The survey found that cloud adoption is widespread, with 70% of respondents using cloud services. Public clouds and hosted private clouds were most commonly used (49% each). The top benefits cited were business continuity, IT efficiency, and cost savings. However, security/privacy was the top concern. While IT organizations had primary responsibility for cloud security and management, these were seen as ongoing challenges. Respondents indicated that cloud costs had exceeded expectations more often than not, driven mainly by migration and management costs. Looking ahead, hybrid cloud was the most common planned new deployment, indicating cloud strategies remain evolving.
Cybersecurity breaches in the government seem to be all over the news. The sheer number and wild variety of sources for these breaches led us to wonder what federal agencies are really dealing with. SolarWinds® partnered with leading government research provider Market Connections to survey 200 federal IT and IT security professionals to find out their top cybersecurity concerns and the obstacles they face when implementing IT security strategies.
The results of our survey include:
Detailed insight into the threats, challenges, and sources of cybersecurity breaches the government faces in its IT infrastructure
Top hindrances in the implementation of appropriate IT security tools
Strategies and courses of action being deployed by federal IT professionals to remediate cybersecurity threats
These results demonstrate that a broad and concerning range of cybersecurity threats plague government agencies. Federal IT pros must consider taking a more pragmatic and unified approach to addressing the availability, performance, and security of their infrastructures.
Visit http://www.solarwinds.com/federal to learn more.
A survey of 200 Irish IT decision makers about cloud computing, April 2013.
Research conducted on behalf of Microsoft by Amárach Research.
The 2012 report is available here:
http://www.slideshare.net/amarach/microsoft-cloud-computing-research-april-2012
Cybersecurity breaches in the government seem to be all over the news. The sheer number and wild variety of sources for these breaches led us to wonder what federal agencies are really dealing with. SolarWinds® partnered with leading government research provider Market Connections to survey 200 federal IT and IT security professionals to find out their top cybersecurity concerns and the obstacles they face when implementing IT security strategies.
The results of our survey include:
Detailed insight into the threats, challenges, and sources of cybersecurity breaches the government faces in its IT infrastructure
Top hindrances in the implementation of appropriate IT security tools
Strategies and courses of action being deployed by federal IT professionals to remediate cybersecurity threats
These results demonstrate that a broad and concerning range of cybersecurity threats plague government agencies. Federal IT pros must consider taking a more pragmatic and unified approach to addressing the availability, performance, and security of their infrastructures.
Visit http://www.solarwinds.com/federal to learn more.
A survey of 200 Irish IT decision makers about cloud computing, April 2013.
Research conducted on behalf of Microsoft by Amárach Research.
The 2012 report is available here:
http://www.slideshare.net/amarach/microsoft-cloud-computing-research-april-2012
A look at IT decision making, budgeting, priorities and technology adoption among UK and Germany-based SMEs based on 500 interviews (250 in the UK and 250 in Germany) with IT decision makers from private sector SME organisations.
SolarWinds Application Performance End User Survey (Australia)SolarWinds
The proliferation of BYOD, cloud, SaaS and consumer technologies in the workplace have made the application the disruptive technology that will drive business IT into the coming decades. At the same time, the application delivery chain is becoming more complex to support as applications become more networked, virtualization drives IT infrastructure convergence and abstraction and end users become more mobile. These survey findings highlight the impact of application performance and availability on business end users, and their experiences with and expectations of IT when problems arise. Chief among the findings is that while the application is now the heart of businesses of all sizes and its performance is the lifeblood of success, IT continues to struggle to ensure its performance and availability.
SolarWinds Federal Cybersecurity Survey 2015SolarWinds
In December 2014, Market Connections, a leading government market research provider, in conjunction with SolarWinds conducted its second annual blind survey of 200 IT and IT security decision makers in the federal government, military and intelligence communities in an effort to uncover their most critical IT security challenges and to determine how to make potential security threats visible so IT can confront them. Respondents weighed in on top cybersecurity threat sources, obstacles to threat prevention, necessary tools for threat prevention, and their concerns, investment and policies regarding cybersecurity.
Visit http://www.solarwinds.com/federal to learn more.
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...SolarWinds
WINNER: Overall Best In Show at 2014 AFCEA® Cyber Conference Solutions Trail
In a 2014 survey by SolarWinds and Market Connections, federal government and military IT professionals stated that their biggest cybersecurity threats are people both malicious external attackers and clueless insiders. So how do Federal IT Pros prevent activity that can put their agencies security at risk and address these living cybersecurity threats when human behavior is out of their
control? Implementing continuous monitoring solutions can help federal agencies safeguard against human error and quickly identify vulnerabilities, compliance issues and other threats by automatically collecting data and reporting on the performance, availability and security posture of an IT infrastructure. While continuous monitoring of the performance of networks, applications, servers, and
more will not stop hackers from attempting to infiltrate a network or stop careless employees from accidental blunders, it can provide a first line of defense and critical insight into how the IT infrastructure is impacted. In this session you will learn: " The top cybersecurity threats plaguing agencies today and their sources " The types of continuous monitoring tools and technologies that can be leveraged by both IT operations and information security simultaneously to quickly detect and mitigate threats " How to overcome common obstacles and frustrations agencies face when implementing continuous monitoring solutions and what benefits they see upon implementation.
A new report from Dynamic Markets shows that – far from improving agility and effectiveness – 52 percent of organizations have missed deadlines and 75 percent have damaged their ability to innovate due to poor integration between cloud applications and other operational systems.
