Featured Content from Jason Buffington

135903506.jpg

[ESG Tech Truth] The Shifting Organizational Dynamics of Data Protection

By: Jason Buffington

The days of the autocratic backup administrator are dwindling. Indeed, a majority of organizations surveyed by ESG revealed that not only are IT operations groups increasing their data protection profile, but core platform owners--namely database and virtual server administrators–are involved in the daily processes to keep their respective workloads up and running.

135903506.jpg

[ESG Tech Truth] The Shifting Organizational Dynamics of Data Protection

By: Jason Buffington

The days of the autocratic backup administrator are dwindling. Indeed, a majority of organizations surveyed by ESG revealed that not only are IT operations groups increasing their data protection profile, but core platform owners--namely database and virtual server administrators–are involved in the daily processes to keep their respective workloads up and running.

img2.png

[ESG Brief] What to Look for in Appliance-based Data Protection

By: Jason Buffington

At least four different kinds of data protection appliances (DPAs) exist, with even more “flavor” categories still on the horizon. Some DPAs are meant to be turnkey solutions for providing business and recovery agility. Others are meant to radically improve the efficiency of protection processes that an organization already has in place. All four types have relevance in today’s IT landscape … but there’s an art to figuring out which type is going to be best-suited to satisfying a particular organization’s protection goals.

img2.png

[ESG Brief] What to Look for in Appliance-based Data Protection

By: Jason Buffington

At least four different kinds of data protection appliances (DPAs) exist, with even more “flavor” categories still on the horizon. Some DPAs are meant to be turnkey solutions for providing business and recovery agility. Others are meant to radically improve the efficiency of protection processes that an organization already has in place. All four types have relevance in today’s IT landscape … but there’s an art to figuring out which type is going to be best-suited to satisfying a particular organization’s protection goals.

img3.png

[ESG Research Report] Data Protection Personas and Methods

By: Jason Buffington

In order to gauge “who is choosing what and how?” when it comes to modern data protection tools, ESG surveyed 305 IT professionals responsible for and/or familiar with their organization’s data protection infrastructure, processes, and strategy, representing large midmarket organizations (defined as organizations with 500 to 999 employees) and enterprise-class (defined as organizations with 1,000 employees or more) organizations in North America. The goal of the research was to explore the business and IT requirements driving modern data protection strategies, the influencers and stakeholders within their organizations, and the implementation details of their existing and preferred data protection strategies.

img3.png

[ESG Research Report] Data Protection Personas and Methods

By: Jason Buffington

In order to gauge “who is choosing what and how?” when it comes to modern data protection tools, ESG surveyed 305 IT professionals responsible for and/or familiar with their organization’s data protection infrastructure, processes, and strategy, representing large midmarket organizations (defined as organizations with 500 to 999 employees) and enterprise-class (defined as organizations with 1,000 employees or more) organizations in North America. The goal of the research was to explore the business and IT requirements driving modern data protection strategies, the influencers and stakeholders within their organizations, and the implementation details of their existing and preferred data protection strategies.

img4.png

[ESG Video Capsule] EVO Rail Data Protection Series - Part 1 of 7 - Why EVO RAIL Protection is Intriguing

By: Jason Buffington

In Part 1 of this ESG Video Capsule series on EVO RAIL Protection, ESG Senior Analyst Jason Buffington explores why EVO RAIL Data Protection is intriguing.

img4.png

[ESG Video Capsule] EVO Rail Data Protection Series - Part 1 of 7 - Why EVO RAIL Protection is Intriguing

By: Jason Buffington

In Part 1 of this ESG Video Capsule series on EVO RAIL Protection, ESG Senior Analyst Jason Buffington explores why EVO RAIL Data Protection is intriguing.

2016 Predictions Video - Data Protection

 
tech-target-soa.png

"IT staff [members] are the custodians of the data," said Jason Buffington, senior analyst at Enterprise Strategy Group, an IT research service. "Consequently, they are responsible for protecting that data regardless of whether it lives on cloud services, servers or endpoints. This is no different than the level of IT governance enterprises deploy in-house."

Read the entire article at TechTarget

Some of our clients: