SlideShare ist ein Scribd-Unternehmen logo
1 von 49
Downloaden Sie, um offline zu lesen
TM
Enterprise Strategy Group | Getting to the bigger truth.ℱ
Radware ADC Survey
Final Results
Jon Oltsik, Senior Principal Analyst
Project Overview
2© 2014 by The Enterprise Strategy Group, Inc.
‱ 243 completed online surveys with IT professionals responsible for
evaluating, purchasing, and managing campus and data center networking
technologies for their organization
‱ Enterprise organizations (defined as organizations with 1,000 employees
or more) with $500 million or more in annual revenue
‱ Geographic scope: North America
‱ Multiple industry verticals including financial, information technology,
business services, manufacturing and retail
Demographics
3© 2014 by The Enterprise Strategy Group, Inc.
Respondents’ Responsibility for Making Networking
Technology Products and Services Purchasing Decisions
4© 2014 by The Enterprise Strategy Group, Inc.
I make/approve purchase
decisions, 85%
I influence or provide input
on purchase decisions,
15%
To what degree are you responsible for making purchase decisions related to networking
products and services for your organization? (Percent of respondents, N=243)
Respondents’ Familiarity/Involvement with Organization’s Load
Balancer or ADC Deployments
5© 2014 by The Enterprise Strategy Group, Inc.
I have a high level of
knowledge/familiarity, 73%
I have a good level of
knowledge/familiarity, 27%
To what extent are you personally familiar and/or involved with your organization’s load balancer or
application delivery controller (ADC) deployments? (Percent of respondents, N=243)
Respondents’ Current Responsibility
6© 2014 by The Enterprise Strategy Group, Inc.
Senior IT management
(e.g., CIO, VP of IT, Director
of IT, etc.), 65%
IT management, 28%
IT architecture/planning,
3%
IT Operations, 3%
IT staff, 1%
Which of the following best describes your current responsibility within your organization? (Percent
of respondents, N=243)
Respondents by Number of Employees Worldwide
7© 2014 by The Enterprise Strategy Group, Inc.
1,000 to 2,499, 14%
2,500 to 4,999, 26%
5,000 to 9,999, 19%
10,000 to 19,999, 18%
20,000 or more, 23%
How many total employees does your organization have worldwide? (Percent of respondents,
N=243)
Respondents by Industry
8© 2014 by The Enterprise Strategy Group, Inc.
Information Technology,
34%
Manufacturing, 14%
Financial (banking,
securities, insurance), 12%
Retail/Wholesale, 11%
Health Care, 7%
Business Services
(accounting, consulting,
legal, etc.), 5%
Communications & Media,
5%
Government
(Federal/National,
State/Province/Local), 2%
Other, 10%
What is your organization’s primary industry? (Percent of respondents, N=243)
Respondents by Annual Revenue
9© 2014 by The Enterprise Strategy Group, Inc.
13%
20%
21%
16%
19%
9%
1%
0%
5%
10%
15%
20%
25%
$500 million to
$749.999 million
$750 million to
$999.999 million
$1 billion to $4.999
billion
$5 billion to $9.999
billion
$10 billion to $19.999
billion
$20 billion or more Not applicable (e.g.,
public sector, non-
profit)
What is your organization’s total annual revenue ($US)? (Percent of respondents, N=243)
General IT Environment
10© 2014 by The Enterprise Strategy Group, Inc.
Total Number of Physical x86 Servers Supported by IT
Organization
11© 2014 by The Enterprise Strategy Group, Inc.
3%
12%
11%
23%
14%
20%
16%
0%
5%
10%
15%
20%
25%
100 or less 101 to 250 251 to 500 501 to 1,000 1,001 to 2,500 2,501 to 5,000 More than 5,000
Approximately how many total physical x86 servers (whether production or test/development) are
supported by your IT organization? (Percent of respondents, N=243)
Total Number of Virtual Machines Deployed
12© 2014 by The Enterprise Strategy Group, Inc.
2%
5%
6%
9%
14%
16% 16%
17%
16%
0%
2%
4%
6%
8%
10%
12%
14%
16%
18%
25 or less 26 to 50 51 to 100 101 to 250 251 to 500 501 to 1,000 1,001 to 2,500 2,501 to 5,000 More than
5,000
Approximately how many total virtual machines (whether production or test/development) are
currently deployed in your organization? (Percent of respondents, N=243)
Most Important IT Priorities Over the Next 12 Months
13© 2014 by The Enterprise Strategy Group, Inc.
7%
7%
8%
8%
9%
9%
9%
10%
10%
10%
11%
12%
12%
12%
13%
13%
13%
14%
16%
20%
21%
22%
23%
0% 5% 10% 15% 20% 25%
Use platform-as-a-service (PaaS) for application development
Deploying applications on or for new mobile devices
Business continuity/disaster recovery programs
Deploy application- or workload-specific systems/appliances
Providing employees access to pre-approved repository of business applications
Data center consolidation
Deploy integrated computing platform
Reduce data center power and cooling requirements
Major application deployments or upgrades
Regulatory compliance initiatives
Desktop virtualization
Business intelligence/data analytics initiatives
Bring-your-own-device (BYOD) policy
Improve collaboration capabilities
Major database deployments or upgrades
Applications delivered via software-as-a-service (SaaS) model
Mobile workforce enablement
Manage data growth
Improve data backup and recovery
Increased use of server virtualization
Building a “private cloud” infrastructure
Information security initiatives
Use cloud infrastructure services
Which of the following would you consider to be your organization’s most important IT priorities over the next 12
months? (Percent of respondents, N=243, three responses accepted)
Strategic Initiative to Automate Provisioning of IT Infrastructure
Resources
14© 2014 by The Enterprise Strategy Group, Inc.
Yes, for all of our IT
infrastructure resources,
70%
Yes, for certain IT
infrastructure resources,
28%
No, 2%
Does your organization have a strategic initiative to automate the provisioning of IT infrastructure
resources? (Percent of respondents, N=243)
Does Strategic Initiative to Automate Provisioning of IT
Infrastructure Resources Include Network Operations?
15© 2014 by The Enterprise Strategy Group, Inc.
Yes, 90%
No, 10%
Does your organization’s strategic initiative to automate the provisioning of IT infrastructure include
network operations processes? (Percent of respondents, N=67)
Most Common Challenges Meeting Application SLAs
16© 2014 by The Enterprise Strategy Group, Inc.
2%
22%
23%
28%
28%
28%
30%
32%
33%
39%
0% 5% 10% 15% 20% 25% 30% 35% 40% 45%
No problems
Allocating the right equipment for application development/testing
Deployment/upgrade project not completed within budget
Performance problems
Determining proper security policies
Deployment/upgrade project not completed on time
Infrastructure problems
Application compatibility problems
Allocating the right IT staff resources to meet project schedules
Security problems
What are the most common challenges encountered in terms of meeting application SLAs? (Percent of
respondents, N=243, three respondents accepted)
Most Common Network Challenges When Deploying or
Upgrading an Application
17© 2014 by The Enterprise Strategy Group, Inc.
31%
35%
35%
41%
42%
46%
0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50%
Not enough capacity
Lacked ability to rapidly scale
Not enough security for multi-tenant environment
Length of time to provision network services
Lacking flexibility to support virtual environment
Latency in the network
What are the most common network challenges your organization encounters when deploying or
upgrading an application? (Percent of respondents, N=243, three responses accepted)
ADC Environment
18© 2014 by The Enterprise Strategy Group, Inc.
Total Number of Applications Supported Today and Number of
Applications Supported with ADC Technology Today
19© 2014 by The Enterprise Strategy Group, Inc.
2%
12%
21%
23% 23%
18%
0%
12%
18%
27%
21%
12%
8%
2%
0%
5%
10%
15%
20%
25%
30%
Less than 50 50 to 99 100 to 249 250 to 499 500 to 999 1,000 or more Don’t know
Approximately how many total applications does your organization support today? Approximately how
many of these applications does your organization support with ADC technology today? (Percent of
respondents, N=243)
Total applications supported Applications supported with ADC technology
Application Types Currently Supported with ADC Technology
20© 2014 by The Enterprise Strategy Group, Inc.
14%
27%
28%
30%
31%
35%
35%
37%
37%
40%
42%
42%
43%
44%
50%
0% 10% 20% 30% 40% 50% 60%
Video/multimedia
Supply chain management
Content management/document management
Engineering/CAD/CAM
Industry-specific applications
Accounting/financial
e-Commerce
Internet/e-mail marketing
Project management
Collaboration/file sharing
Human resources
E-mail
CRM/SFA
Web applications
Business analytics
To the best of your knowledge, which of the following application types are currently supported with
ADC technology? (Percent of respondents, N=243, multiple responses accepted)
Total Number of ADCs Deployed
21© 2014 by The Enterprise Strategy Group, Inc.
3%
10%
35%
49%
2%
0%
10%
20%
30%
40%
50%
60%
1 to 5 6 to 10 11 to 20 21 to 50 More than 50
Approximately how many total ADCs does your organization have deployed? (Percent of
respondents, N=243)
How Total Number of ADCs Deployed Will Change Over the
Next 36 Months
22© 2014 by The Enterprise Strategy Group, Inc.
31%
51%
16%
2%
0% 1%
0%
10%
20%
30%
40%
50%
60%
Increase substantially Increase somewhat Remain about the
same
Decrease somewhat Decrease substantially Don't know
How will your organization’s total number of ADCs deployed change – if at all – over the next 36
months? (Percent of respondents, N=243)
Form(s) of ADC Deployments
23© 2014 by The Enterprise Strategy Group, Inc.
Deployed as physical
appliances only, 17%
Deployed as virtual
appliances only, 17%Deployed as both physical
and virtual appliances,
66%
In what form(s) are your organization’s ADCs deployed? (Percent of respondents, N=243)
Factors that Drove Virtual ADC Appliance Deployment
24© 2014 by The Enterprise Strategy Group, Inc.
38%
46%
48%
48%
49%
53%
0% 10% 20% 30% 40% 50% 60%
Virtual ADCs are cheaper to purchase
Virtual ADCs let us align security requirements with individual
applications
Virtual ADCs can be mapped to a single application for ease of
deployment and operations
Virtual ADCs can be provisioned easily and in the same fashion as
virtual workloads
Virtual ADCs can be customized for specific requirements in multi-
tenant environments
Virtual ADCs let us align ADC processing power with the application
performance requirements of individual applications
Which of the following factors drove your organization to deploy virtual ADC appliances? (Percent of
respondents, N=201, multiple responses accepted)
Percentage Breakdown of Physical vs. Virtual ADCs: Today and
24 Months From Now
25© 2014 by The Enterprise Strategy Group, Inc.
11%
9%
20%
26%
17%
8%
6%
3%
1% 0%
8%
16%
14%
6%
23%
13%
8% 9%
4%
1%
0%
5%
10%
15%
20%
25%
30%
90% physical,
10% virtual
80% physical,
20% virtual
70% physical,
30% virtual
60% physical,
40% virtual
50% physical,
50% virtual
40% physical,
60% virtual
30% physical,
70% virtual
20% physical,
80% virtual
10% physical,
90% virtual
Don’t know
What is the approximate percentage breakdown of your organization’s ADCs in terms of physical vs.
virtual appliances today? How do you expect this to change – if at all – over the next 24 months?
(Percent of respondents, N=160)
Today 24 months from now
Benefits Realized as a Result of Deploying ADC Technology
26© 2014 by The Enterprise Strategy Group, Inc.
29%
30%
30%
31%
34%
34%
35%
36%
44%
47%
49%
0% 10% 20% 30% 40% 50% 60%
Decreased productivity loss
Faster time to market with applications
Improved business reputation
Ability to meet stringent SLAs
Reduced latency
Increased revenue
Greater levels of protection
Enhanced security posture
Better access to applications
Improved response times
Higher levels of availability
As a result of deploying ADC technology, what benefits has your organization realized? (Percent of
respondents, N=243, multiple responses accepted)
Biggest Challenges Meeting Application SLAs From an ADC
Perspective
27© 2014 by The Enterprise Strategy Group, Inc.
19%
23%
23%
23%
24%
24%
26%
27%
29%
30%
0% 5% 10% 15% 20% 25% 30% 35%
Lack of skills to maximize benefits of ADC when deploying
new applications
Transition from test/development to production
environment requires changes
Lacking flexibility to support virtual environment
Lacking ability to rapidly scale
Time to tune ADC to application
Monitoring status of ADC activities
Length of time to provision ADC services
Difficult to estimate capacity requirements
Determining proper security policies to be enforced on
ADC
Availability of resources
From an ADC perspective, what are the biggest challenges your organization encounters in terms of
meeting application SLAs? (Percent of respondents, N=243, three responses accepted)
How Use of ADC Technology Helps to Accelerate Deployment or
Upgrade of Applications
28© 2014 by The Enterprise Strategy Group, Inc.
32%
38%
42%
43%
45%
47%
47%
0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50%
Provides DevOps capabilities which helps better manage application
utilization
Increases level of orchestration (i.e., ability to leverage ADC-based
software for management tasks)
Serves as technology bridge between network and application
teams
Enables faster provisioning
Offers the ability to consolidate security services on an ADC that
might normally require several security systems/appliances
Delivers greater scalability and flexibility
Increases level of automation (i.e., ability to use ADCs to automate
manual processes)
How does the use of ADC technology help to accelerate the deployment or upgrade process for
applications? (Percent of respondents, N=243, multiple responses accepted)
Length of Time Needed to Provision ADC Services for a New
Application
29© 2014 by The Enterprise Strategy Group, Inc.
1%
13%
22%
21% 21%
11%
9%
1%
5%
19%
24%
22%
13%
7% 7%
2%
0%
5%
10%
15%
20%
25%
30%
Less than 1
minute
1 to 10 minutes 11 to 30
minutes
31 to 59
minutes
1 to 2 hours 3 to 4 hours More than 4
hours
Don’t know
How long does it take to provision ADC services for a new application? (Percent of respondents)
Physical ADC (N=202) Virtual ADC (N=201)
Number of Applications Run Over a Single ADC Appliance
30© 2014 by The Enterprise Strategy Group, Inc.
0%
14%
36%
34%
15%
0%
5%
10%
15%
20%
25%
30%
35%
40%
1 2 to 5 6 to 10 11 to 20 More than 20
On average, approximately how many applications does your organization typically run over a single
ADC appliance? (Percent of respondents, N=243)
ADC Features/Capabilities Currently Utilized
31© 2014 by The Enterprise Strategy Group, Inc.
1%
23%
24%
29%
30%
30%
30%
33%
35%
37%
37%
39%
43%
45%
0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50%
We only use simple load balancing capabilities
SSL offload
Content transformation/rewrite
TCP connection multiplexing
Single sign-on
Application specific acceleration
Multi-tenancy
Compression
Application performance monitoring
Web content optimization
Caching
Web Application Firewall (WAF)
Programmable interfaces
Network level security
Which of the following additional ADC features/capabilities does your organization currently utilize?
(Percent of respondents, N=243, multiple responses accepted)
Additional ADC Features/Capabilities Organizations Expect to
Utilize Within 36 Months
32© 2014 by The Enterprise Strategy Group, Inc.
2%
19%
19%
19%
22%
22%
23%
23%
23%
23%
24%
25%
26%
28%
0% 5% 10% 15% 20% 25% 30%
We expect to only use simple load balancing capabilities
Programmable interfaces
Network level security
Caching
Web Application Firewall (WAF)
Single sign-on
Compression
SSL offload
TCP connection multiplexing
Content transformation/rewrite
Multi-tenancy
Application specific acceleration
Web content optimization
Application performance monitoring
Which of the following additional ADC features/capabilities do you expect that your organization will
utilize within 36 months? (Percent of respondents, N=243, multiple responses accepted)
Running Applications in a Multi-Tenant Manner
33© 2014 by The Enterprise Strategy Group, Inc.
Yes, 72%
No, 26%
Don't know, 2%
Are any of your organization’s applications run in a multi-tenant manner (i.e., common application
used by different organizations, groups, etc.)? (Percent of respondents, N=243)
Support of Applications Run in Multi-Tenant Manner by ADCs
34© 2014 by The Enterprise Strategy Group, Inc.
Yes, 95%
No, 5%
Don't know, 1%
Are any of the applications supported by your organization’s ADCs run in multi-tenant manner?
(Percent of respondents, N=175)
Challenges When Deploying ADC Services to Support Multi-
Tenant Application(s)
35© 2014 by The Enterprise Strategy Group, Inc.
19%
19%
20%
23%
24%
27%
28%
29%
30%
35%
0% 5% 10% 15% 20% 25% 30% 35% 40%
Not enough automation
Not enough capacity in physical device
Not enough security for multi-tenant environment
Length of time to provision ADC services
Lacking flexibility to support virtual environment
Cyber-attacks affect neighboring applications
Lacking ability to rapidly scale
Performance issues due to shared tenant environment
Operations challenges managing multiple applications across multiple
tenants that my include complex administration and security processes
Configuration issues affecting the underlying device
What are the biggest challenges your organization encounters when deploying ADC services in support of a
