Enterprise Strategy Group Archives

Can Oracle’s VCA Wrest Share from VCE?

Larry Ellison and Oracle have EMC’s VCE and Cisco’s UCS square in the crosshairs. The question is, can Ellison’s “highest performance, lowest purchase price” converged infrastructure value proposition be enough to sway IT buyers to adopt Oracle’s Virtualized Computing Appliance (VCA)? To read the complete article, CLICK HERE Share this:MoreEmailPrintShare on...

Read More

Wrapping up RSA… Looking Forward to Interop

I’m wrapping up my visit to the RSA USA 2015 Conference. The conference was as big as ever. There was a feeling of how to protect ourselves from breaches by being realistic: Realize that adversaries will somehow get into your system, so look for multi-layered approaches to protect yourself after a breach occurs and minimize the damage. But there was some hopefulness as well, since we are acknowledging the changes in the security...

Read More

Somber Message at the 2015 RSA Conference

As the 2015 RSA Conference got underway this week, I attended a dinner hosted by Pacific Crest Securities. Our host began the dinner by asking former cyber czar Richard Clarke to say a few words. Now this was a rather festive dinner as the cybersecurity industry is in the midst of a robust boom. Nevertheless, Clarke’s brief talk was a reminder of where we’ve been and the state of cybersecurity today. To read the complete article,...

Read More

Anticipating RSA 2015

The annual security geek-fest known as the RSA Security Conference is just 2 weeks away. Alas, I remember when it was a cozy event that attracted a few thousand visitors and focused on esoteric security technologies like cryptography, deep packet inspection, and malware detection heuristics. As for 2015, I expect at least 25,000 attendees spanning keynote presentations, show floors, pervasive hospitality suites and a constant barrage...

Read More

In Cybersecurity, the Network Doesn’t Lie

In a recent ESG Research Report, enterprise security professionals were asked to identify the primary objectives associated with their organization’s network security strategy. It turns out that 40% of organizations plan to move toward continuous monitoring of all assets on the network while 30% of organizations plan to capture more network traffic for security analytics. To read the complete article, CLICK HERE Share...

Read More