Leading IT analyst firm Enterprise Management Associates (EMA) has published a new research report “Network Engineering and Operations in a Multi-Cloud World.” This report is based on a survey of 250 enterprise IT decision-makers with direct involvement in their cloud networking strategy and several one-on-one interviews with network architects and IT executives.
These slides explore the results of this research.
Webinar presentation September 20, 2016.
This deck introduces the CSCC’s deliverable, Cloud Security Standards: What to Expect and What to Negotiate V2.0, which was updated in August 2016 to reflect the latest developments in cloud security standards. The presentation is an overview of the various security standards, frameworks, and certifications that exist for cloud computing. This information will help cloud customers understand and distinguish between the different types of security standards that exist and assess the security standards support of their cloud service providers.
Read the CSCC's deliverable here: http://www.cloud-council.org/deliverables/cloud-security-standards-what-to-expect-and-what-to-negotiate.htm
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureStefaan Van daele
This is the presentation I have given at the Secure Cloud 2014 conference in Amsterdam with a small update: it contains the link to the website with additional information about security use cases in the different Cloud models ( IaaS, PaaS, SaaS )
Webinar presentation September 20, 2016.
This deck introduces the CSCC’s deliverable, Cloud Security Standards: What to Expect and What to Negotiate V2.0, which was updated in August 2016 to reflect the latest developments in cloud security standards. The presentation is an overview of the various security standards, frameworks, and certifications that exist for cloud computing. This information will help cloud customers understand and distinguish between the different types of security standards that exist and assess the security standards support of their cloud service providers.
Read the CSCC's deliverable here: http://www.cloud-council.org/deliverables/cloud-security-standards-what-to-expect-and-what-to-negotiate.htm
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureStefaan Van daele
This is the presentation I have given at the Secure Cloud 2014 conference in Amsterdam with a small update: it contains the link to the website with additional information about security use cases in the different Cloud models ( IaaS, PaaS, SaaS )
Cloud Security is critical to Data Security and Application Resilience against CyberAttacks. This talk looks at Security Best Practices that need to be practised.
This talk was presented at AWS Community Day Bengaluru 2019 by Amar Prusty, Cloud-Data Center Consultant Architect, DXC Technology
Driving Innovation: A Path to Digitization, Speed and Visibility in an Applic...Cisco Canada
Digital transformation is the key buzz word today. But how do you get there? How do you plan now for the future? Cisco delivers the most complete SDN solutions to meet your data center needs - from programmable networks to programmable fabrics to a fully integrated solution with Application Centric Infrastructure (ACI). Here about our latest innovations for all areas, from Applications to ASICs, that bring unique capabilities and value to the industry. Hear your peers share their SDN journeys and how Cisco's open choice solutions have helped them improve agility and attain astounding results for their business. And learn how to lay the foundation now for your digital transformation in the decade ahead. Get ready!
Cloud Computing offers an on-demand and scalable access to a shared pool of resources hosted in a data center at providers’ site. It reduces the overheads of up-front investments and financial risks for the end-user. Regardless of the fact that cloud computing offers great advantages to the end users, there are several challenging issues that are mandatory to be addressed.
Secure Mobility with Analytics for the Private CloudExtreme Networks
Addressing the top IT priorities in 2015 for high performance wireless, business analytics, and highly secure network access to the cloud, Extreme Networks announces the industry’s most complete Secure Mobility with Analytics for the Private Cloud solution. Extreme Networks’ all-inclusive solution combines equipment, software, and licenses to deliver the mobile performance to drive business results. The package is offered at a special discount from April 1st to Dec. 31st 2015 at up to 50 percent off, with 50 percent off first year of maintenance, for existing HP and Aruba customers.
Extreme Networks offers HP and Aruba customers a strong and stable alternative with proven and long-standing wired and wireless integration, application analytics, advanced policy administration and over the air security, that is managed from a single interface.
CIOs are directing their IT teams to upgrade their legacy Wi-Fi networks to improve the user experience, leverage analytics, increase productivity and assure security and compliance. The Extreme Networks’ all-inclusive offering meets all these needs by integrating wired/wireless, establishing policy and compliance and harvesting data with application analytics to help improve business outcomes.
The Extreme Networks solution includes its award-winning IdentiFi™ wireless technology, its NetSight® single pane of glass management system, its Mobile IAM with award-winning network access control (NAC) for onboarding and Purview technology, the industry’s first solution bridging management and analytics.
Towards the extinction of mega data centres? To which extent should the Clou...Thierry Coupaye
Keynote by Thierry Coupaye at the IEEE International Conference on Cloud Networking, Niagara Falls, Canada, October 2015.
Summary: Cloud computing emerged, a decade or so ago, from underused computing and storage ressources in Internet players mega data centres that were thought to be provided "as a service". As a result of this inception, Cloud is often considered as a synonym for massive data center, which somehow fuels a very centralised vision of (cloud) computing and storage provision. However, we might be at a time in which the pendulum begins to swing back. Indeed, several initiatives are emerging around a vision of more geographically distributed clouds where computing and storage resources are made available at the edge of the network, close to users, in complement or replacement of massive remote data centres. This presentation discusses, through some examples, the evolution of cloud architectures towards more distribution, the signs and stakes of these mutations.
Array Networks’ Application Delivery Solutions Now Available Through Promark ... Array Networks
Array Networks Inc., a global leader in application delivery networking, today announced that it has entered into a distribution agreement with Promark Technology, a premier U.S.-focused value-added distributor (VAD) and wholly-owned subsidiary of Ingram Micro Inc. Under the terms of the agreement, Promark will offer Array’s application delivery networking products and solutions, including load balancing, SSL VPN and WAN optimization, as well as Array’s line of next-generation virtualized appliances.
HPC is expanding beyond scientific and academic communities into many industries, improving research and business outcomes. In the commercial sector, for example, leading manufacturers are using HPC to advance a range of products – from creating more sustainable personal and consumer products to designing safer cars and planes. This session will describe five paths to HPC infrastructure for hybrid cloud, supercomputing, in-house enterprises, containerized machine learning and edge computing. Each path will be described in terms of growth potential, partnerships and use cases.
This presentation provides an overview of business trends and perspectives on the deployment and implementation of network virtualization technologies.
These slides--based on the webinar from leading IT analyst firm EMA and Cradlepoint--provide insights into new research on how enterprises are combining wireless WAN solutions and SD-WAN to drive success, including strategies for branch office continuity; how enterprises succeed with SD-WAN solutions; how to plan for the revolutionary potential of 5G networks.
The future of the wide-area network (WAN) has arrived. The majority of enterprises are fully engaged with software-defined WAN (SD-WAN) technology. Now it’s time to understand how enterprises can succeed with this newly emerged class of networking solutions.
These slides--based on the webinar from leading IT analyst firm Enterprise Management Associates (EMA)--reveals insights into EMA research that explores WAN transformation from all directions.
Cloud Security is critical to Data Security and Application Resilience against CyberAttacks. This talk looks at Security Best Practices that need to be practised.
This talk was presented at AWS Community Day Bengaluru 2019 by Amar Prusty, Cloud-Data Center Consultant Architect, DXC Technology
Driving Innovation: A Path to Digitization, Speed and Visibility in an Applic...Cisco Canada
Digital transformation is the key buzz word today. But how do you get there? How do you plan now for the future? Cisco delivers the most complete SDN solutions to meet your data center needs - from programmable networks to programmable fabrics to a fully integrated solution with Application Centric Infrastructure (ACI). Here about our latest innovations for all areas, from Applications to ASICs, that bring unique capabilities and value to the industry. Hear your peers share their SDN journeys and how Cisco's open choice solutions have helped them improve agility and attain astounding results for their business. And learn how to lay the foundation now for your digital transformation in the decade ahead. Get ready!
Cloud Computing offers an on-demand and scalable access to a shared pool of resources hosted in a data center at providers’ site. It reduces the overheads of up-front investments and financial risks for the end-user. Regardless of the fact that cloud computing offers great advantages to the end users, there are several challenging issues that are mandatory to be addressed.
Secure Mobility with Analytics for the Private CloudExtreme Networks
Addressing the top IT priorities in 2015 for high performance wireless, business analytics, and highly secure network access to the cloud, Extreme Networks announces the industry’s most complete Secure Mobility with Analytics for the Private Cloud solution. Extreme Networks’ all-inclusive solution combines equipment, software, and licenses to deliver the mobile performance to drive business results. The package is offered at a special discount from April 1st to Dec. 31st 2015 at up to 50 percent off, with 50 percent off first year of maintenance, for existing HP and Aruba customers.
