RSS

Analyst Blogs

Enter a comma separated list of user names.
By Irwin Lazar
On Sep 27, 2016

Microsoft's Project Rigel Bares Fruit

Tuesday, September 27, 2016

At this week's Ignite conference in Atlanta, Microsoft, along with partners Crestron, Logitech, and Polycom announced the first devices as part of the Project Rigel effort to enable easier Skype for Business room-based video conferencing.

Crestron's Next Generation Skype Room Systemprovides a customized Microsoft Surface Pro 4 that customers can use to control and manage video screens and cameras. The solution also provides management reporting.

By Irwin Lazar
On Sep 08, 2016

The White Board: Last Relic of Bad Meetings

Thursday, September 8, 2016
"Immersive group collaboration" brings interactive team meetings into the digital age.

Maybe this sounds familiar: You walk into your spiffy new conference room. On one end are two large screens for video conferencing and content projection. If you are lucky, perhaps there's an automatic pan-tilt-zoom camera that can follow the active speaker. Audio is spectacular thanks to microphones that drop from the ceiling or are embedded into the table. Everything is controllable via a touch screen.

By Irwin Lazar
On Sep 06, 2016

Team chat apps tap into enterprises, challenge UC clients

Tuesday, September 6, 2016
Enterprises are starting to adopt business chat apps, as they incorporate more robust features. The line is blurring between these apps and more established UC platforms.

Read more on SearchUnifiedCommunications.com

By John Burke
On Aug 31, 2016

The Digital Workspace Loves SD-WAN

Wednesday, August 31, 2016

I covered VDI closely for many years, several of which were dubbed "The Year of VDI" even though that never quite seemed to gel.

By Johna Till Johnson
On Aug 31, 2016

Red Canary Funding Highlights Role of Managed and Professional Cybersecurity Services

Wednesday, August 31, 2016

In our 2016/2017 Security and Risk Management Benchmark and Maturity Model, we highlighted a set of "bellwether technologies": Technologies that, we believed, would characterize the most sophisticated security organiztions. By and large, the technologies we selected were, in fact, considerably more likely to be deployed by more mature organizations (in some cases three or four times more likely). 

By Johna Till Johnson
On Aug 30, 2016

The Five Pillars of IoT Security

Tuesday, August 30, 2016

Unless you've been living under a rock for the past 8 years, you've been exposed to the concept of IoT. For enterprise organizations, itt's a key component of Digital Transformation (DT), primarily because it enables companies to capture huge amounts of data.

By Johna Till Johnson
On Aug 29, 2016

The Cybersecurity Skills Gap--And How To Fill It

Monday, August 29, 2016

If you're active in the cybersecurity field, chances are you've seen, heard, talked about or experienced the paucity in trained cybersecurity professionals. Predictions vary, but Cisco estimates there will be a global skills shortfall of around 2 million by 2019; other estimates are even highter (up to 1 million per year, starting this year).

As an infosec professional, how should you react? Some recommendations: 

By Johna Till Johnson
On Aug 29, 2016

The Cybersecurity Skills Gap--And How To Fill It

Monday, August 29, 2016

If you're active in the cybersecurity field, chances are you've seen, heard, talked about or experienced the paucity in trained cybersecurity professionals. Predictions vary, but Cisco estimates there will be a global skills shortfall of around 2 million by 2019; other estimates are even highter (up to 1 million per year, starting this year).

As an infosec professional, how should you react? Some recommendations: 

By Irwin Lazar
On Aug 26, 2016

Vidyo Highlights the Rise of cPaaS

Friday, August 26, 2016

Vidyo's announcement yesterday of a Video Platform-as-a-Service offering reflects a growing change in how enterprises and service providers can deliver communications services like voice and video. Gone are the days when using UC services required dedicated desktop and mobile applications.

By Johna Till Johnson
On Aug 23, 2016

Cybersecurity Budgeting Done Right: Five Steps

Tuesday, August 23, 2016

My morning cybersecurity alert scan uncovered this gem by CPA Joel Lanz on how to budget for cybersecurity. He makes a lot of excellent points. My favorite is being able to document that you've deployed, used, and benefitted from your previous investments in cybersecurity technology. Many infosec pros fail to do this, and it's table stakes for being able to ask for anything else. 

Pages