Juniper is Engineering Simplicity for the Multi-cloud Journey

I Just Want the App to Work…

Commvault Announces New Offerings at Commvault GO 2018

The 2018 Channel Acceleration Awards: The HPE Partner Ready Program

Ten Takeaways from the Splunk User Conference

DDN Partners with NVIDIA Targeting AI

Cloudera and Hortonworks Merge

Hitachi Vantara Talks What’s Next at NEXT (Video)

Cloudy Future for Security Analytics

Talking NVMe and Optimized Hybrid Storage Management (ESG 360 Video Series)

Form Factor Wars: Cloud-based or On-premises Security Technologies?

Imanis Data Announces New Version

Talking About the Next Steps in IT Automation (ESG 360 Video Series)

Five Ways to Get Started with DevSecOps

Talking About Linking Development and Security (ESG 360 Video Series)

Cybersecurity Challenges at Smaller Organizations

Is Microsoft’s Managed Desktop Right for You?

Talking Connectivity and Experience (ESG 360 Video Series)

The True Value of SaaS and Managed Service Offerings

Lenovo and NetApp Join Forces

Ubiquity on Full Display at VMworld 2018 (Video)

CISOs Recommend Future Actions for their Organizations

Defining a Cybersecurity Platform

Takeaways from the CISO Summit at Black Hat 2018

What Are the Most Important Attributes of a Cybersecurity Platform?

AWS and VMware: Fundamentally Changing Hybrid Cloud at VMworld 2018 Day 1

Heading to the Clouds: Pure Storage Acquires StorReduce

The Transition Toward Enterprise-class Cybersecurity Vendors

What Are Small Organizations Doing About Cybersecurity?

VMworld 2018 Preview with an HCI Lens

Cybersecurity Experiences at Small Organizations

Extending the Value of Hadoop and Spark with a Cloud-based Managed Service

Takeaways from Black Hat USA 2018

HYCU Introduces BaaS for Google Cloud

Extreme Sets Its Sights on 2019 and Its Customers

Google's New Cloud Strategy Highlighted at Google Next '18 (Video)

The Future of VMware: VMworld 2018 Preview

Cisco Buys Duo Security to Address a ‘New’ Security Perimeter

Talking Channel (ESG 360 Video Series)

Connectivity and Experience

Anticipating Black Hat USA 2018

Google NEXT - Democratizing Analytics and Artificial Intelligence

Thoughts from Google Next 2018

Google Intends on Making GCP the Most Secure Cloud Platform

Talking GDPR (ESG 360 Video Series)

Is Ransomware on your Radar? Rubrik Can Help…

Talking Storage (ESG 360 Video Series)

What's Next? Google Next!

What Makes CISOs Successful?

Want to Win in the Digital Economy? Transform your IT Infrastructure

IBM Storage Develops Its Modern Storage Mantra and Portfolio (Video)

What to Watch at Google Next '18 (Video)

Will AWS Join the Enterprise Network Switch Market?

Is HCI Bringing Change to the Hypervisor Market?

What I Learned at the Tufin Customer Conference (Tufinnovate)

HPE GreenLake: IT Flexibility on Steroids (Video)

In Conversation with Warner Bros. Entertainment's Doug Crawford at HPE Discover 2018 (Video)

Talking Validation (ESG 360 Video Series)

Talking Mobility (ESG 360 Video Series)

The Need for Better Monitoring of Cloud-native Applications

Talking Data Protection: ESG 360 Video Series

Discovering a Renewed HPE (Video)

HPE Re-Discovers Its Roots and Looks Forward to an Intelligent Edge (Video)

Rancher Labs Simplifying Kubernetes

Talking Cybersecurity Threat Landscape (ESG 360 Video Series)

Actifio Highlights the Value of Data at Data Driven 2018

The New Endpoint Security Market: Growing in Size and Scope

Discovering Odaseva Data Management-as-a-service: Salesforce Backup, Archive, and GDPR

The Importance of Cloud Infrastructure Compatibility and VMware Cloud on AWS

Talking Data Analytics (ESG 360 Video Series)

Rubrik Doubles Down on Hybrid Support with Alta 4.2 Release

What Does GDPR Mean for Data Protection? (Video)

A Quick Look at HYCU, Backup and Recovery for Nutanix Environments

Cisco Security Synopsis from CiscoLive

ESG in Conversation with 'Coz' at Pure Accelerate (Video)

The 2018 Channel Acceleration Awards: IBM PartnerWorld

Discussing the Acquisition of Netsil with Rajiv Mirani of Nutanix (Video)

Beam Video Discussion with Binny Gill of Nutanix

Real World SLAs Blog Series #3: Downtime and Data Loss Business Impact

Talking Networking, Part 2 (ESG 360 Video Series)

Converged vs Hyperconverged – What’s Driving the Decision

Druva Acquires CloudRanger

Toward Central Network Security Policy Management for Hybrid Clouds

Talking Cloud Cybersecurity (ESG 360 Video Series)

Pure Accelerate 2018

SOAPA Video with McAfee (Part 2)

Pure Accelerate 2018 – Data Centric in the City (includes video)

Real World SLAs Blog Series #2: The IT Resiliency Equation

Pure Accelerate: The Future is Now

Analyst-centric Security Operations

Accelerating to a Data-centric Architecture with Pure Storage

SOAPA Video with McAfee (Part 1)

Talking Converged Architectures (ESG 360 Video Series)

SOAPA Video with FireEye (Part 2)

Catching Up with Symantec

GDPR and the Challenges to Achieving Compliance (Video)

SOAPA Video with FireEye (Part 1)

Dell Technologies World – Making IT Transformation Real for Partners

Talking IT Evolution (ESG 360 Video Series)

Real World SLAs Blog Series: Downtime and Data Loss Metrics

Talking Networking, Part 1 (ESG 360 Video Series)

Talking Cybersecurity (ESG 360 Video Series)

At .NEXT Nutanix Adds App & System Visibility to its Infrastructure-invisibility Foundations (video)

Nutanix Delivers Invisible IT, but Highly Visible Cloud and Modern Application Environments with Acquisitions

Three Facts About Multi-Cloud That Will Surprise You

Containers are Here! What About Container Security?

Taking Dell's Marketing to the Market - More From DTW (video)

Narrative of Nutanix .NEXT in NOLA

It’s Time to Think Harder About Security Data Management

Red Hat Leading the (Open)Shift to the Cloud

Google Cloud Makes Bold Move with Velostrata Acquisition

Dell’s latest baby - DTW # 1 - is huge (Video)

The Evolution of Security Operations Automation and Orchestration

Convergence of Technologies: Cloud and Data Protection at Dell Technologies World (Video)

Networking News and Insights from Dell Technologies World 2018 (Video)

The 2018 Channel Acceleration Awards: The Trend Micro Partner Program

Cloud's Connection to Copy Data Management (Video)

Dell Technologies World: Power to the People

Cloud Computing Security Chaos Continues at RSA Conference 2018

Delivering on the Promise of AI and ML at Dell Technologies World 2018

CI and HCI Traction and Updates from Dell Technologies World 2018

Insights from Extreme Connect 2018 (Video)

The 2018 Channel Acceleration Awards: The Dell EMC Partner Program

What is a Cybersecurity Technology Platform Anyway?

