Visit one of the Subject Area Blogs or ESG Analyst Blogs by clicking any link below:
|Application Development & Deployment Truths||The Bigger Truth||Insecure About Security|
|Cloud Computing Truths||Big Data, the Universe, and Everything||IT Artillery|
|Data Management & Analytics Truths||The Business of Storage||IT Depends|
|Data Protection Truths||Channeling IT||Liquefying IT|
|Information Security Truths||Decoding Development and Developers||Technical Optimist|
|Networking Truths||ESG Lab Blog|
Individual Author Blogs can be found via EXPLORE, selecting the Author, and clicking on "Read blog."
Earlier this year, ESG published a research report titled, Network Security Trends In the Era of Cloud and Mobile Computing. As part of this report, ESG surveyed 321 security professionals working at enterprise organizations (i.e., more than 1,000 employees) about their networking and network security strategies.
What happens when you combine two field-proven, widely-adopted technologies from tech power houses? You get a super flexible, scalable platform to address your big data analytic needs. And the best part is that it really doesn’t matter where you currently fall on the Hadoop adoption spectrum.
Let’s face it, tools for backing up your data have become ubiquitous. Everyone can do it. It provides peace of mind, especially for small businesses (think law or a doctor’s office) who don’t have IT pros on staff. “All my data is backed up somewhere so if something bad happens, I’m covered.” Unfortunately backup is only a piece of the data protection puzzle. How do you get the backed up data back into production if something goes wrong? How long will it take to get up and running again? And the killer question: How will it impact my small business if it takes a long time to recover? Recovery is just as important as backup, and probably MORE important.
Over the last few months, I’ve talked to a number of CISOs and security analytics professionals about threat intelligence as I’m about to dig into this topic with some primary research.
One of the things I’ve learned is that large enterprises are consuming lots of open source and commercial threat intelligence feeds. In some cases, these feeds are discrete services from vendors like iSight Partners, Norse, or Vorstack. Alternatively, they also purchase threat intelligence along with products from security vendors like Blue Coat, Check Point, Cisco, FireEye, Fortinet, IBM, McAfee, Palo Alto Networks, Symantec, Trend Micro, Webroot, and a cast of a thousand others.
New businesses like Uber and Tesla depend on big data analytics to provide cutting-edge services. They need a fast and free Internet to flourish.
In the past, cybersecurity was thought of as an IT problem where CISOs were given meager budgets and told to handle IT security with basic technical safeguards and a small staff of security administrators. Fast forward to 2014 and things have certainly changed now that business mucky-mucks read about data breaches in the Wall Street Journal on a daily basis.
AWS held its 3rd annual re:Invent user conference with 13,500 attendees in Las Vegas. While the event had similarities to other IT conferences that included an expo floor, keynotes, and sessions I was fascinated by, AWS has the potential to disrupt the way businesses consume IT, IT organizational structure, high margin IT infrastructure business models, and product marketing.
Okay, I admit that I’m a geek and have read numerous books on the history of IT and the Internet. Katie Hafner’s Where Wizards Stay up Late, The Origins of the Internet is a particular favorite of mine.