Enterprise Strategy Group Getting to the bigger truth. By Bill Lundell, Senior Research Analyst and John McKnight, VP Research and Analysts

Size: px
Start display at page:

Download "Enterprise Strategy Group Getting to the bigger truth. By Bill Lundell, Senior Research Analyst and John McKnight, VP Research and Analysts"

Transcription

1 Enterprise Strategy Group Getting to the bigger truth. By Bill Lundell, Senior Research Analyst and John McKnight, VP Research and Analysts March 2015

2 4 Cloud Computing: Not a Question of If, but Rather How Extensively 7 Password Management Pain Points 10 Cloud Power Users Lead the Way to Password Management Best Practices 17 The Bigger Truth All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The Enterprise Strategy Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change from time to time. This publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the express consent of The Enterprise Strategy Group, Inc., is in violation of U.S. copyright law and will be subject to an action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at This ESG ebook was commissioned by LogMeIn and is distributed under license from ESG.

3 To gather data for this report, LogMeIn commissioned the Enterprise Strategy Group (ESG) to conduct a comprehensive online survey of both IT decision makers and corporate knowledge workers from private- and public-sector organizations in the United States, Canada, the United Kingdom, Ireland, Australia, and New Zealand between October 24, 2014 and November 11, To qualify for this survey, respondents were required to be either: IT or business professionals personally involved with their organization s evaluation and purchasing process for information technology (IT) products and services, as well as familiar with or responsible for the day-to-day management of their organization s IT environment. Corporate knowledge workers, which ESG defines as employees whose primary work activities include working with, creating, using, and distributing information, and who can perform these job tasks regardless of location. The goal of the survey was to get insight into cloud and mobile computing trends at organizations of all sizes including small (10 to 99 employees), midmarket (100 to 999), and enterprise (1,000 or more employees) from the perspective of those tasked with providing the solutions to support and enable these initiatives, as well as those that ultimately leverage the technology to do their jobs. One of the topics included password management and the effect that cloud computing has had on this task, which is ultimately the focus of this paper. All respondents were provided an incentive to complete the survey in the form of cash awards and/or cash equivalents. After filtering out unqualified respondents, removing duplicate responses, and screening the remaining completed responses (on a number of criteria) for data integrity, we were left with a final total sample of 331 IT and business professionals with insight into or responsibility for the purchase and management of IT products and services, as well as 188 corporate knowledge workers. COMPANY SIZE REGION 100% 80% 60% 40% 12%, 1,000 or more employees 52%, 100 to 999 employees 100% 80% 60% 40% Australia/New 19%, Australia/New Zealand UK/Ireland 20%, UK/Ireland 20% 36%, 10 to 99 employees 20% North 61%, America North America 0% 0% INDUSTRY Information 15%, Information Technology Technology Business 13%, Business Services Services (accounting, (accounting, consulting, consulting, legal, etc.) legal, etc.) 8%, Construction/Engineering Financial 7%, Financial (banking, (banking, securities, securities, insurance) insurance) Other 17%, Other Manufacturing 15%, Manufacturing 15%, Manufacturing Retail/Wholesale 11%, 11%, Retail/Wholesale Retail/Wholesale Education 8%, 8%, Education Education Health 6%, Health Care Care 3

4 The cloud computing deployment model is predicated upon companies ability to instantaneously deploy and, just as importantly, decommission applications and/or computing resources and pay only for what they actually consume, affording such key benefits as reduced IT infrastructure costs and faster resource provisioning. Whether this trend is the result of more disciplined IT spending habits borne out of the economic turbulence of 2008 and 2009, or merely the perceived increase in maturity of cloud computing, one thing is clear: Organizations using these services are enjoying key benefits such as reduced IT infrastructure costs and faster resource provisioning, and are looking for ways to further leverage the cloud. From an end-user (i.e., employee) perspective, the increasingly common mantra of anytime, anywhere, from any device is yet another driver of more widespread cloud adoption and usage since these services are inextricably linked with mobile initiatives due to the fact that mobility requirements demand cloud application usage and cloud application usage begets mobility. 4

5 When ESG asked 331 IT decision makers about the importance of using cloud-based business applications and IT services to their employees ability to perform their primary job functions productively and efficiently, more than one-third (34%) indicated that these services are critical. Not surprisingly, cloud power users are more likely to view cloud-based applications as critical for enabling productive and efficient employees. Specifically, more than half (52%) of those organizations that have offloaded at least five applications/workloads to the cloud consider these services critical compared with only 24% of those with only one cloud-based application. In terms of the proportion of total applications that run in the cloud, the majority of organizations report running no more than 30% of their total application footprint in the cloud, though over the next 36 months, more than half will exceed that threshold (see Figure 1). FIGURE 1 Approximately what percentage of your organization s business applications and IT services are cloud-based today? How do you see this changing over the next three years? (Percent of respondents, N=331) Percent of business applications and IT services that are cloud-based today Percent of business applications and IT services that will be cloud-based 36 months from now 25% 20% 15% 10% 5% 16% 8% 21% 21% 18% 13% 11% 15% 13% 20% 5% 10% 12% 17% 0% Less than 10% 10% to 20% 21% to 30% 31% to 40% 41% to 50% More than 50% Don t know 5

6 However, getting to the cloud has always involved turbulence in the form of security and data availability concerns. In fact, Figure 2 reveals that even among organizations that have undertaken the initial leap of faith and procured at least one cloud-based application, security remains the most widely held concern with more than one-third (38%) of these respondents reporting that security concerns are holding them back from more pervasive usage of these services. This is consistent with cloud computing research previously conducted by ESG. FIGURE 2 In general, which of the following factors if any would you say are preventing your organization from using cloud computing services more pervasively? (Percent of respondents, N=331, multiple responses accepted) Security concerns 38% Performance concerns Budget constraints Network bandwidth costs 24% 26% 26% Too much invested in current IT infrastructure and staff Difficult to ensure a consistent user experience Difficult to enforce company policies across different cloud-based apps and users Feels like IT staff would be giving up too much control Difficult to monitor and manage employee usage Nothing is preventing us from using cloud services more pervasively 18% 18% 17% 16% 15% 16% 6