Expectations for Dell Technologies World: The Family Comes Together

What to Expect from Red Hat Summit (Video)

Amazon Throws Its Hat Into the Blockchain Ring

RSA 2018: Securing (y)our Data, (y)our IT…and the World -- includes video

Quick Take-Aways From the RSA Security Conference

In Conversation with Aruba's Larry Lunetta at Atmosphere 2018 (Video)

The 2018 Channel Acceleration Awards: Next up, Webroot Partner Edge

In Conversation with IBM's Eric Herzog at Think 2018 (Video)

Looking Ahead to Dell Technologies World (Video)

In Conversation with IBM's Ed Walsh at Think 2018 (Video)

See You at Extreme Connect

Thoughts Ahead of Dell Technologies World (Video)

Cloud Security Will (and Should) Dominate the RSA Conference

Industry Roundup: Addressing the Hybrid Cloud Security Readiness Gap

And the Current Number #1 Challenge with HCI Is…

Software-defined Perimeter (SDP):  Important Initiative, Ineffective Name

The 2018 Channel Acceleration Awards: First up, Riverbed Rise

The ELI5 version of Blockchain Technology Components (Video)

Mid-range vs. Enterprise Storage: Is Size All that Matters?

Machine Learning: Security Product or Feature?

Citrix Synergy 2018: What’s in Store?

Aruba Creates an Infectious (in the good sense!) Atmosphere -- includes video

Aruba - Driving Innovation to the Intelligent Edge

CISO Perspective on the RSA Security Conference

Blockchain Progresses in the Enterprise IT Space (Video)

THINK-ing about IBM (includes video)

Is It Time to Unify Endpoint Management and Security?

Is It Too Late For Oracle to Enter the Cloud Analytics Space?

Pure Storage: Empowering Artificial Intelligence

Where Endpoint Management and Security Meet

Thoughts from IBM Think 2018: Bridging IT Transformation and Digital Transformation 

Modern Device Management: Resist Or Embrace?

Exploring the Intelligent Edge at Aruba Atmosphere

The 90s called—they want their PDF files back!

New Partner Mantra: 'Show Me (How I Make) the Money'

ESG at RSA: Identity, No Passwords, and Email Security (Video)

GDPR: Look Out for 'Right to Be Forgotten Storms' Ahead

The Proactive CISO

The Impact of Server Refreshes on the Server and HCI Markets

Artificial Intelligence and Machine Learning - More Than Just Buzzwords

Video: What Drives IT Complexity

No One Wants Your Stuff!

Endpoint Security Suites Must Detect/Prevent Threats AND Ease Operations

Apcela: Choices for Hybrid Computing and Financial Accounting

Thinking about Identity Management for the RSA Security Conference

Video: What Networks Do for IT Organizations

Why Splunk Acquired Phantom

GDPR Is Coming and Many Organizations Aren’t Ready

Highlights from ESG’s Enterprise On-premises Infrastructure Spending Trends Research (Video)

What’s on CISO's Minds in 2018?

The State of Constant Change in Endpoint Security

Systems Management With Today’s Security Threats

2018 Enterprise Mobility Spending Trends Video

“Gotta Have” Endpoint Security Suite Functionality

Change is Constant

The Need for Speed and Automation: Enterprise Storage in 2018 (Video)

2018 Data Protection Predictions (Video)

Cybersecurity Job Fatigue

It's Still Early for Converged and Hyperconverged – Predictions for 2018 (Video)

Ransomware Research Highlights (Video)

Video: Role of SD-WAN in Network Modernization

Cloud Computing Chaos Is Driving Identity Management Changes

Making Infrastructure Less Visible Shines a Light on Other Issues

Video: Impact of Cloud Computing on the Network

Enterprise Plans for Security Automation and Orchestration

Analytics in the Cloud – Usage Is Only Going Up (Video)

Best of Breed

Artificial Intelligence and Cybersecurity: The Real Deal

SOAPA Video with Bay Dynamics (Part 2)

Endpoint Detection and Response (EDR) Is Coming – In One Form or Another

Key Cybersecurity Findings from ESG’s 2018 IT Spending Intentions Research (Video)

 2018 Cybersecurity Radar Screen (Video)

Kaminario Goes Software

Okta and ServiceNow Help Solve Organizational Pressures

2018 Goodbye Password....Hello Bots and Machine Learning

SOAPA Video with Bay Dynamics (Part 1)

KODAKOne: Developing a clear blockchain use case?

A need for Android device compatibility branding

ESG Research Suggests Cybersecurity Skills Shortage Is Getting Worse

Growth in Endpoint Security as a Service in 2018

Meltdown and Spectre Shine a Light on the Multiple Facets of Systems Management

2018 Prediction: Network Relevancy

Microsoft Embraces Hybrid Cloud with Avere Acquisition

A Networking To Do List for 2018

CISOs Should Examine Commercial SOAPA Offerings in 2018

Say Goodbye to Passwords in 2018

Why Do CISOs Change Jobs So Frequently?

Infrastructure Predictions 2018 - includes video

Enterprise Storage Predictions for 2018: IT Becomes Automatic

ESG Blog: 2018 Predictions for Cloud Platforms and Services (Video)

SOAPA Video with Kenna Security (Part 2)

ESG Blog: 2018 Predictions for Networking (Video)

CISO’s New Year’s Resolutions

Citrix and an Enterprise Service Mesh (Includes Video)

SOAPA Video with Kenna Security (Part 1)

Juniper Networks NXTWORK - Achieving simplicity, removing complexity (Includes Video)

Cybersecurity Past to Predict the Future

ESG360 Video: Who Owns Identity and Access Management (IAM)?

HPE Discover in Madrid  (includes video)

Why Companies Need to Protect Their Employees’ Corporate Identities (Video)

A Few Cybersecurity Predictions for 2018

Who Owns Identity and Access Management (IAM)? (Video)

What Defines Job Satisfaction for Cybersecurity Professionals?

How Is Identity and Access Management (IAM) Changing (Video)

HCI Performance Evaluation

What Presents Can We Expect Juniper Networks to Deliver?

