Research Report. Remote Office/Branch Office Technology Trends. July 2011

Size: px
Start display at page:

Download "Research Report. Remote Office/Branch Office Technology Trends. July 2011"

Transcription

1 Research Report Remote Office/Branch Office Technology Trends By Bill Lundell, Jon Oltsik, and Lauren Whitehouse With John McKnight and Jenn Gahm July Enterprise Strategy Group, Inc. All Rights Reserved.

2 Introduction Research Objectives Research Report: Remote Office/Branch Office Technology Trends In order to determine the IT priorities and challenges currently faced by remote office/branch office (ROBO) locations, and how organizations plan to address those challenges, ESG recently surveyed 454 North American senior IT professionals representing midmarket (100 to 999 employees) and enterprise-class (1,000 employees or more) organizations. All respondents worked at headquarters locations or other centralized corporate sites and were responsible for ROBO IT operations and/or strategy, including the delivery of IT services to these locations, authorization of expenditures, or establishment and enforcement of corporate IT policies for remote/branch offices. Respondent organizations were required to have at least two ROBO locations to qualify for the survey. The survey was designed to answer the following questions: How many ROBO locations do organizations currently support? What is the average number of employees that work at each ROBO location? What is the largest ROBO in terms of number of employees? What percentage of ROBO locations has dedicated on-site IT staff? How do organizations determine which locations qualify for on-site resources? What percentage of an organization s total IT budget is dedicated to supporting ROBOs? What are the top ROBO IT priorities? What are the top networking and security challenges when it comes to supporting the IT needs of remote/branch offices? How are the majority of corporate applications and/or IT services delivered to users at ROBO locations? What benefits do organizations derive from delivering corporate applications and/or IT services to its ROBO locations? What challenges do organizations face in delivering corporate applications and/or IT services to its ROBO locations? What steps have they taken to address these challenges? How many servers do organizations have deployed at a typical ROBO location? How does this vary by the average number of employees per ROBO? How extensive is server virtualization usage at ROBO locations? What benefits has the technology yielded? On average, approximately how much data storage capacity is deployed at the typical ROBO location? How does this vary by the server count or number of employees at the typical ROBO location? What type of external disk storage system is the most widely used at ROBO locations? How does this vary by average ROBO storage capacity levels? What is the primary data protection process organizations deploy at their ROBO locations? For those organizations performing on-site backup operations at ROBOs, is disk or tape the preferred storage media? Who is typically responsible for backup operations and media management at these locations? Do these organizations have any plans to centralize their backup processes? If yes, why? For those organizations backing up their data to a central location, what drove them to this model and what challenges if any have they experienced? Survey participants represented a wide range of industries including manufacturing, financial services, communications and media, health care, retail, government, and business services. For more details, please see the Research Methodology and Respondent Demographics sections of this report.

3 Research Methodology To gather data for this report, ESG conducted a comprehensive online survey of IT managers from private- and public-sector organizations in North America (United States and Canada) between April 19, 2011 and May 2, To qualify for this survey, respondents were required to be senior IT managers working at headquarters locations or other centralized corporate sites and personally responsible for or familiar with the IT operations and strategies at their organization s remote/branch offices. All respondents were provided an incentive to complete the survey in the form of cash awards and/or cash equivalents. After filtering out unqualified respondents, removing duplicate responses, and screening the remaining completed responses (on a number of criteria) for data integrity, we were left with a final total sample of 454 IT managers. Please see the Respondent Demographics section of this report for more information on these respondents. Note: Totals in figures and tables throughout this report may not add up to 100% due to rounding.

4 Respondent Demographics The data presented in this report is based on a survey of 454 qualified respondents. The figures below detail the demographics of the respondent base, including organizations total number of employees, primary industry, and annual revenue. Respondents by Number of Employees The number of employees in respondents organizations is shown in Figure 1. Figure 1. Survey Respondents, by Number of Employees How many total employees does your organization have worldwide? (Percent of respondents, N=454) 20,000 or more, 22% 100 to 249, 12% 250 to 499, 9% 500 to 999, 9% 5,000 to 19,999, 18% 2,500 to 4,999, 13% 1,000 to 2,499, 18% Source: Enterprise Strategy Group, Respondents by Annual Revenue Respondent organizations annual revenue is shown in Figure 2. Figure 2. Survey Respondents, by Annual Revenue What is your organization s total annual revenue ($US)? (Percent of respondents, N=454) Not applicable (e.g., public sector, nonprofit), 11% Less than $50 million, 11% $20 billion or more, 12% $50 million to $99 million, 11% $10 billion to $ billion, 6% $5 billion to $9.999 billion, 8% $1 billion to $4.999 billion, 15% $100 million to $499 million, 15% $500 million to $999 million, 11% Source: Enterprise Strategy Group, 2011.

5 Respondents by Industry Research Report: Remote Office/Branch Office Technology Trends Respondents were asked to identify their organization s primary industry. In total, ESG received completed, qualified respondents from individuals in 19 distinct vertical industries, plus an Other category. Respondents were then grouped into the broader categories shown in Figure 3. Figure 3. Survey Respondents, by Industry What is your organization s primary industry? (Percent of respondents, N=454) Other, 19% Manufacturing, 22% Retail/Wholesale, 7% Business Services (accounting, consulting, legal, etc.), 7% Communications & Media, 9% Health Care, 9% Government (federal/national, state/province/county /municipal/other local government), 10% Financial (banking, securities, insurance), 16% Source: Enterprise Strategy Group, Respondents by Area of Technology Responsibility Respondents current area of technology responsibility is shown in Figure 4. Figure 4. Survey Respondents, by Area of Technology Responsibility Which of the following would you consider to be your primary area of technology responsibility? (Percent of respondents, N=454) Senior IT Management (e.g., CIO, VP/Director of IT, etc.) IT Operations General IT staff Applications/Database Administration Networking/Telecommunications Servers/Systems Administration IT Architecture/Planning Information Security Data Protection (e.g., backup/recovery, archive) Storage Administration Other 7% 6% 6% 4% 3% 2% 1% 2% 11% 14% 45% 0% 10% 20% 30% 40% 50% Source: Enterprise Strategy Group, 2011.

6 Contents List of Figures... 3 List of Tables... 4 Executive Summary... 5 Report Conclusions... 5 Introduction... 7 Research Objectives... 7 Research Findings... 8 Remote Office/Branch Office Demographics... 8 Remote Office/Branch Office IT Priorities Networking Challenges at Remote Office/Branch Office Locations Security Challenges at Remote Office/Branch Office Locations Application Deployment Models for Remote Office/Branch Office Locations On-site IT Infrastructure Supporting ROBO Locations Data Protection Processes for ROBO Locations Research Methodology Respondent Demographics Respondents by Number of Employees Respondents by Annual Revenue Respondents by Industry Respondents by Area of Technology Responsibility... 54

