Insight

  • Thoughts on IBM Think and Cybersecurity

    GettyImages-641199986I just got back from attending IBM Think in San Francisco. Though it was a quick trip across the country, I was inundated with IBM’s vision, covering topics from A (i.e., artificial intelligence) to Z (i.e., System Z) and everything in between. 

    Despite the wide-ranging discussion, IBM’s main focus was on three areas: 1) Hybrid cloud, 2) Advanced analytics, and 3) Security. For example, IBM’s hybrid cloud discussion centered on digital transformation and leaned heavily on its Red Hat acquisition, while advanced analytics included artificial intelligence, cognitive computing (Watson), neural networks, etc. To demonstrate its capabilities in these areas, IBM paraded out customers like Geico, Hyundai Credit Corporation, and Santander Bank, who are betting on IBM for game-changing digital transformation projects. (more…)

  • GettyImages-878980416Today, Lenovo announced Lenovo TruScale, a new IT subscription service with a wealth of benefits for businesses seeking to offload the complexity of IT, thereby freeing resources to focus on higher-value activities. In other words, Lenovo takes care of the day-to-day minutia, and IT can free up the resources to focus on maximizing the value of their data and competing in the newly proclaimed digital economy.

    (more…)

  • GettyImages-641199918A few years ago, cybersecurity professionals often lamented that executives didn’t want good security, they wanted “good enough” security. This axiom reflected that many CEOs equated cybersecurity with regulatory compliance. If the CISO could check all the right PCI, HIPAA, or SOX boxes, cybersecurity concerns were taken care of.

    The “good enough” security attitude was an aversion for the cybersecurity crowd. CISOs who wanted to adequately protect corporate assets longed for a time when business executives would truly appreciate cyber risk and would be willing to participate and fund cyber risk management efforts adequately. (more…)

  • Security Point Tools Problems

    At most enterprise organizations, cybersecurity infrastructure grew organically over time. The security team implemented each security control in response to a particular threat, such as if antivirus software appeared on desktops, gateways were added to the network, sandboxes were deployed to detect malicious files, etc. 

    As the security infrastructure grew over the past 10 or 15 years, most enterprises didn’t really have a security technology architecture or strategy at all. And this lack of a cohesive security technology strategy has transcended into real problems. A recent ESG research survey illustrates some of the challenges associated with managing an assortment of security products from different vendors, including the following:

    • 27% of survey respondents (i.e., cybersecurity professionals) say that their security products generate high volumes of security alerts, making it difficult to prioritize and investigate security incidents. Thus, more security tools = more alerts = more work = more problems.
    • 27% of survey respondents say that each security technology demands its own management and operations, straining my organization’s resources. Other ESG research indicates that 51% of organizations have a problematic shortage of cybersecurity staff and skills, so there simply aren’t enough people for the necessary care and feeding of all these security tools.
    • 24% of survey respondents say that their organization needs different solutions for different infrastructure environments that are managed by separate teams, creating operational inefficiencies. In other words, they have security tools for data centers, endpoints, virtual servers, public cloud workloads, etc. Coordinating policy and control across these areas is no walk in the park.
    • 22% of survey respondents say the number of security technologies used at their organization makes security operations complex and time consuming. No surprise here.
    • 20% of survey respondents say that purchasing from a multitude of security vendors adds cost and purchasing complexity to the organization. So, just like security operations, purchasing efficiency and pricing is impacted by the number of security tools used.

    Too many security tools and not enough time to use them correctly is not a new problem, but I would say that the ramifications of this situation are growing increasingly worse all the time. This explains why CISOs are looking to consolidate and integrate their security infrastructure with platforms and architectures. 

    In the past, the security industry had a high population of best-of-breed point tools vendors, but the overall market is undergoing a profound change. The future of the security industry will be dominated by a few big vendors selling enterprise-class integrated solutions. 

    Unparalleled insights from analysts with an “insider” perspective

    From strategy and product development to competitive insights and content creation, we deliver high-quality, actionable support services.

  • Trends in Cloud Data Security

    ESG conducted a comprehensive online survey of IT and cybersecurity professionals from private- and public-sector midmarket (i.e., 100 to 999 employees) and enterprise (i.e., 1,000+ employees) organizations in North America (United States and Canada) between August 16, 2018 and September 6, 2018. To qualify for this survey, respondents were required to be IT/information security/risk management professionals responsible for evaluating and purchasing cloud security technology products and services.

    (more…)

  • The world of data protection is changing rapidly. After many years witnessing these changes as a vendor, and now as an analyst, I have developed a maturity model: the backup data transformation model. This model will help both end-users and vendors evaluate their current position and their journey from data backup to autonomous data intelligence and whether they can cross the data management chasm. Did I get your attention? Please read on.

    (more…)

  • GettyImages-906499112At the end of each year, ESG conducts a wide-ranging global survey of IT professionals, asking them about challenges, purchasing plans, strategies, etc.  As part of this survey, respondents were asked to identify areas where their organization has a problematic shortage of skills.

    In 2018-2019, cybersecurity skills topped the list – 53% of survey respondents reported a problematic shortage of cybersecurity skills at their organization.  IT architecture/planning skills came in second at 38%. (more…)

  • Data Protection Conversation with HYCU (Video)

    In our most recent edition of Data Protection Conversations, I spoke with Simon Taylor, CEO of HYCU. HYCU has a very unique profile with many years of expertise in backup and recovery and a unique strategy to address some of the newest challenges in modern data protection and multi-cloud workloads. Don’t miss this edition and stay tuned for our next Data Protection Conversation.

    (more…)

  • Leone_AI_Predictions2018 was a breakout year for AI and machine learning. Practically every vendor has or is working on an AI story, and businesses are looking for the easiest ways to embrace and benefit from the technology as soon as possible to maintain their competitive edge. There have been some amazing and eye-opening stories throughout the year that hint at the future: Google Duplex and an AI assistant making appointments at local businesses over the phone, NVIDIA AI creating faces of fake humans, AI beating doctors in diagnosing cancer, and facial recognition at concerts to catch stalkers. The good news is that we are nowhere near Skynet, and we won’t be there for quite some time, if ever. But the line between hype and reality is starting to blur and 2019 will be a year of applicability, shifting from hype to real-world usage.

    (more…)

  • Leone_CI_HCI_PredictionsThe hyperconverged market continued its meteoric rise and exploded in 2018. Virtually every vendor saw growth in their product offerings. The technology is being embraced across all verticals and use cases, and for customers, its yielding real business benefits. With the expectation that market adoption will continue to rise in 2019, here are a few things I’m expecting to impact the HCI market.

    (more…)

  • data-analyticsIt’s that time of year again. As we enter 2019, let’s take a moment to slow down, look ahead, and predict some of the IT- and data storage-related trends that will emerge the next 12 months.

    (more…)

  • The IT pendulum is swinging to distributed computing environments, network perimeters are dissolving, and compute is being distributed across various parts of organizations’ infrastructure—including, at times, their extended ecosystem. As a result, organizations need to ensure the appropriate levels of visibility and security at these remote locations, without dramatically increasing staff or tools. They need to invest in solutions that can scale to provide increased coverage and visibility, but that also ensure efficient use of resources. By implementing a common distributed data services layer as part of a comprehensive security operations and analytics platform architecture (SOAPA) and network operations architecture, organizations can reduce costs, mitigate risks, and improve operational efficiency.

    (more…)