Sunteți pe pagina 1din 16

| THE INDEPENDENT RESOURCE FOR IT EXECUTIVES

Q2 2010

BI world
in a
virtual
Plus, security: D av e A b r a h a m
Fo u n d e r a n d C E O
Signify

What you need to Laura DiDio

know
Principal Analyst
In f o r m a t i o n Te c h n o l o g y In t e l l i g e n c e C o r p

Mar tin Kuppinger


Senior Partner and Founder
Kuppinger Cole

Bill Moran
Principal Analyst
Ptak Noel & A ssociates

C o r e y Na c h r e i n e r
Senior Security Analyst
WatchGuard
ETM ■ CONTENTS PAGE

Contents

7 Editor and
contributors page
10 A new breed of players
26 Identity for the cloud—
What do we really need?
CLAUDIA IMHOFF (INTELLIGENT MARTIN KUPPINGER (KUPPINGER
SOLUTIONS) moderates a panel discussion COLE) sees the evolution of identity and access

8 Industry snapshot and on a range of business intelligence topics with management as the key to avoiding security and
The ETM community the help of SANDY STEIER (1010DATA), management risks—but it has to be recognized
ELISSA FINK (TABLEAU SOFTWARE), as integral to all parts of the business, not just the
DAVE SCHRADER (TERADATA), and cloud.
RICHARD NIESET (KICKFIRE).

9 Professional profile
22 Secure and social 28 Search—What’s
for you?
in it
The search and content processing sector
SAM MASIELLO (MCAFEE), talks to is in transition, making for both an exciting
ETM’S ALI KLAVER about the changing threat and challenging time. STEPHEN E.

82 Events and features landscape and how it applies to organizations and ARNOLD (ARNOLDIT.COM), author
of the first three editions of the Enterprise
social media, now and in the future.
Search report, seeks answers from KAMRAN
KHAN (SEARCH TECHNOLOGIES),
PAUL DOSCHER (EXALEAD), MARC
KRELLENSTEIN (LUCID IMAGINATION)
and JASON HUNTER (MARK LOGIC).

40 The heat is on
LAURA DIDIO (ITIC) talks about the
partnerships, and divisions, between the two
sets of players in the current virtual desktop
infrastructure market—Citrix/Microsoft and
VMware/EMC.

4
CONTENTS PAGE ■ ETM

Contents

44 BPM—Changing
you do business
how
Process management is changing, and
66 IBM’s
review
POWER7 in
In February, IBM announced its latest
business process management itself is microprocessor, POWER7, along with changes
changing how enterprises do business. to the latest version of AIX which supports
DANA GARDNER (INTERARBOR the advanced features of POWER7. BILL
SOLUTIONS) leads a panel discussion MORAN (PTAK NOEL & ASSOCIATES)
on current and future trends, joined by discusses chip properties and compares its
MALCOLM ROSS (APPIAN), OLIVIA performance to the older POWER6 while
TRILLES (AURAPORTAL) and CHRIS examining the competitive implications of the
HORAK (SAP). new systems.

52 Authenticating
cloud
the
While much has been discussed about the
70 No time? No staff ?
Problem solved!
How do you find the perfect PCI and compliance
security of applications and data in the solution for your company that works every
cloud, there’s a blind spot when it comes to single time? MIKE WALDER (SECURE
authentication. DAVE ABRAHAM TECHNOLOGY HAWAII) talks to ETM’S ALI
(SIGNIFY) helps to shed light on the issue. KLAVER about why they chose AirTight, and
why it’s been so successful.

54 Immediate results
Remain Software is focused on successful 74 Back on track
change management. WIM JONGMAN Now that the economy is slowly recovering,
and MARCO KOK talk to ETM’S ALI businesses are beginning to look at cloud
KLAVER about how they’re helping businesses computing with renewed interest—and NaviSite
succeed with the help of H. UTKU ALATAS is ready to meet demand. ETM’S ALI KLAVER
(ISBANK). talks to CLAUDINE BIANCHI and
DENIS MARTIN about their solutions,
including application management, and where

58 Join the conversation


How can today’s new tools and techniques
they see the market going.

provide business value to enterprise


organizations? MATTHEW LEES
(PATRICIA SEYBOLD GROUP) gets the
78 Securing the future
COREY NACHREINER
expert opinion of CHRISTOPHER LAMB (WATCHGUARD) predicts the most important
(IBM), MATT TUCKER ( JIVE) and threats to IT security this year.
CARLOS DIAZ (BLUEKIWI SOFTWARE)
on the mindsets both organizations and
individuals should have in order to get the most
out of their social technology investments.

