ISC West—the International Security Conference and Exposition—provides insight into some of the biggest trends in the security industry. The conference attracted more than 30,000 attendees and nearly 1,000 vendors earlier this month. DCIG analysts planned our attendance at this year’s conference with a focus on video surveillance, especially video analytics. We had an eye-opening experience.
Evaluating product features, comparing prices, and doing proofing of concepts are important steps in the process of adopting almost any new product. But once one completes those steps, the time arrives to start to roll the product out and implement it. In this second installment of my interview series with System Architect, Fidel Michieli, he shares how his company gained a comfort level with Cohesity for backup and disaster recovery (DR) and how broadly it decided to deploy the product in the primary and secondary data centers.
This year’s Veritas Vision 2016 conference held a lot of intrigue for me. The show itself was not new. The Vision show has been an ongoing event for years though this was the first time in more than a decade that Veritas was free to set its own agenda for the entire show. Rather the intrigue was in what direction it would take going forward. This Veritas did by communicating that it plans to align its product portfolio and strategy to deliver on an objective that has, to date, eluded enterprise organizations and vendors alike for at least two decades: enterprise data management.
It is almost a given in today’s world that for almost any organization to operate at peak efficiency and achieve optimal results that it has to acquire and use multiple forms of technology as part of its business processes. However what is not always so clear is the forces that are at work both insider and outside of the business that drive its technology acquisitions. While by no means a complete list, here are four (4) forces that DCIG often sees at work behind the scenes that influence and drive many of today’s technology infrastructure buying decisions.
DCIG is pleased to announce the availability of its DCIG 2014-15 Security Information and Event Management (SIEM) Appliance Buyer’s Guide. In this Buyer’s Guide, DCIG weights, scores and ranks 29 SIEM appliances respectively from nine (9) different providers. Like all previous DCIG Buyer’s Guides, this Buyer’s Guide provides the critical information that all size organizations need when selecting a SIEM appliance to help provide visibility into their security posture by providing usable and actionable information.
Data security is a part of the IT infrastructure that should take care of itself. Companies have enough to worry about without always looking over their shoulder to make sure no one is stealing vital information. As most organizations recognize, this is NOT the case.
One of the most exciting and terrifying times in the lifecycle of a company is transitioning from a small to mid-range or mid-range to enterprise sized company. Well led companies that survive those transitions have often been planning for the occasion for some time. The longer they have been planning the more likely they’ve become aware of the need for long term archiving. Of everything.
DCIG is pleased to announce the release of its 2014 Mobile Data Management (MDM) Buyer’s Guide that weight, score and rank over 100 features. Like previous Buyer’s Guides, this Buyer’s Guide provides the critical information that organizations need when selecting Mobile Data Management software to help meet the security, compliance and Bring-Your-Own-Device (BYOD) challenges in an ever increasing mobile enterprises.
Security, security, security. The word rings loud and clear in the ears of corporate business owners when it comes to the data and information stored on mobile devices. Allowing employees to bring their own devices (BYOD) may increase productivity but an organization needs to make sure their sensitive information does not become public. In the fourth and final part of my interview with Amtel, Inc. CEO, Pankaj Gupta, we examine the growing trend in enterprises adopting BYOD and the scope of systems management being offered by organizations like Amtel.
Depending upon its size, a company looking to offer their employees the opportunity to bring their own device (BYOD) to work may be faced with choices, such as: How much data to allow on the device? How to manage the data accessed? Whose platform to use? Organizations like Amtel, Inc. have specialized in developing Mobile Data Management (MDM) for such companies. In this third installment of my interview series with Amtel’s CEO, Pankaj Gupta, we discuss hybrid vs. cloud and what it looks like for a company to use MDM for bring your own devices (BYODs).
Not long ago, organizations did not even dream about the need to geo-fence within their business nor did they ponder the security risk involved in managing the company data on mobile devices. But times they are a changin’. Corporate America is seeing a massive shift in favor of users/employees bringing their own devices (BYOD) to work. Does this prove a benefit or a deficit for the company? In this first installment of my interview series with Pankaj Gupta, CEO of Amtel, Inc., we discuss the upside for a company allowing BYOD and how Amtel is set to support a company’s move toward this popular trend.
Digital archiving suffers from a perception problem though one that is probably well-deserved. Perceived as difficult to cost-justify, hard to implement and whose benefits can often be achieved by simply throwing more disk at the problem, most companies have had a hard time justifying its deployment. However a wave of fundamental changes in the storage industry as a whole and in digital archiving technology itself are setting this technology up to be one of the hottest technologies in the months and years to come.
One of the most common initial use cases for cloud storage is for the storage of archival data. However that does not mean every organization is quite ready to move all of their archival data to the cloud or, what they do move to the cloud, trust the cloud to be available to provide access to the data when they need it. In this fifth blog entry in my interview series with C2C Systems’ CTO Ken Hughes, he talks about the importance of having access to cloud storage repositories for archival data and the advantages of keeping on-premise and data in the cloud synchronized.
Most companies recognize the benefits of deleting data when it no longer serves any business purpose or when it legal requirements to retain it have been met. However the act of deleting data still gives many organizations pause. In this third blog entry in my interview series with C2C Systems’ CTO Ken Hughes, he discusses C2C’s policy management features and the granular ways in which users may manage deletion in their data stores.
The accelerating increase in the volume of Electronically Stored Information (ESI) is resulting in knowledge workers reaching a point where they may not be able to utilize traditional data management and analytic technology and processes to keep pace. However, the increases in knowledge worker productivity and decreases in eDiscovery costs made possible by predictive analytic technology are coming to the point where they are applicable to other knowledge management tasks within the enterprise.
The purpose of archiving is becoming more than simply facilitating smaller email stores, faster response times or better use of expensive storage capacity. The growing driver behind archiving is to enable organizations to implement information governance. In this second blog entry in my interview series with C2C System’s CTO Ken Hughes, Ken explains eDiscovery and retention management are becoming the new driving forces behind archiving and why C2C’s ArchiveOne is so well positioned to respond to that trend.
Faced with the accelerating increase in the volume of Electronically Stored Information (ESI) and the emergence of the concept of Big Data, enterprises worldwide need next generation IT systems to fulfill their corporate compliance, information governance and eDiscovery requirements to process and analyze all of this data. It is in response to this demand and the result of recent legal precendents that Technology Assisted Review (TAR), also known as Predictive Coding or Computer Assisted eDiscovery, is emerging as a legally viable and court-recognized option.
In this final installment of our interview series with GroupLogic we look at how mobilEcho enables organizations to wipe only company data off employees’ mobile devices, leaving the employee’s personal data untouched. We also hear how GroupLogic is helping telecommunications firms increase revenue by adding value to their customers’ telecommunications experience, and we gain insight into the DNA of the company as a software provider for over 20 years.
GroupLogic, a secure enterprise file sharing and syncing solutions provider, is all about responding quickly to customer demands for product features. On September 13th, Acronis announced it had acquired GroupLogic.
In our previous installment of this interview series, we examined how GroupLogic engages in “customer development” in lieu of product development to integrate customer-driven innovations into its products. In part 4, we take a look at GroupLogic’s strategic partnerships with other companies to create products that fulfill very specific needs for customers.
What happens when the market moves so fast that premeditated product development often can’t keep up? When extensive planning can lead to products that are out of date or irrelevant as soon as they are released? This is the dilemma GroupLogic faces in the enterprise file share and sync marketplace, where many companies have been building their own solutions–including customizing free and freemium solutions–to handle needs that out-of-the-box products simply don’t address.