Where Endpoint Management and Security Meet

Upgrade existing tools or net new platform investments? This is the question IT operations and information security teams are wrestling with as they attempt to secure an expanding perimeter driven by cloud, mobile, and IoT. Should companies maintain a traditional siloed tool approach or embrace a modern management approach that unifies management and security policies across users, devices, applications, networks, and data? The ultimate goal is to deliver a secure workspace by authenticating users across devices and enforcing policies based on location, device type, application, data, and the security posture of the end-user. This seems simple enough, but given the stress mobility, cloud, and IoT are putting on IT and security pros and the market dynamics ESG is observing with endpoint management and security vendors, business are finding themselves in a quandary. The one constant for businesses is change as more devices, applications, and innovative ideas continue to pour in, but these leave IT operations and security teams with the challenge of answering: To read the complete article, CLICK...

Read More

Artificial Intelligence and Machine Learning…

The traction over the last few years in the artificial intelligence (AI) and machine learning (ML) space is remarkable, and I’m not just talking about consumer-based products like self-driving cars, or virtual assistants like Google Assistant, Alexa, or Siri. While those products get the headlines, AI/ML is rapidly spreading across the enterprise IT space. I feel like I can’t go a day without a company mentioning AI or ML as part of their product or forward-looking strategy. It’s not just for crazy, sci-fi predictive analytics projects in a bunker somewhere. While that definitely still happens, AI and ML (and deep learning too) are being used across all aspects of IT: big data, cloud, IoT, security, infrastructure, systems management, etc.While AI/ML is a top priority for businesses that expect it to have a significant (positive) business impact as they continue to digitally transform, investments remain modest because of its sheer impact on all aspects of the infrastructure. Challenges associated with infrastructure cost, lack of in-house expertise, and insufficient data quality are just the start. To read the complete article, CLICK...

Read More

Dell EMC OEM – A Pragmatic Strategy for IoT

Vendors explore market opportunities in widely diverse ways, ranging from the “bet early and seriously” approach Amazon took in crafting, subsidizing and launching its Web Services platform to the “start late, run fast and typically fall on your face” efforts of HPE and others whose attempts to catch up to AWS in public cloud failed miserably. But a strategy often overlooked by vendors as preeningly self-obsessed as Birds of Paradise is to 1) avoid public displays of braggadocio, 2) pragmatically choose opportunities according to their potential commercial returns, and 3) organically develop and expand efforts as those markets evolve. Dell EMC isn’t the only vendor offering a variety of original equipment manufacturing (OEM) services and solutions. However, the steady gains that the company’s OEM group has enjoyed, particularly in the past half-decade, are worthy of respect. So, too, is how those efforts resulted both in Dell EMC profiting today and being well positioned to new evolving markets, like Internet of Things (IoT) solutions. A recent analyst briefing led by SVP Joyce Mullen, who leads Dell EMC’s OEM/IoT group, along with its Channel organization, provided insights into the company’s strategy, customers and solutions, including its new PowerEdge XR2 rugged servers. To read the complete article, CLICK HERE NOTE: This column was originally published in the Pund-IT...

Read More

Enterprises Must Address Internet of Identities Challenges

As November ends, everyone and their brother/sister will be writing about their IT and security predictions for 2018. Here’s a no-brainer from me: We’ll see massive proliferation of IoT devices on the network next year. Some of these will be general purpose like IP cameras, smart thermostats, smart electric meters, etc., but many others will be industry-specific sensors, actuators, and data collectors. Managing the deployment, operations, and security of all these devices will be quite challenging. Someone must figure out network access controls, connectivity, segmentation, baseline behavior, network performance implications, etc. This is where identity comes into play. Each device should have its own identity and attributes that govern connectivity, policy, and trust. My sagacious colleague, Mark Bowker, calls this trend the Internet of Identities (IoI). With Mark’s help, I introduced the concept of IoI in this blog, and further elaborated on the massive changes the Internet of Identities will bring in this one. So, IoI is coming fast, but ESG research indicates that many organizations are not prepared for the onslaught because: To read the complete article, CLICK...

Read More

Arm TechCon 2017… Securing and Enabling IoT

In technology, as well as most every other sector, marketing relies on compartmentalization—crafting messages that make large subjects easily consumable and complex ideas modest in scope. But that practice tends to enforce the notion that those subjects and ideas somehow stand alone and are discretely independent from one another. Nothing could be further from the truth. In fact, rather than existing in a vacuum, successful technologies are interdependent and gain value from playing off the strengths of other products and services. Evolving emerging technologies, like the Internet of Things (IoT), offers insights into how this works and last week’s Arm TechCon 2017 conference in Santa Clara, CA firmly underscored the process in action. To read the complete article, CLICK HERE NOTE: This column was originally published in the Pund-IT...

Read More