Extreme Networks offers HP and Aruba customers a strong and stable alternative with proven and long-standing wired and wireless integration, application analytics, advanced policy administration and over the air security, that is managed from a single interface.
CIOs are directing their IT teams to upgrade their legacy Wi-Fi networks to improve the user experience, leverage analytics, increase productivity and assure security and compliance. The Extreme Networks’ all-inclusive offering meets all these needs by integrating wired/wireless, establishing policy and compliance and harvesting data with application analytics to help improve business outcomes.
The Extreme Networks solution includes its award-winning IdentiFi™ wireless technology, its NetSight® single pane of glass management system, its Mobile IAM with award-winning network access control (NAC) for onboarding and Purview technology, the industry’s first solution bridging management and analytics.
Towards the extinction of mega data centres? To which extent should the Clou...Thierry Coupaye
Keynote by Thierry Coupaye at the IEEE International Conference on Cloud Networking, Niagara Falls, Canada, October 2015.
Summary: Cloud computing emerged, a decade or so ago, from underused computing and storage ressources in Internet players mega data centres that were thought to be provided "as a service". As a result of this inception, Cloud is often considered as a synonym for massive data center, which somehow fuels a very centralised vision of (cloud) computing and storage provision. However, we might be at a time in which the pendulum begins to swing back. Indeed, several initiatives are emerging around a vision of more geographically distributed clouds where computing and storage resources are made available at the edge of the network, close to users, in complement or replacement of massive remote data centres. This presentation discusses, through some examples, the evolution of cloud architectures towards more distribution, the signs and stakes of these mutations.
Array Networks’ Application Delivery Solutions Now Available Through Promark ... Array Networks
Array Networks Inc., a global leader in application delivery networking, today announced that it has entered into a distribution agreement with Promark Technology, a premier U.S.-focused value-added distributor (VAD) and wholly-owned subsidiary of Ingram Micro Inc. Under the terms of the agreement, Promark will offer Array’s application delivery networking products and solutions, including load balancing, SSL VPN and WAN optimization, as well as Array’s line of next-generation virtualized appliances.
HPC is expanding beyond scientific and academic communities into many industries, improving research and business outcomes. In the commercial sector, for example, leading manufacturers are using HPC to advance a range of products – from creating more sustainable personal and consumer products to designing safer cars and planes. This session will describe five paths to HPC infrastructure for hybrid cloud, supercomputing, in-house enterprises, containerized machine learning and edge computing. Each path will be described in terms of growth potential, partnerships and use cases.
This presentation provides an overview of business trends and perspectives on the deployment and implementation of network virtualization technologies.
These slides--based on the webinar from leading IT analyst firm EMA and Cradlepoint--provide insights into new research on how enterprises are combining wireless WAN solutions and SD-WAN to drive success, including strategies for branch office continuity; how enterprises succeed with SD-WAN solutions; how to plan for the revolutionary potential of 5G networks.
The future of the wide-area network (WAN) has arrived. The majority of enterprises are fully engaged with software-defined WAN (SD-WAN) technology. Now it’s time to understand how enterprises can succeed with this newly emerged class of networking solutions.
These slides--based on the webinar from leading IT analyst firm Enterprise Management Associates (EMA)--reveals insights into EMA research that explores WAN transformation from all directions.
These research slides—based on the webinar from leading IT research firm Enterprise Management Associates—highlight the essential findings of EM’s research on application delivery infrastructure. The insights provided are based on a survey of 253 subject matter experts from enterprises and cloud providers.
For a variety of reasons, many new technologies cut off performance visibility. What can enterprises do to protect it?
These slides--based on the webinar from leading IT research firm EMA and Accedian--identify the new technologies that can undermine performance visibility and how you can adapt your monitoring tools to maintain visibility.
In this new digital era, enterprises need a next-generation packet broker that can deliver the right data to the right service assurance and security tools.
These slides--based on the webinar from leading IT research firm Enterprise Management Associates (EMA) and APCON--provide an overview of the technologies, features, and horsepower that enterprises should be looking for in a new network packet broker.
Whether you are new to network packet brokers or looking to refresh your existing investment, this event will offer valuable advice.
Leading IT analyst firm Enterprise Management Associates (EMA) has published research that explores the evolution of network packet brokers (NPBs). Based on a survey of 250 network management and security decision-makers with direct involvement in their organization’s network visibility fabrics, this research examines evolving requirements, use cases, and best practices for building and using network visibility fabrics with NPBs.
