Blogs

Visit one of the Subject Area Blogs or ESG Analyst Blogs by clicking any link below:

Application Development & Deployment Truths               The Bigger Truth Insecure About Security
Cloud Computing Truths               Big Data, the Universe, and Everything IT Artillery
Data Management & Analytics Truths               The Business of Storage IT Depends
Data Protection Truths               Channeling IT Liquefying IT
Information Security Truths               Decoding Development and Developers Technical Optimist
Networking Truths               ESG Lab Blog  
Storage Truths                  

Individual Author Blogs can be found via EXPLORE, selecting the Author, and clicking on "Read blog."

  • March 27, 2015

    Network Automation: Can It Benefit Everyone?

    At a recent Juniper Innovation Showcase analyst briefing, the company emphasized two dimensions of innovation: performance and automation. This made me think of how much we have accomplished in the world of network automation and whether these accomplishments have provided benefits for enterprises as well as hyper-scale (or SaaS operator) companies.

    Learn More


  • March 26, 2015

    In Cybersecurity, the Network Doesn’t Lie

    In a recent ESG Research Report, enterprise security professionals were asked to identify the primary objectives associated with their organization’s network security strategy. It turns out that 40% of organizations plan to move toward continuous monitoring of all assets on the network while 30% of organizations plan to capture more network traffic for security analytics.

    Learn More


  • March 26, 2015

    Big Data Deployment Models: Open v. Proprietary, Commodity v. Built

    In an earlier blog post, I discussed some architectural options in deploying a big data environment, including cloud vs. on-premises, and dedicated vs. shared infrastructure. In this post, I'll examine topics that may be even more divisive: open vs. proprietary software and commodity vs. purpose-built hardware. These choices seem to reflect personal philosophies as much as technological differences.

    Learn More


  • March 25, 2015

    Cloudera Develops Its Market Momentum

    At a recent Analyst Day in San Francisco, Cloudera all but declared the company’s dominance of the core Hadoop distribution market. The case was made around three measures of success, namely: product strength, market results, and strategic alliances.

    Learn More


  • March 23, 2015

    Massive Enterprise Endpoint Security Opportunity

    In the past, large organizations spent most if not all of their endpoint security dollars on a single product—antivirus software. This decision created a multi-billion dollar market dominated by 5 vendors: Kaspersky Lab, McAfee (Intel Security), Sophos, Symantec, and Trend Micro.

    Learn More


  • March 20, 2015

    Why Google Cloud Storage Nearline is Super Interesting for Data Protection

    You can’t have a conversation about IT transformation or data protection modernization that doesn’t include “the cloud” somewhere in it. And today, there are a wide range of cloud services that offer data protection capabilities...

    Learn More


  • March 23, 2015

    The Federation Business Data Lake and the "One Pile Method"

    When I was in college, my housemate Craig* justified his lack of tidiness with a theory he espoused as the "One Pile Method." In practice, this involved dumping all of his clothes, books, homework, sports equipment, and anything else he happened to be carrying right in the middle of his room upon entry. The argument was that anytime he needed anything, he knew right where to look—it had to be somewhere in that one pile. This was claimed to be highly efficient in terms of time and efforts.

    Learn More


  • March 20, 2015

    Amazon and SaaS are winning IT hearts and minds

    Amazon Web Services (AWS) seems to be winning more than just IaaS business lately, they seem to also be winning the hearts and minds of the client base they serve. What’s more, these Amazon devotees aren't just limited to newer, “Internet age” companies; they also seem to be making serious inroads with older, more traditional corporations as well.

    Learn More


  • March 19, 2015

    The Increasing Cybersecurity Attack Surface

    I just read a good Wall Street Journal blog by Ben DiPietro titled, Speed of Tech Change a Threat to Cybersecurity. His main point is that while organizations are adopting new technologies like cloud computing, mobile computing, and applications based upon the Internet of Things (IoT), they continue to address cybersecurity risks, controls, and oversight with legacy tools and processes. This creates a mismatch where cyber-adversaries have a distinct offensive advantage over a potpourri of assorted legacy enterprise security defenses.

    Learn More


  • March 18, 2015

    Cutting Through Endpoint Security Marketing Hype is a Challenge for Buyers and Vendors Alike

    Endpoint security is a fast-paced, dynamic market right now. The amount of funding, M&A, and general product development is moving at what can feel like a blurring speed, and separating the facts from the marketing language can be a challenge.

    Learn More



More Results:
NEWSLETTER

Enter your email address, and click subscribe