PICNIC-Podcast by Ipswitch

PICNIC-Podcast by Ipswitch header image 1

Intent Based Networking (IBN)

00:0000:00

880x440-episode25-ray.png

 

In Today’s PICNIC episode, we will welcome Ronnie Ray, Sr. Director – Product Management for DNA in the Enterprise Networking Business in Cisco.

In his role, Ronnie leads product strategy, roadmap and business execution for software controller, analytics and assurance products for the Enterprise Network including DNA Center and associated management software. Ronnie has over 18 years of experience in driving management software products across networks, datacenter, cloud and applications in his own startups or as a marketing and product leader in both public and private companies.

At the occasion of today’s episode, we will discuss Intent Based Networking (IBN) and try to answer:

  • What it means
  • What are the benefits of IBN?
  • What will be the customer journey on IBN?
  • How will IBN affect the current vendor landscape?
  • What is Cisco’s strategy in IBN?

17 Areas Shaping the IT Operations Market in 2018

880x440-episode24-bojan-simic.png

In Today’s PICNIC episode, we will welcome a returning guest, Bojan Simic, Founder at Digital Enterprise Journal.

Bojan Simic is Founder of Digital Enterprise Journal, a media and research firm focused on digital transformation and the business value of technology deployments. Bojan has been an analyst and entrepreneur in the enterprise technology industry for more than 10 years.

 As an industry analyst, Bojan has interviewed tens of thousands of IT and business professionals from end-user organizations and has published more than 100 research reports. Bojan is frequently quoted in leading industry publications and he has presented his research findings at hundreds of market-facing events.

Prior to launching Digital Enterprise Journal, Bojan was President and Principal Analyst at TRAC Research, a market research and analyst firm specializing in IT performance management.

Simic holds a B.A. in Economics from Belgrade University in Belgrade, Serbia and an M.B.A. from McCallum Graduate School of Business at Bentley University.

At the occasion of today’s episode, we will talk about a recent survey released by Digital Enterprise Journal (DEJ) about “17 Areas Shaping the IT Operations Market in 2018”.

Some of the key findings include:

  • 24% - are looking invest in new IT Operations solutions in next 12 months to be able to manage microservices and containers
  • 52% - reported advanced analytics and automation capabilities as the key driver for network monitoring in 2018
  • 54% - reported that network monitoring for Cloud and virtualized environments is becoming major requirement for 2018

The study is based on insights from more than 2,500 end-users, includes hundreds of data points and is produced by using DEJ's unique approach for ongoing data collection and analysis as well as the company TPO (Maturity Class Framework) methodology.

This will be the occasion for us to use this survey and discuss what it means in terms of:

  • IT Operations Context
  • Intelligent Automation
  • New Technologies Changing the Market Landscape
  • User Experience the Key Focal Point
  • Market Growth Requirements
  • Proactive versus Reactive Approaches
  • Beyond Monitoring
  • Automation, AI and Machine Learning
  • Digital Transformation
  • Service-Centric Approach
  • Security Initiaives
  • Cloud Management
  • Competitive landscape
  • And a lot more from this survey!

Things We Hate About New Devices

00:0000:00

880x440-episode22-hating-devices.png

In Today’s PICNIC episode, we welcome a few of our friends at Ipswitch, all passionate about their job and new technologies.

First our hosts, Kevin Conklin and Greg Mooney! No need to introduce them anymore after more than 20 episodes!

Alex Fisher is a Web marketer deeply involved in all aspects of online strategy. Alex specializes in web design, social media, information architecture, usability, A/B testing, landing page optimization and really well knows and understands end-users.

Jeff Edwards is an experienced writer, editor, and marketing professional dedicated to shedding light on the struggles of the modern IT team and in unlocking the mysteries of information security for the layperson.

Mark Towler is a Marketing Strategist specialized in Messaging and Lead Generation. To do so, Mark understands users and translates complex technical concepts into benefit-oriented messaging to answer his audience’s needs. Proficient with software, hardware, cloud/SaaS, B2B, B2C Mark specializes in Carrier and enterprise networking including core-to-edge switching products and service assurance as well as telecommunications and high-tech in general.

Some of the questions we would love to discuss/debate today are:

  • Vendors handling of updates, such as throttling performance on old phones and their excuse for doing so
  • Vendors pushes people to buy wireless headphones to remove the headphone jack. Has they overstepped its bounds?

The Evolution of IT Security Threats

00:0000:00

880x440-episode20-scott-foote.png

In Today’s PICNIC episode, we will welcome Scoot Foote, Cybersecurity Expert.

Scott is a senior high-tech executive with more than 30 years of experience in cybersecurity and the broader software industry; serving both the public and private sectors. His primary area of expertise has been information security since the late 1980s; however, Scott’s technical experience ranges from operating system kernel technologies, to the gamut of filesystem / database and info storage, to network engineering, to packaged commercial applications such as SCADA, B2B and CRM solutions. His management experience spans the product lifecycle, with a specific focus on complex systems engineering and solution roadmap planning – including operational prototyping, rapid-growth product evolution, market adaptation, derivative product strategy, and next generation rollout and migration. Since 1995, he has helped to launch or successfully re-invent over a dozen small businesses. Scott is a frequent guest speaker at industry events, sits on a number of advisory boards and has been a member of the board of directors for enswers, Inc., Axixa Corporation, Realocity, Inc., Protinuum, LLC, and the Boston Affiliate of the Susan G. Komen Breast Cancer Foundation. 

During today’s episode, we want to spend a bit of time studying and answering a few points:

  • How did we get here?  To the point where the majority of the commercial infrastructure we rely on today cannot be trusted?
  • Who are these Threat Actors?  How can they continue to prosper and grow in light of so much visibility now on things like massive data breaches?
  • Why is it so hard for Cyber Defenses to keep up with the threat?
  • What major trends do you see unfolding between now and 2020?  Both the evolution of the Threat, and the evolution of Cyber Defenses?
  • What advice do you have for our audience as they watch this global storm-front building on the horizon?

Equifax Breach – How Does It Impact End-Point Security?

00:0000:00

880x440-episode16-kevin-monahan.png

In this PICNIC episode, we will welcome David Monahan, Research Director at Enterprise Management Associates.

David is a senior information security executive with several years of experience. He has organized and managed both physical and information security programs, including security and network operations (SOCs and NOCs) for organizations ranging from Fortune 100 companies to local government and small public and private companies. He has diverse audit and compliance and risk and privacy experience such as providing strategic and tactical leadership to develop, architect, and deploy assurance controls; delivering process and policy documentation and training; and working on educational and technical solutions.

Prior to joining Enterprise Management Associates, David spent almost 10 years at AT&T Solutions focusing on the network security discipline. He was a key leader in organizing and supporting AT&T's Managed Security Services operations where he ultimately supported over 700 customers globally. In 2004, he leveraged that experience to begin provide support to the SME and SMB markets, working internally to bolster struggling security organizations. He has been sought after by public and privately held companies and local government, including Network Appliance, McData, and Jefferson County, Colorado, to help them manage their information security, compliance privacy, and IT risk programs. 

Aside from his full-time practice in the security field, David has been an adjunct faculty member for Capitol College in Laurel, Maryland since 2007, providing security instruction at the undergraduate and graduate levels. 

David has presented briefings to numerous forums including SANSFire, Forrester, and the Colorado Digital Government Conference. He has contributed content to a wide variety of industry forums and periodicals, including State Tech, CIO, CSO, and Computer World Magazines

During today’s episode, we want to spend a bit of time answering a few points:

  • What do think about the Equifax breach and how it will actually affect consumers?
  • If this is such a threat, why haven’t we seen any increase in identity theft using the data?
  • What are the top three things you recommend consumers do to protect themselves or decrease the odds of their information being exploited?
  • Equifax was huge but not the only instance of personal information theft. What can individuals do to avoid having their personal information stolen from them in the larger context of using the Internet and service providers?
  • How can people protect their information at home?

Spotlight on the Dark Web: business and individual identity

00:0000:00

880x440-episode15-kevin-lancaster.png

In this week's PICNIC episode, we welcome Kevin Lancaster, CEO, ID Agent. Kevin has served as Chief Executive Officer of ID Agent since its founding in 2015. Kevin also serves as CEO of the Winvale Group, a leading provider of advisory, research and strategic consulting services to government contractors across various industries and disciplines, since co-founding the company in 2003. In early 2017, he founded GovernmentContract.com, which provides education and training for businesses to successfully sell to the federal government. Kevin is an Executive Committee and Board of Directors member of the Maryland Tech Council and serves on the board of directors for the Navy Youth Hockey Association.

Kevin and his companies have earned several industry awards and accolades, including twice winning SmartCEO’s Future 50 Award and four times appearing on the Inc. 5000, the annual ranking of the fastest-growing private companies in America. He has been interviewed by the Washington PostGovernment ExecutiveMSPmentor, CBS and many other news outlets. Kevin frequently speaks to domestic and international audiences on privacy, identity monitoring, cyber security and the Dark Web, government contracting strategy and relations, and technology trends impacting the private and public sectors.

In today’s episode, we spend a bit of time studying and answering a few points:

  • What is the dark web and why should I care?
  • Why do personal identity breaches matter to businesses? (i.e. Is a company is at risk when its employees suffer personal identity theft? YES!)
  • What part does dark web monitoring play in a business continuity plan?
  • Cyber Monday starts the seasonal spike for digital identity theft. What are the top 3 things businesses should be doing to protect themselves?
  • What’s the Dark Web really, and why should businesses worry about it? 
  • Why do personal identity breaches matter to businesses? (i.e. Is a company is at risk when its employees suffer personal identity theft?)
  • What part does DW monitoring play in a business continuity plan?
  • Cyber Monday starts the seasonal spike for digital identity theft. What are the Top 3 things individuals should be doing to protect themselves?
  • What are Top 3 recommendations for businesses to do 
  • If I change my passwords, isn’t that enough? 

The Digital War Room

00:0000:00

880x440-episode14-dennis-drogseth.png

In Today’s PICNIC episode, we will welcome a returning guest: Dennis Drogseth, EMA (enterprise Management Associates) Vice President.

Dennis joined EMA in 1998 and currently manages the New Hampshire office. Dennis brings over thirty years of experience and supports EMA through leadership in Business Service Management (BSM), CMDB Systems, automation systems and service-centric financial optimization. Dennis also works across practice areas to promote dialogs across critical areas of technology and market interdependencies. Prior to this, Dennis helped to build the network management practice area at EMA. 

At EMA, Dennis has pioneered research in converging management strategies such as performance/availability and integrated security. Another focus is on changing organizational dynamics in IT, such as issues between the service desk and the operation center, and the emergence of a cross-domain, “service management” organization in more mature IT organizations. Dennis works extensively with vendor clients to help establish meaningful product positioning within an overcrowded marketplace, as well as with IT clients seeking to establish effective baselines for strategic management initiatives. He is a speaker on many management related issues. 

Prior to joining EMA, Dennis worked to develop marketing strategies and new business models for Cabletron’s SPECTRUM management software. He initiated a pilot program for a new software marketing organization based on a flexible, entrepreneurial dynamic. Dennis also coordinated a broad marketing effort to reposition SPECTRUM away from element management toward a robust SLM niche. Before Cabletron, Dennis spent 14 years with IBM in marketing and communications, including a year of international consulting on best practices for bringing networking solutions to market. 

