Enterprise Strategy Group Getting to the bigger truth. By Bill Lundell, Senior Research Analyst and John McKnight, VP Research and Analysts
|
|
- Merry Stafford
- 8 years ago
- Views:
Transcription
1 Enterprise Strategy Group Getting to the bigger truth. By Bill Lundell, Senior Research Analyst and John McKnight, VP Research and Analysts March 2015
2 4 Cloud Computing: Not a Question of If, but Rather How Extensively 7 Password Management Pain Points 10 Cloud Power Users Lead the Way to Password Management Best Practices 17 The Bigger Truth All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The Enterprise Strategy Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change from time to time. This publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the express consent of The Enterprise Strategy Group, Inc., is in violation of U.S. copyright law and will be subject to an action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at This ESG ebook was commissioned by LogMeIn and is distributed under license from ESG.
3 To gather data for this report, LogMeIn commissioned the Enterprise Strategy Group (ESG) to conduct a comprehensive online survey of both IT decision makers and corporate knowledge workers from private- and public-sector organizations in the United States, Canada, the United Kingdom, Ireland, Australia, and New Zealand between October 24, 2014 and November 11, To qualify for this survey, respondents were required to be either: IT or business professionals personally involved with their organization s evaluation and purchasing process for information technology (IT) products and services, as well as familiar with or responsible for the day-to-day management of their organization s IT environment. Corporate knowledge workers, which ESG defines as employees whose primary work activities include working with, creating, using, and distributing information, and who can perform these job tasks regardless of location. The goal of the survey was to get insight into cloud and mobile computing trends at organizations of all sizes including small (10 to 99 employees), midmarket (100 to 999), and enterprise (1,000 or more employees) from the perspective of those tasked with providing the solutions to support and enable these initiatives, as well as those that ultimately leverage the technology to do their jobs. One of the topics included password management and the effect that cloud computing has had on this task, which is ultimately the focus of this paper. All respondents were provided an incentive to complete the survey in the form of cash awards and/or cash equivalents. After filtering out unqualified respondents, removing duplicate responses, and screening the remaining completed responses (on a number of criteria) for data integrity, we were left with a final total sample of 331 IT and business professionals with insight into or responsibility for the purchase and management of IT products and services, as well as 188 corporate knowledge workers. COMPANY SIZE REGION 100% 80% 60% 40% 12%, 1,000 or more employees 52%, 100 to 999 employees 100% 80% 60% 40% Australia/New 19%, Australia/New Zealand UK/Ireland 20%, UK/Ireland 20% 36%, 10 to 99 employees 20% North 61%, America North America 0% 0% INDUSTRY Information 15%, Information Technology Technology Business 13%, Business Services Services (accounting, (accounting, consulting, consulting, legal, etc.) legal, etc.) 8%, Construction/Engineering Financial 7%, Financial (banking, (banking, securities, securities, insurance) insurance) Other 17%, Other Manufacturing 15%, Manufacturing 15%, Manufacturing Retail/Wholesale 11%, 11%, Retail/Wholesale Retail/Wholesale Education 8%, 8%, Education Education Health 6%, Health Care Care 3
4 The cloud computing deployment model is predicated upon companies ability to instantaneously deploy and, just as importantly, decommission applications and/or computing resources and pay only for what they actually consume, affording such key benefits as reduced IT infrastructure costs and faster resource provisioning. Whether this trend is the result of more disciplined IT spending habits borne out of the economic turbulence of 2008 and 2009, or merely the perceived increase in maturity of cloud computing, one thing is clear: Organizations using these services are enjoying key benefits such as reduced IT infrastructure costs and faster resource provisioning, and are looking for ways to further leverage the cloud. From an end-user (i.e., employee) perspective, the increasingly common mantra of anytime, anywhere, from any device is yet another driver of more widespread cloud adoption and usage since these services are inextricably linked with mobile initiatives due to the fact that mobility requirements demand cloud application usage and cloud application usage begets mobility. 4
5 When ESG asked 331 IT decision makers about the importance of using cloud-based business applications and IT services to their employees ability to perform their primary job functions productively and efficiently, more than one-third (34%) indicated that these services are critical. Not surprisingly, cloud power users are more likely to view cloud-based applications as critical for enabling productive and efficient employees. Specifically, more than half (52%) of those organizations that have offloaded at least five applications/workloads to the cloud consider these services critical compared with only 24% of those with only one cloud-based application. In terms of the proportion of total applications that run in the cloud, the majority of organizations report running no more than 30% of their total application footprint in the cloud, though over the next 36 months, more than half will exceed that threshold (see Figure 1). FIGURE 1 Approximately what percentage of your organization s business applications and IT services are cloud-based today? How do you see this changing over the next three years? (Percent of respondents, N=331) Percent of business applications and IT services that are cloud-based today Percent of business applications and IT services that will be cloud-based 36 months from now 25% 20% 15% 10% 5% 16% 8% 21% 21% 18% 13% 11% 15% 13% 20% 5% 10% 12% 17% 0% Less than 10% 10% to 20% 21% to 30% 31% to 40% 41% to 50% More than 50% Don t know 5