7 While cloud computing is a relatively new challenge, password management has been one of the banes of IT s existence for quite some time. As proof of this burden, IT decision makers cite password management as one of their top user and application management challenges. This is not surprising given that these respondents report that the average number of password reset requests from a typical employee is nine over the course of a 12 month period, and more than half (55%) of these respondents also say that they believe password management is having a negative impact on employee productivity (see Figure 3). Corporate knowledge workers corroborate this suspicion, with nearly half (47%) indicating that all of the tasks related to password management (i.e., remembering, resetting, etc.) are a drain on their personal productivity. 7

8 FIGURE 3 Do you believe that the need to remember and manage (i.e., set, retrieve, change) multiple passwords for different applications has a negative impact on your employees productivity? (Percent of respondents) Yes 55%, Yes No 41%, No Don t 4%, Don t know know Yes 47%, Yes No 46%, No Don t 7%, Don t know know Perhaps providing additional insight into the struggles IT departments have when it comes to managing their employees passwords involves looking at the strategies or lack thereof for storing and sharing them. As seen in Figure 4, IT relies on rudimentary techniques for storing and sharing passwords, including compiling and maintaining spreadsheets and/or hard-copy lists, as well as relying on memory. FIGURE 4 How does IT currently store and share passwords for all employee applications? Percent of respondents, N=257, multiple responses accepted) Maintain a spreadsheet 47% Rely on memory Other form of electronic storage on PC or mobile device 32% 31% Write them down on a piece of paper 27% 8

9 The increasing use of cloud services only serves to exacerbate these issues, which is illustrated by the fact that organizations with five or more cloud-based applications are three times likelier to include password management among their top user and application management challenges relative to those with only one cloud-based application (see Figure 5). Furthermore, nearly twothirds (63%) of organizations with five or more cloud-based applications identify password management as a productivity drain compared with only 45% of those with only one cloud-based application. It s clear that these problems will only intensify as organizations become more cloudreliant and, as such, IT organizations must adopt password management models that can scale at a cloud rate. FIGURE 5 What are your organization s biggest challenges with respect to managing its users and applications? (Percent of respondents, multiple responses accepted) Password management (i.e., setting and resetting passwords, etc.) 10% 26% 37% 5 or more cloud apps 2 to 4 cloud apps 1 cloud app Respondents report that the average number of password reset requests from a typical employee is nine over the course of a 12 month period. 9

10 In addition to less than effective password management approaches, only 46% of respondents report that their organizations have formal IT policies and processes to help with password creation and rotation; 31% rely on built-in application prompts; and 22% leave password management up to individual employees (the latter is especially true among younger and smaller companies). However, when companies are more cloud-centric, they tend to have taken more steps toward formal IT policies and processes (see Figure 6). Given that these organizations are much more likely to already be experiencing password-related problems, it makes sense that they are at the forefront of realizing that IT must seize control of this situation with policies and process, especially as cloud usage increases. 10

11 FIGURE 6 Existing policies around password creation and rotation for employees, by number of cloud-based applications. (Percent of respondents) IT has formal policies and processes to prompt users with password creation and changes 45% 43% 51% Individual employees are on their own to establish and change passwords We rely on built-in application prompts to direct users to create and change passwords 20% 21% 25% 29% 34% 31% 5 or more cloud apps 2-4 cloud apps 1 cloud app **** of corporate knowledge workers maintain a small rotation of passwords repeatedly. 11

12 As is typically the case, however, having policies in place does not ensure employee compliance. This is no different when it comes to passwords, as shown by the fact that more than half (55%) of corporate knowledge workers maintain a small rotation of passwords repeatedly, in some cases relying on a single password for all of their business applications (see Figure 7). In addition to the fact that individuals are unreliable, relying on built-in application reminders that prompt employees to create and update passwords has its own shortcomings since password strength and complexity often vary from vendor to vendor. This demonstrates a need to complement password management policies and processes with purpose-built tools that can help to monitor and, when necessary, enforce compliance. FIGURE 7 What is your strategy for managing the passwords for all of the various business applications you use to perform your job? (Percent of respondents, N=188) One 15%, password One password for all for applications all applications Small 40%, number Small number of passwords of passwords used repeatedly used repeatedly Unique 36%, Unique password password for every for application every application Use 6%, password Use password manager manager technology technology Other 2%, Other 12

13 The fact that more than half (57%) of organizations report that at least one of their cloud-based applications contains sensitive, regulated, or company-confidential data may provide some insight as to why more concentrated cloud usage begets more concentrated password management focus. Along those lines, it follows that the vast majority of respondents say that IT insight into employees passwords for cloud-based applications is critical or important, and perhaps more telling is the fact that organizations with five or more cloud applications are more than twice as likely as those with one to deem this level of awareness as critical (see Figure 8). FIGURE 8 Importance of IT insight into and/or control of employee passwords for cloud-based applications, by number of cloud-based applications. (Percent of respondents) Critical Important Somewhat important Not important 5 or more cloud apps 45% 46% 8% 1% 2 to 4 cloud apps 24% 55% 18% 3% 1 cloud app 20% 43% 28% 9% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 13

14 Accordingly, these more cloud-dependent organizations are also significantly more likely to be using a wide variety of password management tools and activities across the board (see Figure 9). Among organizations with at least five cloud-based applications, more than half use tools that enforce password changes after a certain amount of time (57%), implement rules about the length and complexity of passwords (53%), and enable centralized monitoring and auditing capabilities (51%). Other commonly relied upon activities include providing single sign-on for employees, as well as the ability to create and terminate employee accounts from a central access point. FIGURE 9 Password management activities organizations leverage for their cloud-based applications and/or services, by number of cloud-based applications. (Percent of respondents, multiple responses accepted) 5 or more cloud apps 2 to 4 cloud apps 1 cloud app Enforce some type of rule around mandatory password changes after a certain length of time 13% 34% 57% Enforce some type of rules around the length and characters used for passwords 23% 38% 53% Monitor and audit user accounts from a central tool and/or location 19% 36% 51% Providing single sign-on capabilities so that employees gain access to cloud-based applications without having to log into each one independently 19% 29% 49% Creating a user account for employees from a central tool and/or location 19% 36% 43% Terminate user accounts from a central tool and/or location 23% 19% 40% We do not have any insight into and/or control of our employees cloud-based application(s) passwords 2% 3% 10% 14

