ESG Research. Executive Summary. By Jon Oltsik, Senior Principal Analyst, and Colm Keegan, Senior Analyst
|
|
- Sheryl Daniel
- 5 years ago
- Views:
Transcription
1 ESG Research Executive Summary The Expanding Role and Importance of Application Delivery Controllers (ADCs) By Jon Oltsik, Senior Principal Analyst, and Colm Keegan, Senior Analyst February 2015 This ESG Research Executive Summary was commissioned by Radware and is distributed under license from ESG.
2 Executive Summary: The Expanding Role and Importance of ADCs 2 Contents Introduction... 3 ADCs Are More Pervasive Than Ever... 3 ADCs Move Beyond Load Balancing... 4 ADCs Have Become a Critical Security Control... 5 The Bigger Truth... 7 All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The Enterprise Strategy Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change from time to time. This publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the express consent of The Enterprise Strategy Group, Inc., is in violation of U.S. copyright law and will be subject to an action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at
3 Introduction Executive Summary: The Expanding Role and Importance of ADCs 3 The Enterprise Strategy Group and Radware recently conducted a collaborative research project that focused on the current utilization and future strategies of application delivery controllers (ADCs). The data presented in this ESG white paper is based upon a survey of 243 IT professionals working at enterprise organizations (i.e., those with more than 1,000 employees) based in North America. The ESG research reveals that the role of ADCs has expanded well beyond the historical perception of hardware- based load balancers. Organizations are deploying ADCs as virtual appliances at an increasing rate and taking advantage of ADC functionality from the network through the application layer. What s most interesting, however, is that ADCs are becoming a critical component of a defense- in- depth security strategy as enterprises fine- tune security policy and enforcement to align with their sensitive business applications. ADCs Are More Pervasive Than Ever Mention ADCs to IT professionals and many will think of massive hardware appliances deployed in data centers at large organizations. This perception may be historically accurate, but recent ESG research indicates that ADCs have become far more ubiquitous. For example: More than half (51%) of enterprise organizations surveyed have at least 21 ADCs in use today. Eighty- two percent (82%) of organizations believe that the total number of ADCs will increase substantially or increase somewhat at their organizations. Clearly, this data demonstrates that ADCs are used extensively in large and small enterprises, supporting hundreds of web applications for business analytics, CRM, e- mail, and HR. Organizations also report that ADCs can deliver numerous other benefits as well 49% say that ADCs deliver higher levels of availability, 47% believe that ADCs provide improved response time, 44% state that ADCs offer better access to applications, and 36% associate ADCs with an enhanced security posture. ESG research also contradicts the image of ADCs as chassis- based hardware devices. While physical ADCs are most common, two- thirds of organizations have deployed a combination of physical and virtual ADCs. Furthermore, virtual ADCs popularity will only increase over the next few years. Why are virtual ADCs becoming so prevalent? IT professionals are implementing virtual ADCs because they let them align ADC processing power with application performance requirements. Virtual ADCs can be customized for specific requirements in multi- tenant environments, and for alignment with provisioning virtual workloads (see Figure 1).
4 Executive Summary: The Expanding Role and Importance of ADCs 4 Figure 1. Factors Driving the Deployment of Virtual ADCs Which of the following factors drove your organizabon to deploy virtual ADC appliances? (Percent of respondents, N=201, mulbple responses accepted) Virtual ADCs let us align ADC processing power with the applicafon performance requirements of individual applicafons Virtual ADCs can be customized for specific requirements in mulf- tenant environments 49% 53% Virtual ADCs can be provisioned easily and in the same fashion as virtual workloads 48% Virtual ADCs can be mapped to a single applicafon for ease of deployment and operafons 48% Virtual ADCs let us align security requirements with individual applicafons 46% Virtual ADCs are cheaper to purchase 38% 0% 10% 20% 40% 50% 60% Source: Enterprise Strategy Group, ADCs Move Beyond Load Balancing Another common misperception is the view that ADCs are no more than network load balancers in spite of years of innovation and a track record of additional features/functionality. The ESG research indicates that enterprises are using many ADC features today far beyond load balancing alone (see Figure 2). For example: Forty- five percent (45%) use ADCs for network- level security tasks like firewalling and network segmentation. This indicates that ADCs have a role within network engineering and operations. Forty- three percent (43%) use the programmable interfaces on their ADCs. This functionality is often used by DevOps to align application requirements with ADC capabilities for performance tuning, application monitoring, and security. Thirty- nine percent (39%) use ADCs for web application firewalls to protect critical applications from attacks like SQL injections, cross- site scripting, and buffer overflow attacks.
5 Executive Summary: The Expanding Role and Importance of ADCs 5 Figure 2. Common ADC Features/Capabilities Utilized by Enterprise Organizations Which of the following addibonal ADC features/capabilibes does your organizabon currently ublize? (Percent of respondents, N=243, mulbple responses accepted) Network level security Programmable interfaces Web Applicafon Firewall (WAF) Caching Web content opfmizafon Applicafon performance monitoring Compression Mulf- tenancy Applicafon specific accelerafon Single sign- on TCP connecfon mulfplexing Content transformafon/rewrite SSL offload We only use simple load balancing capabilifes 1% 24% 23% 45% 43% 39% 37% 37% 35% 33% 29% ADCs Have Become a Critical Security Control 0% 5% 10% 15% 20% 25% 35% 40% 45% 50% Source: Enterprise Strategy Group, When asked to identify their most common challenges in meeting application service- level agreements (SLAs), the most common challenge selected was security problems (chosen by 39% of IT professionals). It should come as no surprise then that ESG research reveals that ADCs are assuming a growing role as critical security controls. For example: Nearly half (49%) of organizations leverage the security capabilities/functionality on all ADCs while 44% leverage the security capabilities/functionality on ADC- supported applications containing sensitive data. ADC security has become a robust layer of a defense- in- depth network security architecture (see Figure 3). For example, many organizations use ADCs for firewalling, IDS/IPSs, and network segmentation that sits behind similar security controls residing at the network perimeter. Why make ADCs another layer of network security defense? To block attacks that circumvent perimeter security controls. This is not an uncommon scenario for enterprise organizations 58% of organizations believe it is extremely likely or somewhat likely that a malicious attack could penetrate the network perimeter leaving the ADC as a last line of defense. Clearly, ADC- based security can help lower risk in this situation.
6 Executive Summary: The Expanding Role and Importance of ADCs 6 Figure 3. ADCs Have Become a Layer of Defense Behind Network Perimeters What is the primary method your organizabon employs to deliver network security services as it relates to protecbng its data center- resident business applicabons? (Percent of respondents, N=243) At the network perimeter on a purpose- built network security device On a physical ADC On a virtual ADC On a general purpose, data center- resident server Don t know Network firewall 33% 23% 14% IPS/IDS (intrusion prevenfon/detecfon system) 28% 32% 23% 16% 2% Secure network segmentafon 28% 12% 1% DDoS defenses 27% 31% 26% 12% 3% Web authenfcafon gateway 27% 27% 16% 1% WAF (web applicafon firewall) 26% 33% 26% 13% 2% Integrafon with other security tools (e.g., SIM, log management, etc.) 24% 37% 24% 13% 1% SSL accelerafon 24% 35% 27% 12% 2% 0% 10% 20% 40% 50% 60% 70% 80% 90% 100% Source: Enterprise Strategy Group, Finally, ADC- based security appears to be gaining momentum for enterprise organizations, as 76% of organizations say that their use of ADC security capabilities/functionality will increase significantly or increase somewhat in the future.
7 The Bigger Truth Executive Summary: The Expanding Role and Importance of ADCs 7 When it comes to ADCs, perception is not reality. For example, many IT professionals still think of ADCs as hardware- based load balancers but the ESG research presented in this brief indicates a different situation. ADCs are being deployed as virtual appliances and this will only increase as organizations embrace private and hybrid cloud architectures. Furthermore, most organizations use ADC functionality well beyond load balancing alone as they utilize them for API integration, caching, web content optimization, etc. While the role of ADCs is certainly expanding, ESG research reveals that this is especially true with regard to information security. In fact, CISOs are using ADCs in an assortment of security use cases such as network firewalls (OSI layers 3 and 4) all the way up to web application firewalls (OSI layer 7). Furthermore, ADCs have become an additional layer of defense beyond perimeter security devices. The IT professionals surveyed for this project understand and are taking advantage of the fundamental strength offered by ADCs. Unlike general- purpose network appliances, ADCs marry network and security functionality with specific web application requirements. As such, they can be fine- tuned at the IT infrastructure, security policy, and even business level, providing a degree of flexibility that is difficult or impossible to implement in other IT technologies. There is a lesson to be learned here: The ESG data suggests that enterprise organizations can be creative with their ADC deployments for performance tuning, application- specific services, and critical system protection. CIOs, CISOs, application owners, and network engineers can benefit by applying ADCs in this fashion.
8 20 Asylum Street Milford, MA Tel: Fax: global.com
Efficient Data Center Virtualization Requires All-flash Storage
White Paper Efficient Data Center Virtualization Requires All-flash Storage By Scott Sinclair, Storage Analyst November 2015 This ESG White Paper was commissioned by Pure Storage and is distributed under
More informationClosing the Hybrid Cloud Security Gap with Cavirin
Enterprise Strategy Group Getting to the bigger truth. Solution Showcase Closing the Hybrid Cloud Security Gap with Cavirin Date: June 2018 Author: Doug Cahill, Senior Analyst Abstract: Most organizations
More informationHyperconverged Infrastructure: Cost-effectively Simplifying IT to Improve Business Agility at Scale
Enterprise Strategy Group Getting to the bigger truth. White Paper Hyperconverged Infrastructure: Cost-effectively Simplifying IT to Improve Business Agility at Scale By Mike Leone, ESG Senior Analyst;
More informationVideo Surveillance Solutions from EMC and Brocade: Scalable and Future-proof
White Paper Video Surveillance Solutions from EMC and Brocade: Scalable and Future-proof By Dan Conde, Analyst December 2015 This ESG White Paper was commissioned by EMC and Brocade and is distributed
More information(TBD GB/hour) was validated by ESG Lab
(TBD GB/hour) was validated by ESG Lab Enterprise Strategy Group Getting to the bigger truth. ESG Lab Review Protecting Virtual Environments with Spectrum Protect Plus from IBM Date: November 2017 Author:
More informationAbstract. The Challenges. ESG Lab Review InterSystems IRIS Data Platform: A Unified, Efficient Data Platform for Fast Business Insight
ESG Lab Review InterSystems Data Platform: A Unified, Efficient Data Platform for Fast Business Insight Date: April 218 Author: Kerry Dolan, Senior IT Validation Analyst Abstract Enterprise Strategy Group
More informationReference Research: Disk-based Storage Capacity Trends Date: September 2012 Author: Bill Lundell, Senior Research Analyst
Research Brief Reference Research: Disk-based Storage Capacity Trends Date: September 2012 Author: Bill Lundell, Senior Research Analyst Abstract: ESG Reference Research includes data-centric reports and
More informationMarket Report. Scale-out 2.0: Simple, Scalable, Services- Oriented Storage. Scale-out Storage Meets the Enterprise. June 2010.
Market Report Scale-out 2.0: Simple, Scalable, Services- Oriented Storage Scale-out Storage Meets the Enterprise By Terri McClure June 2010 Market Report: Scale-out 2.0: Simple, Scalable, Services-Oriented
More informationAbstract: Data Protection Cloud Strategies
Enterprise Strategy Group Getting to the bigger truth. Research Report Abstract: Data Protection Cloud Strategies Considerations for Organizations Seeking to Utilize Cloud Services as Part of Their Data
More informationVeritas Resiliency Platform: The Moniker Is New, but the Pedigree Is Solid
Enterprise Strategy Group Getting to the bigger truth. SOLUTION SHOWCASE Veritas Resiliency Platform: The Moniker Is New, but the Pedigree Is Solid Date: September 2015 Authors: Jason Buffington, Senior
More informationWhite. Paper. The Application Deluge and Visibility Imperative. How to Ensure Network Performance for Your Business-critical Applications.
White Paper The Application Deluge and Visibility Imperative How to Ensure Network Performance for Your Business-critical Applications By Dan Conde, Analyst May 2015 This ESG White Paper was commissioned
More informationStrong Consistency versus Weak Consistency
Enterprise Strategy Group Getting to the bigger truth. White Paper Strong Consistency versus Weak Consistency Why You Should Start from a Position of Strength By Terri McClure, ESG Senior Analyst August
More informationEnabling Hybrid Cloud Transformation
Enterprise Strategy Group Getting to the bigger truth. White Paper Enabling Hybrid Cloud Transformation By Scott Sinclair, ESG Senior Analyst November 2018 This ESG White Paper was commissioned by Primary
More informationTechnical Review Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform
Technical Review Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform Date: October, 2018 Author: Jack Poller, Sr. Analyst The Challenges Enterprise Strategy Group
More informationWho Better than Dell EMC to Offer Best-for-VMware Data Protection?
Enterprise Strategy Group Getting to the bigger truth. Solution Showcase Who Better than Dell EMC to Offer Best-for-VMware Data Protection? Date: August 2017 Author: Jason Buffington, Principal Analyst
More informationDell EMC Hyperconverged Portfolio: Solutions that Cover the Use Case Spectrum
Enterprise Strategy Group Getting to the bigger truth. White Paper Dell EMC Hyperconverged Portfolio: Solutions that Cover the Use Case Spectrum Broad Portfolio that Meets the Wide Variety of Customer
More informationNetApp Clustered Data ONTAP 8.2 Storage QoS Date: June 2013 Author: Tony Palmer, Senior Lab Analyst
ESG Lab Spotlight NetApp Clustered Data ONTAP 8.2 Storage QoS Date: June 2013 Author: Tony Palmer, Senior Lab Analyst Abstract: This ESG Lab Spotlight explores how NetApp Data ONTAP 8.2 Storage QoS can
More informationAbstract. The Challenges. The Solution: Veritas Velocity. ESG Lab Review Copy Data Management with Veritas Velocity
ESG Lab Review Copy Data Management with Veritas Velocity Enterprise Strategy Group Getting to the bigger truth. Date: June 2017 Author: Vinny Choinski, Senior Lab Analyst; and Jason Buffington, Principal
More informationESG Lab Report. Integrated Platforms for Breakthrough Insights. The HP and Microsoft Data Management Portfolio
ESG Lab Report Integrated Platforms for Breakthrough Insights The HP and Microsoft Data Management Portfolio By Brian Garrett, Vice President, ESG Lab May 2013 Lab Validation: HP and Microsoft Data Management
More informationBest Practices in Cloud-powered Data Protection
Enterprise Strategy Group Getting to the bigger truth. Solution Showcase Best Practices in Cloud-powered Data Protection Date: December 2016 Authors: Jason Buffington, Principal Analyst; and Monya Keane,
More informationThe Role of Converged and Hyper-converged Infrastructure in IT Transformation
Enterprise Strategy Group Getting to the bigger truth. ESG Research Insights Brief The Role of Converged and Hyper-converged Infrastructure in IT Transformation The Quantified Effects of Organizational
More informationForeScout Extended Module for Splunk
Enterprise Strategy Group Getting to the bigger truth. ESG Lab Review ForeScout Extended Module for Splunk Date: May 2017 Author: Tony Palmer, Senior Lab Analyst Abstract This report provides a first look
More informationSimplifying and Accelerating the Transition to Hybrid Cloud Environments. By Mark Bowker, Senior Analyst and Bob Laliberte, Senior Analyst
White Paper Simplifying and Accelerating the Transition to Hybrid Cloud Environments Cisco Intercloud Fabric By Mark Bowker, Senior Analyst and Bob Laliberte, Senior Analyst August 2014 This ESG White
More informationWhite. Paper. EMC Isilon Scale-out Without Compromise. July, 2012
White Paper EMC Isilon Scale-out Without Compromise By Terri McClure, Senior Analyst July, 2012 This ESG White Paper was commissioned by EMC and is distributed under license from ESG. 2012, The Enterprise
More informationAnalyzing the Economic Value of HPE ConvergedSystem 700 in Enterprise Environments. By Mark Bowker, Senior Analyst and Adam DeMattia, Research Analyst
Executive Summary Analyzing the Economic Value of HPE ConvergedSystem 700 in Enterprise Environments By Mark Bowker, Senior Analyst and Adam DeMattia, Research Analyst December 2014 This ESG White Paper
More informationCloud Migration Strategies
Enterprise Strategy Group Getting to the bigger truth. Research Insights Paper Cloud Migration Strategies Mapping the Journey to Successful Cloud Adoption By Dan Conde, ESG Analyst; and Leah Matuson, Research
More informationCisco HyperFlex and the F5 BIG-IP Platform Accelerate Infrastructure and Application Deployments
OVERVIEW + Cisco and the F5 BIG-IP Platform Accelerate Infrastructure and Application Deployments KEY BENEFITS Quickly create private clouds Tested with industry-leading BIG-IP ADC platform Easily scale
More informationFlash Storage-based Data Protection with HPE
Enterprise Strategy Group Getting to the bigger truth. Solution Showcase Flash Storage-based Data Protection with HPE Date: August 2018 Author: Christophe Bertrand, Senior Analyst Abstract: Solid-state
More informationESG Lab Review Accelerating Time to Value: Automated SAN and Federated Zoning with HPE 3PAR and Smart SAN for 3PAR
ESG Lab Review Accelerating Time to Value: Automated SAN and Federated Zoning with HPE 3PAR and Smart SAN for 3PAR Date: May 2018 Author: Jack Poller, Senior Analyst Abstract This ESG Lab Review documents
More informationESG Lab Review RingCentral Mobile Voice Quality Assurance
ESG Lab Review RingCentral Mobile Voice Quality Assurance Abstract This ESG Lab Review documents hands-on testing of RingCentral Office to verify its ability to assure high quality of service (QoS) for
More informationShavlik Protect: Simplifying Patch, Threat, and Power Management Date: October 2013 Author: Mike Leone, ESG Lab Analyst
ESG Lab Review Shavlik Protect: Simplifying Patch, Threat, and Power Management Date: October 2013 Author: Mike Leone, ESG Lab Analyst Abstract: This ESG Lab Review documents hands-on testing of Shavlik
More informationEndpoint Security Must Include Rapid Query and Remediation Capabilities
Enterprise Strategy Group Getting to the bigger truth. White Paper: Endpoint Security Must Include Rapid Query and Remediation Capabilities 1 White Paper Endpoint Security Must Include Rapid Query and
More informationLab Validation Report
Lab Validation Report NetApp SnapManager for Oracle Simple, Automated, Oracle Protection By Ginny Roth and Tony Palmer September 2010 Lab Validation: NetApp SnapManager for Oracle 2 Contents Introduction...
More informationVMAX3: Adaptable Enterprise Resiliency
ESG Solution Showcase VMAX3: Adaptable Enterprise Resiliency Date: August 2015 Author: Scott Sinclair, Analyst Abstract: As enterprises respond to the ever- present reality of rapid data growth, IT organizations
More informationThe Emerging Role of a CDN in Facilitating Secure Cloud Deployments
White Paper The Emerging Role of a CDN in Facilitating Secure Cloud Deployments Sponsored by: Fastly Robert Ayoub August 2017 IDC OPINION The ongoing adoption of cloud services and the desire for anytime,
More informationIBM Data Protection for Virtual Environments: Extending IBM Spectrum Protect Solutions to VMware and Hyper-V Environments
The Challenges ESG Lab Review IBM Data Protection for Virtual Environments: Extending IBM Spectrum Protect Solutions to VMware and Hyper-V Environments Date: August 2015 Author: Vinny Choinski, Senior
More informationEnabling IT Transformation with Modern Data Protection Strategies
Enterprise Strategy Group Getting to the bigger truth. ESG Research Insights Brief Enabling IT Transformation with Modern Data Protection Strategies The Quantified Benefits of a Comprehensive Data Protection
More informationDeploying a Next-Generation IPS Infrastructure
Deploying a Next-Generation IPS Infrastructure Enterprises require intrusion prevention systems (IPSs) to protect their network against attacks. However, implementing an IPS involves challenges of scale
More informationCloud Strategies for Addressing IT Challenges
Cloud Strategies for Addressing IT Challenges Mark Bowker Senior Analyst Enterprise Strategy Group Introduction Mark Bowker, Senior Analyst U.S. Headquarters 20 Asylum Street Milford, MA 01757 2011 Enterprise
More informationA Roadmap for BYOD Adoption. By Jon Oltsik, Sr. Principal Analyst, and Bob Laliberte, Sr. Analyst
White Paper A Roadmap for BYOD Adoption By Jon Oltsik, Sr. Principal Analyst, and Bob Laliberte, Sr. Analyst April 2012 This ESG White Paper was commissioned by Enterasys and is distributed under license
More informationRSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst
ESG Lab Review RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst Abstract: This ESG Lab review documents
More informationAbstract. The Challenges. ESG Lab Review Lumeta Spectre: Cyber Situational Awareness
ESG Lab Review Lumeta Spectre: Cyber Situational Awareness Date: September 2017 Author: Tony Palmer, Senior IT Validation Analyst Enterprise Strategy Group Getting to the bigger truth. Abstract ESG Lab
More informationPerformance Evaluation Criteria for Hyperconverged Infrastructures
Enterprise Strategy Group Getting to the bigger truth. White Paper Performance Evaluation Criteria for Hyperconverged Infrastructures Speed, Scale, and Stability By Mike Leone, ESG Senior Analyst November
More informationAlways Available Dell Storage SC Series Date: October 2015 Author: Brian Garrett, VP ESG Lab
ESG Lab Review Always Available Dell Storage SC Series Date: October 2015 Author: Brian Garrett, VP ESG Lab Abstract: This report documents ESG Lab testing of Dell Storage SC Series with a focus on the
More informationAnalyzing the Economic Benefits of the HPE SimpliVity 380 All-flash Hyperconverged Portfolio
Enterprise Strategy Group Getting to the bigger truth. ESG Economic Value Audit Analyzing the Economic Benefits of the HPE SimpliVity 380 All-flash Hyperconverged Portfolio By Mike Leone, Senior IT Validation
More informationAn All-Source Approach to Threat Intelligence Using Recorded Future
nn Enterprise Strategy Group Getting to the bigger truth. Solution Showcase An All-Source Approach to Threat Intelligence Using Recorded Future Date: March 2018 Author: Jon Oltsik, Senior Principal Analyst
More informationSoftware-defined Storage by Veritas
ESG Technology Showcase Software-defined Storage by Veritas Date: August 2015 Author: Scott Sinclair, Analyst Abstract: The days of enterprise storage technology being predominantly constrained to specific
More informationDell EMC Isilon All-Flash
Enterprise Strategy Group Getting to the bigger truth. ESG Lab Validation Dell EMC Isilon All-Flash Scale-out All-flash Storage for Demanding Unstructured Data Workloads By Tony Palmer, Senior Lab Analyst
More information(TBD GB/hour) was validated by ESG Lab
(TBD GB/hour) was validated by ESG Lab Enterprise Strategy Group Getting to the bigger truth. ESG Lab Review Efficiently Protect Virtual Environments with Integrated Data Protection Appliances from Dell
More informationSecuring Your Amazon Web Services Virtual Networks
Securing Your Amazon Web Services s IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up a workload,
More informationBuild Your Zero Trust Security Strategy With Microsegmentation
Why Digital Businesses Need A Granular Network Segmentation Approach GET STARTED Overview The idea of a secure network perimeter is dead. As companies rapidly scale their digital capabilities to deliver
More informationWhite. Paper. The Evolution of IP Storage and Its Impact on the Network. December 2014
White Paper The Evolution of IP Storage and Its Impact on the Network By Scott Sinclair, Analyst December 2014 This ESG White Paper was commissioned by Brocade and is distributed under license from ESG.
More informationNext-generation Connectivity and Security for Enterprise Mobility and Hybrid Cloud Environments
Enterprise Strategy Group Getting to the bigger truth. White Paper Next-generation Connectivity and Security for Enterprise Mobility and Hybrid Cloud Environments By Mark Bowker, ESG Senior Analyst August
More informationSurvey: Global Efficiency Held Back by Infrastructure Spend in Pharmaceutical Industry
Survey: Global Efficiency Held Back by Infrastructure Spend in Pharmaceutical Industry Akamai Survey Shows Pharmaceutical Industry Looking for Global Employee Efficiency but may be Held Back by Heavy Infrastructure
More informationWhite. Paper. Accelerating Transformation with an Application-centric Approach. March 2014
ac White Paper Accelerating Transformation with an Application-centric Approach By Bob Laliberte, Senior Analyst March 2014 This ESG White Paper was commissioned by Cisco and is distributed under license
More informationState of Cloud Survey GERMANY FINDINGS
2011 State of Cloud Survey GERMANY FINDINGS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Cloud security is top goal and top concern.................................. 8 Finding 2: IT staff
More informationHearing Voices: The Cybersecurity Pro s View of the Profession
SESSION ID: AST2-W02 Hearing Voices: The Cybersecurity Pro s View of the Profession Jon Oltsik Senior Principal Analyst and ESG Fellow Enterprise Strategy Group @joltsik Candy Alexander, CISSP CISM International
More informationDeploying a Next-Generation IPS Infrastructure
Deploying a Next-Generation IPS Infrastructure Enterprises require intrusion prevention systems (IPSs) to protect their network against attacks. However, implementing an IPS involves challenges of scale
More informationFlash Storage Fuels IT Transformation
Enterprise Strategy Group Getting to the bigger truth. ESG Research Insights Brief Flash Storage Fuels IT Transformation The Quantified Impacts of Organizational Flash Storage Use Date: May 2018 Authors:
More informationHow your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter
How your network can take on the cloud and win Think beyond traditional networking toward a secure digital perimeter Contents Introduction... 3 Reduce risk points with secure, contextualized access...
More informationESG Lab Review The Performance Benefits of Fibre Channel Compared to iscsi for All-flash Storage Arrays Supporting Enterprise Workloads
Enterprise Strategy Group Getting to the bigger truth. ESG Lab Review The Performance Benefits of Fibre Channel Compared to iscsi for All-flash Storage Arrays Supporting Enterprise Workloads Date: July
More informationPulse Secure Application Delivery
DATA SHEET Pulse Secure Application Delivery HIGHLIGHTS Provides an Application Delivery and Load Balancing solution purposebuilt for high-performance Network Functions Virtualization (NFV) Uniquely customizable,
More informationModernizing Virtual Infrastructures Using VxRack FLEX with ScaleIO
Background As organizations continue to look for ways to modernize their infrastructures by delivering a cloud-like experience onpremises, hyperconverged offerings are exceeding expectations. In fact,
More informationThe State of Cloud Monitoring
REPORT The State of Cloud Monitoring Survey Reveals Visibility is Key to Cloud Security and Performance INTRODUCTION Ixia, a Keysight business, commissioned Dimensional Research to conduct a survey measuring
More informationRunning Splunk on VxRack FLEX
ESG Technical White Paper Running Splunk on VxRack FLEX Background As organizations continue to look for ways to modernize their infrastructures by delivering a cloud-like experience onpremises, hyperconverged
More informationESG Brief. Modern Data Centers: Massive Scale and Complexity. Data Center Networking Discontinuity
ESG Brief IBM and NEC Bring SDN/OpenFlow to Enterprise Data Center Networks Date: January, 2012 Author: Jon Oltsik, Senior Principal Analyst, and Bob Laliberte, Senior Analyst Abstract: Enterprise data
More informationSecuring Your Microsoft Azure Virtual Networks
Securing Your Microsoft Azure Virtual Networks IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up
More informationENABLING SECURE CLOUD CONNECTIVITY. Create a Successful Cloud Strategy with Reliable Connectivity Solutions
ENABLING SECURE CLOUD CONNECTIVITY Create a Successful Cloud Strategy with Reliable Connectivity Solutions TABLE OF CONTENTS Introduction The Data Storage Conundrum Cloud vs. On-premises: Finding the Right
More informationTop 10 most important IT priorities over the next 12 months. (Percent of respondents, N=633, ten responses accepted)
ESG Lab Review Sophos Security Heartbeat Date: January 2016 Author: Tony Palmer, Sr. ESG Lab Analyst; and Jack Poller, ESG Lab Analyst Abstract: This report examines the key attributes of Sophos synchronized
More informationTHE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS
SESSION ID: AST3-R02 THE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS Jon Oltsik Senior Principal Analyst Enterprise Strategy Group @joltsik Candy Alexander, CISSP CISM International Board Director ISSA
More informationAnalyzing the Economic Benefits of Datrium Cloud DVX
Enterprise Strategy Group Getting to the bigger truth. ESG Economic Value Validation Analyzing the Economic Benefits of Datrium Cloud DVX By Kerry Dolan, Senior IT Validation Analyst May 2018 Executive
More informationSolid State Storage: Trends, Pricing Concerns, and Predictions for the Future
Solid State Storage: Trends, Pricing Concerns, and Predictions for the Future Solid state storage is ready for prime time, or so the latest awareness and usage statistics would indicate. Moreover, a recent
More informationImperva Incapsula Survey: What DDoS Attacks Really Cost Businesses
Survey Imperva Incapsula Survey: What DDoS Attacks Really Cost Businesses BY: TIM MATTHEWS 2016, Imperva, Inc. All rights reserved. Imperva and the Imperva logo are trademarks of Imperva, Inc. Contents
More informationESG Lab Review High-fidelity Breach Detection with Acalvio Autonomous Deception
ESG Lab Review High-fidelity Breach Detection with Acalvio Autonomous Deception Date: April 2018 Author: Jack Poller, Senior Analyst Abstract This ESG Lab Review documents hands-on testing of Acalvio ShadowPlex
More informationAbstract. The Challenges. ESG Lab Review Proofpoint Advanced Threat Protection. Figure 1. Top Ten IT Skills Shortages for 2016
ESG Lab Review Proofpoint Advanced Threat Protection Enterprise Strategy Group Getting to the bigger truth. Date: January 2017 Author: Tony Palmer, Senior Lab Analyst; and Jack Poller, Senior Lab Analyst
More informationINTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.
2019 SIEM REPORT INTRODUCTION Security Information and Event Management (SIEM) is a powerful technology that allows security operations teams to collect, correlate and analyze log data from a variety of
More informationResearch Insights Paper
Research Insights Paper Status Quo Creates Security Risk: The State of Incident Response By Jon Oltsik, Senior Principal Analyst February 2016 This ESG Research Insights Paper was commissioned by ServiceNow
More informationWITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:
SOLUTION OVERVIEW: ALERT LOGIC THREAT MANAGER WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE Protecting your business assets and sensitive data requires regular vulnerability assessment,
More informationWHITE PAPER. Applying Software-Defined Security to the Branch Office
Applying Software-Defined Security to the Branch Office Branch Security Overview Increasingly, the branch or remote office is becoming a common entry point for cyber-attacks into the enterprise. Industry
More informationThe Journey to Intent-based Networking
Enterprise Strategy Group Getting to the bigger truth. White Paper The Journey to Intent-based Networking Ten Key Principles for Accelerating Adoption By Bob Laliberte, ESG Senior Analyst January 2018
More informationHOW MIDSIZE ORGANIZATIONS CAN MEET COMPLIANCE REQUIREMENTS AND ENHANCE CYBERSECURITY WITH MICRO-SEGMENTATION WHITE PAPER FEBRUARY 2018
HOW MIDSIZE ORGANIZATIONS CAN MEET COMPLIANCE REQUIREMENTS AND ENHANCE CYBERSECURITY WITH MICRO-SEGMENTATION WHITE PAPER FEBRUARY 2018 Table of Contents A short technology overview 3 How micro-segmentation
More informationSOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT
RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion
More informationMassive Scalability With InterSystems IRIS Data Platform
Massive Scalability With InterSystems IRIS Data Platform Introduction Faced with the enormous and ever-growing amounts of data being generated in the world today, software architects need to pay special
More informationZero Branch IT with Riverbed SteelFusion
Enterprise Strategy Group Getting to the bigger truth. Lab Review Zero Branch IT with Riverbed SteelFusion Date: March 2016 Author: Aviv Kaufmann and Jack Poller, Senior ESG Lab Analysts Abstract: This
More informationIBM Cloud Internet Services: Optimizing security to protect your web applications
WHITE PAPER IBM Cloud Internet Services: Optimizing security to protect your web applications Secure Internet applications and APIs against denialof-service attacks, customer data compromise, and abusive
More informationNext-generation Endpoint Security and Cybereason
Enterprise Strategy Group Getting to the bigger truth. Solution Showcase Next-generation Endpoint Security and Cybereason Date: March 2018 Author: Jon Oltsik, Senior Principal Analyst Abstract: Since the
More informationSecuring the Evolving Enterprise Network Inside and Out
Enterprise Strategy Group Getting to the bigger truth. White Paper Securing the Evolving Enterprise Network Inside and Out By Jon Oltsik, Senior Principal Analyst; and Jack Poller, Analyst April 2017 This
More informationLab Validation Report
Lab Validation Report Limelight Orchestrate Performance Examining the Performance of Dynamic Content Delivery Between Leading Content Delivery Networks By Aviv Kaufmann, ESG Lab Analyst and Brian Garrett,
More informationi365 EVault for Microsoft System Center Data Protection Manager Date: October 2010 Authors: Ginny Roth, Lab Engineer, and Tony Palmer, Senior Engineer
ESG Lab Review i365 EVault for Microsoft System Center Data Protection Manager Date: October 2010 Authors: Ginny Roth, Lab Engineer, and Tony Palmer, Senior Engineer Abstract: This ESG Lab review documents
More informationMiTek Sapphire Build. Scalable Software for Home Building Management. ESG Lab Validation. By Brian Garrett, Vice President, ESG Lab April 2017
Enterprise Strategy Group Getting to the bigger truth. ESG Lab Validation MiTek Sapphire Build Scalable Software for Home Building Management By Brian Garrett, Vice President, ESG Lab April 2017 This ESG
More informationFlex Tenancy :48:27 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement
Flex Tenancy 2015-04-28 17:48:27 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Flex Tenancy... 3 Flex Tenancy... 4 Understanding the Flex Tenancy
More informationBuild application-centric data centers to meet modern business user needs
Build application-centric data centers to meet modern business user needs Citrix.com Table of contents Meeting current business challenges...3 Device package integration...5 Policy-based service insertion...6
More informationHybrid WAN Operations: Extend Network Monitoring Across SD-WAN and Legacy WAN Infrastructure
Hybrid WAN Operations: Extend Network Monitoring Across SD-WAN and Legacy WAN Infrastructure An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for SevOne May 2017 IT & DATA MANAGEMENT RESEARCH,
More informationEnhancing Exchange Mobile Device Security with the F5 BIG-IP Platform
Enhancing Exchange Mobile Device Security with the F5 BIG-IP Platform By the F5 business development team for the Microsoft Global Alliance Version 1.0 Introduction As the use of mobile devices in the
More informationIBM Data Protection for Virtual Environments:
ESG Lab Review IBM Data Protection for Virtual Environments: Tivoli Storage Manager for VMware Version 7.1 and FlashCopy Manager for VMware Version 4.1 Date: August 2014 Author: Vinny Choinski, Senior
More informationSpotlight Report. Information Security. Presented by. Group Partner
Cloud SecuriTY Spotlight Report Group Partner Information Security Presented by OVERVIEW Key FINDINGS Public cloud apps like Office 365 and Salesforce have become a dominant, driving force for change in
More informationBlackBerry WorkLife Persona. The Challenge. The Solution. Datasheet
Datasheet BlackBerry WorkLife Persona The Challenge An increasing number of employees today are using their own devices for work purposes, blurring the line between personal and business usage. This demand
More informationHow to Leverage Containers to Bolster Security and Performance While Moving to Google Cloud
PRESENTED BY How to Leverage Containers to Bolster Security and Performance While Moving to Google Cloud BIG-IP enables the enterprise to efficiently address security and performance when migrating to
More informationTHE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES
THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES TABLE OF CONTENTS 3 Introduction 4 Survey Findings 4 Recent Breaches Span a Broad Spectrum 4 Site Downtime and Enterprise
More informationSTRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking
More information