Thoughts on IBM Think and Cybersecurity

I just got back from attending IBM Think in San Francisco. Though it was a quick trip across the country, I was inundated with IBM’s vision, covering topics from A (i.e., artificial intelligence) to Z (i.e., System Z) and everything in between. 

Despite the wide-ranging discussion, IBM’s main focus was on three areas: 1) Hybrid cloud, 2) Advanced analytics, and 3) Security. For example, IBM’s hybrid cloud discussion centered on digital transformation and leaned heavily on its Red Hat acquisition, while advanced analytics included artificial intelligence, cognitive computing (Watson), neural networks, etc. To demonstrate its capabilities in these areas, IBM paraded out customers like Geico, Hyundai Credit Corporation, and Santander Bank, who are betting on IBM for game-changing digital transformation projects.

Topics: SOAPA Cybersecurity

Lenovo Takes the Worry Out of IT with Its TruScale Service

Today, Lenovo announced Lenovo TruScale, a new IT subscription service with a wealth of benefits for businesses seeking to offload the complexity of IT, thereby freeing resources to focus on higher-value activities. In other words, Lenovo takes care of the day-to-day minutia, and IT can free up the resources to focus on maximizing the value of their data and competing in the newly proclaimed digital economy.

Topics: Storage

Carbonite Buys Webroot – Why You Should Care

Cloud data protection player Carbonite just agreed to acquire cloud endpoint security player Webroot for $618M in cash.

My first immediate concern is that I’ve seen this before. Symantec bought Veritas – same logic: marry endpoint security with data protection – because that makes sense – except it didn’t work. It failed spectacularly.

Having said that, times are different, so I won’t immediately write it off. But I do have big concerns.

Topics: Cybersecurity Data Protection

Cyber Risk Management Disconnect Between Business and Security

A few years ago, cybersecurity professionals often lamented that executives didn’t want good security, they wanted “good enough” security. This axiom reflected that many CEOs equated cybersecurity with regulatory compliance. If the CISO could check all the right PCI, HIPAA, or SOX boxes, cybersecurity concerns were taken care of.

The “good enough” security attitude was an aversion for the cybersecurity crowd. CISOs who wanted to adequately protect corporate assets longed for a time when business executives would truly appreciate cyber risk and would be willing to participate and fund cyber risk management efforts adequately.

Topics: Cybersecurity

Be Prepared

Cybersecurity services are at an inflection point, where they are no longer "nice to have" but "must have" for security teams. Migration to digital and cloud-driven architectures, continued lack of resources, and rapid growth of breaches escalate the need for an objective service partner. Admittedly, I’m a services wonk, and see all markets through the lens of services, but it’s obvious that complexity and overwhelm abound as a myriad of new security solutions confuse the market annually at conferences. (Speculation about this year’s RSA “theme” is rife on LinkedIn.) Security teams are challenged to manage security effectively, and to negotiate business against risk. The evolution of this market necessitates services that drive assessment and rationalization of existing security programs rather than adoption of new technologies. It also demands preparedness.

Topics: Cybersecurity

Security Point Tools Problems

At most enterprise organizations, cybersecurity infrastructure grew organically over time. The security team implemented each security control in response to a particular threat, such as if antivirus software appeared on desktops, gateways were added to the network, sandboxes were deployed to detect malicious files, etc. 

Topics: Cybersecurity SOAPA

From Backup to Intelligent Data - Introducing a New Maturity Model (Video)

The world of data protection is changing rapidly. After many years witnessing these changes as a vendor, and now as an analyst, I have developed a maturity model: the backup data transformation model. This model will help both end-users and vendors evaluate their current position and their journey from data backup to autonomous data intelligence and whether they can cross the data management chasm. Did I get your attention? Please read on.

Topics: Data Protection

NetApp's Change: In Conversation with John Rollason (Video)

The positive changes at NetApp over the last few years have been impressive and hard to ignore. One can argue about what is chicken and what is egg in terms of strategy and execution, but the bottom-line results speak for themselves. 

On a recent visit to the UK, I had time to pop in to NetApp's Uxbridge headquarters and chat through the topic of 'change' with John Rollason, NetApp's European marketing lead. The interview is pretty much unedited, but broken into two logical parts:

Topics: Storage

The Cybersecurity Skills Shortage Is Getting Worse

At the end of each year, ESG conducts a wide-ranging global survey of IT professionals, asking them about challenges, purchasing plans, strategies, etc.  As part of this survey, respondents were asked to identify areas where their organization has a problematic shortage of skills.

In 2018-2019, cybersecurity skills topped the list – 53% of survey respondents reported a problematic shortage of cybersecurity skills at their organization.  IT architecture/planning skills came in second at 38%.

Topics: cybersecurity skills shortage Cybersecurity

Data Protection Conversation with HYCU (Video)

In our most recent edition of Data Protection Conversations, I spoke with Simon Taylor, CEO of HYCU. HYCU has a very unique profile with many years of expertise in backup and recovery and a unique strategy to address some of the newest challenges in modern data protection and multi-cloud workloads. Don't miss this edition and stay tuned for our next Data Protection Conversation.

Topics: Data Protection data protection conversations