Planning for Data Sovereignty in a Multicloud World
Gigaom » Big Data
by Jon Collins
6M ago
With its roots in privacy law emerging from the UK and Europe, data sovereignty has become a global concern. Increasingly, international trade requires compliance with local data laws—covering nations, states, or other jurisdictions such as the EU. Governments, rather than corporations or hyperscalers, are setting the rules: Not only can they require data to be stored in-country, but some go further, stipulating that local providers deploy and operate systems storing or processing data. As data sovereignty drivers largely concern cloud-based infrastructure, we see sovereign cloud solutions eme ..read more
Visit website
The Cloud-only Era is Done
Gigaom » Big Data
by Jon Collins
6M ago
As ever in this job, it’s by putting multiple conversations together that I start building a picture. Over recent months, I’ve spoken to big enterprises and small businesses, global providers and small startups, new faces and old colleagues. It’s a privilege to spend time making sense of it all.  Even better is that it affords the opportunity to test hypotheses. As I was listening to the radio last week, Young Ones comedian Ade Edmondson was talking about his days on the live circuit. Above all, he said, it allowed him the opportunity to find out what was funny, what his audience hooked i ..read more
Visit website
DevOps efficiency needs to put business goals first
Gigaom » Big Data
by Jon Collins
6M ago
Here’s a quick story. As a business analyst, I worked at a publisher in Oxford. We were interviewing, process diagramming, and so on – that’s not the interesting bit. Meanwhile, in parallel, they brought in consultants from a small company in Birmingham, UK. Two or three folks.  The building we were working in was long and thin, and had an empty upper floor. These guys came in with a massive roll of brown paper, 7 feet high. They shot this roll all the way down the empty floor. They then went and spoke to people and asked them what systems they used, what forms they filled and so on.  ..read more
Visit website
Enterprise MFA is actually really cool
Gigaom » Big Data
by Andrew Green
6M ago
Multifactor authentication (MFA) is a credential verification method that requires the provisioning of two or more authentication mechanisms to gain access to an IT resource. In essence, besides a password, users log in by providing a fingerprint, USB token, a push notification on their device, or others. With this additional layer of friction, end-user experience is critical to consider when enforcing multiple authentication methods. My personal experience with MFA has been terrible. Onboarding can be challenging, and setup instructions aren’t always clear. On one occasion, the passwords gene ..read more
Visit website
NaaS – enterprise networking as an innovation platform
Gigaom » Big Data
by Andrew Green
6M ago
Network as a service (NaaS) applies a cloud-like provisioning model to enterprise networking, enabling on-demand, scalable connectivity and value-added services via a self-service portal. This surface-level proposition has a very clear attraction – deploy a network in an as-a-service, pay-as-you-go model, and a third party will manage it for you. At the risk of saying, “One more thing”, NaaS can offer so much more beyond what’s generally being marketed. Below, we will discuss why NaaS can enable large organizations to innovate in a way that has not been previously possible. In short, it unlock ..read more
Visit website
As Microsoft joins the party, is it time to try MDR?
Gigaom » Big Data
by Paul Stringfellow
6M ago
Recently Microsoft entered the world of managed detection and response (MDR) solutions with its “Microsoft Defender Experts for XDR”. An addition to Microsoft’s ever-growing security portfolio and one many of its customers may find attractive.  With this launch in mind, I thought it was a good time to revisit some research that I did here at GigaOm earlier this year, looking at MDR solutions, what they are and what they could do for you (Subscribers can click on these links to access the Key Criteria and Radar report).  MDR is a rapidly moving space whose development speed is driven ..read more
Visit website
GigaOm Research Bulletin #004
Gigaom » Big Data
by Jon Collins
6M ago
Welcome to GigaOm’s research bulletin for August 2023 Hi, and welcome back! Our CEO Ben Book has taken GigaOm from a boutique analyst company to what is now recognized as a leading analyst firm, redefining the nature of analysis in the process. Here he looks at how the market for research has evolved and how GigaOm has shifted to align with the needs of end-user organizations as they prepare for a data-driven, digital future. Our latest podcast discusses how organizations could implement technical strategies instead of spending most of their time putting out fires. Gi ..read more
Visit website
What’s the future for WebAssembly?
Gigaom » Big Data
by Jon Collins
6M ago
I was fortunate to sit down with Matt Butcher, CEO of Fermyon, and discuss all things application infrastructure, cloud native architectures, serverless, containers and all that. Jon: Okay Matt, good to speak to you today. I’ve been fascinated by the WebAssembly phenomenon and how it seems to be still on the periphery even as it looks like a pretty core way of delivering applications. We can dig into that dichotomy, but first, let’s learn a bit more about you – what’s the Matt Butcher origin story, as far as technology is concerned? Matt: It started when I got involved in cloud computing at HP ..read more
Visit website
Standalone SOAR is Alive and Kicking
Gigaom » Big Data
by Andrew Green
6M ago
Multiple publications and analyst firms have predicted a doomsday scenario for the standalone SOAR following a number of acquisitions in the space, mainly by SIEM vendors. Google acquired Siemplify, Devo acquired LogicHub, Fortinet acquired CyberSponse, Palo Alto Networks acquired Demisto, Splunk acquired Phantom, Sumo Logic acquired DFLabs, and Micro Focus acquired Atar Labs, which, in turn, got acquired by OpenText. But this high-level view has very low resolution. It assumes that all possible SOARs are already in circulation, that every acquisition minimizes the pool of standalone vendors ..read more
Visit website
Is there a case for Microsoft as your only enterprise security partner?
Gigaom » Big Data
by Paul Stringfellow
6M ago
In recent GigaOm research, we evaluated whether there was a good argument to use a single security partner to protect an organization or if multiple “best of breed” solutions are still the way to go. We looked at two use cases. Microsoft, using the broad capabilities of its M365 E3 platform with its E5 security add-on, compared to selecting individual solutions from several leading enterprise security vendors, including Crowdstrike, OKTA and Proofpoint. The research consisted of cost analysis, technical comparisons, and conversations with senior IT decision-makers to understand some of the ..read more
Visit website

Follow Gigaom » Big Data on FeedSpot

Continue with Google
Continue with Apple
OR