Ransomware Still Rampant, Fueled by Insurance Companies

Toward a Common UI/UX for the SOC (Security Operations Center)

Archiving On-premises Economics

RSA 2020: A Review

RSA Conference 2020 Wrap-up: The Human Perimeter (Includes Video)

Do you know what data you have? Titus can help

Stellus Sets Performance Record -  Giving File Data a Much Needed Speed Boost

Pure Storage Announces Impressive Growth

Addressing the Edge of Business Will Require More Than Technology

Cohesity Goes After The Decentralized Enterprise

Veeam Has its Sights on the Enterprise Segment with New V10

New IBM FlashSystem Family: More than just Flash, More than just Systems

The Tape Renaissance and Ransomware

Crime Fighting, Protecting the Innocent, and Stopping the Embarrassment of Modern Email Attacks

CISOs Are Finding Ways to Address the Cybersecurity Skills Shortage

To Train or Not to Train, That is the Question (Video)

Veeam Acquisition: The Net Net

Accenture to Acquire Symantec CSS

Putting Some Heat on Phishing and Credential Theft

The CCPA is here. What does it mean for AI?

ESG Digital Work Survey – Cybersecurity Takeaways

A Pure Market Conversation

Actifio Triples Down on Modern Intelligent Data Management

Intel Acquires Habana Labs for $2 Billion

Cisco's Plan to Build the Internet for the Future

CCPA Is Coming...Part 2

Why Engage Cybersecurity Service Providers?

CCPA Is Coming... Part 1

Seven Cybersecurity Take-aways from AWS re:Invent 2019

AWS re:Invent 2019 - Analytics, Database, and AI Recap

Manufacturing - The Perfect Storm For Advancement

Who Said the Backup and Recovery Market Is Boring? 2019 In Review

ESG Experts Comment on Dell Technologies Summit 2019

Think Email Security Is a Commodity? Think Again.

Dell Technologies Summit (Includes Video)

Exploring the Cloud-native Aspect of Elastic Cloud Gateways

Is Salesforce Not Mission-critical Ready?

Dell Tech Summit 2019: Delivering Automatic, On-demand IT, with Goals for Sustainability and Inclusion

Microsoft Ignite Sparks Attention Across the Market (with Video)

Palo Alto Networks Announces DLP and SD-WAN Capabilities to Further Its Elastic Cloud Gateway Architecture

HYCU Adds Capabilities for GCP

What’s Missing from CrowdStrike?

Time to Add Microsoft Ignite as a Must Attend Event

A New NetApp? (Includes Video)

Mind the Gap: Why MSSPs Still Matter

Wait, What? Cloud Providers are MSSPs?

Big Changes Coming to Cybersecurity Technology

It Time to Make Cybersecurity Personal: Here’s How.

Pensando Launches from Stealth Mode in NYC

Did Hitachi Vantara Do Good at Next 2019?

Hitachi NEXT 2019: Faster, Bigger, Smarter, and Embracing the Cloud

Made By Google...Ready for the Workplace?

Commvault Go Day 1: What A Difference A Year Makes

Time Flies…Recapping McAfee’s MPOWER 2019

Some Thoughts and Actions for Cybersecurity Awareness Month

5G Use Cases for the Enterprise - A Visit to the Verizon 5G Lab

Toward Continuous Automated Penetration and Attack Testing (CAPAT)

Recapping Juniper's Industry Analyst Day

Pure Accelerate 2019: Blowing Out the Candles, but Lighting New Fires

Will 2019-2020 be the breakthrough year for Canonical?

Pure Accelerate: Building the Modern Data Experience on a Foundation of Flash


VMworld 2019: A Network Perspective

VMworld 2019 – Reaching Out to an Ever-expanding Choir

VMworld 2019: Building the IT Hero for the Digital Era

Exploring the Multi-channel Aspect of Elastic Cloud Gateways

Can VMware Become a Leading Cybersecurity Vendor?

Carbon Black and VMware: What’s in it for both and for you!

Grupo Tecno and Trustwave Team Up in Mexico

Splunk Acquires SignalFx for $1 billion

Examining and Addressing Threat Detection and Response Challenges

Clumio Joins The Club

Black Hat 2019 Insights: 8 Key Cybersecurity Market Observations

If I Were the CEO of Broadcom

MDR Top Cyber Services Theme at Black Hat 2019

Perceptions of Black Hat 2019

Flash Memory Summit 2019: What’s Next and What’s Missing in the Future of Flash (Video)

WiFi is the New Dial Tone

Microsoft and Samsung Locking Into the Future of Work

HPE Continues Building Out Analytics and AI Portfolio with MapR Acquisition

SOAPA Video with SAS Software (Part 2)

Anticipating Black Hat 2019

Elastic Cloud Gateways and Other Thoughts Before Black Hat 2019

The Need for Speed: Amazon buys E8

SOAPA Video with SAS Software (Part 1)

Security Analytics: It’s All About the Data

Why Cybersecurity Services Matter

Managed Security Services Will Take Center Stage at Black Hat

What’s Needed for Network Traffic Analysis (NTA)

HPE Fully Embracing Storage Again (Video)

Bridging the Cyber-risk Management Gap

Google to Acquire Elastifile, Adding an Essential Piece for GCP

The Three Pillars of DevSecOps

Modern Network Security Transformation

Data Protection Conversation with Actifio (Video)

Time to Band Together on Behalf of the Greater Security Cause

Report from AWS re:Inforce 2019

Extreme Continues Expansion Strategy with Aerohive

HPE Goes 'All In' on 'as a Service' at Discover 2019

HPE Rediscovers Itself at Discover 2019 (includes video)

HPE Discover 2019: Innovation Is Back

Eating Your Own 'Dog Food' – a Quick Glance at Rubrik’s Program

All About the Customer at C-Scape 19

Cybersecurity Pros' Haphazard Participation in Data Privacy

Cisco Continues to Execute on Intent-based Network Strategy

7 Reasons Why CrowdStrike Brings Home the Bacon

What Is the Balance of On-premises and Off-premises Workloads?

Security Shines at CiscoLive

Sophos Acquires Rook Security

Google to Acquire Looker for $2.6 Billion

Microsoft Azure and Oracle Are Done Being Bullied

IT’s Best Kept Secret…or Not…

Ransomware and SaaS Mishaps in the News Again…Did I mention you need a backup? (Includes Video)

Palo Alto Networks’ Strong Move to Secure the Modern Application Stack

Is Managed Detection and Response (MDR) the New Managed Security Service (MSS)?

A Promising New Chapter in Detection and Response Tools

Lenovo Accelerate: Taming the Next IT Frontier, the Edge

How a Circular Economy Can Help Accelerate Your Digital Transformation Efforts

Insights from VeeamON 2019

VeeamON 2019

Digital Workspaces Create Unintended Consequences

The Most Stressful Aspects of Being a Cybersecurity Professional

Extreme Connect 2019 Has All The Right Elements For Its Customers

Going back to Miami...

