One of EMA’s advantages in having a base in Colorado is our proximity to a number of thought leaders in identity management, and nowhere is this more evident than at conferences such as the Cloud Identity Summit, an aptly-named event held in recent years here in Colorado’s high country (nearly as close to the clouds [...]
One of the things that has amused me to no end in this business is the number of times I have encountered product vendors who emphatically do not want to be characterized as being “a security vendor.” I understand the rationale, as far as it goes: vendors of infrastructure and application technologies do not want [...]
My friend and former EMA colleague Andi Mann has coined a term that distinctively captures the hamstrung state of virtualization in far too many organizations: virtualization stall. But there may be an equally serious problem facing those seeking to expand from virtualization to cloud computing as a true IT service architecture, regardless whether internal or [...]
Intel-McAfee: First Stroke of Midnight for the IT Security Industry? Or Inflection Point for the Future?
Fortunately for me (I was going to say “unfortunately,” but in retrospect I think it was a Godsend), I was in South America with extremely limited connectivity when the Intel-McAfee story broke. This, however, gave me some time to a) enjoy the spectacular scenery of Rio de Janeiro, and b) formulate my thoughts about this eyebrow-raising deal [...]