More on Advanced Prevention in 2018

2018 Predictions for Systems Management, PaaS, and DevOps (Video)

Synchronoss Technologies Welcomes New CEO, Glenn Lurie (and a Potential Boost to Business)

Cybersecurity Professionals Aren’t Keeping Up with Training

No More Dealing with Infrastructure (Kind of, for Developers)

AWS continues to dominate, but is that good for you? (with video)

S3 Security Front and Center at AWS re:Invent

The Relevance of Networking at AWS re:Invent (with Video)

AWS & Cloud Networking Design Patterns

2018: The Year of Advanced Threat Prevention

The Case Against AWS – And It’s Not AWS' Fault

AWS Is Not Slowing Down at re:Invent (with Video)

Cybersecurity Professional Recruitment Chaos

Motive, Means, and Opportunity for Evaluating HCI Performance

Enterprises Must Address Internet of Identities Challenges

Facing the Hybrid Cloud Reality

DevOps Myths and Realities: Why the Key to DevOps is Understanding What it is First (Video)

The Cybersecurity Skills Shortage Acts as A Root Cause for Security Events

SOAPA Video with Arbor Networks (Part 2)

Acute Cybersecurity Skills Shortage Areas

New Research Confirms the Cybersecurity Skills Shortage Is an Existential Threat

Understanding The Hype Around Hyperconverged Infrastructure

SOAPA Video with Arbor Networks (Part 1)

Cybersecurity, Mobility, and the Expanding Perimeter (Video)

SOAPA Video with Siemplify (Part 2)

Do you want to deploy HCI? How do you compare solutions?

Identity and Access Management (IAM) Has Been in Babysitting Mode for Years...Something Must Change!

The Cybersecurity Skills Shortage Impacts Security Operations

The Drivers of Change in Endpoint Security

Dell EMC - Guaranteed to Please?

Dell EMC Updates its Midrange for a Flash Storage-defined World

Identity Management To-Do List Aligns with Cybersecurity

SOAPA Video with Siemplify (Part 1)

SOAPA Video with ThetaPoint (Part 2)

VMware’s Intention to Acquire VeloCloud: What does it mean?

Storage Trends Research – Data Center Storage Technology Revolution (#4 in a series) - includes video

Endpoint Security Needs “Efficient Efficacy”

Enterprise Networks and Telco Clouds on a Collision Course

The Internet of Identities: Coming Soon and Bringing Massive IAM Changes

SOAPA Video with ThetaPoint (Part 1)

Extreme Executes Against Vision with Brocade Acquisition

Gigamon Goes Private (Equity)!

The Push Toward Comprehensive Endpoint Security Suites

Endpoint Security: The Efficient Efficacy Design Center

SOAPA Video with ServiceNow (Part 2)

Best Practice:  Security Operations Automation before Orchestration

Apps coming back? Finding the balance with the cloud.

Storage Trends Research – The Impact of CI/HCI (#3 in a series) - includes video

SOAPA Video with ServiceNow (Part 1)

What I Expect from AWS re:Invent 2017

Few People Know it's National Cybersecurity Awareness Month. That’s a Problem.

Data Management Is Undeniably the Future of Data Protection

What Happened to the Store with Incomplete Digital Transformation

Dell’s IQT – A New Work State of Mind? (Video)

Trend Micro’s Case as an Enterprise Security Vendor

SD-WAN Should Not Be a Scary Thought

RCS and Universal Communications - This Time, It May Work

Wrap-Up on Backup from Veritas Vision 2017

SDN and Network Virtualization Revisited

How Enterprise Organizations Benefit from SOAPA

Box is a Platform, Not a Storage Provider

Storage Trends Research - Flash Storage (#2 in a series) - includes video

What’s Holding Back Enterprise Security Technology Transformation?

Cybersecurity Technology: Everything is Transforming and in Play

Data Protection Is (or Should Be) Increasingly Part of a Systems Management Strategy (Video)

Microsoft Top of Mind for Business after Attending Ignite (Video)

Insights from NetApp Insight

Storage Trends Research (#1 in a series) – includes video

Top Three VDI Challenges (Video)

Trip Report, Splunk Conference 2017

NEXT Up: Hitachi Vantara (includes video)

Veritas has a Singular Vision....(includes video)

Hitachi Transforms Itself at Next (Video)

Microsoft Ignite Enterprise Mobility and Security Highlights

Veritas Vision Recap: Leveraging Data for Multi-Cloud (Video)

Time to Embrace a Security Management Plane in the Cloud

IT Infrastructure’s Comings, Goings….and Stayings (Video)

The Problem with Collecting, Processing, and Analyzing More Security Data

Storage Versus Data: The Role of Storage in Managing the Larger Data IT Ecosystem (Video)

Phased Process for Cloud Security

Back in the Saddle Again

Microsoft Ignite: What to Expect

Apple Announcements: Good for Businesses?

Security Operations Spending and ROI

SOAPA Chat with Vectra Networks (Video, Part 2)

Hyperconverged Systems Don't Preclude the Need for Data Protection (Video)

Focus on the Right Thing about Containers: What the Workloads Perform, not How They Do It

VMworld 2017: The Year of the Cloud

Cybersecurity Pros' Opinions on Their Organization’s Security Operations

Wrap-up on Backup from VMworld US 2017

Top 3 Workspace Wonders at VMworld 2017

VMworld 2017: A Cornucopia of Possibilities (includes video)

Talking SOAPA with Vectra Networks (Video, Part 1)

VMware Advances Application Security

VMworld 2017 Day 1 Recap - VMware Moving Past Virtualization for Cloud, Mobile, and Security

Security Operations Challenges Galore

Looking towards Data Management and Enablement in 2018 (Video)

Do you still need a VM-specific backup solution?

Nothing in IT Really Ends - Capisce? (Video)

What is an Enterprise-class Cybersecurity Vendor?

Network Services: Procurement and the Role of Service Providers

Future of Flash from Flash Memory Summit: Where there’s smoke, there’s fire

Cybersec Pros Choose Their Top Enterprise-class Cybersecurity Vendors

LTE and 5G: The Role of Wireless in Future SD-WAN

Cybersecurity Analytics and Operations Skills Shortage

How the Fluid Network Perimeter Is Driving an Internet of Identities

Addressing Security Analytics and Operations Issues

Moving Forward with Machine Learning for Cybersecurity

Black Hat Impressions

Black Hat 2017: Disruption in the Wind

The U.S. Versus China with Flash Memory Stuck in the Middle

“Dev-Test” in the Cloud Can Mean Ops as Well as Apps

A Quick Talk with Yousuf Kahn, CIO of Pure Storage: High Performance Flash Is Powering Digital Business Transformation (Video)

Looking Forward to VMworld

Cybersecurity Skills Shortage: Profound Impact on Security Analytics and Operations

Anticipating Black Hat 2017

As the Storage Industry Converges on VMworld, HPE and NetApp are Poised to Make Noise

VMworld – What I’m Intrigued To See

What to Watch About Systems Management & DevOps @ VMworld 2017

Cybersecurity Operations: More Difficult Than It Was 2 Years Ago

Midyear Check-in on Data Protection Initiatives in 2017 (Animated Infographic)

ESG Cybersecurity Research and a Preview of Black Hat USA 2017 (Video)

SOAPA Interview With Rick Caccia of Exabeam- Part 2 (Video)

Is the "Silver Lining" of Clouds Just Free Money for Some [of Your] Vendors!? (Video)

Applications Drive Hybrid Cloud, With On-Premises Being the Key to Hybrid, Not Public Cloud (Video)

The Internet of Identities (IoI)

Long Term Data Retention is Evolving – Are You? (Video)

Cisco Ramps Up Security With Intent-based Networking

At .NEXT, Nutanix Says It’s Time For a 'Real Hybrid Cloud' (Video)

CiscoLive and Cybersecurity

Cisco Intent-Based Networking Brings SDN to the Enterprise

SOAPA Interview with Rick Caccia of Exabeam, Part 1

First-hand Experience of Incomplete Digital Transformation

Telemetry and Performance Management in Softwarized Environments

WHAT Products or Services Might you Consider when Using Clouds Within your Data Protection Strategy – Part 4 in Series

Cisco’s Future Intents – Subtlety and Importance of What Is Coming

What's .NEXT for Nutanix?