Cybersecurity Professionals Are No Match for Cyber-Adversaries

In Conversation with Sam Grocott of Dell at DTW (Video)

Ready or Not; 5G is Coming (Video)

Red Hat Summit 2019 - Capturing the Hearts and Minds of the Transformed Enterprise

Is the Cybersecurity Skills Shortage Getting Worse?

In Data Protection News Recently

Growing Up in IT: 20 Years of ESG

Data Protection Conversation with Dell EMC @ Dell Technologies World

Microsoft Windows Is Just an App

Dell Technologies World – Optimism & Happiness? (Includes Video)

Is Your Application Security Testing Program Measuring Up?

North Dakota: An Innovative and Leading Cybersecurity State

Dell Technologies World: The Plan Comes Together & The Cloud is Just the Beginning

Pushing Intelligence and HCI at Dell Technologies World 2019

Top Questions to Ask When Considering Moving Cloud On-prem

Networking Getting Some Airtime at Dell Technologies World 2019

Dell Technologies Launches New Data Protection Solutions

What's Up with Microsoft and Dell at Dell Technologies World 2019?

Five Threat Detection and Response Technologies Are Coming Together

Cybersecurity Services Discussions

Cybersecurity Services Discussions: Automated Security Video with Secureworks (Part 1)

Two Questions That Should Shape Dell Technologies World

Pre Dell Technologies World Thoughts

The Case for Managed Detection and Response (MDR)

Security Risk as a Business Discussion

NETSCOUT Engage19 Explores “Visibility Without Borders”

SOCaaS versus Managed SOC (with video)

HYCU Doubles Down on Google Cloud Platform (GCP)

SOAPA Video with Devo (Part 2)

An On Ramp to Digital Transformation: How Google Next '19 Changes the Game

Coming to a Solution Near You – Intel’s Next Generation Technologies

Data Protection Conversation with Dell EMC

Endpoint Security Is Consolidating, but What Does That Mean?

Experience HPE Aruba "Customer First, Customer Last" at Atmosphere 2019

Is Google NEXT Enterprise-ready?

Looking Ahead to Google Next 2019

The Case for Continuous Automated Security Validation (CASV)

Ready for Google Cloud Next? Two Questions before the Event

Unitrends' Super-Charged Appliance

Pure Storage Bets on Cloud and File Storage

SOAPA Video with Devo (Part 1)

Endpoint Security Platforms Destined to Simplify Operations and Reduce Complexity, but There Are Risks

OpenC2 Can Accelerate Security Operations, Automation, and Orchestration

Vulnerability Management Woes Continue but There Is Hope

The Economics of Modernizing Your Enterprise Data Warehouse

The Cybersecurity Technology Consolidation Conundrum

Data Protection Conversation with iland (Video)

Data Protection Conversation with Unitrends (Video)

The State of Endpoint and Application Security (Includes Video)

Cyber Risk Management Challenges Are Impacting the Business

The Buzz at RSA Conference 2019

Was ‘Better’ Cybersecurity the Promise or the Premise at RSA 2019? (Includes video)

Joe Tucci’s Next Phase

Talking Data Protection with IBM’s Sam Werner

The Convergence of Endpoint Security

Data Intelligence at the Heart of Cohesity's New Capabilities

What to expect at the RSA Conference 2019

The NetApp Lesson: Adapt and Flourish

Previewing RSA Conference 2019: Cybersecurity Services, Cloud Security, and DevSecOps

Thoughts on IBM Think[ing] 2019- includes video

Enterprises Need to Embrace Top-Down Cybersecurity Management

Thoughts on IBM Think and Cybersecurity

Lenovo Takes the Worry Out of IT with Its TruScale Service

Carbonite Buys Webroot – Why You Should Care

Cyber Risk Management Disconnect Between Business and Security

Be Prepared

Security Point Tools Problems

From Backup to Intelligent Data - Introducing a New Maturity Model (Video)

NetApp's Change: In Conversation with John Rollason (Video)

The Cybersecurity Skills Shortage Is Getting Worse

Data Protection Conversation with HYCU (Video)

2019 Predictions for Artificial Intelligence (Video)

2019 Predictions for the Hyperconverged Market (Video)

2019 Data Storage Predictions: More Cloud Missteps, FC Is Back, and Finding Data Holds Back AI

2019 Will Be the Year of Cloud-based Cybersecurity Analytics/Operations

Cybersecurity Predictions for 2019 (Video, Part 2)

2019 Predictions for Enterprise Mobility (Video)

Networking Predictions for 2019

2019 Predictions for Cloud Services & Orchestration and DevOps (Video)

More Data Protection Conversations

Salesforce Backup and Recovery Secrets Revealed...

Security Operations Activities to Watch in 2019

Cybersecurity Predictions for 2019 (Video, Part 1)

Enterprise Momentum for Kubernetes at KubeCon 2018 (Video)

Cyber Risk Management Continues to Grow More Difficult

Data Protection Conversations:  David Safaii, CEO of Trilio (Video)

Cyber Risk Management in Transition

Recapping VMworld Europe: Built-in Cybersecurity for Hybrid, Multi-Clouds (Includes Video)

Thomas Kurian and the Future of Google Cloud

Citrix and Sapho Create Critical Conversation

Thomas Kurian, New Google Cloud CEO

Three Expected Security Themes at AWS re:Invent 2018 (Video)

AWS re:Invent 2018 - What Should We Look Out For?

Best-of-Breed Security Products Still Dominate – Kind Of

Data Protection Landscape 2018 - Major Disrupting Trends (Video)

Amazon Workspaces at AWS re:Invent 2018

Cybersecurity Technology Platform Attributes Defined

How Much Time Do You Spend on Licensing Issues Instead of Driving Innovation?

Analysis of IBM's Acquisition of Red Hat – Is it a Game Changer?

Cybersecurity Professional Impressions on Cloud-native Security

McAfee’s Vision at MPower

NetApp Insight: Both a Conference Name and an Apropos Comment  (Includes Video)

GitHub Universe Highlights the Future for the Developer Community

IBM Improves Storage with NVMe and AI, while Delivering the Tools to Tackle a Universe of File Data

Commvault Go 2018 Video Coverage

Cybersecurity Trends – With Trend Micro

Juniper is Engineering Simplicity for the Multi-cloud Journey

I Just Want the App to Work…

Commvault Announces New Offerings at Commvault GO 2018

The 2018 Channel Acceleration Awards: The HPE Partner Ready Program

Ten Takeaways from the Splunk User Conference

DDN Partners with NVIDIA Targeting AI

Cloudera and Hortonworks Merge

Hitachi Vantara Talks What’s Next at NEXT (Video)

Cloudy Future for Security Analytics

Talking NVMe and Optimized Hybrid Storage Management (ESG 360 Video Series)

Form Factor Wars: Cloud-based or On-premises Security Technologies?

Imanis Data Announces New Version

Talking About the Next Steps in IT Automation (ESG 360 Video Series)

Five Ways to Get Started with DevSecOps

Talking About Linking Development and Security (ESG 360 Video Series)

Cybersecurity Challenges at Smaller Organizations

Is Microsoft’s Managed Desktop Right for You?

