VMworld 2014 - ESG's Event Video Insights

VMworld was, as ever, massive - and remains one of the foundational IT events of the season. As is our wont, the attending ESG analyst team videoed its key, immediate insights live at the event. In the video blog that follows, I am joined by my colleagues Jason Buffington, Mark Bowker, Kevin Rhone and Scott Sinclair. In just six minutes you can get a broad yet succinct summary of some key takeaways from - and thoughts about - this year's event. VMW '14 was notable for the tone of the keynotes as much as the technology news, and for posing questions as much as providing answers...making it an intriguing installment of this ongoing series. Enjoy the video....

Topics: Cloud Computing Storage IT Infrastructure Data Protection VMware Private Cloud Infrastructure Information and Risk Management Enterprise Software Compute VMworld ESG on Location

VMware EVO and Its Market Impact

In a recent ESG Research Brief, Integrated Computing Platform Trends, 33% of the respondents indicated that are already using an ICP and there are no signs of lifting the foot off the accelerator pedal.

Topics: Cloud Computing EVO VMware Private Cloud Infrastructure integrated computing platforms ICP VMworld

EMC RecoverPoint for VMs is Another Step Forward in vAdmin Enablement

This week, EMC released RecoverPoint for VMs (RP4VM). For storage administrators, RecoverPoint has long been seen as the seamless synchronous/asynchronous storage replication of choice for EMC storage, to deliver higher levels of resiliency for enterprise workloads. But for virtualization administrators, it was part of the “magic” that made the storage under the hypervisor surprisingly durable – or perhaps not even recognized at all.

With the RP4VM release, enterprise-grade storage replication is now in the hands of the VMware Administrator (vAdmin). RP4VM is made up of three core components:

  • A virtual appliance for replicating to another appliance on a different host
  • An I/O splitter that captures disk I/O from the hypervisor, and weans a copy for the appliance
  • A vCenter plug-in for management
Topics: Cloud Computing Storage EMC Replication Data Protection VMware Private Cloud Infrastructure Information and Risk Management Compute Virtualization

Virtual Security Remain Anathema to Many Organizations

Next week, the IT industry will gather in San Francisco to discuss all things cloud and virtualization at VMworld. The discussion will center on “software-defined data centers” which will quickly morph to “software-defined security” in my world (Writer’s note: In my humble opinion, this is a meaningless marketing term and I don’t understand why an industry that should be focused on digital safety acts like it's selling snake oil). So we are likely to hear about the latest virtual security widgets, VMware NSX and OpenStack integration, virtual security orchestration, etc.

This will make for fun and visionary discussions but there’s one critical problem: While almost every enterprise has embraced server virtualization and many are playing with cloud platforms, lots of organizations continue to eschew or minimize the use of virtual security technologies – even though they’ve had years of experience with VMware, Hyper-V, KVM, Xen, etc. According to ESG research, 25% of enterprises use virtual security technologies extensively, while 49% use virtual security technologies somewhat, and the remaining 25% endure on the sidelines (Source: ESG Research Report, Network Security Trends in the Era of Cloud and Mobile Computing, August 2014).

Topics: Cloud Computing Private Cloud Infrastructure Information and Risk Management Security and Privacy Public Cloud Service

What I Am Looking for at VMworld 2014 … a Data Protection Perspective

For the past few years, the big data protection trend in virtual environments was simply to ensure reliable backups (and restores) of VMs. That alone hasn’t always been easy, but with the newer Data Protection APIs from VMware (VADP), that is becoming table-stakes – and the real differentiation coming from the agility to restore (speed and granularity), as well as manageability and integration.

And while there is certainly still a lot of room for many vendors to improve in those areas, the industry overall needs to move past the original question of “Can I back up your VM?” and even past “How quick can I restore your VM?

Topics: Backup Data Protection VMware Private Cloud Infrastructure Information and Risk Management Compute Jason Buffington Virtualization

VMworld 2014: Top Questions ESG Analysts Hope to Have Answered

This will be my 9th year in a row attending VMworld! The event always proves to be a great display of end-user passion that is driving towards new innovation and IT vendors displaying their latest products, solutions, and services. I recently asked the ESG team attending the event if there was anything they planned to track closely or questions that they hoped to get the answers to and here is what they shared:

Topics: Cloud Computing Storage EMC End-User Computing IT Infrastructure Data Protection VMware Private Cloud Infrastructure Networking Information and Risk Management mobile VMworld software-defined data center software-defined storage Airwatch hybrid cloud SDDC NSX SDS Enterprise Mobility

Cloud Security Priorities and Synergies with Enterprise Security

According to ESG research, 63% of mid-market (i.e., 250 to 999 employees) and enterprise (i.e., more than 1,000 employees) are currently using software-as-a service (SaaS), 33% use infrastructure-as-a-service (IaaS), and 27% employ platform-as-a-service (PaaS) today. Additionally, 72% of all firms are increasing their spending on cloud computing initiatives this year. (Source: ESG Research Report, 2014 IT Spending Intentions Survey, February 2014.)

Topics: Cloud Computing Private Cloud Infrastructure Information and Risk Management Security and Privacy Public Cloud Service

BYOA: Bring Your Own Authentication

Most people who use IT or Internet applications would agree that the current username/password mode of authentication is cumbersome, ineffective, and obsolete. According to ESG research, 55% of information security professionals working at enterprise organizations (i.e., more than 1,000 employees) believe that username/password authentication should be completely eliminated or relegated to non-business critical applications only.

Topics: Cloud Computing Microsoft End-User Computing Private Cloud Infrastructure Information and Risk Management mobile Security and Privacy google Lenovo multi-factor authentication ARM RSA Security Public Cloud Service

A Storage Strategy Built for the Future

We know the benefits that cloud storage can offer organizations - flexibility, agility, and elasticity more efficiently at lower costs. And that’s really just the start. Once you factor in the potential to address business continuity and productivity concerns with instant backup, archive, and disaster recovery plans, it’s turning into a no brainer. This, of course, doesn’t mean you should only use cloud storage. On-premises, primary storage is still important, especially for those mission-critical applications with strict performance SLAs.

Topics: Hybrid Cloud Storage Cloud Computing Storage Azure Microsoft IT Infrastructure cloud Data Protection Private Cloud Infrastructure Information and Risk Management

Desktop-as-a-service (DaaS): Desktops Delivered from the Cloud

ESG has been monitoring the interest in cloud desktops, commonly referred to as DaaS (desktop-as-a-service), for the last few years and continues to see solid interest in the delivery model. Indeed, previously conducted ESG research revealed that nearly a quarter of potential adopters of desktop virtualization technology in general identified DaaS as a delivery model that they were currently evaluating or at least considering.

Topics: Cloud Computing Azure Microsoft VMware Private Cloud Infrastructure Amazon google Amazon Workspaces DaaS Citrix Public Cloud Service