7 List of Figures Figure 1. Total Worldwide ROBO Locations... 8 Figure 2. Employees per ROBO Location: Average vs. Maximum Figure 3. Percent of ROBO Locations with Dedicated On-site IT Staff Figure 4. Percent of ROBO Locations with Dedicated On-site IT Staff, by Average Number of Employees per ROBO Figure 5. How ROBO Locations Qualify for On-site Staff, by Company Size Figure 6. Overall IT Budget Allocated for Support of ROBO Locations Figure 7. Centralized vs. Distributed IT Processes at ROBO Locations Figure 8. Centralized IT Processes, by Percent of ROBOs with On-site IT Staff Figure 9. Top ROBO IT Priorities Figure 10. Biggest ROBO Networking Challenges Figure 11. Biggest ROBO Security Challenges Figure 12. How ROBOs Access Corporate Applications/IT Services Figure 13. Preferred Delivery Models for Specific Applications to ROBO Locations Figure 14. Benefits of Delivering Corporate Applications and/or IT Services over the WAN to ROBO Locations Figure 15. Challenges of Delivering Corporate Applications and/or IT Services over the WAN to ROBO Locations25 Figure 16. Business Impact of Challenges Delivering Corporate Applications and/or IT Services over the WAN to ROBO Locations Figure 17. Improving the Delivery of Corporate Applications and/or IT Services over the WAN to ROBO Locations Figure 18. Benefits of WAN Optimization Technology Figure 19. Plans to Improve the Delivery of Corporate Applications and/or IT Services over the WAN to ROBO Locations Figure 20. Number of Physical Servers at the Typical ROBO Location Figure 21. Usage of Server Virtualization Technology at ROBO Locations Figure 22. Usage of Server Virtualization Technology at ROBO Locations, by Average Server Count per ROBO Figure 23. Benefits of Using Server Virtualization at ROBO Locations Figure 24. Average ROBO Storage Capacity Figure 25. Most Widely Used Disk Storage Systems at ROBO Locations Figure 26. Most Widely Used Disk Storage Systems at ROBO Locations, by Average Storage Capacity per ROBO. 37 Figure 27. Most Significant ROBO Storage Challenges Figure 28. Most Significant ROBO Storage Challenges, by Average Storage Capacity per ROBO Figure 29. Current Primary Data Backup Processes Used at ROBO Locations Figure 30. Plans to Back Up ROBO Data over the WAN to a Centralized Location Figure 31. Drivers for Consideration of Backing Up ROBO Data over the WAN to a Centralized Location Figure 32. Typical On-site Backup Process at ROBO Locations Figure 33. Typical On-site Backup Process at ROBO Locations, 2007 vs Figure 34. Responsibility for On-site Data Protection Figure 35. Drivers for Backing Up ROBO Data Directly over the WAN to a Centralized Corporate Site Figure 36. Challenges Backing Up ROBO Data over the WAN to a Centralized Corporate Site Figure 37. Survey Respondents, by Number of Employees Figure 38. Survey Respondents, by Annual Revenue Figure 39. Survey Respondents, by Industry Figure 40. Survey Respondents, by Area of Technology Responsibility... 54

8 List of Tables Table 1. Total Worldwide ROBO Locations, by Company Size... 8 Table 2. Average Number of Employees per ROBO Location, by Company Size Table 3. Maximum Number of Employees per ROBO Location, by Company Size Table 4. Overall IT Budget Allocated for Support of ROBO Locations, by Number of ROBO Locations and Percent of ROBOs with On-site Staff Table 5. How ROBOs Access Corporate Applications/IT Services Today, by Percent of ROBO Locations with Dedicated On-site IT Staff Table 6. Use of WAN Optimization Technology to Improve the Delivery of Corporate Applications and/or IT Services, by Number of ROBO Locations Table 7. Number of Physical Servers at the Typical ROBO Location, by Average Number of Employees per ROBO 31 Table 8. Average ROBO Storage Capacity, by Average Server Count per ROBO and Average Number of Employees per ROBO Table 9. Top ROBO IT Priorities, by Average Storage Capacity per ROBO Table 10. Significant Increase in Remote Backup Usage at ROBO Locations Since Table 11. Plans to Back Up ROBO Data over the WAN, by Company Size and Number of ROBOs Table 12. Typical On-site Backup Process at ROBOs, by Average Server Count and Storage Capacity per ROBO Table 13. Responsibility for On-site ROBO Data Protection, by Average Server Count and Storage Capacity per ROBO All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The Enterprise Strategy Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change from time to time. This publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the express consent of the Enterprise Strategy Group, Inc., is in violation of U.S. Copyright law and will be subject to an action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at (508)

9 20 Asylum Street Milford, MA Tel: Fax:

Research Report. Abstract: The Impact of Big Data on Data Analytics. September 2011

Research Report. Abstract: The Impact of Big Data on Data Analytics. September 2011 Research Report Abstract: The Impact of Big Data on Data Analytics By Julie Lockner and Bill Lundell With Jennifer Gahm and John McKnight September 2011 2011 Enterprise Strategy Group, Inc. All Rights

More information

Research Report. Abstract: Social Enterprise Adoption Trends. June 2012

Research Report. Abstract: Social Enterprise Adoption Trends. June 2012 Research Report Abstract: Social Enterprise Adoption Trends By Tom Petrocelli, Senior Analyst With Bill Lundell, Senior Research Analyst, and Jenn Gahm, Senior Project Manager June 2012 2012 Enterprise