15 Identity access and management (IAM) is a framework for business processes that facilitates the management of electronic identities in order to ensure that access privileges are granted according to one interpretation of policy and all individuals and services are properly authenticated, authorized, and audited. Cloud application vendors are increasingly including IAM as a part of their offerings as the concept of cloud-based IAM services grows in popularity due to the potential for simplified employee access management capabilities at a global scale. Further reinforcing the idea that cloud computing power users serve as the bellwether for best practices when it comes to supporting these services, more than half of organizations with at least five cloud-based applications expressed significant interest in cloud-based IAM. The most commonly cited potential benefits and usage drivers include streamlined identity management tasks, better usage insight across all cloud-based applications, and easier provisioning (see Figure 10). use tools that enforce password changes after a certain amount of time. 15

16 FIGURE 10 Potential benefits of cloud-based IAM, by number of cloud applications in use (Percent of respondents) Streamlines identity management tasks i.e., policies and changes can be made at the user identity level and those changes will flow through all of users cloud application privileges 16% 29% 52% Better insight into usage trends across all cloud-based applications 18% 35% 36% Easily provision or revoke user access to cloudbased applications from a single management console as opposed to many 21% 32% 40% 5 or more cloud apps More consistent implementation of company policies across cloud-based applications 29% 24% 36% 2 to 4 cloud apps Enables single sign-on for users across multiple cloud-based applications 27% 32% 23% 1 cloud app More accurate accounting of active users and associated cloud application license costs 19% 29% 26% Delivered as a service (i.e., service provider is responsible for hosting and managing identity management software and infrastructure) 10% 28% 24% 15

17 Cloud computing is not the latest IT fad, but rather a sustainable technology deployment alternative that allows organizations to offload some or most of the management responsibilities associated with business applications and workloads as a way to cut costs, simplify IT processes, and increase scalability, among other potential benefits. ESG s research confirms not only that the usage of these services is pervasive, but also that organizations plan to increase the applications and workloads that they offload to the cloud. Yet in spite of the widespread acceptance of cloud computing, and regardless of an organization s position on the cloud computing adoption curve, security remains as the most common factor slowing or in some cases, outright preventing the consumption of these services. This issue will serve as a bigger impediment as organizations ponder the decision to move applications containing sensitive data to offsite, third-party resources. Among the security considerations contributing to this apprehension is undoubtedly password management, a problem that plagued IT long before cloud computing became mainstream. Not surprisingly, this task has been further complicated by the usage of cloud computing services as evidenced by the fact that organizations with more cloud-based applications are more likely to cite various password management challenges, though this has also prompted them to take steps to implement or improve the measures they take to support these processes. However, in order for IT staffs to keep pace with the adoption and usage of cloud computing services, they will require solutions that can scale accordingly. As such, the future of password management will likely have strong ties to cloud-resident identity and access management technologies, with cloud power users at the forefront of this movement. Enterprise Strategy Group is an integrated IT research, analysis, and strategy firm that is world renowned for providing actionable insight and intelligence to the global IT community. All Rights Reserved. contact@esg-global.com 17 P

Research Report. Abstract: The Evolution of Server Virtualization. November 2010

Research Report. Abstract: The Evolution of Server Virtualization. November 2010 Research Report Abstract: The Evolution of Server Virtualization By Mark Bowker and Jon Oltsik With Bill Lundell, John McKnight, and Jenn Gahm November 2010 2010 Enterprise Strategy Group, Inc. All Rights

More information

2015 Data Storage Market Trends

2015 Data Storage Market Trends Research Report Abstract: 2015 Data Storage Market Trends By Mark Peters, Senior Analyst and Bill Lundell, Senior Research Analyst With Scott Sinclair, Analyst and Jenn Gahm, Senior Project Manager October

More information

Research Report. Abstract: 2013 Public Cloud Computing Trends. March 2013

Research Report. Abstract: 2013 Public Cloud Computing Trends. March 2013 Research Report Abstract: 2013 Public Cloud Computing Trends By Wayne Pauley, Senior Analyst and Bill Lundell, Senior Research Analyst With Jenn Gahm, Senior Project Manager March 2013 Introduction Research

More information

The Shift Toward Data Protection Appliances

The Shift Toward Data Protection Appliances Research Report Abstract: The Shift Toward Data Protection Appliances By Jason Buffington, Senior Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager March 2015

More information

The State of Mobile Computing Security

The State of Mobile Computing Security Research Report Abstract: The State of Mobile Computing Security By Jon Oltsik, Senior Principal Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager February 2014

More information

Online File Sharing and Collaboration: Deployment Model Trends

Online File Sharing and Collaboration: Deployment Model Trends Research Report Abstract: Online File Sharing and Collaboration: Deployment Model Trends By Terri McClure, Senior Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager

More information

Enterprise Big Data, Business Intelligence, and Analytics Trends

Enterprise Big Data, Business Intelligence, and Analytics Trends Research Report Abstract: Enterprise Big Data, Business Intelligence, and Analytics Trends By Nik Rouda, Senior Analyst With Bill Lundell, Senior Research Analyst, and Jennifer Gahm, Senior Project Manager

More information

Research Report. Abstract: Social Enterprise Adoption Trends. June 2012

Research Report. Abstract: Social Enterprise Adoption Trends. June 2012 Research Report Abstract: Social Enterprise Adoption Trends By Tom Petrocelli, Senior Analyst With Bill Lundell, Senior Research Analyst, and Jenn Gahm, Senior Project Manager June 2012 2012 Enterprise

More information

Data Protection-as-a-service (DPaaS) Trends

Data Protection-as-a-service (DPaaS) Trends Research Report Abstract: Data Protection-as-a-service (DPaaS) Trends By Jason Buffington, Senior Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager and Adam DeMattia,

More information

Enterprise Database Trends in a Big Data World

Enterprise Database Trends in a Big Data World Research Report Abstract: Enterprise Database Trends in a Big Data World By Nik Rouda, Senior Analyst With Bill Lundell, Senior Research Analyst and Jennifer Gahm, Senior Project Manager July 2014 Introduction

More information

Platform-as-a-service Usage and Satisfaction Study

Platform-as-a-service Usage and Satisfaction Study Research Report Abstract: Platform-as-a-service Usage and Satisfaction Study By Stephen D. Hendrick, Principal Analyst with Bill Lundell, Senior Research Analyst and Jennifer Gahm, Senior Project Manager

More information

Trends in Private Cloud Infrastructure

Trends in Private Cloud Infrastructure Research Report Abstract: Trends in Private Cloud Infrastructure By Mark Bowker, Senior Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager April 2014 Introduction

More information

Research Report. Abstract: The Impact of Big Data on Data Analytics. September 2011

Research Report. Abstract: The Impact of Big Data on Data Analytics. September 2011 Research Report Abstract: The Impact of Big Data on Data Analytics By Julie Lockner and Bill Lundell With Jennifer Gahm and John McKnight September 2011 2011 Enterprise Strategy Group, Inc. All Rights

More information

Research Report. Abstract: Solid-state Storage Market Trends. November 2011. By Bill Lundell and Mark Peters With Jennifer Gahm and John McKnight

Research Report. Abstract: Solid-state Storage Market Trends. November 2011. By Bill Lundell and Mark Peters With Jennifer Gahm and John McKnight Research Report Abstract: Solid-state Storage Market Trends By Bill Lundell and Mark Peters With Jennifer Gahm and John McKnight November 2011 2011 Enterprise Strategy Group, Inc. All Rights Reserved.

More information

Research Report. Abstract: Trends in Data Protection Modernization. August 2012

Research Report. Abstract: Trends in Data Protection Modernization. August 2012 Research Report Abstract: Trends in Data Protection Modernization By Jason Buffington, Senior Analyst, and Bill Lundell, Senior Research Analyst August 2012 Introduction Research Objectives Research Report:

More information

Corporate Online File Sharing and Collaboration Market Trends

Corporate Online File Sharing and Collaboration Market Trends Research Report Abstract: Corporate Online File Sharing and Collaboration Market Trends By Kristine Kao, Market Research Analyst, Terri McClure, Senior Analyst, and Jane Wright, Senior Production Analyst

More information

Backup and Archiving Convergence Trends

Backup and Archiving Convergence Trends Research Report Abstract: Backup and Archiving Convergence Trends By Jason Buffington, Senior Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager April 2014 Introduction

More information

Research Report. Remote Office/Branch Office Technology Trends. July 2011

Research Report. Remote Office/Branch Office Technology Trends. July 2011 Research Report Remote Office/Branch Office Technology Trends By Bill Lundell, Jon Oltsik, and Lauren Whitehouse With John McKnight and Jenn Gahm July 2011 2011 Enterprise Strategy Group, Inc. All Rights

More information

Research Report. Abstract: Trends for Protecting Highly Virtualized and Private Cloud Environments. June 2013

Research Report. Abstract: Trends for Protecting Highly Virtualized and Private Cloud Environments. June 2013 Research Report Abstract: Trends for Protecting Highly Virtualized and Private Cloud Environments By Jason Buffington, Senior Analyst and Bill Lundell, Senior Research Analyst June 2013 Introduction Research

More information

The Convergence of Big Data Processing and Integrated Infrastructure

The Convergence of Big Data Processing and Integrated Infrastructure Research Report Abstract: The Convergence of Big Data Processing and Integrated Infrastructure By Evan Quinn, Senior Principal Analyst and Bill Lundell, Senior Research Analyst With Brian Babineau, Vice

More information

Research Report. Abstract: E-Mail Archiving Market Trends. May 2010. By Brian Babineau With Bill Lundell and John McKnight

Research Report. Abstract: E-Mail Archiving Market Trends. May 2010. By Brian Babineau With Bill Lundell and John McKnight Research Report Abstract: E-Mail Archiving Market Trends By Brian Babineau With Bill Lundell and John McKnight May 2010 2010 Enterprise Strategy Group, Inc. All Rights Reserved. Introduction: Research

More information

Research Report. Abstract: Endpoint Device Backup Trends. December 2010. By Lauren Whitehouse With Bill Lundell and John McKnight

Research Report. Abstract: Endpoint Device Backup Trends. December 2010. By Lauren Whitehouse With Bill Lundell and John McKnight Research Report Abstract: Endpoint Device Backup Trends By Lauren Whitehouse With Bill Lundell and John McKnight December 2010 2010 Enterprise Strategy Group, Inc. All Rights Reserved. Introduction Research

More information

Research Report. Abstract: The Impact of Server Virtualization on Data Protection. September 2010

Research Report. Abstract: The Impact of Server Virtualization on Data Protection. September 2010 Research Report Abstract: The Impact of Server Virtualization on Data Protection By Lauren Whitehouse and Bill Lundell With Jennifer Gahm September 2010 2010 Enterprise Strategy Group, Inc. All Rights

More information

Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices

Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices Research Report Abstract: Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices By Jon Oltsik, Senior Principal Analyst With Bill Lundell, Senior Research Analyst and Jennifer Gahm,

More information

Cybersecurity Skills Shortage: A State of Emergency

Cybersecurity Skills Shortage: A State of Emergency Enterprise Strategy Group Getting to the bigger truth. ESG Brief Cybersecurity Skills Shortage: A State of Emergency Date: February 2016 Author: Jon Oltsik, Principal Analyst, Doug Cahill, Senior Analyst,

More information

The Evolving Public Cloud Landscape Date: June 2014 Author: Mark Bowker, Senior Analyst and Bill Lundell, Senior Research Analyst

The Evolving Public Cloud Landscape Date: June 2014 Author: Mark Bowker, Senior Analyst and Bill Lundell, Senior Research Analyst Research Brief The Evolving Public Cloud Landscape Date: June 2014 Author: Mark Bowker, Senior Analyst and Bill Lundell, Senior Research Analyst Abstract: ESG research indicates that the corporate usage

More information

Web Application Security Testing Tools and Services

Web Application Security Testing Tools and Services Research Report Abstract: Web Application Security Testing Tools and Services By Jon Oltsik, Senior Principal Analyst, and Jane Wright, Senior Research Analyst With Jennifer Gahm April 2013 Introduction

More information

Platform-as-a-service Language Use Study

Platform-as-a-service Language Use Study Research Report Abstract: Platform-as-a-service Language Use Study By Stephen D. Hendrick, Principal Analyst with Bill Lundell, Senior Research Analyst & Jennifer Gahm, Senior Project Manager February

More information

Cloud Computing Adoption Trends:

Cloud Computing Adoption Trends: Research Report Abstract: Cloud Computing Adoption Trends: Software- and Infrastructure-as-a-Service Usage Among Enterprise and Midmarket Organizations By Bill Lundell With John McKnight and Jennifer Gahm

More information

Varonis: Secure Enterprise Collaboration and File Sharing Date: June 2015 Author: Terri McClure, Senior Analyst; and Leah Matuson, Research Analyst

Varonis: Secure Enterprise Collaboration and File Sharing Date: June 2015 Author: Terri McClure, Senior Analyst; and Leah Matuson, Research Analyst ESG Brief Varonis: Secure Enterprise Collaboration and File Sharing Date: June 2015 Author: Terri McClure, Senior Analyst; and Leah Matuson, Research Analyst Abstract: With the burgeoning workplace mobility

More information

Research Report. Abstract: The Impact of Cloud Computing on the Channel. September 2011. By Jeff Hine and Bill Lundell

Research Report. Abstract: The Impact of Cloud Computing on the Channel. September 2011. By Jeff Hine and Bill Lundell Research Report Abstract: The Impact of Cloud Computing on the Channel By Jeff Hine and Bill Lundell September 2011 2011 Enterprise Strategy Group, Inc. All Rights Reserved. Introduction Research Objectives

More information

White. Paper. EMC Isilon: A Scalable Storage Platform for Big Data. April 2014

White. Paper. EMC Isilon: A Scalable Storage Platform for Big Data. April 2014 White Paper EMC Isilon: A Scalable Storage Platform for Big Data By Nik Rouda, Senior Analyst and Terri McClure, Senior Analyst April 2014 This ESG White Paper was commissioned by EMC Isilon and is distributed

More information

HGST Object Storage for a New Generation of IT

HGST Object Storage for a New Generation of IT Enterprise Strategy Group Getting to the bigger truth. SOLUTION SHOWCASE HGST Object Storage for a New Generation of IT Date: October 2015 Author: Scott Sinclair, Storage Analyst Abstract: Under increased

More information

White. Paper. Evaluating Sync and Share Solutions. Balancing Security, Control, and Productivity. September, 2014

White. Paper. Evaluating Sync and Share Solutions. Balancing Security, Control, and Productivity. September, 2014 White Paper Evaluating Sync and Share Solutions Balancing Security, Control, and Productivity By Terri McClure, Senior Analyst September, 2014 This ESG White Paper was commissioned by Code42 and is distributed

More information

Total year-over-year spending change in networking, 2009-2012. (Percent of respondents) 37% 36% 35% 37% 29% 26% 16% 13% 0% 20% 40% 60% 80%

Total year-over-year spending change in networking, 2009-2012. (Percent of respondents) 37% 36% 35% 37% 29% 26% 16% 13% 0% 20% 40% 60% 80% Research Brief 2012 Networking Spending Trends Date: March 2012 Author: Jon Oltsik, Senior Principal Analyst; Bob Laliberte, Senior Analyst; and Bill Lundell, Senior Research Analyst Abstract: According

More information

White. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013

White. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013 White Paper Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS By Jon Oltsik, Senior Principal Analyst January 2013 This ESG White Paper was commissioned by McAfee. and is distributed

More information

Research Report. Abstract: 2014 Public Cloud Computing Trends. March 2014

Research Report. Abstract: 2014 Public Cloud Computing Trends. March 2014 Research Report Abstract: 2014 Public Cloud Computing Trends By Wayne Pauley, Senior Analyst and Bill Lundell, Senior Research Analyst With Jenn Gahm, Senior Project Manager March 2014 Introduction Research

More information

Integrated Computing Platforms: Infrastructure Builds for Tomorrow s Data Center

Integrated Computing Platforms: Infrastructure Builds for Tomorrow s Data Center White Paper Integrated Computing Platforms: Infrastructure Builds for Tomorrow s Data Center By Mark Bowker, Senior Analyst, and Perry Laberis, Senior Research Associate March 2013 This ESG White Paper

More information

SavvyDox: Next-generation Collaboration Bridges the Space Between EFSS and ECM

SavvyDox: Next-generation Collaboration Bridges the Space Between EFSS and ECM ESG Solution Showcase SavvyDox: Next-generation Collaboration Bridges the Space Between EFSS and ECM Date: June 2015 Author: Terri McClure, Senior Analyst; and Leah Matuson, Research Analyst Abstract:

More information

Research Report. Abstract: e-discovery Market Trends. A View from the Legal Department. October 2011

Research Report. Abstract: e-discovery Market Trends. A View from the Legal Department. October 2011 Research Report Abstract: e-discovery Market Trends A View from the Legal Department By Katey Wood and Brian Babineau With Bill Lundell and Jennifer Gahm October 2011 2011 Enterprise Strategy Group, Inc.

More information

This ESG White Paper was commissioned by DH2i and is distributed under license from ESG.

This ESG White Paper was commissioned by DH2i and is distributed under license from ESG. White Paper Application Virtualization: An Opportunity for IT to do More with Much Less By Mark Bowker, Senior Analyst November 2012 This ESG White Paper was commissioned by DH2i and is distributed under

More information

SaaS with a Face: User Satisfaction in Cloud- based E- mail Management with Mimecast

SaaS with a Face: User Satisfaction in Cloud- based E- mail Management with Mimecast White Paper SaaS with a Face: User Satisfaction in Cloud- based E- mail Management with Mimecast By Bill Lundell, Senior Research Analyst January 2013 This ESG White Paper was commissioned by Mimecast

More information

Market Research. Study. Database Security and Compliance Risks. December, 2009. By Jon Oltsik

Market Research. Study. Database Security and Compliance Risks. December, 2009. By Jon Oltsik Market Research Study Database Security and Compliance Risks By Jon Oltsik December, 2009 An ESG Market Research Study Sponsored by Application Security, Inc. 2009, Enterprise Strategy Group, Inc. All

More information

The Challenge. ESG Case Study

The Challenge. ESG Case Study ESG Case Study Primatics Financial Delivers SaaS-based Solution Excellence Using EMC s XtremIO Date: March 2015 Authors: Mark Peters, Senior Analyst; Adam DeMattia, Market Research Analyst; and Monya Keane,

More information

The Challenge of Securing and Managing Data While Meeting Compliance

The Challenge of Securing and Managing Data While Meeting Compliance ESG Brief Commvault: Integrating Enterprise File Sync and Share Capabilities with Data Protection and Backup Date: September 2015 Author: Terri McClure, Senior Analyst, and Leah Matuson, Research Analyst

