Mark Bowker

Mark Bowker

Senior Analyst Mark Bowker focuses on all things related to virtualization and cloud computing. Mark researches cloud and virtualization technologies and evaluates the impact the solutions have (or will have) on IT strategy and the broader marketplace. His other research areas include data center management, application workload deployment in next-generation data centers, and the external influences driving adoption of data center technologies.

Recent Posts by Mark Bowker:

Citrix and Sapho Create Critical Conversation

While many will focus on the technology aspect Sapho brings to Citrix, I believe this acquisition is all about owning the conversation and executing on a vision. Citrix is in the fortunate situation where it is well known and liked by its customers and partners, but a spark has been missing to take customers beyond where they are today with Citrix investments. Sapho has the potential to provide the ignition to break through application delivery challenges and connect directly into employee workflows.

Thomas Kurian, New Google Cloud CEO

Diane Greene did a great job getting Google Cloud to this point, and now Thomas Kurian has an opportunity to build quickly and firmly on this foundation. Google finds itself in an interesting place in the market as it faces the leadership position of Amazon and Microsoft, and pushes to accelerate traction in the enterprise. One of Diane's priorities at Google was to build a partner ecosystem as she did at VMware. Google has managed partnerships with the likes of SAP, but I believe Google was expecting more pull from strategic partners at this point.

Topics: Cloud Platforms & Services

Amazon Workspaces at AWS re:Invent 2018

AWS re:Invent is a premier event, and ESG always makes it a priority to attend. The event captures an audience of IT decision makers and business leaders who are hungry to learn and discover where Amazon is planning to shake up or enhance IT and business strategies. At the event this year, I’ll be paying close attention to Amazon Workspaces.

Topics: Enterprise Mobility AWS re:Invent

Is Microsoft’s Managed Desktop Right for You?

Before I peel into Microsoft’s Managed Desktop (MMD), I think it’s important to understand the potential value of intelligent data and the power of what can be done with the data in the form of AI and ML. So, while applications and devices typically provide the appeal on the surface (pun intended), the charge that Microsoft can inject into a service pivots completely around taking action on intelligent data. Steve Duplessie explains this concept well in his blog, “The True Value of SaaS and Managed Service Offerings.” He writes, “It’s not what they ‘do,’ it’s what they ‘could do’ that makes them so valuable.”

Topics: Enterprise Mobility

Citrix Synergy 2018: What’s in Store?

Citrix Synergy is an event fueled by the inspiring stories about how businesses are helping redefine how people work in today’s dynamic business environment. I see the event as an opportunity for companies to learn how they can reshape existing business processes, and adapt to new employee and customer workstyles. In addition to the event, I’m fascinated by the new challenges that IT and information security professionals have in front of them as they strive to embrace new experiences, while protecting an unpredictable IT environment littered with potential threats.

Topics: ESG on Location

Where Endpoint Management and Security Meet

Upgrade existing tools or net new platform investments?

This is the question IT operations and information security teams are wrestling with as they attempt to secure an expanding perimeter driven by cloud, mobile, and IoT. Should companies maintain a traditional siloed tool approach or embrace a modern management approach that unifies management and security policies across users, devices, applications, networks, and data?
Topics: Enterprise Mobility Cybersecurity

Modern Device Management: Resist Or Embrace?

Here’s the problem. Gone are the days where a user would have a single username and password to access a single device. And gone are the times when IT had to secure a single predictable and stable environment. Bye bye. Today as we know, employees have multiple devices that they use every day to get work done.  For example it is not unusual to see an employee with a Samsung phone running Android, an iPad running iOS and a Windows laptop….let’s throw in a Chromebook for fun too. These are all fantastic pieces of technology and do in fact have employee satisfaction and productivity gains that should not be ignored. But how does IT wrap their arms around all these devices, applications, and identities….not to mention securing the now expanded perimeter. Yikes!

Topics: Enterprise Mobility

ESG at RSA: Identity, No Passwords, and Email Security (Video)

In this video, ESG analysts Mark Bowker and Jon Oltsik run through some of the top topics they will be tuning into at RSA Conference 2018. Mark and Jon home in on how identity has become the control plane and how the software-defined perimeter is impacting the CISO's decision making process and future investments. 

Topics: Cybersecurity Identity and Access Management RSA Conference

2018 Enterprise Mobility Spending Trends Video

As part of ESG’s 2018 IT spending intentions research, IT decision makers were asked about their spending plans for enterprise mobility technology over the next 12 months. In this video, you'll learn about where enterprises are focusing their mobility spending, spending priorities, and changes in spending.

Topics: Enterprise Mobility

Okta and ServiceNow Help Solve Organizational Pressures

There are two primary problems with managing identity:

  • Fractured user authentication across networks, applications, and devices.
  • Organizational gaps between IT operations and information security.