More information

The Convergence of Big Data Processing and Integrated Infrastructure

The Convergence of Big Data Processing and Integrated Infrastructure Research Report Abstract: The Convergence of Big Data Processing and Integrated Infrastructure By Evan Quinn, Senior Principal Analyst and Bill Lundell, Senior Research Analyst With Brian Babineau, Vice

More information

Online File Sharing and Collaboration: Deployment Model Trends

Online File Sharing and Collaboration: Deployment Model Trends Research Report Abstract: Online File Sharing and Collaboration: Deployment Model Trends By Terri McClure, Senior Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager

More information

Data Protection-as-a-service (DPaaS) Trends

Data Protection-as-a-service (DPaaS) Trends Research Report Abstract: Data Protection-as-a-service (DPaaS) Trends By Jason Buffington, Senior Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager and Adam DeMattia,

More information

Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices

Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices Research Report Abstract: Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices By Jon Oltsik, Senior Principal Analyst With Bill Lundell, Senior Research Analyst and Jennifer Gahm,

More information

Cloud Computing Adoption Trends:

Cloud Computing Adoption Trends: Research Report Abstract: Cloud Computing Adoption Trends: Software- and Infrastructure-as-a-Service Usage Among Enterprise and Midmarket Organizations By Bill Lundell With John McKnight and Jennifer Gahm

More information

Trends in Private Cloud Infrastructure

Trends in Private Cloud Infrastructure Research Report Abstract: Trends in Private Cloud Infrastructure By Mark Bowker, Senior Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager April 2014 Introduction

More information

Platform-as-a-service Language Use Study

Platform-as-a-service Language Use Study Research Report Abstract: Platform-as-a-service Language Use Study By Stephen D. Hendrick, Principal Analyst with Bill Lundell, Senior Research Analyst & Jennifer Gahm, Senior Project Manager February

More information

ESG Research Final Sponsor Report

ESG Research Final Sponsor Report ESG Research Final Sponsor Report The Modernization of Data Protection By Jason Buffington, Senior Analyst and Bill Lundell, Senior Research Analyst With Jenn Gahm, Senior Project Manager April 2012 2012

More information

Enterprise Strategy Group Getting to the bigger truth. By Bill Lundell, Senior Research Analyst and John McKnight, VP Research and Analysts

Enterprise Strategy Group Getting to the bigger truth. By Bill Lundell, Senior Research Analyst and John McKnight, VP Research and Analysts Enterprise Strategy Group Getting to the bigger truth. By Bill Lundell, Senior Research Analyst and John McKnight, VP Research and Analysts March 2015 4 Cloud Computing: Not a Question of If, but Rather

More information

Total year-over-year spending change in networking, 2009-2012. (Percent of respondents) 37% 36% 35% 37% 29% 26% 16% 13% 0% 20% 40% 60% 80%

Total year-over-year spending change in networking, 2009-2012. (Percent of respondents) 37% 36% 35% 37% 29% 26% 16% 13% 0% 20% 40% 60% 80% Research Brief 2012 Networking Spending Trends Date: March 2012 Author: Jon Oltsik, Senior Principal Analyst; Bob Laliberte, Senior Analyst; and Bill Lundell, Senior Research Analyst Abstract: According

More information

Field Audit Report. Asigra. Hybrid Cloud Backup and Recovery Solutions. May, 2009. By Brian Garrett with Tony Palmer

Field Audit Report. Asigra. Hybrid Cloud Backup and Recovery Solutions. May, 2009. By Brian Garrett with Tony Palmer Field Audit Report Asigra Hybrid Cloud Backup and Recovery Solutions By Brian Garrett with Tony Palmer May, 2009 Field Audit: Asigra Hybrid Cloud Backup and Recovery Solutions 2 Contents Introduction...

More information

A Comparative TCO Study: VTLs and Physical Tape. With a Focus on Deduplication and LTO-5 Technology

A Comparative TCO Study: VTLs and Physical Tape. With a Focus on Deduplication and LTO-5 Technology White Paper A Comparative TCO Study: VTLs and Physical Tape With a Focus on Deduplication and LTO-5 Technology By Mark Peters February, 2011 This ESG White Paper is distributed under license from ESG.

More information

White. Paper. Improving Backup Effectiveness and Cost-Efficiency with Deduplication. October, 2010

White. Paper. Improving Backup Effectiveness and Cost-Efficiency with Deduplication. October, 2010 White Paper Improving Backup Effectiveness and Cost-Efficiency with Deduplication By Lauren Whitehouse October, 2010 This ESG White Paper was commissioned by Fujitsu and is distributed under license from

More information

Symantec OpenStorage Date: February 2010 Author: Tony Palmer, Senior ESG Lab Engineer

Symantec OpenStorage Date: February 2010 Author: Tony Palmer, Senior ESG Lab Engineer ESG Lab Review Symantec OpenStorage Date: February 2010 Author: Tony Palmer, Senior ESG Lab Engineer Abstract: This ESG Lab review documents hands-on testing of consolidated management and automated data

More information

Cybersecurity Skills Shortage: A State of Emergency

Cybersecurity Skills Shortage: A State of Emergency Enterprise Strategy Group Getting to the bigger truth. ESG Brief Cybersecurity Skills Shortage: A State of Emergency Date: February 2016 Author: Jon Oltsik, Principal Analyst, Doug Cahill, Senior Analyst,

More information

VDI-Centric Endpoint Security Can Help Lower Costs and Increase ROI

VDI-Centric Endpoint Security Can Help Lower Costs and Increase ROI White Paper VDI-Centric Endpoint Security Can Help Lower Costs and Increase ROI By Jon Oltsik, Senior Principal Analyst June 2012 This ESG White Paper was commissioned by Trend Micro and is distributed

More information

Research Perspectives

Research Perspectives Research Perspectives Paper Network Security Operations and Cloud Computing By Jon Oltsik, Senior Principal Analyst April 2015 This ESG Research Perspectives Paper was commissioned by Tufin and is distributed

More information

White. Paper. The SMB Market is Ready for Data Encryption. January, 2011

White. Paper. The SMB Market is Ready for Data Encryption. January, 2011 White Paper The SMB Market is Ready for Data Encryption By Mark Peters January, 2011 This ESG White Paper was commissioned by Tandberg Data and is distributed under license from ESG. 2011, Enterprise Strategy

More information

Getting on the Road to SDN. Attacking DMZ Security Issues with Advanced Networking Solutions

Getting on the Road to SDN. Attacking DMZ Security Issues with Advanced Networking Solutions White Paper Getting on the Road to SDN Attacking DMZ Security Issues with Advanced Networking Solutions By Bob Laliberte, Senior Analyst March 2014 This ESG White Paper was commissioned by NEC and is distributed

More information

White. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013

White. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013 White Paper Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS By Jon Oltsik, Senior Principal Analyst January 2013 This ESG White Paper was commissioned by McAfee. and is distributed

More information

HGST Object Storage for a New Generation of IT

HGST Object Storage for a New Generation of IT Enterprise Strategy Group Getting to the bigger truth. SOLUTION SHOWCASE HGST Object Storage for a New Generation of IT Date: October 2015 Author: Scott Sinclair, Storage Analyst Abstract: Under increased

More information

EMC Isilon: Data Lake 2.0

EMC Isilon: Data Lake 2.0 ` ESG Solution Showcase EMC Isilon: Data Lake 2.0 Date: November 2015 Author: Scott Sinclair, Analyst Abstract: With the rise of new workloads such as big data analytics and the Internet of Things, data

More information

This ESG White Paper was commissioned by DH2i and is distributed under license from ESG.

This ESG White Paper was commissioned by DH2i and is distributed under license from ESG. White Paper Application Virtualization: An Opportunity for IT to do More with Much Less By Mark Bowker, Senior Analyst November 2012 This ESG White Paper was commissioned by DH2i and is distributed under

More information

Network Security Trends in the Era of Cloud and Mobile Computing

Network Security Trends in the Era of Cloud and Mobile Computing Research Reprt Abstract: Netwrk Security Trends in the Era f Clud and Mbile Cmputing By Jn Oltsik, Senir Principal Analyst and Bill Lundell, Senir Research Analyst With Jennifer Gahm, Senir Prject Manager

More information

MULTI VENDOR ANALYSIS

MULTI VENDOR ANALYSIS MULTI VENDOR ANALYSIS Taming the Impact of Server Virtualization on Networked Storage With Citrix, Microsoft, and NetApp By Mark Bowker June, 2009 Table of Contents ESG WHITE PAPER Table of Contents...

