SlideShare a Scribd company logo
10%
The Network Role is Evolving
feel that the role of the
networking professional is
becoming more strategic/
business oriented
79%
agree that collaboration
between the network team and
other IT teams is successful in
driving innovation
82%
agree that the network
management team is
communicating with the
CIO more than ever before
71%
of network professionals
are initiating
collaboration efforts
84%
say the network management
team is communicating with
LOB more than ever before
69% of network professionals
expect their job to become
more challenging
84%
Emerging Technologies
What’s Transforming the Network?
EDGE COMPUTING:
Edge Computing allows
the processing of
information to be
performed closer to
where it is being
collected/generated.
This is fundamentally
changing the network
by letting organizations
analyze important data
in near real-time.
HYPERCONVERGED
INFRASTRUCTURE:
Software-centric
architecture that integrates
compute, storage,
virtualization (hypervisor),
and management on
commodity hardware that’s
supported by a single
vendor. Since
Hyperconverged
Infrastructure is
software-defined, the
components are essentially
integrated and cannot be
separated.
CONVERGED
INFRASTRUCTURE:
A hardware-centric,
building block
infrastructure approach
that integrates compute
and other components
such as storage and
servers on commodity
hardware supported by
a single vendor. In a
converged system, the
components can be
broken apart and used
on their own.
SOFTWARE-DEFINED
NETWORKING (SDN):
Involves the decoupling
of the network's control
and data forwarding
planes, and enables
automated
provisioning, network
programmability,
service chaining, and
integration with cloud
orchestration systems.
SD-WAN TECHNOLOGY:
Enables you to augment
existing MPLS—
multi-protocol label (a WAN
technology where a user has
full control over traffic
engineering) links—with
lower cost Internet, Ethernet
or wireless alternatives, and
balance the traffic across the
mix based on priority,
availability, performance, etc.
Budgets & Investments
Average IT Budget
$137 million(up $12M from 2017) expect their organization’s total IT budget to
increase over the next 12 months
43%
View additional IDG research on technology trends and IT decision-maker insight. Source: 2018 State of the Network Survey, Network World #StateoftheNetwork | @NetworkWorld @IDGWorld
IDG Communications, Inc.
Technology areas expecting an
increase in budget allocation
Ensuring Availability
(uptime)
Improving Data
Security
Improving Network
Speed/Performance
53%
53%
53%
Network
Security
Application
Development
Cloud
Services
Machine
Learning
(new for 2018)
Analytics/Data
Management
2017
2018
55%
61%
50%
61%
69%
60%
55%
43%
47%
Primary Drivers for
Network Investments
Ensuring Business
Continuity
Improving Customer
Experience
51%
45%
Securing the Network
say the network team is spending more time on
security initiatives today than in years past
82% of network professionals say that network
security is their primary area of responsibility60%
say that the network management team finds it
challenging to balance availability vs. a secure network69%
What are the top challenges related to security and access to data?
Maintaining network
security while assuring
network connectivity
#
1 Protecting
against data
breaches/leaks
#
2 Ensuring availability
(uptime)
#
3
Current and Future Network-Security Initiatives
On the radar/actively researching
Data Loss
Prevention
Corporate
Data Encryption
ID Management
Solutions
36%
33% 32%
Budget Increases for Security Related Tools
Network Security
Compliance
Disaster Recovery
61%
46%
42%
IT Governance
Business
Continuity
37%
36%
Network Professionals Are
Reshaping IT Strategy
How Emerging Technologies, Budgets & Investments,
and Security Influence the Network Role
of networking
professionals have plans
for Edge Computing
56%
have plans to implement
hyperconverged
infrastructure
(increases to 73% for
enterprise organizations)
63%
have plans to implement
converged infrastructure
(increases to 76% for
enterprise organizations)
have plans for SD-WAN
technology
63%
have plans for SDN
technology
64%69%
76%
73%

More Related Content

What's hot

For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
Accenture Technology
 
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...
CSPCR: Cloud Security, Privacy and Compliance  Readiness - A Trustworthy Fram...CSPCR: Cloud Security, Privacy and Compliance  Readiness - A Trustworthy Fram...
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...
IJECEIAES
 
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
cscpconf
 
The First Enterprise-Class Information Access Technology Platform
The First Enterprise-Class Information Access Technology PlatformThe First Enterprise-Class Information Access Technology Platform
The First Enterprise-Class Information Access Technology Platform
xmeteorite
 
