- I had an interesting experience a few weeks ago. I went to NYC to brief with CA Technologies. I spent a full day speaking in group sessions with some of its top executives including CEO, Mike Gregoire, EVP Technology and Development, Peter Griffiths, EVP Strategy and Corporate Development Jacob Lamm, as well as a 1 on 1 meeting with GM of Security Management Mike Denning,. I found their discussions and candor on the changes and advancements within CA VERY refreshing; more so than I would have expected from what I perceived as a “monolithic behemoth” such as CA.
CA Analyst Symposium- CA is Changing
By David Monahan on Mar 3, 2014 6:39:56 PM
Software Defined Storage: The Vendor Landscape – Part 2 of 2
By Torsten Volk on Feb 17, 2014 9:42:23 AM
As promised in my previous post on “Software Defined Storage – Why Customers Should Care”, I want to follow-up with a brief overview of the competitive landscape.
Software Defined Storage: Why Customers Should Care – Part 1 of 2
By Torsten Volk on Feb 17, 2014 9:42:22 AM
Much marketing hype and heated discussions should be seen as excellent indicators for the fact that Software Defined Storage (SDS) is one of the hottest topics in today’s data center. Naturally, every vendor defines SDS based on their own product range, sometimes leaving customer out of the equation.
EMA Research: Enabling Enterprise IT Management to Optimally Support Big Data
By Torsten Volk on Feb 17, 2014 9:42:22 AM
What does Big Data mean to traditional enterprise IT? Organizations of any size and industry are becoming more and more aware of the incredible importance of capturing, managing and analyzing the data available to them. The more comprehensively companies are able to tap structured and unstructured data sources, the quicker they can refresh this data and the more successfully they make this body of data available to all business units, the better they can develop advantages in the market place. Today’s business units are demanding the rapid implementation of these big data use cases, as well as optimal resiliency, cost efficiency, security and performance.
The State of the Software Defined Data Center
By Torsten Volk on Feb 3, 2014 1:03:44 PM
Of course, I always encourage practitioners to carefully study the full EMA research report on the “Obstacles and Priorities on the Journey to the Software-Defined Data Center” or at least read the research study summary or at the very least join the EMA SDDC Research webinar on February 18, but I still want to briefly summarize the key findings here.
Security Awareness Programs Are Not just For Compliance
By David Monahan on Jan 16, 2014 8:35:20 PM
I see a significant gap in not only how the need for Security Awareness training is perceived as needed but also in the general quality of the programs and training delivered vs other types of training. In many cases small companies avoid security awareness training due to ignorance, cost fears, or fears it will stifle their culture of creativity. This research project is structured to give CIO’s, CISO’s, and other security and IT managers the data to motivate them to provide in security awareness training programs thereby bringing about change in their organizations.
Last minute 2014 RSA Boycotts Hurt Attendees not RSA
By David Monahan on Jan 16, 2014 8:35:19 PM
With all of the negative attention that the NSA – RSA relationship (or deal) has been getting, many are fired up. If the deal went down anything like it has been reported by Reuters, then rightfully so. However, the last minute boycotts of the RSA event to show disapproval are a bit much.
ForeScout Technologies has a Knack for NAC (and more) with ControlFabric and CounterACT
By David Monahan on Jan 16, 2014 8:35:02 PM
Recently I briefed with ForeScout Technologies, a Network Admission/Access Control (NAC) vendor, to get an update on the CounterACT platform it has been delivering and developing for a few years and to see its recently announced ControlFabric technology. I thought it wise to take another look at NAC vendors and how they address BYOD, rogue, or non-compliant devices that can be the source of many compliance and security headaches including advanced/targeted threats.
Recent Surveillance “Revelations” Part 2- What can we do?
By David Monahan on Jan 16, 2014 8:34:55 PM
Introduction and Thoughts About Recent Surveillance “Revelations”
By David Monahan on Jan 16, 2014 8:34:53 PM
Hello everyone! I have been at Enterprise Management Associates for a couple of months now and decided that it is time to write an introduction and blog. For those of you who have been following the blog from Scott Crawford, I hope you will find my blogs stimulating and possibly entertaining. I tend to throw a few zingers in on occasion for a little humor as sometimes security writing can come across a little dry.