Such blogs typically offer 3 or 4 takeaways from seminal industry events; I have one from Black Hat 2017—disruption of core cybersecurity markets is in the air.
by Doug Cahill, on Jul 31, 2017
Such blogs typically offer 3 or 4 takeaways from seminal industry events; I have one from Black Hat 2017—disruption of core cybersecurity markets is in the air.
by Scott Sinclair, on Jul 28, 2017
I normally don’t mention politics. My expertise is in technology and business, so I like to stick to those topics. But, an article in the Wall Street Journal today caught my eye. It is well worth a read, if you get a chance.
It a nutshell, the article describes growing tensions between the U.S. and China in response to Chinese firms attempting to acquire U.S semiconductor vendors and technology. According to the article, “Big U.S. players like Intel Corp. and Micron Technology Inc. find themselves in a bind—eager to expand in China but wary of losing out to state-sponsored rivals.” I cannot talk to the nuances of the geo-political landscape, but what I do know is flash memory, and this tension doesn’t look good.
by Mark Peters, on Jul 27, 2017
There are some very common usages that one finds for the public cloud when it comes to business IT; along with data protection and long-term archival storage (and, yes, increasingly but not ubiquitously, there are production applications), one of the most oft-mentioned uses for the cloud is that of Dev-Test.
It is easy to see why – it can be viewed as a safe sandbox to play in, with no realistic danger of contaminating your production data. Meantime there are resources that are as flexible (whether in terms of scale, type, or speed of implementation) as your budget allows. And perhaps most important of all, of course, when you’re done, you’re done; just wrap up the project, and check out of the IT hotel.
Now, just as you're expecting it, there’s actually no “but” to this blog; instead there’s an “and”….
by Scott Sinclair, on Jul 25, 2017
With Flash Memory Summit a few weeks away, now is a good time to reflect on how flash technology has transformed business as well as our everyday lives. The wealth of digital products and services available today as well as the ever increasing value of business insights gathered through analytics would likely not be possible without flash storage technology. And if it were possible, it would be way too costly. The bottom line is that the modern business is built on data, and the speed at which that data can be accessed and understood directly impacts business success. Flash storage technology is a huge step forward and continued innovation in this space will further propel digital businesses in the future.
by Terri McClure, on Jul 24, 2017
VMworld is coming at us fast. I always approach VMworld with mixed feelings. First, I love it because it gives me the opportunity to talk with lots of people on the vendor and IT professional fronts. It's one of the best and biggest trade shows I attend. It is a veritable who's who in the IT technology infrastructure world, and for both vendors and those that manage IT infrastructure. But I hate it because it marks the end of summer. It's back-to-school season, and even though I don't have kids, I somehow still think of back-to-school season as the end of fun times and the beginning of work - and it turns out it's the same in the tech world! This is the beginning of fall trade show season, which means less time at the beach, more time on the road, and the beginning of cooler weather. But enough of that - let's talk about my VMworld expectations and why I am really looking forward to the show.
by Jon Oltsik, on Jul 24, 2017
I’ve written a lot about the cybersecurity skills shortage over the past 5 years. For example, ESG research indicates that 45% of organizations claim to have a problematic shortage of cybersecurity skills.
by Jon Oltsik, on Jul 21, 2017
I’ve been looking forward to this year’s Black Hat event in Las Vegas for several months. In my mind, Black Hat has become the industry’s premier event for digging into cybersecurity technology. RSA seems to be leaning toward business development and Sand Hill Rd. schmoozing these days.
by Scott Sinclair, on Jul 20, 2017
It’s the middle of summer. While for some that means time for a well-needed vacation, for those of us in the enterprise storage industry, it means that VMworld is just around the corner. Over the past few years, VMworld has become the premier multi-vendor storage industry event. While there is some debate on whether that status may be up for grabs over the next few years, VMworld still serves as an opportunity to take stock of the latest in storage innovations and capture a glimpse of how storage vendors' strategies are progressing with their customers.
by Mark Peters, on Jul 20, 2017
We all know that VMware changed the world of IT. Most of the way that change was effected is pretty obvious – a layer of software to make more effective and more efficient use of computing platform resources. While virtualization wasn’t new to IT, it had never been used so broadly or ubiquitously. And, yes, VMware’s offering has continued to get broader and more comprehensive, covering all the major elements of IT infrastructure – software joined with custom/partnership hardware as appropriate to deliver storage and networking capabilities along with the good-‘old’-server virtualization.
by Edwin Yuen, on Jul 19, 2017
It's always an exciting time as we start looking at the end of summer and the approach of VMworld. This year will be 10 years since I went to my first VMworld. I've seen VMworld grow massive over the years and shift venues back and forth from San Francisco to Vegas, back to SF, then back to Vegas. I know I'll always miss Cannes, although the Palais des Festivals wasn't the roomiest venue. The show is now tougher for me as my kids are now going to school and I have to miss the first day of the year.
by Jon Oltsik, on Jul 17, 2017
ESG just published a new research report titled, Cybersecurity Analytics and Operations in Transition, based upon a survey of 412 cybersecurity and IT professionals working at large midmarket (i.e., 500 to 999 employees) and enterprise (i.e. more than 1,000 employees) organizations in North America and Western Europe.