6 However, getting to the cloud has always involved turbulence in the form of security and data availability concerns. In fact, Figure 2 reveals that even among organizations that have undertaken the initial leap of faith and procured at least one cloud-based application, security remains the most widely held concern with more than one-third (38%) of these respondents reporting that security concerns are holding them back from more pervasive usage of these services. This is consistent with cloud computing research previously conducted by ESG. FIGURE 2 In general, which of the following factors if any would you say are preventing your organization from using cloud computing services more pervasively? (Percent of respondents, N=331, multiple responses accepted) Security concerns 38% Performance concerns Budget constraints Network bandwidth costs 24% 26% 26% Too much invested in current IT infrastructure and staff Difficult to ensure a consistent user experience Difficult to enforce company policies across different cloud-based apps and users Feels like IT staff would be giving up too much control Difficult to monitor and manage employee usage Nothing is preventing us from using cloud services more pervasively 18% 18% 17% 16% 15% 16% 6
7 While cloud computing is a relatively new challenge, password management has been one of the banes of IT s existence for quite some time. As proof of this burden, IT decision makers cite password management as one of their top user and application management challenges. This is not surprising given that these respondents report that the average number of password reset requests from a typical employee is nine over the course of a 12 month period, and more than half (55%) of these respondents also say that they believe password management is having a negative impact on employee productivity (see Figure 3). Corporate knowledge workers corroborate this suspicion, with nearly half (47%) indicating that all of the tasks related to password management (i.e., remembering, resetting, etc.) are a drain on their personal productivity. 7
8 FIGURE 3 Do you believe that the need to remember and manage (i.e., set, retrieve, change) multiple passwords for different applications has a negative impact on your employees productivity? (Percent of respondents) Yes 55%, Yes No 41%, No Don t 4%, Don t know know Yes 47%, Yes No 46%, No Don t 7%, Don t know know Perhaps providing additional insight into the struggles IT departments have when it comes to managing their employees passwords involves looking at the strategies or lack thereof for storing and sharing them. As seen in Figure 4, IT relies on rudimentary techniques for storing and sharing passwords, including compiling and maintaining spreadsheets and/or hard-copy lists, as well as relying on memory. FIGURE 4 How does IT currently store and share passwords for all employee applications? Percent of respondents, N=257, multiple responses accepted) Maintain a spreadsheet 47% Rely on memory Other form of electronic storage on PC or mobile device 32% 31% Write them down on a piece of paper 27% 8
9 The increasing use of cloud services only serves to exacerbate these issues, which is illustrated by the fact that organizations with five or more cloud-based applications are three times likelier to include password management among their top user and application management challenges relative to those with only one cloud-based application (see Figure 5). Furthermore, nearly twothirds (63%) of organizations with five or more cloud-based applications identify password management as a productivity drain compared with only 45% of those with only one cloud-based application. It s clear that these problems will only intensify as organizations become more cloudreliant and, as such, IT organizations must adopt password management models that can scale at a cloud rate. FIGURE 5 What are your organization s biggest challenges with respect to managing its users and applications? (Percent of respondents, multiple responses accepted) Password management (i.e., setting and resetting passwords, etc.) 10% 26% 37% 5 or more cloud apps 2 to 4 cloud apps 1 cloud app Respondents report that the average number of password reset requests from a typical employee is nine over the course of a 12 month period. 9
10 In addition to less than effective password management approaches, only 46% of respondents report that their organizations have formal IT policies and processes to help with password creation and rotation; 31% rely on built-in application prompts; and 22% leave password management up to individual employees (the latter is especially true among younger and smaller companies). However, when companies are more cloud-centric, they tend to have taken more steps toward formal IT policies and processes (see Figure 6). Given that these organizations are much more likely to already be experiencing password-related problems, it makes sense that they are at the forefront of realizing that IT must seize control of this situation with policies and process, especially as cloud usage increases. 10
11 FIGURE 6 Existing policies around password creation and rotation for employees, by number of cloud-based applications. (Percent of respondents) IT has formal policies and processes to prompt users with password creation and changes 45% 43% 51% Individual employees are on their own to establish and change passwords We rely on built-in application prompts to direct users to create and change passwords 20% 21% 25% 29% 34% 31% 5 or more cloud apps 2-4 cloud apps 1 cloud app **** of corporate knowledge workers maintain a small rotation of passwords repeatedly. 11
12 As is typically the case, however, having policies in place does not ensure employee compliance. This is no different when it comes to passwords, as shown by the fact that more than half (55%) of corporate knowledge workers maintain a small rotation of passwords repeatedly, in some cases relying on a single password for all of their business applications (see Figure 7). In addition to the fact that individuals are unreliable, relying on built-in application reminders that prompt employees to create and update passwords has its own shortcomings since password strength and complexity often vary from vendor to vendor. This demonstrates a need to complement password management policies and processes with purpose-built tools that can help to monitor and, when necessary, enforce compliance. FIGURE 7 What is your strategy for managing the passwords for all of the various business applications you use to perform your job? (Percent of respondents, N=188) One 15%, password One password for all for applications all applications Small 40%, number Small number of passwords of passwords used repeatedly used repeatedly Unique 36%, Unique password password for every for application every application Use 6%, password Use password manager manager technology technology Other 2%, Other 12
