Blockchain Progresses in the Enterprise IT Space (Video)

As blockchain continues to progress outside of cryptocurrencies and into the enterprise IT space, organizations are beginning to look for ways to leverage the benefits of blockchain. Let me stop right there. You’re probably thinking, “What benefits? It’s just Bitcoin.” While Bitcoin gets the headlines, as it should since it’s the top use case within the financial vertical and has a massive consumer-based following, blockchain is so much more than Bitcoin. It’s truly disruptive technology that will enable organizations to recognize massive efficiency gains and cost savings across all verticals, from communications & media, and transportation & logistics to business services and retail. Check out my video below where I talk about the top reasons why blockchain should matter to you.

Topics: Blockchain Cybersecurity Data Management IT Infrastructure

THINK-ing about IBM (includes video)

The month of March in the US signifies its eponymous “Madness” (it’s big college basketball tournaments for those of you reading from places it does not reach); perhaps to give a nod to that, IBM did a few things to create its own madness at its “Think” event in Las Vegas. There was the frustration type of madness with the registration system for a unified-and-therefore-very-big event…there was the amusing type of madness from seeing IBM execs trying to look comfortable in jeans…and there was the messing-with-our-minds type of madness from seeing a truly cohesive story, and event, and wondering if it actually was dear old IBM that we were witnessing!

Topics: Storage ESG on Location

Is It Time to Unify Endpoint Management and Security?

Yesterday, VMware announced its intention to acquire E8 Security and integrate the technology into its Workspace ONE platform. This makes sense as Workspace ONE collects, processes, and monitors data about users, applications, networks, and endpoints. Add E8 Security and you can use this very data to fingerprint devices, build models around normal usage patterns, and identify anomalies in real-time.

Topics: Cybersecurity

Is It Too Late For Oracle to Enter the Cloud Analytics Space?

So Oracle has officially entered the cloud analytics space. Building off the announcement at Oracle Open World last fall, yesterday they officially released their autonomous data warehouse for the cloud. And it’s a big deal for them. Built on their latest 18c database, the autonomous data warehouse brings the potential for a new level of simplicity. It leverages machine learning to ensure constant uptime by automatically (hence “autonomous” everywhere in their announcement) protecting, securing, and repairing the database. On top of the promised simplicity, they tout the ability to lower costs and perform faster than the competition. OK, Oracle, well played. I’m intrigued, maybe even a little excited, but the reality is that Oracle is still behind. They (self-admittedly) lost the cloud infrastructure war, and I’m nervous that they could lose this one too if they don’t play their cards right.

Topics: Data Management Cloud Platforms & Services

Pure Storage: Empowering Artificial Intelligence

Today, Pure Storage announced the release of AI-Ready Infrastructure (AIRI), a major move in serving the artificial intelligence (AI) and machine learning space. The newly announced solution combines Pure Storage FlashBlade and NVIDIA DGX-1 technology. According to Pure Storage, it is the industry’s first integrated AI-ready infrastructure for deploying deep learning at scale.

Topics: Artificial Intelligence Storage

Where Endpoint Management and Security Meet

Upgrade existing tools or net new platform investments?

This is the question IT operations and information security teams are wrestling with as they attempt to secure an expanding perimeter driven by cloud, mobile, and IoT. Should companies maintain a traditional siloed tool approach or embrace a modern management approach that unifies management and security policies across users, devices, applications, networks, and data?
Topics: Enterprise Mobility Cybersecurity

Thoughts from IBM Think 2018: Bridging IT Transformation and Digital Transformation 

Think 2018 was a massive culmination of multiple and previously separate IBM events (Edge, InterConnect, World of Watson, Amplify, and Connect). While I was never able to get an official headcount, estimates were north of 30,000. And attendees nearly overflowed the Mandalay Bay Convention Center.

Topics: Blockchain Artificial Intelligence Storage Internet of Things ESG on Location

Modern Device Management: Resist Or Embrace?

Here’s the problem. Gone are the days where a user would have a single username and password to access a single device. And gone are the times when IT had to secure a single predictable and stable environment. Bye bye. Today as we know, employees have multiple devices that they use every day to get work done.  For example it is not unusual to see an employee with a Samsung phone running Android, an iPad running iOS and a Windows laptop….let’s throw in a Chromebook for fun too. These are all fantastic pieces of technology and do in fact have employee satisfaction and productivity gains that should not be ignored. But how does IT wrap their arms around all these devices, applications, and identities….not to mention securing the now expanded perimeter. Yikes!

Topics: Enterprise Mobility

Exploring the Intelligent Edge at Aruba Atmosphere

Mark Peters and I are looking forward to joining more than 3,000 networking and security professionals at the HPE Aruba Atmosphere conference being held next week under the glittery lights of Las Vegas. It will be great to hear about the latest developments from the Aruba team – which, according to last quarter’s published earnings results, showed strong results, posting a 9% increase. This is the group responsible for driving innovation in campus networks, wireless LAN, and security solutions. I can’t help but think that one of the key reasons this acquisition by HPE has gone smoothly and has been able to achieve impressive growth is because its founder (Keerti Melkote) stayed with the company during the transition and is committed to keeping the company’s culture intact.

