ESG Research. Executive Summary. By Jon Oltsik, Senior Principal Analyst, and Colm Keegan, Senior Analyst

Size: px
Start display at page:

Download "ESG Research. Executive Summary. By Jon Oltsik, Senior Principal Analyst, and Colm Keegan, Senior Analyst"

Transcription

1 ESG Research Executive Summary The Expanding Role and Importance of Application Delivery Controllers (ADCs) By Jon Oltsik, Senior Principal Analyst, and Colm Keegan, Senior Analyst February 2015 This ESG Research Executive Summary was commissioned by Radware and is distributed under license from ESG.

2 Executive Summary: The Expanding Role and Importance of ADCs 2 Contents Introduction... 3 ADCs Are More Pervasive Than Ever... 3 ADCs Move Beyond Load Balancing... 4 ADCs Have Become a Critical Security Control... 5 The Bigger Truth... 7 All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The Enterprise Strategy Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change from time to time. This publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the express consent of The Enterprise Strategy Group, Inc., is in violation of U.S. copyright law and will be subject to an action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at

3 Introduction Executive Summary: The Expanding Role and Importance of ADCs 3 The Enterprise Strategy Group and Radware recently conducted a collaborative research project that focused on the current utilization and future strategies of application delivery controllers (ADCs). The data presented in this ESG white paper is based upon a survey of 243 IT professionals working at enterprise organizations (i.e., those with more than 1,000 employees) based in North America. The ESG research reveals that the role of ADCs has expanded well beyond the historical perception of hardware- based load balancers. Organizations are deploying ADCs as virtual appliances at an increasing rate and taking advantage of ADC functionality from the network through the application layer. What s most interesting, however, is that ADCs are becoming a critical component of a defense- in- depth security strategy as enterprises fine- tune security policy and enforcement to align with their sensitive business applications. ADCs Are More Pervasive Than Ever Mention ADCs to IT professionals and many will think of massive hardware appliances deployed in data centers at large organizations. This perception may be historically accurate, but recent ESG research indicates that ADCs have become far more ubiquitous. For example: More than half (51%) of enterprise organizations surveyed have at least 21 ADCs in use today. Eighty- two percent (82%) of organizations believe that the total number of ADCs will increase substantially or increase somewhat at their organizations. Clearly, this data demonstrates that ADCs are used extensively in large and small enterprises, supporting hundreds of web applications for business analytics, CRM, e- mail, and HR. Organizations also report that ADCs can deliver numerous other benefits as well 49% say that ADCs deliver higher levels of availability, 47% believe that ADCs provide improved response time, 44% state that ADCs offer better access to applications, and 36% associate ADCs with an enhanced security posture. ESG research also contradicts the image of ADCs as chassis- based hardware devices. While physical ADCs are most common, two- thirds of organizations have deployed a combination of physical and virtual ADCs. Furthermore, virtual ADCs popularity will only increase over the next few years. Why are virtual ADCs becoming so prevalent? IT professionals are implementing virtual ADCs because they let them align ADC processing power with application performance requirements. Virtual ADCs can be customized for specific requirements in multi- tenant environments, and for alignment with provisioning virtual workloads (see Figure 1).

4 Executive Summary: The Expanding Role and Importance of ADCs 4 Figure 1. Factors Driving the Deployment of Virtual ADCs Which of the following factors drove your organizabon to deploy virtual ADC appliances? (Percent of respondents, N=201, mulbple responses accepted) Virtual ADCs let us align ADC processing power with the applicafon performance requirements of individual applicafons Virtual ADCs can be customized for specific requirements in mulf- tenant environments 49% 53% Virtual ADCs can be provisioned easily and in the same fashion as virtual workloads 48% Virtual ADCs can be mapped to a single applicafon for ease of deployment and operafons 48% Virtual ADCs let us align security requirements with individual applicafons 46% Virtual ADCs are cheaper to purchase 38% 0% 10% 20% 40% 50% 60% Source: Enterprise Strategy Group, ADCs Move Beyond Load Balancing Another common misperception is the view that ADCs are no more than network load balancers in spite of years of innovation and a track record of additional features/functionality. The ESG research indicates that enterprises are using many ADC features today far beyond load balancing alone (see Figure 2). For example: Forty- five percent (45%) use ADCs for network- level security tasks like firewalling and network segmentation. This indicates that ADCs have a role within network engineering and operations. Forty- three percent (43%) use the programmable interfaces on their ADCs. This functionality is often used by DevOps to align application requirements with ADC capabilities for performance tuning, application monitoring, and security. Thirty- nine percent (39%) use ADCs for web application firewalls to protect critical applications from attacks like SQL injections, cross- site scripting, and buffer overflow attacks.