Talking Connectivity and Experience (ESG 360 Video Series)

The True Value of SaaS and Managed Service Offerings

Lenovo and NetApp Join Forces

Ubiquity on Full Display at VMworld 2018 (Video)

CISOs Recommend Future Actions for their Organizations

Defining a Cybersecurity Platform

Takeaways from the CISO Summit at Black Hat 2018

What Are the Most Important Attributes of a Cybersecurity Platform?

AWS and VMware: Fundamentally Changing Hybrid Cloud at VMworld 2018 Day 1

Heading to the Clouds: Pure Storage Acquires StorReduce

The Transition Toward Enterprise-class Cybersecurity Vendors

What Are Small Organizations Doing About Cybersecurity?

VMworld 2018 Preview with an HCI Lens

Cybersecurity Experiences at Small Organizations

Extending the Value of Hadoop and Spark with a Cloud-based Managed Service

Takeaways from Black Hat USA 2018

HYCU Introduces BaaS for Google Cloud

Extreme Sets Its Sights on 2019 and Its Customers

Google's New Cloud Strategy Highlighted at Google Next '18 (Video)

The Future of VMware: VMworld 2018 Preview

Cisco Buys Duo Security to Address a ‘New’ Security Perimeter

Talking Channel (ESG 360 Video Series)

Connectivity and Experience

Anticipating Black Hat USA 2018

Google NEXT - Democratizing Analytics and Artificial Intelligence

Thoughts from Google Next 2018

Google Intends on Making GCP the Most Secure Cloud Platform

Talking GDPR (ESG 360 Video Series)

Is Ransomware on your Radar? Rubrik Can Help…

Talking Storage (ESG 360 Video Series)

What's Next? Google Next!

What Makes CISOs Successful?

Want to Win in the Digital Economy? Transform your IT Infrastructure

IBM Storage Develops Its Modern Storage Mantra and Portfolio (Video)

What to Watch at Google Next '18 (Video)

Will AWS Join the Enterprise Network Switch Market?

Is HCI Bringing Change to the Hypervisor Market?

What I Learned at the Tufin Customer Conference (Tufinnovate)

HPE GreenLake: IT Flexibility on Steroids (Video)

In Conversation with Warner Bros. Entertainment's Doug Crawford at HPE Discover 2018 (Video)

Talking Validation (ESG 360 Video Series)

Talking Mobility (ESG 360 Video Series)

The Need for Better Monitoring of Cloud-native Applications

Talking Data Protection: ESG 360 Video Series

Discovering a Renewed HPE (Video)

HPE Re-Discovers Its Roots and Looks Forward to an Intelligent Edge (Video)

Rancher Labs Simplifying Kubernetes

Talking Cybersecurity Threat Landscape (ESG 360 Video Series)

Actifio Highlights the Value of Data at Data Driven 2018

The New Endpoint Security Market: Growing in Size and Scope

Discovering Odaseva Data Management-as-a-service: Salesforce Backup, Archive, and GDPR

The Importance of Cloud Infrastructure Compatibility and VMware Cloud on AWS

Talking Data Analytics (ESG 360 Video Series)

Rubrik Doubles Down on Hybrid Support with Alta 4.2 Release

What Does GDPR Mean for Data Protection? (Video)

A Quick Look at HYCU, Backup and Recovery for Nutanix Environments

Cisco Security Synopsis from CiscoLive

ESG in Conversation with 'Coz' at Pure Accelerate (Video)

The 2018 Channel Acceleration Awards: IBM PartnerWorld

Discussing the Acquisition of Netsil with Rajiv Mirani of Nutanix (Video)

Beam Video Discussion with Binny Gill of Nutanix

Real World SLAs Blog Series #3: Downtime and Data Loss Business Impact

Talking Networking, Part 2 (ESG 360 Video Series)

Converged vs Hyperconverged – What’s Driving the Decision

Druva Acquires CloudRanger

Toward Central Network Security Policy Management for Hybrid Clouds

Talking Cloud Cybersecurity (ESG 360 Video Series)

Pure Accelerate 2018

SOAPA Video with McAfee (Part 2)

Pure Accelerate 2018 – Data Centric in the City (includes video)

Real World SLAs Blog Series #2: The IT Resiliency Equation

Pure Accelerate: The Future is Now

Analyst-centric Security Operations

Accelerating to a Data-centric Architecture with Pure Storage

SOAPA Video with McAfee (Part 1)

Talking Converged Architectures (ESG 360 Video Series)

SOAPA Video with FireEye (Part 2)

Catching Up with Symantec

GDPR and the Challenges to Achieving Compliance (Video)

SOAPA Video with FireEye (Part 1)

Dell Technologies World – Making IT Transformation Real for Partners

Talking IT Evolution (ESG 360 Video Series)

Real World SLAs Blog Series: Downtime and Data Loss Metrics

Talking Networking, Part 1 (ESG 360 Video Series)

Talking Cybersecurity (ESG 360 Video Series)

At .NEXT Nutanix Adds App & System Visibility to its Infrastructure-invisibility Foundations (video)

Nutanix Delivers Invisible IT, but Highly Visible Cloud and Modern Application Environments with Acquisitions

Three Facts About Multi-Cloud That Will Surprise You

Containers are Here! What About Container Security?

Taking Dell's Marketing to the Market - More From DTW (video)

Narrative of Nutanix .NEXT in NOLA

It’s Time to Think Harder About Security Data Management

Red Hat Leading the (Open)Shift to the Cloud

Google Cloud Makes Bold Move with Velostrata Acquisition

Dell’s latest baby - DTW # 1 - is huge (Video)

The Evolution of Security Operations Automation and Orchestration

Convergence of Technologies: Cloud and Data Protection at Dell Technologies World (Video)

Networking News and Insights from Dell Technologies World 2018 (Video)

The 2018 Channel Acceleration Awards: The Trend Micro Partner Program

Cloud's Connection to Copy Data Management (Video)

Dell Technologies World: Power to the People

Cloud Computing Security Chaos Continues at RSA Conference 2018

Delivering on the Promise of AI and ML at Dell Technologies World 2018

CI and HCI Traction and Updates from Dell Technologies World 2018

Insights from Extreme Connect 2018 (Video)

The 2018 Channel Acceleration Awards: The Dell EMC Partner Program

What is a Cybersecurity Technology Platform Anyway?