multi-tenant application? (Percent of respondents, N=166, three responses accepted)
Number of Clients/Tenants Sharing a Single ADC Appliance
36© 2014 by The Enterprise Strategy Group, Inc.
1%
17%
24%
39%
19%
0%
5%
10%
15%
20%
25%
30%
35%
40%
45%
1 2 to 5 6 to 10 11 to 20 More than 20
On average, approximately how many clients/tenants share a single ADC appliance? (Percent of
respondents, N=166)
Network Security and ADC
Technology
37© 2014 by The Enterprise Strategy Group, Inc.
Reliance on ADCs to Provide Security Capabilities/Functionality
38© 2014 by The Enterprise Strategy Group, Inc.
We leverage the security
capabilities/functionality of
all our ADCs, 49%
We leverage the security
capabilities/functionality of
only the ADCs supporting
applications with sensitive
data, 44%
We do not leverage the
security
capabilities/functionality of
any of our ADCs, 7%
To what extent does your organization currently rely on its ADCs to provide security
capabilities/functionality? (Percent of respondents, N=243)
Expected Change in Reliance of ADC-Provided Security Capabilities/Functionality
with Respect to the Number of Applications Protected
39© 2014 by The Enterprise Strategy Group, Inc.
Significant increase, 20%
Increase, 56%
No change, 22%
Decrease, 1%
Going forward, how do you expect your organization’s reliance on ADC-provided security
capabilities/functionality technology to change in terms of the number of applications protected?
(Percent of respondents, N=243)
Primary Method Employed to Deliver Network Security
Services to Protect Data Center-Resident Business Applications
40© 2014 by The Enterprise Strategy Group, Inc.
24%
24%
26%
27%
27%
28%
28%
30%
35%
37%
33%
27%
31%
30%
32%
33%
27%
24%
26%
30%
26%
30%
23%
23%
12%
13%
13%
16%
12%
12%
16%
14%
2%
1%
2%
1%
3%
1%
2%
0% 20% 40% 60% 80% 100%
SSL acceleration
Integration with other security tools (e.g., SIM, log management, etc.)
WAF (web application firewall)
Web authentication gateway
DDoS defenses
Secure network segmentation
IPS/IDS (intrusion prevention/detection system)
Network firewall
What is the primary method your organization employs to deliver network security services as it
relates to protecting its data center-resident business applications? (Percent of respondents, N=243)
At the network perimeter on a purpose-built network security device
On a physical ADC
On a virtual ADC
On a general purpose, data center-resident server
Likelihood of a Malicious Attack Penetrating Organization’s
Network Perimeter with ADCs Being Last Line of Defense
41© 2014 by The Enterprise Strategy Group, Inc.
Extremely likely, 28%
Likely, 30%
Somewhat likely, 25%
Not at all likely, 16%
Don’t know, 1%
How likely would it be for some type of malicious attack to penetrate your organization’s network
perimeter, leaving your ADC(s) as the last line of defense in terms of protecting critical business
applications? (Percent of respondents, N=243)
Expected Impact of a Network Perimeter Infiltration
42© 2014 by The Enterprise Strategy Group, Inc.
29%
39%
42%
45%
48%
51%
0% 10% 20% 30% 40% 50% 60%
Compromise of DMZ-based servers/systems
Application performance degradation
Disruption of application services
Network performance degradation
Disruption of network services
Data breach
If your organization was to experience this type of network perimeter infiltration, what would be the
expected impact? (Percent of respondents, N=243, multiple responses accepted)
Manner in Which Organizations Manage and Operate Network
Security Processes/Technology
43© 2014 by The Enterprise Strategy Group, Inc.
39% 38%
14%
4% 5%
0%
5%
10%
15%
20%
25%
30%
35%
40%
45%
There is a dedicated group
tasked with network security
management and operations
Network security
management and operations
is done cooperatively by the
IT security and networking
teams, but we are currently
creating a dedicated group
for this function
Network security
management and operations
is done cooperatively by the
IT security and networking
teams, but we plan on
creating a dedicated group
for this function within the
next 12 to 24 months
Network security
management and operations
is done cooperatively by the
IT security and networking
teams, but we are interested
in creating a dedicated group
for this function sometime in
the future
Network security
management and operations
is done cooperatively by the
IT security and networking
teams and this will continue
in the future
Which of the following best characterizes the manner in which your organization manages and
operates network security processes and technology? (Percent of respondents, N=243)
Day-to-Day Collaboration on Network Security Between IT
Security and Networking Groups
44© 2014 by The Enterprise Strategy Group, Inc.
Very good, works most of
the time, 35%
Good, works some but not
all of the time, 51%
Fair, works okay but there
are known problems, 13%
Poor, doesn’t work well as
there are many known
problems, 1%
How would you characterize the day-to-day collaboration on network security between the IT security
and networking groups? (Percent of respondents, N=149)
Organizational Challenges Between Security and Network Team
with Respect to Network Security
45© 2014 by The Enterprise Strategy Group, Inc.
3%
18%
18%
21%
22%
23%
32%
33%
34%
35%
0% 5% 10% 15% 20% 25% 30% 35% 40%
We have not experienced any challenges
Networking team does not keep the security team apprised of new networking
developments
Workflow issues related to the timeliness of collaborative tasks
Redundant processes between the two groups
Security team does not keep the networking team apprised of new security
developments
Lack of clarity about which group is responsible for one or more network security
process
Communications issues related to collaborative tasks
It can be difficult to get an accurate status of network security because the two
groups maintain separate tools and reports
The two groups are measured and compensated on conflicting goals
Issues related to the chain of command that is ultimately responsible for network
security and collaboration between the two groups
You indicated that your organization manages and operates network security processes and technologies as a collaborative
effort between the security and networking teams. Which of the following organizational challenges between these two IT
groups in relation to network security have you experienced? (Percent of respondents, N=149, three responses accepted)
Division of Labor Between Security and Networking Teams
46© 2014 by The Enterprise Strategy Group, Inc.
36%
34%
29%
38%
34%
32%
38%
36%
46%
44%
52%
37%
44%
44%
46%
47%
17%
21%
18%
23%
21%
22%
15%
16%
1%
1%
1%
2%
1%
1%
1%
1%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Creating network security policies that align with business processes
Defining network security technology requirements
Selecting and purchasing network security technologies
Deploying network security technologies
Day-to-day operations of network security technologies
Monitoring/analyzing network traffic for anomalous/suspicious traffic
Altering network security controls in response to new threat intelligence
Tracking changes and innovation in network security technology
The following question is related to the division of labor between the security and networking teams
at your organization. Please make a selection in each row that reflects which group is most
responsible for each task. (Percent of respondents, N=149)
Primarily owned by the security team Collaboratively owned by the security and networking teams
Primarily owned by the networking team Don’t know
Employment of Network Security Architects
47© 2014 by The Enterprise Strategy Group, Inc.
Yes, and this person(s)
resides in the information
security group, 44%
Yes, and this person(s)
resides in the networking
group, 26%
Yes, and this person(s)
spans the information
security and networking
groups, 12%
Yes, this is part of the
responsibility of an overall
IT
architecture/engineering
team, 14%
No, 5%
Does your organization employ a person(s) that could be considered a network security
architect(s)? (Percent of respondents, N=243)
Would Having More Security Features Integrated into ADC
Solution Make Networking Group More Self-Reliant/Sufficient?
48© 2014 by The Enterprise Strategy Group, Inc.
Yes, 84%
No, 12%
Don't know, 4%
Do you believe that having more security features integrated into ADC solutions could make the
networking group more self-reliant/sufficient from a security perspective? (Percent of respondents,
N=243)
TM
Thank You
Please contact us for more information
Enterprise Strategy Group | Getting to the bigger truth.ℱ
Jon Oltsik, Senior Principal Analyst
jon.oltsik@esg-global.com
508.381.5166