Intelligent Networks - Networking is More than Data Delivery

What I Expect at Cisco Live 2017 - Grand Strategy Coming Together

Pure Accelerates its Move from Being Purely About All-flash Arrays

ESG Security Operations and Analytics Webinar

HOW to Ensure Security when Using Clouds Within your Data Protection Strategy – Part 3 in Series (Video)

HPE Discover-ing Its True Identity

WHICH Clouds to Use Within your Data Protection Strategy – Part 2 in Series

Data Center Transformation, Powered by NetApp Transformation

Think Economics -- Not Features -- When Evaluating Big Data Value

WHY Use Clouds as Part of your Data Protection Strategy – Part 1 in Series (Video)

NetApp Looking Good For Its Age! (Video)

Splunk on SOAPA (Part 2)

ServiceNow - A Platform for More than Just the Service Desk

What Users Tell Infrastructure Vendors in Recent ESG Research (Video, Part 2 of 2)

ChefConf Showcases Chef and Continuous Automation

Thank You, Analyst Relations

Red Hat Lays Out Its Hybrid Cloud Vision

Dell EMC Partner Summit - Excitement…New Benefits… and a Little Transformation Math!

Wrap-up on Backup from VeeamON 2017

Splunk on SOAPA (part 1)

What Users Tell Infrastructure Vendors In Recent ESG Research (Part 1 of 2)

Google I/O Fascinates Developers, but How About CIOs?

A Video Interview about SOAPA with Haiyan Song, SVP of Splunk, Part 1

Availability Comes of (Digital Life) Age - VeeamOn 2017

The VMware EUC Team’s Execution Machine Continues to Roll

Informatica Origami

Wrap-Up on Backup – from Dell EMC World 2017

Dell EMC World – ESG’s On Location Video Insights

WannaCry Makes Me Want to Cry!

Feeling Transformed after Dell EMC World 2017

Will WannaCry Help Drive Google Chromebooks?

Citrix Synergy 2017: Anticipating a Focal Point on Cloud and Security

Dell EMC World - Positive Attitudes (Plus New Latitudes!)

SIEM: Remains an Enterprise Security Architecture Requirement

Microsoft Build: a Smarter Future Today

Interop ITX 2017- A View into a Full Stack of IT

Is Intel Inside Your Digital Transformation?

The Rise of Enterprise-class Cybersecurity Vendors

Are Next-generation Firewalls Legacy Technology?

Wrap-up on Backup – from Veritas Sales Conference FY18

Dell EMC: IT Transformation Is About Attitude as Well as Aptitude

Public Cloud Trends - 2017 research study shows steady cloud growth

Toward Enterprise Security Technology Integration

Networking @ Scale: Who Can Learn these Lessons?

Microsoft's Broad AI Strategy in 10 Tweets

The Ultimate in Convergence: Looking Ahead to Dell EMC World

Barriers to Hybrid Cloud Onboarding: A Large Enterprise View

Enterprise Security Technology Consolidation

What the Dell will we all EMC in Vegas?

The Rise of No Code Development (Video)

Cybersecurity Skills Shortage Impact on Technology Innovation

The Role of Standards in a Security Ops and Analytics Platform Architecture (Video)

Looking Forward to Backing Up -- at Dell EMC World 2017

The Good, Better, Best of Data Management (Video)

The Real Dangers of Assisted and Augmented Reality

The Transition to NVMe: Accessibility Matters

HPE Gets Nimble: Dollars, Distribution...and Differentiation

Cybersecurity Skills Shortage Threatens the Mid-market

Picking a Winner for the Best Cloud

Expectations for Dell EMC World 2017: Is it One Company or Two?

Data Makes the World Go Round...

Cybersecurity Remains an Elusive Business Priority

An EDR Perspective on Security Ops and Analytics Architecture (Video)

SOAPA Services Opportunities Abound

Database Forecast: Cloudy with Increasing Chances

People, Process, and Technology Challenges with Security Operations

The New McAfee

Cloudera Builds Strength and Agility

Micro-segmentation Projects Span Enterprise Organizations

Is Multi-cloud More Marketing Than Reality? (Video)

Oracle Removes the Line Between Cloud & On-premises Storage

RIP Raimund Genes, Trend Micro CTO

Toward Strategic and Proactive Threat Intelligence Programs

IBM Interconnect 2017: Sharpening IBM's Enterprise Focus

Software-defined Perimeters: An Architectural View of SDP

Google Cloud and the Network Engineer

'Hybrid IT' Is Great – Unless It’s Just Pretend

Wi-Fi Calling - a Big Win and a Big Loss

Cloud Security: Still a Work in Progress

Strata Data Conference Gets Good

Multi-cloud or Not?

Google Cloud Next Wrap Up - Opportunities and Challenges

Why Is IR Automation and Orchestration So Hot?

IBM on Security Analytics and Operations (SOAPA) Part 2

Google Cloud Next - The Key Thing to Security is a New Mindset

IBM Chat About Security Analytics and Operations (SOAPA) - Video

That's a Wrap! RSA Conference 2017 Thoughts and Observations, Continued (Video)

Google Cloud Next - Enterprise Legacy Migration

Google Next: An Enterprise Awakening for Google Cloud

The Google Machine Learns to Compete

The Three-legged IT Stool (Video)

RSA 2017 - A Few Good User Interfaces in a Sea of Horrendous Ones

HPE gets "Nimble" for $1 Billion

Cybersecurity Skills Shortage Holding Steady

Google Cloud Next - What's in Store Next?

Dealing with Overwhelming Volumes of Security Alerts

Big Data, Database, ML and AI Spending Trends: What You Need to Know

That's a Wrap! RSA Conference 2017 Thoughts and Observations, Part 1 (Video)

IT Experience Can Be Beneficial for a Cybersecurity Career

That was Fast! HPE Closes SimpliVity Acquisition

NY State Cybersecurity Regulations: Who Wins?

