Market Landscape Reports

  • June 1, 2015

    Object Storage

    If there is one universal truth when it comes to information technology over the past decade, it is that data growth is inevitable and unstoppable. The sharp rise in digital assets has been a consequence of multiple cultural shifts over recent years. Whether driven by personal or professional motives, individuals are simply creating more digital assets than ever before. Regardless of the industry, the success of corporate operations depends on the ability to utilize digital assets. Whether it’s media and entertainment leveraging higher resolution video or developing more realistic digital effects, energy exploration firms capturing detailed 3D or 4D seismic data, security systems capturing higher resolution security footage, or online content distribution, the creation and the efficient utilization of digital assets is critical to staying competitive across nearly every line of business.

    Learn More

  • October 16, 2014

    2014 Solid-state Storage

    The Case for, Types of, and Purchasing Considerations

    The solid-state industry—its players, offerings, and technologies—has undergone considerable evolution in just the past few years. The most recent era of solid-state storage has seen the rise of multiple new vendors with all-flash arrays, and hybrid solutions, along with PCIe offerings and even software-only solutions. The traditional storage players, such as EMC, NetApp, etc., responded quickly by acquiring one or more of these new entrants, by developing their own offerings, or both. With more product options available, those organizations with the greatest demand for high-performance low-latency technology quickly and happily adopted these initial solutions. These were invariably applications where a latency reduction could translate directly into visible and tangible economic benefits: good early examples were high-frequency trading, and high-performance databases.

    Learn More

  • December 30, 2013

    The Evolution of Software-defined Network Architectures

    IT has been rapidly transforming in order to be more responsive to the business. Macroeconomic events and global competition have forced organizations to more aggressively leverage technology for competitive advantage. New architectures like server and storage virtualization (web- and service-oriented architecture [SOA]-based applications) have been deployed, along with automation and orchestration tools, to enable organizations to accelerate time to market with new services.

    Learn More

  • November 14, 2013

    Corporate Online File Sharing and Collaboration Security and Governance

    Understanding the Public and Hybrid Cloud Solutions Landscape

    Mobility and consumerization are having a hard and fast impact on IT. We are no longer in a “command and control” world in which IT dictates which tools employees use (hardware as well as software): More end-users are choosing their own hardware platforms and software applications in lieu of the IT-sanctioned business tools provided by their companies, and IT is sprinting to catch up. These end-users are looking to tackle issues like data sharing, portability, and access from multiple intelligent endpoint devices, creating a conundrum for IT as it has to balance business enablement, ease of access, and collaborative capacity with the need to maintain control and security of information assets.

    Learn More

  • July 29, 2013

    Corporate Online File Sharing and Collaboration Security and Governance

    Understanding the On-premises Solutions Landscape

    Mobility and consumerization are having a hard and fast impact on IT. We are no longer in a “command and control” world in which IT dictates which tools employees use (hardware as well as software): More end-users are choosing their own hardware platforms and software applications in lieu of the IT-sanctioned business tools provided by their companies, and IT is sprinting to catch up. These end-users are looking to tackle issues like data sharing, portability, and access from multiple intelligent endpoint devices, creating a conundrum for IT as it needs to balance business enablement, ease of access, and collaborative capacity with the need to maintain control and security of information assets.

    Learn More

  • July 11, 2013

    NAC Solutions Evolve to EVAS: Endpoint Visibility, Access, and Security

    Network access control has been around for a decade, and the global recession and years of vendor consolidation certainly took a toll on NAC solutions. But NAC is not fading away. Instead, NAC has evolved into a new and stronger market segment called EVAS (Endpoint Visibility, Access, and Security).  CISOs should place NAC in their legacy file and begin to assess EVAS as part of their security strategies.

    Learn More

  • June 13, 2013

    Integrated Computing Platforms

    ESG defines an integrated computing platform (ICP) as a virtual computing infrastructure (VCI) solution that integrates hardware and software components into a single consumable IT system. ICPs combine independent pieces of IT infrastructure that are normally operated separately through policy and common functionality to form simplified computing platforms targeted at virtualized and cloud environments. In this report, ESG focuses on ICPs—specifically, what factors are continuing to drive adoption; how are vendors engineering ICPs and adding value beyond packaging and branding; and how are vendors bringing these solutions to market?

    Learn More

  • May 22, 2013

    The Emergence of Software-defined Network Architectures

    IT has been rapidly transforming in order to be more responsive to the business. Macroeconomic events and global competition has forced organizations to more aggressively leverage technology for competitive advantage. New architectures like server and storage virtualization (web- and service-oriented architecture (SOA)-based applications) have been deployed, along with automation and orchestration tools, to enable organizations to accelerate time to market with new services.

    Learn More

  • May 22, 2013

    Data Protection Target Devices

    How Modernization Trends Are Affecting the Future of the Disk-based Backup Target Systems Market

    For decades, protecting electronic business data has been one of IT’s most essential responsibilities. In today’s information-intensive world, the importance of the task becomes even more obvious—as do the negative legal, reputational, and fiscal consequences that arise when data protection environments are not deployed and managed properly.

    Learn More

  • March 29, 2013

    The Evolution of Big Data Security Analytics Technology

    Does information security analytics qualify as big data? Considering the challenges involved in capturing, processing, storing, searching, sharing, analyzing, and visualizing all of the data that an organization collects from log files, external intelligence feeds, and other sources, this question is clearly answered as many organizations say that security data collection and analysis would be considered big data within their organizations today. ESG defines the term “big data” as follows: In information technology, big data is defined as a collection of data sets so large and complex that it becomes difficult to process using on-hand database management tools or traditional data processing applications.

    Learn More


More Results: