ESG

February 19, 2018

SECURITY

Have Your Cake and Eat it Too With Next-Generation Endpoint Security from Cisco

When faced with an either/or situation, people typically prefer not to choose. We want the best of both worlds. Rarely does someone want peanut butter OR jelly. Have cake? You probably want to eat it, too. So, it’s surprising to find new research from ESG shows that while 87% of organizations want a…

June 15, 2017

DATA CENTER

Cisco Hyperflex: The Time for HCI Compromise is Over

Hyperconverged infrastructure (HCI) – it’s a bit of a mouthful but the truth is it’s not half as complicated as it sounds. While the concept has only been mainstream for a few years, HCI is the fastest-growing segment of the market for integrated systems. In fact, Gartner predicts it wil…

June 2, 2017

SECURITY

Less is More – Fewer Cybersecurity Vendors Yield More Effective Security

As I’ve talked about before, many organizations have traditionally relied on a tactical approach to security: encounter a new threat, buy another box. This happened time and time again, resulting in a complex security “frankenstructure” of products. But new independent research from ESG shows that 6…

September 20, 2016

SECURITY

The True Value of Network Security Monitoring

The Enterprise Strategy Group (ESG) conducted research into how cybersecurity professionals view network security monitoring and how they use it in their organization. The report Network Security Monitoring Trends surveyed 200 IT and cybersecurity professionals who have a knowledge of or responsibil…

May 30, 2014

DATA CENTER

A New ESG White Paper: Accelerating Transformation with an Application-centric Approach

At CiscoLive San Francisco held last week, Soni Jiandani, Senior Vice President of Cisco INSBU, highlighted our continued industry momentum for Application Centric Infrastructure.  She discussed customer deployments, new ecosystem partners and the enormous simplification of cloud and application del…

March 6, 2014

SECURITY

Data Security Through the Cloud [summary]

Is the combination of cloud computing and mobility a perfect storm of security threats? Actually, yes. And you should prepare for them as if there is a storm coming. As businesses become increasingly mobile, so does sensitive data. In fact, in a recent survey conducted by ESG, 31% of security profes…

March 6, 2014

DATA CENTER

Data Security Through the Cloud

Is the combination of cloud computing and mobility a perfect storm of security threats? Actually, yes. And you should prepare for them as if there is a storm coming. As businesses become increasingly mobile, so does sensitive data. In fact, in a recent survey conducted by ESG, 31% of security profes…

November 4, 2013

DATA CENTER

Tackling Operational Complexity – Fresh perspectives on role of DataCenter Infrastructure

In less than 48 hours, on Nov 6th, Cisco will officially announce details of its approach to Application Centric Infrastructure based on innovations from Insieme networks. [To join our Webcast with John Chambers and Insieme Soni Jiandani on Wednesday November 6 at 10:30 am EST/7:30 am PST  register…

July 30, 2013

SECURITY

How Secure is Your Secure Access?

In June, I attended the Gartner Security Summit in Washington, D.C. where I was asked by quite a few security executives, “My network folks just bought ISE, but what is ISE and what type of security does it provide?”  Fast forward to July, and I wish I had this SANS review on ISE to offer a month ea…