The Big Data Bubble Rises

New York State Cybersecurity Rules and the Skills Shortage

The Contemporary Opportunity for Traditional IT Hardware (Video)

RSA 2017 - Security Pains for Software Providers and Government

RSA - Detaching Hype from Reality

In and Around the 2017 RSA Conference

Y Evolve Your Data Protection Strategy in 2017 (Video)

Highlights from Spark Summit East

The Challenges Companies Face When Adopting DevOps in 2017 (Video)

Hybrid Data Management (Video)

Top 5 Characteristics of a High-quality Citrix Technology Partner

Kaminario Announces General Availability for K2 Generation 6

2017 Channel Acceleration Awards - Part 2

2017 ESG Channel Acceleration Awards - Part 1

What Sits on the Public Cloud Always & Forever? (Video)

How Will Cloud Impact Systems Management Vendors in 2017 (Video)

Security Analytics and Operations at RSA

RSA 2017: Anticipating Network Security Chatter

What's in Store for Converged and Hyperconverged Systems in 2017? (Video)

Cloud Computing: Predictions for 2017 (Video) - Part 3!

2017 Big Data & Analytics Predictions: Part 3: Pipelines

Dell EMC & VMware: The Value in Multiple Manifestations of SDS

RSA Conference Topic: Endpoint Security

Scratching the Surface on What to Expect at RSA 2017 (Video)

2017 Predictions for Systems Management, PaaS, and DevOps (Video)

Converged Vs. Hyperconverged Infrastructure: What's The Difference?

Cloud Computing: Predictions for 2017 (Video) - Part 2

Shadow IT and Cloud Access Security Brokers Video

2017 Big Data & Analytics Prediction: Part 2: Machine Learning (Video)

Commuting Chelsea Manning’s Sentence Was Just and Proper

Why Did Cisco Pursue AppDynamics?

Cisco Buys AppDynamics to Strengthen Cloud Software Portfolio

Pure Storage Announces General Availability for FlashBlade

Remarkably, Many Organizations Still Opt for 'Good Enough' Cybersecurity

Cloud Computing: Predictions for 2017 (Video) - Part 1

2017 Enterprise Storage Predictions (Video)

Anticipating RSA Conference 2017

2017 Big Data & Analytics Predictions: Part 1: The Cloud (Video)

Networking: Predictions for 2017 (Video)

HPE Acquires SimpliVity as the Market (Hyper)Converges

The Case for a Security Operations and Analytics Platform Architecture (SOAPA) - Includes Video

Endpoint Security in 2017

Checking on Kudu

Thoughts on Incident Response Automation and Orchestration

2017 Data Protection Predictions (Video)

The Good News/Hard Truth about Storage Management Software

Cybersecurity Pros to Trump: Critical Infrastructure Is Very Vulnerable to a Cyber-attack

2017: The Year of Cybersecurity Scale

In the Age Of Never-ending Technology Conquests, Common Sense Still Trumps All

ESG 2017 Predictions - Cybersecurity, Part 2 (Video)

Security Data Growth Drives Security Operations and Analytics Platform Architecture (SOAPA)

Delta-V Awards - 2016 Edition - The Top Five

Delta-V Awards - 2016 Edition - 10 to 6

Looking Back to Look Forward on Cybersecurity

Delta-V Awards - 2016 Edition - 15 to 11

Delta-V Awards - 2016 Edition - 20 to 16

ESG 2017 Predictions - Enterprise Mobility (Video)

High Demand Cybersecurity Skills in 2017

…and they wonder why IT partners aren’t seeing blue skies in the cloud

Driving Infrastructure Value (includes Video)

New Research Reveals Cybersecurity Skills Shortage Impact

Predictions For Storage in 2017 (Video)

Why CISOs Succeed and Why They Leave

Threats and Industry Dynamics on the 2017 Cybersecurity Radar Screen (Video)

A Slimmer HPE Means There’s More to “Discover?" (Includes Video)

Trump Cybersecurity Dos and Don’ts (Part 2)

How Two Different Approaches to Common Management of Clouds are Delivering Hybrid Cloud

With Trust Established, Security Less of a Focus at AWS re:Invent 2016

Time to Stop Buying IT Hardware for Your Data Center

Trump Cybersecurity Dos and Don’ts

Goodbye SIEM, Hello SOAPA

Hybrid Cloud Through Common Applications with Microsoft and HPE

VMware and AWS are Enabling Hybrid Cloud with a Common Platform

Which Job-related Factors Alienate Cybersecurity Pros?

Why Machine Learning is the Future of Big Data

Trump Remains Frighteningly Behind in Cybersecurity

Enterprise Mobility Exchange Event Highlights the Complexity of Mobility

AWS re:Invent Preview: The Case for Cloud-Delivered Security

Insights from the Enterprise Mobility Exchange Event, Las Vegas

Goodbye NAC, Hello Software-defined Perimeter (SDP)

Do You Wonder About or Fear Software-defined Storage? (Video)

Answering the Question: What Exactly is Hybrid Cloud?

Election Data Models Lesson for Cybersecurity

SDSN: Software-defined What?

In Politics (as in Channel Partnering), It’s All Personal

How the US Election Polls Failed Us...

The Scary State of the Cybersecurity Profession

Systems Management at ESG

Are we evaluating the storage technology name or the benefit?

Cybersecurity: A Priority for the Next POTUS

New Blog on Fiduciary Class Data Recovery

Better Business Protection – Fiduciary Class Data Recovery

OpenStack: The Philosophical Divide

OpenStack Summit: Nostalgia or Looking Forward

Trend Micro’s Enterprise Play

Dell EMC World 2016 Wrap-up

A Music Playlist For Networking Pros

NV, NFV, SDN, SD-WAN: Networking Acronyms That Can Transform Your Data Center

IBM Jumps the Cognitive Shark

Cybersecurity Isn’t Always a “Boardroom Issue”

DellEMC World – “And they’re off…..”     (includes video)

Cybersecurity, Business, and IT Relationships

Dell EMC World 2016: The Transformation is Just Beginning

A movie and awareness for NetScout's network and security tools

David Bunnell, R.I.P.  -  Tech Media and Promise of Social Change

Consumer Reports and a Bad Recommendation on Home Computing

Red Hat - commoditizing or democratizing?

Recruiting and Retaining Cybersecurity Talent

VMware Cloud on AWS – What makes it different? What's the goal?

Lenovo and Nimble Storage Join Forces

Cloud computing is elastic, but people are not – can Rackspace help?

Cybersecurity Canon Book Report: There Will Be Cyberwar

Juniper Networks' Audacious Goals for Automated Networking

IT Attrition Could Help Address the Cybersecurity Skills Shortage

The Truth About Cybersecurity Certifications

HDS Is Spelled Hitachi (includes video)

The State of Cybersecurity Professional Careers

Google Touts Its Cloud Network

AI & Machine Learning Take Center Stage

NetApp Has Future In Sight at its Insight Event (includes video)

Splunk Intent on Extending Cybersecurity Leadership

Is gamification in your training and sales enablement vocabulary?

