Archive for the ‘data archiving’ Category
It’s that time of year. Google has released its 2012 Zeitgeist, telling us what’s on the minds of the world’s searchers.
Facebook, not to be out done, has released the Facebook Year In Review, ”a look back at the people, moments and things that created the most buzz in 2012 among the billion people around the world on Facebook.”
Now, go and ask folks what they think about Facebook’s everchanging privacy controls, and we’ll see if the Facebook Year In Review gets soon revised.
But I’m actually more interested in a big report from a small, but growing networking software and social business upstart located right here in Austin, Texas.
Spiceworks connects 2.2 million IT professionals with more than 1,300 technology brands, and offers its IT management software through a novel ad-supported model. In turn, it claims to “help businesses to discover, buy and manage $405 billion worth of technology products and services each year.”
Spiceworks just released its semi-annual “State of SMB IT Report,” a collection of statistics, trends and opinions from small and medium business technology professionals from amongst their community.
This December’s study is the seventh edition, and claims to “keep the pulse on the happenings of small and medium business IT professionals and IT departments.”
First, I’m just happy to discover they still have a pulse.
The National Federation of Independent Business’ “Small Business Optimism Index,” which is reported monthly, indicated in its November report one of the steepest declines in its history. In fact, it has reported a lower index value only seven times since it first conducted its monthly surveys in 1986.
The Index dropped a full 5.6 points in November, bottoming out at 87.5 (In 2000, by juxtaposition, it was well above 100), indicating something was rotten in November. The Index’s own Web statement suggested “it is very clear that a stunning number of [small business] owners…expect worse business conditions in six months,” and that nearly half are certain things will be worse next year than they are now, with a head nod to the looming fiscal cliff talks, the promise of higher healthcare costs, and the “endless onslaught of new regulations.”
Chicken Little, the SMB sky is falling!
Clouds, Virtualization, And Tablets Are Driving The SMB IT Spending Bus
But fear not, the SMB adoption of new technology is riding to the small business rescue, or so suggests the Spiceworks SMB IT study.
The headlines? Though IT budgets are on the rise in the SMB, hiring new staff is at a standstill. But for those still standing, in the last six months, SMBs adopted tablets and cloud services in fast-growing numbers.
Here are the four key findings:
- Tablet adoption keeps its momentum and nears smartphone levels. Hardware maintains the lion’s share of IT spend in the SMB.
- Adoption of cloud services spikes; desktop virtualization shows strong potential. (Can you say “Go long on VMWare??”)
- IT budgets reached their highest point in the last three years, while hiring freezes are up.
- BYOD is still a hot topic, though IT pros are split on the issue.
Diving down a bit, on the subject of tablets, 53 percent of SMBs now support tablets on their network, making them almost as popular as smartphones at 59 percent.
Cloud services are now used by 62 percent of SMBs, up from 48 percent in the first half of 2012.
With respect to IT budgets, they’re on the rise, averaging $162K, up from $152K in 1H 2012. But only 26 percent plan on hiring IT staff in the second half.
And on BYOD, whlie 14 percent fully embrace the trend, 32 percent say it works well for some devices, but not for others. Digging deeper, I discovered that smartphones led with 81 percent BYOD support, while tablets only garnered 62 percent.
And somewhat ironically, there’s more support for BYOD in much smaller organizations (defined here as less than 20 employees) than larger ones (50 percent in those above 250 employees).
I would encourage you to go here and register to download the full report, but the top line is this: If you’re an IT vendor looking for budget flush at the end of 2012, desktops, laptops, and servers are certainly low-hanging fruit, with tablets bringing on the most growth.
And on the software front, be on the lookout for disaster recovery and storage solutions (an IT mainstay through downturns), cloud-based solutions, and virtualization software.
Whatever you do make, just make sure you make those new purchases with “Gangnam Style” — and if you have no idea of what I’m referring to, see above with regards to the 2012 Google Zeitgeist!
If you’ve been curious as to what IBM has been up to on the security front, today’s a good day to check in.