Weitere Àhnliche Inhalte

Was ist angesagt?

Scalar cloud study2016_slideshare
Scalar cloud study2016_slideshareScalar cloud study2016_slideshare
Scalar cloud study2016_slideshareScalar Decisions
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Ricardo Resnik
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Decisions
 
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...TechSoup
 
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply ChainSFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply ChainSouth Tyrol Free Software Conference
 
Hexis Cybersecurity Mission Possible: Taming Rogue Ghost Alerts
Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost AlertsHexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts
Hexis Cybersecurity Mission Possible: Taming Rogue Ghost AlertsHexis Cyber Solutions
 
The top challenges to expect in network security in 2019 survey report
The top challenges to expect in network security in 2019  survey report The top challenges to expect in network security in 2019  survey report
The top challenges to expect in network security in 2019 survey report Bricata, Inc.
 
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...centralohioissa
 
Securing Access to PeopleSoft ERP with Duo Security and GreyHeller
Securing Access to PeopleSoft ERP with Duo Security and GreyHellerSecuring Access to PeopleSoft ERP with Duo Security and GreyHeller
Securing Access to PeopleSoft ERP with Duo Security and GreyHellerDuo Security
 
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...centralohioissa
 
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the CloudLisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloudcentralohioissa
 
Stay One Step Ahead of Cyber Threats - Check Point
Stay One Step Ahead of Cyber Threats - Check PointStay One Step Ahead of Cyber Threats - Check Point
Stay One Step Ahead of Cyber Threats - Check PointMarcoTechnologies
 
State of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers MindsetState of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers MindsetCrowdStrike
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Designcentralohioissa
 
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...Lumension
 
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016Tudor Damian
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Security
 
Service Organizational Control (SOC 2) Compliance - Kloudlearn
Service Organizational Control  (SOC 2) Compliance - KloudlearnService Organizational Control  (SOC 2) Compliance - Kloudlearn
Service Organizational Control (SOC 2) Compliance - KloudlearnKloudLearn
 

Was ist angesagt? (20)

Scalar cloud study2016_slideshare
Scalar cloud study2016_slideshareScalar cloud study2016_slideshare
Scalar cloud study2016_slideshare
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
 
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...
 
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply ChainSFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
 
Hexis Cybersecurity Mission Possible: Taming Rogue Ghost Alerts
Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost AlertsHexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts
Hexis Cybersecurity Mission Possible: Taming Rogue Ghost Alerts
 
The top challenges to expect in network security in 2019 survey report
The top challenges to expect in network security in 2019  survey report The top challenges to expect in network security in 2019  survey report
The top challenges to expect in network security in 2019 survey report
 
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
 
Securing Access to PeopleSoft ERP with Duo Security and GreyHeller
Securing Access to PeopleSoft ERP with Duo Security and GreyHellerSecuring Access to PeopleSoft ERP with Duo Security and GreyHeller
Securing Access to PeopleSoft ERP with Duo Security and GreyHeller
 
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
 
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the CloudLisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloud
 
Stay One Step Ahead of Cyber Threats - Check Point
Stay One Step Ahead of Cyber Threats - Check PointStay One Step Ahead of Cyber Threats - Check Point
Stay One Step Ahead of Cyber Threats - Check Point
 
Endpoint Security
Endpoint SecurityEndpoint Security
Endpoint Security
 
State of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers MindsetState of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers Mindset
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Design
 
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
 
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
 
Service Organizational Control (SOC 2) Compliance - Kloudlearn
Service Organizational Control  (SOC 2) Compliance - KloudlearnService Organizational Control  (SOC 2) Compliance - Kloudlearn
Service Organizational Control (SOC 2) Compliance - Kloudlearn
 

Andere mochten auch

Why Agile is Failing in Large Enterprises And What You Can Do About It
Why Agile is Failing in Large Enterprises And What You Can Do About ItWhy Agile is Failing in Large Enterprises And What You Can Do About It
Why Agile is Failing in Large Enterprises And What You Can Do About Itwjperez0629
 
The Anatomy of an Agile Organization
The Anatomy of an Agile OrganizationThe Anatomy of an Agile Organization
The Anatomy of an Agile OrganizationAndrea Tomasini
 
Agile organization design workshop
Agile organization design workshopAgile organization design workshop
Agile organization design workshopAHAConference
 
A business agility primer
A business agility primerA business agility primer
A business agility primerEvan Leybourn
 
Enterprise Agile Transformation Strategies
Enterprise Agile Transformation StrategiesEnterprise Agile Transformation Strategies
Enterprise Agile Transformation StrategiesMike Cottmeyer
 
Case Study: OI SA’s Journey on How to Structure Agile Testing in a Bimodal IT...
Case Study: OI SA’s Journey on How to Structure Agile Testing in a Bimodal IT...Case Study: OI SA’s Journey on How to Structure Agile Testing in a Bimodal IT...
Case Study: OI SA’s Journey on How to Structure Agile Testing in a Bimodal IT...CA Technologies
 
IT Service Delivery Model Overview
IT Service Delivery Model OverviewIT Service Delivery Model Overview
IT Service Delivery Model OverviewMark Peacock
 

Andere mochten auch (7)

Why Agile is Failing in Large Enterprises And What You Can Do About It
Why Agile is Failing in Large Enterprises And What You Can Do About ItWhy Agile is Failing in Large Enterprises And What You Can Do About It
Why Agile is Failing in Large Enterprises And What You Can Do About It
 
The Anatomy of an Agile Organization
The Anatomy of an Agile OrganizationThe Anatomy of an Agile Organization
The Anatomy of an Agile Organization
 
Agile organization design workshop
Agile organization design workshopAgile organization design workshop
Agile organization design workshop
 
A business agility primer
A business agility primerA business agility primer
A business agility primer
 
Enterprise Agile Transformation Strategies
Enterprise Agile Transformation StrategiesEnterprise Agile Transformation Strategies
Enterprise Agile Transformation Strategies
 
Case Study: OI SA’s Journey on How to Structure Agile Testing in a Bimodal IT...
Case Study: OI SA’s Journey on How to Structure Agile Testing in a Bimodal IT...Case Study: OI SA’s Journey on How to Structure Agile Testing in a Bimodal IT...
Case Study: OI SA’s Journey on How to Structure Agile Testing in a Bimodal IT...
 
IT Service Delivery Model Overview
IT Service Delivery Model OverviewIT Service Delivery Model Overview
IT Service Delivery Model Overview
 

Ähnlich wie The Expanding Role and Importance of Application Delivery Controllers [Research by Radware and ESG]

SNG Minnesota - Motivating Broadband Utilization
SNG  Minnesota - Motivating Broadband UtilizationSNG  Minnesota - Motivating Broadband Utilization
SNG Minnesota - Motivating Broadband UtilizationAnn Treacy
 
EMA/Apica October 2016 Event: User Environment Management For Digital Transfo...
EMA/Apica October 2016 Event: User Environment Management For Digital Transfo...EMA/Apica October 2016 Event: User Environment Management For Digital Transfo...
EMA/Apica October 2016 Event: User Environment Management For Digital Transfo...Apica
 
MT108 On the Edge of Eminence:When Will Services Transform the System?
MT108 On the Edge of Eminence:When Will Services Transform the System?MT108 On the Edge of Eminence:When Will Services Transform the System?
MT108 On the Edge of Eminence:When Will Services Transform the System?Dell EMC World
 
SolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity SurveySolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity SurveySolarWinds
 
InvestmentNews 2015 Adviser Technology Study: Key Findings
InvestmentNews 2015 Adviser Technology Study: Key FindingsInvestmentNews 2015 Adviser Technology Study: Key Findings
InvestmentNews 2015 Adviser Technology Study: Key FindingsINResearch
 
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...SolarWinds
 
Federal Cloud Computing Report - Market Connections & General Dynamics Inform...
Federal Cloud Computing Report - Market Connections & General Dynamics Inform...Federal Cloud Computing Report - Market Connections & General Dynamics Inform...
Federal Cloud Computing Report - Market Connections & General Dynamics Inform...Market Connections, Inc.
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldNetskope
 
2014 Cloud Computing Survey
2014 Cloud Computing Survey2014 Cloud Computing Survey
2014 Cloud Computing SurveyIDG
 
2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdf2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdfIDG
 
State of Data Governance in 2021
State of Data Governance in 2021State of Data Governance in 2021
State of Data Governance in 2021DATAVERSITY
 
Optimizing DevOps Initiatives: The View from Both Sides of the DevOps Divide
Optimizing DevOps Initiatives: The View from Both Sides of the DevOps DivideOptimizing DevOps Initiatives: The View from Both Sides of the DevOps Divide
Optimizing DevOps Initiatives: The View from Both Sides of the DevOps DivideEnterprise Management Associates
 
Michael Curri: Bridging the Small Business Digital Divide Through Utilization...
Michael Curri: Bridging the Small Business Digital Divide Through Utilization...Michael Curri: Bridging the Small Business Digital Divide Through Utilization...
Michael Curri: Bridging the Small Business Digital Divide Through Utilization...KC Digital Drive
 
Insight 2020 Technology Report: IT Trends for Midmarket and Small Business
Insight 2020 Technology Report: IT Trends for Midmarket and Small BusinessInsight 2020 Technology Report: IT Trends for Midmarket and Small Business
Insight 2020 Technology Report: IT Trends for Midmarket and Small BusinessInsight
 
The Connected Business Survey: Improving Integration and Creating Connectivit...
The Connected Business Survey: Improving Integration and Creating Connectivit...The Connected Business Survey: Improving Integration and Creating Connectivit...
The Connected Business Survey: Improving Integration and Creating Connectivit...DellBoomi
 
2019 Intelligent Technology Index
2019 Intelligent Technology Index 2019 Intelligent Technology Index
2019 Intelligent Technology Index Insight
 

Ähnlich wie The Expanding Role and Importance of Application Delivery Controllers [Research by Radware and ESG] (20)

SNG Minnesota - Motivating Broadband Utilization
SNG  Minnesota - Motivating Broadband UtilizationSNG  Minnesota - Motivating Broadband Utilization
SNG Minnesota - Motivating Broadband Utilization
 
SaaS Data Protection
SaaS Data ProtectionSaaS Data Protection
SaaS Data Protection
 
EMA/Apica October 2016 Event: User Environment Management For Digital Transfo...
EMA/Apica October 2016 Event: User Environment Management For Digital Transfo...EMA/Apica October 2016 Event: User Environment Management For Digital Transfo...
EMA/Apica October 2016 Event: User Environment Management For Digital Transfo...
 