5 Executive Summary: The Expanding Role and Importance of ADCs 5 Figure 2. Common ADC Features/Capabilities Utilized by Enterprise Organizations Which of the following addibonal ADC features/capabilibes does your organizabon currently ublize? (Percent of respondents, N=243, mulbple responses accepted) Network level security Programmable interfaces Web Applicafon Firewall (WAF) Caching Web content opfmizafon Applicafon performance monitoring Compression Mulf- tenancy Applicafon specific accelerafon Single sign- on TCP connecfon mulfplexing Content transformafon/rewrite SSL offload We only use simple load balancing capabilifes 1% 24% 23% 45% 43% 39% 37% 37% 35% 33% 29% ADCs Have Become a Critical Security Control 0% 5% 10% 15% 20% 25% 35% 40% 45% 50% Source: Enterprise Strategy Group, When asked to identify their most common challenges in meeting application service- level agreements (SLAs), the most common challenge selected was security problems (chosen by 39% of IT professionals). It should come as no surprise then that ESG research reveals that ADCs are assuming a growing role as critical security controls. For example: Nearly half (49%) of organizations leverage the security capabilities/functionality on all ADCs while 44% leverage the security capabilities/functionality on ADC- supported applications containing sensitive data. ADC security has become a robust layer of a defense- in- depth network security architecture (see Figure 3). For example, many organizations use ADCs for firewalling, IDS/IPSs, and network segmentation that sits behind similar security controls residing at the network perimeter. Why make ADCs another layer of network security defense? To block attacks that circumvent perimeter security controls. This is not an uncommon scenario for enterprise organizations 58% of organizations believe it is extremely likely or somewhat likely that a malicious attack could penetrate the network perimeter leaving the ADC as a last line of defense. Clearly, ADC- based security can help lower risk in this situation.

6 Executive Summary: The Expanding Role and Importance of ADCs 6 Figure 3. ADCs Have Become a Layer of Defense Behind Network Perimeters What is the primary method your organizabon employs to deliver network security services as it relates to protecbng its data center- resident business applicabons? (Percent of respondents, N=243) At the network perimeter on a purpose- built network security device On a physical ADC On a virtual ADC On a general purpose, data center- resident server Don t know Network firewall 33% 23% 14% IPS/IDS (intrusion prevenfon/detecfon system) 28% 32% 23% 16% 2% Secure network segmentafon 28% 12% 1% DDoS defenses 27% 31% 26% 12% 3% Web authenfcafon gateway 27% 27% 16% 1% WAF (web applicafon firewall) 26% 33% 26% 13% 2% Integrafon with other security tools (e.g., SIM, log management, etc.) 24% 37% 24% 13% 1% SSL accelerafon 24% 35% 27% 12% 2% 0% 10% 20% 40% 50% 60% 70% 80% 90% 100% Source: Enterprise Strategy Group, Finally, ADC- based security appears to be gaining momentum for enterprise organizations, as 76% of organizations say that their use of ADC security capabilities/functionality will increase significantly or increase somewhat in the future.

7 The Bigger Truth Executive Summary: The Expanding Role and Importance of ADCs 7 When it comes to ADCs, perception is not reality. For example, many IT professionals still think of ADCs as hardware- based load balancers but the ESG research presented in this brief indicates a different situation. ADCs are being deployed as virtual appliances and this will only increase as organizations embrace private and hybrid cloud architectures. Furthermore, most organizations use ADC functionality well beyond load balancing alone as they utilize them for API integration, caching, web content optimization, etc. While the role of ADCs is certainly expanding, ESG research reveals that this is especially true with regard to information security. In fact, CISOs are using ADCs in an assortment of security use cases such as network firewalls (OSI layers 3 and 4) all the way up to web application firewalls (OSI layer 7). Furthermore, ADCs have become an additional layer of defense beyond perimeter security devices. The IT professionals surveyed for this project understand and are taking advantage of the fundamental strength offered by ADCs. Unlike general- purpose network appliances, ADCs marry network and security functionality with specific web application requirements. As such, they can be fine- tuned at the IT infrastructure, security policy, and even business level, providing a degree of flexibility that is difficult or impossible to implement in other IT technologies. There is a lesson to be learned here: The ESG data suggests that enterprise organizations can be creative with their ADC deployments for performance tuning, application- specific services, and critical system protection. CIOs, CISOs, application owners, and network engineers can benefit by applying ADCs in this fashion.

8 20 Asylum Street Milford, MA Tel: Fax: global.com

Efficient Data Center Virtualization Requires All-flash Storage

Efficient Data Center Virtualization Requires All-flash Storage White Paper Efficient Data Center Virtualization Requires All-flash Storage By Scott Sinclair, Storage Analyst November 2015 This ESG White Paper was commissioned by Pure Storage and is distributed under

More information

Closing the Hybrid Cloud Security Gap with Cavirin

Closing the Hybrid Cloud Security Gap with Cavirin Enterprise Strategy Group Getting to the bigger truth. Solution Showcase Closing the Hybrid Cloud Security Gap with Cavirin Date: June 2018 Author: Doug Cahill, Senior Analyst Abstract: Most organizations

More information

Hyperconverged Infrastructure: Cost-effectively Simplifying IT to Improve Business Agility at Scale

Hyperconverged Infrastructure: Cost-effectively Simplifying IT to Improve Business Agility at Scale Enterprise Strategy Group Getting to the bigger truth. White Paper Hyperconverged Infrastructure: Cost-effectively Simplifying IT to Improve Business Agility at Scale By Mike Leone, ESG Senior Analyst;

More information

Video Surveillance Solutions from EMC and Brocade: Scalable and Future-proof

Video Surveillance Solutions from EMC and Brocade: Scalable and Future-proof White Paper Video Surveillance Solutions from EMC and Brocade: Scalable and Future-proof By Dan Conde, Analyst December 2015 This ESG White Paper was commissioned by EMC and Brocade and is distributed

More information

(TBD GB/hour) was validated by ESG Lab

(TBD GB/hour) was validated by ESG Lab (TBD GB/hour) was validated by ESG Lab Enterprise Strategy Group Getting to the bigger truth. ESG Lab Review Protecting Virtual Environments with Spectrum Protect Plus from IBM Date: November 2017 Author:

More information

Abstract. The Challenges. ESG Lab Review InterSystems IRIS Data Platform: A Unified, Efficient Data Platform for Fast Business Insight

