ESG research indicates that the corporate usage of public cloud computing continues to grow, including infrastructure (IaaS) and application development (PaaS) services. Being one of the first movers in these areas, it’s not surprising that Amazon Web Services is one of the most widely leveraged providers among current users, but how do these organizations view AWS as a long-term IT partner? And, perhaps more importantly, how do these trends vary by the age of organizations and the individual IT decision makers responsible for strategic direction?
One of the primary deterrents to most BC/DR plans is that recurring testing must occur in order to ensure preparedness for when calamity strikes and to prove compliance for those with regulatory mandates. But testing in general can be not only arduous due to the complexity of bringing replacement systems online, but also risky in that doing so without proper preparation carries the possibility of affecting the primary systems, which are actively serving users. This has historically led to infrequent or even non-existent recovery testing. How—if at all—do cloud-based disaster recovery services change this dynamic?
There has never been so much corporate data outside of the data center as there is now. It is due to the changing usage of endpoint devices, particularly by users in bring-your-own-device (BYOD) environments. Too often, IT tries to utilize complex legacy data center backup approaches to protect these modern endpoints, with the result being that endpoints and all of the corporate data residing in them are left unprotected. But it doesn’t have to be that way.
ESG has again completed its annual IT Spending Intentions research survey of global IT decision makers, investigating IT initiatives and priorities, budget changes, staffing outlook, and cloud and big data trends. This research brief highlights key findings around business intelligence, analytics, databases, and big data, which will help paint a sharper picture of the current state of the industry and future directions.
The OFS market is rapidly maturing from file storage services for consumers to technology solutions that require features to effectively manage and secure business data. As part of this evolution, there is increasing demand for alternatives to the “one-size-fits-all,” cloud-based approach, especially among current OFS users who currently leverage that deployment model.
ESG Reference Research includes data-centric reports and briefs designed for market intelligence, marketing, product marketing/management, engineering, and corporate strategy professionals at IT vendor organizations. ESG’s Reference Research content is intended to assist in market segmentation, market sizing, product requirements analysis, and other business planning exercises, while also providing IT professionals a way to benchmark themselves against their peer organizations. This Reference Research brief focuses on the amount organizations spend on data protection technologies and processes in a typical year and includes analysis of this data by number of employees, vertical industry, annual revenue, number of production servers worldwide, and total volume of data stored on corporate servers and storage systems.
ESG Reference Research includes data-centric reports and briefs designed for market intelligence, marketing, product marketing/management, engineering, and corporate strategy professionals at IT vendor organizations. ESG’s Reference Research content is intended to assist in market segmentation, market sizing, product requirements analysis, and other business planning exercises, while also providing IT professionals a way to benchmark themselves against their peer organizations. This Reference Research brief focuses on the number of administrators tasked with managing their organizations’ data protection environments and includes analysis of this data by number of employees, industry, average amount spent on data protection technologies annually, number of worldwide production servers, and the total amount of data residing on those systems.
Mobile computing is well beyond a fad for e-mail enablement; enterprise organizations are undertaking mobile computing initiatives for new business processes and creative applications that reach employees, customers, and even business partners. When mobile devices were first implemented, CIOs turned to Mobile Device Management (MDM) platforms to onboard and manage devices, but MDM really doesn’t protect employees when they use mobile browsers or applications on the devices themselves. As mobile computing evolves, CISOs are implementing their own mobile security solutions for malware protection and application controls. Cloud-based mobile security solutions that integrate with traditional MDM are becoming popular choices for these requirements.
Since the term “cyber Pearl Harbor” was first coined during the Clinton administration, the U.S. government has warned about cybersecurity dangers but done little to protect the nation. Earlier this year, President Obama issued an executive order to address cybersecurity, but others in Washington view this as a political move and remain cynical about any real cybersecurity threat. Is the cyber threat real and if so, what should the U.S. Federal Government do about it? To answer this question, ESG surveyed 315 security professionals working at U.S.-based enterprise organizations (i.e., 1,000 or more employees). This well-informed group of cybersecurity “insiders” is much more certain than DC pundits, think tanks, and legislators—they firmly believe that cybersecurity threats are real and want to see more from Washington in response.
The malware threat landscape is getting worse and many large organizations continue to suffer security breaches as a result. Why? Enterprises often lack the right security skills and their current defenses and security analytics are no match for increasingly sophisticated and stealthy targeted attacks. Fortunately, large organizations recognize these gaps and are increasing security budgets to bolster malware prevention, detection, and response. To benefit from these investments as soon as possible, CISOs should improve malware knowledge, invest in security analytics, and deploy modern anti-malware technologies on networks and hosts.