Insight

  • Revving Up the V12 for Full Acceleration

    I am at VeeamON 2022 in Las Vegas this week attending the event in person. I had the great opportunity to spend time with a few key executives from Veeam and discuss their latest release and plans for the future.

    (more…)

  • Environmental sustainability, already a priority of executives in many organizations, has infiltrated IT purchasing to such a degree that it has become the most important buying consideration for endpoint devices. In response, IT leaders are learning to become sustainability advocates, which in turn is driving changes in how vendors position and prioritize features of their devices.

    (more…)

  • Distributed Cloud Series: Cloud-native Applications

    ESG conducted a comprehensive online survey of IT professionals from private- and public-sector organizations in North America (United States and Canada) between December 6, 2021 and December 17, 2021. To qualify for this survey, respondents were required to be IT, DevOps, and application development professionals responsible for evaluating, purchasing, managing, and building application infrastructure.

    This Complete Survey Results presentation focuses on cloud-native application trends, including bridging the gap between container development, Kubernetes, and IT operations through CI/CD pipelines, as well as building, maintaining, and operating a developer-ready infrastructure without impacting developer velocity.

    (more…)

  • My colleague Rob Stretchay completed research on the challenges organizations face as their applications become more distributed across clouds. In this video, we discuss some of his findings, including how developers are spending their time – including their time remediating security issues. This is interesting to me because we’ve been talking about developer workflows and whether developers can take on some security processes. Developers want to focus on building software, but they care about quality, reliability, and they don’t want to waste time doing rework. Check out the video to hear us discuss the opportunity for security solutions to help.

    Watch the video below, and be sure to check out the new research: Distributed Cloud Series: Observability Trends

  • Distributed Cloud Series: Observability Trends

    ESG conducted a comprehensive online survey of IT professionals from private- and public-sector organizations in North America (United States and Canada) between November 15, 2021 and November 20, 2021. To qualify for this survey, respondents were required to be IT, DevOps, and application development professionals responsible for evaluating, purchasing, managing, and building application infrastructure.

    This Complete Survey Results presentation focuses on building modern application architectures and establishing the related processes, including the expected role of ITSM in enabling businesses to realize the benefits of automation, observability, intelligence, and optimization.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to access this report, please complete and submit this form for assistance.

  • Women in Cybersecurity: Sharon Goldberg

    This week I’m pleased to share my interview with Sharon Goldberg, the cofounder and CEO of BastionZero. She is also a computer science professor at Boston University. Check out our video below.

    After graduating with a degree in electrical engineering from the University of Toronto, Sharon started her career as a telecom engineer at a power company building communications systems for its different power stations. After a few months, she was bored so she applied and got accepted to grad school at Princeton University, where she joined a team using lasers to encrypt communications. She took a course in cryptography and got hooked, moving more into computer science and internet security, earning her PhD in applied cryptography and network security.

    At the end of her PhD, she says she took the typical route of becoming a professor. Once she had tenure, she had more freedom to work on what she wanted, and realized she wanted to build something that people could use, instead of just doing the research and publishing a paper, and moving on to other research.

    So she started BastionZero to help organizations better manage remote access. It’s built around the concept of cryptography, and it was something she worked on along with her cofounder, Ethan Heilman, for the past decade. 

    “There’s an opportunity to change the way the market actually does remote access…to not have a single route of trust that controls the access but to have multiple routes of trust that control the access…So if there is a compromise, the security of your system doesn’t fall apart.”

    While leading her company, Sharon continues to teach cybersecurity. “When you teach, you can’t just stand there and teach stale stuff. When you teach, you teach on a broad set of topics…When you talk to students and see how they are absorbing the material, it’s an incredible privilege.”

    She says she’s seen progress with women in tech and cybersecurity. She recalls how when she started out, in the early 2000s, women in tech had to prove themselves and were often underestimated. “You always sort of assumed that no one was going to take you seriously and you were just going to show them…a lot of women who got through that era had that kind of attitude. I’ll just show you, you’re underestimating me. Then you go off and do something really hard…I think women who are starting out now are more surprised when they aren’t taken seriously, which is progress.”

    Her advice: if someone underestimates you, don’t take it seriously, it’s their problem. Build a strong network and support system; find people who you click with and who understand your problem area to help you deal with any issues with fear or inadequacy when you start something new. 

    She also says things happen fast in this industry. She uses social media as a tool to connect with people and learn from how much information is shared in the cybersecurity community.

    Check out Sharon’s company BastionZero to learn more. If you’re heading to RSA in a few weeks, you can root for her in the Innovation Sandbox competition where BastionZero is a finalist! You can also follow her on twitter.

    Please visit Enterprise Strategy Group’s Women in Cybersecurity page, where you can also find a link to the full audio interview with Sharon, view past episodes, and join us to hear more inspiring stories in future shows.