Expectations for Dell Technologies World: The Family Comes Together

What to Expect from Red Hat Summit (Video)

Amazon Throws Its Hat Into the Blockchain Ring

RSA 2018: Securing (y)our Data, (y)our IT…and the World -- includes video

Quick Take-Aways From the RSA Security Conference

In Conversation with Aruba's Larry Lunetta at Atmosphere 2018 (Video)

The 2018 Channel Acceleration Awards: Next up, Webroot Partner Edge

In Conversation with IBM's Eric Herzog at Think 2018 (Video)

Looking Ahead to Dell Technologies World (Video)

In Conversation with IBM's Ed Walsh at Think 2018 (Video)

See You at Extreme Connect

Thoughts Ahead of Dell Technologies World (Video)

Cloud Security Will (and Should) Dominate the RSA Conference

Industry Roundup: Addressing the Hybrid Cloud Security Readiness Gap

And the Current Number #1 Challenge with HCI Is…

Software-defined Perimeter (SDP):  Important Initiative, Ineffective Name

The 2018 Channel Acceleration Awards: First up, Riverbed Rise

The ELI5 version of Blockchain Technology Components (Video)

Mid-range vs. Enterprise Storage: Is Size All that Matters?

Machine Learning: Security Product or Feature?

Citrix Synergy 2018: What’s in Store?

Aruba Creates an Infectious (in the good sense!) Atmosphere -- includes video

Aruba - Driving Innovation to the Intelligent Edge

CISO Perspective on the RSA Security Conference

Blockchain Progresses in the Enterprise IT Space (Video)

THINK-ing about IBM (includes video)

Is It Time to Unify Endpoint Management and Security?

Is It Too Late For Oracle to Enter the Cloud Analytics Space?

Pure Storage: Empowering Artificial Intelligence

Where Endpoint Management and Security Meet

Thoughts from IBM Think 2018: Bridging IT Transformation and Digital Transformation 

Modern Device Management: Resist Or Embrace?

Exploring the Intelligent Edge at Aruba Atmosphere

The 90s called—they want their PDF files back!

New Partner Mantra: 'Show Me (How I Make) the Money'

ESG at RSA: Identity, No Passwords, and Email Security (Video)

GDPR: Look Out for 'Right to Be Forgotten Storms' Ahead

The Proactive CISO

The Impact of Server Refreshes on the Server and HCI Markets

Artificial Intelligence and Machine Learning - More Than Just Buzzwords

Video: What Drives IT Complexity

No One Wants Your Stuff!

Endpoint Security Suites Must Detect/Prevent Threats AND Ease Operations

Apcela: Choices for Hybrid Computing and Financial Accounting

Thinking about Identity Management for the RSA Security Conference

Video: What Networks Do for IT Organizations

Why Splunk Acquired Phantom

GDPR Is Coming and Many Organizations Aren’t Ready

Highlights from ESG’s Enterprise On-premises Infrastructure Spending Trends Research (Video)

What’s on CISO's Minds in 2018?

The State of Constant Change in Endpoint Security

Systems Management With Today’s Security Threats

2018 Enterprise Mobility Spending Trends Video

“Gotta Have” Endpoint Security Suite Functionality

Change is Constant

The Need for Speed and Automation: Enterprise Storage in 2018 (Video)

2018 Data Protection Predictions (Video)

Cybersecurity Job Fatigue

It's Still Early for Converged and Hyperconverged – Predictions for 2018 (Video)

Ransomware Research Highlights (Video)

Video: Role of SD-WAN in Network Modernization

Cloud Computing Chaos Is Driving Identity Management Changes

Making Infrastructure Less Visible Shines a Light on Other Issues

Video: Impact of Cloud Computing on the Network

Enterprise Plans for Security Automation and Orchestration

Analytics in the Cloud – Usage Is Only Going Up (Video)

Best of Breed

Artificial Intelligence and Cybersecurity: The Real Deal

SOAPA Video with Bay Dynamics (Part 2)

Endpoint Detection and Response (EDR) Is Coming – In One Form or Another

Key Cybersecurity Findings from ESG’s 2018 IT Spending Intentions Research (Video)

 2018 Cybersecurity Radar Screen (Video)

Kaminario Goes Software

Okta and ServiceNow Help Solve Organizational Pressures

2018 Goodbye Password....Hello Bots and Machine Learning

SOAPA Video with Bay Dynamics (Part 1)

KODAKOne: Developing a clear blockchain use case?

A need for Android device compatibility branding

ESG Research Suggests Cybersecurity Skills Shortage Is Getting Worse

Growth in Endpoint Security as a Service in 2018

Meltdown and Spectre Shine a Light on the Multiple Facets of Systems Management

2018 Prediction: Network Relevancy

Microsoft Embraces Hybrid Cloud with Avere Acquisition

A Networking To Do List for 2018

CISOs Should Examine Commercial SOAPA Offerings in 2018

Say Goodbye to Passwords in 2018

Why Do CISOs Change Jobs So Frequently?

Infrastructure Predictions 2018 - includes video

Enterprise Storage Predictions for 2018: IT Becomes Automatic

ESG Blog: 2018 Predictions for Cloud Platforms and Services (Video)

SOAPA Video with Kenna Security (Part 2)

ESG Blog: 2018 Predictions for Networking (Video)

CISO’s New Year’s Resolutions

Citrix and an Enterprise Service Mesh (Includes Video)

SOAPA Video with Kenna Security (Part 1)

Juniper Networks NXTWORK - Achieving simplicity, removing complexity (Includes Video)

Cybersecurity Past to Predict the Future

ESG360 Video: Who Owns Identity and Access Management (IAM)?

HPE Discover in Madrid  (includes video)

Why Companies Need to Protect Their Employees’ Corporate Identities (Video)

A Few Cybersecurity Predictions for 2018

Who Owns Identity and Access Management (IAM)? (Video)

What Defines Job Satisfaction for Cybersecurity Professionals?

How Is Identity and Access Management (IAM) Changing (Video)

HCI Performance Evaluation

What Presents Can We Expect Juniper Networks to Deliver?

More on Advanced Prevention in 2018

2018 Predictions for Systems Management, PaaS, and DevOps (Video)

Synchronoss Technologies Welcomes New CEO, Glenn Lurie (and a Potential Boost to Business)

Cybersecurity Professionals Aren’t Keeping Up with Training

No More Dealing with Infrastructure (Kind of, for Developers)

AWS continues to dominate, but is that good for you? (with video)

S3 Security Front and Center at AWS re:Invent

The Relevance of Networking at AWS re:Invent (with Video)

AWS & Cloud Networking Design Patterns

2018: The Year of Advanced Threat Prevention

The Case Against AWS – And It’s Not AWS' Fault

AWS Is Not Slowing Down at re:Invent (with Video)

Cybersecurity Professional Recruitment Chaos

Motive, Means, and Opportunity for Evaluating HCI Performance

Enterprises Must Address Internet of Identities Challenges

Facing the Hybrid Cloud Reality

DevOps Myths and Realities: Why the Key to DevOps is Understanding What it is First (Video)

The Cybersecurity Skills Shortage Acts as A Root Cause for Security Events

SOAPA Video with Arbor Networks (Part 2)

Acute Cybersecurity Skills Shortage Areas

New Research Confirms the Cybersecurity Skills Shortage Is an Existential Threat

Understanding The Hype Around Hyperconverged Infrastructure

SOAPA Video with Arbor Networks (Part 1)

Cybersecurity, Mobility, and the Expanding Perimeter (Video)

SOAPA Video with Siemplify (Part 2)

Do you want to deploy HCI? How do you compare solutions?

