Most Recent Blogs

Do we still need VM-specific backup tools? [video]

Posted: March 09, 2016   /   By: Jason Buffington   /   Tags: Data Protection, VMware, Information and Risk Management, Jason Buffington, Video, openstack, Hyper-V, Server Virtualization

vm-specific backupsThis is one of the big questions in 2016 (and each of the past few years as well). 

Have the “traditional” unified data protection solutions caught up in reliability and agility to the degree that the need for “point products” that only protect VMs are no longer necessary? To help answer the question, I've recorded a short video:

Read More

Cloud-Powered Data Protection — Definitions and Clarifications

Posted: February 10, 2016   /   By: Jason Buffington   /   Tags: Data Protection, Information and Risk Management, SaaS, IaaS, disaster recovery, BaaS, cloud-backup, cloud storage, DRaaS, software-as-a-service (SaaS), Backup-as-a-Service (BaaS)

We continue to see a great amount of interest in combining “data protection” and “the cloud” – but also a great deal of confusion, in that there isn’t such thing as “the cloud.”

Read More

What I Want to Talk About at VMworld 2015

Posted: August 06, 2015   /   By: Jason Buffington   /   Tags: Data Protection, Information and Risk Management, VMworld, Virtualization

CloudBackupIn 2015, the question is no longer “Can I get a reliable backup of a VM?” 

With vStorage APIs for data protection (VADP) now being mature since 5.5, through 5.8 and up and coming in 6.0, shame on any backup solution that cannot reliably back up VMs using host-based APIs. Shame on vendors who only back up VMware and not Hyper-V with parity--but that is for a different blog, after VMworld.

Today, here are the questions that folks should be asking on the topic of “How agile can my restore of those VMs be?

Read More

Vendors Need to Rethink Their Channel Programs

Posted: June 08, 2015   /   By: Jason Buffington   /   Tags: channel, Data Protection, Information and Risk Management, channel partners, channel partner

In recent ESG research on data protection personas, methods, and channels, ESG looked at ‘who’ is affecting data protection, including IT operations, DBAs, vAdmins, file/storage admins, non-technical stakeholders, and channel partners.

While data protection has historically been very channel-driven, or at least channel-accelerated, recent data shows that there are disconnects between how IT decision makers use channel partners and how vendors hope that channel partners are being used (e.g., pre-sales advocates of their products/services). 

Read More

What’s New in Data Protection from IBM Interconnect 2015

Posted: February 25, 2015   /   By: Jason Buffington   /   Tags: IBM, Data Protection, Information and Risk Management

Every time that I take a close look at IBM’s data protection portfolio, veiled under its storage solutions umbrella, I am happily surprised by the technology—and my guess is that you would be too.

Read More

Yet Another Proof Point for Network and Endpoint Security Integration

Posted: October 17, 2014   /   By: Jon Oltsik   /   Tags: Information Security, End-User Computing, IT Infrastructure, network, Networking, Information and Risk Management, endpoint, Security and Privacy

As I’ve mentioned many times in my blog, there is a lot of evidence suggesting a trend toward the amalgamation of endpoint and network security.

Here’s another recent data point that supports this further. ESG recently published a new research report titled Network Security Trends in the Era of Cloud and Mobile Computing. The report is based upon a survey of security professionals working at enterprise organizations (i.e., more than 1,000 employees). ESG asked them: “Is your organization engaged in any type of project to integrate anti-malware and analytics technologies on networks and endpoints?” Nearly one-quarter (22%) said, “yes, extensively,” while another 39% responded, “yes, somewhat.”

Read More

Time to Embrace or Terminate National Cybersecurity Awareness Month (NCSAM)

Posted: October 14, 2014   /   By: Jon Oltsik   /   Tags: Information and Risk Management, Security and Privacy

Most people know that October is National Breast Cancer Awareness Month. Far fewer people know that October is also American Archives Month, National Book Month, and Pastors Appreciation Month.

Read More

How to Protect an EVO RAIL (video series)

Posted: October 13, 2014   /   By: Jason Buffington   /   Tags: EMC, EVO, IT Infrastructure, Data Protection, JBuff, VMware, Private Cloud Infrastructure, Information and Risk Management, HP, Dell

VMware’s EVO RAIL is an architecture for a hyper-converged, software-defined data center in a single appliance form-factor … to be delivered by various hardware partners. But how do you protect that all-in-one solution?

Read More

Proofpoint Report Exposes Details about Cybercrime Division-of-Labor and Malware Architecture

Posted: October 08, 2014   /   By: Jon Oltsik   /   Tags: End-User Computing, Information and Risk Management, Security and Privacy

One of the more vapid cybersecurity cliché statements goes something like this: “Hacking is no longer about alienated teenagers spending countless hours in the basement on their PCs. Rather, it is now the domain of organized crime and nation states.” While this is certainly true, it is also blatantly obvious. It is also nothing more than a meaningless platitude with no details about why this is true, how hackers operate differently than teenagers, or what the implications are.

If you want to understand these issues, I strongly suggest that you read a new threat report, Analysis of a Cybercrime Infrastructure, published this week by Proofpoint. The report follows the tactics and techniques used by a Russian organized crime group as it launched an attack on US- and European-based users aimed at stealing online banking credentials.

Read More

Leading Enterprise Organizations Have Established a Dedicated Network Security Group

Posted: October 06, 2014   /   By: Jon Oltsik   /   Tags: IBM, Network Security, Check Point, Palo Alto Networks, Fortinet, Cisco, IT Infrastructure, Networking, Information and Risk Management, Juniper, Sourcefire, FireEye, HP, McAfee, Security and Privacy, Security

When an enterprise organization wanted to buy network security equipment a few years ago, there was a pretty clear division of labor. The security team defined the requirements and the networking team purchased and operated equipment. In other words, the lines were divided. The security team could describe what was needed but didn’t dare tell the networking team what to buy or get involved with day-to-day care and feeding related to “networking” matters.

This “us-and-them” mentality appears to be legacy behavior. According to ESG research on network security trends, 47% of enterprise organizations now claim that they have a dedicated group in charge of all aspects of network security. Additionally, network security is done cooperatively by networking and security teams at 26% of organizations today but these firms insist that they are in the process of creating a dedicated network security group to supplant their current division of labor.

Read More

Posts by Topic

see all