13 The fact that more than half (57%) of organizations report that at least one of their cloud-based applications contains sensitive, regulated, or company-confidential data may provide some insight as to why more concentrated cloud usage begets more concentrated password management focus. Along those lines, it follows that the vast majority of respondents say that IT insight into employees passwords for cloud-based applications is critical or important, and perhaps more telling is the fact that organizations with five or more cloud applications are more than twice as likely as those with one to deem this level of awareness as critical (see Figure 8). FIGURE 8 Importance of IT insight into and/or control of employee passwords for cloud-based applications, by number of cloud-based applications. (Percent of respondents) Critical Important Somewhat important Not important 5 or more cloud apps 45% 46% 8% 1% 2 to 4 cloud apps 24% 55% 18% 3% 1 cloud app 20% 43% 28% 9% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 13
14 Accordingly, these more cloud-dependent organizations are also significantly more likely to be using a wide variety of password management tools and activities across the board (see Figure 9). Among organizations with at least five cloud-based applications, more than half use tools that enforce password changes after a certain amount of time (57%), implement rules about the length and complexity of passwords (53%), and enable centralized monitoring and auditing capabilities (51%). Other commonly relied upon activities include providing single sign-on for employees, as well as the ability to create and terminate employee accounts from a central access point. FIGURE 9 Password management activities organizations leverage for their cloud-based applications and/or services, by number of cloud-based applications. (Percent of respondents, multiple responses accepted) 5 or more cloud apps 2 to 4 cloud apps 1 cloud app Enforce some type of rule around mandatory password changes after a certain length of time 13% 34% 57% Enforce some type of rules around the length and characters used for passwords 23% 38% 53% Monitor and audit user accounts from a central tool and/or location 19% 36% 51% Providing single sign-on capabilities so that employees gain access to cloud-based applications without having to log into each one independently 19% 29% 49% Creating a user account for employees from a central tool and/or location 19% 36% 43% Terminate user accounts from a central tool and/or location 23% 19% 40% We do not have any insight into and/or control of our employees cloud-based application(s) passwords 2% 3% 10% 14
15 Identity access and management (IAM) is a framework for business processes that facilitates the management of electronic identities in order to ensure that access privileges are granted according to one interpretation of policy and all individuals and services are properly authenticated, authorized, and audited. Cloud application vendors are increasingly including IAM as a part of their offerings as the concept of cloud-based IAM services grows in popularity due to the potential for simplified employee access management capabilities at a global scale. Further reinforcing the idea that cloud computing power users serve as the bellwether for best practices when it comes to supporting these services, more than half of organizations with at least five cloud-based applications expressed significant interest in cloud-based IAM. The most commonly cited potential benefits and usage drivers include streamlined identity management tasks, better usage insight across all cloud-based applications, and easier provisioning (see Figure 10). use tools that enforce password changes after a certain amount of time. 15
16 FIGURE 10 Potential benefits of cloud-based IAM, by number of cloud applications in use (Percent of respondents) Streamlines identity management tasks i.e., policies and changes can be made at the user identity level and those changes will flow through all of users cloud application privileges 16% 29% 52% Better insight into usage trends across all cloud-based applications 18% 35% 36% Easily provision or revoke user access to cloudbased applications from a single management console as opposed to many 21% 32% 40% 5 or more cloud apps More consistent implementation of company policies across cloud-based applications 29% 24% 36% 2 to 4 cloud apps Enables single sign-on for users across multiple cloud-based applications 27% 32% 23% 1 cloud app More accurate accounting of active users and associated cloud application license costs 19% 29% 26% Delivered as a service (i.e., service provider is responsible for hosting and managing identity management software and infrastructure) 10% 28% 24% 15
17 Cloud computing is not the latest IT fad, but rather a sustainable technology deployment alternative that allows organizations to offload some or most of the management responsibilities associated with business applications and workloads as a way to cut costs, simplify IT processes, and increase scalability, among other potential benefits. ESG s research confirms not only that the usage of these services is pervasive, but also that organizations plan to increase the applications and workloads that they offload to the cloud. Yet in spite of the widespread acceptance of cloud computing, and regardless of an organization s position on the cloud computing adoption curve, security remains as the most common factor slowing or in some cases, outright preventing the consumption of these services. This issue will serve as a bigger impediment as organizations ponder the decision to move applications containing sensitive data to offsite, third-party resources. Among the security considerations contributing to this apprehension is undoubtedly password management, a