  • Cloud-native Applications

    Today’s businesses are evolving rapidly to meet the demands of their customers, but traditional and heritage applications often do not meet the requirements. IT organizations are trying to keep their businesses running while migrating to new, modern approaches to advance the business into the future. Many organizations are taking a “cloud-first” approach to their digital transformation initiatives, which requires building, maintaining, and operating a developer-ready infrastructure without impacting developer velocity.

    To understand cloud-native application trends, including bridging the gap between container development, Kubernetes, and IT operations through CI/CD pipelines, ESG surveyed 387 IT professionals at organizations in North America (US and Canada) responsible for evaluating, purchasing, managing, and building application infrastructure.

    (more…)

  • Women in Cybersecurity: Caroline Wong

    This week’s featured guest in our Women in Cybersecurity video series is Caroline Wong. Caroline is a book author who is active in the security community, sharing her experiences and learnings from her cybersecurity leadership roles at companies such as eBay and Zynga. She is the Chief Strategy Officer at Cobalt, a company that gives clients access to pen testers through their Pen Testing as a Service (PtaaS) platform. In her interview with ESG Sr. Analyst Melinda Marks, Caroline shares her experiences in her career in cybersecurity, as well as her advice around team culture and diversity in the workplace.

    Throughout her career journey, which started with an internship in IT project management for the security engineering team at eBay, Caroline explored roles across different business functions, such as engineering, product management, and management consulting, giving her a broad perspective. In her current role as Chief Strategy Officer at Cobalt, she oversees the security, IT, HR, and talent acquisition teams and plans for the future of the company.

    Caroline approaches work with a “get things done” mentality and an eagerness to work with people who she likes and respects and who like and respect her. “The thing about security is that it is a team effort…the only way to get actually good security is to involve a lot of people,” says Caroline. She believes that building diverse teams will bring us closer to solving the challenges we face today in security.

    In this interview, Caroline also talks about overcoming toxic work environments, work-life and family balance, resilience, and trusting our future selves to overcome these challenges. She believes, “When folks are valued and accepted, they’re going to do better work. I think that’s a natural outcome.” She enjoys working in a team in which she can bring her whole self to the table and be valued for it.

    Caroline shares her expertise with others through LinkedIn Learning courses, a feature on CBS, as well as her books: one on security metrics that she dedicated to her original mentor at eBay and one on PtaaS. She notes, “It’s a passion area for me to take concepts that historically have been explained in complicated ways and just try to make them accessible.”

    You can find her resources here:

    The PtaaS Book

    LinkedIn Learning

    Please visit Enterprise Strategy Group’s Women in Cybersecurity page, where you can also find a link to the full audio interview with Caroline, view past episodes, and join us to hear more inspiring stories in future shows!

  • The Impact of the Cloud on DLP

    digital_shieldCloud adoption is ubiquitous, and many organizations have adopted a cloud-first deployment policy. However, organizations continue to use on-premises infrastructure. Thus, the new normal IT infrastructure is hybrid multi-cloud. In such an environment, the perimeter becomes amorphous and dynamic, changing rapidly as organizations spin up new applications.

    Unfortunately, one-third of respondents to “The State of Data Privacy and Compliance” research survey said they have lost cloud-resident data. More concerning is that an additional 28% of organizations suspect they have lost cloud-resident data but don’t know for sure because they lack data observability. Read my blog, Data security requires DLP platform convergence, to learn more.

  • The Demise of EDR?

    As a top investment priority for security organizations, detection and response programs are entering a significant transition as attack surface expansion and threat complexity drive the need for more comprehensive visibility, detection, and response. The extended detection and response (XDR) movement has spawned a plethora of new solution offerings capable of detecting advanced threats by aggregating, correlating, and analyzing telemetry from endpoints, networks, the cloud, and identities together with a new level of more extensive threat intelligence. What impact – if any – do IT and cybersecurity teams anticipate XDR having on their current endpoint detection and response (EDR) solutions?

    (more…)

  • Cloud Analytics Trends

    Discover why IT organizations consider the cloud critical to fueling data-driven success with this Enterprise Strategy Group Infographic, Cloud Analytics Trends.


    For more information or to discuss these findings with an analyst, please contact us.
  • Microsoft Makes Gains in Endpoint Security

    As expanding device diversity, zero trust, and extended detection and response initiatives drive organizations to reassess endpoint security solution investments, security teams are looking to replace existing tools with more capable, converged platforms. Significant advances in Microsoft’s native endpoint security prevention, detection, and response capabilities, together with attractive bundling and pricing options, have propelled a meteoric rise in the popularity of Microsoft Defender for Endpoint over the past two years. While many intend to use Defender as a core component within their endpoint security arsenal, many still plan to supplement, potentially spawning a new opportunity for other security providers to deliver specialized add-on solutions.

    (more…)