SolarWinds Application Performance End User Survey (Singapore)SolarWinds
The proliferation of BYOD, cloud, SaaS and consumer technologies in the workplace have made the application the disruptive technology that will drive business IT into the coming decades. At the same time, the application delivery chain is becoming more complex to support as applications become more networked, virtualization drives IT infrastructure convergence and abstraction and end users become more mobile. These survey findings highlight the impact of application performance and availability on business end users, and their experiences with and expectations of IT when problems arise. Chief among the findings is that while the application is now the heart of businesses of all sizes and its performance is the lifeblood of success, IT continues to struggle to ensure its performance and availability.
SolarWinds IT Trends Report 2015: Business at the Speed of IT (North America)SolarWinds
A look at the current state of significant new technology adoption, barriers to adoption and needs of IT pros tasked with delivering business impact in North America.
IDC Study on Enterprise Hybrid Cloud StrategiesEMC
White Paper discussing IDC Survey of over 650 enterprise IT decision makers that was designed to understand the evolution of the cloud across world’s largest IT organizations.
Harnessing Cloud Computing by Small and Medium Enterprises in KenyaAmos Wachanga
Presentation at 12th Egerton University International Conference on Cloud Computing and Cloud Based Services Adoption in Nairobi County and Developing Countries
Improving Incident Response: Building a More Efficient IT InfrastructureEmulex Corporation
This webcast will focus on the results of a study Emulex commissioned from Forrester Consulting that evaluates the range of issues that enterprise IT staffs are facing while managing the performance of their business-critical application and business services. The results of the study, entitled “Improving Incident Response: Building a More Efficient IT Infrastructure,” indicate that a lack of network visibility negatively impacts the ability of IT staff to identify and resolve application performance issues, which leads to substantial business productivity loss.
IT Alert Management Survey Results - February 2013SolarWinds
SolarWinds recently conducted a survey on IT Alert Management with participation from over 150 IT professionals. We learned about the challenges faced in managing alerts. Here are the findings…
IT Trends Report 2015: Business at the Speed of IT, Public Sector ResultsSolarWinds
IT Trends Report 2015: Business at the Speed of IT
A look at the current state of significant new technology adoption, barriers to adoption and needs of IT pros tasked with delivering organizational impact
(North America, Public Sector)
A look at IT decision making, budgeting, priorities and technology adoption among UK and Germany-based SMEs based on 500 interviews (250 in the UK and 250 in Germany) with IT decision makers from private sector SME organisations.
SolarWinds Application Performance End User Survey (Australia)SolarWinds
The proliferation of BYOD, cloud, SaaS and consumer technologies in the workplace have made the application the disruptive technology that will drive business IT into the coming decades. At the same time, the application delivery chain is becoming more complex to support as applications become more networked, virtualization drives IT infrastructure convergence and abstraction and end users become more mobile. These survey findings highlight the impact of application performance and availability on business end users, and their experiences with and expectations of IT when problems arise. Chief among the findings is that while the application is now the heart of businesses of all sizes and its performance is the lifeblood of success, IT continues to struggle to ensure its performance and availability.
SolarWinds Federal Cybersecurity Survey 2015SolarWinds
In December 2014, Market Connections, a leading government market research provider, in conjunction with SolarWinds conducted its second annual blind survey of 200 IT and IT security decision makers in the federal government, military and intelligence communities in an effort to uncover their most critical IT security challenges and to determine how to make potential security threats visible so IT can confront them. Respondents weighed in on top cybersecurity threat sources, obstacles to threat prevention, necessary tools for threat prevention, and their concerns, investment and policies regarding cybersecurity.
Visit http://www.solarwinds.com/federal to learn more.
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...SolarWinds
WINNER: Overall Best In Show at 2014 AFCEA® Cyber Conference Solutions Trail
In a 2014 survey by SolarWinds and Market Connections, federal government and military IT professionals stated that their biggest cybersecurity threats are people both malicious external attackers and clueless insiders. So how do Federal IT Pros prevent activity that can put their agencies security at risk and address these living cybersecurity threats when human behavior is out of their
control? Implementing continuous monitoring solutions can help federal agencies safeguard against human error and quickly identify vulnerabilities, compliance issues and other threats by automatically collecting data and reporting on the performance, availability and security posture of an IT infrastructure. While continuous monitoring of the performance of networks, applications, servers, and
more will not stop hackers from attempting to infiltrate a network or stop careless employees from accidental blunders, it can provide a first line of defense and critical insight into how the IT infrastructure is impacted. In this session you will learn: " The top cybersecurity threats plaguing agencies today and their sources " The types of continuous monitoring tools and technologies that can be leveraged by both IT operations and information security simultaneously to quickly detect and mitigate threats " How to overcome common obstacles and frustrations agencies face when implementing continuous monitoring solutions and what benefits they see upon implementation.
A new report from Dynamic Markets shows that – far from improving agility and effectiveness – 52 percent of organizations have missed deadlines and 75 percent have damaged their ability to innovate due to poor integration between cloud applications and other operational systems.
SolarWinds Application Performance End User Survey (Singapore)SolarWinds
The proliferation of BYOD, cloud, SaaS and consumer technologies in the workplace have made the application the disruptive technology that will drive business IT into the coming decades. At the same time, the application delivery chain is becoming more complex to support as applications become more networked, virtualization drives IT infrastructure convergence and abstraction and end users become more mobile. These survey findings highlight the impact of application performance and availability on business end users, and their experiences with and expectations of IT when problems arise. Chief among the findings is that while the application is now the heart of businesses of all sizes and its performance is the lifeblood of success, IT continues to struggle to ensure its performance and availability.
