VMworld 2014 - ESG's Event Video Insights

VMworld was, as ever, massive - and remains one of the foundational IT events of the season. As is our wont, the attending ESG analyst team videoed its key, immediate insights live at the event. In the video blog that follows, I am joined by my colleagues Jason Buffington, Mark Bowker, Kevin Rhone and Scott Sinclair. In just six minutes you can get a broad yet succinct summary of some key takeaways from - and thoughts about - this year's event. VMW '14 was notable for the tone of the keynotes as much as the technology news, and for posing questions as much as providing answers...making it an intriguing installment of this ongoing series. Enjoy the video....

Topics: Cloud Computing Storage IT Infrastructure Data Protection VMware Private Cloud Infrastructure Information and Risk Management Enterprise Software Compute VMworld ESG on Location

It's Performance @ Scale, Not Performance + Scale

Want to know what's trite in big data marketing today? Pitches that focus on speed for speed's sake, thinking if only they can get enough zeroes in the headline the customer is sure to buy. Second most common cliche to the "go fast" guys are the ones who rave about their scalability, as if size is all that counts. Both attributes matter, but both are kind of missing the point if taken alone. Customers' decision criteria for big data solutions includes these capabilities, but almost always as a combined function, not independent axes for evaluation.

Topics: Analytics Big Data Enterprise Software Data Management

The Most Secret V of Big Data

Everyone who has spent any time looking at the world of big data will have by now familiarized themselves with the 5 "V"s of Volume, Velocity, Variety, Veracity, and Value, and these are no doubt good descriptors of the new requirements. There is however another secret V to consider, well, ok, it's really more of an L, but cock your head 45 degrees to the right and it'll start to look a bit like a V anyway.

Topics: Analytics Big Data Enterprise Software Data Management

The Hadoop Dating Game: Hooking Up to Get Ahead

As summer starts to wind down and our family begins to look forward to another school year, I find myself reflecting on old friends, and thinking about new ones. Seems to me there are at least three categories of friends:

Topics: Analytics Big Data Hadoop Enterprise Software Data Management

An ESG Exclusive: The "Database Analytics Trends" Report

Here at ESG, we just put the finishing moves on our new Enterprise Database Trends in a Big Data World report, be sure to ask for it by name at your local newsstand if you aren’t already getting home delivery of all our research. This piece of work is part two of a grand trilogy (thrill-ogy?) in our data management research calendar along with the earlier Enterprise Data Analytics Trends and the upcoming Enterprise Big Data, Business Intelligence, and Analytics Trends reports.

The current installment looks at the pressures on existing databases, the practical science of database management, how organizations are re-thinking their strategies and technology selections, and the challenging dynamics of the discipline.

Topics: Analytics Enterprise Software Data Management database Enterprise

Anticipating Black Hat

RSA 2014 seems like ancient history and the 2015 event isn’t until next April. No worries, however, the industry is set to gather in the Las Vegas heat next week for cocktails, sushi bars, and oh yeah – Black Hat.

Now Black Hat is an interesting blend of constituents consisting of government gumshoes, Sand Hill Rd. Merlot drinking VCs, cybersecurity business wonks, “beautiful mind” academics, and tattooed hackers – my kind of crowd! As such, we aren’t likely to hear much about NIST frameworks, GRC, or CISO strategies. Alternatively, I am looking forward to deep discussions on:

