Forrester's latest Security Survey findings published

I wanted to announce that the reports based on our annual Security Survey of nearly 2,000 organizations are live as of Monday, January 25th. These are among our most widely read security reports, with insight into IT security priorities, challenges, state of compliance efforts, and of course adoption of security technologies and services.

The two reports are:

“The State of Enterprise IT Security And Emerging Trends: 2009 to 2010”, at http://www.forrester.com/go?docid=56032

“The State of SMB IT Security And Emerging Trends: 2009 to 2010”, at http://www.forrester.com/go?docid=55093

Here’s a taste of some of the findings:

Read more

Forrester's latest Security Survey findings published

I wanted to announce that the reports based on our annual Security Survey of nearly 2,000 organizations are live as of Monday, January 25. These are among our most widely-read security reports, with insight into IT security priorities, challenges, state of compliance efforts, and of course adoption of security technologies and services.

The two reports are:

Read more

Categories:

IBM Establishes Collaboration Agenda at Lotusphere

I just returned from Lotusphere, where I was once again able to compare and contrast the thinking of IBM labs personnel, product teams, and customers in close proximity.  IBM is setting their collaboration agenda around business verticals and processes where real business value can be delivered.  In discussion with Rick McGee, VP Market Segment Management, I heard more about IBM’s collaboration agenda and their focus on selling their solutions to three key constituents at customer:

Read more

Where in the world is the cloud going?

In a recent blog departures_cloudpost and press kit on Building Confidence in Cloud Computing, Microsoft's General Counsel, Brad Smith, calls for government action to "ensure that a robust privacy and security legal framework exists to protect and provide user rights and benefits in the cloud."  Microsoft's statement rightly suggests that in order for the promise of "cloud computing" -- be it applications, software infrastructure for developers or physical computing capacity -- to be realized issues of data protection must be better addressed. The statement appeals to the US government to to update, modernize and strengthen two existing pieces of legislation -- the Electronic Communications Privacy Act (ECPA) and the Computer Fraud and Abuse Act (CFAA).  The statement also promotes greater transparency regarding security provided by cloud services providers as well as global collaboration around rules governing access to data for law enforcement purposes. 

Read more

Avaya Takes Their Product Roadmap and Commitment to Customers Public

In my discussions with Kevin Kennedy (President & CEO), Joel Hackney (Senior Vice President & President, Government and Data Solutions) and other Avaya executives over the past 12 months, the need to keep customers informed about their options, and to equip partners with the capabilities to serve those customers has been a paramount concern.  When Avaya won the bidding to acquire Nortel’s Enterprise business, the company promised that they would make their product road map public 30 days after closing and today they are making good on that promise under the banner of &ldq

Read more

The Cloud-Compliance Challenge

Cloud computing challenges the CIO legally as well as technically!

Cloud computing is the availability of standard IT resources over the internet in a pay-per use model. Initially this is an attractive proposition. However there are many challenges which CIOs will face when running firm critical applications and data over the internet. The most successful CIOs have built an IT governance strategy to avoid the uncontrolled variety of technologies, meta data and business process evolution in their IT landscape. A good governance strategy ultimately makes the implementation of legal compliance requirements from Basel II or SOX much easier. Without searching first for critical data, an orderly approach is much simpler and the CIO won’t be the only one sleeping better.

So long as everything is in your own company or at local infrastructure, IT governance and compliance should be governed centrally from the CIO office. But what happens when a firm’s cloud computing is effectively deployed? This technology paradigm has its largest cost savings when applications and business processes have extremely high and uneven resource requirements. In most cases these are automatically firm critical applications and confidential data. The responsibility of a CIO then moves from pursuing operational excellence in the datacenter, to the greater responsibility of developing and managing intelligent sourcing concepts in the cloud and bringing its consequences under control. The large cloud computing vendors are nearly without exception international firms and a core basis for their cost-effective deployment lies in their global sourcing strategies. IT governance and legal compliance must also be developed to cloud governance and global provider governance.

Read more

What Google v. China tells us about how the security market is changing

[This entry is cross posted to Jonathan Penn's blog, Cyberia]

Expanding on the Google meme from Andy Jaquith's prior post...

Rather than discuss the extent of the cyber threat from China, or whether Google should effectively pull out of China by ending the censoring of search results (or why it was even in China to begin with), the most interesting and telling thing I'm seeing from all the discussion on this is the visibility of the defense contracting and intelligence consulting community, and how that visibility and even dominance is going without much comment by industry watchers and without much challenge by traditional security firms. Who is going to analyze and say with confidence whether the attack came from proxies or direct representatives of the Chinese state? It's the defense contractors. Like the July 4 attacks targeting the US and South Korea, the traditional defense contractors — Lockheed Martin, Northop Grumman (also targeted), and Raytheon, most notably) are the go-to authorities on this, while Symantec (which was also one of the targets in the multi-pronged attack), McAfee, and others are left merely to talk about how the attacks in and of themselves might fuel greater interest in their security technologies.

Read more

Categories:

Green Touch consortia brings an ecosystem approach to the ICT carbon reduction challenge

In my predictions piece for Telecoms sector in 2010 I said green would be back.(http://www.forrester.com/rb/Research/predictions_2010_whats_in_store_for_telecom/q/id/53406/t/2). The reality, of course, is that green never went away but was merely overshadowed by the recession in 2009.

Read more

Video-Enabled Collaboration

Over the past couple months I have talked at an accelerating pace to vendors and buyers who are interested in delivering video solutions to support communications and collaboration. The concepts and solutions range from desk top to telepresence, conferencing to one-on-one, and both synchronous as well as asynchronous. Technology finally appears ready to deliver that 60% of non-verbal human communications in ways that users can actually adopt, use, and integrate into their daily work lives.

Read more

The Next Decade

2010 is arguably the beginning of a new decade (at least it's the beginning of my second decade as an industry analyst). Looking back at the past ten years, I realize the progress we have made in IT management software. Ten years ago, it was mostly about collecting data from infrastructure devices and managing infrastructures to find the right level of performance. The major progress of the decade was to shift the focus from infrastructure to services.

Read more