Topics: Networking Internet of Things ESG on Location

The 90s called—they want their PDF files back!

It’s amazing how prescient the creators of the PDF were. In 1993, they designed a file format that captured physical output in extremely high fidelity. Twenty-five years later, PDF is the gold-standard for content distribution.

And ESG has always delivered technical validations—and much of the rest of our content—as PDF files.

Topics: ESG Validation Services

New Partner Mantra: 'Show Me (How I Make) the Money'

It's surprising how many channel people we talk to that do not have a clear understanding of how their partners make money selling their products. If they do, they quite often don’t incorporate all the factors affecting partner profitability into their programs.

When we talk with our clients about the importance of a strong economic value proposition to support their recruiting and re-recruiting efforts, they report many of the same challenges:

  • Why aren’t they more engaged?
  • Why aren’t they pushing my new product line?
  • Why does it seem we are doing all their work?
  • Are we recruiting for the right profile with our partners?
Topics: Channel

ESG at RSA: Identity, No Passwords, and Email Security (Video)

In this video, ESG analysts Mark Bowker and Jon Oltsik run through some of the top topics they will be tuning into at RSA Conference 2018. Mark and Jon home in on how identity has become the control plane and how the software-defined perimeter is impacting the CISO's decision making process and future investments. 

Topics: Cybersecurity Identity and Access Management RSA Conference

GDPR: Look Out for 'Right to Be Forgotten Storms' Ahead

According to ESG research, 11% of organizations say they are completely prepared for the GDPR deadline on May 25, 33% are mostly prepared, and 44% are somewhat prepared.

Topics: Cybersecurity GDPR

The Proactive CISO

I’ve spent a good amount of time speaking with CISOs over the past month and plan to write up a report about what I’m learning sometime after the RSA Security Conference. In the meantime, it’s become crystal clear to me that CISOs are becoming more and more proactive in their jobs in a few areas including:

Topics: Cybersecurity GDPR

The Impact of Server Refreshes on the Server and HCI Markets

As of late, the server market has been heating up. Companies like Dell, IBM, Cisco, Super Micro, and Huawei all saw growth in server shipments, while many saw double digit revenue growth year-over-year. So what’s driving the growth? Some argue it’s from the big web-scalers like Google, Microsoft, and Amazon, and to an extent, that is true. When the big guys do something, many follow suit, but I think the growth is also due in part to the mandate within many organizations to digitally transform by leveraging HCI.

Topics: Converged Infrastructure

Artificial Intelligence and Machine Learning - More Than Just Buzzwords

The traction over the last few years in the artificial intelligence (AI) and machine learning (ML) space is remarkable, and I’m not just talking about consumer-based products like self-driving cars, or virtual assistants like Google Assistant, Alexa, or Siri. While those products get the headlines, AI/ML is rapidly spreading across the enterprise IT space. I feel like I can’t go a day without a company mentioning AI or ML as part of their product or forward-looking strategy. It’s not just for crazy, sci-fi predictive analytics projects in a bunker somewhere. While that definitely still happens, AI and ML (and deep learning too) are being used across all aspects of IT: big data, cloud, IoT, security, infrastructure, systems management, etc.

Topics: Artificial Intelligence Data Management

Video: What Drives IT Complexity

ESG surveyed 651 global technology decision makers in our annual 2018 IT Spending Intentions Survey.

In this video, I highlight some of the results most relevant to networking and cloud platforms.

Topics: Networking Cloud Platforms & Services

No One Wants Your Stuff!

OK - This title doesn’t refer to all the great, productive, and innovative products that the IT industry churns out with amazing regularity, and it doesn’t mean that the cloud will make technology products obsolete. It’s just that we have found that customers are a lot less concerned today with ‘what’ it runs on than ‘if and how’ it runs... and by ‘it’ I mean the complex infrastructure and solutions that deliver the business outcomes critical to their companies.

Topics: Channel

Endpoint Security Suites Must Detect/Prevent Threats AND Ease Operations

Next-generation endpoint security tools may not be the stars of this year’s RSA Security conference but they are still bound to get a lot of attention. Why? Many organizations continue to move from traditional AV controls to new types of endpoint security suites built for prevention, detection, and response.

Topics: Cybersecurity

Apcela: Choices for Hybrid Computing and Financial Accounting

I have a new brief on Apcela's AppHUB, a hybrid computing platform that enables workloads to be deployed on different computing models (hardware only, hybrid (cloud/hardware), and fully virtualized) and ties them together with a high performance network. What follows is a bit of a wonkish view on the accounting implications.

Topics: Cloud Platforms & Services

Thinking about Identity Management for the RSA Security Conference

With February behind us, the cybersecurity industry is about to experience a push toward the annual RSA Security Conference in San Francisco. I expect around 50,000 people to attend this year. It ought to be crowded, loud, and extremely passionate.

Topics: Cybersecurity Enterprise Mobility Identity and Access Management Cloud Platforms & Services

Video: What Networks Do for IT Organizations

ESG conducted research on what network infrastructure provides for organizations by surveying 300 IT professionals responsible for evaluating, purchasing, and managing networking technologies.

Are networks cost centers and simply a form of plumbing? Or do they provide some other capabilities that can actually generate revenue or provide security insights?

Topics: Networking