Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Consumerization and the BYOD Trend Heighten Data Leakage Fears

The growing consumerization trend is doing more than simply wreaking havoc for IT administrators looking to protect the corporate network from unknown infiltrators--it's also dramatically changing how data is being created, consumed and stored.

While that opens up market opportunities for a myriad of vendors, it's a veritable Pandora's Box for corporate IT grappling with ensuring that data leakage doesn't become the order of the day in the age of BYOD, or bring your own device. Ultimately, it has everything to do with creating information ubiquity, making data available to employees no matter where they are or what device they're using.

More Insights

Webcasts

More >>

White Papers

More >>

Reports

More >>

"This is a really interesting space because it overlaps so many adjacent areas that there isn't a category yet," says Terri McClure, a senior analyst at Enterprise Strategy Group (ESG). "The whole consumerization and mobilization of the workforce is what's driving this market ... the second driver is multiple people sharing that one copy of the truth versus having to email it between each other. It's not really true collaboration if everyone is working on a separate version of a file."

ESG is in the midst of studying the subject and future reports are forthcoming. In the meantime, the IT consultancy did produce a December 2011 report entitled "Online File Sharing and Collaboration in the Enterprise." It found that end users are "looking to tackle issues like data sharing, portability and access from multiple intelligent endpoint devices, creating a conundrum for IT as it needs to balance business enablement, ease of access, and collaborative capacity with the need to maintain control and security of information assets."

That's precisely what's driving the online file-sharing and collaboration segment of software-as-a-service, says McClure.

"This market is coming from the consumer workforce into the enterprise because enterprise IT is solving the challenge of collaboration with solutions like Microsoft SharePoint," she says. "But those solutions aren't Web-enabled so the challenge is, as more consumer devices make their way into the enterprise, a lot of people are solving this sharing between devices and one file between each other on their own."

Though new vendors are coming to the fore, the market itself isn't new, explains Charles King, president and principal analyst at Pund-IT Inc.

"It's new in the sense that we're seeing different players coming into the space and tweaking the services that they offer ... everyone's trying to reinvent the wheel," he says. "All of these solutions tend to roll in the same general direction.

"In businesses that are active users of information technology, information represents the crown jewels for a lot of companies, literally and figuratively."

Next: Secure Collaboration Tools to Protect Data


Page:  1 | 2  | Next Page »


Related Reading


Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
 
Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

August 2013
Network Computing: August 2013



TechWeb Careers