Leading CIOs are changing the way they communicate to their boards about cyber security by emphasizing response, not infiltration. Rather than solely focusing on how to thwart penetration, CIOs are treating cyber security as an integral part of business/service continuity and risk management agendas, with a priority on rapidly responding to critical breaches. This research note is based on data gathered through proprietary social analytics, extensive collaboration with CIOs, CTOs, CISOs and business executives; and is designed to assist CIOs in advancing security agendas with boards of directors.
In the spring of 2016 we began an initiative to organize a group of CxOs to discuss the issue of cyber security. One thing we’ve learned about the topic of security is it’s hard to fake. We’re not security technology experts. As such we decided to focus on business issues. We observed heightened activity around […]
Leading digital companies are using simple top-level frameworks for setting digitization priorities. At the center of the approaches we've seen are three questions: What do we want to do better; who are we going to engage; and how are we going to institute the digital capabilities.
Enterprises must navigate the universe of big data applications by recognizing that application platforms will alternately empower and constrain enterprises along a path of ever more sophisticated applications. Data lakes, intelligent systems of engagement, and self-tuning systems of intelligence all build on each other in terms of capabilities. But the underlying platforms will evolve in a cycle of simplicity, complexity from adaptive stretch, and simplicity again via a platform refresh.
Big data products and workloads remain too immature for standard benchmarks capable of providing truly comparable results. Users that need benchmarks for contracting or comparison purposes should run their own stylized workloads based on their intended usage scenarios.
Users considering public cloud for business and IT workloads should evaluate the types of use cases and workloads that have wide successful deployment in the public cloud today. In order to help users to better understand the customers and workloads being served in the public cloud today, Wikibon examined the brief descriptions of approximately 650 customer solution stories on the Amazon Web Services (AWS) website and classified each according on a number of characteristics. This research reveals some interesting insights about the public cloud leader’s business, and therefore about public cloud utilization generally.
The Wikibon premise in this research is that this converged environment is a win-win environment for both vendors, ISVs and enterprise IT. Testing of the converged system solution is more robust, and the reduction in the number of solution types significantly lowers testing and installation costs for the vendor. ISVs can lower the cost of deployment, deliver application value faster, and drive additional upgrade value much faster. Converged enterprise IT systems (private clouds) are more agile, more reliable, more secure and have the similar costs to public clouds.
Wikibon looks at the emerging Cloud-native application architectures. This research focused on the scope of microservices, the domains of interaction between services, and how data services and sources are changing with these new applications.
Faced with the choices of modernizing existing applications or starting new projects, IT organizations have many options. Wikibon looks at the vast number of options today, with a methodology to evaluate choice vs. risk.
There are no enterprise organizations that have married the business, digital creativity and IT as seamlessly as Weta Digital.