More information

EMC s Enterprise Hadoop Solution. By Julie Lockner, Senior Analyst, and Terri McClure, Senior Analyst

EMC s Enterprise Hadoop Solution. By Julie Lockner, Senior Analyst, and Terri McClure, Senior Analyst White Paper EMC s Enterprise Hadoop Solution Isilon Scale-out NAS and Greenplum HD By Julie Lockner, Senior Analyst, and Terri McClure, Senior Analyst February 2012 This ESG White Paper was commissioned

More information

White. Paper. The Application Deluge and Visibility Imperative: How to ensure network performance for your business-critical applications

White. Paper. The Application Deluge and Visibility Imperative: How to ensure network performance for your business-critical applications White Paper The Application Deluge and Visibility Imperative: How to ensure network performance for your business-critical applications By Bob Laliberte, Senior Analyst November 2013 This ESG White Paper

More information

Solution Brief. Introduction

Solution Brief. Introduction Solution Brief A Checklist when Choosing a Backup Solution for SaaS-based Applications Date: January 2015 Authors: Jason Buffington, Senior Analyst; and Monya Keane, Research Analyst Abstract: What should

More information

White. Paper. The Rise of Network Functions Virtualization. Implications for I/O Strategies in Service Provider Environments.

White. Paper. The Rise of Network Functions Virtualization. Implications for I/O Strategies in Service Provider Environments. White Paper The Rise of Network Functions Virtualization Implications for I/O Strategies in Service Provider Environments By Bob Laliberte, Senior Analyst August 2014 This ESG White Paper was commissioned

More information

SunGard Enterprise Cloud Services Date: March 2012 Author: Mark Bowker, Senior Analyst

SunGard Enterprise Cloud Services Date: March 2012 Author: Mark Bowker, Senior Analyst Cloud Services Brief SunGard Enterprise Cloud Services Date: March 2012 Author: Mark Bowker, Senior Analyst Abstract: Long-time managed services and disaster recovery specialist SunGard is raising its

More information

White. Paper. EMC Isilon: A Scalable Storage Platform for Big Data. April 2014

White. Paper. EMC Isilon: A Scalable Storage Platform for Big Data. April 2014 White Paper EMC Isilon: A Scalable Storage Platform for Big Data By Nik Rouda, Senior Analyst and Terri McClure, Senior Analyst April 2014 This ESG White Paper was commissioned by EMC Isilon and is distributed

More information

Protecting Your Virtualized Data Center with Symantec NetBackup

Protecting Your Virtualized Data Center with Symantec NetBackup White Paper Protecting Your Virtualized Data Center with Symantec NetBackup By Lauren Whitehouse May, 2011 This ESG White Paper was commissioned by Symantec and is distributed under license from ESG. 2011,

More information

Lab Validation Report

Lab Validation Report Lab Validation Report Catalogic DPX Copy Data Services Designed for Intelligent Data Protection and Access By Vinny Choinski, Senior Lab Analyst ant Tony Palmer, Senior Lab Analyst September 2014 Lab Validation:

More information

ESG Threat Intelligence Research Project

ESG Threat Intelligence Research Project TM Enterprise Strategy Group Getting to the bigger truth. ESG Threat Intelligence Research Project May 2015 Jon Oltsik, Senior Principal Analyst Project Overview 304 completed online surveys with IT professionals

More information

How To Improve Storage Efficiency With Ibm Data Protection And Retention

How To Improve Storage Efficiency With Ibm Data Protection And Retention White Paper Storage-efficient Data Protection and Retention By Lauren Whitehouse April, 2011 This ESG White Paper was commissioned by IBM and is distributed under license from ESG. 2011, Enterprise Strategy

More information

Venyu Online Backup and Virtualized Disaster Recovery Date: February 2010 Author: Brian Garrett, Vice President, ESG Lab