MT108 On the Edge of Eminence:When Will Services Transform the System?
MT108 On the Edge of Eminence:When Will Services Transform the System?MT108 On the Edge of Eminence:When Will Services Transform the System?
MT108 On the Edge of Eminence:When Will Services Transform the System?
 
SolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity SurveySolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity Survey
 
InvestmentNews 2015 Adviser Technology Study: Key Findings
InvestmentNews 2015 Adviser Technology Study: Key FindingsInvestmentNews 2015 Adviser Technology Study: Key Findings
InvestmentNews 2015 Adviser Technology Study: Key Findings
 
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
 
Federal Cloud Computing Report - Market Connections & General Dynamics Inform...
Federal Cloud Computing Report - Market Connections & General Dynamics Inform...Federal Cloud Computing Report - Market Connections & General Dynamics Inform...
Federal Cloud Computing Report - Market Connections & General Dynamics Inform...
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy World
 
2014 Cloud Computing Survey
2014 Cloud Computing Survey2014 Cloud Computing Survey
2014 Cloud Computing Survey
 
2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdf2023 Digital Business sample slides.pdf
2023 Digital Business sample slides.pdf
 
State of Data Governance in 2021
State of Data Governance in 2021State of Data Governance in 2021
State of Data Governance in 2021
 
Democratizing IT Automation in a Multi-Cloud World
Democratizing IT Automation in a Multi-Cloud WorldDemocratizing IT Automation in a Multi-Cloud World
Democratizing IT Automation in a Multi-Cloud World
 
Why Core IT Automation Matters to Your Customers
Why Core IT Automation Matters to Your Customers Why Core IT Automation Matters to Your Customers
Why Core IT Automation Matters to Your Customers
 
Optimizing DevOps Initiatives: The View from Both Sides of the DevOps Divide
Optimizing DevOps Initiatives: The View from Both Sides of the DevOps DivideOptimizing DevOps Initiatives: The View from Both Sides of the DevOps Divide
Optimizing DevOps Initiatives: The View from Both Sides of the DevOps Divide
 
Michael Curri: Bridging the Small Business Digital Divide Through Utilization...
Michael Curri: Bridging the Small Business Digital Divide Through Utilization...Michael Curri: Bridging the Small Business Digital Divide Through Utilization...
Michael Curri: Bridging the Small Business Digital Divide Through Utilization...
 
The Great Scheduler Migration
The Great Scheduler MigrationThe Great Scheduler Migration
The Great Scheduler Migration
 
Insight 2020 Technology Report: IT Trends for Midmarket and Small Business
Insight 2020 Technology Report: IT Trends for Midmarket and Small BusinessInsight 2020 Technology Report: IT Trends for Midmarket and Small Business
Insight 2020 Technology Report: IT Trends for Midmarket and Small Business
 
The Connected Business Survey: Improving Integration and Creating Connectivit...
The Connected Business Survey: Improving Integration and Creating Connectivit...The Connected Business Survey: Improving Integration and Creating Connectivit...
The Connected Business Survey: Improving Integration and Creating Connectivit...
 
2019 Intelligent Technology Index
2019 Intelligent Technology Index 2019 Intelligent Technology Index
2019 Intelligent Technology Index
 

Mehr von Radware

Cyber Security Through the Eyes of the C-Suite (Infographic)
Cyber Security Through the Eyes of the C-Suite (Infographic)Cyber Security Through the Eyes of the C-Suite (Infographic)
Cyber Security Through the Eyes of the C-Suite (Infographic)Radware
 
What’s the Cost of a Cyber Attack (Infographic)
What’s the Cost of a Cyber Attack (Infographic)What’s the Cost of a Cyber Attack (Infographic)
What’s the Cost of a Cyber Attack (Infographic)Radware
 
DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16Radware
 
Radware Cloud Security Services
Radware Cloud Security ServicesRadware Cloud Security Services
Radware Cloud Security ServicesRadware
 
Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)
Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)
Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)Radware
 
Radware Hybrid Cloud WAF Service
Radware Hybrid Cloud WAF ServiceRadware Hybrid Cloud WAF Service
Radware Hybrid Cloud WAF ServiceRadware
 
The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]Radware
 
The Real Cost of Slow Time vs Downtime
The Real Cost of Slow Time vs DowntimeThe Real Cost of Slow Time vs Downtime
The Real Cost of Slow Time vs DowntimeRadware
 
Cyber Attack Survival: Are You Ready?
Cyber Attack Survival:  Are You Ready?Cyber Attack Survival:  Are You Ready?
Cyber Attack Survival: Are You Ready?Radware
 
Radware ERT Threat Alert: Shellshock Bash
Radware ERT Threat Alert: Shellshock BashRadware ERT Threat Alert: Shellshock Bash
Radware ERT Threat Alert: Shellshock BashRadware
 
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving TheatreThe Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving TheatreRadware
 
Mobile Web Stress: Understanding the Neurological Impact of Poor Performance
Mobile Web Stress:  Understanding the Neurological Impact of Poor PerformanceMobile Web Stress:  Understanding the Neurological Impact of Poor Performance
Mobile Web Stress: Understanding the Neurological Impact of Poor PerformanceRadware
 
Emotional Engagement and Brand Perception
Emotional Engagement and Brand PerceptionEmotional Engagement and Brand Perception
Emotional Engagement and Brand PerceptionRadware
 
InfoSecurity Europe 2014: The Art Of Cyber War
InfoSecurity Europe 2014:  The Art Of Cyber WarInfoSecurity Europe 2014:  The Art Of Cyber War
InfoSecurity Europe 2014: The Art Of Cyber WarRadware
 
OpenStack Networking: Developing and Delivering a Commercial Solution for Lo...
OpenStack Networking:  Developing and Delivering a Commercial Solution for Lo...OpenStack Networking:  Developing and Delivering a Commercial Solution for Lo...
OpenStack Networking: Developing and Delivering a Commercial Solution for Lo...Radware
 
SecureWorld St. Louis: Survival in an Evolving Threat Landscape
SecureWorld St. Louis:  Survival in an Evolving Threat LandscapeSecureWorld St. Louis:  Survival in an Evolving Threat Landscape
SecureWorld St. Louis: Survival in an Evolving Threat LandscapeRadware
 
In the Line of Fire - The Morphology of Cyber-Attacks
In the Line of Fire - The Morphology of Cyber-AttacksIn the Line of Fire - The Morphology of Cyber-Attacks
In the Line of Fire - The Morphology of Cyber-AttacksRadware
 
Survival in an Evolving Threat Landscape
Survival in an Evolving Threat LandscapeSurvival in an Evolving Threat Landscape
Survival in an Evolving Threat LandscapeRadware
 
In the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber AttacksIn the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber AttacksRadware
 
In the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber AttacksIn the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber AttacksRadware
 

Mehr von Radware (20)

Cyber Security Through the Eyes of the C-Suite (Infographic)
Cyber Security Through the Eyes of the C-Suite (Infographic)Cyber Security Through the Eyes of the C-Suite (Infographic)
Cyber Security Through the Eyes of the C-Suite (Infographic)
 
What’s the Cost of a Cyber Attack (Infographic)
What’s the Cost of a Cyber Attack (Infographic)What’s the Cost of a Cyber Attack (Infographic)
What’s the Cost of a Cyber Attack (Infographic)
 
DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16
 
Radware Cloud Security Services
Radware Cloud Security ServicesRadware Cloud Security Services
Radware Cloud Security Services
 
Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)
Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)
Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)
 
Radware Hybrid Cloud WAF Service
Radware Hybrid Cloud WAF ServiceRadware Hybrid Cloud WAF Service
Radware Hybrid Cloud WAF Service
 
The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]
 
The Real Cost of Slow Time vs Downtime
The Real Cost of Slow Time vs DowntimeThe Real Cost of Slow Time vs Downtime
The Real Cost of Slow Time vs Downtime
 
Cyber Attack Survival: Are You Ready?
Cyber Attack Survival:  Are You Ready?Cyber Attack Survival:  Are You Ready?
Cyber Attack Survival: Are You Ready?
 
