Threat intelligence sharing has received a lot of attention over the past 12 months due to industry messages and proposed government legislation for public/private threat intelligence sharing. Enterprises are embracing threat intelligence programs, but these efforts remain immature and fraught with operational problems. Furthermore, most large organizations are focused on threat intelligence consumption rather than threat intelligence sharing. Vast improvements in threat intelligence standards, timeliness, contextualization, and operations are necessary before the cybersecurity community can truly benefit from the threat intelligence sharing vision being promoted by industry organizations and government agencies.
Integrated computing platforms (ICPs) are virtual computing infrastructure (VCI) solutions that integrated hardware and software components into a single, consumable IT system. ICPs combine independent pieces of IT infrastructure, which are normally operated separately, through policy and common functionality to form simplified computing platforms targeted at virtualized and cloud environments.
According to ESG's 2014 IT Spending Intentions Survey, not only are a majority of end-user organizations using cloud services, but many also expect to continue investing in these projects and initiatives over the coming year. In order to assess the impact of cloud computing on the channel, ESG surveyed 204 resellers, integrators, and services providers to discover the following key findings.
The OFS market is rapidly maturing from file storing and sharing services for consumers to technology solutions that offer features to effectively manage and secure business data. As part of this evolution, there is increasing demand for alternatives to the "one-size-fits-all," cloud-based approach, especially among OFS users who currently deploy a private cloud deployment model. The fact that more than two-thirds of these respondents would be extremely interested in a deployment model that allows some or all data to be stored on-premises is significant, albeit not surprising given that almost all respondent organizations have some types of data prohibited from being stored in a third-party data center.
In order to assess IT priorities over the next 12 months, ESG recently surveyed 562 IT professionals representing midmarket (100 to 999 employees) and enterprise-class (1,000 employees or more) organizations in North America and Western Europe. All respondents were personally responsible for or familiar with their organizations' 2013 IT spending as well as their 2014 IT budget and spending plans at either an entire organization level or at a business unit/division/branch level.
Cloud services are an increasingly important element of business and IT strategies, whether for infrastructure (IaaS), development platforms (PaaS), or applications software (SaaS). This infographic highlights some key data points regarding cloud adoption trends.
Business continuity and disaster recovery (BC/DR) are perennial areas of interest and concern among IT professionals. In recent years, however, IT pros responsible for overseeing BC/DR have had help from advances in server virtualization. A virtualized server environment can support service level agreement (SLA) improvements, it can expand an organization's data protection options overall, and it can enable better BC/DR scenarios (i.e., more agile recovery if needed).
IT is all about data. Are you protecting it? Relentless data growth, virtualization deployments, cloud strategies, consolidation initiatives, and more aggressive service level agreements are just a few of the major trends affecting data protection environments. Data protection is likely to see increased spending in 2013 in the areas of new tools and technologies, particularly those focused on backup and recovery, BC/DR, and regulatory compliance.
The business application market is undergoing a transformation driven by the technological forces of mobile devices, social media, and cloud computing. This transformation is changing how knowledge workers use software, and who influences purchasing decisions for business applications.
Each year, security threats to web applications grow increasingly dangerous, causing many organizations to increase their investments in web application security testing. Beyond the obvious security benefits for organizations, it is also a positive trend that will lead to new market opportunities for application development and application testing product vendors.