Mark Bowker

Mark Bowker

Senior Analyst Mark Bowker focuses on all things related to virtualization and cloud computing. Mark researches cloud and virtualization technologies and evaluates the impact the solutions have (or will have) on IT strategy and the broader marketplace. His other research areas include data center management, application workload deployment in next-generation data centers, and the external influences driving adoption of data center technologies.

Recent Posts by Mark Bowker:

Is Microsoft’s Managed Desktop Right for You?

Before I peel into Microsoft’s Managed Desktop (MMD), I think it’s important to understand the potential value of intelligent data and the power of what can be done with the data in the form of AI and ML. So, while applications and devices typically provide the appeal on the surface (pun intended), the charge that Microsoft can inject into a service pivots completely around taking action on intelligent data. Steve Duplessie explains this concept well in his blog, “The True Value of SaaS and Managed Service Offerings.” He writes, “It’s not what they ‘do,’ it’s what they ‘could do’ that makes them so valuable.”

Topics: Enterprise Mobility

Citrix Synergy 2018: What’s in Store?

Citrix Synergy is an event fueled by the inspiring stories about how businesses are helping redefine how people work in today’s dynamic business environment. I see the event as an opportunity for companies to learn how they can reshape existing business processes, and adapt to new employee and customer workstyles. In addition to the event, I’m fascinated by the new challenges that IT and information security professionals have in front of them as they strive to embrace new experiences, while protecting an unpredictable IT environment littered with potential threats.

Topics: ESG on Location

Where Endpoint Management and Security Meet

Upgrade existing tools or net new platform investments?

This is the question IT operations and information security teams are wrestling with as they attempt to secure an expanding perimeter driven by cloud, mobile, and IoT. Should companies maintain a traditional siloed tool approach or embrace a modern management approach that unifies management and security policies across users, devices, applications, networks, and data?
Topics: Enterprise Mobility Cybersecurity

Modern Device Management: Resist Or Embrace?

Here’s the problem. Gone are the days where a user would have a single username and password to access a single device. And gone are the times when IT had to secure a single predictable and stable environment. Bye bye. Today as we know, employees have multiple devices that they use every day to get work done.  For example it is not unusual to see an employee with a Samsung phone running Android, an iPad running iOS and a Windows laptop….let’s throw in a Chromebook for fun too. These are all fantastic pieces of technology and do in fact have employee satisfaction and productivity gains that should not be ignored. But how does IT wrap their arms around all these devices, applications, and identities….not to mention securing the now expanded perimeter. Yikes!

Topics: Enterprise Mobility

ESG at RSA: Identity, No Passwords, and Email Security (Video)

In this video, ESG analysts Mark Bowker and Jon Oltsik run through some of the top topics they will be tuning into at RSA Conference 2018. Mark and Jon home in on how identity has become the control plane and how the software-defined perimeter is impacting the CISO's decision making process and future investments. 

Topics: Cybersecurity Identity and Access Management RSA Conference

2018 Enterprise Mobility Spending Trends Video

As part of ESG’s 2018 IT spending intentions research, IT decision makers were asked about their spending plans for enterprise mobility technology over the next 12 months. In this video, you'll learn about where enterprises are focusing their mobility spending, spending priorities, and changes in spending.

Topics: Enterprise Mobility

Okta and ServiceNow Help Solve Organizational Pressures

There are two primary problems with managing identity:

  • Fractured user authentication across networks, applications, and devices.
  • Organizational gaps between IT operations and information security.

2018 Goodbye Password....Hello Bots and Machine Learning

2018-mobility-predictions.jpgBusinesses can no longer compromise security for user experience and should look to strengthen security while improving productivity. Doug Cahill and I share our insights into how companies have the opportunity to improve their security posture while embracing mobility.

Topics: Enterprise Mobility Cybersecurity ESG Predictions

Say Goodbye to Passwords in 2018

Passwords. They’ve always been an ongoing IT issue, but that subject is becoming exceptionally serious as organizations strive to support a rapidly growing mobile workforce using ever-increasing numbers of devices, and consuming more and more applications from external cloud platforms. Passwords are:

  • Easily forgotten and easy to guess.
  • Used across multiple devices and locations resulting in an expanded attack surface.
  • A significant expense and drain on IT resources.
  • Difficult to enter on mobile devices.
Topics: Enterprise Mobility Cybersecurity

ESG360 Video: Who Owns Identity and Access Management (IAM)?

Mobility and cybersecurity. While those two areas may have very different roles inside an IT organization and business, they both play integral parts in identity and access management. Given that, I’m always getting asked, “Who owns IAM?”

Topics: Identity and Access Management Cybersecurity Enterprise Mobility