Our seasoned analysts couple their industry-leading B2B research with in-depth buyer intent data for unparalleled insights about critical technology markets.
Clients trust us across their GTMs—from strategy and product development to competitive insights and content creation—because we deliver high-quality, actionable support.
Browse our extensive library of research reports, research-based content, and blogs for actionable data and expert analysis of the latest B2B technology trends, market dynamics, and business opportunities.
Our seasoned analysts couple their industry-leading B2B research with in-depth buyer intent data for unparalleled insights about critical technology markets.
Clients trust us across their GTMs—from strategy and product development to competitive insights and content creation—because we deliver high-quality, actionable support.
Browse our extensive library of research reports, research-based content, and blogs for actionable data and expert analysis of the latest B2B technology trends, market dynamics, and business opportunities.
ESG’s Master Survey Results provide the complete output of syndicated research surveys in graphical format. In addition to the data, these documents provide background information on the survey, including respondent profiles at an individual and organizational level. It is important to note that these documents do not contain analysis of the data.
This Master Survey Results presentation focuses on how organizations utilize cloud services as part of their data protection strategy, as well as how organizations protect public cloud-resident applications and workloads.
Google has a vision of offering the most complete and comprehensive data platform in the industry. It wants to provide a true end-to-end data platform across clouds, and the last two words there are key. Customers want an end-to-end multi-cloud data platform and Google is committed to delivering just that. As such, Google continues to invest in areas that enable it to further this goal, and this morning Google announced its intentions to buy Looker for $2.6 billion in an all-cash transaction. It’s a natural acquisition for Google as the companies have worked together for years and share hundreds of the same customers.
Insight Partners announced on May 30, 2019 that it will acquire Recorded Future for $780M. In a broad market of threat intelligence competitors, Recorded Future shines brightly because of its “all-source” approach. ESG fully expects Recorded Future to expand geographically and continue broadening integrations and partnerships. It must also protect its existing relationships as it grows to the next level.
Oracle ultimately had to choose a cloud partner as customer demand for cloud consumption continues to rise. In fact, ESG captured a 10% year over year increase (29% to 39%) of companies that are taking a cloud first policy when it comes to new application deployments. These dynamics cranked up the pressure on the Oracle business as they seemed to try to hold on to legacy on-premises approaches with their customers. And why not….margins are excellent and it is a massive investment for Oracle to build out global data centers. Sure, Oracle has cloud offerings, but they appeared to be more like nice window dressing than what the likes of Microsoft Azure, AWS, and Google GCP are offering (and expanding) in the market.
One question we often hear at conferences and industry events is whether IT organizations can get more value out of the data copies that they already have.
You bet they can. It’s been right there in front of them for a long time. As my colleague Vinny Choinski from the ESG Validation team points out, capacity efficient snapshot technology has been around for decades. It was pioneered in primary storage systems in the late 90s (e.g., EMC, IBM, Hitachi…) and got a capacity savings boost when it was combined with deduplication in data protection appliances (e.g., Data Domain) and purpose-built continuous data protection and data management solutions (e.g., Actifio). IT orgs have primarily been using these solutions for a quick and cost-effective alternative to traditional restores and some have been leveraging them to make copies for test and development. Now, backup solutions with the ability to “instantly” boot virtual machines from a writeable snapshot (e.g., Veeam) and data management solutions (e.g., Cohesity, Rubrik, Datrium) have expanded the value and the potential uses of this powerful technology, but, for most organizations, the value of these powerful technologies is a secret that’s locked up in an organizational silo. This silo is locking the value of data, limiting the return that can be realized by re-using it for additional purposes to serve the organization/business. (more…)
One of the marketing campaigns that resonated the most with me over the last few years is the messaging behind Trend Micro’s XGen campaign because it aptly captures the challenge cybersecurity teams face: the complexity of securing multiple generations of technology. That is, it’s not just about next-gen. It’s also about protecting the last gen, and whatever comes after next-gen.
After all, while we still have mainframes, tape libraries, and Oracle running on UNIX, appdev teams are leveraging public cloud platforms and a rich set of microservices to rapidly build and deliver applications. Such heterogeneity represents a requirement to secure a diverse set of applications stacks deployed across hybrid, multi-clouds. Palo Alto Networks’ stated intention to acquire Twistlock and PureSec, the former for container security, and the latter for serverless security, is a strong move to add cloud-native application security controls to companies’ already extensive product portfolio.