Identity and Access Management (IAM) Has Been in Babysitting Mode for Years...Something Must Change!

The Cybersecurity Skills Shortage Impacts Security Operations

The Drivers of Change in Endpoint Security

Dell EMC - Guaranteed to Please?

Dell EMC Updates its Midrange for a Flash Storage-defined World

Identity Management To-Do List Aligns with Cybersecurity

SOAPA Video with Siemplify (Part 1)

SOAPA Video with ThetaPoint (Part 2)

VMware’s Intention to Acquire VeloCloud: What does it mean?

Storage Trends Research – Data Center Storage Technology Revolution (#4 in a series) - includes video

Endpoint Security Needs “Efficient Efficacy”

Enterprise Networks and Telco Clouds on a Collision Course

The Internet of Identities: Coming Soon and Bringing Massive IAM Changes

SOAPA Video with ThetaPoint (Part 1)

Extreme Executes Against Vision with Brocade Acquisition

Gigamon Goes Private (Equity)!

The Push Toward Comprehensive Endpoint Security Suites

Endpoint Security: The Efficient Efficacy Design Center

SOAPA Video with ServiceNow (Part 2)

Best Practice:  Security Operations Automation before Orchestration

Apps coming back? Finding the balance with the cloud.

Storage Trends Research – The Impact of CI/HCI (#3 in a series) - includes video

SOAPA Video with ServiceNow (Part 1)

What I Expect from AWS re:Invent 2017

Few People Know it's National Cybersecurity Awareness Month. That’s a Problem.

Data Management Is Undeniably the Future of Data Protection

What Happened to the Store with Incomplete Digital Transformation

Dell’s IQT – A New Work State of Mind? (Video)

Trend Micro’s Case as an Enterprise Security Vendor

SD-WAN Should Not Be a Scary Thought

RCS and Universal Communications - This Time, It May Work

Wrap-Up on Backup from Veritas Vision 2017

SDN and Network Virtualization Revisited

How Enterprise Organizations Benefit from SOAPA

Box is a Platform, Not a Storage Provider

Storage Trends Research - Flash Storage (#2 in a series) - includes video

What’s Holding Back Enterprise Security Technology Transformation?

Cybersecurity Technology: Everything is Transforming and in Play

Data Protection Is (or Should Be) Increasingly Part of a Systems Management Strategy (Video)

Microsoft Top of Mind for Business after Attending Ignite (Video)

Insights from NetApp Insight

Storage Trends Research (#1 in a series) – includes video

Top Three VDI Challenges (Video)

Trip Report, Splunk Conference 2017

NEXT Up: Hitachi Vantara (includes video)

Veritas has a Singular Vision....(includes video)

Hitachi Transforms Itself at Next (Video)

Microsoft Ignite Enterprise Mobility and Security Highlights

Veritas Vision Recap: Leveraging Data for Multi-Cloud (Video)

Time to Embrace a Security Management Plane in the Cloud

IT Infrastructure’s Comings, Goings….and Stayings (Video)

The Problem with Collecting, Processing, and Analyzing More Security Data

Storage Versus Data: The Role of Storage in Managing the Larger Data IT Ecosystem (Video)

Phased Process for Cloud Security

Back in the Saddle Again

Microsoft Ignite: What to Expect

Apple Announcements: Good for Businesses?

Security Operations Spending and ROI

SOAPA Chat with Vectra Networks (Video, Part 2)

Hyperconverged Systems Don't Preclude the Need for Data Protection (Video)

Focus on the Right Thing about Containers: What the Workloads Perform, not How They Do It

VMworld 2017: The Year of the Cloud

Cybersecurity Pros' Opinions on Their Organization’s Security Operations

Wrap-up on Backup from VMworld US 2017

Top 3 Workspace Wonders at VMworld 2017

VMworld 2017: A Cornucopia of Possibilities (includes video)

Talking SOAPA with Vectra Networks (Video, Part 1)

VMware Advances Application Security

VMworld 2017 Day 1 Recap - VMware Moving Past Virtualization for Cloud, Mobile, and Security

Security Operations Challenges Galore

Looking towards Data Management and Enablement in 2018 (Video)

Do you still need a VM-specific backup solution?

Nothing in IT Really Ends - Capisce? (Video)

What is an Enterprise-class Cybersecurity Vendor?

Network Services: Procurement and the Role of Service Providers

Future of Flash from Flash Memory Summit: Where there’s smoke, there’s fire

Cybersec Pros Choose Their Top Enterprise-class Cybersecurity Vendors

LTE and 5G: The Role of Wireless in Future SD-WAN

Cybersecurity Analytics and Operations Skills Shortage

How the Fluid Network Perimeter Is Driving an Internet of Identities

Addressing Security Analytics and Operations Issues

Moving Forward with Machine Learning for Cybersecurity

Black Hat Impressions

Black Hat 2017: Disruption in the Wind

The U.S. Versus China with Flash Memory Stuck in the Middle

“Dev-Test” in the Cloud Can Mean Ops as Well as Apps

A Quick Talk with Yousuf Kahn, CIO of Pure Storage: High Performance Flash Is Powering Digital Business Transformation (Video)

Looking Forward to VMworld

Cybersecurity Skills Shortage: Profound Impact on Security Analytics and Operations

Anticipating Black Hat 2017

As the Storage Industry Converges on VMworld, HPE and NetApp are Poised to Make Noise

VMworld – What I’m Intrigued To See

What to Watch About Systems Management & DevOps @ VMworld 2017

Cybersecurity Operations: More Difficult Than It Was 2 Years Ago

Midyear Check-in on Data Protection Initiatives in 2017 (Animated Infographic)

ESG Cybersecurity Research and a Preview of Black Hat USA 2017 (Video)

SOAPA Interview With Rick Caccia of Exabeam- Part 2 (Video)

Is the "Silver Lining" of Clouds Just Free Money for Some [of Your] Vendors!? (Video)

Applications Drive Hybrid Cloud, With On-Premises Being the Key to Hybrid, Not Public Cloud (Video)

The Internet of Identities (IoI)

Long Term Data Retention is Evolving – Are You? (Video)

Cisco Ramps Up Security With Intent-based Networking

At .NEXT, Nutanix Says It’s Time For a 'Real Hybrid Cloud' (Video)

CiscoLive and Cybersecurity

Cisco Intent-Based Networking Brings SDN to the Enterprise

SOAPA Interview with Rick Caccia of Exabeam, Part 1

First-hand Experience of Incomplete Digital Transformation

Telemetry and Performance Management in Softwarized Environments

WHAT Products or Services Might you Consider when Using Clouds Within your Data Protection Strategy – Part 4 in Series

Cisco’s Future Intents – Subtlety and Importance of What Is Coming

What's .NEXT for Nutanix?