More information

Solution Brief. Introduction

Solution Brief. Introduction Solution Brief A Checklist when Choosing a Backup Solution for SaaS-based Applications Date: January 2015 Authors: Jason Buffington, Senior Analyst; and Monya Keane, Research Analyst Abstract: What should

More information

White. Paper. Cloud Computing Demands Enterprise- class Password Management and Security. April 2013

White. Paper. Cloud Computing Demands Enterprise- class Password Management and Security. April 2013 White Paper Cloud Computing Demands Enterprise- class Password Management and Security By Jon Oltsik, Senior Principal Analyst April 2013 This ESG White Paper was commissioned by McAfee (a Division of

More information

Data Protection Services Should Be About Services, as Well as Data Protection Date: February 2013 Author: Jason Buffington, Senior Analyst

Data Protection Services Should Be About Services, as Well as Data Protection Date: February 2013 Author: Jason Buffington, Senior Analyst Company Brief Data Protection Services Should Be About Services, as Well as Data Protection Date: February 2013 Author: Jason Buffington, Senior Analyst Abstract: Organizations trying to modernize or fix

More information

SunGard Enterprise Cloud Services Date: March 2012 Author: Mark Bowker, Senior Analyst

SunGard Enterprise Cloud Services Date: March 2012 Author: Mark Bowker, Senior Analyst Cloud Services Brief SunGard Enterprise Cloud Services Date: March 2012 Author: Mark Bowker, Senior Analyst Abstract: Long-time managed services and disaster recovery specialist SunGard is raising its

More information

How To Understand The Needs Of The Network

How To Understand The Needs Of The Network White Paper The Modern Network Monitoring Mandate By Bob Laliberte, Senior Analyst April 2014 This ESG White Paper was commissioned by Emulex and is distributed under license from ESG. White Paper: The

More information

MULTI VENDOR ANALYSIS

MULTI VENDOR ANALYSIS MULTI VENDOR ANALYSIS Taming the Impact of Server Virtualization on Networked Storage With Citrix, Microsoft, and NetApp By Mark Bowker June, 2009 Table of Contents ESG WHITE PAPER Table of Contents...

More information

Field Audit Report. Asigra. Hybrid Cloud Backup and Recovery Solutions. May, 2009. By Brian Garrett with Tony Palmer

Field Audit Report. Asigra. Hybrid Cloud Backup and Recovery Solutions. May, 2009. By Brian Garrett with Tony Palmer Field Audit Report Asigra Hybrid Cloud Backup and Recovery Solutions By Brian Garrett with Tony Palmer May, 2009 Field Audit: Asigra Hybrid Cloud Backup and Recovery Solutions 2 Contents Introduction...

More information

White. Paper. Building Next Generation Data Centers. Implications for I/O Strategies. August 2014

White. Paper. Building Next Generation Data Centers. Implications for I/O Strategies. August 2014 White Paper Building Next Generation Data Centers Implications for I/O Strategies By Bob Laliberte, Senior Analyst August 2014 This ESG White Paper was commissioned by Emulex and is distributed under license

More information

White. Paper. The Application Deluge and Visibility Imperative: How to ensure network performance for your business-critical applications

White. Paper. The Application Deluge and Visibility Imperative: How to ensure network performance for your business-critical applications White Paper The Application Deluge and Visibility Imperative: How to ensure network performance for your business-critical applications By Bob Laliberte, Senior Analyst November 2013 This ESG White Paper

More information

Enterprise-class Backup Performance with Dell DR6000 Date: May 2014 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Senior Lab Analyst

Enterprise-class Backup Performance with Dell DR6000 Date: May 2014 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Senior Lab Analyst ESG Lab Review Enterprise-class Backup Performance with Dell DR6000 Date: May 2014 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Senior Lab Analyst Abstract: This ESG Lab review documents hands-on

More information

Getting on the Road to SDN. Attacking DMZ Security Issues with Advanced Networking Solutions

Getting on the Road to SDN. Attacking DMZ Security Issues with Advanced Networking Solutions White Paper Getting on the Road to SDN Attacking DMZ Security Issues with Advanced Networking Solutions By Bob Laliberte, Senior Analyst March 2014 This ESG White Paper was commissioned by NEC and is distributed

More information

RESEARCH REPORT. Abstract. Storage Resource Management Market on the Launch Pad. By Mary Turner and Bob Laliberte With John McKnight and Jennifer Gahm

RESEARCH REPORT. Abstract. Storage Resource Management Market on the Launch Pad. By Mary Turner and Bob Laliberte With John McKnight and Jennifer Gahm RESEARCH REPORT Abstract Storage Resource Management Market on the Launch Pad By Mary Turner and Bob Laliberte With John McKnight and Jennifer Gahm October 2007 Introduction Research Objectives The term

More information

White. Paper. Benefiting from Server Virtualization. Beyond Initial Workload Consolidation. June, 2010

White. Paper. Benefiting from Server Virtualization. Beyond Initial Workload Consolidation. June, 2010 White Paper Benefiting from Server Virtualization Beyond Initial Workload Consolidation By Mark Bowker June, 2010 This ESG White Paper was commissioned by VMware and is distributed under license from ESG.

More information

Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst

Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst ESG Lab Test Drive Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst Abstract: This report documents the results of an ESG Lab Test

More information

White. Paper. Big Data Advisory Service. September, 2011

White. Paper. Big Data Advisory Service. September, 2011 White Paper Big Data Advisory Service By Julie Lockner& Tom Kornegay September, 2011 This ESG White Paper was commissioned by EMC Corporation and is distributed under license from ESG. 2011, Enterprise

More information

Compensating Security Controls for Windows Server 2003 Security

Compensating Security Controls for Windows Server 2003 Security ESG Solution Showcase Compensating Security Controls for Windows Server 2003 Security Date: May 2015 Author: Jon Oltsik, Senior Principal Analyst Abstract: It is common knowledge by now that Microsoft

More information

Research Perspectives

Research Perspectives Research Perspectives Paper Network Security Operations and Cloud Computing By Jon Oltsik, Senior Principal Analyst April 2015 This ESG Research Perspectives Paper was commissioned by Tufin and is distributed

More information

Symantec OpenStorage Date: February 2010 Author: Tony Palmer, Senior ESG Lab Engineer