problem that plagued IT long before cloud computing became mainstream. Not surprisingly, this task has been further complicated by the usage of cloud computing services as evidenced by the fact that organizations with more cloud-based applications are more likely to cite various password management challenges, though this has also prompted them to take steps to implement or improve the measures they take to support these processes. However, in order for IT staffs to keep pace with the adoption and usage of cloud computing services, they will require solutions that can scale accordingly. As such, the future of password management will likely have strong ties to cloud-resident identity and access management technologies, with cloud power users at the forefront of this movement. Enterprise Strategy Group is an integrated IT research, analysis, and strategy firm that is world renowned for providing actionable insight and intelligence to the global IT community. All Rights Reserved. contact@esg-global.com 17 P
Research Report. Abstract: The Evolution of Server Virtualization. November 2010
Research Report Abstract: The Evolution of Server Virtualization By Mark Bowker and Jon Oltsik With Bill Lundell, John McKnight, and Jenn Gahm November 2010 2010 Enterprise Strategy Group, Inc. All Rights
More information2015 Data Storage Market Trends
Research Report Abstract: 2015 Data Storage Market Trends By Mark Peters, Senior Analyst and Bill Lundell, Senior Research Analyst With Scott Sinclair, Analyst and Jenn Gahm, Senior Project Manager October
More informationResearch Report. Abstract: 2013 Public Cloud Computing Trends. March 2013
Research Report Abstract: 2013 Public Cloud Computing Trends By Wayne Pauley, Senior Analyst and Bill Lundell, Senior Research Analyst With Jenn Gahm, Senior Project Manager March 2013 Introduction Research
More informationThe Shift Toward Data Protection Appliances
Research Report Abstract: The Shift Toward Data Protection Appliances By Jason Buffington, Senior Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager March 2015
More informationThe State of Mobile Computing Security
Research Report Abstract: The State of Mobile Computing Security By Jon Oltsik, Senior Principal Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager February 2014
More informationOnline File Sharing and Collaboration: Deployment Model Trends
Research Report Abstract: Online File Sharing and Collaboration: Deployment Model Trends By Terri McClure, Senior Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager
More informationEnterprise Big Data, Business Intelligence, and Analytics Trends
Research Report Abstract: Enterprise Big Data, Business Intelligence, and Analytics Trends By Nik Rouda, Senior Analyst With Bill Lundell, Senior Research Analyst, and Jennifer Gahm, Senior Project Manager
More informationResearch Report. Abstract: Social Enterprise Adoption Trends. June 2012
Research Report Abstract: Social Enterprise Adoption Trends By Tom Petrocelli, Senior Analyst With Bill Lundell, Senior Research Analyst, and Jenn Gahm, Senior Project Manager June 2012 2012 Enterprise
More informationData Protection-as-a-service (DPaaS) Trends
Research Report Abstract: Data Protection-as-a-service (DPaaS) Trends By Jason Buffington, Senior Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager and Adam DeMattia,
More informationEnterprise Database Trends in a Big Data World
Research Report Abstract: Enterprise Database Trends in a Big Data World By Nik Rouda, Senior Analyst With Bill Lundell, Senior Research Analyst and Jennifer Gahm, Senior Project Manager July 2014 Introduction
More informationPlatform-as-a-service Usage and Satisfaction Study
Research Report Abstract: Platform-as-a-service Usage and Satisfaction Study By Stephen D. Hendrick, Principal Analyst with Bill Lundell, Senior Research Analyst and Jennifer Gahm, Senior Project Manager
More informationTrends in Private Cloud Infrastructure
Research Report Abstract: Trends in Private Cloud Infrastructure By Mark Bowker, Senior Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager April 2014 Introduction
More informationResearch Report. Abstract: The Impact of Big Data on Data Analytics. September 2011
Research Report Abstract: The Impact of Big Data on Data Analytics By Julie Lockner and Bill Lundell With Jennifer Gahm and John McKnight September 2011 2011 Enterprise Strategy Group, Inc. All Rights
More informationResearch Report. Abstract: Solid-state Storage Market Trends. November 2011. By Bill Lundell and Mark Peters With Jennifer Gahm and John McKnight
Research Report Abstract: Solid-state Storage Market Trends By Bill Lundell and Mark Peters With Jennifer Gahm and John McKnight November 2011 2011 Enterprise Strategy Group, Inc. All Rights Reserved.
More informationResearch Report. Abstract: Trends in Data Protection Modernization. August 2012
Research Report Abstract: Trends in Data Protection Modernization By Jason Buffington, Senior Analyst, and Bill Lundell, Senior Research Analyst August 2012 Introduction Research Objectives Research Report:
More informationCorporate Online File Sharing and Collaboration Market Trends
Research Report Abstract: Corporate Online File Sharing and Collaboration Market Trends By Kristine Kao, Market Research Analyst, Terri McClure, Senior Analyst, and Jane Wright, Senior Production Analyst
More informationBackup and Archiving Convergence Trends
Research Report Abstract: Backup and Archiving Convergence Trends By Jason Buffington, Senior Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager April 2014 Introduction
More informationResearch Report. Remote Office/Branch Office Technology Trends. July 2011
Research Report Remote Office/Branch Office Technology Trends By Bill Lundell, Jon Oltsik, and Lauren Whitehouse With John McKnight and Jenn Gahm July 2011 2011 Enterprise Strategy Group, Inc. All Rights
More informationResearch Report. Abstract: Trends for Protecting Highly Virtualized and Private Cloud Environments. June 2013
Research Report Abstract: Trends for Protecting Highly Virtualized and Private Cloud Environments By Jason Buffington, Senior Analyst and Bill Lundell, Senior Research Analyst June 2013 Introduction Research
More informationThe Convergence of Big Data Processing and Integrated Infrastructure