Why Twistlock and PureSec
Twistlock, a pioneer, along with Aqua Security, in container security, initially helped organizations secure their journey to microservices architectures with a focus on identifying and remediating container image vulnerabilities. As organizations moved along the build-ship-run continuum and started to deploy containerized apps to production, Twistlock provided an anomaly-based approach to threat detection. More recently, Twistlock has delivered additional runtime controls including file integrity monitoring and RASP (runtime application self-protection), all new and highly valuable additions to Palo Alto’s set of cloud security products.
With serverless functions being employed in the context of microservices architected applications, Palo Alto Networks needed to move yet further up the stack. PureSec fills this gap with what PureSec describes as a serverless security firewall, one that assesses the runtime behavior of serverless functions including how functions interact with file systems, run shell commands, communicate with external entities, and more. This anomaly-based approach is well aligned with Twistlock’s similar approach to runtime container security, and the serverless firewall positioning is certainly sympatico with Palo Alto Networks’ roots.
So, where does Twistlock and PureSec fit in the PAN portfolio? I’m looking forward to learning more about how the new products will be packaged at Palo Alto’s Ignite event next week, but both seem to fit neatly under the newly announced Prisma cloud security product brand.
After acquiring Evident.IO and Redlock, Palo Alto needed to rationalize those cloud security posture management (CSPM) products with the company’s Aperture cloud access security broker (CASB), GlobalProtect Zero Trust network segmentation product, Traps host-based anti-exploit control, and, of course, the vm-based firewall series. Prisma does that in a clean new packaging model with functional descriptors.
Why is that a big deal? When vendors acquire multiple companies and retain the company and/or product brands, it creates a tremendous amount of confusion for buyers, channel partners, and sellers alike; the lack of descriptive product names too often requires the equivalent of a decoder ring to map brands to functional capabilities. The last thing cybersecurity leaders need is additional complexity, so kudos to Palo Alto for getting crisp on branding and packaging.
The Makings of an Enterprise-class Cybersecurity Platform
We’re all well aware of the acute shortage of cybersecurity skills. Recent research conducted by ESG highlights the issue with 53% of organizations citing a problematic shortage of cybersecurity skills. Two-thirds of the participants in the same study shared that IT has become more complex over the last two years. These realities, along with ever-motivated adversaries, are the drivers behind the trend toward cybersecurity platforms that provide threat detection, prevention, and response across major attack vectors via a centralized, cloud-delivered control plane.
By adding container and serverless security controls to their roster of cybersecurity products and services, Palo Alto Networks is well positioned to meet the cybersecurity platform market requirement. But as is true with any acquisition, it’s all about integration. Beyond integrating the teams and the go-to-market model, it will be critical that the technology be integrated into a clearly packaged set of offerings that ride on a common platform. Prisma provides the packaging framework, now the tech needs a platform of shared services to provide improved operational efficiencies desperately needed to mitigate the ongoing lack of skills and increased complexity.
ESG’s Master Survey Results provide the complete output of syndicated research surveys in graphical format. In addition to the data, these documents provide background information on the survey, including respondent profiles at an individual and organizational level. It is important to note that these documents do not contain analysis of the data.
This Master Survey Results presentation focuses on the current process and technology approaches to hybrid cloud strategies, including striking the right balance of on- and off-premises workloads.
As security teams commit more and more resources to detection and response activities, endpoint detection and response (EDR) solutions are becoming core to the process. But when we take a step back and look at the bigger picture surrounding threat detection and response, we see multiple, disparate solutions being used to detect and investigate threats, requiring analysts to log into multiple systems or post-process data from these systems to correlate alerts. With many organizations utilizing a best-of-breed tools strategy for their security stack, integrations have become core to the sanity of most security teams.
Digital transformation takes many forms. Nearly every company wants to maximize the value of its data, but each has specific goals in mind. When IT vendors discuss transformation, however, their story often sounds the same: “Build from the data center out.”
While that approach is valuable, for a variety of industries, the Internet of Things (IoT) and the edge are the real keys to maximizing an organization’s digital future. IoT can no longer be ignored. According to recent ESG research, 36% of IT organizations indicated that they have IoT initiatives already underway. (more…)
Have you ever thought of what 50 tons of ewaste would look like? Probably not, but that is the amount of ewaste expected to be generated this year. To put it into perspective, I was recently told that much waste would be equivalent to 4500 Eiffel towers, basically enough to cover all of Manhattan. Even more important, ewaste is only 2% of our overall waste, but makes up 70% of our toxic waste.
VeeamON just started in Miami (about 2000 in attendance) with a number of announcements that will get the industry’s attention – not surprisingly, some might add, because it’s Veeam.