At the occasion of today’s episode, we want to spend a bit of time on the digital war room and ask ouservles…

  • What the “digital war room” really is
  • What technologies Dennis foresees as shaping the digital war room most dramatically in the present/future?
  • Dennis has recently written a buyer’s guide on advanced IT analytics and we would like to know more about their potential impact
  • What we should expect as the impact of DevOps/ agile on the digital war room? What about the impact of cloud—and public cloud in particular?
  • What will the future be for the digital war room? Will there even be a war room?

15 Key Attributes of Modern IT Operations

00:0000:00

880x440-episode10-bojan-simic.png

In Today’s PICNIC episode, we will welcome Bojan Simic, Founder at Digital Enterprise Journal.

Bojan Simic is Founder of Digital Enterprise Journal, a media and research firm focused on digital transformation and the business value of technology deployments. Bojan has been an analyst and entrepreneur in the enterprise technology industry for more than 10 years.

As an industry analyst, Bojan has interviewed tens of thousands of IT and business professionals from end-user organizations and has published more than 100 research reports. Bojan is frequently quoted in leading industry publications and he has presented his research findings at hundreds of market-facing events.

Prior to launching Digital Enterprise Journal, Bojan was President and Principal Analyst at TRAC Research, a market research and analyst firm specializing in IT performance management.

Simic holds a B.A. in Economics from Belgrade University in Belgrade, Serbia and an M.B.A. from McCallum Graduate School of Business at Bentley University.

At the occasion of today’s episode, we will talk about IT Operations Attributes and answer questions such as:

  • What is the difference between artificial intelligence and machine learning?
  • What are the key drivers for organizations for modernizing IT operations?
  • What are some of the key changes that you have been seeing in this market over last few years?
  • What is the business impact of modernizing IT operations?
  • What types of technology capabilities are critical for modern IT operations?
  • Does digital transformation change the role that IT operations play in the enterprise?
  • Can modern IT operations make the IT more strategic and how?

Marketing Automation Importance

00:0000:00

880x440-episode10-robert-woodbury.png

In this week's PICNIC episode, we will welcome Robert Woodbury Jr, Ipswitch Global Marketing Programs Manager.

Robert joined Ipswitch in February 2016 and currently manages the creation and execution of global marketing programs for Ipswitch. Robert’s role at Ipswitch began as a member of the Demand Generation Team, focusing on Data Management and International Marketing program execution. Throughout his time with the Ipswitch Marketing Team, his experience managing two Marketo instances along with multi-channel marketing initiatives, has made him a valuable and proven Marketing Operations professional.

Outside of working at Ipswitch, Robert enjoys spending time with his two cats: Oliver and Pumpkin, watching all Boston sports teams, and enjoying his favorite cold brew coffee.

At the occasion of today’s episode, we will answer one key question: Why is marketing automation important to any (IT) organization?

Security Analytics, and the application of machine learning to security analytics

00:0000:00

880x440-episode8-mike-paquette.png

In Today’s PICNIC episode, we will welcome Mike Paquette Director of Product, Security Market at Elastic.

Mike joined Elastic in 2016 from Prelert, where he'd been VP of Products for Prelert's machine learning technology.  Mike's focus at Elastic is to help users and customers succeed with security-related applications of the Elastic Stack.  Mike has over 30 years of technology product development experience, including leadership roles with several startups.  He has worked in development of SIEM solutions, and spent 14 years developing and bringing to market network IPS and DDoS Defense solutions at Top Layer Security, where he also led development of network monitoring solutions.
Mike has written white papers on IPS and published security-related articles in Health Management Technology Magazine, ISSA Journal, Dark Reading, HowToLearn.com, and other industry publications. He has a BSEE from Boston University and is co-author of a patent on DDoS protection.

At the occasion of today’s episode, we will talk about Security Analytics and their application with machine learning. It is the right time to ask ourselves:

  • What’s the difference between artificial intelligence and machine learning?
  • Are there multiple types of machine learning?
  • Is Artificial Intelligence going to reduce the number of people needed in security analyst jobs?
  • Can machine learning be used to detect threats?
  • Can machine learning be used to identify malicious software?
  • What’s the story behind ramsonware?