ignite proved that it is time to pay attention. Let’s face it, Microsoft has had to play catch up, but this is the first time I have seen validation of enterprise customer success, business success, and technology innovation. Here are a few highlights I’m seeing here at the event.

Topics: Microsoft Cybersecurity Enterprise Mobility Microsoft Ignite

Microsoft Ignite: What to Expect

Keeping up with the pace of change that Microsoft is delivering to the market is not a simple task for average IT professional. Since unfortunately not every IT & business professional can track every new innovation coming out of the Redmond, WA campus, events like Ignite help to accelerate the learning curve and offer an opportunity for many IT pros to advance their training and certification.

Topics: Enterprise Mobility Microsoft Ignite

Apple Announcements: Good for Businesses?

Apple tends to lean heavily in towards the everyday consumer and not speak to the potential value to businesses. It feels a bit like they have so much trust in their fanbase that Apple automatically assumes that their technology will get pulled into businesses without having to address the business market. Some may call this approach arrogant and others would call this brilliant, but the fact remains that we have witnessed from day one of the Apple iPhone that appealing to consumers and application developers has created an automatic shoo-in into the business. ESG research consistently shows that end-users are creating a significant push for business to support Apple devices (personal and corporate owned).

Topics: Apple Enterprise Mobility iphone

How the Fluid Network Perimeter Is Driving an Internet of Identities

My esteemed colleague, Jon Oltsik, previously wrote about how identity and access management infrastructure is misaligned with security. Mobility, device proliferation, cloud, and the threat landscape make an enterprise IAM strategy extremely important, but many organizations continue to treat IAM as a hot potato, with no real owner or strategy. As I’m pursuing an upcoming research project related exploring IAM's key role in providing security via the Internet of Identities and speaking with IT pros who are rearchitecting their IAM infrastructure for mobility, I’m excited about how these business activities can be dramatically improved by taking a fresh look at IAM.

Topics: Cybersecurity IAM Enterprise Mobility Internet of Identities

Google I/O Fascinates Developers, but How About CIOs?

Attending Google I/O you can instantly feel the inspiration and visually see the excitement from the developers. I quickly learned that long gone are my days programming COBOL!?!?! Creativity runs wild at the event and while it is easy to get excited about the innovation that Google splashes around, I try to snap a business lens on everything I see so I can start matching Google with the top IT and business priorities ESG captures in our research. This involves some creative thinking, but here it goes.

Let’s first start with the most creative piece--I need to give credit to Corey Latislaw for tweeting these fascinating and accurate notes. 

https://twitter.com/corey_latislaw/status/864940569843294208

Topics: google Enterprise Mobility artificial intelligence Google I/O

The VMware EUC Team’s Execution Machine Continues to Roll

It is a busy time of year for IT vendor announcements, and the VMware EUC team is actively demonstrating its path to growth with multiple announcements. Before dipping into the specifics, it is important to put a few items in perspective:

  • The EUC business unit is one of the top, if not the top, primary growth areas for VMware.
  • Now that the dust has settled with the Dell EMC acquisition, the execution machine has started to roll down the tracks.
  • Digital workspace transformation is a major component of IT transformation (core to Dell EMC strategy) and an area the EUC team is ready to strike with relentless go-to-market and sales execution.
Topics: VMware Enterprise Mobility EUC

Will WannaCry Help Drive Google Chromebooks?

Microsoft Windows is prime target for cybercriminals, and the daunting cadence of patching places businesses at great risk. Factor in the unsettling thought that critical business systems still run on Windows operating systems that have reached EOL years ago. IT pros like to point the finger at Microsoft and, while one would think that exploits like WannaCry ransomware should negatively impact Microsoft’s credibility, the vendor is not likely going to be held accountable. However, the skyrocketing valuation of cybersecurity IT vendors as a result of WannaCry also has the potential to create a similar ripple effect for Google Chromebooks.

First, let’s agree that if a business system is written and designed around the Windows operating system, it’s likely going to involve an application migration and/or re-platform. Typically, projects like these are associated with a high cost of change that halts investment. Now, let’s factor in the race to the cloud for applications, data, business intelligence, and improved security. With this technology shift, the conundrum of an application being written to run locally on a client OS is diminishing—thus creating an ideal environment for companies to consider Google Chromebooks. WannaCry has indeed generated an opportunity for Google to:

Topics: Microsoft google Enterprise Mobility chromebook wannacry