Intelligent Networks - Networking is More than Data Delivery

What I Expect at Cisco Live 2017 - Grand Strategy Coming Together

Pure Accelerates its Move from Being Purely About All-flash Arrays

ESG Security Operations and Analytics Webinar

HOW to Ensure Security when Using Clouds Within your Data Protection Strategy – Part 3 in Series (Video)

HPE Discover-ing Its True Identity

WHICH Clouds to Use Within your Data Protection Strategy – Part 2 in Series

Data Center Transformation, Powered by NetApp Transformation

Think Economics -- Not Features -- When Evaluating Big Data Value

WHY Use Clouds as Part of your Data Protection Strategy – Part 1 in Series (Video)

NetApp Looking Good For Its Age! (Video)

Splunk on SOAPA (Part 2)

ServiceNow - A Platform for More than Just the Service Desk

What Users Tell Infrastructure Vendors in Recent ESG Research (Video, Part 2 of 2)

ChefConf Showcases Chef and Continuous Automation

Thank You, Analyst Relations

Red Hat Lays Out Its Hybrid Cloud Vision

Dell EMC Partner Summit - Excitement…New Benefits… and a Little Transformation Math!

Wrap-up on Backup from VeeamON 2017

Splunk on SOAPA (part 1)

What Users Tell Infrastructure Vendors In Recent ESG Research (Part 1 of 2)

Google I/O Fascinates Developers, but How About CIOs?

A Video Interview about SOAPA with Haiyan Song, SVP of Splunk, Part 1

Availability Comes of (Digital Life) Age - VeeamOn 2017

The VMware EUC Team’s Execution Machine Continues to Roll

Informatica Origami

Wrap-Up on Backup – from Dell EMC World 2017

Dell EMC World – ESG’s On Location Video Insights

WannaCry Makes Me Want to Cry!

Feeling Transformed after Dell EMC World 2017

Will WannaCry Help Drive Google Chromebooks?

Citrix Synergy 2017: Anticipating a Focal Point on Cloud and Security

Dell EMC World - Positive Attitudes (Plus New Latitudes!)

SIEM: Remains an Enterprise Security Architecture Requirement

Microsoft Build: a Smarter Future Today

Interop ITX 2017- A View into a Full Stack of IT

Is Intel Inside Your Digital Transformation?

The Rise of Enterprise-class Cybersecurity Vendors

Are Next-generation Firewalls Legacy Technology?

Wrap-up on Backup – from Veritas Sales Conference FY18

Dell EMC: IT Transformation Is About Attitude as Well as Aptitude

Public Cloud Trends - 2017 research study shows steady cloud growth

Toward Enterprise Security Technology Integration

Networking @ Scale: Who Can Learn these Lessons?

Microsoft's Broad AI Strategy in 10 Tweets

The Ultimate in Convergence: Looking Ahead to Dell EMC World

Barriers to Hybrid Cloud Onboarding: A Large Enterprise View

Enterprise Security Technology Consolidation

What the Dell will we all EMC in Vegas?

The Rise of No Code Development (Video)

Cybersecurity Skills Shortage Impact on Technology Innovation

The Role of Standards in a Security Ops and Analytics Platform Architecture (Video)

Looking Forward to Backing Up -- at Dell EMC World 2017

The Good, Better, Best of Data Management (Video)

The Real Dangers of Assisted and Augmented Reality

The Transition to NVMe: Accessibility Matters

HPE Gets Nimble: Dollars, Distribution...and Differentiation

Cybersecurity Skills Shortage Threatens the Mid-market

Picking a Winner for the Best Cloud

Expectations for Dell EMC World 2017: Is it One Company or Two?

Data Makes the World Go Round...

Cybersecurity Remains an Elusive Business Priority

An EDR Perspective on Security Ops and Analytics Architecture (Video)

SOAPA Services Opportunities Abound

Database Forecast: Cloudy with Increasing Chances

People, Process, and Technology Challenges with Security Operations

The New McAfee

Cloudera Builds Strength and Agility

Micro-segmentation Projects Span Enterprise Organizations

Is Multi-cloud More Marketing Than Reality? (Video)

Oracle Removes the Line Between Cloud & On-premises Storage

RIP Raimund Genes, Trend Micro CTO

Toward Strategic and Proactive Threat Intelligence Programs

IBM Interconnect 2017: Sharpening IBM's Enterprise Focus

Software-defined Perimeters: An Architectural View of SDP

Google Cloud and the Network Engineer

'Hybrid IT' Is Great – Unless It’s Just Pretend

Wi-Fi Calling - a Big Win and a Big Loss

Cloud Security: Still a Work in Progress

Strata Data Conference Gets Good

Multi-cloud or Not?

Google Cloud Next Wrap Up - Opportunities and Challenges

Why Is IR Automation and Orchestration So Hot?

IBM on Security Analytics and Operations (SOAPA) Part 2

Google Cloud Next - The Key Thing to Security is a New Mindset

IBM Chat About Security Analytics and Operations (SOAPA) - Video

That's a Wrap! RSA Conference 2017 Thoughts and Observations, Continued (Video)

Google Cloud Next - Enterprise Legacy Migration

Google Next: An Enterprise Awakening for Google Cloud

The Google Machine Learns to Compete

The Three-legged IT Stool (Video)

RSA 2017 - A Few Good User Interfaces in a Sea of Horrendous Ones

HPE gets "Nimble" for $1 Billion

Cybersecurity Skills Shortage Holding Steady

Google Cloud Next - What's in Store Next?

Dealing with Overwhelming Volumes of Security Alerts

Big Data, Database, ML and AI Spending Trends: What You Need to Know

That's a Wrap! RSA Conference 2017 Thoughts and Observations, Part 1 (Video)

IT Experience Can Be Beneficial for a Cybersecurity Career

That was Fast! HPE Closes SimpliVity Acquisition

NY State Cybersecurity Regulations: Who Wins?

The Big Data Bubble Rises

New York State Cybersecurity Rules and the Skills Shortage

The Contemporary Opportunity for Traditional IT Hardware (Video)

RSA 2017 - Security Pains for Software Providers and Government

RSA - Detaching Hype from Reality

In and Around the 2017 RSA Conference

Y Evolve Your Data Protection Strategy in 2017 (Video)

Highlights from Spark Summit East

The Challenges Companies Face When Adopting DevOps in 2017 (Video)

Hybrid Data Management (Video)

Top 5 Characteristics of a High-quality Citrix Technology Partner

Kaminario Announces General Availability for K2 Generation 6

2017 Channel Acceleration Awards - Part 2

2017 ESG Channel Acceleration Awards - Part 1

What Sits on the Public Cloud Always & Forever? (Video)

How Will Cloud Impact Systems Management Vendors in 2017 (Video)

Security Analytics and Operations at RSA

RSA 2017: Anticipating Network Security Chatter

What's in Store for Converged and Hyperconverged Systems in 2017? (Video)

Cloud Computing: Predictions for 2017 (Video) - Part 3!

