Most Recent Blogs

Looking forward to VMworld 2016

Posted: August 26, 2016   /   By: Dan Conde   /   Tags: cloud, networking

vmworld 2016 previewI will be visiting VMworld in Las Vegas next week, along with many other ESG staff. Here are my thoughts on what we may see and what matters:

VMworld 2016 in Las Vegas promises to be an event where we see VMware make proclamations of how it continues to evolve in a changing world. When we get to see previews of technologies that may be productized, we await the following year to see whether those ideas have turned into products or remain in the research stage.

This year, we look forward to seeing how far the concept of NSX Everywhere has progressed, and what new technologies are coming out of the Cloud Native team, such as follow-ons to vSphere Integrated Containers and the Photon Platform.

Read More

The most important ingredient in tech marketing

Posted: August 26, 2016   /   By: Adam Sell   /   Tags: marketing wars, inbound marketing

tech marketing tipsMarketers in 2016 are absolutely required to have several arrows in their quiver. It's not enough to just blog actively, to just send emails to your customers and prospects, to just blanket search engines with PPC ads. No one tool in isolation is going to get the job done, you've got to pull on each of the levers available to you in various amounts until you find that magical recipe. And even then, you've got to keep tweaking, cause what works on Tuesday may be obsolete by Wednesday.

Read More

Pay-as-you-go enterprise networking

Posted: August 25, 2016   /   By: Dan Conde   /   Tags: networking

networking cloudCompanies now have alternatives to big capital outlays for networking equipment.

Most enterprises treat networking equipment as a capital expense. They purchase it, along with some maintenance and support, and depreciate it over several years until it’s time for an upgrade. The majority of the expenses in the first year are capital expenses and the rest are OpEx for support. There are some methods for leasing equipment that enables payments spread out time, but traditionally, enterprise networking equipment has been purchased like cars, through up-front payments.

Today, networking (along with the rest of IT) is transitioning to a consumption-based model like cloud computing or SaaS. Thus, there are some changes under way to alter the traditional methods of purchasing networking equipment. One is a standardization of leasing arrangements, and the other one is turning network solutions into a service via the cloud.

Read More

F5 Agility conference: somebody familiar, some things are new

Posted: August 24, 2016   /   By: Dan Conde   /   Tags: networking, F5

Chicago.jpgVisiting the F5 Agility conference in Chicago recently showed me that the company is adapting to major changes in the industry and evolving its product line to keep up with the changes.

There was an interesting combination of the familiar and new.

Read More

The pressing need for network security operations automation

Posted: August 23, 2016   /   By: Jon Oltsik   /   Tags: Network Security, cybersecurity, network security operations

network security automationAccording to ESG research, 63% of networking and cybersecurity professionals working at enterprise organizations (i.e. more than 1,000 employees) believe that network security operations is more difficult today than it was two years ago.

Why?

Because enterprises have to deal with more connected devices, network traffic, and applications than two years ago. What’s more 47% of respondents claim that it is difficult to monitor network behavior from end-to-end while 41% claim that network security operations difficulties result from increasing use of cloud computing.

Read More

Contemplating the internet's impact on society

Posted: August 18, 2016   /   By: Dan Conde   /   Tags: networking

internet movie

A new film examines society's reliance on the internet and the good and bad effects of global connectivity. You don't expect to find movie reviews on Network Computing, but a film produced by a networking company that examines the effect of the internet on society is an unusual event.

Lo and Behold: Reveries of a Connected World by German filmmaker Werner Herzog, released in selected theaters and available for streaming Friday, provides a unique, thought-provoking view of technology.

 

Read More

More on operationalizing threat intelligence

Posted: August 17, 2016   /   By: Jon Oltsik   /   Tags: cybersecurity, threat intelligence, security analytics

threat intelligenceComing out of Black Hat a few weeks ago, it’s pretty frightening what’s going on with cyber-threats.  Overall malware volume is down but the number of variants has gone up precipitously. In fact, according to the Webroot threat report, about 97% of all malware variants are seen only one time. In other words, they are designed to target and attack specific organizations.

Read More

Why you still need backup … and beyond

Posted: August 12, 2016   /   By: Jason Buffington   /   Tags: Backup, data protection, CommVault

The foundation of any data protection, preservation, and availability strategy is grounded in “backup,” period. Yes, a majority of organizations supplement backups with snapshots, or replicas, or archives, as shown in what ESG refers to as the Data Protection Spectrum:

Spectrum-DP-2016.png

Read More

CISO portfolio management

Posted: August 11, 2016   /   By: Jon Oltsik   /   Tags: Network Security, cybersecurity, endpoint security, CISO

Cybersecurity_portfolio.jpgEnterprise CISOs are in an unenviable position. Given today’s dangerous threat landscape and rapidly evolving IT initiatives, CISOs have a long list of tasks necessary for protecting sensitive data and IT assets. At the same time, however, most organizations are operating with a shortage of skilled cybersecurity professionals. According to ESG research, 46% of organizations claim that they have a “problematic shortage” of cybersecurity skills in 2016.

Read More

Six for 16: Black Hat 2016 takeaways

Posted: August 08, 2016   /   By: Doug Cahill   /   Tags: black hat 2016

black hat 2016 recapWith the largest Black Hat to date now in the rear view mirror, it’s clear there is edginess not only in the hacker community, but also in hot cybersecurity market segments where vendors are competing for thought leadership as well as wallet share.

SuperZoo 2016, a pet retailer show, provided a bizarre, but fitting backdrop including those of the furry, four-legged variety co-mingling with the cybersecurity industry. I had the opportunity to speak with CISOs, vendors, threat researchers, and catch up with friends. After navigating the up and down escalators of Mandalay Bay, I left with these takeaways:

Read More

Posts by Topic

see all