ESG
Have Your Cake and Eat it Too With Next-Generation Endpoint Security from Cisco
When faced with an either/or situation, people typically prefer not to choose. We want the best of both worlds. Rarely does someone want peanut butter OR jelly. Have cake? You probably want to eat it, too. So, it’s surprising to find new research from ESG shows that while 87% of organizations want a…
Cisco Hyperflex: The Time for HCI Compromise is Over
Hyperconverged infrastructure (HCI) – it’s a bit of a mouthful but the truth is it’s not half as complicated as it sounds. While the concept has only been mainstream for a few years, HCI is the fastest-growing segment of the market for integrated systems. In fact, Gartner predicts it wil…
Less is More – Fewer Cybersecurity Vendors Yield More Effective Security
As I’ve talked about before, many organizations have traditionally relied on a tactical approach to security: encounter a new threat, buy another box. This happened time and time again, resulting in a complex security “frankenstructure” of products. But new independent research from ESG shows that 6…
The True Value of Network Security Monitoring
The Enterprise Strategy Group (ESG) conducted research into how cybersecurity professionals view network security monitoring and how they use it in their organization. The report Network Security Monitoring Trends surveyed 200 IT and cybersecurity professionals who have a knowledge of or responsibil…
A New ESG White Paper: Accelerating Transformation with an Application-centric Approach
At CiscoLive San Francisco held last week, Soni Jiandani, Senior Vice President of Cisco INSBU, highlighted our continued industry momentum for Application Centric Infrastructure. She discussed customer deployments, new ecosystem partners and the enormous simplification of cloud and application del…
Data Security Through the Cloud [summary]
Is the combination of cloud computing and mobility a perfect storm of security threats? Actually, yes. And you should prepare for them as if there is a storm coming. As businesses become increasingly mobile, so does sensitive data. In fact, in a recent survey conducted by ESG, 31% of security profes…
Data Security Through the Cloud
Is the combination of cloud computing and mobility a perfect storm of security threats? Actually, yes. And you should prepare for them as if there is a storm coming. As businesses become increasingly mobile, so does sensitive data. In fact, in a recent survey conducted by ESG, 31% of security profes…
Tackling Operational Complexity – Fresh perspectives on role of DataCenter Infrastructure
In less than 48 hours, on Nov 6th, Cisco will officially announce details of its approach to Application Centric Infrastructure based on innovations from Insieme networks. [To join our Webcast with John Chambers and Insieme Soni Jiandani on Wednesday November 6 at 10:30 am EST/7:30 am PST register…
How Secure is Your Secure Access?
In June, I attended the Gartner Security Summit in Washington, D.C. where I was asked by quite a few security executives, “My network folks just bought ISE, but what is ISE and what type of security does it provide?” Fast forward to July, and I wish I had this SANS review on ISE to offer a month ea…