Cybersecurity & Networking

  • GettyImages-1205638055Wi-Fi 6E

    Wi-Fi 6E is the latest advancement in Wi-Fi technology, and last year the FCC opened up the 6 GHz band for unlicensed use in the US. What makes this so significant is that the amount of usable Wi-Fi will more than double (due to the amount of RF spectrum available for Wi-Fi).

    With Wi-Fi 6E, we should expect to experience less network congestion due to wider channels and faster data rates that can support high-bandwidth applications and use cases—providing a realistic means to help speed innovation.

    (more…)

  • Cisco held its Future Cloud event today to launch a suite of solutions to enable hybrid cloud environments. This was an important launch for Cisco, as it marks a departure from individual product announcements and delivers a more comprehensive solution that leverages the breadth and depth of the Cisco portfolio to connect, secure, and automate cloud migrations.

    (more…)

  • Extreme Connects with Its Customers in 2021

    GettyImages-1252890301Last week, Extreme Networks held its annual customer event, Connect, virtually from Boston’s historic Fenway Park. The highlights from the event include new product introductions, a collection of customer and partner relationships, a celebration of 25 years in business, and insights into Extreme Networks’ vision moving forward.

    (more…)

  • GettyImages-470542178I’ve been blogging about what the “big 3” topics at this year’s (virtual) RSA conference should be. I started with a blog about XDR, followed by another about zero trust. My final blog of this series looks at what CISOs want to hear about SASE at RSA.

    Why SASE? Because: (more…)

  • The breadth of zero trust inherently requires a variety of teams to collaborate effectively for implementations to be successful. Given this, it is unsurprising that organizational issues are the most common reason cited for projects being paused or abandoned. Effective communications channels, clarity of roles and responsibilities, and alignment of goals and success metrics are all important aspects of a zero trust strategy.

    (more…)

  • The State of Zero Trust Security Strategies

    This Master Survey Results presentation focuses on understanding the factors influencing zero trust initiatives, how decision makers are prioritizing purchasing decisions, and which specific technologies and products are being deployed to support zero trust strategies.

    ESG conducted a comprehensive online survey of IT and cybersecurity professionals from private- and public-sector organizations in North America (United States and Canada) between December 8, 2020 and December 22, 2020. To qualify for this survey, respondents were required to be cybersecurity or IT/information security professionals responsible for evaluating, purchasing, and managing security technology products and services in support of zero trust security initiatives.

    (more…)

  • GettyImages-864655374Effectively addressing national emergencies and times of crisis has always required private and public sector collaboration. The most recent and obvious example being the development and delivery of COVID-19 vaccines. And like COVID-19, ransomware attacks cross borders, necessitating a coordinated national and international response by government agencies and technology leaders.

    (more…)

  • The Maturation of Cloud-native Security

    The composition of cloud-native applications is a mix of APIs, containers, VMs, and serverless functions continuously integrated and delivered. Securing these applications, the underlying infrastructure, and the automation platforms that orchestrate their deployment necessitates revisiting threat models, gaining organizational alignment, and leveraging purposeful controls. Additionally, as security and DevOps continue to converge, cloud security controls are being consolidated. Project teams are evolving from a siloed approach to a unified strategy to securing cloud-native applications and platforms. In parallel, vendors are consolidating cloud security posture management (CSPM), cloud workload protection (CWP), container security, and more into integrated cloud security suites, impacting buyer personas and vendor sales motions.

    In order to gain insight into these trends, ESG surveyed 383 IT and cybersecurity professionals at organizations in North America (US and Canada) personally responsible for evaluating or purchasing cloud security technology products and services.

    (more…)

  • Re-emphasizing Data Security as Part of a Zero Trust Approach

    Zero trust remains a broad initiative with a wide array of use cases, supporting technologies, and starting points. While it may seem that focus has shifted away from data security in recent years, many organizations consider it a critical component of their zero trust strategy. To address zero trust requirements, data classification and security solutions must support deployment flexibility, risk assessment, automation, and integrations with other solutions.

    (more…)

  • GettyImages-1276687348April showers bring May flowers, and this year’s RSA Conference. Usually there’s one topic at RSA that everyone is talking about but this year there will likely be 3: secure access service edge (SASE), eXtended detection and response (XDR), and zero trust. In my last blog, I described 8 things security executives want to hear about XDR. This one focuses on zero trust.

    (more…)

  • The State of Zero-trust Security Strategies

    Zero-trust approaches are arguably more relevant than ever due to the increasingly distributed nature of the modern enterprise, which has only been accelerated by the shift to work-from-home models. Yet for many organizations, confusion remains as to exactly what a zero-trust initiative should entail, where to begin, and how best to overcome the organizational obstacles that result from such a cross-functional undertaking.


    For more information or to discuss these findings with an analyst, please contact us.
  • ESG recently completed its annual technology spending intentions survey of 664 senior IT decision makers at midmarket (i.e., 100 to 999 employees) and enterprise (i.e., 1,000 or more employees) organizations across North America and Western Europe. As part of that research, respondents with purchasing influence or authority for networking products and services were asked about their organization’s networking spending plans over the next 12 months, and the results were published in the ESG brief, Network Spending Trends for 2021 (only available to ESG clients).

    (more…)