The state of data privacy with dimensional research
The state of data privacy with dimensional research The state of data privacy with dimensional research
The state of data privacy with dimensional research
Druva
 
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesProtecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Druva
 
Technology Vision 2016 - Infographic
Technology Vision 2016 - InfographicTechnology Vision 2016 - Infographic
Technology Vision 2016 - Infographic
Accenture Technology
 
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
accenture
 
Impact of COVID-19 [Infographic]
Impact of COVID-19 [Infographic]Impact of COVID-19 [Infographic]
Impact of COVID-19 [Infographic]
IDG
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uae
RishalHalid1
 
Strengthening Security with Continuous Monitoring
Strengthening Security with Continuous MonitoringStrengthening Security with Continuous Monitoring
Strengthening Security with Continuous Monitoring
Booz Allen Hamilton
 
OpenStack: The Platform of Choice for Cloud [Infographic]
OpenStack: The Platform of Choice for Cloud [Infographic]OpenStack: The Platform of Choice for Cloud [Infographic]
OpenStack: The Platform of Choice for Cloud [Infographic]
IDG Connect
 
Idea to Insight
Idea to InsightIdea to Insight
Idea to Insight
Marc St-Pierre
 
Data security in cloud compu
Data security in cloud compuData security in cloud compu
Data security in cloud compu
ANIL247048
 
Enabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteEnabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest Keynote
Globus
 
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity Gap
Citrix
 
2020 B2C Audience Portait Infographic
2020 B2C Audience Portait Infographic2020 B2C Audience Portait Infographic
2020 B2C Audience Portait Infographic
IDG
 
Protecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File SharingProtecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File Sharing
Intralinks
 
Guardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & AnalyticsGuardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & Analytics
Eryk Budi Pratama
 
Outside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in EnergyOutside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in Energy
accenture
 

What's hot (20)

For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...
CSPCR: Cloud Security, Privacy and Compliance  Readiness - A Trustworthy Fram...CSPCR: Cloud Security, Privacy and Compliance  Readiness - A Trustworthy Fram...
CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Fram...
 
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
 
The First Enterprise-Class Information Access Technology Platform
The First Enterprise-Class Information Access Technology PlatformThe First Enterprise-Class Information Access Technology Platform
The First Enterprise-Class Information Access Technology Platform
 
The state of data privacy with dimensional research
The state of data privacy with dimensional research The state of data privacy with dimensional research
The state of data privacy with dimensional research
 
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesProtecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
 
Technology Vision 2016 - Infographic
Technology Vision 2016 - InfographicTechnology Vision 2016 - Infographic
Technology Vision 2016 - Infographic
 
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
 
Impact of COVID-19 [Infographic]
Impact of COVID-19 [Infographic]Impact of COVID-19 [Infographic]
Impact of COVID-19 [Infographic]
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uae
 
Strengthening Security with Continuous Monitoring
Strengthening Security with Continuous MonitoringStrengthening Security with Continuous Monitoring
Strengthening Security with Continuous Monitoring
 
OpenStack: The Platform of Choice for Cloud [Infographic]
OpenStack: The Platform of Choice for Cloud [Infographic]OpenStack: The Platform of Choice for Cloud [Infographic]
OpenStack: The Platform of Choice for Cloud [Infographic]
 
Idea to Insight
Idea to InsightIdea to Insight
Idea to Insight
 
Data security in cloud compu
Data security in cloud compuData security in cloud compu
Data security in cloud compu
 
Enabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteEnabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest Keynote
 
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity Gap
 
2020 B2C Audience Portait Infographic
2020 B2C Audience Portait Infographic2020 B2C Audience Portait Infographic
2020 B2C Audience Portait Infographic
 
Protecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File SharingProtecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File Sharing
 
Guardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & AnalyticsGuardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & Analytics
 
Outside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in EnergyOutside the (Black) Box: Protecting Core Operations in Energy
Outside the (Black) Box: Protecting Core Operations in Energy
 

Similar to State of the Network Infographic 2018

2019 Intelligent Technology Index
2019 Intelligent Technology Index 2019 Intelligent Technology Index
2019 Intelligent Technology Index
Insight
 