  • Advanced malware tactics. Some of my favorite cybersecurity researchers will be in town to describe what they are seeing “in the wild.” These discussions are extremely informative and scary at the same time. This is where industry analysts like me learn about the latest evasion techniques, man-in-the-browser attacks, and whether mobile malware will really impact enterprise organizations.
  • The anatomy of various security breaches. Breaches at organizations like the New York Times, Nordstrom, Target, and the Wall Street Journal receive lots of media attention, but the actual details of attacks like these are far too technical for business publications or media outlets like CNN and Fox News. These “kill chain” details are exactly what we industry insiders crave as they provide play-by-play commentary about the cybersecurity cat-and-mouse game we live in.
  • Threat intelligence. All of the leading infosec vendors (i.e., Blue Coat, Cisco, Check Point, HP, IBM, Juniper, McAfee, RSA, Symantec, Trend Micro, Webroot, etc.) have been offering threat intelligence for years, yet threat intelligence will be one of the major highlights at Black Hat. Why? Because not all security and/or threat intelligence is created equally. Newer players like BitSight, Crowdstrike, iSight Partners, Norse, RiskIQ, and Vorstack are slicing and dicing threat intelligence and customizing it for specific industries and use cases. Other vendors like Fortinet and Palo Alto Networks are actively sharing threat intelligence and encouraging other security insiders to join. Finally, there is a global hue and cry for intelligence sharing that includes industry standards (i.e. CybOX, STIX, TAXII, etc.) and even pending legislation. All of these things should create an interesting discourse.
  • Big data security analytics. This is an area I follow closely that is changing on a daily basis. It’s also an interesting community of vendors. Some (i.e., 21CT, ISC8, Leidos, Lockheed-Martin, Norse, Palantir, Raytheon, etc.), come from the post 9/11 “total information access” world, while others (Click Security, HP, IBM, Lancope, LogRhythm, RSA, etc.) are firmly rooted in the infosec industry. I look forward to a lively discussion about geeky topics like algorithms, machine learning, and visual analytics.
Topics: IBM Check Point Palo Alto Networks Fortinet Cisco Information and Risk Management Juniper HP McAfee Enterprise Software Data Management Security and Privacy Crowdstrike Lockheed Martin Black Hat trend micro RiskIQ 21CT Leidos Norse CybOX BitSight Symantec RSA TAXII ISC8 Blue Coat STIX Webroot

The Apple and IBM Partnership

IBM’s announcement on July 15 2014 that they are entering into a global partnership with Apple to transform enterprise mobility has both substance and spin.

The significance of this announcement stems from the enterprise level security, lifecycle support, and integration that IBM is bringing to iOS. IBM’s MaaS360 brings comprehensive mobile device management to bear so users will have a highly secure workplace container for enterprise content. IBM and Apple are also addressing iOS lifecycle concerns. IBM will offer a managed service whereby Apple provides IBM with a beta version of the upcoming iOS release and IBM will test and remediate issues for iOS applications. This way, when Apple suggests that a user upgrade to the latest version of iOS, an enterprise can avoid the potential for broken applications. IBM will also extend BlueMix so that it supports the 4,000 APIs of Apple’s iOS 8 (BlueMix Mobile for iOS). This brings enterprise scale to Apple-based mobile environments.

Topics: IBM Apple Application Development & Deployment Enterprise Software mobile

Big Data Security Analytics “Plumbing”

According to 2012 ESG research, 44% of enterprise organizations (i.e., those with more than 1,000 employees) considered their security data collection and analysis a “big data” application while another 44% believed that their security data collection and analysis would become a big data application within the following two years. Furthermore, 86% of enterprises collected substantially more or somewhat more security data than they had two years earlier. (Source: ESG Research Report, The Emerging Intersection Between Big Data and Security Analytics, November 2012.)

The ongoing trend is pretty clear – large organizations are collecting, processing, and retaining more and more data for analysis using an assortment of tools and services from vendors like IBM, Lancope, LogRhythm, Raytheon, RSA Security, and Splunk to make the data “actionable” for risk management and incident prevention/detection/response.

Topics: IT Infrastructure Networking Information and Risk Management Enterprise Software Data Management Security and Privacy

Oracle's Big Data SQL Magic

Mixing your own big data solution often seems like a bit of alchemy. A venerated wizard seeks the rare ingredients, carefully measures out the quantities, lets it bubble for a few months in a POC, then with an "abracadabra," finds some poor users to taste the potiion. If they turn green and keel over, it's back to the old cauldron. The common lack of skills makes this all the more fraught. Now Oracle wants to change up the recipe.

Topics: Analytics Big Data Hadoop Enterprise Software Data Management Oracle SQL

IT Selfies: Operational Analytics Come Into Focus

If you're reading this blog, statistically it is highly probable that you work in IT like me, the lone anomaly being my mother (hi, mom!). And if you are like me, you probably got into IT not so much because it's a sexy topic for cocktail parties, but because of all the cool techie toys, a love of science fiction, and a keen desire to understand how things work.

Topics: Analytics Big Data Hadoop Enterprise Software Data Management operations