These slides--based on the webinar featuring Shamus McGillicuddy, research director at EMA--provides results of this research.
The journey to the digital enterprise requires new thinking. What have you done to modernize your data center network?
These slides--based on the webinar featuring Shamus McGillicuddy, senior analyst at leading IT analyst firm Enterprise Management Associates (EMA) and Steven Shalita, vice president of marketing and business development at Pluribus Networks--highlights how the most forward-thinking enterprises are leveraging software-defined technologies to make their data centers more agile, programmable, resilient, and visible.
These slides provides insights into EMA’s “Network Visibility Architecture for the Hybrid, Multi-Cloud Enterprise,” a new market research report that explores how companies are expanding and modernizing their visibility architectures to support hybrid cloud and multi-cloud networks.
You will learn more about:
- Why packet data remains essential to network operations and cyber security
- How companies build end-to-end visibility fabrics that capture data from the cloud and on-premises networks
- How organizations address the impact of ubiquitous traffic encryption on network visibility
- The challenges that organizations encounter when using this technology
- Best practices for success with network visibility architectures
To prevent fragmentation that can undermine IT operations, EMA Research recommends a consolidated and unified approach to network monitoring. This approach is extremely difficult to achieve, however, due to the diversity of network data that enterprises must analyze and the variety of use cases and workflows served by network monitoring tools.
These slides based on the webinar delve into how enterprises can improve network operations by adopting a unified network monitoring platform.
In its research study, "Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the Internet of Things," leading IT analyst firm Enterprise Management Associates (EMA) surveyed 150 enterprise network management decision-makes on a wide range of topics that are affecting their daily operations. This research explores the Internet of Things, hybrid cloud networking and advanced network analytics. It also explores emerging requirements for network management tools and identifies best practices for network operations success.
From mobility to the Internet of Things, today’s digital initiatives require a network that is high-performing, dynamic, and affordable. The IT organization must be able to scale network capacity quickly and deploy the most cutting edge network technologies in support of new initiatives.
These slides--based on the webinar hosted by leading IT analyst firm Enterprise Management Associates (EMA) and Alcatel-Lucent--highlight how enterprises are transforming their networks for the digital future and how ALE’s Network-as-a-Service (Naas) solution, including Network-on-Demand enables that transformation.
Leading IT research firm EMA surveyed 252 North American and European IT and security professionals about how they use network segmentation, microsegmentation, and secure remote access solutions to build Zero Trust networks.
These slides—based on the webinar featuring EMA Vice President of Research Shamus McGillicuddy—dive into:
- Best practices for using Zero Trust network segmentation and remote network access solutions
- Zero trust collaboration strategies for network teams and security teams
- Emerging Zero Trust network technology requirements
- Impacts of the COVID-19 pandemic on Zero Trust initiatives
EMA’s market research, Multi-Cloud Networking: Connecting and Security the Future, found that 93% of IT enterprises that use two or more cloud providers want to implement an end-to-end, multi-cloud networking solution. The report, based on a survey of more than 350 IT stakeholders, found that network complexity and budget issues are holding many of them back.
These slides provide highlights from this research.
Leading IT research firm Enterprise Management Associates (EMA) surveyed 250 IT professionals and conducted a half-dozen phone interviews to identify best practices and successful strategies for network automation solutions. Get highlights from this survey.
Network infrastructure teams connect. Information security teams lock it down. Their missions are fundamentally opposed, but digital enterprises are increasingly demanding that network operations and security operations teams work together.
These slides--based on the webinar featuring Shamus McGillicuddy, senior analyst at leading IT analyst firm Enterprise Management Associates (EMA), and Jon Kies, manager of network management product marketing at Micro Focus--examine how enterprises are aligning NetOps and SecOps.
In recent EMA research, 89% of survey respondents said they experienced one or more unexpected challenges with their organization’s public cloud. So how do you optimize your public cloud, multi-cloud, and hybrid cloud investments once there?
These slides--based on the webinar from leading IT research firm EMA and Scalable--provide a look at real-world challenges and solutions based on extensive EMA research.
Multi-Cloud Breaks IT Ops: Best Practices to De-Risk Your Cloud StrategyThousandEyes
Organizations are using multiple IaaS and SaaS providers today, yet traditional ITOps processes and tools are straining to cope with a vast new scope of challenges and risks. Recent research by Enterprise Management Associates (EMA) shows that 74% of enterprise network teams had incumbent network monitoring tools failing to address cloud requirements. As IT business leaders responsible for delivering services in this new ecosystem, how do you equip yourself with the right visibility?