Research Report Abstract: The Convergence of Big Data Processing and Integrated Infrastructure By Evan Quinn, Senior Principal Analyst and Bill Lundell, Senior Research Analyst With Brian Babineau, Vice
More informationResearch Report. Abstract: E-Mail Archiving Market Trends. May 2010. By Brian Babineau With Bill Lundell and John McKnight
Research Report Abstract: E-Mail Archiving Market Trends By Brian Babineau With Bill Lundell and John McKnight May 2010 2010 Enterprise Strategy Group, Inc. All Rights Reserved. Introduction: Research
More informationResearch Report. Abstract: Endpoint Device Backup Trends. December 2010. By Lauren Whitehouse With Bill Lundell and John McKnight
Research Report Abstract: Endpoint Device Backup Trends By Lauren Whitehouse With Bill Lundell and John McKnight December 2010 2010 Enterprise Strategy Group, Inc. All Rights Reserved. Introduction Research
More informationResearch Report. Abstract: The Impact of Server Virtualization on Data Protection. September 2010
Research Report Abstract: The Impact of Server Virtualization on Data Protection By Lauren Whitehouse and Bill Lundell With Jennifer Gahm September 2010 2010 Enterprise Strategy Group, Inc. All Rights
More informationThreat Intelligence and Its Role Within Enterprise Cybersecurity Practices
Research Report Abstract: Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices By Jon Oltsik, Senior Principal Analyst With Bill Lundell, Senior Research Analyst and Jennifer Gahm,
More informationCybersecurity Skills Shortage: A State of Emergency
Enterprise Strategy Group Getting to the bigger truth. ESG Brief Cybersecurity Skills Shortage: A State of Emergency Date: February 2016 Author: Jon Oltsik, Principal Analyst, Doug Cahill, Senior Analyst,
More informationThe Evolving Public Cloud Landscape Date: June 2014 Author: Mark Bowker, Senior Analyst and Bill Lundell, Senior Research Analyst
Research Brief The Evolving Public Cloud Landscape Date: June 2014 Author: Mark Bowker, Senior Analyst and Bill Lundell, Senior Research Analyst Abstract: ESG research indicates that the corporate usage
More informationWeb Application Security Testing Tools and Services
Research Report Abstract: Web Application Security Testing Tools and Services By Jon Oltsik, Senior Principal Analyst, and Jane Wright, Senior Research Analyst With Jennifer Gahm April 2013 Introduction
More informationPlatform-as-a-service Language Use Study
Research Report Abstract: Platform-as-a-service Language Use Study By Stephen D. Hendrick, Principal Analyst with Bill Lundell, Senior Research Analyst & Jennifer Gahm, Senior Project Manager February
More informationCloud Computing Adoption Trends:
Research Report Abstract: Cloud Computing Adoption Trends: Software- and Infrastructure-as-a-Service Usage Among Enterprise and Midmarket Organizations By Bill Lundell With John McKnight and Jennifer Gahm
More informationVaronis: Secure Enterprise Collaboration and File Sharing Date: June 2015 Author: Terri McClure, Senior Analyst; and Leah Matuson, Research Analyst
ESG Brief Varonis: Secure Enterprise Collaboration and File Sharing Date: June 2015 Author: Terri McClure, Senior Analyst; and Leah Matuson, Research Analyst Abstract: With the burgeoning workplace mobility
More informationResearch Report. Abstract: The Impact of Cloud Computing on the Channel. September 2011. By Jeff Hine and Bill Lundell
Research Report Abstract: The Impact of Cloud Computing on the Channel By Jeff Hine and Bill Lundell September 2011 2011 Enterprise Strategy Group, Inc. All Rights Reserved. Introduction Research Objectives
More informationWhite. Paper. EMC Isilon: A Scalable Storage Platform for Big Data. April 2014
White Paper EMC Isilon: A Scalable Storage Platform for Big Data By Nik Rouda, Senior Analyst and Terri McClure, Senior Analyst April 2014 This ESG White Paper was commissioned by EMC Isilon and is distributed
More informationHGST Object Storage for a New Generation of IT
Enterprise Strategy Group Getting to the bigger truth. SOLUTION SHOWCASE HGST Object Storage for a New Generation of IT Date: October 2015 Author: Scott Sinclair, Storage Analyst Abstract: Under increased
More informationWhite. Paper. Evaluating Sync and Share Solutions. Balancing Security, Control, and Productivity. September, 2014
White Paper Evaluating Sync and Share Solutions Balancing Security, Control, and Productivity By Terri McClure, Senior Analyst September, 2014 This ESG White Paper was commissioned by Code42 and is distributed
More informationTotal year-over-year spending change in networking, 2009-2012. (Percent of respondents) 37% 36% 35% 37% 29% 26% 16% 13% 0% 20% 40% 60% 80%
Research Brief 2012 Networking Spending Trends Date: March 2012 Author: Jon Oltsik, Senior Principal Analyst; Bob Laliberte, Senior Analyst; and Bill Lundell, Senior Research Analyst Abstract: According
More informationWhite. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013
White Paper Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS By Jon Oltsik, Senior Principal Analyst January 2013 This ESG White Paper was commissioned by McAfee. and is distributed
More informationResearch Report. Abstract: 2014 Public Cloud Computing Trends. March 2014
Research Report Abstract: 2014 Public Cloud Computing Trends By Wayne Pauley, Senior Analyst and Bill Lundell, Senior Research Analyst With Jenn Gahm, Senior Project Manager March 2014 Introduction Research
More informationIntegrated Computing Platforms: Infrastructure Builds for Tomorrow s Data Center
White Paper Integrated Computing Platforms: Infrastructure Builds for Tomorrow s Data Center By Mark Bowker, Senior Analyst, and Perry Laberis, Senior Research Associate March 2013 This ESG White Paper
More informationSavvyDox: Next-generation Collaboration Bridges the Space Between EFSS and ECM
ESG Solution Showcase SavvyDox: Next-generation Collaboration Bridges the Space Between EFSS and ECM Date: June 2015 Author: Terri McClure, Senior Analyst; and Leah Matuson, Research Analyst Abstract:
More informationResearch Report. Abstract: e-discovery Market Trends. A View from the Legal Department. October 2011
Research Report Abstract: e-discovery Market Trends A View from the Legal Department By Katey Wood and Brian Babineau With Bill Lundell and Jennifer Gahm October 2011 2011 Enterprise Strategy Group, Inc.
More informationThis ESG White Paper was commissioned by DH2i and is distributed under license from ESG.