Abstract. The Challenges. ESG Lab Review InterSystems IRIS Data Platform: A Unified, Efficient Data Platform for Fast Business Insight ESG Lab Review InterSystems Data Platform: A Unified, Efficient Data Platform for Fast Business Insight Date: April 218 Author: Kerry Dolan, Senior IT Validation Analyst Abstract Enterprise Strategy Group

More information

Reference Research: Disk-based Storage Capacity Trends Date: September 2012 Author: Bill Lundell, Senior Research Analyst

Reference Research: Disk-based Storage Capacity Trends Date: September 2012 Author: Bill Lundell, Senior Research Analyst Research Brief Reference Research: Disk-based Storage Capacity Trends Date: September 2012 Author: Bill Lundell, Senior Research Analyst Abstract: ESG Reference Research includes data-centric reports and

More information

Market Report. Scale-out 2.0: Simple, Scalable, Services- Oriented Storage. Scale-out Storage Meets the Enterprise. June 2010.

Market Report. Scale-out 2.0: Simple, Scalable, Services- Oriented Storage. Scale-out Storage Meets the Enterprise. June 2010. Market Report Scale-out 2.0: Simple, Scalable, Services- Oriented Storage Scale-out Storage Meets the Enterprise By Terri McClure June 2010 Market Report: Scale-out 2.0: Simple, Scalable, Services-Oriented

More information

Abstract: Data Protection Cloud Strategies

Abstract: Data Protection Cloud Strategies Enterprise Strategy Group Getting to the bigger truth. Research Report Abstract: Data Protection Cloud Strategies Considerations for Organizations Seeking to Utilize Cloud Services as Part of Their Data

More information

Veritas Resiliency Platform: The Moniker Is New, but the Pedigree Is Solid

Veritas Resiliency Platform: The Moniker Is New, but the Pedigree Is Solid Enterprise Strategy Group Getting to the bigger truth. SOLUTION SHOWCASE Veritas Resiliency Platform: The Moniker Is New, but the Pedigree Is Solid Date: September 2015 Authors: Jason Buffington, Senior

More information

White. Paper. The Application Deluge and Visibility Imperative. How to Ensure Network Performance for Your Business-critical Applications.

White. Paper. The Application Deluge and Visibility Imperative. How to Ensure Network Performance for Your Business-critical Applications. White Paper The Application Deluge and Visibility Imperative How to Ensure Network Performance for Your Business-critical Applications By Dan Conde, Analyst May 2015 This ESG White Paper was commissioned

More information

Strong Consistency versus Weak Consistency

Strong Consistency versus Weak Consistency Enterprise Strategy Group Getting to the bigger truth. White Paper Strong Consistency versus Weak Consistency Why You Should Start from a Position of Strength By Terri McClure, ESG Senior Analyst August

More information

Enabling Hybrid Cloud Transformation

Enabling Hybrid Cloud Transformation Enterprise Strategy Group Getting to the bigger truth. White Paper Enabling Hybrid Cloud Transformation By Scott Sinclair, ESG Senior Analyst November 2018 This ESG White Paper was commissioned by Primary

More information

Technical Review Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform

Technical Review Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform Technical Review Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform Date: October, 2018 Author: Jack Poller, Sr. Analyst The Challenges Enterprise Strategy Group

More information

Who Better than Dell EMC to Offer Best-for-VMware Data Protection?

Who Better than Dell EMC to Offer Best-for-VMware Data Protection? Enterprise Strategy Group Getting to the bigger truth. Solution Showcase Who Better than Dell EMC to Offer Best-for-VMware Data Protection? Date: August 2017 Author: Jason Buffington, Principal Analyst

More information

Dell EMC Hyperconverged Portfolio: Solutions that Cover the Use Case Spectrum

Dell EMC Hyperconverged Portfolio: Solutions that Cover the Use Case Spectrum Enterprise Strategy Group Getting to the bigger truth. White Paper Dell EMC Hyperconverged Portfolio: Solutions that Cover the Use Case Spectrum Broad Portfolio that Meets the Wide Variety of Customer

More information

NetApp Clustered Data ONTAP 8.2 Storage QoS Date: June 2013 Author: Tony Palmer, Senior Lab Analyst

NetApp Clustered Data ONTAP 8.2 Storage QoS Date: June 2013 Author: Tony Palmer, Senior Lab Analyst ESG Lab Spotlight NetApp Clustered Data ONTAP 8.2 Storage QoS Date: June 2013 Author: Tony Palmer, Senior Lab Analyst Abstract: This ESG Lab Spotlight explores how NetApp Data ONTAP 8.2 Storage QoS can

More information

Abstract. The Challenges. The Solution: Veritas Velocity. ESG Lab Review Copy Data Management with Veritas Velocity

Abstract. The Challenges. The Solution: Veritas Velocity. ESG Lab Review Copy Data Management with Veritas Velocity ESG Lab Review Copy Data Management with Veritas Velocity Enterprise Strategy Group Getting to the bigger truth. Date: June 2017 Author: Vinny Choinski, Senior Lab Analyst; and Jason Buffington, Principal

More information

ESG Lab Report. Integrated Platforms for Breakthrough Insights. The HP and Microsoft Data Management Portfolio

ESG Lab Report. Integrated Platforms for Breakthrough Insights. The HP and Microsoft Data Management Portfolio ESG Lab Report Integrated Platforms for Breakthrough Insights The HP and Microsoft Data Management Portfolio By Brian Garrett, Vice President, ESG Lab May 2013 Lab Validation: HP and Microsoft Data Management