NetSecOps: Aligning Networking and Security Teams to Ensure Digital Transform...
NetSecOps: Aligning Networking and Security Teams to Ensure Digital Transform...NetSecOps: Aligning Networking and Security Teams to Ensure Digital Transform...
NetSecOps: Aligning Networking and Security Teams to Ensure Digital Transform...
Enterprise Management Associates
 
Integra: Get Your Head in the Cloud (Infographic)
Integra: Get Your Head in the Cloud (Infographic)Integra: Get Your Head in the Cloud (Infographic)
Integra: Get Your Head in the Cloud (Infographic)
Jessica Legg
 
le-emerging-tech-roadmap-2021-2023.pdf
le-emerging-tech-roadmap-2021-2023.pdfle-emerging-tech-roadmap-2021-2023.pdf
le-emerging-tech-roadmap-2021-2023.pdf
SigitDarmawan3
 
Building a Foundation for NetSecOps Partnerships with Network Automation
Building a Foundation for NetSecOps Partnerships with Network AutomationBuilding a Foundation for NetSecOps Partnerships with Network Automation
Building a Foundation for NetSecOps Partnerships with Network Automation
Enterprise Management Associates
 
Drive Business Transformation via Better Network Connectivity_WP
Drive Business Transformation via Better Network Connectivity_WPDrive Business Transformation via Better Network Connectivity_WP
Drive Business Transformation via Better Network Connectivity_WPSean Crimmins
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Troy Marshall
 
How the WAN is driving digital transformation
How the WAN is driving digital transformationHow the WAN is driving digital transformation
How the WAN is driving digital transformation
Monkeyscratcher
 
How Intelligent Operations Enables Proactive Data Center Management
How Intelligent Operations Enables Proactive Data Center ManagementHow Intelligent Operations Enables Proactive Data Center Management
How Intelligent Operations Enables Proactive Data Center Management
ITOutcomes
 
F5 VMworld Super Session - The Network’s Rapidly Evolving Role In ITaaS
F5 VMworld Super Session - The Network’s Rapidly Evolving Role In ITaaSF5 VMworld Super Session - The Network’s Rapidly Evolving Role In ITaaS
F5 VMworld Super Session - The Network’s Rapidly Evolving Role In ITaaS
F5 Networks
 
TCS Global Cloud Study – North America
TCS Global Cloud Study – North AmericaTCS Global Cloud Study – North America
TCS Global Cloud Study – North America
Tata Consultancy Services
 
Network Observability: Delivering Actionable Insights to Network Operations
Network Observability: Delivering Actionable Insights to Network OperationsNetwork Observability: Delivering Actionable Insights to Network Operations
Network Observability: Delivering Actionable Insights to Network Operations
Enterprise Management Associates
 
Unfolding the next growth chapter in the Middle East
Unfolding the next growth chapter in the Middle East Unfolding the next growth chapter in the Middle East
Unfolding the next growth chapter in the Middle East
Accenture Middle East
 
Simplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterSimplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data Center
AlgoSec
 
Impact of Juniper Training and Certification on Network Management Activities
Impact of Juniper Training and Certification on Network Management ActivitiesImpact of Juniper Training and Certification on Network Management Activities
Impact of Juniper Training and Certification on Network Management Activities
Juniper Networks
 
IDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud StrategiesIDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud Strategies
EMC
 
Data Virtualization Accelerating Your Data Strategy
Data Virtualization Accelerating Your Data StrategyData Virtualization Accelerating Your Data Strategy
Data Virtualization Accelerating Your Data Strategy
Denodo
 
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
Danny Miller
 
2020 Vision: Where Is IT headed for Midmarket and Small Business?
2020 Vision: Where Is IT headed for Midmarket and Small Business?2020 Vision: Where Is IT headed for Midmarket and Small Business?
2020 Vision: Where Is IT headed for Midmarket and Small Business?
Insight
 
Technology Megatrends Reshaping IT: What’s Your Migration Path
Technology Megatrends Reshaping IT: What’s Your Migration PathTechnology Megatrends Reshaping IT: What’s Your Migration Path
Technology Megatrends Reshaping IT: What’s Your Migration Path
Fadi Semaan
 

Similar to State of the Network Infographic 2018 (20)

2019 Intelligent Technology Index
2019 Intelligent Technology Index 2019 Intelligent Technology Index
2019 Intelligent Technology Index
 
NetSecOps: Aligning Networking and Security Teams to Ensure Digital Transform...
NetSecOps: Aligning Networking and Security Teams to Ensure Digital Transform...NetSecOps: Aligning Networking and Security Teams to Ensure Digital Transform...
NetSecOps: Aligning Networking and Security Teams to Ensure Digital Transform...
 
Integra: Get Your Head in the Cloud (Infographic)
Integra: Get Your Head in the Cloud (Infographic)Integra: Get Your Head in the Cloud (Infographic)
Integra: Get Your Head in the Cloud (Infographic)
 
le-emerging-tech-roadmap-2021-2023.pdf
le-emerging-tech-roadmap-2021-2023.pdfle-emerging-tech-roadmap-2021-2023.pdf
le-emerging-tech-roadmap-2021-2023.pdf
 
Building a Foundation for NetSecOps Partnerships with Network Automation
Building a Foundation for NetSecOps Partnerships with Network AutomationBuilding a Foundation for NetSecOps Partnerships with Network Automation
Building a Foundation for NetSecOps Partnerships with Network Automation
 
Drive Business Transformation via Better Network Connectivity_WP
Drive Business Transformation via Better Network Connectivity_WPDrive Business Transformation via Better Network Connectivity_WP
Drive Business Transformation via Better Network Connectivity_WP
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
 
How the WAN is driving digital transformation
How the WAN is driving digital transformationHow the WAN is driving digital transformation
How the WAN is driving digital transformation
 
How Intelligent Operations Enables Proactive Data Center Management
How Intelligent Operations Enables Proactive Data Center ManagementHow Intelligent Operations Enables Proactive Data Center Management
How Intelligent Operations Enables Proactive Data Center Management
 
F5 VMworld Super Session - The Network’s Rapidly Evolving Role In ITaaS
F5 VMworld Super Session - The Network’s Rapidly Evolving Role In ITaaSF5 VMworld Super Session - The Network’s Rapidly Evolving Role In ITaaS
F5 VMworld Super Session - The Network’s Rapidly Evolving Role In ITaaS
 
TCS Global Cloud Study – North America
TCS Global Cloud Study – North AmericaTCS Global Cloud Study – North America
TCS Global Cloud Study – North America
 
Network Observability: Delivering Actionable Insights to Network Operations
Network Observability: Delivering Actionable Insights to Network OperationsNetwork Observability: Delivering Actionable Insights to Network Operations
Network Observability: Delivering Actionable Insights to Network Operations
 
Unfolding the next growth chapter in the Middle East
Unfolding the next growth chapter in the Middle East Unfolding the next growth chapter in the Middle East
Unfolding the next growth chapter in the Middle East
 
Simplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterSimplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data Center
 
Impact of Juniper Training and Certification on Network Management Activities
Impact of Juniper Training and Certification on Network Management ActivitiesImpact of Juniper Training and Certification on Network Management Activities
Impact of Juniper Training and Certification on Network Management Activities
 
IDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud StrategiesIDC Study on Enterprise Hybrid Cloud Strategies
IDC Study on Enterprise Hybrid Cloud Strategies
 
Data Virtualization Accelerating Your Data Strategy
Data Virtualization Accelerating Your Data StrategyData Virtualization Accelerating Your Data Strategy
Data Virtualization Accelerating Your Data Strategy
 
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
 
2020 Vision: Where Is IT headed for Midmarket and Small Business?
2020 Vision: Where Is IT headed for Midmarket and Small Business?2020 Vision: Where Is IT headed for Midmarket and Small Business?
2020 Vision: Where Is IT headed for Midmarket and Small Business?
 
Technology Megatrends Reshaping IT: What’s Your Migration Path
Technology Megatrends Reshaping IT: What’s Your Migration PathTechnology Megatrends Reshaping IT: What’s Your Migration Path
Technology Megatrends Reshaping IT: What’s Your Migration Path
 

More from IDG

Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
IDG
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
IDG
 
Role and Influence Sample Slides 2023.pdf
Role and Influence Sample Slides 2023.pdfRole and Influence Sample Slides 2023.pdf
Role and Influence Sample Slides 2023.pdf
IDG
 
2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdf2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdf
IDG
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdfState of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
IDG
 
CIO Tech Priorities 2023_Sample Slides.pdf
CIO Tech Priorities 2023_Sample Slides.pdfCIO Tech Priorities 2023_Sample Slides.pdf
CIO Tech Priorities 2023_Sample Slides.pdf
IDG
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptxState of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
IDG
 
State of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdfState of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdf
IDG
 
R_IF_Security Purchase Process.pdf
R_IF_Security Purchase Process.pdfR_IF_Security Purchase Process.pdf
R_IF_Security Purchase Process.pdf
IDG
 
Foundry Customer Engagement Study 2022
Foundry Customer Engagement Study 2022Foundry Customer Engagement Study 2022
Foundry Customer Engagement Study 2022
IDG
 
R-PPT_ABM Benchmarking_2022_sample slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdfR-PPT_ABM Benchmarking_2022_sample slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdf
IDG
 
Foundry Partner Marketing Study 2022
Foundry Partner Marketing Study 2022Foundry Partner Marketing Study 2022
Foundry Partner Marketing Study 2022
IDG
 
Security Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdfSecurity Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdf
IDG
 
R_IF_DataAnalytics22_070822.pdf
R_IF_DataAnalytics22_070822.pdfR_IF_DataAnalytics22_070822.pdf
R_IF_DataAnalytics22_070822.pdf
IDG
 
Foundry Future of Work Study 2022
Foundry Future of Work Study 2022Foundry Future of Work Study 2022
Foundry Future of Work Study 2022
IDG
 
Data & Analytics Sample Slides_NEW.pdf
Data & Analytics Sample Slides_NEW.pdfData & Analytics Sample Slides_NEW.pdf
Data & Analytics Sample Slides_NEW.pdf
IDG
 
NEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdfNEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdf
IDG
 
R if security_priorities_03.08.22
R if security_priorities_03.08.22R if security_priorities_03.08.22
R if security_priorities_03.08.22
IDG
 
R if data_analytics_03.08.22
R if data_analytics_03.08.22R if data_analytics_03.08.22
R if data_analytics_03.08.22
IDG
 
Foundry Partner Marketing Research 2020
Foundry Partner Marketing Research 2020Foundry Partner Marketing Research 2020
Foundry Partner Marketing Research 2020
IDG
 

More from IDG (20)

Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
 
Role and Influence Sample Slides 2023.pdf
Role and Influence Sample Slides 2023.pdfRole and Influence Sample Slides 2023.pdf
Role and Influence Sample Slides 2023.pdf
 
2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdf2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdf
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdfState of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
State of the CIO Research 2023_NEW SAMPLE SLIDES.pdf
 
CIO Tech Priorities 2023_Sample Slides.pdf
CIO Tech Priorities 2023_Sample Slides.pdfCIO Tech Priorities 2023_Sample Slides.pdf
CIO Tech Priorities 2023_Sample Slides.pdf
 
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptxState of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
State of the CIO Research 2023_NEW SAMPLE SLIDES.pptx
 
State of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdfState of the CIO 2023 Sample Slides.pdf
State of the CIO 2023 Sample Slides.pdf
 
R_IF_Security Purchase Process.pdf
R_IF_Security Purchase Process.pdfR_IF_Security Purchase Process.pdf
R_IF_Security Purchase Process.pdf
 
Foundry Customer Engagement Study 2022
Foundry Customer Engagement Study 2022Foundry Customer Engagement Study 2022
Foundry Customer Engagement Study 2022
 
R-PPT_ABM Benchmarking_2022_sample slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdfR-PPT_ABM Benchmarking_2022_sample slides.pdf
R-PPT_ABM Benchmarking_2022_sample slides.pdf
 
Foundry Partner Marketing Study 2022
Foundry Partner Marketing Study 2022Foundry Partner Marketing Study 2022
Foundry Partner Marketing Study 2022
 
Security Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdfSecurity Priorities 2022 Sample Slides.pdf
Security Priorities 2022 Sample Slides.pdf
 
R_IF_DataAnalytics22_070822.pdf
R_IF_DataAnalytics22_070822.pdfR_IF_DataAnalytics22_070822.pdf
R_IF_DataAnalytics22_070822.pdf
 
Foundry Future of Work Study 2022
Foundry Future of Work Study 2022Foundry Future of Work Study 2022
Foundry Future of Work Study 2022
 
