Joe Tucci’s Next Phase

Lately I’ve been reflecting on the past, which is new to me since I normally only care about the future. But even I get nostalgic from time to time. ESG is in its 20th year! That’s crazy.

So whether it’s the romantic in me or the fact that I’m now experienced enough to reflect on the countless amazing things I’ve seen over my career, you’ll be hearing stories from my past with an eye toward the future. This tale is just that—the next phase of one Joe Tucci.

Topics: Storage Cloud Services & Orchestration

Talking Data Protection with IBM’s Sam Werner

I had the opportunity to connect with Sam Werner recently in San Francisco at IBM’s THINK 2019 event for a new data protection conversation. Check out the video to learn more about IBM’s data protection directions.


Topics: Data Protection data protection conversations

The Convergence of Endpoint Security

As adversaries continue to be more aggressive and more targeted in their attack techniques, security teams are continuously challenged to implement more comprehensive endpoint protection strategies to keep up. Next-generation security vendors like Carbon Black, CrowdStrike, and Cylance have set the agenda, delivering integrated prevention, detection, and response platforms leveraging the cloud and a single agent. Established endpoint players like Symantec, Trend Micro, and Sophos have quickly responded, delivering integrated solutions leveraging both cloud and a common agent. ESG research shows that 77% of companies surveyed plan to move to an integrated security suite with a preference towards a single vendor, with an even split between companies who are looking to next-gen providers and those looking to the large, established security players.

Topics: Cybersecurity

Data Intelligence at the Heart of Cohesity's New Capabilities

In its most recent announcement, Cohesity introduced new capabilities that will help its customers go beyond just backup or data consolidation, crossing what I call the "Data Management" chasm.

The fundamental issue with data is that there's just too much of it, making it expensive to store, manage and truly leverage. At the same time, from a business perspective, data (within compliance reason) should be your friend, not your enemy.

Topics: Data Protection

What to expect at the RSA Conference 2019

I’ve attended the RSA Conference for the past 15 years, and things have changed quite a bit. The event has gone from a few thousand to around 50,000 attendees, leading to a confluence of humanity and traffic around the Moscone Center. Hotel room prices exceed $500 per night, even at some of the “boutique” (i.e., flea bag) hotels in and around Union Square. The RSA event has become the nexus where cybersecurity meets high-end capitalism.

Topics: Cybersecurity RSA Conference

The NetApp Lesson: Adapt and Flourish

This week NetApp founder Dave Hitz retired. Before I make my point, a little history:

In 1993 I started an east coast company, Invincible Technologies Corp. (ITC), which turned out to be quite vincible after all. My compatriots and I were building NFS servers called Lifelines. They were serious machines, sold by serious people in suits and ties, with serious marketing. At the same time, some hippies out west started a company called Network Appliance (eventually NetApp). Dave Hitz and his partner James Lau built an NFS server, which they called the Toaster. I don’t think they had a sales person.

Fast forward to 1999 and the business-savvy, suit wearing, serious company ITC was kaput while the hippie Linux-lovers of Silicon Valley were a public homerun. Turns out that eventually, the person with a product that actually works has a much better chance of success than a bunch of good sales people with a good-looking box that doesn’t. Dave Hitz was a billionaire, and I was a shamble.

Previewing RSA Conference 2019: Cybersecurity Services, Cloud Security, and DevSecOps

In this video blog, ESG’s new principal analyst, Christina Richmond, and I preview what we expect to see at RSA Conference 2019. The scope and scale of RSA Conference continues to grow with adjunct events held by industry organizations such as the Cloud Security Alliance, vendors, and ESG with our own breakfast event. A few of the topics we expect to be front and center at this year’s RSA Conference include:

Topics: Cybersecurity RSA Conference

Thoughts on IBM Think[ing] 2019- includes video

IBM’s Think 2019 event was made to do just that – make you think. Unlike many vendors, whose events can be like giant market stalls, Think was more more like a visit to your old college; and that's  not a pejorative, it’s a compliment.

Sure, it could get a tad calculated or even over-earnest at times, but overall it was a refreshing take – stopping and thinking...though in San Francisco last week it was advisable to undertake your contemplations inside the Moscone Center, as it poured with rain on the main mid-week days! Weather aside, the move from Vegas to San Francisco was a good one.

Topics: Storage Cybersecurity Data Protection

Enterprises Need to Embrace Top-Down Cybersecurity Management

When I first entered the cybersecurity market in 2003, I’d already been working in the IT industry for about 16 years in storage, networking, and telecommunications previously. By the early 2000s, all three sectors had moved on from bits and bytes to focusing on how each technology could help organizations meet their business goals. Oh sure, we still talked speeds-and-feeds, but we led with things like business agility, productivity, and cost cutting. The technology was a means to an end rather than an end in itself.

When I got to the cybersecurity industry, I was surprised by what I saw. Unlike other areas of IT, cybersecurity was still deep in the weeds, focused on things like IP packets, application protocols, and malicious code. In other words, cybersecurity remained a “bottom-up” discipline as the cybersecurity team viewed the world from networks and devices “up the stack” to applications and the business.

Topics: Cybersecurity

Thoughts on IBM Think and Cybersecurity

I just got back from attending IBM Think in San Francisco. Though it was a quick trip across the country, I was inundated with IBM’s vision, covering topics from A (i.e., artificial intelligence) to Z (i.e., System Z) and everything in between. 

Despite the wide-ranging discussion, IBM’s main focus was on three areas: 1) Hybrid cloud, 2) Advanced analytics, and 3) Security. For example, IBM’s hybrid cloud discussion centered on digital transformation and leaned heavily on its Red Hat acquisition, while advanced analytics included artificial intelligence, cognitive computing (Watson), neural networks, etc. To demonstrate its capabilities in these areas, IBM paraded out customers like Geico, Hyundai Credit Corporation, and Santander Bank, who are betting on IBM for game-changing digital transformation projects.

Topics: Cybersecurity SOAPA