SolarWinds IT Trends Report 2015: Business at the Speed of IT (North America)SolarWinds
A look at the current state of significant new technology adoption, barriers to adoption and needs of IT pros tasked with delivering business impact in North America.
IDC Study on Enterprise Hybrid Cloud StrategiesEMC
White Paper discussing IDC Survey of over 650 enterprise IT decision makers that was designed to understand the evolution of the cloud across world’s largest IT organizations.
Harnessing Cloud Computing by Small and Medium Enterprises in KenyaAmos Wachanga
Presentation at 12th Egerton University International Conference on Cloud Computing and Cloud Based Services Adoption in Nairobi County and Developing Countries
Improving Incident Response: Building a More Efficient IT InfrastructureEmulex Corporation
This webcast will focus on the results of a study Emulex commissioned from Forrester Consulting that evaluates the range of issues that enterprise IT staffs are facing while managing the performance of their business-critical application and business services. The results of the study, entitled “Improving Incident Response: Building a More Efficient IT Infrastructure,” indicate that a lack of network visibility negatively impacts the ability of IT staff to identify and resolve application performance issues, which leads to substantial business productivity loss.
IT Alert Management Survey Results - February 2013SolarWinds
SolarWinds recently conducted a survey on IT Alert Management with participation from over 150 IT professionals. We learned about the challenges faced in managing alerts. Here are the findings…
IT Trends Report 2015: Business at the Speed of IT, Public Sector ResultsSolarWinds
IT Trends Report 2015: Business at the Speed of IT
A look at the current state of significant new technology adoption, barriers to adoption and needs of IT pros tasked with delivering organizational impact
(North America, Public Sector)
Microsoft Cloudscape 2015 surveyed the CIOs of 100 Indian enterprises to gain insights into cloud adoption trends and challenges faced by them. This survey highlights that as most business experimenting with different approaches to the cloud, availability of cloud skills and training seems to be the top concerns for enterprises, edging out security and privacy related concerns.
Is Hybrid Cloud becoming the default?
If you are a CIO, CTO, Head of Technology, CEO, CFO or any interest in Cloud Infrastructure you have to see this report, conducted by Vanson Bourne on behalf of Nutanix
Presentation of our survey of 625 IT decision-makers across Europe in mid to large enterprises. Questions include:
Is enterprise cloud adoption becoming a reality in 2015?
Which cloud adoption model will prevail; public, private or hybrid?
What percentage of workloads would move to the cloud and which percentage will remain in the data centre?
What will the role of corporate data centres be in the cloud era?
Will data centre outsourcing become more common?
How will on-premise and cloud-based IT infrastructure be connected?
What will cloud 2020 look like?
The RightScale 2017 State of the Cloud Report is now hot off the press. It includes insights based on the responses of more than 1,000 IT professionals to give you a comprehensive picture of cloud adoption trends. The survey results provide the hard data you need to benchmark your organization against others of similar size, develop your 2017 cloud strategy and goals, and mobilize your internal stakeholders for cloud initiatives.
A paper-based survey was conducted between May 4-8, 2015 at the Microsoft Ignite show, one of the largest gatherings of IT professionals focused on support of their enterprise IT needs with evolving technology.
The primary research goal was to capture hard data on the pace of moving to the cloud. In addition, research sought to determine the value of cloud consumption and cost metrics and whether attendees’ companies were actually tracking and using those metrics today.
Survey participants represented firms from a wide range of industries including business & financial services, manufacturing, healthcare, telecom services, media, and utilities.
To what extent has cloud become a continual source of innovation for organizations? Have they significantly altered their cloud outlook in the face of economic pressures? In what ways are cloud and artificial intelligence coming together?
Accenture Finds that Vast Majority of Companies are Embracing the Journey to the Cloud but Alignment to Business Strategy Lags
Accenture’s “Cloud in the Boardroom” study found that although there’s a significant uptick in cloud adoption at the enterprise level, companies are missing the full benefit of their cloud adoptions by not factoring their IT implementations into their overall business strategy.
Accenture conducted an online survey, fielded between January and February of 2016, of 1,879 C-level executives of companies across 15 industries in 13 countries. Some key findings include:
- More than 95 percent of respondents have a five-year cloud strategy already in place, however only 38 percent have aligned these plans with overarching business goals.
- Four of five executives reported that less than half of their business functions are currently operated in public cloud, but noted increasing intent on moving more of their operations to the cloud in the coming years.
- 89 percent of respondents agree that implementing cloud strategies is a competitive advantage which allows their companies to leverage innovation through agility.
- While half of respondents cite security as their biggest concern with the public model, more than 80 percent believe public cloud security is more robust and transparent than what they’re able to provide in-house.
“Our research confirms that enterprise clients are overwhelmingly recognizing the value of a Cloud First agenda—leveraging the cloud to bring applications, infrastructure and business processes together and be delivered as-a-Service—as a driver of digital innovation, and they are upfront about the guidance they need in order to move even faster on their journey to the cloud,” said Jack Sepple, senior managing director, Accenture Cloud and Accenture Operations group technology officer. “By taking steps to align their cloud and business strategies and to involve IT more directly in cloud decision-making, companies will be better positioned on their journey to the cloud as the as-a-Service economy matures.”