Data & Analytics Sample Slides_NEW.pdf
Data & Analytics Sample Slides_NEW.pdfData & Analytics Sample Slides_NEW.pdf
Data & Analytics Sample Slides_NEW.pdf
 
NEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdfNEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdf
 
R if security_priorities_03.08.22
R if security_priorities_03.08.22R if security_priorities_03.08.22
R if security_priorities_03.08.22
 
R if data_analytics_03.08.22
R if data_analytics_03.08.22R if data_analytics_03.08.22
R if data_analytics_03.08.22
 
Foundry Partner Marketing Research 2020
Foundry Partner Marketing Research 2020Foundry Partner Marketing Research 2020
Foundry Partner Marketing Research 2020
 

Recently uploaded

0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Access Innovations, Inc.
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
eCommerce Institute
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Orkestra
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
faizulhassanfaiz1670
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
Access Innovations, Inc.
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
gharris9
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 

Recently uploaded (17)

0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 

State of the Network Infographic 2018

  • 1. 10% The Network Role is Evolving feel that the role of the networking professional is becoming more strategic/ business oriented 79% agree that collaboration between the network team and other IT teams is successful in driving innovation 82% agree that the network management team is communicating with the CIO more than ever before 71% of network professionals are initiating collaboration efforts 84% say the network management team is communicating with LOB more than ever before 69% of network professionals expect their job to become more challenging 84% Emerging Technologies What’s Transforming the Network? EDGE COMPUTING: Edge Computing allows the processing of information to be performed closer to where it is being collected/generated. This is fundamentally changing the network by letting organizations analyze important data in near real-time. HYPERCONVERGED INFRASTRUCTURE: Software-centric architecture that integrates compute, storage, virtualization (hypervisor), and management on commodity hardware that’s supported by a single vendor. Since Hyperconverged Infrastructure is software-defined, the components are essentially integrated and cannot be separated. CONVERGED INFRASTRUCTURE: A hardware-centric, building block infrastructure approach that integrates compute and other components such as storage and servers on commodity hardware supported by a single vendor. In a converged system, the components can be broken apart and used on their own. SOFTWARE-DEFINED NETWORKING (SDN): Involves the decoupling of the network's control and data forwarding planes, and enables automated provisioning, network programmability, service chaining, and integration with cloud orchestration systems. SD-WAN TECHNOLOGY: Enables you to augment existing MPLS— multi-protocol label (a WAN technology where a user has full control over traffic engineering) links—with lower cost Internet, Ethernet or wireless alternatives, and balance the traffic across the mix based on priority, availability, performance, etc. Budgets & Investments Average IT Budget $137 million(up $12M from 2017) expect their organization’s total IT budget to increase over the next 12 months 43% View additional IDG research on technology trends and IT decision-maker insight. Source: 2018 State of the Network Survey, Network World #StateoftheNetwork | @NetworkWorld @IDGWorld IDG Communications, Inc. Technology areas expecting an increase in budget allocation Ensuring Availability (uptime) Improving Data Security Improving Network Speed/Performance 53% 53% 53% Network Security Application Development Cloud Services Machine Learning (new for 2018) Analytics/Data Management 2017 2018 55% 61% 50% 61% 69% 60% 55% 43% 47% Primary Drivers for Network Investments Ensuring Business Continuity Improving Customer Experience 51% 45% Securing the Network say the network team is spending more time on security initiatives today than in years past 82% of network professionals say that network security is their primary area of responsibility60% say that the network management team finds it challenging to balance availability vs. a secure network69% What are the top challenges related to security and access to data? Maintaining network security while assuring network connectivity # 1 Protecting against data breaches/leaks # 2 Ensuring availability (uptime) # 3 Current and Future Network-Security Initiatives On the radar/actively researching Data Loss Prevention Corporate Data Encryption ID Management Solutions 36% 33% 32% Budget Increases for Security Related Tools Network Security Compliance Disaster Recovery 61% 46% 42% IT Governance Business Continuity 37% 36% Network Professionals Are Reshaping IT Strategy How Emerging Technologies, Budgets & Investments, and Security Influence the Network Role of networking professionals have plans for Edge Computing 56% have plans to implement hyperconverged infrastructure (increases to 73% for enterprise organizations) 63% have plans to implement converged infrastructure (increases to 76% for enterprise organizations) have plans for SD-WAN technology 63% have plans for SDN technology 64%69% 76% 73%