Shamus McGillicuddy, Research Director for EMA’s network management practice, and Archana Kesavan, Director of Product Marketing at ThousandEyes dive deep into the challenges of multi-cloud and how to rethink your monitoring strategy and operational delivery processes.
Uncover:
Five common IT operational challenges of multi-cloud identified in recent EMA research
The risks of not evolving ITOps for a managed cloud environment
Four monitoring best practices for a cloud-centric IT Operation
Enterprise Management Associates (EMA) has published the most comprehensive market research study on DDI solutions in over a decade, “DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-Cloud Era.” Based on a survey of 333 enterprise DDI experts, this research found that less than 40% of enterprises are fully successful in their approach to DDI technology.
These slides created by Shamus McGillicuddy, EMA vice president of research, provide insights into the following:
- Why only 31% of enterprise are confident in the security of their DNS infrastructure
- How DDI enables network automation
- How cloud migration disrupts DDI strategy and what you can do about it
- What to look for in an ideal DDI product
Based on a survey of 250 network management decision makers, the 2018 edition of the EMA Network Management Megatrends research examines:
- How the migration of applications to the public cloud is affecting the enterprise network
- The emergence of network automating initiatives
- The convergence of network operations teams with IT security teams
- The continuing expansion of network management outsourcing
EMA’s market research, “Network Observability: Delivering Actionable Insights to Network Operations,” establishes a roadmap for how vendors should improve their products to deliver deep visibility and actionable insights. More importantly, this research will help IT buyers understand what network management vendors mean when they talk about network observability and how they can turn that understanding into NetOps success.
Similar to Network Engineering and Operations in a Multi-Cloud World (20)
The typical network operations teams use four to 15 tools to manage and monitor infrastructure. This fractured approach to operations often leads to inefficiencies and errors. With Cisco Prime exiting the industry, network managers should look for ways to consolidate and optimize their entire toolset.
Check out these slides from EMA Research and OpenText to discover:
- Why you need to take a new approach to network tools
- Insights from your network management peers who are planning a Cisco Prime replacement
- What features and functionality you should look for in your next network management solution
Discover the latest insights and trends shaping the landscape of workload automation and orchestration, featuring highlights from the latest "EMA Radar™ Report for Workload Automation and Orchestration."
You will learn more about:
- Workflow Orchestration - Uncover the evolving role of orchestration in simplifying complex workflows in the era of digital transformation.
- Data Pipeline Orchestration – Learn more about WLA support for DataOps, including the integration of Apache Airflow.
- Mainframe Modernization - Gain a deeper understanding of how organizations are embracing modernization while still leveraging their mainframe investments.
- DevOps Support and Collaboration - Explore the pivotal role of workload automation in DevOps practices.
EMA Research Director Valerie O’Connell provides insights into the current, practical, and desired states of incident response and management, including:
- The roles of AI and automation in incident management
- Practical use cases for gen AI
- Business metrics and results
- Near-term investments and anticipated changes
- How organizations are changing to exploit technology advances
These slides from Enterprise Management Associates (EMA) present a wealth of research data from EMA’s recent study of real-world adoption patterns, challenges, trends, and enterprise-priorities related to infrastructure and application observability.
According to new EMA research, 84% of enterprises are seeing increased collaboration between their network and security teams. This NetSecOps convergence allows these teams to support new technologies, such as hybrid, multi-cloud architecture, and secure access service edge (SASE).
These slides from EMA Vice President of Research, Shamus McGillicuddy, provide highlights from his market research report, “NetSecOps: Examining How Network and Security Teams Collaborate for a Better Digital Future.”
Check out these slides to discover:
- What causes network and security team collaborations to fail
- How network data, especially packets and DNS logs, play a critical role in partnerships between
- Why network automation and network monitoring tools are critical to collaboration
- How SASE and multi-cloud are impacting collaboration
These slides discuss how to improve user experiences, boost IT efficiency, and drive business growth with modern ITSM.
The slides also dive into:
- Global forces—positive and adverse—impacting midsize organizations
- Top challenges to delivering high-quality services and effective strategies to overcome them
- The research-based case for ITSM modernization and practical ways to get started
Based on the IT Executive Survey 2023 fielded by leading IT analyst research firm EMA and global analytics software firm FICO, these slides explore key trends and opportunities shaping the technology landscape in the global banking, finance, and insurance industries. It will also examine how technology executives are aligning with their business counterparts to drive strategic outcomes.
