Azure Competitive Summary

Bottom-Line Assessment August 2014 Microsoft Azure meets 75% of Gartner’s required criteria for cloud infrastructure as a service (IaaS). As a result, Gartner advises enterprises to consider Azure for specific projects, deployments and applications, but not for widespread enterprise production workloads. Azure has emerged as the clear No. 2 market share leader in public cloud…

Amazon Web Services Bottom Line Assessment

AWS is the dominant cloud IaaS provider and has a number of key strengths: Network offerings and configurations: AWS offers customer control and flexibility over defining network topology and private network connections through the Amazon Virtual Private Cloud (VPC) and Direct Connect offerings. It also includes robust load-¬‐balancing options for both external-¬‐ and internal-¬‐facing applications.…

Cisco 2014 Annual Security Report

Executive Summary The Trust Problem The exploitation of trust is a common mode of operation for online attackers and other malicious actors. They take advantage of users’ trust in systems, applications, and the people and businesses they interact with on a regular basis. And this approach works: There is ample evidence that adversaries are coming…

2014/15 Integrated Backup Appliance Buyer’s Guide

By Charley McMaster and Jerome Wendt Introduction The DCIG 2014-15 Integrated Backup Appliance Buyer’s Guide provides organizations the unique opportunity to review and evaluate the large number of backup appliances that represent more steps forward in the continuing effort to simplify backup in today’s real-world IT environments. By providers integrating the core components needed to…

Alert Logic Cloud Security Report

Research on the Evolving State of Cloud Security Spring 2014 Executive Summary ATTACKS INCREASED ACROSS ALL INCIDENT TYPES in both on-premises and CHP environments. ENTERPRISES CONTINUE TO ADOPT CLOUD, FOCUS ON SECURITY In early 2012, Alert Logic launched the first in a series of reports on cloud security, with the goal of creating the IT…

Cisco 2014 Annual Security Report

Executive Summary The Trust Problem The exploitation of trust is a common mode of operation for online attackers and other malicious actors. They take advantage of users’ trust in systems, applications, and the people and businesses they interact with on a regular basis. And this approach works: There is ample evidence that adversaries are coming…

2014 Cloud Guide

INSIGHTS FOR A GREAT MIGRATION RISE ABOVE THE NOISE. WHAT YOU NEED TO KNOW (AND WHERE TO FIND IT) The cloud space is noisy, with competing opinions, statistics and data. There’s plenty of information out there—but knowing what to trust can be a challenge. Here’s a quick look at important cloud computing trends and a…

The Demand for Hybrid Online File Sharing Solutions

Date: February 2014 Author: Terri McClure, Senior Analyst and Bill Lundell, Senior Research Analyst – Enterprise Strategy Group Abstract: The OFS market is rapidly maturing from file storage services for consumers to technology solutions that require features to effectively manage and secure business data. As part of this evolution, there is increasing demand for alternatives…

The 2014 Harvey Nash CEO Survey

Albert Ellis, Chief Executive, Harvey Nash plc The 2014 CIO Survey is the largest survey we have ever undertaken in almost two decades of researching the market. With more than 3,200 CIOs and technology leaders taking part globally, it is one of the largest studies of its kind ever produced – and I am grateful…

2014 Service Availability Benchmark Survey

Published by Continuity Software Executive Summary This benchmark survey presents service availability metrics that allow IT infrastructure, business continuity, and disaster recovery managers to compare their organization’s performance and practices to their peers. The results presented here are based on responses from 155 professionals from a wide range of industries and geographies collected through an…