Symantec OpenStorage Date: February 2010 Author: Tony Palmer, Senior ESG Lab Engineer ESG Lab Review Symantec OpenStorage Date: February 2010 Author: Tony Palmer, Senior ESG Lab Engineer Abstract: This ESG Lab review documents hands-on testing of consolidated management and automated data

More information

Security Intelligence: A Key Component of Big Data Security Analytics Date: December 2012 Author: Jon Oltsik, Senior Principal Analyst

Security Intelligence: A Key Component of Big Data Security Analytics Date: December 2012 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Security Intelligence: A Key Component of Big Data Security Analytics Date: December 2012 Author: Jon Oltsik, Senior Principal Analyst Abstract: The intersection of big data and security analytics

More information

White. Paper. Extracting the Value of Big Data with HP StoreAll Storage and Autonomy. December 2012

White. Paper. Extracting the Value of Big Data with HP StoreAll Storage and Autonomy. December 2012 White Paper Extracting the Value of Big Data with HP StoreAll Storage and Autonomy By Terri McClure, Senior Analyst and Katey Wood, Analyst December 2012 This ESG White Paper was commissioned by HP and

More information

EMC Isilon: Data Lake 2.0

EMC Isilon: Data Lake 2.0 ` ESG Solution Showcase EMC Isilon: Data Lake 2.0 Date: November 2015 Author: Scott Sinclair, Analyst Abstract: With the rise of new workloads such as big data analytics and the Internet of Things, data

More information

Secure File Sync & Share with Acronis Access Advanced Date: July 2015 Author: Kerry Dolan, Lab Analyst

Secure File Sync & Share with Acronis Access Advanced Date: July 2015 Author: Kerry Dolan, Lab Analyst ESG Lab Spotlight Secure File Sync & Share with Acronis Access Advanced Date: July 2015 Author: Kerry Dolan, Lab Analyst Abstract: This ESG Lab Spotlight provides a high level look at the Acronis Access

More information

White. Paper. Rethinking Endpoint Security. February 2015

White. Paper. Rethinking Endpoint Security. February 2015 White Paper Rethinking Endpoint Security By Jon OItsik, Senior Principal Analyst With Kyle Prigmore, Associate Analyst February 2015 This ESG White Paper was commissioned by RSA Security and is distributed

More information

Top Eight Identity & Access Management Challenges with SaaS Applications. Okta White Paper

Top Eight Identity & Access Management Challenges with SaaS Applications. Okta White Paper Top Eight Identity & Access Management Challenges with SaaS Applications Okta White Paper Table of Contents The Importance of Identity for SaaS Applications... 2 1. End User Password Fatigue... 2 2. Failure-Prone

More information

ESG Brief. Overview. 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved.

ESG Brief. Overview. 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved. ESG Brief Webroot Delivers Enterprise-Class Threat Intelligence to Security Technology Providers and Large Organizations Date: September 2014 Author: Jon Oltsik, Senior Principal Analyst; Kyle Prigmore,

More information

Virtual Patch Management Offers Automation, Availability, and Cost Benefits Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst

Virtual Patch Management Offers Automation, Availability, and Cost Benefits Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Virtual Patch Management Offers Automation, Availability, and Cost Benefits Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: Timely patch management is a security best practice,

More information

ESG Research Final Sponsor Report

ESG Research Final Sponsor Report ESG Research Final Sponsor Report The Modernization of Data Protection By Jason Buffington, Senior Analyst and Bill Lundell, Senior Research Analyst With Jenn Gahm, Senior Project Manager April 2012 2012

More information

Is your organization developing its own custom applications specifically for mobile devices? (Percent of respondents, N=242)

Is your organization developing its own custom applications specifically for mobile devices? (Percent of respondents, N=242) Solution Brief Check Point Capsule for Mobile Computing Security, Operations Efficiency, and Business Enablement Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst; Kyle Prigmore, Research

More information

Secure Enterprise Online File Sharing with Syncplicity Date: November 2014 Author: Tony Palmer, Senior Lab Analyst, Aviv Kaufmann, Lab Analyst

Secure Enterprise Online File Sharing with Syncplicity Date: November 2014 Author: Tony Palmer, Senior Lab Analyst, Aviv Kaufmann, Lab Analyst ESG Lab Review Secure Enterprise Online File Sharing with Syncplicity Date: November 2014 Author: Tony Palmer, Senior Lab Analyst, Aviv Kaufmann, Lab Analyst Abstract: Organizations are challenged in today

More information

White Paper: Nasuni Cloud NAS. Nasuni Cloud NAS. Combining the Best of Cloud and On-premises Storage

White Paper: Nasuni Cloud NAS. Nasuni Cloud NAS. Combining the Best of Cloud and On-premises Storage Combining the Best of Cloud and On-premises Storage Introduction Organizations rely on corporate data for everything from product design to order processing. Files are the lifeblood of the modern enterprise

More information

Identity & Access Management in the Cloud: Fewer passwords, more productivity

Identity & Access Management in the Cloud: Fewer passwords, more productivity WHITE PAPER Strategic Marketing Services Identity & Access Management in the Cloud: Fewer passwords, more productivity Cloud services are a natural for small and midsize businesses, with their ability

More information

Citrix: NetScaler and CloudBridge Solutions on AWS

Citrix: NetScaler and CloudBridge Solutions on AWS ESG Solution Showcase Citrix: NetScaler and CloudBridge Solutions on AWS Date: September 2015 Author: Mark Bowker, Senior Analyst; and Leah Matuson, Research Analyst Abstract: With exploding data growth,

More information

Avoiding The Hidden Costs. of the Cloud

Avoiding The Hidden Costs. of the Cloud Avoiding The Hidden Costs of the Cloud 2013 CONTENTS 4 5 6 7 8 9 10 INTRODUCTION ROGUE CLOUD IMPLEMENTATIONS CLOUD BACK UP AND RECOVERY INEFFICIENT CLOUD STORAGE COMPLIANCE AND ediscovery SSL CERTIFICATE

More information

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape WHITE PAPER: SYMANTEC GLOBAL INTELLIGENCE NETWORK 2.0.... ARCHITECTURE.................................... Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Who

More information

White. Paper. Desktop Virtualization, Management, and Security. November, 2009. By Jon Oltsik, Principal Analyst and Mark Bowker, Senior Analyst

White. Paper. Desktop Virtualization, Management, and Security. November, 2009. By Jon Oltsik, Principal Analyst and Mark Bowker, Senior Analyst White Paper Desktop Virtualization, Management, and Security By Jon Oltsik, Principal Analyst and Mark Bowker, Senior Analyst November, 2009 2009, Enterprise Strategy Group, Inc. All Rights Reserved Contents

More information

Identity Access Management: Beyond Convenience

Identity Access Management: Beyond Convenience Identity Access Management: Beyond Convenience June 1st, 2014 Identity and Access Management (IAM) is the official description of the space in which OneLogin operates in but most people who are looking

More information

SECURITY IN THE CLOUDS: THE BUSINESS CHALLENGE

SECURITY IN THE CLOUDS: THE BUSINESS CHALLENGE SECURITY IN THE CLOUDS: THE BUSINESS CHALLENGE originally printed in tom sitpro February 2012 PART 1: A FUNDAMENTAL SHIFT Cloud solutions fundamentally shift the way that computing services are delivered.