Similar to 2018 Cloud Survey Results by Syncsort (20)
AI-Ready Data - The Key to Transforming Projects into Production.pptxPrecisely
Moving AI projects from the laboratory to production requires careful consideration of data preparation. Join us for a fireside chat where industry experts, including Antonio Cotroneo (Director, Product Marketing, Precisely) and Sanjeev Mohan (Principal, SanjMo), will discuss the crucial role of AI-ready data in achieving success in AI projects. Gain essential insights and considerations to ensure your AI solutions are built on a solid foundation of accurate, consistent, and context-rich data. Explore practical insights and learn how data integrity drives innovation and competitive advantage. Transform your approach to AI with a focus on data readiness.
Building a Multi-Layered Defense for Your IBM i SecurityPrecisely
In today's challenging security environment, new vulnerabilities emerge daily, leaving even patched systems exposed. While IBM works tirelessly to release fixes as they discover vulnerabilities, bad actors are constantly innovating. Don't settle for reactive defense – secure your IT with a layered approach!
This holistic strategy builds multiple security walls, making it far harder for attackers to breach your defenses. Even if a certain vulnerability is exploited, one of the controls could stop the attack or at least delay it until you can take action.
Join us for this webcast to hear about:
• How security risks continue to evolve and change
• The importance of keeping all your systems patched an up-to-date
• A multi-layered approach to network, system object and data security
Navigating the Cloud: Best Practices for Successful MigrationPrecisely
In today's digital landscape, migrating workloads and applications to the cloud has become imperative for businesses seeking scalability, flexibility, and efficiency. However, executing a seamless transition requires strategic planning and careful execution. Join us as we delve into the insightful insights around cloud migration, where we will explore three key topics:
i. Considerations to take when planning for cloud migration
ii. Best practices for successfully migrating to the cloud
iii. Real-world customer stories
Unlocking the Power of Your IBM i and Z Security Data with Google ChroniclePrecisely
In today's ever-evolving threat landscape, any siloed systems, or data leave organizations vulnerable. This is especially true when mission-critical systems like IBM i and IBM Z mainframes are not included in your security planning. Valuable security data from these systems often remains isolated, hindering your ability to detect and respond to threats effectively.
Ironstream and bridge this gap for IBM systems by integrating the important security data from these mission-critical systems into Google Chronicle where it can be seen, analyzed and correlated with the data from other enterprise systems Here's what you'll learn:
• The unique challenges of securing IBM i and Z mainframes
• Why traditional security tools fall short for mainframe data
• The power of Google Chronicle for unified security intelligence
• How to gain comprehensive visibility into your entire IT ecosystem
• Real-world use cases for integrating IBM i and Z security data with Google Chronicle
Join us for this webcast to hear about:
• The unique challenges of securing IBM i and IBM Z systems
• Real-world use cases for integrating IBM i and IBM Z security data with Google Chronicle
• Combining Ironstream and Google Chronicle to deliver faster threat detection, investigation, and response times
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
Are you considering leveraging the cloud alongside your existing IBM AIX and IBM I systems infrastructure? There are likely benefits to be realized in scalability, flexibility and even cost.
However, to realize these benefits, you need to be aware of the challenges and opportunities that come with integrating your IBM Power Systems in the cloud. These challenges range from data synchronization to testing to planning for fallback in the event of problems.
Join us for this webcast to hear about:
• Seamless migration strategies
• Best practices for operating in the cloud
• Benefits of cloud-based HA/DR for IBM AIX and IBM i
It can be challenging display and share capacity data that is meaningful to end users. There is an overabundance of data points related to capacity, and the summarization of this data is difficult to construct and display.
You are already spending time and money to handle the critical need to manage systems capacity, performance and estimate future needs. Are you it spending wisely? Are you getting the level of results from your investment that you really need? Can you prove it?
The good news is that the return on investment of implementing capacity management and capacity planning is most definitely positive and provable, both in terms of tangible monetary value and in some less tangible but no-less-valuable benefits.
Join us for this webinar and learn:
• Top Trends in Capacity Management
• Common customer pain points
• Ways to demonstrate these benefits to your company
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Precisely
Ready to improve efficiency, provide easy to use data automations and take materials master (MM) data maintenance to the next level?
Find out how during our Automate Studio training on March 28 – led by Sigrid Kok, Principal Sales Engineer, and Isra Azam, Sales Engineer, at Precisely.
This session’s for you if you want to discover the best approaches for creating, extending or maintaining different types of materials, as well as automating the tricky parts of these processes that slow you down.
Greater control over your Automate Studio business processes means bigger, better results. We’ll show you how to enable your business users to interact with SAP from Microsoft Office and other familiar platforms – resulting in more efficient SAP data management, along with improved data integrity and accuracy.
This 90-minute session will be filled with a variety of topics, including:
real world approaches for creating multiple types of materials, balancing flexibility and power with simplicity and ease of use
tips on material creation, including
downloading the generated material number
using formulas to format prior to upload, such as capitalization or zero padding to make it easy to get the data right the first time
conditionally require fields based on other field entries
using LOV for fields that are free form entry for standard values
tips on modifying alternate units of measure, building from scratch using GUI scripting
modify multiple language descriptions, build from scratch using a standard BAPI
make end-to-end MM process flows more of a reality with features including APIs and predictive AI
Through these topics, you’ll gain plenty of actionable takeaways that you can start implementing right away – including how to:
improve your data integrity and accuracy
make scripts flexible and usable for automation users
seamlessly handle both simple and complex parts of material master
interact with SAP from both business user and script developers’ perspectives
easily upload and download data between SAP and Excel – and how to format the data before upload using simple formulas
You’ll leave this session feeling ready and empowered to save time, boost efficiency, and change the way you work.
