At least four different kinds of data protection appliances (DPAs) exist, with even more “flavor” categories still on the horizon. Some DPAs are meant to be turnkey solutions for providing business and recovery agility. Others are meant to radically improve the efficiency of protection processes that an organization already has in place. All four types have relevance in today’s IT landscape … but there’s an art to figuring out which type is going to be best-suited to satisfying a particular organization’s protection goals.
As the adoption of cloud services continues to grow, and more corporate data is moving off-premises, securing data assets is becoming increasingly challenging. The reality of “shadow IT,” where users take a self-service approach to file sharing, messaging, and other apps, has created a dilemma for corporate IT—how to play the role of enabler, not preventer, while gaining a level of governance by establishing the right security controls to mitigate risk. Organizations seeking a solution to gain visibility into shadow IT apps, connect users with IT-approved apps, and protect those apps and the associated data from compromise may want to investigate IBM Cloud Security Enforcer, which incorporates identity and access management and threat intelligence into a cloud access security broker (CASB) offering.
Dell recently announced new campus and data center network solutions with the C9010 Networking Director and the companion C1048 Rapid Access Node forming the basis of the campus architecture, and the S6100-ON open networking data center switch. Dell Networking continues with its philosophy that is consistent with the rest of the Dell portfolio—and that is to offer choice. In support, Dell provides a variety of port speeds and Open Networking-enabled devices for its on-rack data center switches. Dell needs to continue providing clear guidance about how to get support when deploying these choices.
Despite considerable confusion across the industry around the actual definition of the term software-defined storage (SDS), IT organizations find themselves enticed by the potential benefits the technology offers. Indeed, ESG research reveals that many IT organizations have SDS on their short-term storage architecture roadmaps, especially those with larger and more complex environments. What is driving this early interest—and in some cases, adoption—and how do organizations foresee implementing this alternative approach to traditional storage hardware-based functionality?
It’s becoming increasingly hard, indeed inaccurate, to write about solid-state as something “special” in the storage world. It is, if you will, simply part of the standard furniture in a regular storage house. That said, apart from a few corner-cases that can be described as the IT super-rich, niche-needy, or, newly on this list, capacity-limited environments, solid-state is still likely to remain as a minority of the production storage capacity in most large environments, until there is another step-change in the media and therefore the economics. However that step-change has already occurred—and been realized—as far as economic I/O performance and bandwidth goes. That, together with a growing appreciation of the broader values of solid-state beyond just performance, is why it is already recognized as a part of the regular storage furniture.
The endpoint often plays a central role in the cyber kill chain, serving as the entry point and staging ground for a broader attack, a dynamic that has raised the stakes in protecting the endpoint attack surface area. Today’s endpoint security market is in transition, with customers seeking solutions that protect against zero day malware and exploits while evaluating whether “next-generation” solutions augment or replace traditional antivirus. Webroot SecureAnywhere Business Endpoint Protection strives to bridge the gap with a smart approach to detect, prevent, and remediate malware on endpoints.
IBM acquired SoftLayer in June 2013 and released Bluemix in June 2014. From a market timing standpoint, IBM qualifies as a late entrant. However, the real question is, “Does this timing work for or against IBM?” Data from ESG’s recent PaaS usage and satisfaction survey shows that IBM’s market timing has worked well. IBM’s efforts to generate visibility for SoftLayer and Bluemix coincided with a surge of market interest in PaaS. Consequently, IBM was able to gain considerable ground in a remarkably short period of time. This brief examines where IBM is today with Bluemix and helps explain why IBM is a “go to” vendor for enterprises of all sizes.
Red Hat has taken an important first step in defining a compelling architecture for supporting IoT needs and explaining how its product portfolio enables enterprises and partners to craft high-value IoT applications. This brief presents a simplified IoT architectural reference model developed by ESG and then discusses Red Hat’s alignment with this model. The Red Hat solution is very comprehensive and involves nearly the entire Red Hat portfolio. The breadth and depth of IoT use cases suggests that a comprehensive portfolio is desirable because it ensures that the right selection of products is available to meet the needs of the solution.
Commvault recently added new enterprise file sync and share capabilities (EFSS) to its Endpoint Data Protection Solution Set. Commvault File Sharing will help end-users securely store, access, and share files from virtually anywhere, at any time, on any device. The EFSS capabilities address not only the burgeoning need for secure file sharing among business end-users so that sensitive data is protected, but also the critical need for organizations to more easily demonstrate compliance with regulatory and government requirements through further securing and protecting those files with an integrated endpoint backup solution. These new capabilities could give Commvault a competitive advantage in the file sharing and collaboration market, where most other offerings lack any means for secure collaboration in combination with an efficient endpoint data protection strategy.
Docker has announced a networking system that enables application portability across any network infrastructure and empowers partners to create plug-in drivers. Providing its own drivers as well as those from partners creates a broad ecosystem that offers choice. Although this system is still experimental and will undoubtedly evolve, the Docker community needs to resist the desire to add complex features that may offset its key benefits of scalability and simplicity. Simplicity of design is critical to satisfying developer needs and cannot be ignored.