Radware ERT Threat Alert: Shellshock Bash
Radware ERT Threat Alert: Shellshock BashRadware ERT Threat Alert: Shellshock Bash
Radware ERT Threat Alert: Shellshock Bash
 
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving TheatreThe Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
 
Mobile Web Stress: Understanding the Neurological Impact of Poor Performance
Mobile Web Stress:  Understanding the Neurological Impact of Poor PerformanceMobile Web Stress:  Understanding the Neurological Impact of Poor Performance
Mobile Web Stress: Understanding the Neurological Impact of Poor Performance
 
Emotional Engagement and Brand Perception
Emotional Engagement and Brand PerceptionEmotional Engagement and Brand Perception
Emotional Engagement and Brand Perception
 
InfoSecurity Europe 2014: The Art Of Cyber War
InfoSecurity Europe 2014:  The Art Of Cyber WarInfoSecurity Europe 2014:  The Art Of Cyber War
InfoSecurity Europe 2014: The Art Of Cyber War
 
OpenStack Networking: Developing and Delivering a Commercial Solution for Lo...
OpenStack Networking:  Developing and Delivering a Commercial Solution for Lo...OpenStack Networking:  Developing and Delivering a Commercial Solution for Lo...
OpenStack Networking: Developing and Delivering a Commercial Solution for Lo...
 
SecureWorld St. Louis: Survival in an Evolving Threat Landscape
SecureWorld St. Louis:  Survival in an Evolving Threat LandscapeSecureWorld St. Louis:  Survival in an Evolving Threat Landscape
SecureWorld St. Louis: Survival in an Evolving Threat Landscape
 
In the Line of Fire - The Morphology of Cyber-Attacks
In the Line of Fire - The Morphology of Cyber-AttacksIn the Line of Fire - The Morphology of Cyber-Attacks
In the Line of Fire - The Morphology of Cyber-Attacks
 
Survival in an Evolving Threat Landscape
Survival in an Evolving Threat LandscapeSurvival in an Evolving Threat Landscape
Survival in an Evolving Threat Landscape
 
In the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber AttacksIn the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber Attacks
 
In the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber AttacksIn the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber Attacks
 

KĂŒrzlich hochgeladen

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vĂĄzquez
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂșjo
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

KĂŒrzlich hochgeladen (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

The Expanding Role and Importance of Application Delivery Controllers [Research by Radware and ESG]