Wrap-Up on Backup from Microsoft Ignite (with Video)

Incident Response Automation and Orchestration

Swirld's Hashgraph: A Better Blockchain?

Oracle Open World: Beginning to Focus on the Middle Word (includes video)

The Newest Member of the ESG Lab Analyst Team

Oracle Sees Multiple Journeys to Cloud Computing

Trends in Software-defined Networking Webinar Recording

Keeping Up with Incident Response

Vision 2016: Bringing Veritas into Focus (includes video)

SIEM Market Dynamics in Play

ESG Video Capsule: Upcoming Research on Database Market Trends

Qualifying Micron's QuantX

New Veritas = New Vision

The Era of Identity-based Applications

Oracle ZS5 Is Foundational for Oracle's Data Cloud Future

IT Operations Analytics from the Source

Is Your Data Protection Strategy Suffering a Civil War?

My 30 Years At EMC, Sort Of……

Cybersecurity Goes Private: McAfee and RSA

The End of the All Together

VMworld 2016 Key Takeaway: The Announcement of “VMEverywhere”  (includes video)

Understanding Poetry at the HPE Big Data Conference

VMworld: My Cybersecurity-centric Impressions

VMware Expands NSX Use Cases With Cross-Cloud

IoT networking: Bluetooth and mobile networks: future has multiple nets

Cybersecurity and VMworld

Hyperconverged infrastructure vendor Nutanix goes on a buying spree

Looking forward to VMworld 2016

The most important ingredient in tech marketing

Pay-as-you-go enterprise networking

F5 Agility conference: somebody familiar, some things are new

The pressing need for network security operations automation

Contemplating the internet's impact on society

More on operationalizing threat intelligence

Why you still need backup … and beyond

CISO portfolio management

Six for 16: Black Hat 2016 takeaways

A few thoughts from Black Hat 2016

Four ways to de-escalate the marketing wars

Oracle's long game for cloud

Second half predictions for big data & analytics

Squirrel! What to chase at Black Hat 2016

Anticipating Black Hat

Russian DNC hack — a cybersecurity microcosm

Swimming application security upstream with SecDevOps

The future of flash is guaranteed

Cybersecurity: a vertical industry application?

From rattling cages to moving goalposts — DataCore & the storage industry

The gold standard for data protection keeps evolving

Cisco: from CLI to cloud

Crypto:  Nominated to the Cybersecurity Canon

Carbon Black’s Acquisition of Confer Marks NGES Transition from Tools to Platform

What a Relief! The Federal Appeals Court Just Saved the Cloud

Cybersecurity Highlights from CiscoLive

A case study in how to #EpicFail at a product launch

IBM's cloudy future

Partner portals — love that dirty water

OMG! It’s ODM!

Operationalizing threat intelligence

How to make sense of a crowded, confused IoT platform landscape?

"Big data, huh, what is it good for?" at the Hadoop Summit

Cisco, CloudLock and the accelerated pace of CASB market maturation

Balancing user experience with security

Veeam: nice guys still finish first

The barriers to being mobile-first

Predicting the unthinkable

Flash Forward, London: refreshing purpose and content

Networking education: leave your comfort zone

A FireEye chat with Kevin Mandia

"Tape" is not a four-letter word

Does the king of CRM need a food taster?

HPE is law-abiding in Las Vegas

Federal cybersecurity boondoggle: the Software Assurance Marketplace (SWAMP)

Quick take: Symantec buys Blue Coat

Symantec and Blue Coat cybersecurity 3x2

Google's Firebase — back-end-as-a-service

The 5 Cs of data protection

Lenovo enters the storage market with software-defined storage

Endpoint Detection and Response (EDR): what’s important?

SolidFire and NetApp: happy to be together and apart (includes video)

Loving ONTAP’s potion #9: reducing the cost of flash and simplifying the data fabric

Enterprises are investing in network security analytics

IBM and Cisco partner for edge-to-cloud IoT analytics

What might be Discovered at HPE's June event in Vegas

Software-defined perimeter (SDP) essentials

How is SQL Server still a thing?

The wild west Spark Summit showdown

Citrix Synergy 2016 highlights

Are there workloads that don’t belong in the public cloud?

Why the Citrix and Microsoft partnership is important

Storage and IT finals

Why BaaS when you can DRaaS?

Identity and Access Management (IAM) infrastructure is misaligned with security

Cloud security: a mismatch for existing security processes and technology

Winter is coming...for the storage industry

INTEROP 2016 — interoperate across the stack

IoT World 2016 — an ecosystem in flux

Psycho query: qu'est-ce que c’est?

Next-generation endpoint security market bifurcation

Can new IT exist with old IT?

EMC World – a familiar new song (includes video)

High-demand cybersecurity skill sets

EMC, Dell, Pivotal, Microsoft, and ... Ford?

Mobility technology surplus frustrates information technology decision-makers

Threat intelligence gateways

Cybersecurity plan for POTUS 45

The DevOps reference model

Wrap-up on backup from EMC World 2016 — day two keynote

How to evolve from "data protection" to "data management"

Google organizes hardware business for growth

EMC pivots to public cloud via VirtuStream

A curious reversal is happening around cloud-based big data

If I were the next CEO of Symantec – redux

Network engineers are not an endangered species

Mobility tech: Easy to wow. Hard to how.

OpenStack Summit Day One - Keeping things really weird

Introducing direct scale-out flash: extending the potential of NVMe

Making sense of 2016 OpenStack User Survey. Strange results.

Data is getting boring again

Cybersecurity salary inflation — a red flag

SD-WAN is not just hybrid WAN. Mea culpa.

AV software: “I’m not quite dead yet”

Is OpenStack private cloud weird?

Google's journey to the enterprise

OpenStack as a service — provisioned locally, orchestrated in cloud

Learning about SDP via Google BeyondCorp

ScaleIO 2.0: another step in the journey to the software-defined data center

Happy birthday IBM System/360 — a grandpop cloud system

Cloud security challenges

The economics of SD-WAN and NFV

Vendors under the radar: Syncplicity

Riding high at Strata+Hadoop World

Dell brings VCE into its hyperconverged tent

SimpliVity's OmniStack version 3.5 — primed for Tier-1 workloads

Brocade making a Ruckus (bid)

Data and Identity: Two New Security Perimeters

Wrapping up GCP:NEXT

The ultimate network security tool: NetSlicer

Dell sheds Perot

The death of privacy (by big data)

Partners show the way for customers for Google Cloud Platform

Four ways Google has out-innovated first mover competitors

Flexible support for traditional apps on Google Cloud Platform

Cybersecurity as a business issue

Pure Storage FlashBlade: the all-flash data center just got closer

New wave load balancers by Google at GCP:NEXT

Google's Growing Cloud Analytics Portfolio

Will the new breed of Enterprise Googlers give GCP a competitive edge?