Automate Studio reduces your dependency on technical resources to help you create automation scenarios – and our team of experts is here to make sure you get the most out of our solution throughout the journey.
Questions? Sigrid & Isra will be ready to answer them during a live Q&A at the end of the session.
Who should attend:
Attendees who will get the most out of this session are Automate Studio developers and runners familiar with SAP MM. Knowledge of Automate Studio script creation is nice to have, but not required.
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Precisely
Join us for an insightful roundtable discussion featuring experts from AWS, Confluent, and Precisely as they delve into the complexities and opportunities of migrating mainframe data to the cloud.
In this engaging webinar, participants will learn about the various considerations, strategies, and customer challenges associated with replicating mainframe data to cloud environments.
Our panelists will share practical insights, real-world experiences, and best practices to help organizations successfully navigate this transformative journey.
Whether you're considering migrating and modernizing your mainframe applications to cloud, or augmenting mainframe-based applications with data replication to cloud, this roundtable will provide valuable perspectives and insights to maximize the benefits of migrating mainframe data to the cloud.
Join us on March 27 to gain a deeper understanding of the opportunities and challenges in this evolving landscape.
Data Innovation Summit: Data Integrity TrendsPrecisely
Data integrity remains an evolving process of discovery, identification, and resolution. With an all-time low in public confidence on data being used for decision-making, attention has gradually shifted to data quality and data integration across multiple systems and frameworks. Data integrity becomes a focal point again for companies to make strategic moves in a world facing an evolving economy.
Key takeaways:
· How to build a data-driven culture within your organization
· Tips to engage with key stakeholders in your business and examples from other businesses around the world
· How to establish and maintain a business-first approach to data governance
· A summary of the findings from a recent survey of global data executives by Drexel University's LeBow College of Business
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
Artificial Intelligence (AI) has become a strategic imperative in a rapidly evolving business landscape. However, the rush to embrace AI comes with risks, as illustrated by instances of AI-generated content with fake citations and potentially dangerous recommendations. The critical factor underpinning trustworthy AI is data integrity, ensuring data is accurate, consistent, and full of rich context.
Attend our upcoming webinar, "AI You Can Trust: Ensuring Success with Data Integrity," as we explore organizational challenges in maintaining data integrity for AI applications and real-world use cases showcasing the transformative impact of high-integrity data on AI success.
During this panel discussion, we'll highlight everything from personalized recommendations and AI-powered workflows to machine learning applications and innovative AI assistants.
Key Topics:
AI Use Cases with Data Integrity: Discover how data integrity shapes the success of AI applications through six compelling use cases.
Solving AI Challenges: Uncover practical solutions to common AI challenges such as bias, unreliable results, lack of contextual relevance, and inadequate data security.
Three Considerations of Data Integrity for AI: Learn the essential pillars—complete, trusted, and contextual—that underpin data integrity for AI success.
Precisely and AWS Partnership: Explore how the collaboration between Precisely and Amazon Web Services (AWS) addresses these challenges and empowers organizations to achieve AI-ready data.
Join our panelists to unlock the full potential of AI by starting your data integrity journey today. Trust in AI begins with trusted data – let's future-proof your AI together.
Less Bias. More Accurate. Relevant Outcomes.
Optimisez la fonction financière en automatisant vos processus SAPPrecisely
La fonction finance est au cœur du succès de l’entreprise, et doit aussi évoluer pour faire face aux enjeux d’aujourd’hui : aller plus vite, traiter plus d’informations et assurer une qualité des données sans faille.
Nous vous proposons de découvrir ensemble comment répondre à ces défis, notamment les points suivants :
Gérer les référentiels comptables et financiers, comptes comptables, clients, fournisseurs, centres de couts, centres de profits…Accélérer les clôtures et permettre de passer les écritures comptables nécessaires, de lancer les rapports adéquats et d’extraire les informations en temps réelOrganiser les taches en les affectant de manière ordonnancée à leurs responsables ou en les lançant automatiquement et les suivre de manière granulaire
Notre webinaire sera l’occasion d’évoquer et d’illustrer cette palette de capacités disponibles pour des utilisateurs métier sans code ou avec peu de code et nous vous espérons nombreux.
In dieser Präsentation diskutieren wir, welche Tools aus unserer Sicht dabei helfen, die Transformation zu SAP S/4HANA optimal zu gestalten. Aber wir blicken auch nach vorne!
In unserem Beitrag fokussieren wir uns nicht nur auf kurzfristige Lösungen, sondern es geht auch um das Thema „Nachhaltigkeit“. Um Investitionen für die Zukunft.
Dazu gehören Entwicklungen, die die SAP Welt nachhaltig verändern werden.
Wir betrachten zukünftige Technologien, wie KI oder Machine Learning, die dazu beitragen, datenintensive SAP Prozesse zu optimieren, die Datenqualität zu verbessern, manuelle Prozesse zu reduzieren und Mitarbeiter zu entlasten.
Werfen Sie mit uns einen Blick in die Zukunft und gestalten Sie die digitale Transformation in Ihrem Unternehmen mit.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
2. Respondent
Profile
917 professionals
who do not work in computer
services or computer software
completed the survey.*
22% of them
have primary responsibility
for Cloud management or
planning Cloud initiatives
within their company.