  • 1. TM Enterprise Strategy Group | Getting to the bigger truth.ℱ Radware ADC Survey Final Results Jon Oltsik, Senior Principal Analyst
  • 2. Project Overview 2© 2014 by The Enterprise Strategy Group, Inc. ‱ 243 completed online surveys with IT professionals responsible for evaluating, purchasing, and managing campus and data center networking technologies for their organization ‱ Enterprise organizations (defined as organizations with 1,000 employees or more) with $500 million or more in annual revenue ‱ Geographic scope: North America ‱ Multiple industry verticals including financial, information technology, business services, manufacturing and retail
  • 3. Demographics 3© 2014 by The Enterprise Strategy Group, Inc.
  • 4. Respondents’ Responsibility for Making Networking Technology Products and Services Purchasing Decisions 4© 2014 by The Enterprise Strategy Group, Inc. I make/approve purchase decisions, 85% I influence or provide input on purchase decisions, 15% To what degree are you responsible for making purchase decisions related to networking products and services for your organization? (Percent of respondents, N=243)
  • 5. Respondents’ Familiarity/Involvement with Organization’s Load Balancer or ADC Deployments 5© 2014 by The Enterprise Strategy Group, Inc. I have a high level of knowledge/familiarity, 73% I have a good level of knowledge/familiarity, 27% To what extent are you personally familiar and/or involved with your organization’s load balancer or application delivery controller (ADC) deployments? (Percent of respondents, N=243)
  • 6. Respondents’ Current Responsibility 6© 2014 by The Enterprise Strategy Group, Inc. Senior IT management (e.g., CIO, VP of IT, Director of IT, etc.), 65% IT management, 28% IT architecture/planning, 3% IT Operations, 3% IT staff, 1% Which of the following best describes your current responsibility within your organization? (Percent of respondents, N=243)
  • 7. Respondents by Number of Employees Worldwide 7© 2014 by The Enterprise Strategy Group, Inc. 1,000 to 2,499, 14% 2,500 to 4,999, 26% 5,000 to 9,999, 19% 10,000 to 19,999, 18% 20,000 or more, 23% How many total employees does your organization have worldwide? (Percent of respondents, N=243)
  • 8. Respondents by Industry 8© 2014 by The Enterprise Strategy Group, Inc. Information Technology, 34% Manufacturing, 14% Financial (banking, securities, insurance), 12% Retail/Wholesale, 11% Health Care, 7% Business Services (accounting, consulting, legal, etc.), 5% Communications & Media, 5% Government (Federal/National, State/Province/Local), 2% Other, 10% What is your organization’s primary industry? (Percent of respondents, N=243)
  • 9. Respondents by Annual Revenue 9© 2014 by The Enterprise Strategy Group, Inc. 13% 20% 21% 16% 19% 9% 1% 0% 5% 10% 15% 20% 25% $500 million to $749.999 million $750 million to $999.999 million $1 billion to $4.999 billion $5 billion to $9.999 billion $10 billion to $19.999 billion $20 billion or more Not applicable (e.g., public sector, non- profit) What is your organization’s total annual revenue ($US)? (Percent of respondents, N=243)
  • 10. General IT Environment 10© 2014 by The Enterprise Strategy Group, Inc.
  • 11. Total Number of Physical x86 Servers Supported by IT Organization 11© 2014 by The Enterprise Strategy Group, Inc. 3% 12% 11% 23% 14% 20% 16% 0% 5% 10% 15% 20% 25% 100 or less 101 to 250 251 to 500 501 to 1,000 1,001 to 2,500 2,501 to 5,000 More than 5,000 Approximately how many total physical x86 servers (whether production or test/development) are supported by your IT organization? (Percent of respondents, N=243)
  • 12. Total Number of Virtual Machines Deployed 12© 2014 by The Enterprise Strategy Group, Inc. 2% 5% 6% 9% 14% 16% 16% 17% 16% 0% 2% 4% 6% 8% 10% 12% 14% 16% 18% 25 or less 26 to 50 51 to 100 101 to 250 251 to 500 501 to 1,000 1,001 to 2,500 2,501 to 5,000 More than 5,000 Approximately how many total virtual machines (whether production or test/development) are currently deployed in your organization? (Percent of respondents, N=243)
  • 13. Most Important IT Priorities Over the Next 12 Months 13© 2014 by The Enterprise Strategy Group, Inc. 7% 7% 8% 8% 9% 9% 9% 10% 10% 10% 11% 12% 12% 12% 13% 13% 13% 14% 16% 20% 21% 22% 23% 0% 5% 10% 15% 20% 25% Use platform-as-a-service (PaaS) for application development Deploying applications on or for new mobile devices Business continuity/disaster recovery programs Deploy application- or workload-specific systems/appliances Providing employees access to pre-approved repository of business applications Data center consolidation Deploy integrated computing platform Reduce data center power and cooling requirements Major application deployments or upgrades Regulatory compliance initiatives Desktop virtualization Business intelligence/data analytics initiatives Bring-your-own-device (BYOD) policy Improve collaboration capabilities Major database deployments or upgrades Applications delivered via software-as-a-service (SaaS) model Mobile workforce enablement Manage data growth Improve data backup and recovery Increased use of server virtualization Building a “private cloud” infrastructure Information security initiatives Use cloud infrastructure services Which of the following would you consider to be your organization’s most important IT priorities over the next 12 months? (Percent of respondents, N=243, three responses accepted)
  • 14. Strategic Initiative to Automate Provisioning of IT Infrastructure Resources 14© 2014 by The Enterprise Strategy Group, Inc. Yes, for all of our IT infrastructure resources, 70% Yes, for certain IT infrastructure resources, 28% No, 2% Does your organization have a strategic initiative to automate the provisioning of IT infrastructure resources? (Percent of respondents, N=243)
  • 15. Does Strategic Initiative to Automate Provisioning of IT Infrastructure Resources Include Network Operations? 15© 2014 by The Enterprise Strategy Group, Inc. Yes, 90% No, 10% Does your organization’s strategic initiative to automate the provisioning of IT infrastructure include network operations processes? (Percent of respondents, N=67)
  • 16. Most Common Challenges Meeting Application SLAs 16© 2014 by The Enterprise Strategy Group, Inc. 2% 22% 23% 28% 28% 28% 30% 32% 33% 39% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% No problems Allocating the right equipment for application development/testing Deployment/upgrade project not completed within budget Performance problems Determining proper security policies Deployment/upgrade project not completed on time Infrastructure problems Application compatibility problems Allocating the right IT staff resources to meet project schedules Security problems What are the most common challenges encountered in terms of meeting application SLAs? (Percent of respondents, N=243, three respondents accepted)
  • 17. Most Common Network Challenges When Deploying or Upgrading an Application 17© 2014 by The Enterprise Strategy Group, Inc. 31% 35% 35% 41% 42% 46% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% Not enough capacity Lacked ability to rapidly scale Not enough security for multi-tenant environment Length of time to provision network services Lacking flexibility to support virtual environment Latency in the network What are the most common network challenges your organization encounters when deploying or upgrading an application? (Percent of respondents, N=243, three responses accepted)
  • 18. ADC Environment 18© 2014 by The Enterprise Strategy Group, Inc.
  • 19. Total Number of Applications Supported Today and Number of Applications Supported with ADC Technology Today 19© 2014 by The Enterprise Strategy Group, Inc. 2% 12% 21% 23% 23% 18% 0% 12% 18% 27% 21% 12% 8% 2% 0% 5% 10% 15% 20% 25% 30% Less than 50 50 to 99 100 to 249 250 to 499 500 to 999 1,000 or more Don’t know Approximately how many total applications does your organization support today? Approximately how many of these applications does your organization support with ADC technology today? (Percent of respondents, N=243) Total applications supported Applications supported with ADC technology
  • 20. Application Types Currently Supported with ADC Technology 20© 2014 by The Enterprise Strategy Group, Inc. 14% 27% 28% 30% 31% 35% 35% 37% 37% 40% 42% 42% 43% 44% 50% 0% 10% 20% 30% 40% 50% 60% Video/multimedia Supply chain management Content management/document management Engineering/CAD/CAM Industry-specific applications Accounting/financial e-Commerce Internet/e-mail marketing Project management Collaboration/file sharing Human resources E-mail CRM/SFA Web applications Business analytics To the best of your knowledge, which of the following application types are currently supported with ADC technology? (Percent of respondents, N=243, multiple responses accepted)
  • 21. Total Number of ADCs Deployed 21© 2014 by The Enterprise Strategy Group, Inc. 3% 10% 35% 49% 2% 0% 10% 20% 30% 40% 50% 60% 1 to 5 6 to 10 11 to 20 21 to 50 More than 50 Approximately how many total ADCs does your organization have deployed? (Percent of respondents, N=243)
  • 22. How Total Number of ADCs Deployed Will Change Over the Next 36 Months 22© 2014 by The Enterprise Strategy Group, Inc. 31% 51% 16% 2% 0% 1% 0% 10% 20% 30% 40% 50% 60% Increase substantially Increase somewhat Remain about the same Decrease somewhat Decrease substantially Don't know How will your organization’s total number of ADCs deployed change – if at all – over the next 36 months? (Percent of respondents, N=243)
  • 23. Form(s) of ADC Deployments 23© 2014 by The Enterprise Strategy Group, Inc. Deployed as physical appliances only, 17% Deployed as virtual appliances only, 17%Deployed as both physical and virtual appliances, 66% In what form(s) are your organization’s ADCs deployed? (Percent of respondents, N=243)
  • 24. Factors that Drove Virtual ADC Appliance Deployment 24© 2014 by The Enterprise Strategy Group, Inc. 38% 46% 48% 48% 49% 53% 0% 10% 20% 30% 40% 50% 60% Virtual ADCs are cheaper to purchase Virtual ADCs let us align security requirements with individual applications Virtual ADCs can be mapped to a single application for ease of deployment and operations Virtual ADCs can be provisioned easily and in the same fashion as virtual workloads Virtual ADCs can be customized for specific requirements in multi- tenant environments Virtual ADCs let us align ADC processing power with the application performance requirements of individual applications Which of the following factors drove your organization to deploy virtual ADC appliances? (Percent of respondents, N=201, multiple responses accepted)
  • 25. Percentage Breakdown of Physical vs. Virtual ADCs: Today and 24 Months From Now 25© 2014 by The Enterprise Strategy Group, Inc. 11% 9% 20% 26% 17% 8% 6% 3% 1% 0% 8% 16% 14% 6% 23% 13% 8% 9% 4% 1% 0% 5% 10% 15% 20% 25% 30% 90% physical, 10% virtual 80% physical, 20% virtual 70% physical, 30% virtual 60% physical, 40% virtual 50% physical, 50% virtual 40% physical, 60% virtual 30% physical, 70% virtual 20% physical, 80% virtual 10% physical, 90% virtual Don’t know What is the approximate percentage breakdown of your organization’s ADCs in terms of physical vs. virtual appliances today? How do you expect this to change – if at all – over the next 24 months? (Percent of respondents, N=160) Today 24 months from now
  • 26. Benefits Realized as a Result of Deploying ADC Technology 26© 2014 by The Enterprise Strategy Group, Inc. 29% 30% 30% 31% 34% 34% 35% 36% 44% 47% 49% 0% 10% 20% 30% 40% 50% 60% Decreased productivity loss Faster time to market with applications Improved business reputation Ability to meet stringent SLAs Reduced latency Increased revenue Greater levels of protection Enhanced security posture Better access to applications Improved response times Higher levels of availability As a result of deploying ADC technology, what benefits has your organization realized? (Percent of respondents, N=243, multiple responses accepted)
  • 27. Biggest Challenges Meeting Application SLAs From an ADC Perspective 27© 2014 by The Enterprise Strategy Group, Inc. 19% 23% 23% 23% 24% 24% 26% 27% 29% 30% 0% 5% 10% 15% 20% 25% 30% 35% Lack of skills to maximize benefits of ADC when deploying new applications Transition from test/development to production environment requires changes Lacking flexibility to support virtual environment Lacking ability to rapidly scale Time to tune ADC to application Monitoring status of ADC activities Length of time to provision ADC services Difficult to estimate capacity requirements Determining proper security policies to be enforced on ADC Availability of resources From an ADC perspective, what are the biggest challenges your organization encounters in terms of meeting application SLAs? (Percent of respondents, N=243, three responses accepted)