Open Networking Summit 2016 - changing worlds

Software-Defined Architecture: What To Consider

The Endpoint Security Continuum (Part 2)

Pure Accelerate(s)

Open Compute Summit — hyperscale ready

Cybersecurity Skills Shortage Impact on Cloud Computing

Vendors Under the Radar: StorMagic

An analyst's views on product categories and innovation

2016 Big Data and Analytics Spending Intentions Survey

ESG can be your eyes and ears at Google:NEXT

An Abundance of Incident Response Bottlenecks

Vendors Under the Radar: Avere

ESG On Location: Impressions from RSA 2016

Cloud Sticker Shock? Check out Cisco and CliQr.

Before Moving on From RSA…

The network's new role in the data center

DataCore is Rattling Some Venerable Cages

RSA Conference Blue Suede Shoes

Do we still need VM-specific backup tools? [video]

Many Thoughts about RSA 2016

RSA Recap, Part One

Hybrid Cloud Wheel of Fortune – Oracle Snags Ravello Systems

For Big Data, Does Size Matter?

RSA Conference, Day Three

Thoughts from the dark side

RSA Conference, Day Two (with photos)

Cisco's new DNA: A new Digital Network Architecture

Oracle Brings the Cloud Back to Earth

RSA Conference 2016, Day One

EMC Continues its March to Flash

RSA Conference 2016: Day 1

IBM and Apple move swiftly to leverage Swift

Big Data's Big Problem

Cybersecurity Industry To-Do List for RSA Conference

4 Themes Amidst the Noise of RSA Conference 2016

Spark Summit East (Bound & Down)

Network Automation with Ansible: 5 weeks of work reduced to 4 minutes of joy

Anticipating the RSA Security Conference

A preview of our upcoming research on next-generation endpoint security

Apple vs. DOJ Doesn’t Really Matter

Where will Mobility Innovations Match up to CIO Priorities in 2016?

Navigating Next Gen Endpoint Security: A Buyer’s Journey

Looking to RSA Conference 2016: Network Visibility for Precrime, Incrime, Postcrime

AD&D 2016 Predictions: Containers Will Go Mainstream

My Two Cents on CNAP (Cybersecurity National Action Plan)

How IoT Will Drive — and Require — Digital (Industrial) Transformation

Bringing Increased Choice to Hybrid Cloud: Nutanix Version 4.6

Looking to RSA Conference 2016: Network Visibility

AD&D 2016 Predictions: PaaS and DevOps, Where 1 + 1 = 3

Henry Ford and Incident Response

VMware's Cloud Management Platform - Multi-Cloud for the Hybrid Masses

Cloud-Powered Data Protection — Definitions and Clarifications

Microsoft Windows on a Google Chromebook Hosted at Amazon

Heterogeneous Multi-Dimensional Cloud Security

ESG Mobility Passion Transforms Business Behavior

AD&D 2016 Predictions: A New Leader in PaaS?

2016 Mobility Trends that Change Employee Behavior

ESG's In-Depth Mobility Perspective into a Workspace

Cisco Furthers its IoT Ambitions with Jasper Acquisition

Cybersecurity Industry News, 2/2016

Predictions for Big Data & Analytics in 2016

Consumer Security and Consumer Privacy Are Two Separate Conversations

Can Augmented Reality Bridge the Digital & Physical? PTC Thinks So

The first thing to agree on in data protection modernization

This Year in Storage

The Endpoint Security Continuum

RIP, Marvin Minsky

EFSS and security/governance in 2016

EFSS and the MAG vendors in 2016

Security Requirements Are Driving Identity Management

Dell-EMC Buyer Sentiment Research Redux

What Does the Future Hold for VMware Workstation and VMware Fusion?

Container adoption likely to increase across hybrid clouds

2016 IoT Predictions

Plexxi Draws Google’s Attention – and Money

EFSS Market Consolidation in 2016

Welcoming Myself – and IoT – to the ESG Family

EFSS Integration in 2016

Time to Consider User Behavior Analytics (UBA)

Can Citrix and Dell Help Businesses Improve Productivity through Better Communication?

Predictions for Networking in 2016

Data Protection Predictions for 2016

Hybrid Cloud Spending likely to increase in 2016

SNIA's NVM Summit - Big changes afoot for Year 2020

PrimaryIO: Quality over Quantity

2016 - A Banner Year for Converged and Hyperconverged Vendors?

Cybersecurity Customer Segments in 2016

The Top 3 Hybrid Cloud Headlines From 2015

Network Security Sandboxes Driving Next-Generation Endpoint Security

The Delta-V Awards: The Big Picture

Plan for Hybrid Data Protection Media in 2016

The Delta-V Awards: Big Data Platforms

In 2016, Enterprise Storage will be defined by the cloud

The Incident Response “Fab Five”

Network Predictions for 2016

What Consumers Really Need to Worry About in 2016

The Delta-V Awards: Engineered Systems for Analytics

Predictions for Cybersecurity in 2016

The Delta-V Awards: Machine Learning

New Year’s Resolution – Talk to More People about Data Protection

Cybersecurity Industry Predictions for 2016

2016 Cybersecurity Radar Screen

The Delta-V Awards: Hadoop & Spark

The Delta-V Awards: Databases

The Delta-V Awards: 20 Companies That Changed Big Data in 2015

Creating a Cybersecurity Center of Excellence

A Few Cybersecurity Predictions for 2016

Do storage market share trends signal trouble for traditional storage vendors?

“Discover”ing HPE in London (includes video)

The new buying dynamics for storage, servers, and converged infrastructure

When APIs and DevOps Meet Cybersecurity

Software Security is Not Keeping Up

IoT: The Enterprise Impact

Cisco APIC-EM: a controller with app & policy support

Enterprises Need to Improve IT Vendor Risk Management

Sumo Logic and the Challenge of Full-stack System Management

HPE’s Composable Infrastructure: IaaS for the hybrid cloud masses

What HPE Synergy’s Composable Infrastructure Means to Application Development and Deployment

Brocade: Meeting the New IP Initiative for Enterprises

Handicapping Enterprise Security Vendors

In A World Of Converged and Hyperconverged Choice, Fear Abounds

My Take on NetApp Insight Take Two in Berlin

Informatica and Big Data Management

PLUMgrid CloudApex - Network Visualization and Monitoring

Cybersecurity Lessons Learned from the 9/11 Commission Report

OPNFV: How the Vendors are Approaching NFV

The Future of Data Storage and Management Is Nigh!

Aerohive: Buzzing with a new App Platform

OPNFV: Voice of End Users for NFV and the need for automation

Blue Coat Doubles Down on CASB

The Decentralization of Data Protection Continues

Blue Skies Ahead for Dell, EMC, and Virtustream's Hybrid Cloud

Dell-EMC Deal: The Customers Speak

The State of Cyber Insurance

Juniper's Junos: Reworked and Disaggregated

Network Automation Meetup: Infrastructure Treated as Code

Cloud Computing And Network Security Challenges

KubeCon: Networking is Shaped by the Eye of the Beholder

Cisco Acquires Lancope: Great Fit, Great Deal.