Earlier today, the Dow Jones AllThingsD blog had this post about some new capabilities IBM is announcing on the security front.
Today, IBM unveiled several new services planned for its security intelligence platform designed to combine deep analytics with real-time data feeds from hundreds of different sources to give organizations, for the first time, the ability to help proactively protect themselves from increasingly sophisticated and complex security threats and attacks using a single platform.
Organizations today are struggling to defend themselves against an onslaught of ever-evolving data breaches, such as theft of customer and employee information, credit card data and corporate intellectual property.
To date, many corporations have been unable to create a security defense system because they have cobbled together technologies that don’t integrate in an intelligent and automated fashion. This patchwork approach has created loopholes that hackers can exploit.
The QRadar Security Intelligence Platform, designed by Q1 Labs and acquired by IBM last fall, tackles this problem head-on by serving as a control center that integrates real-time security intelligence data to include more than 400 different sources.
Major breakthroughs planned in the security platform include:
- Threat Intelligence – Intelligence from one of the world’s largest repository of threat and vulnerability insights is planned to be available based on the real-time monitoring of 13 billion security events per day from the IBM X-Force Threat Intelligence Feed. This insight can flag behavior that may be associated with Advanced Persistent Threats, which may emanate from teams of attackers accessing networks through stealth means.
- Visibility into Enterprise Activity – The platform will unite events from IBM and non-IBM products that span four areas of organizational risk – infrastructure, people, applications and data.
- Pinpoint Analysis in an Age of Big Data – The platform can drill down to basic data elements to help analyze issues emanating from network access information at the periphery to database activity at the core of a business.
New Integrations Bring Real-Time Security Analytics
With new integrations to be made available, the analytics platform can quickly identify abnormal activity by combining the contextual awareness of the latest threats and methods being used by hackers with real-time analysis of the traffic on the corporate IT infrastructure.
For example, the future integrations permit the platform to detect when multiple failed logins to a database server are followed by a successful login and access to credit card tables, followed by an upload to an unknown site.
“We chose the QRadar platform to build on and deliver our vision of a streamlined, highly intelligent platform to serve as our central nervous system for enterprise-wide monitoring,” said Ken Major, Information Security Officer at AmeriCU Credit Union. “It enables us to achieve our goals, industry best practices and regulatory compliance.”
One of the significant planned integrations for the QRadar platform is IBM’s X-Force Intelligence Threat Feed based on the real-time monitoring of 13 billion security events per day, on average, for nearly 4,000 clients in more than 130 countries.
The QRadar platform will have visibility into the latest security trends worldwide to help protect enterprises against emerging risks. QRadar will present current IBM X-Force threat feeds in dashboard views for users, and correlate an organization’s security and network events with these threats and vulnerabilities in real-time using automated rules.
Other planned integrations to allow the QRadar Security Intelligence Platform to help clients more rapidly identify threats by connecting events from the following categories:
- People: Organizations should control access to key systems and information. An employee’s unauthorized access to key databases and client information can leave a firm vulnerable to security breaches. With security intelligence, security teams can quickly determine whether access patterns exhibited by a given user are consistent with the user’s role and permissions within the organization. IBM Security Identity Manager and IBM Security Access Manager will integrate with the QRadar platform, complementing QRadar’s existing support for enterprise directories such as Microsoft Active Directory.
- Data: Data is at the core of security; it is what’s behind every security measure in place, and is the primary target of cyber-criminals. With IBM Guardium Database Security integrated with the security intelligence platform, users will be able to better correlate unauthorized or suspicious activity at the database layer – such as a database administrator accessing credit card tables during off-hours – with anomalous activity detected at the network layer, such as credit card records being sent to unfamiliar servers on the Internet.
- Applications: Applications are vital to day-to-day function but can also introduce new and serious vulnerabilities into company networks. Applications, because of their sensitivity, should be updated frequently. Organizations however are often unable to patch immediately due to corporate testing requirements and change control cycles. With security intelligence, companies will be able to automatically alert security teams to unpatched Web applications that risk being attacked by known application-layer exploits that have previously been identified by IBM Security AppScan. This planned integration complements existing QRadar support for monitoring enterprise applications such as IBM WebSphere and SAP ERP.
