Howard Holton, Jon Collins, Johnny Baltisberger, Author at Gigaom https://gigaom.com/author/johnbaltisberger/ Your industry partner in emerging technology research Fri, 26 Jul 2024 17:21:13 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.1 https://gigaom.com/wp-content/uploads/sites/1/2024/05/d5fd323f-cropped-ff3d2831-gigaom-square-32x32.png Howard Holton, Jon Collins, Johnny Baltisberger, Author at Gigaom https://gigaom.com/author/johnbaltisberger/ 32 32 The Good, The Bad, & The Techy: The Cloudstrike Outage https://gigaom.com/video/the-good-the-bad-the-techy-the-cloudstrike-outage/ Fri, 26 Jul 2024 17:21:13 +0000 https://gigaom.com/?post_type=go-video&p=1035317 CTO Howard Holton, and VP Engagement Jon Collins are joined by Production Manager Johnny Baltisberger to discuss the recent Windows Outage caused

The post The Good, The Bad, & The Techy: The Cloudstrike Outage appeared first on Gigaom.

]]>
CTO Howard Holton, and VP Engagement Jon Collins are joined by Production Manager Johnny Baltisberger to discuss the recent Windows Outage caused by Cloudstrike.

The post The Good, The Bad, & The Techy: The Cloudstrike Outage appeared first on Gigaom.

]]>
GigaOm Benchmark: Achieving Cyber Resilience with Commvault Cloud Cleanroom Recovery https://gigaom.com/report/gigaom-benchmark-achieving-cyber-resilience-with-commvault-cleanroom-recovery/ Wed, 22 May 2024 21:09:14 +0000 https://gigaom.com/?post_type=go-report&p=1031432/ This GigaOm Benchmark Report was commissioned by Commvault. Commvault® Cloud Cleanroom™ Recovery represents a paradigm shift in how enterprises address cyber recovery readiness.

The post GigaOm Benchmark: Achieving Cyber Resilience with Commvault Cloud Cleanroom Recovery appeared first on Gigaom.

]]>
This GigaOm Benchmark Report was commissioned by Commvault.

Commvault® Cloud Cleanroom™ Recovery represents a paradigm shift in how enterprises address cyber recovery readiness. Traditional backup and restore solutions do little to protect organizations from sophisticated and impactful cyber attacks, including but not limited to ransomware. For enterprises, the reality is that it is not a matter of if a cyber incident will occur but when it will occur and how damaging it will be. Investments in securing applications and implementing modern architectures such as zero trust remain critical, but a robust security posture demands a resilient recovery mechanism. Cyber recovery makes it possible for enterprises to recover critical infrastructure, applications, and data even if all other measures fail.

Commvault Cloud Cleanroom Recovery is an orchestrated cyber recovery solution that’s built on top of Commvault’s Metallic AI infrastructure. Cleanroom Recovery enables organizations to automate the regular testing and validation of backups so they know they have a proven recovery path and that the path is tested and trustworthy. Cleanroom Recovery uses cryptographically secure, immutable storage and anomaly detection to proactively identify that backups are clean from malware and corruption.

Cleanroom Recovery automates the provisioning of recovery environments, saving administration and cost compared to legacy solutions, which may have involved, long-running recovery environments. By effectively automating recovery without long-running infrastructure, Commvault Cloud Cleanroom Recovery lowers the overall cost and TCO for cyber recovery to an attainable level. Companies that may have previously undermined their cyber resilience due to high cost now have an affordable option that mitigates the risk of nonrecoverable cyber incidents.

In this benchmark report, we investigate the use of Commvault Cloud Cleanroom Recovery and identify its total cost of ownership compared to traditional backup and restore solutions and weigh these costs against the real costs of cyber incidents.

About GigaOm Benchmarks

GigaOm Benchmarks consist of lab-based performance and UX tests designed to reflect real-world scenarios and assess vendor claims. Our Benchmark reports inform technology buyers with transparent, repeatable tests and results, backed by GigaOm’s expert analysis. Where quantitative metrics may not fully describe an experience, qualitative metrics and analyst commentary may be used to provide context and product positioning in the market.

While no testing environment can fully meet the complexity of production implementations, we design benchmark test suites to validate a set of hypotheses that have been carefully selected to demonstrate each product’s business value and differentiation against its competitors.

The post GigaOm Benchmark: Achieving Cyber Resilience with Commvault Cloud Cleanroom Recovery appeared first on Gigaom.

]]>
GigaOm Radar for Unstructured Data Management (UDM) https://gigaom.com/report/gigaom-radar-for-unstructured-data-management-udm/ Tue, 19 Mar 2024 15:00:15 +0000 https://gigaom.com/?post_type=go-report&p=1029126/ The proliferation of unstructured data—emails, log files, images, and videos—within organizational data stores and isolated data silos poses a growing challenge for

The post GigaOm Radar for Unstructured Data Management (UDM) appeared first on Gigaom.

]]>
The proliferation of unstructured data—emails, log files, images, and videos—within organizational data stores and isolated data silos poses a growing challenge for management. The sheer volume, inaccessibility, and fragmented nature of all this data obscures its vast potential, leaving it as an unused asset within these digital repositories. However, this landscape is changing. As data ecosystems flourish, sophisticated unstructured data management (UDM) tools are emerging, poised to unlock the vast potential of dormant data and propel organizations into a data-driven future.

A new wave of innovative technologies, like generative AI and retrieval-augmented generation (RAG), offers the key to unlocking this hidden potential, transforming a previously untapped resource into a strategic asset. These advancements enable organizations to unearth deeper insights from complex data and generate synthetic data for enhanced training and analysis.

This is where UDM enters the equation. UDM solutions go beyond mere data storage, empowering a range of professionals to extract vital value from their previously untapped data assets. Through a powerful set of features, UDM transforms once-amorphous data into readily searchable and interpretable assets, empowering informed decision-making across the organization:

  • Robust metadata management: UDM enriches unstructured data with descriptive tags and contextual information, unlocking its inherent structure and making it readily searchable and interpretable. Imagine data transformed from cryptic files into intuitive, categorized collections, available to be navigated by data scientists, marketers, and compliance officers alike.
  • User-defined tags: Stakeholders personalize data categorization with custom tags, tailoring it to their specific needs and workflows. This granular control allows deeper exploration and targeted analysis, accelerating the discovery of valuable insights hidden within the data. No longer a vast, uncharted ocean, the data sprawl becomes a meticulously organized landscape where relevant nuggets of information are readily unearthed and put to work.
  • Rapid retrieval: Powerful search engines integrated with UDM solutions leverage the enriched metadata and custom tags to enable lightning-fast data retrieval across the entire data estate. No matter how vast or dispersed it might be, finding the precise data you need becomes effortless, streamlining workflows and maximizing data use. Imagine traversing that data landscape, being able to pinpoint the exact needle in the haystack with intuitive precision.

These are just some of the ways UDM solutions empower organizations to harness the full potential of their unstructured data. By combining robust metadata management, flexible custom tagging, and lightning-fast data retrieval, UDM unlocks a new era of data-driven decision-making and competitive advantage. Enhanced data governance, facilitated by precise labeling and intuitive organization, ensures seamless compliance and risk mitigation. Additionally, the ability to rapidly locate data across the data estate empowers informed decision-making and fuels agile responses to market shifts and opportunities.

Strategic deployment of UDM solutions grants organizations full visibility into their data, informing the development of cost-effective roadmaps that maximize ROI on data storage. Imagine shedding the limitations of data silos and inaccessible formats, and gaining unfettered access to your data landscape regardless of its complexity. By harnessing the power of UDM, you can build a strategic data roadmap, enabling interventions that optimize costs, bolster security and compliance, deliver enhanced services, and unlock the immense potential of data reusability.

This is our fourth year evaluating the UDM space in the context of our Key Criteria and Radar reports. This report builds on our previous analysis and considers how the market has evolved over the last year.

This report marks a change in our analysis of UDM, combining the insights from previous reports that looked at infrastructure and business use cases separately. We now recognize the need for a unified understanding that bridges the gap between technical capabilities and real-world business applications. Previously, the infrastructure report delved into the nuts and bolts of UDM solutions, exploring aspects like data tiering, lifecycle management, and search functions. The business report, in contrast, examined how UDM tackles challenges like compliance, security, and big data analytics. However, treating these areas in isolation can mask the powerful synergy between them.