Fundamental Differences Between Securing Workloads and Endpoints

IT Vendor Risk Management: Improving but Still Inadequate

Oracle's Database-as-a-service Cloud Offering is Poised to Win Converts (Video)

At OpenWorld 2015 Oracle Shows it is Red-y, Willing, and Able (Video)

The Return of AV Leaders?

Wrap-up on Backup from VeeamON 2015 (Video)

Teradata is on a Tear

VMware Operations Transformation Services

Team Oracle Tacking to Hybrid Cloud

Stop CISA!

WiFi Calling: In the enterprise (part 2)

Insights from IBM Insight

Some Thoughts for Millennials that Diss Antivirus

Oracle M7 Enhances CPU-level Security

Dell World - Here’s the answer, now what’s the question?

Why Would Businesses Embrace Facebook at Work?

Virtustream's Task - Protecting Dell and EMC's Hybrid Cloud Crown Jewels

Can NetApp Succeed Whatever the "Whether"? (Includes Video)

Goals should be on the market, not becoming a unicorn (SD-WAN examples)

WiFi Calling: Ready To Take Off? (part 1)

X-IO Technologies: The Bearable Rightness of Being Unique

More data protection thoughts on Dell and EMC [video]

Dell and EMC – Sanity Check

Dell and EMC - Better Together?

Your Data Is a Strategic Asset – Treat It That Way!

What Happens to RSA?

5 Reasons To Upgrade Your Network Switch

FireEye Myth and Reality

Did Dell and EMC Just Simplify the Enterprise Mobility Strategic Decision Making Process?

Wrap-up on Backup from NetApp Insight 2015 (Video)

Pentaho's Three-Legged Race to Big Data (with HDS)

Amazon's Strategy of Operational Excellence

Amazon Workspaces Delivery Compelling Usage Scenarios

Hybrid Clouds and Cybersecurity Front and Center at AWS re:Invent

Is Public Cloud in Dell's Cards Post EMC Acquisition?

Run DeMC: Dell & EMC merge to thrive in the cloud era

Dell's acquisition of EMC: the effects on networking

Dell Set to Buy EMC

A Dell & EMC Merger = A Big Data & Analytics Powerhouse

Data Protection in a Dell-plus-EMC World

A Call for Open Cybersecurity Middleware

Can A Pure Storage Company Make It Big?

Networking: Intelligence Augmentation vs. Artificial Intelligence

U.S. Critical Infrastructure Continue to Make Risky IT Bets

IBM Gets Clever(safe) to Broaden Cloud Offerings

Amazon AWS and Rackspace - A Cloud Hole-in-one?

Password Strength - Pop quiz

A Striated Strategy at Strata

On the Lookout for These Three at AWS re:Invent 2015

Ericsson – growth in a changing ICT world

Dell Networking - providing choice

Happy Cybersecurity Awareness Month?

U.S. Critical Infrastructure under Cyber-Attack

Data-aware infrastructure: it’s about time!

My Take-aways from Splunk Conf 2015

Is the Cloud Planned IT Admin Obsolescence?

Book Report: Future Crimes

Big Tech’s Entry into the CASB Market Is Evolutionary

I May Be Losing My Mind – I’m Believing In Oracle Hardware

Wrapup on Backup from VMworld 2015

VMworld 2015 Had Some Great Marketing

Cyber Supply Chain Security Is Increasingly Difficult for Critical Infrastructure Organizations

VMware NSX and Cisco ACI – IT nirvana or a Kafka-esque nightmare?

Targeting the Best of Both Worlds with Next-generation SQL Databases

The Network’s Role as a Security Sensor and Policy Enforcer

Impressions from VMworld 2015

Challenges around Operationalizing Threat Intelligence

VMworld 2015 - A multi-platform world & the role of NSX

NoSQL - The Great Escape from SQL and Normalization

VMworld 2015 Takeaway: Micro-segmentation and Securing Hybrid Clouds

VMworld 2015 - Networking Observations

My Assessment of VMware NSX

The Latest Data on What's Big in Big Data

Thoughts from VMworld, Day Four

Schrodinger's Cat and Analytics Accessibility

Why Won’t the RDBMS Go Away?

Say IT Ten Times Fast

The RMS Titanic and Cybersecurity

Consumers Are Getting Smarter, Driving Security Innovation

Thoughts from VMworld, Day Two

How VMware Plans to Land Mobile Applications

Thoughts from VMworld, Day One

VMware DRaaS Announcements are a Good Thing!

Anticipating VMworld

VMworld 2015 Prelude: 4 Ways to Secure Agility

The battle between containers and VMs

Today’s Database Landscape at a 50,000 Foot Level

SimpliVity OmniStack 3.0 - The Hyperconverged Power of 3

Looking Forward to VMworld 2015

Docker Networking - Keeping it Simple

Getting It with Big Data

Facebook’s Threat Intelligence Sharing Potential

Seagate Enhances Cloud Infrastructure Portfolio with Agreement to Acquire Dot Hill

Incident Response: More Art than Science

IO Visor Project - Virtual Machines for IO and Networking

Video Recap of Black Hat 2015

Enterprises Are Analyzing Lots of Internal Cybersecurity Data

Supporting Enterprise Mobility: An End-user’s View into the Workspace

Two CISO Priorities from Black Hat: Endpoint Security and Cloud DLP

Black Hat Boogie

Supporting Enterprise Mobility: How IT Vendors Are Helping Create Workspaces

HP and Big Data: Is there a "there" there?

What I Want to Talk About at VMworld 2015

Converged Infrastructure Vs. Disaggregated Systems

OpenDaylight Summit: Pick and Choose

Supporting Enterprise Mobility: Cloud Assembled Workspaces

OpenDaylight Summit: NFV strong

VMware's Project Bonneville - Containing the Container Contagion?

Black Hat PreGaming Thoughts

Cloud Security Challenges for Enterprise Organizations (Video)

Black Hat Is About Cybersecurity People and Processes

Supporting Enterprise Mobility: How to Create a Workspace

An End to "End to End" Big Data Solutions?

Cybersecurity Technology Integration Changes Everything

Workspaces and Identity Management

Will Googles’ Kubernetes become the GodFather of OpenStack Cloud Container Management?

Cybersecurity Canon and The Florentine Deception

Microsoft & Adallom: Turning up the Cloud Security Volume

Measuring the Quality of Commercial Threat Intelligence

What’s a Workspace?

Looking Forward to OpenDaylight Summit

Are There Qualitative Differences Between Threat Intelligence Feeds?

3 Endpoint Security Takeaways from CounterTack and CrowdStrike News