Amazon Workspaces at AWS re:Invent 2018

AWS re:Invent is a premier event, and ESG always makes it a priority to attend. The event captures an audience of IT decision makers and business leaders who are hungry to learn and discover where Amazon is planning to shake up or enhance IT and business strategies. At the event this year, I’ll be paying close attention to Amazon Workspaces.

Topics: Enterprise Mobility AWS re:Invent

Is Microsoft’s Managed Desktop Right for You?

Before I peel into Microsoft’s Managed Desktop (MMD), I think it’s important to understand the potential value of intelligent data and the power of what can be done with the data in the form of AI and ML. So, while applications and devices typically provide the appeal on the surface (pun intended), the charge that Microsoft can inject into a service pivots completely around taking action on intelligent data. Steve Duplessie explains this concept well in his blog, “The True Value of SaaS and Managed Service Offerings.” He writes, “It’s not what they ‘do,’ it’s what they ‘could do’ that makes them so valuable.”

Topics: Enterprise Mobility

Talking Mobility (ESG 360 Video Series)

Here, Mark Bowker starts his discussion of IT mobility by defining it broadly--but-clearly--as the secure delivery of apps and data wherever and however needed. This major practical change in IT is conceptually simple to grasp but brings multiple complex challenges for IT organizations - not least of which is the dual threat of unpredictability and associated [potential for] lack of control. Mark explains that the major foci for IT around mobility are therefore security, policy, and management structures - but that isn’t to say that there is not also a major, gratifying pay-off for IT organizations that get mobility done well...

Topics: Enterprise Mobility

Where Endpoint Management and Security Meet

Upgrade existing tools or net new platform investments?

This is the question IT operations and information security teams are wrestling with as they attempt to secure an expanding perimeter driven by cloud, mobile, and IoT. Should companies maintain a traditional siloed tool approach or embrace a modern management approach that unifies management and security policies across users, devices, applications, networks, and data?
Topics: Enterprise Mobility Cybersecurity

Modern Device Management: Resist Or Embrace?

Here’s the problem. Gone are the days where a user would have a single username and password to access a single device. And gone are the times when IT had to secure a single predictable and stable environment. Bye bye. Today as we know, employees have multiple devices that they use every day to get work done.  For example it is not unusual to see an employee with a Samsung phone running Android, an iPad running iOS and a Windows laptop….let’s throw in a Chromebook for fun too. These are all fantastic pieces of technology and do in fact have employee satisfaction and productivity gains that should not be ignored. But how does IT wrap their arms around all these devices, applications, and identities….not to mention securing the now expanded perimeter. Yikes!

Topics: Enterprise Mobility

Thinking about Identity Management for the RSA Security Conference

With February behind us, the cybersecurity industry is about to experience a push toward the annual RSA Security Conference in San Francisco. I expect around 50,000 people to attend this year. It ought to be crowded, loud, and extremely passionate.

Topics: Cybersecurity Enterprise Mobility Identity and Access Management Cloud Platforms & Services

2018 Enterprise Mobility Spending Trends Video

As part of ESG’s 2018 IT spending intentions research, IT decision makers were asked about their spending plans for enterprise mobility technology over the next 12 months. In this video, you'll learn about where enterprises are focusing their mobility spending, spending priorities, and changes in spending.

Topics: Enterprise Mobility

2018 Goodbye Password....Hello Bots and Machine Learning

2018-mobility-predictions.jpgBusinesses can no longer compromise security for user experience and should look to strengthen security while improving productivity. Doug Cahill and I share our insights into how companies have the opportunity to improve their security posture while embracing mobility.

Topics: Enterprise Mobility Cybersecurity ESG Predictions

Say Goodbye to Passwords in 2018

Passwords. They’ve always been an ongoing IT issue, but that subject is becoming exceptionally serious as organizations strive to support a rapidly growing mobile workforce using ever-increasing numbers of devices, and consuming more and more applications from external cloud platforms. Passwords are:

  • Easily forgotten and easy to guess.
  • Used across multiple devices and locations resulting in an expanded attack surface.
  • A significant expense and drain on IT resources.
  • Difficult to enter on mobile devices.
Topics: Enterprise Mobility Cybersecurity

ESG360 Video: Who Owns Identity and Access Management (IAM)?

Mobility and cybersecurity. While those two areas may have very different roles inside an IT organization and business, they both play integral parts in identity and access management. Given that, I’m always getting asked, “Who owns IAM?”

Topics: Identity and Access Management Cybersecurity Enterprise Mobility