A Promising New Chapter in Detection and Response Tools

As security teams commit more and more resources to detection and response activities, endpoint detection and response (EDR) solutions are becoming core to the process. But when we take a step back and look at the bigger picture surrounding threat detection and response, we see multiple, disparate solutions being used to detect and investigate threats, requiring analysts to log into multiple systems or post-process data from these systems to correlate alerts. With many organizations utilizing a best-of-breed tools strategy for their security stack, integrations have become core to the sanity of most security teams.

Topics: Cybersecurity

Lenovo Accelerate: Taming the Next IT Frontier, the Edge

Digital transformation takes many forms. Nearly every company wants to maximize the value of its data, but each has specific goals in mind. When IT vendors discuss transformation, however, their story often sounds the same: “Build from the data center out.”

While that approach is valuable, for a variety of industries, the Internet of Things (IoT) and the edge are the real keys to maximizing an organization’s digital future. IoT can no longer be ignored. According to recent ESG research, 36% of IT organizations indicated that they have IoT initiatives already underway.

Topics: Storage

How a Circular Economy Can Help Accelerate Your Digital Transformation Efforts

Have you ever thought of what 50 tons of ewaste would look like? Probably not, but that is the amount of ewaste expected to be generated this year. To put it into perspective, I was recently told that much waste would be equivalent to 4500 Eiffel towers, basically enough to cover all of Manhattan. Even more important, ewaste is only 2% of our overall waste, but makes up 70% of our toxic waste.

Topics: Networking

Insights from VeeamON 2019

In this ESG On Location video, my colleague Vinny Choinski and I discuss our impressions of VeeamON 2019 in Miami, Florida.

Topics: Data Protection

VeeamON 2019

VeeamON just started in Miami (about 2000 in attendance) with a number of announcements that will get the industry's attention - not surprisingly, some might add, because it's Veeam.  

Topics: Data Protection

Digital Workspaces Create Unintended Consequences

New "born in the cloud" companies have it EASY! If I was to start a company today, it would be relatively simply (and fast) to choose business platforms, applications, and endpoints. While in reality, businesses have years of technology investments and business processes. So while companies are seeing the benefits and value of a digital workplace strategy, they risk creating a substantial functionality deficit.

Topics: Enterprise Mobility

The Most Stressful Aspects of Being a Cybersecurity Professional

ESG and the Information Systems Security Association (ISSA) just published a third annual research report titled, The Life and Times of Cybersecurity Professionals

Topics: Cybersecurity

Extreme Connect 2019 Has All The Right Elements For Its Customers

This week Extreme hosted customers for its second annual customer event, Extreme Connect. Reflective of its own growth, conference attendees doubled in size this year and that was evidenced by its packed keynotes and technology breakouts. The theme for this year’s event was #FutureForward.

Topics: Networking

Going back to Miami...

...and going back to my Veeam friends to attend VeeamON. I expect to see and talk to the Veeam leadership and product teams about the roadmap and new features they have in store. I will also spend time with end-users to discuss their experience with the solution. It is great to get first-hand feedback. I am very interested in a couple of areas in particular: data compliance and recovery testing...or actual experience dealing with an actual disaster.
Topics: Data Protection

Cybersecurity Professionals Are No Match for Cyber-Adversaries

Cybersecurity professionals are paranoid by nature. That’s not a bad thing, it’s a job requirement. We want our cybersecurity team to “think like the enemy” to discover and remediate vulnerabilities as rapidly as they possibly can. 

Aside from this cynicism, my cybersecurity friends also take great pride in what they do. Like Elliot Alderson from the TV series “Mr. Robot,” many cybersecurity professionals want to save the world (from hackers and the like). 

Topics: Cybersecurity ISSA