ESG Validation

Jack Poller

Jack Poller

Jack Poller is an analyst covering cybersecurity at Enterprise Strategy Group drawing upon more than 25 years of industry experience across a broad range of storage, networking, and cloud-based products and markets.

Recent Posts by Jack Poller:

ESG Technical Validation: BlackBerry Intelligent Security - Adaptive Security and AI to Protect All Endpoints

Introduction

ESG recently completed testing of BlackBerry Intelligent Security, which is designed to continuously evaluate risk and dynamically apply risk-based security policies to protect endpoints. Testing focused on ease of deployment and management and the simplification of the user experience.

Topics: Cybersecurity Data Platforms, Analytics, & AI Enterprise Mobility

ESG Technical Validation: Efficient Efficacy with Morphisec Unified Threat Prevention Platform

Introduction

This ESG Technical Validation documents evaluation of Morphisec’s moving target defense-powered Unified Threat Prevention Platform. We focused on understanding the operational simplicity of the platform and the efficacy of its threat prevention capabilities.

Topics: Cybersecurity

ESG Technical Validation: Dell EMC Ready Solutions for AI: Deep Learning with Intel

Introduction

This ESG Technical Validation documents evaluation of Dell EMC Ready Solutions for AI: Deep Learning with Intel. We focused on understanding the performance, ease of use, and total cost of ownership (TCO) of the solution. To validate the full stack performance, we measured the number of tokens per second processed when training the Token2Token Big Transformer model and evaluated how Nauta, an open source initiative by Intel, accelerates deep learning model training. We also compared how Nauta simplifies the deep learning training process, and how the TCO of Deep Learning with Intel compares to running the same tasks on a leading public cloud AI service.

Topics: Data Platforms, Analytics, & AI

ESG Technical Validation First Look: Efficient Efficacy with Morphisec Advanced Threat Prevention Platform

Cybersecurity Challenges

The ever-increasing volume and velocity of threats has made cybersecurity one of the top IT concerns. However, IT’s drive to improve the business’ security posture is complicated by the global cybersecurity skills shortage. As a result, organizations evaluating their options for strengthening cybersecurity are seeking more efficient and effective tools. Indeed, according to ESG research, 46% of surveyed IT and cybersecurity decision makers ranked effectiveness as the most important consideration when investing in cybersecurity products or services—by far the most often cited consideration.2

Topics: Cybersecurity

ESG Technical Validation: Hybrid Multi-cloud Artificial Intelligence (AI): IBM Watson Studio and Watson Machine Learning

Co-Author(s): Tony Palmer


Introduction

ESG recently completed testing of IBM Watson Studio and Watson Machine Learning, which are designed to enable organizations to accelerate the value they can extract from AI more easily. Testing examined how IBM Watson Studio and Watson Machine Learning collect data, organize an analytics foundation, and analyze insights at scale—with a focus on the ease of operationalizing AI and data science to improve trust, simplify compliance, and speed monetization.

Topics: Data Platforms, Analytics, & AI

ESG Technical Review: Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform

The Challenges

As organizations of all sizes embrace digital transformation and the shift to modern cloud architectures, their IT infrastructure is both growing and becoming more complex. Indeed, two-thirds (68%) of respondents to an ESG research survey said that their IT environment had become more complex in the last two years.1

Complex infrastructures have large attack surface areas, necessitating a variety of cybersecurity tools and techniques to protect them against ever-increasing volumes and sophistication of attacks. However, cybersecurity teams report numerous challenges managing an assortment of security products from different vendors, such as the inefficiencies created by having separate management and operations for each tool, cited by 27% of ESG research respondents as a challenge, or different tools for various parts of the IT infrastructure (24%), or the number of security tools making operations complex and time consuming (22%)

Topics: Cybersecurity

ESG Technical Validation: Optimize VMware vSAN with Western Digital NVMe SSDs and Supermicro Servers

Introduction

ESG Lab evaluated Western Digital NVMe flash solutions with Supermicro servers for VMware vSAN hyperconverged infrastructure for business-critical applications and databases, with a focus on assessing the performance and value of NVMe-based flash for infrastructure-wide storage virtualization and hyperconverged solutions in the data center.

Topics: Storage Converged Infrastructure

ESG Lab Review: Accelerating Time to Value: Automated SAN and Federated Zoning with HPE 3PAR and Smart SAN for 3PAR

Abstract

This ESG Lab Review documents hands-on testing of HPE 3PAR StoreServ Storage and HPE Smart SAN for 3PAR Software solution to verify its ability to automate and simplify SAN and Federated SAN zoning configuration. We focused on how Smart SAN for 3PAR leverages industry standards based FCIA T11 (Peer Zoning) with target-driven peer zoning (TDPZ), transforming the complex, time-consuming, and error-prone manual zoning process into a 3PAR-orchestrated, simple, rapid, automated, and error free process.

Topics: Storage Networking

ESG Lab Review: High-fidelity Breach Detection with Acalvio Autonomous Deception

Abstract

This ESG Lab Review documents hands-on testing of Acalvio ShadowPlex autonomous deception. We focused on how easy it is to deploy ShadowPlex at scale, and how Acalvio’s deception technology provides high-fidelity low-volume breach detection.

Topics: Cybersecurity

ESG Lab Validation: Forcepoint Cloud Access Security Broker (CASB)

Co-Author(s): Alex Arcilla

Introduction

ESG Lab evaluated the Forcepoint Cloud Access Security Broker (CASB) to validate how it secures the use of any cloud applications across an organization’s users and endpoints. We tested how the Forcepoint CASB provides visibility into an organization’s cloud applications and its users, identifies and assesses the potential risks associated with the cloud applications, and automates threat prevention and policy enforcement.

Topics: Cybersecurity Cloud Services & Orchestration