White Paper Application Virtualization: An Opportunity for IT to do More with Much Less By Mark Bowker, Senior Analyst November 2012 This ESG White Paper was commissioned by DH2i and is distributed under
More informationSaaS with a Face: User Satisfaction in Cloud- based E- mail Management with Mimecast
White Paper SaaS with a Face: User Satisfaction in Cloud- based E- mail Management with Mimecast By Bill Lundell, Senior Research Analyst January 2013 This ESG White Paper was commissioned by Mimecast
More informationMarket Research. Study. Database Security and Compliance Risks. December, 2009. By Jon Oltsik
Market Research Study Database Security and Compliance Risks By Jon Oltsik December, 2009 An ESG Market Research Study Sponsored by Application Security, Inc. 2009, Enterprise Strategy Group, Inc. All
More informationThe Challenge. ESG Case Study
ESG Case Study Primatics Financial Delivers SaaS-based Solution Excellence Using EMC s XtremIO Date: March 2015 Authors: Mark Peters, Senior Analyst; Adam DeMattia, Market Research Analyst; and Monya Keane,
More informationThe Challenge of Securing and Managing Data While Meeting Compliance
ESG Brief Commvault: Integrating Enterprise File Sync and Share Capabilities with Data Protection and Backup Date: September 2015 Author: Terri McClure, Senior Analyst, and Leah Matuson, Research Analyst
More informationSolution Brief. Introduction
Solution Brief A Checklist when Choosing a Backup Solution for SaaS-based Applications Date: January 2015 Authors: Jason Buffington, Senior Analyst; and Monya Keane, Research Analyst Abstract: What should
More informationWhite. Paper. Cloud Computing Demands Enterprise- class Password Management and Security. April 2013
White Paper Cloud Computing Demands Enterprise- class Password Management and Security By Jon Oltsik, Senior Principal Analyst April 2013 This ESG White Paper was commissioned by McAfee (a Division of
More informationData Protection Services Should Be About Services, as Well as Data Protection Date: February 2013 Author: Jason Buffington, Senior Analyst
Company Brief Data Protection Services Should Be About Services, as Well as Data Protection Date: February 2013 Author: Jason Buffington, Senior Analyst Abstract: Organizations trying to modernize or fix
More informationSunGard Enterprise Cloud Services Date: March 2012 Author: Mark Bowker, Senior Analyst
Cloud Services Brief SunGard Enterprise Cloud Services Date: March 2012 Author: Mark Bowker, Senior Analyst Abstract: Long-time managed services and disaster recovery specialist SunGard is raising its
More informationHow To Understand The Needs Of The Network
White Paper The Modern Network Monitoring Mandate By Bob Laliberte, Senior Analyst April 2014 This ESG White Paper was commissioned by Emulex and is distributed under license from ESG. White Paper: The
More informationMULTI VENDOR ANALYSIS
MULTI VENDOR ANALYSIS Taming the Impact of Server Virtualization on Networked Storage With Citrix, Microsoft, and NetApp By Mark Bowker June, 2009 Table of Contents ESG WHITE PAPER Table of Contents...
More informationField Audit Report. Asigra. Hybrid Cloud Backup and Recovery Solutions. May, 2009. By Brian Garrett with Tony Palmer
Field Audit Report Asigra Hybrid Cloud Backup and Recovery Solutions By Brian Garrett with Tony Palmer May, 2009 Field Audit: Asigra Hybrid Cloud Backup and Recovery Solutions 2 Contents Introduction...
More informationWhite. Paper. Building Next Generation Data Centers. Implications for I/O Strategies. August 2014
White Paper Building Next Generation Data Centers Implications for I/O Strategies By Bob Laliberte, Senior Analyst August 2014 This ESG White Paper was commissioned by Emulex and is distributed under license
More informationWhite. Paper. The Application Deluge and Visibility Imperative: How to ensure network performance for your business-critical applications
White Paper The Application Deluge and Visibility Imperative: How to ensure network performance for your business-critical applications By Bob Laliberte, Senior Analyst November 2013 This ESG White Paper
More informationEnterprise-class Backup Performance with Dell DR6000 Date: May 2014 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Senior Lab Analyst
ESG Lab Review Enterprise-class Backup Performance with Dell DR6000 Date: May 2014 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Senior Lab Analyst Abstract: This ESG Lab review documents hands-on
More informationGetting on the Road to SDN. Attacking DMZ Security Issues with Advanced Networking Solutions
White Paper Getting on the Road to SDN Attacking DMZ Security Issues with Advanced Networking Solutions By Bob Laliberte, Senior Analyst March 2014 This ESG White Paper was commissioned by NEC and is distributed
More informationRESEARCH REPORT. Abstract. Storage Resource Management Market on the Launch Pad. By Mary Turner and Bob Laliberte With John McKnight and Jennifer Gahm
RESEARCH REPORT Abstract Storage Resource Management Market on the Launch Pad By Mary Turner and Bob Laliberte With John McKnight and Jennifer Gahm October 2007 Introduction Research Objectives The term
More informationWhite. Paper. Benefiting from Server Virtualization. Beyond Initial Workload Consolidation. June, 2010
White Paper Benefiting from Server Virtualization Beyond Initial Workload Consolidation By Mark Bowker June, 2010 This ESG White Paper was commissioned by VMware and is distributed under license from ESG.
More informationTransporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst
ESG Lab Test Drive Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst Abstract: This report documents the results of an ESG Lab Test
More informationWhite. Paper. Big Data Advisory Service. September, 2011
White Paper Big Data Advisory Service By Julie Lockner& Tom Kornegay September, 2011 This ESG White Paper was commissioned by EMC Corporation and is distributed under license from ESG. 2011, Enterprise
More informationCompensating Security Controls for Windows Server 2003 Security
ESG Solution Showcase Compensating Security Controls for Windows Server 2003 Security Date: May 2015 Author: Jon Oltsik, Senior Principal Analyst Abstract: It is common knowledge by now that Microsoft
More informationResearch Perspectives
Research Perspectives Paper Network Security Operations and Cloud Computing By Jon Oltsik, Senior Principal Analyst April 2015 This ESG Research Perspectives Paper was commissioned by Tufin and is distributed
More informationSymantec OpenStorage Date: February 2010 Author: Tony Palmer, Senior ESG Lab Engineer
ESG Lab Review Symantec OpenStorage Date: February 2010 Author: Tony Palmer, Senior ESG Lab Engineer Abstract: This ESG Lab review documents hands-on testing of consolidated management and automated data
More informationSecurity Intelligence: A Key Component of Big Data Security Analytics Date: December 2012 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Security Intelligence: A Key Component of Big Data Security Analytics Date: December 2012 Author: Jon Oltsik, Senior Principal Analyst Abstract: The intersection of big data and security analytics
More informationWhite. Paper. Extracting the Value of Big Data with HP StoreAll Storage and Autonomy. December 2012
White Paper Extracting the Value of Big Data with HP StoreAll Storage and Autonomy By Terri McClure, Senior Analyst and Katey Wood, Analyst December 2012 This ESG White Paper was commissioned by HP and
More informationEMC Isilon: Data Lake 2.0
` ESG Solution Showcase EMC Isilon: Data Lake 2.0 Date: November 2015 Author: Scott Sinclair, Analyst Abstract: With the rise of new workloads such as big data analytics and the Internet of Things, data
More informationSecure File Sync & Share with Acronis Access Advanced Date: July 2015 Author: Kerry Dolan, Lab Analyst
ESG Lab Spotlight Secure File Sync & Share with Acronis Access Advanced Date: July 2015 Author: Kerry Dolan, Lab Analyst Abstract: This ESG Lab Spotlight provides a high level look at the Acronis Access
More informationWhite. Paper. Rethinking Endpoint Security. February 2015
White Paper Rethinking Endpoint Security By Jon OItsik, Senior Principal Analyst With Kyle Prigmore, Associate Analyst February 2015 This ESG White Paper was commissioned by RSA Security and is distributed
More informationTop Eight Identity & Access Management Challenges with SaaS Applications. Okta White Paper
Top Eight Identity & Access Management Challenges with SaaS Applications Okta White Paper Table of Contents The Importance of Identity for SaaS Applications... 2 1. End User Password Fatigue... 2 2. Failure-Prone
More informationESG Brief. Overview. 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved.
ESG Brief Webroot Delivers Enterprise-Class Threat Intelligence to Security Technology Providers and Large Organizations Date: September 2014 Author: Jon Oltsik, Senior Principal Analyst; Kyle Prigmore,
More informationVirtual Patch Management Offers Automation, Availability, and Cost Benefits Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Virtual Patch Management Offers Automation, Availability, and Cost Benefits Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: Timely patch management is a security best practice,
More informationESG Research Final Sponsor Report
ESG Research Final Sponsor Report The Modernization of Data Protection By Jason Buffington, Senior Analyst and Bill Lundell, Senior Research Analyst With Jenn Gahm, Senior Project Manager April 2012 2012
More informationIs your organization developing its own custom applications specifically for mobile devices? (Percent of respondents, N=242)
Solution Brief Check Point Capsule for Mobile Computing Security, Operations Efficiency, and Business Enablement Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst; Kyle Prigmore, Research
More informationSecure Enterprise Online File Sharing with Syncplicity Date: November 2014 Author: Tony Palmer, Senior Lab Analyst, Aviv Kaufmann, Lab Analyst
ESG Lab Review Secure Enterprise Online File Sharing with Syncplicity Date: November 2014 Author: Tony Palmer, Senior Lab Analyst, Aviv Kaufmann, Lab Analyst Abstract: Organizations are challenged in today
More informationWhite Paper: Nasuni Cloud NAS. Nasuni Cloud NAS. Combining the Best of Cloud and On-premises Storage
Combining the Best of Cloud and On-premises Storage Introduction Organizations rely on corporate data for everything from product design to order processing. Files are the lifeblood of the modern enterprise
More informationIdentity & Access Management in the Cloud: Fewer passwords, more productivity
WHITE PAPER Strategic Marketing Services Identity & Access Management in the Cloud: Fewer passwords, more productivity Cloud services are a natural for small and midsize businesses, with their ability
More informationCitrix: NetScaler and CloudBridge Solutions on AWS
ESG Solution Showcase Citrix: NetScaler and CloudBridge Solutions on AWS Date: September 2015 Author: Mark Bowker, Senior Analyst; and Leah Matuson, Research Analyst Abstract: With exploding data growth,
More informationAvoiding The Hidden Costs. of the Cloud
Avoiding The Hidden Costs of the Cloud 2013 CONTENTS 4 5 6 7 8 9 10 INTRODUCTION ROGUE CLOUD IMPLEMENTATIONS CLOUD BACK UP AND RECOVERY INEFFICIENT CLOUD STORAGE COMPLIANCE AND ediscovery SSL CERTIFICATE
More informationSymantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape
WHITE PAPER: SYMANTEC GLOBAL INTELLIGENCE NETWORK 2.0.... ARCHITECTURE.................................... Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Who
More informationWhite. Paper. Desktop Virtualization, Management, and Security. November, 2009. By Jon Oltsik, Principal Analyst and Mark Bowker, Senior Analyst
White Paper Desktop Virtualization, Management, and Security By Jon Oltsik, Principal Analyst and Mark Bowker, Senior Analyst November, 2009 2009, Enterprise Strategy Group, Inc. All Rights Reserved Contents
More informationIdentity Access Management: Beyond Convenience
Identity Access Management: Beyond Convenience June 1st, 2014 Identity and Access Management (IAM) is the official description of the space in which OneLogin operates in but most people who are looking
More informationSECURITY IN THE CLOUDS: THE BUSINESS CHALLENGE
SECURITY IN THE CLOUDS: THE BUSINESS CHALLENGE originally printed in tom sitpro February 2012 PART 1: A FUNDAMENTAL SHIFT Cloud solutions fundamentally shift the way that computing services are delivered.