2017 Big Data & Analytics Predictions: Part 3: Pipelines

Dell EMC & VMware: The Value in Multiple Manifestations of SDS

RSA Conference Topic: Endpoint Security

Scratching the Surface on What to Expect at RSA 2017 (Video)

2017 Predictions for Systems Management, PaaS, and DevOps (Video)

Converged Vs. Hyperconverged Infrastructure: What's The Difference?

Cloud Computing: Predictions for 2017 (Video) - Part 2

Shadow IT and Cloud Access Security Brokers Video

2017 Big Data & Analytics Prediction: Part 2: Machine Learning (Video)

Commuting Chelsea Manning’s Sentence Was Just and Proper

Why Did Cisco Pursue AppDynamics?

Cisco Buys AppDynamics to Strengthen Cloud Software Portfolio

Pure Storage Announces General Availability for FlashBlade

Remarkably, Many Organizations Still Opt for 'Good Enough' Cybersecurity

Cloud Computing: Predictions for 2017 (Video) - Part 1

2017 Enterprise Storage Predictions (Video)

Anticipating RSA Conference 2017

2017 Big Data & Analytics Predictions: Part 1: The Cloud (Video)

Networking: Predictions for 2017 (Video)

HPE Acquires SimpliVity as the Market (Hyper)Converges

The Case for a Security Operations and Analytics Platform Architecture (SOAPA) - Includes Video

Endpoint Security in 2017

Checking on Kudu

Thoughts on Incident Response Automation and Orchestration

2017 Data Protection Predictions (Video)

The Good News/Hard Truth about Storage Management Software

Cybersecurity Pros to Trump: Critical Infrastructure Is Very Vulnerable to a Cyber-attack

2017: The Year of Cybersecurity Scale

In the Age Of Never-ending Technology Conquests, Common Sense Still Trumps All

ESG 2017 Predictions - Cybersecurity, Part 2 (Video)

Security Data Growth Drives Security Operations and Analytics Platform Architecture (SOAPA)

Delta-V Awards - 2016 Edition - The Top Five

Delta-V Awards - 2016 Edition - 10 to 6

Looking Back to Look Forward on Cybersecurity

Delta-V Awards - 2016 Edition - 15 to 11

Delta-V Awards - 2016 Edition - 20 to 16

ESG 2017 Predictions - Enterprise Mobility (Video)

High Demand Cybersecurity Skills in 2017

…and they wonder why IT partners aren’t seeing blue skies in the cloud

Driving Infrastructure Value (includes Video)

New Research Reveals Cybersecurity Skills Shortage Impact

Predictions For Storage in 2017 (Video)

Why CISOs Succeed and Why They Leave

Threats and Industry Dynamics on the 2017 Cybersecurity Radar Screen (Video)

A Slimmer HPE Means There’s More to “Discover?" (Includes Video)

Trump Cybersecurity Dos and Don’ts (Part 2)

How Two Different Approaches to Common Management of Clouds are Delivering Hybrid Cloud

With Trust Established, Security Less of a Focus at AWS re:Invent 2016

Time to Stop Buying IT Hardware for Your Data Center

Trump Cybersecurity Dos and Don’ts

Goodbye SIEM, Hello SOAPA

Hybrid Cloud Through Common Applications with Microsoft and HPE

VMware and AWS are Enabling Hybrid Cloud with a Common Platform

Which Job-related Factors Alienate Cybersecurity Pros?

Why Machine Learning is the Future of Big Data

Trump Remains Frighteningly Behind in Cybersecurity

Enterprise Mobility Exchange Event Highlights the Complexity of Mobility

AWS re:Invent Preview: The Case for Cloud-Delivered Security

Insights from the Enterprise Mobility Exchange Event, Las Vegas

Goodbye NAC, Hello Software-defined Perimeter (SDP)

Do You Wonder About or Fear Software-defined Storage? (Video)

Answering the Question: What Exactly is Hybrid Cloud?

Election Data Models Lesson for Cybersecurity

SDSN: Software-defined What?

In Politics (as in Channel Partnering), It’s All Personal

How the US Election Polls Failed Us...

The Scary State of the Cybersecurity Profession

Systems Management at ESG

Are we evaluating the storage technology name or the benefit?

Cybersecurity: A Priority for the Next POTUS

New Blog on Fiduciary Class Data Recovery

Better Business Protection – Fiduciary Class Data Recovery

OpenStack: The Philosophical Divide

OpenStack Summit: Nostalgia or Looking Forward

Trend Micro’s Enterprise Play

Dell EMC World 2016 Wrap-up

A Music Playlist For Networking Pros

NV, NFV, SDN, SD-WAN: Networking Acronyms That Can Transform Your Data Center

IBM Jumps the Cognitive Shark

Cybersecurity Isn’t Always a “Boardroom Issue”

DellEMC World – “And they’re off…..”     (includes video)

Cybersecurity, Business, and IT Relationships

Dell EMC World 2016: The Transformation is Just Beginning

A movie and awareness for NetScout's network and security tools

David Bunnell, R.I.P.  -  Tech Media and Promise of Social Change

Consumer Reports and a Bad Recommendation on Home Computing

Red Hat - commoditizing or democratizing?

Recruiting and Retaining Cybersecurity Talent

VMware Cloud on AWS – What makes it different? What's the goal?

Lenovo and Nimble Storage Join Forces

Cloud computing is elastic, but people are not – can Rackspace help?

Cybersecurity Canon Book Report: There Will Be Cyberwar

Juniper Networks' Audacious Goals for Automated Networking

IT Attrition Could Help Address the Cybersecurity Skills Shortage

The Truth About Cybersecurity Certifications

HDS Is Spelled Hitachi (includes video)

The State of Cybersecurity Professional Careers

Google Touts Its Cloud Network

AI & Machine Learning Take Center Stage

NetApp Has Future In Sight at its Insight Event (includes video)

Splunk Intent on Extending Cybersecurity Leadership

Is gamification in your training and sales enablement vocabulary?

Wrap-Up on Backup from Microsoft Ignite (with Video)

Incident Response Automation and Orchestration

Swirld's Hashgraph: A Better Blockchain?

Oracle Open World: Beginning to Focus on the Middle Word (includes video)

The Newest Member of the ESG Lab Analyst Team

Oracle Sees Multiple Journeys to Cloud Computing

Trends in Software-defined Networking Webinar Recording

Keeping Up with Incident Response

Vision 2016: Bringing Veritas into Focus (includes video)

SIEM Market Dynamics in Play

ESG Video Capsule: Upcoming Research on Database Market Trends

Qualifying Micron's QuantX

New Veritas = New Vision

The Era of Identity-based Applications

Oracle ZS5 Is Foundational for Oracle's Data Cloud Future

IT Operations Analytics from the Source

Is Your Data Protection Strategy Suffering a Civil War?