Another 52% of them
share that responsibility.
73% of
respondents
have more than 100 employees
at their organization. 58% had
more than 500.
The most often cited industries were Health
Care, Education, Finance, and Banking each
with 8% of response.
2
3. Principal
Findings
Cloud adoption is widespread
and has evolved far beyond
early stage technology. The
majority of respondents (70%)
report using Cloud services.
31% are not using Cloud now;
Of those, 29% are planning to
use Cloud in the future.
(Approximately 78% use or will
be using Cloud.)
Cloud types used: The most
commonly chosen were Public
Clouds or Hosted Private
Clouds, each at 49%.* Hybrid
and On-premise followed, at
37% and 36% respectively.
• Analysis revealed that use of On-Premise
Private, Hybrid, and Multi-Cloud types
increased substantially with the number
of employees. (From those with less
than 100 employees, to those with more
than 1,000.) **
• Regarding plans for Cloud types, Hybrid
Clouds were the most common choice
(25%).***
Most popular cloud services:
Software as a Service (61%)
was used by the majority of
respondents, followed by
Infrastructure as a Service
(47%).****
Leading cloud benefits:
Respondents selected business
continuity, IT efficiency, and
operational cost savings (On a
1 – 5 scale, rated an average of
3.68, 3.51, and 3.44,
respectively.)
3
4. Principal
Findings
Top three
challenges
Security/Privacy in the cloud is
the chief concern of professionals
(On a 1 – 4 scale, rated an average
of 2.84.) System and application
integration (2.75), and increased
cost followed (2.71).*
Management
responsibility
The majority of respondents indicate
that internal IT staff has responsibility
for cloud security, disaster recovery,
and performance and capability
management (over 70%)—as
compared to Cloud service providers
(between 29% and 34%).**
Cloud strategy
Many organizations selectively
migrate applications to the
Cloud on an ad hoc basis (42%);
fewer (29%) have a centralized
strategy/center of excellence to
proactively plan and manage
applications that are migrated
and deployed to the Cloud.
Cost
Just over half the respondents
noted that Cloud has cost their
organizations more than anticipated
(53% Yes, 47% No). Of those that
spent more than anticipated,
migration and management
were the primary drivers
of increased cost.***4
5. Conclusions
Cloud use is pervasive, and
IT leaders view it as offering
great business benefits for
organizations, particularly
in IT management:
business continuity (preventing
business interruptions), IT
efficiency, and operational
cost savings.
Even though Cloud market
appears well established, certain
aspects are still evolving and will
challenge companies in years
to come:*
• Strategic thinking about Cloud is
needed. IT organizations most
common practice is the selective
and ad hoc migration of data/
applications to the Cloud. Fewer
have a centralized strategy to plan
and manage migration of
applications to the Cloud.
• Unsurprisingly, data and
application security/privacy in the
cloud are the chief concerns of
respondents.** More data and
applications are moving outside
the corporate firewall, indicated by
the majority’s use of SaaS, and
their fairly common use of IaaS
and PaaS.
• Professionals also perceived
system/application integration and
increased cost of the Cloud as
challenges.***
Though Cloud is a game-
changing tool, professionals
still have work to do—adopting
technologies, practices, and
methods to make their Cloud
initiatives more strategic and
secure.
5
6. • 49% of respondents use a Public Cloud or
Hosted Private (each). 37% use a Hybrid
and 36% an On-Premise Private.
• Only 14% use Multi-Cloud
6
Cloud Types Using
Note that this was a select all that apply
question so responses will not total to 100%.
Public Hosted
Private
Hybrid On-Premise
Private
Multi-cloud Don’t know Other
(please
specify)
0%
10%
20%
30%
40%
50%
60%
Does your company currently use any of the
following Cloud types? Select all that apply.
7. Regarding their Cloud strategy,
42% indicated that We selectively
migrate/deploy applications to
the cloud on an ad-hoc basis.
39% indicated We expect to
always have a data center, with
a hybrid model.
Only 14% reported that We
prefer Cloud-native solutions.
7
Cloud Strategy
Note that this was a select all that apply
question so responses will not total to 100%.
We selectively
migrate/deploy
applications to
the cloud on an
ad-hoc basis.
We expect to
always have a
data center,
with a hybrid
model.
We have a
centralized
strategy/center
of excellence to
proactively plan
and manage
what
applications we
migrate and
deploy to the
cloud.
Our goal is
standardization.
Our goal is to
eventually
adopt an all-
cloud strategy.
We have a
Cloud-first
strategy.
We prefer
Cloud-native
solutions.
Other (please
specify)
0%
5%
10%
15%
20%
25%
30%
35%
40%
45%
Which of the following describes your organization’s
Cloud strategy? Select all that apply.
8. • 61% of respondents use SaaS and 47%
use Iaas (Infrastructure as a Service).
• Only 8% use Capacity Management as
a Service.
8
Cloud Services
Note that this was a select all that apply
question so responses will not total to 100%.
0%
10%
20%
30%
40%
50%
60%
70%
Does your company use any of the following
Cloud services? Select all that apply.
9. • 22% of respondents reported that they
have no plans to use DRaaS.
• 14% are currently using it. Another 10%
indicated that they will adopt it in less
than a year and 17% will adopt in the
next 1 to 2 years.