The data is quite interesting, to say the least, so look for lots of blogs from me over the next few weeks on a myriad of security operations topics we covered in this project. Furthermore, my esteemed colleague Doug Cahill and I are hosting a webinar this Wednesday, July 19. Feel free to attend, more details can be found here.
When I do end-user research on cybersecurity topics, I usually ask respondents a basic question: How are things today compared to 2 years ago? This research project was no exception and, as it turns out, 27% of survey respondents say that cybersecurity analytics and operations is much more difficult than 2 years ago while another 45% say that cybersecurity analytics and operations is somewhat more difficult today than 2 years ago.
by Jason Buffington, on Jul 17, 2017
At the halfway point in 2017, it seems appropriate to revisit the continued momentum around investing in better, more agile, more reliable, likely cloud-enhanced data protection. Early each year, ESG publishes its IT Spending Intentions report, where we look at where organizations are intending to invest their budgets.
In each of the six years that I have been at ESG, “Data Protection” in one or more forms is among the top of one or more priority lists.
by Doug Cahill, on Jul 13, 2017
In this video blog, my colleague Jon Oltsik and I discuss some of the insights from ESG’s cybersecurity research we expect to be topical at Black Hat USA 2017, including:
by Jon Oltsik, on Jul 12, 2017
Old friend and Exabeam CMO, Rick Caccia, returned for some additional banter around SOAPA. Part 2 of our video discussion features:
by Mark Peters, on Jul 12, 2017
The video below pretty much says it all: while the value of public clouds - most often as a part of the growing 'hybrid IT' model - is indisputable for the majority of IT organizations, there are some vendors that have seen the opportunity to capitalize at users' expense. Those wanting to make a quick buck are likely driven by a desire to make the cloud look artificially more expensive than it is, as much as a desire to protect revenues....but either way it is insidious. It is insidious for two reasons: obviously it is just wrong, but also it is another example (like the bad kid that gets the whole class detention!) of the minority spoiling things for the majority.
Anyhow, take a look at the video first, and then take a look at your invoices too....just to be cautious and sensible.
by Edwin Yuen, on Jul 12, 2017
Terri McClure, ESG's Senior Analyst for Cloud Infrastructure, and I did an ESG 360 video about the hybrid cloud research that I have conducted. Two key points that came out of that research were the following:
by Jon Oltsik, on Jul 10, 2017
Everyone is talking about IoT these days and for good reason – there are already billions of devices connected to the global Internet and some researchers are predicting 50 billion by 2020. This alone will make CISOs' jobs more difficult, but security executives face many other associated challenges as well:
by Jason Buffington, on Jul 10, 2017
It seems like every few months, a new regulation or mandate pops up to remind people to 1) keep their data longer and/or 2) delete it as soon as necessary. Those two edicts are not contrary to each other as long as you do them in that sequence; first, understand your retention requirements and then delete data beyond that retention date. But there is sooooo much more to it than that, since not all data has the same regulatory or operational retention benefits or requirements.
If you haven’t seen it already, please check out my earlier vBlog on “The Good, Better, Best of Data Management”
by Dan Conde, on Jul 7, 2017
Encrypted Traffic Analytics and SD-Access integrate security into the enterprise network.
Security is a big part of Cisco's new intent-based networking strategy. The key security pieces are Encrypted Traffic Analytics and Software-Defined Access. The details of hardware support such as the Catalyst 9000 switches aren't as important as how the new architecture provides a new way for enterprises to approach security by integrating it into the network.
by Mark Peters, on Jul 7, 2017
Nutanix held its user conference - .NEXT – last week in Washington D.C. If it felt a bit cult-like that was only in the good sense, as befits an organization with NPS scores over 90% for three years running (that is ethereal territory).
As many other vendors are running hard, hoping to catch Nutanix and steal/borrow its “HCI cloak,” so it is running just as fast to try to ensure that spot is vacant by the time any others get there. It spent the conference explaining and promoting the malleability and expansion of its “Enterprise Cloud” approach.
Some key takeaways from, and comments about, the event can be found in the ESG On Location video that my colleagues Terri McClure, Brian Garrett, and I shot while there.
by Jon Oltsik, on Jul 5, 2017
I spent a few days at CiscoLive, Cisco’s annual user conference, last week in steamy Las Vegas. As a cybersecurity professional, I really filtered out a lot of other content to focus on all things infosec. Here are my observations:
by Dan Conde, on Jul 3, 2017
Automation platform promises to make software-defined networking a reality for campus networks.
At Cisco Live, networking pros heard a lot about Cisco's new intent-based networking strategy and technologies. On the surface, the technologies look like an evolution of Cisco's existing enterprise network products. Intent-based networking was actually available with Cisco's ACI platform, Digital Network Architecture (DNA). It was announced in March 2016, and the Catalyst 9000 family of switches is a version of the venerable switch. New technologies include software-defined access and encrypted traffic analytics.
However, we need to focus on the bigger picture rather than the individual products. Altogether, they're actually a long-awaited realization of software-defined networking branching out beyond the data center and finding its way into the enterprise.
Data is just data unless you understand its relevance. Truly understand technology trends and market dynamics, and swiftly take advantage of arising business opportunities with ESG’s actionable data and analysis.
John McKnight, Vice President, Research and Analyst Services
Learn More about custom market research.
ESG, a division of TechTarget, is an IT analyst, research, validation, and strategy firm
that provides market intelligence and actionable insight to the global IT community.