You will also learn more about:
- Top technology-related priorities for banks and insurers, along with strategies to address significant challenges.
- Changing technology buying behavior and considerations for selecting new technology solutions.
- Strategies for maximizing the value of data and AI investments within enterprises.
- The benefits of a unified platform approach and its impact on other initiatives, such as cloud adoption and legacy modernization.
In a landscape where data is king, master data management (MDM) plays a pivotal role in ensuring data quality and consistency across organizations. Enterprise Management Associates (EMA) research shows that 96% of enterprises have one or more MDM tools or are planning to add one in the next 24 months. Achieving a successful MDM implementation, however, proves challenging for many, with 30% of organizations failing on their first attempt to deploy an MDM. Implementation teams struggle with data quality, data mapping and transformation, integration complexity, and many other challenges. What is the secret to a successful MDM implementation?
Check out these slides from EMA and Semarchy to find out!
The days of traditional passwords are numbered!
To help bring clarity to the rapidly evolving authentication landscape, Enterprise Management Associates (EMA) conducted primary research into business and end user requirements, perceptions, and outcomes in the usage of password and passwordless authentication technologies. The results present a clear snapshot of where the identity management market is today and the direction it is heading.
Get the results when you download these slides. Topics to be covered include:
- The greatest security risks posed by the continued use of passwords
- The types of authentication technologies users prefer to use as both employees and consumers
- How to reduce time, efforts, and costs associated with managing user identities
- And, much more!
Too many network managers are fighting losing battles. Since 2016, the number of enterprise NetOps teams that are fully successful has dropped from 49% to 27%, according to Enterprise Management Associates (EMA) research.
These slides discuss why NetOps teams are failing and how a monitoring solution with a service-centric view of the network can turn things around.
These research slides provide insights into the critical issues involved in handling application- and infrastructure-complexity in ever-changing hybrid multi-cloud settings. Torsten Volk, Managing Research Director at EMA, and Jasper Paul, a Principal Product Manager at ManageEngine Site24x7, explore:
The Anatomy of Complexity: Understand and escape the complexity trap of distributed cloud native applications.
Monitoring and Metrics: Examine approaches for effective monitoring of resource utilization and performance as key components of complexity management.
AIOps: Examine the capabilities of AIOps.
FinOps Strategies: Explore frameworks and best practices for efficiently managing your cloud's financial operations without compromising on performance, resilience, or security.
Case Studies: Gain insights from real-world instances where companies have successfully mitigated the complexities and risks associated with distributed microservices architectures.
No matter what your current level of cybersecurity knowledge is, these slides created by EMA Research and A10 Networks will provide valuable insights into the latest trends and empower you with the best practices in cloud and web application security.
Download to learn more about:
- The top threats that pose a risk to your organization and how to mitigate them
- The difference between buzz and hype in today’s security approaches, and how this can be used to help your organization
- A discussion of Zero Trust, web application security, DDoS protection, encryption, and more for the hybrid cloud world
These research slides from EMA Managing Research Director Torsten Volk provide you with insights into EMA’s Kubernetes research. Based on the perspective of application developers, platform engineers, and security and IT operations professionals, this research delivers insights into the real-world adoption patterns, challenges, trends, and enterprise priorities related to the Kubernetes container platform.
Download and learn more about:
Challenges and Solutions – The top issues developers, IT operations, and security teams face and how to solve them.
Real-Life Insights – From cost pitfalls to maximizing developer productivity, this research sheds light on what IT professionals face and delivers actionable insights into these issues.
Security Vulnerabilities – The core types of security vulnerabilities and how to mitigate them.
Community Priorities – What the Kubernetes community is working on.
Global Trends – Adoption patterns of Kubernetes worldwide.
By the end of 2023, 83% of enterprises expect to connect operational technology (OT) and IoT devices to their enterprise networks, according to Enterprise Management Associates (EMA) research. IT and OT are converging so that enterprises can analyze OT data, innovate, and optimize industrial systems. A new approach to OT security is required.
Enterprises need to modernize network architecture to protect these critical assets, especially by updating their network security and modernizing their approach to network segmentation.
These slides explore how enterprises can use OT-dedicated firewalls and zero trust network access to protect OT systems from malicious actors.
