buy lipitor online
Hurwitz & Associates - Insight is Action

Dan's View

Dan’s research focus is on how compliance, governance, security and privacy are impacting the software industry and customer requirements. Additionally Dan is looking at mobile market.

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Bloggers
    Bloggers Search for your favorite blogger from this site.
  • Login
    Login Login form

Dan Kirsch

Dan Kirsch headshotDaniel Kirsch is a Senior Analyst. Dan's research areas include: governance, security, mobility and privacy. Dan's full bio
With the growing importance of data analytics, businesses are discovering that they must walk a fine line  in how they handle and manage customer data. Data privacy both  from both regulatory and reputational standpoints is requiring companies to move cautiously. The latest round of regulations, including the EU’s GDPR, comes with stiff financial penalties for those that fail to comply. Companies that fail to adequately prepare for the GDPR risk incurring fines of up to 4 percent of their annual revenue. As a result, organizations around the world are scrambling to address the new rules before the GDPR goes into effect...
Last modified on
Hits: 933
0
Continue reading 0 Comments

Predicting 2016: What's Old is New Again

Posted by on in Vendor Strategy
Hurwitz & Associates expects 2016 to be an interesting year with a combination of innovative new offerings and a resurgence of existing technologies in the forefront. 2016 will be the year when the old is new again; customers will continue to absorb and deploy technologies such as cloud, microservices, IoT, and advanced analytics. Businesses will select technologies based on the offering’s ability to provide both efficiency and the ability to improve customer relationships. We also expect to see continued consolidation in the market. Large enterprise vendors will continue to purchase innovative companies as both “tuck-in” acquisitions and a fast way to...
Last modified on
Hits: 3730
0
Continue reading 0 Comments
In a recent Hurwitz survey of companies building IoT solutions, one key finding made a big impression on me: More than 90% of respondents work with one or more partners to develop and manufacture their IoT solutions. Looking deeper into the survey findings, I could find many reasons why companies are finding partnerships essential to their IoT projects. One of the most significant reasons is that most companies entering into the IoT market need to redefine their traditional manufacturing processes. This requires innovation at fast speeds in order to achieve first-to-market advantage. Therefore, partnering with an organization that already has experience...
Last modified on
Hits: 3410
0
Continue reading 1 Comment
Godfrey Sullivan’s Keynote for this year’s Splunk User Conference had the audience buzzing with excitement as Splunk Version 6 and Splunk Cloud were announced.  Both offerings are intended to allow business users to gain more actionable insight from Splunk’s ability to capture, store and search nearly any type of log-data.  Fraud detection for financial services companies was one of the featured Splunk use cases, along with smart grid technology.  In addition, one of the founders of Splunk’s most recent (and first) acquisition, BugSense spoke during the keynote.  After spending the day talking with current Splunk customers, partners and executives, I had the following...
Last modified on
Hits: 6344
0
Continue reading 1 Comment

The Emergence of Big Data Security Intelligence

Posted by on in Security
What's Driving Big Data Security Intelligence? There is a new generation of security offerings that can anticipate threats and prevent them in real-time.  This new generation of offerings is emerging because of an increase level of risk.  Traditionally, security systems have worked by collecting and analyzing logs and then setting alerts to trigger action when activity falls outside of a specified pattern.  This approach  no longer satisfies the security needs of many organizations.  There are an increasing number of  newer threats, such as Advanced Persistent Threats (APTs) that are designed to look like normal system traffic and often do not trigger...
Last modified on
Hits: 4127
0
Continue reading 0 Comments
How employee’s use of cloud services are changing the way IT handles security Cloud computing has given business users the power to use sophisticated cloud services without the need to go through IT.  Well-meaning employees do not think about the potential risks associated with the cloud.  Software as a Service (SaaS) offerings like Facebook, Dropbox Flickr, Google’s Pircasa,  or LinkedIn  are commonly used by everyone from college users to business leaders.  Security and risk are far from the minds of most business users. Cloud services can be a productivity boom for business users and has resulted in a shift in the...
Last modified on
Hits: 4544
0
Continue reading 0 Comments
The Rise of BYOD Workplaces Bring your own device (BYOD) to work is a growing trend across all industries.  The idea that an employee, customer, or partner will access your network with any device they choose was unheard of only a few years ago it wasn’t long ago that companies had strict policies on what devices could and couldn’t connect to the company’s network.  Today many companies still try to enforce these policies without much success. Now the tables are turned, when executives or partners want to use their iPads or smart phones on the corporate network, IT is forced to...
Last modified on
Hits: 3516
0
Continue reading 2 Comments

Holes in Endpoint Security

Posted by on in Security
There is an avalanche of devices and end points that employees, customers and partners are beginning to utilize as they conduct even routine business transactions. An end point device might be a PC, smart phone or even a flash drive. The challenges of IT security are complicating the ability of organizations to protect their intellectual property as well as their reputations in the market.  And it isn’t just IT that is concerned. IT security has grabbed the attention of governmental bodies and the boards of directors of many companies.  Clearly, passwords – even when they are frequently changed and made more...
Last modified on
Hits: 3298
0
Continue reading 0 Comments