My 30 Years At EMC, Sort Of……

Cybersecurity Goes Private: McAfee and RSA

The End of the All Together

VMworld 2016 Key Takeaway: The Announcement of “VMEverywhere”  (includes video)

Understanding Poetry at the HPE Big Data Conference

VMworld: My Cybersecurity-centric Impressions

VMware Expands NSX Use Cases With Cross-Cloud

IoT networking: Bluetooth and mobile networks: future has multiple nets

Cybersecurity and VMworld

Hyperconverged infrastructure vendor Nutanix goes on a buying spree

Looking forward to VMworld 2016

The most important ingredient in tech marketing

Pay-as-you-go enterprise networking

F5 Agility conference: somebody familiar, some things are new

The pressing need for network security operations automation

Contemplating the internet's impact on society

More on operationalizing threat intelligence

Why you still need backup … and beyond

CISO portfolio management

Six for 16: Black Hat 2016 takeaways

A few thoughts from Black Hat 2016

Four ways to de-escalate the marketing wars

Oracle's long game for cloud

Second half predictions for big data & analytics

Squirrel! What to chase at Black Hat 2016

Anticipating Black Hat

Russian DNC hack — a cybersecurity microcosm

Swimming application security upstream with SecDevOps

The future of flash is guaranteed

Cybersecurity: a vertical industry application?

From rattling cages to moving goalposts — DataCore & the storage industry

The gold standard for data protection keeps evolving

Cisco: from CLI to cloud

Crypto:  Nominated to the Cybersecurity Canon

Carbon Black’s Acquisition of Confer Marks NGES Transition from Tools to Platform

What a Relief! The Federal Appeals Court Just Saved the Cloud

Cybersecurity Highlights from CiscoLive

A case study in how to #EpicFail at a product launch

IBM's cloudy future

Partner portals — love that dirty water

OMG! It’s ODM!

Operationalizing threat intelligence

How to make sense of a crowded, confused IoT platform landscape?

"Big data, huh, what is it good for?" at the Hadoop Summit

Cisco, CloudLock and the accelerated pace of CASB market maturation

Balancing user experience with security

Veeam: nice guys still finish first

The barriers to being mobile-first

Predicting the unthinkable

Flash Forward, London: refreshing purpose and content

Networking education: leave your comfort zone

A FireEye chat with Kevin Mandia

"Tape" is not a four-letter word

Does the king of CRM need a food taster?

HPE is law-abiding in Las Vegas

Federal cybersecurity boondoggle: the Software Assurance Marketplace (SWAMP)

Quick take: Symantec buys Blue Coat

Symantec and Blue Coat cybersecurity 3x2

Google's Firebase — back-end-as-a-service

The 5 Cs of data protection

Lenovo enters the storage market with software-defined storage

Endpoint Detection and Response (EDR): what’s important?

SolidFire and NetApp: happy to be together and apart (includes video)

Loving ONTAP’s potion #9: reducing the cost of flash and simplifying the data fabric

Enterprises are investing in network security analytics

IBM and Cisco partner for edge-to-cloud IoT analytics

What might be Discovered at HPE's June event in Vegas

Software-defined perimeter (SDP) essentials

How is SQL Server still a thing?

The wild west Spark Summit showdown

Citrix Synergy 2016 highlights

Are there workloads that don’t belong in the public cloud?

Why the Citrix and Microsoft partnership is important

Storage and IT finals

Why BaaS when you can DRaaS?

Identity and Access Management (IAM) infrastructure is misaligned with security

Cloud security: a mismatch for existing security processes and technology

Winter is coming...for the storage industry

INTEROP 2016 — interoperate across the stack

IoT World 2016 — an ecosystem in flux

Psycho query: qu'est-ce que c’est?

Next-generation endpoint security market bifurcation

Can new IT exist with old IT?

EMC World – a familiar new song (includes video)

High-demand cybersecurity skill sets

EMC, Dell, Pivotal, Microsoft, and ... Ford?

Mobility technology surplus frustrates information technology decision-makers

Threat intelligence gateways

Cybersecurity plan for POTUS 45

The DevOps reference model

Wrap-up on backup from EMC World 2016 — day two keynote

How to evolve from "data protection" to "data management"

Google organizes hardware business for growth

EMC pivots to public cloud via VirtuStream

A curious reversal is happening around cloud-based big data

If I were the next CEO of Symantec – redux

Network engineers are not an endangered species

Mobility tech: Easy to wow. Hard to how.

OpenStack Summit Day One - Keeping things really weird

Introducing direct scale-out flash: extending the potential of NVMe

Making sense of 2016 OpenStack User Survey. Strange results.

Data is getting boring again

Cybersecurity salary inflation — a red flag

SD-WAN is not just hybrid WAN. Mea culpa.

AV software: “I’m not quite dead yet”

Is OpenStack private cloud weird?

Google's journey to the enterprise

OpenStack as a service — provisioned locally, orchestrated in cloud

Learning about SDP via Google BeyondCorp

ScaleIO 2.0: another step in the journey to the software-defined data center

Happy birthday IBM System/360 — a grandpop cloud system

Cloud security challenges

The economics of SD-WAN and NFV

Vendors under the radar: Syncplicity

Riding high at Strata+Hadoop World

Dell brings VCE into its hyperconverged tent

SimpliVity's OmniStack version 3.5 — primed for Tier-1 workloads

Brocade making a Ruckus (bid)

Data and Identity: Two New Security Perimeters

Wrapping up GCP:NEXT

The ultimate network security tool: NetSlicer

Dell sheds Perot

The death of privacy (by big data)

Partners show the way for customers for Google Cloud Platform

Four ways Google has out-innovated first mover competitors

Flexible support for traditional apps on Google Cloud Platform

Cybersecurity as a business issue

Pure Storage FlashBlade: the all-flash data center just got closer

New wave load balancers by Google at GCP:NEXT

Google's Growing Cloud Analytics Portfolio

Will the new breed of Enterprise Googlers give GCP a competitive edge?

Open Networking Summit 2016 - changing worlds

Software-Defined Architecture: What To Consider

The Endpoint Security Continuum (Part 2)

Pure Accelerate(s)

Open Compute Summit — hyperscale ready

Cybersecurity Skills Shortage Impact on Cloud Computing

Vendors Under the Radar: StorMagic

An analyst's views on product categories and innovation

2016 Big Data and Analytics Spending Intentions Survey

ESG can be your eyes and ears at Google:NEXT

An Abundance of Incident Response Bottlenecks

Vendors Under the Radar: Avere

ESG On Location: Impressions from RSA 2016

Cloud Sticker Shock? Check out Cisco and CliQr.

Before Moving on From RSA…

The network's new role in the data center

DataCore is Rattling Some Venerable Cages

RSA Conference Blue Suede Shoes

Do we still need VM-specific backup tools? [video]

Many Thoughts about RSA 2016

RSA Recap, Part One

Hybrid Cloud Wheel of Fortune – Oracle Snags Ravello Systems

For Big Data, Does Size Matter?

RSA Conference, Day Three

Thoughts from the dark side

RSA Conference, Day Two (with photos)

Cisco's new DNA: A new Digital Network Architecture

Oracle Brings the Cloud Back to Earth

RSA Conference 2016, Day One

EMC Continues its March to Flash

RSA Conference 2016: Day 1

IBM and Apple move swiftly to leverage Swift