Cloud Security Alliance Hack-A-Thon and the Software Defined Perimeter

Cloud Security Alliance Hack-A-Thon and the Software Defined Perimeter

The Cloud Security Alliance (CSA) is a not-for-profit think tank of volunteers that spend their time trying to better the internet. These people are the antithesis of cybercriminals; they spend their energy trying to figure out ways to make our data safer. They create best practices for providing security assurance within cloud computing, or in this case, they determine how a cloud environment can be used to enhance and scale authentication for a service that can be cloud-based or private data center-based. Just last week, CSA announced the results of a worldwide Hackathon against an implementation of their Software Defined Perimeter ...

Read More

Damballa and Bit9 + Carbon Black Collaborate to Deliver Better Security with More Context

Damballa and Bit9 + Carbon Black Collaborate to Deliver Better Security with More Context

  In looking at the solutions available for threat protection (and detection), there are quite a few options out there. Some, like Damballa Failsafe, are network-based, vigilantly watching packets across the network and looking for indications of undesirable activities/behaviors and content.  Others are host-based, like Bit9 + Carbon Black, using an agent on the endpoint, to persistently defend the endpoint as a beachhead against undesired, malicious processes trying to execute. Each has its use cases and strong points, but together they provide a significantly broader perspective and richer context for driving response. While sitting on the network and inspecting packets allows for ...

Read More

Thoughts on Splunk .conf 2014

Thoughts on Splunk .conf 2014

This week, Las Vegas hosted some 3500 people at the MGM Grand to mark Splunk .conf14, the annual user gathering for Splunk customers, referred to as “Splunkers”. For those of you not in the tech industry, spelunking, or the act of exploring caves, may come to mind. The theme of the conference was not cave exploration, but data exploration; however, the analogy of cave exploration actually aligns very well. “Splunkers” are diving into their data, delving deep into places that many have never explored before. Each of them finding new and cool ways to use the data that they have ...

Read More

BlueCloud_abstract_300x190

I am in the process of briefing with vendors and developing survey questions for a research study to be kicked off in the very near future. The survey-based research, entitled “Integration Technologies for Cloud Services”, will be followed later this year by an EMA Radar Report on a similar topic. There can no longer be...

Read More »



posted by    | May 11, 2012 | 0 Comments

2planes_300x190

On March 27, 1977, two Boeing 747 passenger aircraft collided on the Spanish island of Tenerife, one of the Canary Islands, in the deadliest accident in aviation history. 583 people perished. Like the Titanic, a multitude of causes converged into the disaster. A terrorist bomb at a another airport, an overstretched small regional facility, a...

Read More »



posted by    | May 9, 2012 | 0 Comments

KaseyaConnect2012_300x190

I spent three great days last week with Kaseya and its user community. The experience was eye-opening in many ways. A bit of background: EMA considers Kaseya a systems management provider, and as such they are usually covered by my colleagues Steve Brasen and Torsten Volk. However, this year for a couple of different reasons...

Read More »



strawberryshortcake-300x190

Okay so networking fabric wars, OpenFlow, and SDN startups are all the buzz in the networking space right now and while it is fun to speculate and debate the topic, it is time to get back to basics. Sure we need to decouple the network plumbing from its current rigid, fixed, physical design, but let’s...

Read More »



posted by Jim Frey   | May 2, 2012 | 0 Comments

desktop_computer-300x190px

A lot my coverage over the past couple of years has been focused on the increasingly interesting mix of applications that get delivered over enterprise networks and the impact that has on how networks are being planned and operated. This cocktail has become increasingly volatile, as latency-insensitive traffic loads are mixed with a growing number...

Read More »



posted by Steve Brasen   | April 26, 2012 | 0 Comments

Dark-Horse-300x190

I know what you’re thinking – you just read the title and thought, “Microsoft as a serious player in the mobile space … suuuuure!”  Bear with me, though – this really does make sense. So much industry buzz has been on the consumerization of IT that vendors have lost sight of the criticality of mobile...

Read More »



HP-Systems-in-Cloud-300x190

Competition for who owns the data center and which vendors will dominate the cloud services space is heating up. Over the last several days, major enterprise technology vendors such as Dell, EMC, HP, IBM and Oracle have all made announcements relative to what many consider to be groundbreaking progress in rolling out a new generation...

Read More »



posted by Tracy Corbo   | April 17, 2012 | 0 Comments

key-lock_300x190

One of the items on the research agenda for this year is IPv6. In almost every survey we launch, we have a question about IPv6 to keep a pulse on what is happening in and around the topic. To date while the topic is acknowledged and recognized as something that needs to be addressed, we...

Read More »



posted by Shawn Rogers   | April 16, 2012 | 0 Comments

innershadow_300x190

For years our data management universe has been centered around the enterprise data warehouse (EDW). The EDW has served us well and created a foundation for todays sophisticated analytics. A paradigm shift driven by a maturing user community, new technology, economics and valuable data types is moving us towards a hybrid data ecosystem that strives to match the workload and...

Read More »



Thoma_logo

Even people outside of the technology sector recognize the Cisco brand. Cisco has a very strong global presence that transcends the technology sector. However as one dives deeper into the network technology sector, especially into the networking infrastructure segment the names of these technology vendors may not transcend much beyond the target user group within...

Read More »



Page 14 of 35« First...10«1213141516»2030...Last »