Blogs

Visit one of the Subject Area Blogs or ESG Analyst Blogs by clicking any link below:

Application Development & Deployment Truths               The Bigger Truth Insecure About Security
Cloud Computing Truths               Big Data, the Universe, and Everything IT Artillery
Data Management & Analytics Truths               The Business of Storage IT Depends
Data Protection Truths               Channeling IT Liquefying IT
Information Security Truths               Decoding Development and Developers Technical Optimist
Networking Truths               ESG Lab Blog  
Storage Truths                  

Individual Author Blogs can be found via EXPLORE, selecting the Author, and clicking on "Read blog."

  • November 25, 2014

    Software-defined Networking Followed by SDN Security

    Earlier this year, ESG published a research report titled, Network Security Trends In the Era of Cloud and Mobile Computing. As part of this report, ESG surveyed 321 security professionals working at enterprise organizations (i.e., more than 1,000 employees) about their networking and network security strategies.

    Learn More


  • November 25, 2014

    Hyperconverged Infrastructure for BC/DR using EVO Rail

    Shortly after VMware announced its EVO Rail initiative, whereby hardware partners could start delivering a very dense compute, storage, and networking solution within a wholly-contained appliance – I started exploring the data protection aspects of an EVO Rail solution. The nice folks in ESG’s video studio have produced a whole series on this … in two-minute increments.

    Learn More


  • November 25, 2014

    Enterprise Hadoop with VCE and Isilon

    What happens when you combine two field-proven, widely-adopted technologies from tech power houses? You get a super flexible, scalable platform to address your big data analytic needs. And the best part is that it really doesn’t matter where you currently fall on the Hadoop adoption spectrum.

    Learn More


  • November 21, 2014

    Backup AND RECOVERY for the Little Guy

    Let’s face it, tools for backing up your data have become ubiquitous. Everyone can do it. It provides peace of mind, especially for small businesses (think law or a doctor’s office) who don’t have IT pros on staff. “All my data is backed up somewhere so if something bad happens, I’m covered.” Unfortunately backup is only a piece of the data protection puzzle. How do you get the backed up data back into production if something goes wrong? How long will it take to get up and running again? And the killer question: How will it impact my small business if it takes a long time to recover? Recovery is just as important as backup, and probably MORE important.

    Learn More


  • November 20, 2014

    Confusion Persists around Cyber Threat Intelligence for Enterprises

    Over the last few months, I’ve talked to a number of CISOs and security analytics professionals about threat intelligence as I’m about to dig into this topic with some primary research.

    One of the things I’ve learned is that large enterprises are consuming lots of open source and commercial threat intelligence feeds. In some cases, these feeds are discrete services from vendors like iSight Partners, Norse, or Vorstack. Alternatively, they also purchase threat intelligence along with products from security vendors like Blue Coat, Check Point, Cisco, FireEye, Fortinet, IBM, McAfee, Palo Alto Networks, Symantec, Trend Micro, Webroot, and a cast of a thousand others.

    Learn More


  • November 19, 2014

    Why Net Neutrality Matters For Big Data Apps

    New businesses like Uber and Tesla depend on big data analytics to provide cutting-edge services. They need a fast and free Internet to flourish.

    Learn More


  • November 17, 2014

    Time to Address Basic Organizational Issues that Impact IT Security

    In the past, cybersecurity was thought of as an IT problem where CISOs were given meager budgets and told to handle IT security with basic technical safeguards and a small staff of security administrators. Fast forward to 2014 and things have certainly changed now that business mucky-mucks read about data breaches in the Wall Street Journal on a daily basis.

    Learn More


  • November 14, 2014

    AWS re:Invent(ing) IT, Business Models and Marketing

    AWS held its 3rd annual re:Invent user conference with 13,500 attendees in Las Vegas. While the event had similarities to other IT conferences that included an expo floor, keynotes, and sessions I was fascinated by, AWS has the potential to disrupt the way businesses consume IT, IT organizational structure, high margin IT infrastructure business models, and product marketing.

    Learn More


  • November 11, 2014

    Dell World 2014: Includes Video

    Dell World took place last week in Dell’s part of the world: Austin, Texas.

    Learn More


  • November 11, 2014

    Book Report: Tubes: A Journey to the Center of the Internet

    Okay, I admit that I’m a geek and have read numerous books on the history of IT and the Internet. Katie Hafner’s Where Wizards Stay up Late, The Origins of the Internet is a particular favorite of mine.

    Learn More



More Results:
NEWSLETTER

Enter your email address, and click subscribe