More information

Best Practices in Cloud-powered Data Protection

Best Practices in Cloud-powered Data Protection Enterprise Strategy Group Getting to the bigger truth. Solution Showcase Best Practices in Cloud-powered Data Protection Date: December 2016 Authors: Jason Buffington, Principal Analyst; and Monya Keane,

More information

The Role of Converged and Hyper-converged Infrastructure in IT Transformation

The Role of Converged and Hyper-converged Infrastructure in IT Transformation Enterprise Strategy Group Getting to the bigger truth. ESG Research Insights Brief The Role of Converged and Hyper-converged Infrastructure in IT Transformation The Quantified Effects of Organizational

More information

ForeScout Extended Module for Splunk

ForeScout Extended Module for Splunk Enterprise Strategy Group Getting to the bigger truth. ESG Lab Review ForeScout Extended Module for Splunk Date: May 2017 Author: Tony Palmer, Senior Lab Analyst Abstract This report provides a first look

More information

Simplifying and Accelerating the Transition to Hybrid Cloud Environments. By Mark Bowker, Senior Analyst and Bob Laliberte, Senior Analyst

Simplifying and Accelerating the Transition to Hybrid Cloud Environments. By Mark Bowker, Senior Analyst and Bob Laliberte, Senior Analyst White Paper Simplifying and Accelerating the Transition to Hybrid Cloud Environments Cisco Intercloud Fabric By Mark Bowker, Senior Analyst and Bob Laliberte, Senior Analyst August 2014 This ESG White

More information

White. Paper. EMC Isilon Scale-out Without Compromise. July, 2012

White. Paper. EMC Isilon Scale-out Without Compromise. July, 2012 White Paper EMC Isilon Scale-out Without Compromise By Terri McClure, Senior Analyst July, 2012 This ESG White Paper was commissioned by EMC and is distributed under license from ESG. 2012, The Enterprise

More information

Analyzing the Economic Value of HPE ConvergedSystem 700 in Enterprise Environments. By Mark Bowker, Senior Analyst and Adam DeMattia, Research Analyst

Analyzing the Economic Value of HPE ConvergedSystem 700 in Enterprise Environments. By Mark Bowker, Senior Analyst and Adam DeMattia, Research Analyst Executive Summary Analyzing the Economic Value of HPE ConvergedSystem 700 in Enterprise Environments By Mark Bowker, Senior Analyst and Adam DeMattia, Research Analyst December 2014 This ESG White Paper

More information

Cloud Migration Strategies

Cloud Migration Strategies Enterprise Strategy Group Getting to the bigger truth. Research Insights Paper Cloud Migration Strategies Mapping the Journey to Successful Cloud Adoption By Dan Conde, ESG Analyst; and Leah Matuson, Research

More information

Cisco HyperFlex and the F5 BIG-IP Platform Accelerate Infrastructure and Application Deployments

Cisco HyperFlex and the F5 BIG-IP Platform Accelerate Infrastructure and Application Deployments OVERVIEW + Cisco and the F5 BIG-IP Platform Accelerate Infrastructure and Application Deployments KEY BENEFITS Quickly create private clouds Tested with industry-leading BIG-IP ADC platform Easily scale

More information

Flash Storage-based Data Protection with HPE

Flash Storage-based Data Protection with HPE Enterprise Strategy Group Getting to the bigger truth. Solution Showcase Flash Storage-based Data Protection with HPE Date: August 2018 Author: Christophe Bertrand, Senior Analyst Abstract: Solid-state

More information

ESG Lab Review Accelerating Time to Value: Automated SAN and Federated Zoning with HPE 3PAR and Smart SAN for 3PAR

ESG Lab Review Accelerating Time to Value: Automated SAN and Federated Zoning with HPE 3PAR and Smart SAN for 3PAR ESG Lab Review Accelerating Time to Value: Automated SAN and Federated Zoning with HPE 3PAR and Smart SAN for 3PAR Date: May 2018 Author: Jack Poller, Senior Analyst Abstract This ESG Lab Review documents

More information

ESG Lab Review RingCentral Mobile Voice Quality Assurance

ESG Lab Review RingCentral Mobile Voice Quality Assurance ESG Lab Review RingCentral Mobile Voice Quality Assurance Abstract This ESG Lab Review documents hands-on testing of RingCentral Office to verify its ability to assure high quality of service (QoS) for

More information

Shavlik Protect: Simplifying Patch, Threat, and Power Management Date: October 2013 Author: Mike Leone, ESG Lab Analyst

Shavlik Protect: Simplifying Patch, Threat, and Power Management Date: October 2013 Author: Mike Leone, ESG Lab Analyst ESG Lab Review Shavlik Protect: Simplifying Patch, Threat, and Power Management Date: October 2013 Author: Mike Leone, ESG Lab Analyst Abstract: This ESG Lab Review documents hands-on testing of Shavlik

More information

Endpoint Security Must Include Rapid Query and Remediation Capabilities

Endpoint Security Must Include Rapid Query and Remediation Capabilities Enterprise Strategy Group Getting to the bigger truth. White Paper: Endpoint Security Must Include Rapid Query and Remediation Capabilities 1 White Paper Endpoint Security Must Include Rapid Query and

More information

Lab Validation Report

Lab Validation Report Lab Validation Report NetApp SnapManager for Oracle Simple, Automated, Oracle Protection By Ginny Roth and Tony Palmer September 2010 Lab Validation: NetApp SnapManager for Oracle 2 Contents Introduction...

More information

VMAX3: Adaptable Enterprise Resiliency

VMAX3: Adaptable Enterprise Resiliency ESG Solution Showcase VMAX3: Adaptable Enterprise Resiliency Date: August 2015 Author: Scott Sinclair, Analyst Abstract: As enterprises respond to the ever- present reality of rapid data growth, IT organizations

More information

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments White Paper The Emerging Role of a CDN in Facilitating Secure Cloud Deployments Sponsored by: Fastly Robert Ayoub August 2017 IDC OPINION The ongoing adoption of cloud services and the desire for anytime,

More information

IBM Data Protection for Virtual Environments: Extending IBM Spectrum Protect Solutions to VMware and Hyper-V Environments

IBM Data Protection for Virtual Environments: Extending IBM Spectrum Protect Solutions to VMware and Hyper-V Environments The Challenges ESG Lab Review IBM Data Protection for Virtual Environments: Extending IBM Spectrum Protect Solutions to VMware and Hyper-V Environments Date: August 2015 Author: Vinny Choinski, Senior

More information

Enabling IT Transformation with Modern Data Protection Strategies

Enabling IT Transformation with Modern Data Protection Strategies Enterprise Strategy Group Getting to the bigger truth. ESG Research Insights Brief Enabling IT Transformation with Modern Data Protection Strategies The Quantified Benefits of a Comprehensive Data Protection

More information

Deploying a Next-Generation IPS Infrastructure

Deploying a Next-Generation IPS Infrastructure Deploying a Next-Generation IPS Infrastructure Enterprises require intrusion prevention systems (IPSs) to protect their network against attacks. However, implementing an IPS involves challenges of scale

More information

Cloud Strategies for Addressing IT Challenges

Cloud Strategies for Addressing IT Challenges Cloud Strategies for Addressing IT Challenges Mark Bowker Senior Analyst Enterprise Strategy Group Introduction Mark Bowker, Senior Analyst U.S. Headquarters 20 Asylum Street Milford, MA 01757 2011 Enterprise

More information

A Roadmap for BYOD Adoption. By Jon Oltsik, Sr. Principal Analyst, and Bob Laliberte, Sr. Analyst

A Roadmap for BYOD Adoption. By Jon Oltsik, Sr. Principal Analyst, and Bob Laliberte, Sr. Analyst White Paper A Roadmap for BYOD Adoption By Jon Oltsik, Sr. Principal Analyst, and Bob Laliberte, Sr. Analyst April 2012 This ESG White Paper was commissioned by Enterasys and is distributed under license

More information

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst ESG Lab Review RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst Abstract: This ESG Lab review documents

More information

Abstract. The Challenges. ESG Lab Review Lumeta Spectre: Cyber Situational Awareness

Abstract. The Challenges. ESG Lab Review Lumeta Spectre: Cyber Situational Awareness ESG Lab Review Lumeta Spectre: Cyber Situational Awareness Date: September 2017 Author: Tony Palmer, Senior IT Validation Analyst Enterprise Strategy Group Getting to the bigger truth. Abstract ESG Lab

More information

Performance Evaluation Criteria for Hyperconverged Infrastructures

Performance Evaluation Criteria for Hyperconverged Infrastructures Enterprise Strategy Group Getting to the bigger truth. White Paper Performance Evaluation Criteria for Hyperconverged Infrastructures Speed, Scale, and Stability By Mike Leone, ESG Senior Analyst November

More information

Always Available Dell Storage SC Series Date: October 2015 Author: Brian Garrett, VP ESG Lab

Always Available Dell Storage SC Series Date: October 2015 Author: Brian Garrett, VP ESG Lab ESG Lab Review Always Available Dell Storage SC Series Date: October 2015 Author: Brian Garrett, VP ESG Lab Abstract: This report documents ESG Lab testing of Dell Storage SC Series with a focus on the

More information

Analyzing the Economic Benefits of the HPE SimpliVity 380 All-flash Hyperconverged Portfolio

Analyzing the Economic Benefits of the HPE SimpliVity 380 All-flash Hyperconverged Portfolio Enterprise Strategy Group Getting to the bigger truth. ESG Economic Value Audit Analyzing the Economic Benefits of the HPE SimpliVity 380 All-flash Hyperconverged Portfolio By Mike Leone, Senior IT Validation

More information

An All-Source Approach to Threat Intelligence Using Recorded Future

An All-Source Approach to Threat Intelligence Using Recorded Future nn Enterprise Strategy Group Getting to the bigger truth. Solution Showcase An All-Source Approach to Threat Intelligence Using Recorded Future Date: March 2018 Author: Jon Oltsik, Senior Principal Analyst

More information

Software-defined Storage by Veritas

Software-defined Storage by Veritas ESG Technology Showcase Software-defined Storage by Veritas Date: August 2015 Author: Scott Sinclair, Analyst Abstract: The days of enterprise storage technology being predominantly constrained to specific

More information

Dell EMC Isilon All-Flash

Dell EMC Isilon All-Flash Enterprise Strategy Group Getting to the bigger truth. ESG Lab Validation Dell EMC Isilon All-Flash Scale-out All-flash Storage for Demanding Unstructured Data Workloads By Tony Palmer, Senior Lab Analyst

More information

(TBD GB/hour) was validated by ESG Lab

(TBD GB/hour) was validated by ESG Lab (TBD GB/hour) was validated by ESG Lab Enterprise Strategy Group Getting to the bigger truth. ESG Lab Review Efficiently Protect Virtual Environments with Integrated Data Protection Appliances from Dell

More information

Securing Your Amazon Web Services Virtual Networks

Securing Your Amazon Web Services Virtual Networks Securing Your Amazon Web Services s IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up a workload,

More information

Build Your Zero Trust Security Strategy With Microsegmentation

Build Your Zero Trust Security Strategy With Microsegmentation Why Digital Businesses Need A Granular Network Segmentation Approach GET STARTED Overview The idea of a secure network perimeter is dead. As companies rapidly scale their digital capabilities to deliver

More information

White. Paper. The Evolution of IP Storage and Its Impact on the Network. December 2014

White. Paper. The Evolution of IP Storage and Its Impact on the Network. December 2014 White Paper The Evolution of IP Storage and Its Impact on the Network By Scott Sinclair, Analyst December 2014 This ESG White Paper was commissioned by Brocade and is distributed under license from ESG.

More information

Next-generation Connectivity and Security for Enterprise Mobility and Hybrid Cloud Environments

Next-generation Connectivity and Security for Enterprise Mobility and Hybrid Cloud Environments Enterprise Strategy Group Getting to the bigger truth. White Paper Next-generation Connectivity and Security for Enterprise Mobility and Hybrid Cloud Environments By Mark Bowker, ESG Senior Analyst August

More information

Survey: Global Efficiency Held Back by Infrastructure Spend in Pharmaceutical Industry

Survey: Global Efficiency Held Back by Infrastructure Spend in Pharmaceutical Industry Survey: Global Efficiency Held Back by Infrastructure Spend in Pharmaceutical Industry Akamai Survey Shows Pharmaceutical Industry Looking for Global Employee Efficiency but may be Held Back by Heavy Infrastructure

More information

White. Paper. Accelerating Transformation with an Application-centric Approach. March 2014

White. Paper. Accelerating Transformation with an Application-centric Approach. March 2014 ac White Paper Accelerating Transformation with an Application-centric Approach By Bob Laliberte, Senior Analyst March 2014 This ESG White Paper was commissioned by Cisco and is distributed under license

More information

State of Cloud Survey GERMANY FINDINGS

State of Cloud Survey GERMANY FINDINGS 2011 State of Cloud Survey GERMANY FINDINGS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Cloud security is top goal and top concern.................................. 8 Finding 2: IT staff

More information

Hearing Voices: The Cybersecurity Pro s View of the Profession

Hearing Voices: The Cybersecurity Pro s View of the Profession SESSION ID: AST2-W02 Hearing Voices: The Cybersecurity Pro s View of the Profession Jon Oltsik Senior Principal Analyst and ESG Fellow Enterprise Strategy Group @joltsik Candy Alexander, CISSP CISM International

More information

Deploying a Next-Generation IPS Infrastructure

Deploying a Next-Generation IPS Infrastructure Deploying a Next-Generation IPS Infrastructure Enterprises require intrusion prevention systems (IPSs) to protect their network against attacks. However, implementing an IPS involves challenges of scale

More information

Flash Storage Fuels IT Transformation

Flash Storage Fuels IT Transformation Enterprise Strategy Group Getting to the bigger truth. ESG Research Insights Brief Flash Storage Fuels IT Transformation The Quantified Impacts of Organizational Flash Storage Use Date: May 2018 Authors:

More information

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter How your network can take on the cloud and win Think beyond traditional networking toward a secure digital perimeter Contents Introduction... 3 Reduce risk points with secure, contextualized access...

More information

ESG Lab Review The Performance Benefits of Fibre Channel Compared to iscsi for All-flash Storage Arrays Supporting Enterprise Workloads

ESG Lab Review The Performance Benefits of Fibre Channel Compared to iscsi for All-flash Storage Arrays Supporting Enterprise Workloads Enterprise Strategy Group Getting to the bigger truth. ESG Lab Review The Performance Benefits of Fibre Channel Compared to iscsi for All-flash Storage Arrays Supporting Enterprise Workloads Date: July

More information

Pulse Secure Application Delivery

Pulse Secure Application Delivery DATA SHEET Pulse Secure Application Delivery HIGHLIGHTS Provides an Application Delivery and Load Balancing solution purposebuilt for high-performance Network Functions Virtualization (NFV) Uniquely customizable,

More information

Modernizing Virtual Infrastructures Using VxRack FLEX with ScaleIO

Modernizing Virtual Infrastructures Using VxRack FLEX with ScaleIO Background As organizations continue to look for ways to modernize their infrastructures by delivering a cloud-like experience onpremises, hyperconverged offerings are exceeding expectations. In fact,

More information

The State of Cloud Monitoring

The State of Cloud Monitoring REPORT The State of Cloud Monitoring Survey Reveals Visibility is Key to Cloud Security and Performance INTRODUCTION Ixia, a Keysight business, commissioned Dimensional Research to conduct a survey measuring

More information

Running Splunk on VxRack FLEX

Running Splunk on VxRack FLEX ESG Technical White Paper Running Splunk on VxRack FLEX Background As organizations continue to look for ways to modernize their infrastructures by delivering a cloud-like experience onpremises, hyperconverged

More information

ESG Brief. Modern Data Centers: Massive Scale and Complexity. Data Center Networking Discontinuity

ESG Brief. Modern Data Centers: Massive Scale and Complexity. Data Center Networking Discontinuity ESG Brief IBM and NEC Bring SDN/OpenFlow to Enterprise Data Center Networks Date: January, 2012 Author: Jon Oltsik, Senior Principal Analyst, and Bob Laliberte, Senior Analyst Abstract: Enterprise data

More information

Securing Your Microsoft Azure Virtual Networks

Securing Your Microsoft Azure Virtual Networks Securing Your Microsoft Azure Virtual Networks IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up

More information

ENABLING SECURE CLOUD CONNECTIVITY. Create a Successful Cloud Strategy with Reliable Connectivity Solutions

ENABLING SECURE CLOUD CONNECTIVITY. Create a Successful Cloud Strategy with Reliable Connectivity Solutions ENABLING SECURE CLOUD CONNECTIVITY Create a Successful Cloud Strategy with Reliable Connectivity Solutions TABLE OF CONTENTS Introduction The Data Storage Conundrum Cloud vs. On-premises: Finding the Right

More information

Top 10 most important IT priorities over the next 12 months. (Percent of respondents, N=633, ten responses accepted)

Top 10 most important IT priorities over the next 12 months. (Percent of respondents, N=633, ten responses accepted) ESG Lab Review Sophos Security Heartbeat Date: January 2016 Author: Tony Palmer, Sr. ESG Lab Analyst; and Jack Poller, ESG Lab Analyst Abstract: This report examines the key attributes of Sophos synchronized

More information

THE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS

THE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS SESSION ID: AST3-R02 THE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS Jon Oltsik Senior Principal Analyst Enterprise Strategy Group @joltsik Candy Alexander, CISSP CISM International Board Director ISSA

More information

Analyzing the Economic Benefits of Datrium Cloud DVX

Analyzing the Economic Benefits of Datrium Cloud DVX Enterprise Strategy Group Getting to the bigger truth. ESG Economic Value Validation Analyzing the Economic Benefits of Datrium Cloud DVX By Kerry Dolan, Senior IT Validation Analyst May 2018 Executive

More information

Solid State Storage: Trends, Pricing Concerns, and Predictions for the Future

Solid State Storage: Trends, Pricing Concerns, and Predictions for the Future Solid State Storage: Trends, Pricing Concerns, and Predictions for the Future Solid state storage is ready for prime time, or so the latest awareness and usage statistics would indicate. Moreover, a recent

More information

Imperva Incapsula Survey: What DDoS Attacks Really Cost Businesses

Imperva Incapsula Survey: What DDoS Attacks Really Cost Businesses Survey Imperva Incapsula Survey: What DDoS Attacks Really Cost Businesses BY: TIM MATTHEWS 2016, Imperva, Inc. All rights reserved. Imperva and the Imperva logo are trademarks of Imperva, Inc. Contents

More information

ESG Lab Review High-fidelity Breach Detection with Acalvio Autonomous Deception

ESG Lab Review High-fidelity Breach Detection with Acalvio Autonomous Deception ESG Lab Review High-fidelity Breach Detection with Acalvio Autonomous Deception Date: April 2018 Author: Jack Poller, Senior Analyst Abstract This ESG Lab Review documents hands-on testing of Acalvio ShadowPlex

More information

Abstract. The Challenges. ESG Lab Review Proofpoint Advanced Threat Protection. Figure 1. Top Ten IT Skills Shortages for 2016

Abstract. The Challenges. ESG Lab Review Proofpoint Advanced Threat Protection. Figure 1. Top Ten IT Skills Shortages for 2016 ESG Lab Review Proofpoint Advanced Threat Protection Enterprise Strategy Group Getting to the bigger truth. Date: January 2017 Author: Tony Palmer, Senior Lab Analyst; and Jack Poller, Senior Lab Analyst

More information

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report. 2019 SIEM REPORT INTRODUCTION Security Information and Event Management (SIEM) is a powerful technology that allows security operations teams to collect, correlate and analyze log data from a variety of

More information

Research Insights Paper

Research Insights Paper Research Insights Paper Status Quo Creates Security Risk: The State of Incident Response By Jon Oltsik, Senior Principal Analyst February 2016 This ESG Research Insights Paper was commissioned by ServiceNow

More information

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW: SOLUTION OVERVIEW: ALERT LOGIC THREAT MANAGER WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE Protecting your business assets and sensitive data requires regular vulnerability assessment,

More information

WHITE PAPER. Applying Software-Defined Security to the Branch Office

WHITE PAPER. Applying Software-Defined Security to the Branch Office Applying Software-Defined Security to the Branch Office Branch Security Overview Increasingly, the branch or remote office is becoming a common entry point for cyber-attacks into the enterprise. Industry

More information

The Journey to Intent-based Networking

The Journey to Intent-based Networking Enterprise Strategy Group Getting to the bigger truth. White Paper The Journey to Intent-based Networking Ten Key Principles for Accelerating Adoption By Bob Laliberte, ESG Senior Analyst January 2018

More information

HOW MIDSIZE ORGANIZATIONS CAN MEET COMPLIANCE REQUIREMENTS AND ENHANCE CYBERSECURITY WITH MICRO-SEGMENTATION WHITE PAPER FEBRUARY 2018

HOW MIDSIZE ORGANIZATIONS CAN MEET COMPLIANCE REQUIREMENTS AND ENHANCE CYBERSECURITY WITH MICRO-SEGMENTATION WHITE PAPER FEBRUARY 2018 HOW MIDSIZE ORGANIZATIONS CAN MEET COMPLIANCE REQUIREMENTS AND ENHANCE CYBERSECURITY WITH MICRO-SEGMENTATION WHITE PAPER FEBRUARY 2018 Table of Contents A short technology overview 3 How micro-segmentation

More information

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion

More information

Massive Scalability With InterSystems IRIS Data Platform

Massive Scalability With InterSystems IRIS Data Platform Massive Scalability With InterSystems IRIS Data Platform Introduction Faced with the enormous and ever-growing amounts of data being generated in the world today, software architects need to pay special

More information

Zero Branch IT with Riverbed SteelFusion

Zero Branch IT with Riverbed SteelFusion Enterprise Strategy Group Getting to the bigger truth. Lab Review Zero Branch IT with Riverbed SteelFusion Date: March 2016 Author: Aviv Kaufmann and Jack Poller, Senior ESG Lab Analysts Abstract: This

More information

IBM Cloud Internet Services: Optimizing security to protect your web applications

IBM Cloud Internet Services: Optimizing security to protect your web applications WHITE PAPER IBM Cloud Internet Services: Optimizing security to protect your web applications Secure Internet applications and APIs against denialof-service attacks, customer data compromise, and abusive

More information

Next-generation Endpoint Security and Cybereason

Next-generation Endpoint Security and Cybereason Enterprise Strategy Group Getting to the bigger truth. Solution Showcase Next-generation Endpoint Security and Cybereason Date: March 2018 Author: Jon Oltsik, Senior Principal Analyst Abstract: Since the

More information

Securing the Evolving Enterprise Network Inside and Out

Securing the Evolving Enterprise Network Inside and Out Enterprise Strategy Group Getting to the bigger truth. White Paper Securing the Evolving Enterprise Network Inside and Out By Jon Oltsik, Senior Principal Analyst; and Jack Poller, Analyst April 2017 This

More information

Lab Validation Report

Lab Validation Report Lab Validation Report Limelight Orchestrate Performance Examining the Performance of Dynamic Content Delivery Between Leading Content Delivery Networks By Aviv Kaufmann, ESG Lab Analyst and Brian Garrett,

More information

i365 EVault for Microsoft System Center Data Protection Manager Date: October 2010 Authors: Ginny Roth, Lab Engineer, and Tony Palmer, Senior Engineer

i365 EVault for Microsoft System Center Data Protection Manager Date: October 2010 Authors: Ginny Roth, Lab Engineer, and Tony Palmer, Senior Engineer ESG Lab Review i365 EVault for Microsoft System Center Data Protection Manager Date: October 2010 Authors: Ginny Roth, Lab Engineer, and Tony Palmer, Senior Engineer Abstract: This ESG Lab review documents

More information

MiTek Sapphire Build. Scalable Software for Home Building Management. ESG Lab Validation. By Brian Garrett, Vice President, ESG Lab April 2017

MiTek Sapphire Build. Scalable Software for Home Building Management. ESG Lab Validation. By Brian Garrett, Vice President, ESG Lab April 2017 Enterprise Strategy Group Getting to the bigger truth. ESG Lab Validation MiTek Sapphire Build Scalable Software for Home Building Management By Brian Garrett, Vice President, ESG Lab April 2017 This ESG

More information

Flex Tenancy :48:27 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

Flex Tenancy :48:27 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Flex Tenancy 2015-04-28 17:48:27 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Flex Tenancy... 3 Flex Tenancy... 4 Understanding the Flex Tenancy

More information

Build application-centric data centers to meet modern business user needs

Build application-centric data centers to meet modern business user needs Build application-centric data centers to meet modern business user needs Citrix.com Table of contents Meeting current business challenges...3 Device package integration...5 Policy-based service insertion...6

More information

Hybrid WAN Operations: Extend Network Monitoring Across SD-WAN and Legacy WAN Infrastructure

Hybrid WAN Operations: Extend Network Monitoring Across SD-WAN and Legacy WAN Infrastructure Hybrid WAN Operations: Extend Network Monitoring Across SD-WAN and Legacy WAN Infrastructure An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for SevOne May 2017 IT & DATA MANAGEMENT RESEARCH,

More information

Enhancing Exchange Mobile Device Security with the F5 BIG-IP Platform

Enhancing Exchange Mobile Device Security with the F5 BIG-IP Platform Enhancing Exchange Mobile Device Security with the F5 BIG-IP Platform By the F5 business development team for the Microsoft Global Alliance Version 1.0 Introduction As the use of mobile devices in the

More information

IBM Data Protection for Virtual Environments:

IBM Data Protection for Virtual Environments: ESG Lab Review IBM Data Protection for Virtual Environments: Tivoli Storage Manager for VMware Version 7.1 and FlashCopy Manager for VMware Version 4.1 Date: August 2014 Author: Vinny Choinski, Senior

More information

Spotlight Report. Information Security. Presented by. Group Partner

Spotlight Report. Information Security. Presented by. Group Partner Cloud SecuriTY Spotlight Report Group Partner Information Security Presented by OVERVIEW Key FINDINGS Public cloud apps like Office 365 and Salesforce have become a dominant, driving force for change in

More information

BlackBerry WorkLife Persona. The Challenge. The Solution. Datasheet

BlackBerry WorkLife Persona. The Challenge. The Solution. Datasheet Datasheet BlackBerry WorkLife Persona The Challenge An increasing number of employees today are using their own devices for work purposes, blurring the line between personal and business usage. This demand

More information

How to Leverage Containers to Bolster Security and Performance While Moving to Google Cloud

How to Leverage Containers to Bolster Security and Performance While Moving to Google Cloud PRESENTED BY How to Leverage Containers to Bolster Security and Performance While Moving to Google Cloud BIG-IP enables the enterprise to efficiently address security and performance when migrating to

More information

THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES

THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES TABLE OF CONTENTS 3 Introduction 4 Survey Findings 4 Recent Breaches Span a Broad Spectrum 4 Site Downtime and Enterprise

More information

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking

More information