Mark Bowker

Mark Bowker

Senior Analyst Mark Bowker focuses on all things related to virtualization and cloud computing. Mark researches cloud and virtualization technologies and evaluates the impact the solutions have (or will have) on IT strategy and the broader marketplace. His other research areas include data center management, application workload deployment in next-generation data centers, and the external influences driving adoption of data center technologies.

Recent Posts by Mark Bowker:

ESG Brief: Okta and VMware: Extending a Secure, Productive Workspace

Abstract:

Being able to work anywhere, anytime, on any device continues to help boost employee productivity and satisfaction, though it still presents assorted challenges for the IT organization when securing the enterprise. However, relief to this problem may be in sight: Okta, a provider of identity management software delivered as a cloud service, and VMware, an innovator in digital workspace delivery and management, recently announced their partnership, bringing together the benefits of VMware’s Workspace ONE with Okta’s Identity Cloud.

Topics: Cybersecurity Enterprise Mobility Cloud Platforms & Services

ESG Brief: Microsoft Azure Advanced Threat Protection: Attack Protection for Cloud, On-premises, and Hybrid Environments

Abstract:

Security continues to be a key focus of organizations across industries. Traditional security practices employing multiple security and management tools are expanding the attack surface—making it more difficult for IT to effectively set and manage security policies. Many businesses are still not adequately protected from the proliferation of bad actors, but are uncertain about how to address this increasingly urgent situation. Microsoft’s new cloud-based Azure Advanced Threat Protection solution may be a welcome addition to the vendor’s Enterprise Mobility + Security E5. By leveraging machine learning algorithms and behavior analytics, this solution can protect organizations against security threats lurking across networks.

Topics: Enterprise Mobility Cloud Platforms & Services Cybersecurity

ESG Brief: Microsoft Cloud App Security: Detect, Control, and Enhance Threat Protection

Abstract:

ESG’s 2018 IT spending intentions research indicates that 63% of organizations will increase cybersecurity spending in 2018,1 and it’s safe to assume that data security concerns at least helped to influence these more bullish general security investment positions. Companies that do not want to fall victim to potentially disastrous situations are prioritizing investments in solutions such as Microsoft Cloud App Security. Microsoft shops are likely to find Cloud App Security a welcome enhancement to their environments.

Topics: Cloud Platforms & Services Cybersecurity Enterprise Mobility

ESG Brief: Multi-factor Authentication Trends

Abstract:

While the consensus remains that username and password authentication is an adequate security control in at least some cases, the majority of organizations currently use multi-factor authentication (MFA) technology. Despite the obvious benefits of using MFA, organizations tend to leverage this technology on a more selective basis. What will it take for multi-factor authentication to become the ubiquitous de facto access control strategy for organizations, or will MFA continue to coexist with username and password approaches for the foreseeable future?

Topics: Enterprise Mobility

ESG Brief: Shifting IAM Responsibilities to the Information Security Group

Abstract:

While mobile devices and cloud applications have provided organizations with numerous benefits including increased employee productivity, they have also created new challenges, many of which have security implications created from an expanded security perimeter. This includes the need to update traditional approaches to identity and access management (IAM) in an increasingly mobile and cloudy world, from tools deployed through policies written to the involvement of security groups in these activities. Organizationally, aligning IAM strategies with the information security group is a best practice businesses should adopt to take control of how fractured IAM has become.

Topics: Enterprise Mobility Cloud Platforms & Services Cybersecurity Identity and Access Management

ESG Brief: Top Five Identity and Access Management Challenges and Opportunities

Abstract:

Identity and access management (IAM) is as old as the Internet, but mobility initiatives and cloud applications are putting stress on companies’ security perimeters, especially when it comes to IAM policies and approaches. Challenges to IAM still exist—though one may have thought they’d been addressed years ago. Today, companies are reacting with IAM organizational, technology, and process initiatives to help win back a certain measure of control, and ideally enhance the company’s security posture.

Topics: Cloud Platforms & Services Cybersecurity Enterprise Mobility

ESG Brief: 2018 Enterprise Mobility Spending Trends

Abstract:

Nearly half of midmarket and enterprise organizations plan to increase their 2018 spending on the software, services, and devices required to make their workforce more mobile. While a key benefit of these efforts is untethering employees from desks and offices, they also serve to expand the security perimeter IT staffs must heed. As such, mobility initiatives increasingly include a heightened focus on security and management.

Topics: Enterprise Mobility IT Spending Intentions

ESG Brief: Impact of Cloud-first IT on Enterprise Mobility

Abstract:

A cloud-first approach can have economic and operational benefits for businesses, but the policy also comes with responsibilities to protect applications and users. The challenge for IT is to get in front of this cloud-first trend with identity and access management strategies, security processes, and monitoring investments that will embrace cloud consumption models with confidence.

Topics: Cloud Platforms & Services Enterprise Mobility

ESG Brief: Is Microsoft Losing Its Corporate Browser Edge?

Abstract:

The web browser is perhaps one of the most used but often overlooked applications inside the business. Through the browser, employees access applications, view data, and collaborate, while IT has to secure the environment and ensure an optimal experience. Thus, as ESG researched web browser usage, it was compelling to discover indicators that could put Microsoft at risk and propel Google into the enterprise.

Topics: Enterprise Mobility

ESG Brief: The Challenge of Delivering Secure Workspaces

Abstract:

The central role of the endpoint in cybersecurity attack chains and the spate of ransomware attacks has created a strategic imperative to secure these devices and the users who operate them. Knowledge worker mobility and bring-your-own-device (BYOD) policies have further complicated endpoint security with virtual workspaces being employed as a location- and device-agnostic secure desktop environment. But in the push and pull of knowledge worker experience and securing their access to and use of corporate assets, which wins out?

Topics: Cybersecurity Enterprise Mobility