  • 28. How Use of ADC Technology Helps to Accelerate Deployment or Upgrade of Applications 28© 2014 by The Enterprise Strategy Group, Inc. 32% 38% 42% 43% 45% 47% 47% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% Provides DevOps capabilities which helps better manage application utilization Increases level of orchestration (i.e., ability to leverage ADC-based software for management tasks) Serves as technology bridge between network and application teams Enables faster provisioning Offers the ability to consolidate security services on an ADC that might normally require several security systems/appliances Delivers greater scalability and flexibility Increases level of automation (i.e., ability to use ADCs to automate manual processes) How does the use of ADC technology help to accelerate the deployment or upgrade process for applications? (Percent of respondents, N=243, multiple responses accepted)
  • 29. Length of Time Needed to Provision ADC Services for a New Application 29© 2014 by The Enterprise Strategy Group, Inc. 1% 13% 22% 21% 21% 11% 9% 1% 5% 19% 24% 22% 13% 7% 7% 2% 0% 5% 10% 15% 20% 25% 30% Less than 1 minute 1 to 10 minutes 11 to 30 minutes 31 to 59 minutes 1 to 2 hours 3 to 4 hours More than 4 hours Don’t know How long does it take to provision ADC services for a new application? (Percent of respondents) Physical ADC (N=202) Virtual ADC (N=201)
  • 30. Number of Applications Run Over a Single ADC Appliance 30© 2014 by The Enterprise Strategy Group, Inc. 0% 14% 36% 34% 15% 0% 5% 10% 15% 20% 25% 30% 35% 40% 1 2 to 5 6 to 10 11 to 20 More than 20 On average, approximately how many applications does your organization typically run over a single ADC appliance? (Percent of respondents, N=243)
  • 31. ADC Features/Capabilities Currently Utilized 31© 2014 by The Enterprise Strategy Group, Inc. 1% 23% 24% 29% 30% 30% 30% 33% 35% 37% 37% 39% 43% 45% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% We only use simple load balancing capabilities SSL offload Content transformation/rewrite TCP connection multiplexing Single sign-on Application specific acceleration Multi-tenancy Compression Application performance monitoring Web content optimization Caching Web Application Firewall (WAF) Programmable interfaces Network level security Which of the following additional ADC features/capabilities does your organization currently utilize? (Percent of respondents, N=243, multiple responses accepted)
  • 32. Additional ADC Features/Capabilities Organizations Expect to Utilize Within 36 Months 32© 2014 by The Enterprise Strategy Group, Inc. 2% 19% 19% 19% 22% 22% 23% 23% 23% 23% 24% 25% 26% 28% 0% 5% 10% 15% 20% 25% 30% We expect to only use simple load balancing capabilities Programmable interfaces Network level security Caching Web Application Firewall (WAF) Single sign-on Compression SSL offload TCP connection multiplexing Content transformation/rewrite Multi-tenancy Application specific acceleration Web content optimization Application performance monitoring Which of the following additional ADC features/capabilities do you expect that your organization will utilize within 36 months? (Percent of respondents, N=243, multiple responses accepted)
  • 33. Running Applications in a Multi-Tenant Manner 33© 2014 by The Enterprise Strategy Group, Inc. Yes, 72% No, 26% Don't know, 2% Are any of your organization’s applications run in a multi-tenant manner (i.e., common application used by different organizations, groups, etc.)? (Percent of respondents, N=243)
  • 34. Support of Applications Run in Multi-Tenant Manner by ADCs 34© 2014 by The Enterprise Strategy Group, Inc. Yes, 95% No, 5% Don't know, 1% Are any of the applications supported by your organization’s ADCs run in multi-tenant manner? (Percent of respondents, N=175)
  • 35. Challenges When Deploying ADC Services to Support Multi- Tenant Application(s) 35© 2014 by The Enterprise Strategy Group, Inc. 19% 19% 20% 23% 24% 27% 28% 29% 30% 35% 0% 5% 10% 15% 20% 25% 30% 35% 40% Not enough automation Not enough capacity in physical device Not enough security for multi-tenant environment Length of time to provision ADC services Lacking flexibility to support virtual environment Cyber-attacks affect neighboring applications Lacking ability to rapidly scale Performance issues due to shared tenant environment Operations challenges managing multiple applications across multiple tenants that my include complex administration and security processes Configuration issues affecting the underlying device What are the biggest challenges your organization encounters when deploying ADC services in support of a multi-tenant application? (Percent of respondents, N=166, three responses accepted)
  • 36. Number of Clients/Tenants Sharing a Single ADC Appliance 36© 2014 by The Enterprise Strategy Group, Inc. 1% 17% 24% 39% 19% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 1 2 to 5 6 to 10 11 to 20 More than 20 On average, approximately how many clients/tenants share a single ADC appliance? (Percent of respondents, N=166)
  • 37. Network Security and ADC Technology 37© 2014 by The Enterprise Strategy Group, Inc.
  • 38. Reliance on ADCs to Provide Security Capabilities/Functionality 38© 2014 by The Enterprise Strategy Group, Inc. We leverage the security capabilities/functionality of all our ADCs, 49% We leverage the security capabilities/functionality of only the ADCs supporting applications with sensitive data, 44% We do not leverage the security capabilities/functionality of any of our ADCs, 7% To what extent does your organization currently rely on its ADCs to provide security capabilities/functionality? (Percent of respondents, N=243)
  • 39. Expected Change in Reliance of ADC-Provided Security Capabilities/Functionality with Respect to the Number of Applications Protected 39© 2014 by The Enterprise Strategy Group, Inc. Significant increase, 20% Increase, 56% No change, 22% Decrease, 1% Going forward, how do you expect your organization’s reliance on ADC-provided security capabilities/functionality technology to change in terms of the number of applications protected? (Percent of respondents, N=243)
  • 40. Primary Method Employed to Deliver Network Security Services to Protect Data Center-Resident Business Applications 40© 2014 by The Enterprise Strategy Group, Inc. 24% 24% 26% 27% 27% 28% 28% 30% 35% 37% 33% 27% 31% 30% 32% 33% 27% 24% 26% 30% 26% 30% 23% 23% 12% 13% 13% 16% 12% 12% 16% 14% 2% 1% 2% 1% 3% 1% 2% 0% 20% 40% 60% 80% 100% SSL acceleration Integration with other security tools (e.g., SIM, log management, etc.) WAF (web application firewall) Web authentication gateway DDoS defenses Secure network segmentation IPS/IDS (intrusion prevention/detection system) Network firewall What is the primary method your organization employs to deliver network security services as it relates to protecting its data center-resident business applications? (Percent of respondents, N=243) At the network perimeter on a purpose-built network security device On a physical ADC On a virtual ADC On a general purpose, data center-resident server
  • 41. Likelihood of a Malicious Attack Penetrating Organization’s Network Perimeter with ADCs Being Last Line of Defense 41© 2014 by The Enterprise Strategy Group, Inc. Extremely likely, 28% Likely, 30% Somewhat likely, 25% Not at all likely, 16% Don’t know, 1% How likely would it be for some type of malicious attack to penetrate your organization’s network perimeter, leaving your ADC(s) as the last line of defense in terms of protecting critical business applications? (Percent of respondents, N=243)
  • 42. Expected Impact of a Network Perimeter Infiltration 42© 2014 by The Enterprise Strategy Group, Inc. 29% 39% 42% 45% 48% 51% 0% 10% 20% 30% 40% 50% 60% Compromise of DMZ-based servers/systems Application performance degradation Disruption of application services Network performance degradation Disruption of network services Data breach If your organization was to experience this type of network perimeter infiltration, what would be the expected impact? (Percent of respondents, N=243, multiple responses accepted)
  • 43. Manner in Which Organizations Manage and Operate Network Security Processes/Technology 43© 2014 by The Enterprise Strategy Group, Inc. 39% 38% 14% 4% 5% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% There is a dedicated group tasked with network security management and operations Network security management and operations is done cooperatively by the IT security and networking teams, but we are currently creating a dedicated group for this function Network security management and operations is done cooperatively by the IT security and networking teams, but we plan on creating a dedicated group for this function within the next 12 to 24 months Network security management and operations is done cooperatively by the IT security and networking teams, but we are interested in creating a dedicated group for this function sometime in the future Network security management and operations is done cooperatively by the IT security and networking teams and this will continue in the future Which of the following best characterizes the manner in which your organization manages and operates network security processes and technology? (Percent of respondents, N=243)
  • 44. Day-to-Day Collaboration on Network Security Between IT Security and Networking Groups 44© 2014 by The Enterprise Strategy Group, Inc. Very good, works most of the time, 35% Good, works some but not all of the time, 51% Fair, works okay but there are known problems, 13% Poor, doesn’t work well as there are many known problems, 1% How would you characterize the day-to-day collaboration on network security between the IT security and networking groups? (Percent of respondents, N=149)
  • 45. Organizational Challenges Between Security and Network Team with Respect to Network Security 45© 2014 by The Enterprise Strategy Group, Inc. 3% 18% 18% 21% 22% 23% 32% 33% 34% 35% 0% 5% 10% 15% 20% 25% 30% 35% 40% We have not experienced any challenges Networking team does not keep the security team apprised of new networking developments Workflow issues related to the timeliness of collaborative tasks Redundant processes between the two groups Security team does not keep the networking team apprised of new security developments Lack of clarity about which group is responsible for one or more network security process Communications issues related to collaborative tasks It can be difficult to get an accurate status of network security because the two groups maintain separate tools and reports The two groups are measured and compensated on conflicting goals Issues related to the chain of command that is ultimately responsible for network security and collaboration between the two groups You indicated that your organization manages and operates network security processes and technologies as a collaborative effort between the security and networking teams. Which of the following organizational challenges between these two IT groups in relation to network security have you experienced? (Percent of respondents, N=149, three responses accepted)
  • 46. Division of Labor Between Security and Networking Teams 46© 2014 by The Enterprise Strategy Group, Inc. 36% 34% 29% 38% 34% 32% 38% 36% 46% 44% 52% 37% 44% 44% 46% 47% 17% 21% 18% 23% 21% 22% 15% 16% 1% 1% 1% 2% 1% 1% 1% 1% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Creating network security policies that align with business processes Defining network security technology requirements Selecting and purchasing network security technologies Deploying network security technologies Day-to-day operations of network security technologies Monitoring/analyzing network traffic for anomalous/suspicious traffic Altering network security controls in response to new threat intelligence Tracking changes and innovation in network security technology The following question is related to the division of labor between the security and networking teams at your organization. Please make a selection in each row that reflects which group is most responsible for each task. (Percent of respondents, N=149) Primarily owned by the security team Collaboratively owned by the security and networking teams Primarily owned by the networking team Don’t know
  • 47. Employment of Network Security Architects 47© 2014 by The Enterprise Strategy Group, Inc. Yes, and this person(s) resides in the information security group, 44% Yes, and this person(s) resides in the networking group, 26% Yes, and this person(s) spans the information security and networking groups, 12% Yes, this is part of the responsibility of an overall IT architecture/engineering team, 14% No, 5% Does your organization employ a person(s) that could be considered a network security architect(s)? (Percent of respondents, N=243)
  • 48. Would Having More Security Features Integrated into ADC Solution Make Networking Group More Self-Reliant/Sufficient? 48© 2014 by The Enterprise Strategy Group, Inc. Yes, 84% No, 12% Don't know, 4% Do you believe that having more security features integrated into ADC solutions could make the networking group more self-reliant/sufficient from a security perspective? (Percent of respondents, N=243)
  • 49. TM Thank You Please contact us for more information Enterprise Strategy Group | Getting to the bigger truth.ℱ Jon Oltsik, Senior Principal Analyst jon.oltsik@esg-global.com 508.381.5166