More information

EMC s Enterprise Hadoop Solution. By Julie Lockner, Senior Analyst, and Terri McClure, Senior Analyst

EMC s Enterprise Hadoop Solution. By Julie Lockner, Senior Analyst, and Terri McClure, Senior Analyst White Paper EMC s Enterprise Hadoop Solution Isilon Scale-out NAS and Greenplum HD By Julie Lockner, Senior Analyst, and Terri McClure, Senior Analyst February 2012 This ESG White Paper was commissioned

More information

Hitachi Data Systems Silver Lining. HDS Enables a Flexible, Fluid Cloud Storage Infrastructure

Hitachi Data Systems Silver Lining. HDS Enables a Flexible, Fluid Cloud Storage Infrastructure White Paper Hitachi Data Systems Silver Lining HDS Enables a Flexible, Fluid Cloud Storage Infrastructure By Terri McClure November, 2010 This ESG White Paper was commissioned by Hitachi Data Systems and

More information

Data Management in the Cloud Era

Data Management in the Cloud Era In This Paper In cloud environments, using multiple point products for data management often results in diminishing returns Single-vendor solutions enable enterprises to leverage their cloud investments

More information

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst ESG Brief The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: ESG data indicates that many enterprise organizations

More information

Product Brief. Overview. Analysis

Product Brief. Overview. Analysis Product Brief NetScout Expands ngenius Monitoring Switch Portfolio Date: January 2013 Author: Bob Laliberte, Senior Analyst and Perry Laberis, Senior Research Associate Abstract: NetScout has announced

More information

IT Resource Management vs. User Empowerment

IT Resource Management vs. User Empowerment Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile

More information

Is cloud CRM really that great?

Is cloud CRM really that great? Is cloud CRM really that great Cloud CRM is considered the new norm in deploying your CRM for smart, forward thinking businesses, but is it really that good Cloud CRM As cloud has matured, it s reached

More information

Date: May 2010 Authors: Mark Peters, Senior Analyst, and Tony Palmer, Senior ESG Lab Engineer

Date: May 2010 Authors: Mark Peters, Senior Analyst, and Tony Palmer, Senior ESG Lab Engineer ESG Lab Review Nexsan Assureon Secure, Online Disk Storage Archive Date: May 2010 Authors: Mark Peters, Senior Analyst, and Tony Palmer, Senior ESG Lab Engineer Abstract: Driven by a mix of increased regulation,

More information

This ESG White Paper was commissioned by Zettaset and is distributed under license from ESG.

This ESG White Paper was commissioned by Zettaset and is distributed under license from ESG. White Paper Closing the Big Data Management and Security Gap By Nik Rouda, Senior Analyst October 2014 This ESG White Paper was commissioned by Zettaset and is distributed under license from ESG. 2 Contents

More information

Sage ERP The top five reasons to deploy your ERP Solution in the cloud

Sage ERP The top five reasons to deploy your ERP Solution in the cloud Sage ERP The top five reasons to deploy your ERP Solution in the cloud 1 Table of contents Executive summary 3 Are you outgrowing your business solution? 3 SMBs want ERP 3 Budget and IT resource constraints

More information

White. Paper. Customer Service & Support in the Age of IT-as-a-Service. July, 2012

White. Paper. Customer Service & Support in the Age of IT-as-a-Service. July, 2012 White Paper Customer Service & Support in the Age of IT-as-a-Service By Terri McClure, Senior Analyst July, 2012 This ESG White Paper was commissioned by EMC and is distributed under license from ESG.

More information

2015 Cloud Security Survey. Security and privacy of sensitive data remains the most disturbing concern for 63% of organizations

2015 Cloud Security Survey. Security and privacy of sensitive data remains the most disturbing concern for 63% of organizations 2015 Cloud Security Survey Security and privacy of sensitive data remains the most disturbing concern for 63% of organizations Introduction Cloud technology is gaining increasing attention from businesses

More information

Avoiding The Hidden Costs

Avoiding The Hidden Costs Avoiding The Hidden Costs of the Cloud Germany Enterprise Results 2013 CONTENTS 4 5 6 7 8 9 10 INTRODUCTION ROGUE CLOUD IMPLEMENTATIONS CLOUD BACK UP AND RECOVERY INEFFICIENT CLOUD STORAGE COMPLIANCE AND

More information

How can Identity and Access Management help me to improve compliance and drive business performance?

How can Identity and Access Management help me to improve compliance and drive business performance? SOLUTION BRIEF: IDENTITY AND ACCESS MANAGEMENT (IAM) How can Identity and Access Management help me to improve compliance and drive business performance? CA Identity and Access Management automates the

More information

Shaping Your IT. Cloud

Shaping Your IT. Cloud Shaping Your IT Cloud Hybrid Cloud Models Enable Organizations to Leverage Existing Resources and Augment IT Services As dynamic business demands continue to place unprecedented burden on technology infrastructure,

More information

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave

More information

A business intelligence agenda for midsize organizations: Six strategies for success

A business intelligence agenda for midsize organizations: Six strategies for success IBM Software Business Analytics IBM Cognos Business Intelligence A business intelligence agenda for midsize organizations: Six strategies for success A business intelligence agenda for midsize organizations:

More information

The Data Center of the Future

The Data Center of the Future 2010, Enterprise Strategy Group, Inc. All Rights Reserved White Paper The Data Center of the Future By Mark Bowker and Lauren Whitehouse March, 2010 This ESG White Paper was commissioned by Veeam and is

More information