The Truth Behind the Scope of the Endpoint Problem in the Enterprise


The Evolution of the “Endpoint” Over the past few years, the perception of what an “endpoint” is, and therefore the definition, has changed. The original perception was a user workstation independent of operating system. With the expansion of functionality, data persistence, Internet connectivity, and ultimately the threats against them, that definition no longer applies. Laptops [...]



By | January 12th, 2017|David Monahan, IT Management, Scott Crawford, Security|0 Comments

Enterprise IT Trends in 2017


Customers in 2017 will demand solutions to claim back today’s massive CAPEX and OPEX waste of over 50% of their total IT spend. All our 2017 predictions are directly derived from the rapidly increasing pressure to reclaim these resources and leverage them to achieve direct business advantages in today’s highly competitive and fast moving marketplace. [...]



By | January 12th, 2017|IT Management, Torsten Volk|0 Comments

A Tribute to IoT Device Security Researchers


This blog in the Internet of Things (IoT) series comes as a tribute to security researchers everywhere. The autumn’s largest security-focused show is the Black Hat Security conference. If you are not familiar with Black Hat, it is a tech conference that started in 1997 and covers numerous security topics in various presentations that are fairly [...]



By | January 3rd, 2017|David Monahan, IT Management, Scott Crawford, Security|0 Comments

Enterprise IT Predictions for 2017 – Journey to a Business-Defined Hybrid Cloud


Customers in 2017 will demand solutions to claim back today’s massive CAPEX and OPEX waste of over 50% of their total IT spend. All our 2017 predictions are directly derived from the rapidly increasing pressure to reclaim these resources and leverage them to achieve direct business advantages in today’s highly competitive and fast moving marketplace. [...]



By | December 29th, 2016|IT Management, Torsten Volk|0 Comments

IoT Enterprise Risk Report


ForeScout recently released an IoT Enterprise Risk Report based on research from ethical hacker Samy Kamkar. Based on Kamkar’s findings, the report on IoT security issues could readily be renamed something like, “IoT: the bane of the enterprise environment,” or “IoT brings new meaning to the term ‘Enterprise Risk’.” The report discusses a significant number of negative findings [...]



By | December 21st, 2016|David Monahan, IT Management, Scott Crawford, Security|0 Comments

How to Unleash the Full Value of Hybrid Cloud


In an ideal world, customers would be able to fully take advantage of the benefits of hybrid cloud by rationally matching infrastructure parameters -cost, performance, reliability, availability, security, regulatory compliance, scalability- with the requirements and dependencies of each application. In reality, customers are running into the following 3 challenges: Challenge #1 – Too Much Complexity [...]



By | November 9th, 2016|IT Management, Torsten Volk|0 Comments

VMware and OpenStack: A Marriage Made in Heaven?


As we -Evan and I- were ranting last week about how OpenStack and VMware fit together (see #EMACloudRants), we were mainly focusing on the central conundrum that VMware faces within this context: “Should we support an open platform that could commoditize away a substantial part of our profitable infrastructure business or should we ignore the [...]



By | November 9th, 2016|IT Management, Torsten Volk|0 Comments

EMA Cloud Rants – Pilot Episode


Evan Quinn and I have been collecting popular customer questions for a while and wanted to share our thoughts on these questions in the form of a new format: EMA CLOUD RANTS. Each week we will discuss one of the hot topics in enterprise IT to provide the viewer with rapid analyst insights, without any [...]



By | November 9th, 2016|IT Management, Torsten Volk|0 Comments

Software Defined Storage: The Vendor Landscape – Part 2 of 2


As promised in my previous post on “Software Defined Storage – Why Customers Should Care”, I want to follow-up with a brief overview of the competitive landscape. Software-only Vendors with no Horse in the Hardware Race By definition, these vendors have the highest credibility when it comes to truly abstracting storage management from the underlying [...]



By | November 9th, 2016|IT Management, Torsten Volk|0 Comments
Load More Posts