More informationEMC s Enterprise Hadoop Solution. By Julie Lockner, Senior Analyst, and Terri McClure, Senior Analyst
White Paper EMC s Enterprise Hadoop Solution Isilon Scale-out NAS and Greenplum HD By Julie Lockner, Senior Analyst, and Terri McClure, Senior Analyst February 2012 This ESG White Paper was commissioned
More informationHitachi Data Systems Silver Lining. HDS Enables a Flexible, Fluid Cloud Storage Infrastructure
White Paper Hitachi Data Systems Silver Lining HDS Enables a Flexible, Fluid Cloud Storage Infrastructure By Terri McClure November, 2010 This ESG White Paper was commissioned by Hitachi Data Systems and
More informationData Management in the Cloud Era
In This Paper In cloud environments, using multiple point products for data management often results in diminishing returns Single-vendor solutions enable enterprises to leverage their cloud investments
More informationThe Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: ESG data indicates that many enterprise organizations
More informationProduct Brief. Overview. Analysis
Product Brief NetScout Expands ngenius Monitoring Switch Portfolio Date: January 2013 Author: Bob Laliberte, Senior Analyst and Perry Laberis, Senior Research Associate Abstract: NetScout has announced
More informationIT Resource Management vs. User Empowerment
Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile
More informationIs cloud CRM really that great?
Is cloud CRM really that great Cloud CRM is considered the new norm in deploying your CRM for smart, forward thinking businesses, but is it really that good Cloud CRM As cloud has matured, it s reached
More informationDate: May 2010 Authors: Mark Peters, Senior Analyst, and Tony Palmer, Senior ESG Lab Engineer
ESG Lab Review Nexsan Assureon Secure, Online Disk Storage Archive Date: May 2010 Authors: Mark Peters, Senior Analyst, and Tony Palmer, Senior ESG Lab Engineer Abstract: Driven by a mix of increased regulation,
More informationThis ESG White Paper was commissioned by Zettaset and is distributed under license from ESG.
White Paper Closing the Big Data Management and Security Gap By Nik Rouda, Senior Analyst October 2014 This ESG White Paper was commissioned by Zettaset and is distributed under license from ESG. 2 Contents
More informationSage ERP The top five reasons to deploy your ERP Solution in the cloud
Sage ERP The top five reasons to deploy your ERP Solution in the cloud 1 Table of contents Executive summary 3 Are you outgrowing your business solution? 3 SMBs want ERP 3 Budget and IT resource constraints
More informationWhite. Paper. Customer Service & Support in the Age of IT-as-a-Service. July, 2012
White Paper Customer Service & Support in the Age of IT-as-a-Service By Terri McClure, Senior Analyst July, 2012 This ESG White Paper was commissioned by EMC and is distributed under license from ESG.
More information2015 Cloud Security Survey. Security and privacy of sensitive data remains the most disturbing concern for 63% of organizations
2015 Cloud Security Survey Security and privacy of sensitive data remains the most disturbing concern for 63% of organizations Introduction Cloud technology is gaining increasing attention from businesses
More informationAvoiding The Hidden Costs
Avoiding The Hidden Costs of the Cloud Germany Enterprise Results 2013 CONTENTS 4 5 6 7 8 9 10 INTRODUCTION ROGUE CLOUD IMPLEMENTATIONS CLOUD BACK UP AND RECOVERY INEFFICIENT CLOUD STORAGE COMPLIANCE AND
More informationHow can Identity and Access Management help me to improve compliance and drive business performance?
SOLUTION BRIEF: IDENTITY AND ACCESS MANAGEMENT (IAM) How can Identity and Access Management help me to improve compliance and drive business performance? CA Identity and Access Management automates the
More informationShaping Your IT. Cloud
Shaping Your IT Cloud Hybrid Cloud Models Enable Organizations to Leverage Existing Resources and Augment IT Services As dynamic business demands continue to place unprecedented burden on technology infrastructure,
More informationAddressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
More informationA business intelligence agenda for midsize organizations: Six strategies for success
IBM Software Business Analytics IBM Cognos Business Intelligence A business intelligence agenda for midsize organizations: Six strategies for success A business intelligence agenda for midsize organizations:
More informationThe Data Center of the Future
2010, Enterprise Strategy Group, Inc. All Rights Reserved White Paper The Data Center of the Future By Mark Bowker and Lauren Whitehouse March, 2010 This ESG White Paper was commissioned by Veeam and is
More information