The True Value Proposition of BI Solution Providers In Today’s Market: Information Builders Commitment to Its Customers

The business intelligence market is saturated with data management and analytics vendors, and the reality is that vendors cannot compete on capabilities alone. Whether out of the box or through professional services, organizations can generally get the features they require from many different solution providers. Time to value, ease of use, maintenance requirements, and level of service now trump general product capabilities. Obviously, interoperability, scalability, and the ability to effectively integrate data and develop apps are important. At the same time, the main way to ensure customer satisfaction is to provide strong customer support and to focus on quality customer engagements. ...

Read More

White wavy lines on dark blue background.

Optimizing the Business With Network Analytics

Some network operations teams are discovering that they possess a critical asset that can transform enterprises: network data. As businesses become more digitized, networks are emerging as an ultimate source of operational insight. Finance, healthcare, and retail are just some examples of industries where nearly everything critical to a business crosses the wire. Packets and flows can reveal not only the health and performance of IT infrastructure, but business processes, too. The network can provide a record of who is connecting to the network and when, how and why they do. With the right analytical technologies, this data can provide value to the business. For instance, ...

Read More

Q&A From How Digital Business is Shaping the Next Wave of Automation Webinar

I recently presented findings from my Workload Automation (WLA) research and other EMA research on a webinar with Tim Eusterman, Sr. Director Solutions Marketing at BMC in a webinar titled “How Digital Business is Shaping the Next Wave of Automation”. The recording of the webinar is now live here, and the slides are available here. A number of questions were asked that we did not have time to address on the live event. These are presented in this blog post. Q: Can you elaborate on what you mean by IT bringing a digital vision to the business folks? A: Don’t wait for them to ...

Read More


SolidFire Analyst Day Observations


I had the opportunity to attend the SolidFire analyst day in my hometown of Boulder, Colorado on February 25. It was a well-attended event, with the day split into SolidFire and customer presentations in the morning, and small, intimate conversational sessions with SolidFire executives and customers in the afternoon. SolidFire is one of a growing [...]



By | March 5th, 2015|IT Management, Jim Miller|0 Comments

Leveraging User Activity Monitoring to Protect Information and Employees from Cyber Threats


Historically, many organizations and personnel have been concerned about user activity monitoring (UAM). Certain business cultures feel that these activities are an invasion of privacy or are distrustful. However, in today’s Internet connected, data driven world, having specific information or data means the difference in being a market leader and being out of business. Identifying [...]



By | March 4th, 2015|David Monahan, IT Management, Scott Crawford, Security|0 Comments

Docker acquires SocketPlane for multi-host container networking


Docker Inc. acquired networking startup SocketPlane today, indicating that Docker wants to accelerate the development of networking APIs and software that will help network managers operationalize production Linux containers. Docker is a suite of open source software that helps developers and admins manage and scale their use of Linux containers. Containers offer the same resource [...]



PFP CyberSecurity Breaks on to the Scene to Identify Malware at the Chip Level.


A few weeks ago, I briefed with a new company called PFP Cybersecurity, also known as Power Fingerprinting, Inc., and was so intrigued by the concept alone that I wrote a Vendor to Watch about them. They officially launched on January 26, , and currently their claim to fame is their physics-based scanning technology which [...]



By | March 2nd, 2015|David Monahan, IT Management, Scott Crawford, Security|0 Comments

Redefining WAN in Light of Cloud


Thanks in large part to investor-driven demand for constant double-digit growth, the WAN optimization market has taken a substantial beating, and as a result the term “WAN optimization” has become something of a lament. Vendors looking to distance themselves from the term have latched onto the “software-defined” bandwagon, and the result is “SDN WAN” or [...]



By | February 17th, 2015|IT Management, Network Management, Tracy Corbo|0 Comments

Top 5 Trends in 2015 for Unifying PC and Mobile Management


Have you ever tried to create a major slide presentation on a tablet? Or edit a large spreadsheet? Or write a long document? Probably not. While it’s certainly possible to perform more substantial business tasks on a tablet, the small screen real estate and limited system resources (e.g., processing speed, memory, graphic support, etc.) are [...]



By | February 12th, 2015|IT Management, Steve Brasen, Systems Management|0 Comments

A new analyst on the block


Hello world. I am the new senior analyst for the network management research practice at Enterprise Management Associates (EMA).  My name may be familiar to some of you. Prior to 2015, I led the news team for TechTarget’s networking and telecommunications publications for seven years. Now I’m making the transition from journalist to analyst. The [...]



Hybrid Cloud & Infrastructure Management – Making the Switch


The New Year is always a good time for new beginnings, and 2015 is no exception.  With the start of 2015, my coverage focus at EMA is shifting and evolving.  After 22+ years in the network management space, including over six years as an industry analyst, I am starting a new chapter by shifting my [...]



Leveraging Security Policy Orchestration to “Bake Security in” to SDDC Environments


I have a new guest blog just posted at for Tufin around Security Policy Orchestration.  You can check it out here. It discusses the benefits to using Security Policy Orchestration when defining software-defined data centers (SDDCs).  By supporting a centralized security policy across physical and virtual networks via a single interface. Security  change management provides many benefits including: Application [...]



By | January 27th, 2015|David Monahan, IT Management, Scott Crawford, Security|0 Comments

Flash or HDD for the Best Price/Performance?


Flash technology has proven to be a disruptive force in the storage marketplace. Server and network performance gains over the last decade have been substantial, but the hard drive performance needle has hardly moved. This situation has resulted in server utilization being reduced while waiting on storage input output (I/O) operations to be completed. Server [...]



By | January 9th, 2015|Jim Miller|0 Comments
Load More Posts