9
DRaaS Use
We are
currently
using DRaaS
We plan to
adopt DRaaS
in less than a
year
We plan to
adopt DRaaS
in 1-2 years
We plan to
adopt DRaaS
in 3-5 years
We plan to
adopt DRaaS
in 5 years or
more
We have no
plans to adopt
DRaaS
I don’t know
0%
5%
10%
15%
20%
25%
30%
What are your organization’s plans regarding implementing
Disaster Recovery as a Service
(DRaaS) in a ground to cloud, cloud to cloud,
or cloud to ground configuration?
10. The top organizational concern regarding
DRaas was Privacy concerns (49%). This
was followed by Regulatory compliance
issues at 37%.
Only 9% of respondents reported Lack of
IT knowledge as a concern.
10
DRaaS Challenges
Note that this was a select all that apply
question so responses will not total to 100%. 0%
10%
20%
30%
40%
50%
60%
What challenges does your organization face in
using or considering cloud solutions for DRaaS?
Select all that apply.
11. Regarding Cloud responsibilities, over 70%
of respondents indicated that the Internal IT
organization was responsible for Security,
Disaster Recovery and Managing Capacity
& Performance.
The figures for Cloud Service Providers in
these areas were around 30%.
So the figures for Internal IT were roughly
more than double those of Cloud providers.
11
Cloud Responsibilities
Note that this was a select all that apply
question so responses will not total to 100%.
Security Disaster Recovery Managing Capacity and
Performance
0%
10%
20%
30%
40%
50%
60%
70%
80%
Who is responsible for each of the following
areas of cloud? Select all that apply.
Cloud service provider
Internal IT organization
Don't know
Other
12. • The most often used Big Data tool for
the Cloud was Azure SQL (25%).
• 15% reported using Spark and 14%
selected Azure Event Hub.
• Only 4% use Impala.
12
Big Data Tools
for Cloud
Note that this was a select all that apply
question so responses will not total to 100%.
0%
5%
10%
15%
20%
25%
30%
Which of the following “Big Data” tools and frameworks
does your company use in the Cloud? Select all that apply.
13. • 40% of respondents indicated that they
connect On-premise Data Warehouse(s)
to the cloud. This was closely followed
by On-premise RDBMS with 34%.
• The remaining options received 16%
response or less.
13
Data Sources for Cloud
Note that this was a select all that apply
question so responses will not total to 100%.
On-premise
Data
Warehouse
On-premise
RDBMS
On-premise
Hadoop
Cluster
On-premise
NoSQL
Database
Mainframe IBM i server Other Cloud
sources
Other
(please
specify)
0%
5%
10%
15%
20%
25%
30%
35%
40%
45%
What data source(s) do you connect to the Cloud?
Select all that apply.
14. Respondents were asked to rate a set of areas
of Cloud computing as representing No Challenge,
Minimal, Moderate or Major Challenge.
Responses were tallied on a 4-point scale
(1=No Challenge...4=Major Challenge).
The area with the greatest average challenge
was Data and application security/privacy at 2.84.
Integrating with existing systems and/or applications
followed at 2.75 and Increased cost at 2.71.
Vendor lock-in with one Cloud service provider
had the lowest average at 2.47.
14
Cloud Challenges
Ratings
2.2 2.3 2.4 2.5 2.6 2.7 2.8 2.9
Data and application security/privacy
Integrating with existing systems and/or
applications
Increased cost
Government/Industry regulatory compliance
Increased complexity
Internal skills/resources
Data governance and lineage
Performance/latency
Capacity and application performance
planning/management
Data availability/disaster recovery
Keeping data in sync with on-premise systems
Ensuring SLAs and incident response time
requirements are met
Vendor lock-in with one Cloud service provider
Please rate the amount of challenge to your organization
for the following areas of Cloud computing.
15. Respondents were also asked to rate benefits
of Cloud computing and their responses
were tallied on a 5-point scale
(1=Not Important...5=Highly Important).
The benefit with the highest average was
Business continuity (3.68) followed by IT
efficiency at 3.51 and Operational cost
savings at 3.44.
Convenience for the development teams
had the lowest average benefit at 3.00
15
Cloud Benefits Ratings
0.0 0.5 1.0 1.5 2.0 2.5 3.0 3.5 4.0
Business continuity
IT efficiency
Operational cost savings
Elastic capacity – scale up, scale down as needed
IT capacity on demand
Capital expense cost savings
Ability to rapidly launch new products and services
Controlled, auditable document and data sharing
Ability to supplement in-house skills and resources
Improved collaboration
Convenience for the development teams
What does your organization view as the
most important benefits of the cloud?
16. Just over half of respondents indicated
that the cloud cost their company more
than anticipated (53%).
16
Cloud Cost More
Than Anticipated?
Yes No
40%
45%
50%
55%
Has the cloud cost your company
more than anticipated?
17. Of those who reported that costs were
more than anticipated, the two leading
drivers were Migration costs (62%) and
Management costs (57%).
The lowest sources of cost were
Purchasing too much capacity (19%)
and Availability/Recovery issues that
impacted the business (17%).
17
What Driving Up
(Cloud) Costs?
Note that this was a select all that apply
question so responses will not total to 100%.
0%
10%
20%
30%
40%
50%
60%
70%
In the previous question, you noted that the Cloud
cost your company more than anticipated.
What is driving up the costs? Select all that apply.
18. • One-quarter of respondents
reported that they will begin
using a Hybrid cloud.*
• 20% (each) will begin using a
Public or Hosted Private cloud.
