Satellite technology advancements, including steerable beams as well as new middle Earth orbit (MEO) and low Earth orbit (LEO) constellations, can potentially benefit businesses with cost-effective, low-latency, high-speed connectivity.
Satellite innovation can open new enterprise-grade applications leveraging lower costs and higher performance, such as deploying satellite backup in case of terrestrial network outage and expanding target markets for cloud computing services.
Robust connectivity to the Internet worldwide remains elusive despite the aggressive efforts of pioneers such as Google and investment partner Fidelity. There are vast expanses of land and sea where the choice is between high-latency (up to one second per hop) GEO satellites, or lower-latency but very narrowband LEO or MEO constellations such as Orbcomm, Globalstar or Iridium. Continue reading “Is It a Bird? Is It a Plane? No, It’s a Google/SpaceX Satellite!”→
IT leaders have begun to realize it’s impossible to completely lock down the use of external, unmanaged cloud services.
My hope is that as vendors seek to control the use of external data sources, they bear in mind that the means of gaining control may be compromise itself.
Shadow IT just got real. Or, at least, it’s well on its way to legitimacy now that IT leaders have begun to realize it’s impossible to completely lock down the use of external, unmanaged cloud services like file sharing and synchronization. Already vendors are seeking to capitalize upon the opportunity inherent within that realization. Consider Cisco’s recently introduced Cisco Cloud Consumption Service, which quite literally discovers and continuously monitors unmanaged cloud services. The idea is that by closely watching the use of such services, an organization can at a minimum identify security vulnerabilities and better manage (read: control) costs. Continue reading “Simple Observation May Be the Best Means of Controlling the Democratization of Data”→
• Another flurry of security vendor acquisitions is likely in 2016, thanks largely to slowing venture capital investing.
• Best-of-breed product integration and automation capabilities will be top industry storylines this year.
Many of you surely agree that end-of-year predictions articles are a tired trope, rolled out by publishers as click-bait while their staffs enjoy a holiday vacation. Here at Current Analysis, the Enterprise Security team (yes, it’s a team of one!) decided not to stare into the crystal ball last year, but with the first month of 2016 coming to a close, we wanted to highlight three trends that are guiding our research efforts this year.
• In IoT, connected car and other transportation verticals are seeing use cases from infotainment to automotive health and performance monitoring to fleet management. Asset tracking, retail apps, and utility management are also providing enterprise benefits.
• A number of promising new vertical solutions, technology enhancements and security services to deal with malware, data leakage, and security breach concerns are expected in 2016.
• Service providers are taking advantage of the rise in cloud services to create managed service bundles, providing small and mid-size businesses (SMBs) with a one-stop shop for solutions delivered at a single monthly rate.
• SMBs have an increasing array of options to support a move away from capital investment to an operational expense model, managed service bundles offer the potential to reduce complexity and manage costs.
SMBs, defined by Current Analysis as those with 20 to 500 employees, represent a sizable segment of communications users. Tier 1 providers such as AT&T, CenturyLink and Verizon have typically served this segment with business bundles that package business lines and Internet service under a single monthly fee for very small businesses, and PRIs and network-hosted VoIP for larger SMBs. Over the last several years, and coincident with the rise of new competitors in the form of cable operators such as Comcast Business and Time Warner Cable Business and over-the-top providers such as 8×8, major service providers have reinforced their focus on the SMB segment, reshaping partner strategies, adding tools and portals, and expanding VoIP and UC solutions to include managed bundle offers that frees SMBs from the task of managing communications services.
• 802.11ah/HaLow offers long range, low power wireless connectivity compared to other 802.11 protocols.
• In a vacuum, more options to choose from is beneficial, but in reality, more options lead to complications.
From the “yet another IoT wireless standard” category comes 802.11ah, what the Wi-Fi Alliance is calling HaLow, which is a wireless protocol that operates in the unlicensed 900Mhz spectrum – promising longer range, better penetration through walls, and lower power than 802.11a/b/g/n/ac. That’s great and I look forward to seeing deployments that can verify those claims because range and battery power are two limitations in IoT deployments that are difficult to overcome and could be showstoppers if they require significant investment in time or money to address.
• 2015 was the year of mobility consolidation including MADP, MBaaS, and PaaS
• Is 2016 the year of consolidation between EMM and MBaaS?
Continued consolidation among mobility technologies is inevitable. We’ve seen significant convergence over the past 18 months between developer-oriented technologies such as MADP and MBaaS; PaaS and MBaaS, and even PaaS and IaaS. So what’s next for 2016? Is DevOps finally ready for consolidation between mobile security and mobile app platforms? There are some rumblings among security and mobile app platform providers and their third-party partners around the growing importance of having a broader mobile portfolio to meet the needs of enterprises. In particular, some MADP vendors may be realizing enterprise mobility management (EMM) capabilities would provide an important area of differentiation in a highly competitive market.
Organizations are still failing to recognize the value in deploying specific devices to suit their employees’ varying workstyles.
To get the most out of their UC investment and the productivity of their employees, managers should ensure that the last foot to the mouth (i.e., the distance between the headset and the device) is a primary consideration.
As a former British soldier in a Signals regiment, I was told the vital importance of communications by means of a battlefield story. The short version tells of a message being sent back up the chain of command which originally stated: “Send reinforcements, we’re going to advance.” The message was finally received as: “Send three and fourpence, we’re going to a dance.” Regardless of the authenticity of the tale (or indeed the context), clarity remains an essential component of modern day communications. Continue reading “The Last Foot to the Mouth: Why Your Choice of Headsets Matters”→