Despite claims that the rise of cloud cuts the relevance of CMDB, Enterprise Management Associates (EMA) experience and field research consistently find the opposite to be true. In a recent EMA research study, a panel of global IT leaders stated that CMDB use was central to major functions. For many of those respondents, CMDB use was viewed as increasing in importance for automation of complex processes.
Where is the disconnect?
Check out these slides from EMA's Research Director, Valerie O’Connell, to get insights into the research findings, including:
- CMDB use is increasing for 64% of organizations
- Hybrid organizations have the highest rate of CMDB use increase
- 24% update the CMDB in real time. Is that the right frequency?
- Why CMDB has an uneven reputation
- Success rates, reasons, and returns
For all its benefits, remote work puts tremendous pressure on network infrastructure and operations teams, who must maximize network experience while maintaining security. Enterprise Management Associates (EMA) explores this issue in depth with its market research report, “Modernizing Network Engineering and Operations in the Era of Hybrid and Remote Work,” based on a survey of 354 IT professionals.
Get insights when you check out these research slides.
As security leaders evaluate the vast array of tools available to combat ransomware attacks, endpoint and extended detection and response solutions still stand out as the best defense against emerging threats. How can an enterprise know which of these tools is the best though?
Enterprise Management Associates (EMA) surveyed IT professionals, information security practitioners, and technology business leaders across all verticals to discover their attitudes and perspectives toward XDR solutions. The primary goal was to use survey responses and third-party interviews to create a comprehensive definition of “What is XDR?” for leaders to use as part of their solution evaluation process.
Check out these research slides featuring Christopher Steffen, CISSP, CISA, and vice president of research at EMA, to discover the definition and get results from this research.
Enterprise Management Associates (EMA) research reveals that companies are more successful with SD-WAN transformation when they consume the technology as a managed service. How can an IT organization know if it is choosing the right managed service, though?
Check out these slides to discover the five things you need to know about the power of a managed SD-WAN solution. You will also learn more about:
- Why so many enterprises are choosing managed SD-WAN over DIY deployments
- What to look for in an SD-WAN provider
- Tips for optimizing Day 2 operations with managed SD-WAN
- Charting a path to the future, including secure access service edge
With users working remotely and data now housed in multiple cloud applications, securing access to data is essential to a modern digital infrastructure. The rise of hybrid work has challenged the scalability of traditional VPNs, and hybrid multi-cloud architectures have made legacy centralized VPN concentrators impractical.
Zero trust network access (ZTNA) is an emerging class of technology that addresses these new remote access requirements and challenges.
Check out these slides to discover why it’s time to transition from legacy VPNs to ZTNA solutions. You will also learn more about:
- Why legacy VPN technologies cannot address the needs of modern enterprises
- How ZTNA helps secure remote access in the era of hybrid work and multi-cloud architectures
- The best way to transition to a next-generation solution
Enterprises have been trying to automate their networks for decades, but manual tasks continue to dominate operations. According to Enterprise Management Associates (EMA) research, only 34% of IT organizations have been able to automate more than half of their network provisioning and change management tasks. With so many commercial and open source network automation tools available, why aren’t organizations doing better?
These slides—based on the webinar featuring Shamus McGillicuddy (EMA Vice President of Research) and Jason Edelman (Founder and CTO of network automation solution provider Network to Code) —provide guidance on how to set a network automation strategy. You will also get insights on:
- Whether a network team should use open source, homegrown, or commercial network automation solutions
- How to establish a data-driven source of truth for your network
- How to build the right team for enabling your network automation strategy
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Network Engineering and Operations in a Multi-Cloud World
1. IT AND DATA MANAGEMENT
RESEARCH | INDUSTRY ANALYSIS | CONSULTING
Shamus McGillicuddy
Research Director, Networking
@ShamusEMA
SMcGillicuddy@emausa.com
Network Engineering and
Operations in a Multi-Cloud World
2. IT AND DATA MANAGEMENT
RESEARCH | INDUSTRY ANALYSIS | CONSULTING
Watch the On-Demand Webinar
Slide 2
• Network Engineering and Operations in a Multi-Cloud World
On-Demand webinar is available here:
http://info.enterprisemanagement.com/network-engineering-and-
ops-in-a-multi-cloud-world-webinar-ws
• Check out upcoming webinars from EMA here:
http://www.enterprisemanagement.com/freeResearch