- Infrastructure: Today, organizations struggle to secure thousands of physical devices, such as PCs and mobile phones, especially as Bring Your Own Device (BYOD) continues to grow in popularity. For this reason, companies should take extra precautions to help employees to follow secure practices in using these devices. With IBM Endpoint Manager integration, the security platform can provide organizations with enhanced protection of physical and virtual endpoints: servers, desktops, roaming laptops, smartphones and tablets, plus specialized equipment such as point-of-sale devices, ATMs and self-service kiosks.
QRadar integration modules are also planned for Symantec DLP, Websense Triton, Stonesoft Stonegate and other third-party products, increasing QRadar’s ecosystem and continuing Q1 Labs’ long-standing approach to multi-vendor heterogeneous environments.
Solutions to Analyze Big Data
In addition, the QRadar platform has been expanded with Big Data capabilities for storing and querying massive amounts of security information, and functionality for helping to secure virtualized infrastructures and providing a new level of visibility that helps clients reduce security risk and automate their compliance processes.
The expansion of security and network data sources is complemented by advanced functionality to help organizations keep pace with their exponential data growth. The new deliverables include:
- Instant Search to provide high-speed, free-text querying of both log and flow data, designed to bring the simplicity and speed of Internet search engines to the security intelligence solution.
- The XX24 appliance series to extend the scalability and performance advantages for which QRadar solutions are well known. With the release of the QRadar 3124 SIEM appliances, QRadar 1624 Event Processor and QRadar 1724 Flow Processor – which all include 16TB of usable storage and 64GB of RAM – organizations can support more users, achieve higher performance and store data longer.
- Intelligent data policy management to enable users to designate which information they want to store and for how long. Less important data can be removed sooner to achieve longer retention for more important data.
- Virtual appliances to allow end customers and service providers to capitalize on the virtual infrastructures they have built, while benefiting from lower-priced yet fully capable security intelligence solutions.
The planned integration modules (device support modules) are expected to be included with QRadar SIEM and QRadar Log Manager at no additional cost, via automatic updates.
The Big Data and virtual infrastructure enhancements are available now. QRadar integration modules for IBM Guardium Database Security are planned to be available in 1Q2012.
Integration modules for IBM X-Force Threat Intelligence, IBM Security Identity Manager, IBM Security Access Manager, IBM Security AppScan and IBM Endpoint Manager are planned to be available in 2Q2012.
Visit Q1Labs’ site for more information.
IBM’s Information Infrastructure Analyst summit was held in Boston yesterday, where it unveiled its plan for a new Smart Business System called “IBM Information Archive.”
This archiving capability is a repository for all types of content that addresses the complete information retention needs of companies big and small, to help them manage an increasing volume of information.
The need for archiving information is growing by the nanosecond, driven by data growth, regulatory compliance, legal discovery and data protection.
But with ever-increasing requirements surrounding the long-term retention of information, organizations are looking for advanced archiving technologies to manage information throughout its lifecycle.
This new solution includes contributions from IBM Research, System Storage and IBM’s Tivoli software brand, and it leverages IBM’s expertise in combining fast accessible disk with low-cost tape within a single archive pool.
The solution incorporates deduplication and compression techniques to optimize storage capacity, and to help minimize the total cost of ownership over the life of the archive information.
You can learn more about the IBM Information Archive here.
Meanwhile, back at the Information Management ranch, the drumbeat continues to build towards Las Vegas and the Information on Demand event October 25-29.
Another good reason to head out to Vegas (other than to see the parachuting Elvi) is to hear from folks like Al Smith, director of Optim Engineering, who recently provided Scott Laningham and I a quick overview of integrated data management and explained what Optim can do to help IBM customers better manage their data growth.
Check out the podcast here (8:34).