Venyu Online Backup and Virtualized Disaster Recovery Date: February 2010 Author: Brian Garrett, Vice President, ESG Lab ESG Lab Review Venyu Online Backup and Virtualized Disaster Recovery Date: February 2010 Author: Brian Garrett, Vice President, ESG Lab Abstract: This ESG Lab Review documents ESG Lab hands-on testing

More information

Leveraging EMC Deduplication Solutions for Backup, Recovery, and Long-term Information Retention

Leveraging EMC Deduplication Solutions for Backup, Recovery, and Long-term Information Retention White Paper Leveraging EMC Deduplication Solutions for Backup, Recovery, and Long-term Information Retention By Brian Babineau and David A. Chapa January, 2011 This ESG White Paper was commissioned by

More information

Enterprise-class Backup Performance with Dell DR6000 Date: May 2014 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Senior Lab Analyst

Enterprise-class Backup Performance with Dell DR6000 Date: May 2014 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Senior Lab Analyst ESG Lab Review Enterprise-class Backup Performance with Dell DR6000 Date: May 2014 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Senior Lab Analyst Abstract: This ESG Lab review documents hands-on

More information

Varonis: Secure Enterprise Collaboration and File Sharing Date: June 2015 Author: Terri McClure, Senior Analyst; and Leah Matuson, Research Analyst

Varonis: Secure Enterprise Collaboration and File Sharing Date: June 2015 Author: Terri McClure, Senior Analyst; and Leah Matuson, Research Analyst ESG Brief Varonis: Secure Enterprise Collaboration and File Sharing Date: June 2015 Author: Terri McClure, Senior Analyst; and Leah Matuson, Research Analyst Abstract: With the burgeoning workplace mobility

More information

Solution Impact. Analysis. NEC Powers ServIT's Custom Hosting Solutions. September, 2011

Solution Impact. Analysis. NEC Powers ServIT's Custom Hosting Solutions. September, 2011 Solution Impact Analysis NEC Powers ServIT's Custom Hosting Solutions By Mark Bowker September, 2011 This ESG publication was commissioned by NEC and is distributed under license from ESG. 2011, Enterprise

More information

Research Report. Abstract: Security Management and Operations: Changes on the Horizon. July 2012

Research Report. Abstract: Security Management and Operations: Changes on the Horizon. July 2012 Research Reprt Abstract: Security Management and Operatins: Changes n the Hrizn By Jn Oltsik, Senir Principal Analyst With Kristine Ka and Jennifer Gahm July 2012 2012, The Enterprise Strategy Grup, Inc.

More information

Next Generation NAS: A market perspective on the recently introduced Snap Server 500 Series

Next Generation NAS: A market perspective on the recently introduced Snap Server 500 Series Next Generation NAS: A market perspective on the recently introduced Snap Server 500 Series ABSTRACT In February 2006, Snap Server announced the 500 Series of Networked Attached Storage systems as well

More information

The Challenge. ESG Case Study

The Challenge. ESG Case Study ESG Case Study Primatics Financial Delivers SaaS-based Solution Excellence Using EMC s XtremIO Date: March 2015 Authors: Mark Peters, Senior Analyst; Adam DeMattia, Market Research Analyst; and Monya Keane,

More information

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst ESG Brief The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: ESG data indicates that many enterprise organizations

More information

Is your organization developing its own custom applications specifically for mobile devices? (Percent of respondents, N=242)

Is your organization developing its own custom applications specifically for mobile devices? (Percent of respondents, N=242) Solution Brief Check Point Capsule for Mobile Computing Security, Operations Efficiency, and Business Enablement Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst; Kyle Prigmore, Research

More information

ESG Brief. Overview. 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved.

ESG Brief. Overview. 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved. ESG Brief Webroot Delivers Enterprise-Class Threat Intelligence to Security Technology Providers and Large Organizations Date: September 2014 Author: Jon Oltsik, Senior Principal Analyst; Kyle Prigmore,

More information

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012 Research Reprt Abstract: The Emerging Intersectin Between Big Data and Security Analytics By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm Nvember 2012 2012 by The Enterprise Strategy Grup, Inc.

More information