Collaboration Remains a Key to Zero-trust Success

We all understand that zero trust is a complex initiative. There’s a wide array of use cases, supporting technologies, starting points, and strategy options. On the bright side, one of the keys to succeeding with zero trust remains something companies arguably have the most control over – collaboration across the organization. The less encouraging news? These cross-functional relationships could be better.

Topics: Cybersecurity

In Person Events - To Be [Real] or Not To Be [Real]!?

A newly released ESG Brief gives insights into how IT professionals are feeling about in-person conferences and other events that have been such a lynchpin of their (and their vendors') marketing, educational, and entertainment calendars for decades...and which have essentially all been replaced by online events since the onset of the COVID-19 pandemic. You can read the ESG Brief here. The ambivalence of the results was perhaps predictable. While it took a while for us to all settle into the "new normal" it has also made us both long for and question the "old normal." There is value in each. It will be interesting to see how things shake out as COVID—at least as a pandemic—"passes" and we all (vendors, end-users, and commentators) have a genuine choice.

Topics: Covid-19

Congratulations, HYCU!

I have been tracking the progress and success of HYCU for the past 3 years or so. The company has consistently delivered on its roadmap and expanded its platform well beyond the original focus on Nutanix. Its leadership team with Simon Taylor at the helm resisted the (I am safely guessing) many temptations for an equity event these past few years—until recently with last week's announcement of an $87.5m series A round. This is significant.

Topics: Data Protection

Organizations Can’t Keep Up with Security Hygiene and Posture Management

As the old security adage goes, “A well-managed network/system is a secure network/system, and this notion of network and system management is a cybersecurity foundation. Pick any framework (i.e., NIST Cybersecurity framework), international standard (i.e., ISO 27000), best practice (i.e., CIS 20 Critical Controls) or professional certification (i.e. CISSP), and much of the guidelines presented will be about security hygiene and posture management.

Let’s Start at the Beginning—Who are You? We are The Identerati!

The identity and access management ecosystem has come a long way in the past decade, invigorated by cloud identity, customer identity, mobile identity, and open identity standards. Industry incumbents and cloud providers have made significant investments to support scalable, distributed, multi-factor enabled and decentralized identity systems.

In my first (and exciting) week at ESG, I met with a series of sharp-minded entrepreneurs and newly funded startups that are tackling the complexities of authorization, access governance, and multi-cloud identity orchestration.

Topics: Cybersecurity

Juniper’s Continued March Towards Connected Security

The topic of network and security convergence has been front and center in the industry over the last year. The line between networking and security continues to blur, with collaboration increasing across traditionally siloed IT functions and technologies used by these teams continuing to inch closer together. One of the more notable initiatives is secure access service edge (SASE), and both enterprises and vendors alike are now embarking on their SASE journey.

Topics: Cybersecurity

Turning IT Up at Cisco Live 2021

This week Cisco held its annual customer event, Cisco Live, for its global audience. With over 100,000 attendees from over 200 countries, this may be one of the best attended Cisco Live events. Despite most organizations having to work from home over the past year, it certainly hasn’t slowed down the innovation and productivity from the Cisco engineers. The theme of this year’s event was Turn IT Up, something that organizations across the globe have been doing since the pandemic hit and Cisco was quick to call out the IT heroes that worked tirelessly to transition to work-from-home environments and enable businesses to continue operations.

Topics: Networking

How High-performance and High-capacity Storage Platforms Address the Storage Stack Problem

In a recent briefing with George Crump, Chief Marketing Officer of StorONE, we learned about Seagate and StorONE's latest offering that is designed to provide affordable high-performance and high-capacity storage solutions. The offering from StorONE, which became available in early March 2021 and features Seagate’s drives, was created specifically with a focus on databases, virtualization video surveillance, file, backup, and archive capability.

Topics: Storage IT Infrastructure Converged Infrastructure Application & Infrastructure Modernization

Security and Network Convergence Through SASE (Video)

Secure access service edge (SASE) has continued to garner significant interest in the market due to the need to ensure that security and networking strategies and technologies are aligned to better address the increasingly distributed nature of the modern enterprise. In this video, Bob Laliberte and I discuss some of the different vendor approaches to SASE, the balance between platforms and best-of-breed approaches, and the organizational issues users must consider with regards to SASE.

Topics: Cybersecurity Networking

Why XDR Must Include MDR

In my last blog post, I described how the market for eXtended Detection and Response (XDR) is evolving and how CISOs should approach this new and promising technology. It was good and useful information, if I do say so myself, but it didn't directly address the question of why security professionals should care about XDR in the first place.

The answer: Because XDR has the potential to accelerate threat detection/response while streamlining security operations.

Topics: Cybersecurity