• Only 12% will use a Multi-cloud.
18
Cloud Type Plans
Note that this was a select all that apply
question so responses will not total to 100%. Hybrid Public Hosted
Private
On-Premise
Private
Multi-cloud We have no
plans to
begin using
these Cloud
types.
Don’t know Other
(please
specify)
0%
5%
10%
15%
20%
25%
30%
35%
Does your company plan to BEGIN using any of the
following Cloud types? Select all that apply.
19. Regarding plans for Cloud services, 24% of
respondents indicated that they will begin
using Software as a Service and 21% will
use Infrastructure as a Service.
Only 8% reported that they will begin
using Capacity Management as a Service.
19
Cloud Service Plans
Note that this was a select all that apply
question so responses will not total to 100%.
0%
5%
10%
15%
20%
25%
30%
35%
40%
Does your company plan to BEGIN using any of the following
Cloud services? Select all that apply.
Editor's Notes
*Note: These are the General results for all respondents, minus the computer services and computer software industries.
*Analysts’ observations on Cloud Types: “The worldwide public cloud services market is projected to grow 21.4 percent in 2018 to total $186.4 billion, up from $153.5 billion in 2017,” according to Gartner, Inc. April 12, 2018.
**Note on Cloud Types: These Cloud schemes may demand large-company resources for planning, implementation, and ongoing management.
***Note on Plans for Cloud Types: Given respondents’ concerns about privacy, we might expect the trend toward hybrid clouds to continue. Hybrid clouds are a solid way to span traditional data center practices. Companies can store regulated customer information and intellectual property in a Private Cloud, but locate less critical information in a Public Cloud.
****Note on Cloud Services: Findings showed that although DRaaS was not very popular, it would gain traction in the future. In addition to the approximately 14% of respondents that currently used DRaaS, 10% will adopt it in less than a year, and another 17% said they planned to adopt it in the next 1 – 2 years. However, the adoption curve appears to be gradual.
Analysts’ observations on Cloud Services: “Software as a service (SaaS) remains the largest segment of the cloud market, with revenue expected to grow 22.2 percent to reach $73.6 billion in 2018. Gartner expects SaaS to reach 45 percent of total application software spending by 2021. The fastest-growing segment of the market is cloud system infrastructure services (infrastructure as a service or IaaS), which is forecast to grow 35.9 percent in 2018 to reach $40.8 billion.” April 12, 2018
*Note on Cloud Challenges: We know that Syncsort is interested in compliance in the Cloud and is helping customers to deal with this issue. Government/industry regulatory compliance was the 4th challenge of respondents, receiving an average of 2.70.
**Note on Management Responsibility: This finding needs context and should be viewed in light of the type of service an IT organization uses. We examined the offerings of several Cloud providers, including Microsoft Azure and Amazon Web Services. Most Cloud providers have shared responsibility models, typically outlined in an SLA, which defines accountability, depending upon the type of service used. Examples of Azure’s and AWS’ definitions of responsibility are shown in the links below.
https://docs.microsoft.com/en-us/azure/security/security-management-and-monitoring-overview
https://aws.amazon.com/compliance/shared-responsibility-model/
***Note to the team on Cost: As mentioned during the survey development process, we are not fans of these binary yes/no questions, since they typically don’t get at the nuances of the customer’s situation. The way the question is worded might capture respondents’ general impressions, but the responses are not really concrete. (There is a classic example of the pitfalls of this type of yes/no question, concerning the death penalty, which we can discuss some time.)
*Note on Cloud evolution/benefits and challenges: Cloud has emerged as the foundation of business infrastructure and services, yet IT leaders continue to grapple with the strategy and complex decisions it presents. They’re juggling potential risks, such as data privacy and integration with benefits, such as business continuity and IT efficiency.
**Note on Security/Privacy in the Cloud: Though data and application breaches are not unique to Cloud computing, IT professionals clearly need the capabilities to make cloud schemes more secure.
IT professionals are no doubt aware that Cloud infrastructure is an attractive target for sophisticated cybercriminals seeking data.
“In 2018 alone, Tesla’s cloud servers were infected with cryptocurrency miners, and FedEx sensitive customer data was compromised.” ComputerWeekly.com, July 13, 2018, Warwick Ashford.
***Note on System/Application Integration: Team, you might emphasize that strategy is a key part of the integration puzzle, although fewer respondents indicated having strategic plans for Cloud in place. Integration is a natural concern according to industry watchers, “Businesses have to contend with making cloud a functional part of the architecture…This problem goes hand in hand with the painful transitions from legacy systems, as IT pros figure out exactly which systems should be migrated to the cloud, which systems should be rebuilt for the cloud, and which systems are best left alone (at least for the time being).” CompTIA, 2018 Trends in Cloud Computing, May 2018.
As noted previously, you can mention regulatory compliance as the fourth most commonly chosen challenge among professionals.
*Note: There is a slight discrepancy between the percent of respondents indicating that DRaaS is one of their cloud services (previous slide) and the percent reporting that they are currently using DRaas here. We believe that this is due to the fact that this question focuses on DRaaS plans and use, whereas the previous question asked respondents to think about the broader mix of cloud services.
Note: Please see our comments regarding responsibility. As our review of vendor materials showed, responsibilities can vary, depending upon the type of Cloud service used.
*Note: All respondents (those who use Cloud and who do not use Cloud) answered this question and the following one.