By merging these perspectives, we aim to offer a more comprehensive and actionable view of UDM. Instead of siloed technical details and specific business cases, this report explores how infrastructure features directly translate into tangible business benefits. We’ll analyze how effective data management at the infrastructure level empowers organizations to achieve key business objectives, such as enhanced security, streamlined compliance, and data-driven decision-making. We also look at how AI/ML is accelerating enhancements to the landscape.

This GigaOm Radar report examines 24 of the top UDM solutions and compares offerings against the capabilities (table stakes, key features, and emerging features) and nonfunctional requirements (business criteria) outlined in the companion Key Criteria report. Together, these reports provide an overview of the market, identify leading UDM offerings, and help decision-makers evaluate these solutions so they can make a more informed investment decision.

GIGAOM KEY CRITERIA AND RADAR REPORTS

The GigaOm Key Criteria report provides a detailed decision framework for IT and executive leadership assessing enterprise technologies. Each report defines relevant functional and nonfunctional aspects of solutions in a sector. The Key Criteria report informs the GigaOm Radar report, which provides a forward-looking assessment of vendor solutions in the sector.

The post GigaOm Radar for Unstructured Data Management (UDM) appeared first on Gigaom.

]]>
GigaOm Key Criteria for Evaluating Unstructured Data Management (UDM) Solutions https://gigaom.com/report/gigaom-key-criteria-for-evaluating-unstructured-data-management-udm-solutions/ Wed, 06 Mar 2024 18:48:00 +0000 https://gigaom.com/?post_type=go-report&p=1028810/ Unstructured data—emails, images, videos, documents—now comprises 80% of all enterprise data. This data holds rich insights, but its sheer volume and lack

The post GigaOm Key Criteria for Evaluating Unstructured Data Management (UDM) Solutions appeared first on Gigaom.

]]>
Unstructured data—emails, images, videos, documents—now comprises 80% of all enterprise data. This data holds rich insights, but its sheer volume and lack of structure pose significant management challenges. Unstructured data management (UDM) solutions are emerging as the answer, providing organizations with tools to store, organize, analyze, and extract value from this data gold mine.

When evaluating UDM solutions, prospective customers should consider the following:

  • Data classification and tagging, to automatically categorize and tag data for easier organization and search.
  • Insights and analytics, for extracting meaningful insights from diverse data formats.
  • Security and compliance, for providing robust security and compliance with relevant regulations. Robust security features and compliance certifications are essential to protect sensitive data and adhere to industry regulations.
  • Scalability and performance, for handling large data volumes efficiently and dealing with future growth. Evaluate processing speed and query latency to ensure efficient analysis and avoid bottlenecks.
  • Integration and automation, to enable seamless integration with existing IT infrastructure and automated workflows for streamlined data management.
  • Openness and APIs, as open APIs enable customization and integration with other tools and applications, enhancing flexibility and future-proofing the solution.

Business Imperative
C-suite executives are under pressure to gain insights from all data, not just structured formats. UDM solutions can unlock hidden potential in a number of ways:

  • Improved decision-making results from the ability to analyze customer behavior, identify operational inefficiencies, and uncover market trends, all fueled by unstructured data insights.
  • Enhanced innovation stems from R&D efforts, driven by gathering knowledge from research documents, internal communications, and competitor analysis.
  • Reduced costs result from the ability to optimize storage usage, identify and delete redundant data, and automate data lifecycle management for significant cost savings.
  • Increased compliance is derived from the ability to ensure data governance and regulatory compliance by effectively managing sensitive information across unstructured data repositories.

Sector Adoption Score
To help executives and decision-makers assess the potential impact and value of a UDM solution deployment to the business, this GigaOm Key Criteria report provides a structured assessment of the sector across five factors: benefit, maturity, urgency, impact, and effort. By scoring each factor based on how strongly it compels or deters adoption of a UDM solution, we provide an overall Sector Adoption Score (Figure 1) of 3.6 out of 5, with 5 indicating the strongest possible recommendation to adopt. This indicates that a UDM solution is a credible candidate for deployment and worthy of thoughtful consideration.

The factors contributing to the Sector Adoption Score for UDM are explained in more detail in the Sector Brief section that follows.

Key Criteria for Evaluating UDM Solutions

Sector Adoption Score

1.0