5
EDITOR’S PAGE ■ ETM CONTRIBUTORS

Fo u n d e r / P u b l i s h e r
Amir Nikaein
Managing Editor
A l i K l av e r

BI in a virtual world Ar t Director


Ariel Liu
A ssociate Designer
Michael Chan
In the last few months I’ve noticed a quiet explosion in discussions involving
virtualization and the cloud. Admittedly, after the economic lag, a lot of companies put He a d o f D i g i t a l
A l f o n s o Mu n o z
developments in virtualization on hold, but with this new surge of interest I like to think
that this heralds a new stage of growth for companies globally. Po d c a s t / S o u n d E d i t o r
Mark Kendrick
This issue of ETM in particular deals with some of the most up-to-date trends in
virtualization and the cloud, including a fantastic piece by Martin Kuppinger on “Identity A ssociate Editors
M a r y Wr i g h t
for the cloud—What do we really need?” (page 26). Plus, Laura DiDio (ITIC) talks
about the main players in virtual desktop infrastructure today (page 40), as well as Account Executives
Jo e M i r a n d a
featuring on our profile page for this issue. Sandino Suresh
We’ve also introduced a special new section on www.globaletm.com around Aicha Gultekin
enterprise search with the help of Stephen Arnold (ArnoldIT). He moderates a No r t h A m e r i c a n A c c o u n t E x e c u t i v e s
dynamic panel podcast featuring Exalead, Search Technologies, Mark Logic and Lucid Fa r r a h Tu t t l e
Ye s s i t A r o c h o
Imagination. You’ll find the transcript on page 28.
Operational intelligence is running hot at the moment so we’re featuring two Marketing Executive
Alex Themistos
additional panel podcasts, one on business intelligence (page 10, moderated by Claudia
Imhoff from Intelligent Solutions), and another on business process management (page
44) with Dana Gardner (Interarbor Solutions). Contributors
There are also quite a few opinions on security this issue, including a piece on the top D av e A b r a h a m
10 security threats of 2010 by Corey Nachreiner from WatchGuard (page 78). Fo u n d e r a n d C E O
Signify
I hope that we’ve provided some handy updates and essential solutions for your
virtualization, security and BI needs this issue. Laura DiDio
Principal Analyst
Thank you for reading, and if you would like to contribute to any future issues I n f o r m a t i o n Te c h n o l o g y I n t e l l i g e n c e C o r p ( I T I C )
of ETM, please feel free to contact us at www.globaletm.com or via email at editor@
Mar tin Kuppinger
enterpriseimi.com Senior Par tner and Founder
Kuppinger Cole
B i l l Mo r a n
Principal Analyst
Ptak Noel & A ssociates
Ali Klaver C o r e y Na c h r e i n e r
Senior Security Analyst
Managing Editor WatchGuard

Enterprise Technology Management


is published by Informed Market Intelligence

How to contact the editor


We welcome your letters, questions, comments, complaints, and compliments.
Please send them to Headquarters
Informed Market Intelligence, marked to the Editor, Informed Market Intelligence (IMI) Ltd
Farringdon House, 105-107 Farringdon Road, London, EC1R 3BU, United Kingdom Farringdon House, 105-107 Farringdon Road
or email editor@enterpriseimi.com London, EC1R 3BU ,United Kingdom
PR submissions +44 207 148 4444
All submissions for editorial consideration should be emailed to editor@enterpriseimi.com
Reprints
For reprints of articles published in ETM magazine, contact sales@enterpriseimi.com New York
All material copyright Informed Market Intelligence 68 Jay Street, Suite #201, Brooklyn, NY 11201, USA
This publication may not be reproduced or transmitted in any form in whole or part without the written express consent of
the publisher. +1 718 710 4876

7
ETM ■ INDUSTRY NEWS

Industry snapshot
Google/China row Nokia goes open Poll results
continues source
Since the last issue of ETM we have introduced
a poll facility on gloabletm.com. The results have
been surprising:

•58.3% of you think that the iPad


heralds a new age of information at your
fingertips

•40% of you use Twitter for social


networking, both business and personal, while
40% of you claim to not use Twitter at all
April saw Google pull its search service out of Styled as a rival to the iPhone and Google’s
China after disagreements stretching over the
past two months. Google’s recent move to Hong
Android operating system, Nokia’s N8 phone is
the first handset to use the Symbian operating •98% of you would like a social
networking site that is especially directed at
Kong was slammed by Chinese authorities system since it became open source. The N8
which has essentially allowed them to stop has a 12 megapixel camera and allows people to enterprise IT executives... ETM can help!
self-censoring. It still means that the Chinese record and edit HD video clips, as well as watch www.gloabletm.com
government would prevent mainland users from web TV services.
seeing “sensitive” search results.

THE ETM Community


ETM IS HERE TO HELP YOU GET THE
ANSWERS AND SOLUTIONS
YOU NEED TO HELP YOUR BUSINESS
SUCCEED—
it’s something we’re passionate about. So we’ve
developed a social networking platform catered
specifically to your needs.

You’ll be able to connect with the IT community


through your personal profile and blogs,
by uploading whitepapers, taking part in
discussions, and connecting directly with like-
minded IT executives—plus much more.

We’re on the verge of launching during the next


quarter, so please keep an eye on www.globaletm.
com for the new-look website and social
networking platform. We’d love to know what
you think: aklaver@enterpriseimi.com

8
LAURA DIDIO ■ PROFESSIONAL PROFILE

Meet: Laura DiDio


Principal Analyst
Information Technology Intelligence Corp (ITIC)

I
TIC, founded by Laura DiDio in 2002, provides primary research and
consulting on topics ranging from soft ware, hardware, networking, virtualization
and cloud computing, to the services industries that support the technology
including outsourcing. Prior to founding ITIC, Laura spent over six years
at Yankee Group, where she held the title of Research Fellow. She has also held
reporting positions at computer networking industry trade publications including:
Computerworld, Network World, Communications Week, LAN Times, and Digital Review.
She shares her story so far with ETM: Laura DiDio

HOW DID YOU START OUT IN THE IT inventing the integrated circuit chip. Noyce was rectified the situation and the corporate client
INDUSTRY? a true genius and it was a privilege to interview saved over $100,000.

LD:
him. And of course, thanks to the high technology
It was pure propinquity. I had vendors, I’ve visited some amazing countries, HOW DO YOU SEE THE FUTURE OF
been working as an on-camera investigative including a stay at the Hotel Carlton in Cannes, CLOUD COMPUTING?

LD:
reporter for CNN in the early 1980s. At the France.
time, CNN was struggling financially and by I think corporations will adopt it at
chance I was recruited to cover semiconductors WHAT DO YOUR COLLEAGUES SAY a measured pace with private cloud adoptions
for Electronic Buyer’s News. I literally began ABOUT YOU? WHAT ARE YOUR outpacing public cloud adoptions by a 2-to-1
covering high tech at the chip level—Intel, STRENGTHS? margin for the next 12 to 18 months. Presently,

LD:
Motorola, Texas Instruments, Fairchild, National many companies are taking a “wait and see”
Semiconductor—just at the time the industry This is a tough one because they attitude about putting their critical line-of-
went into an explosive growth phase. don’t always tell me. I would hope they say business applications into the cloud until they can
that I’m hard working, professional, and a team be sure of key issues like security, response time
HOW DID YOU END UP WHERE YOU ARE player always willing to help out my co-workers. and costs.
TODAY? My top strengths are writing, conducting

LD:
primary research and articulating my findings WHO DO YOU THINK ARE THE BEST
It’s been an interesting journey. to assist clients in optimizing their business and ANALYST COMPANIES IN THE MARKET
After starting out covering semiconductors I technology needs. TODAY?

LD:
transitioned to computer hardware, software,
applications, networking and security. From IF YOU COULD CHANGE ONE THING I’m admittedly biased, but I like the
there it was a natural progression to covering the ABOUT YOUR JOB, WHAT WOULD IT BE? smaller independents and start-ups like Altimeter,

LD:
business issues that are closely intertwined with The Enderle Group, Horses for Sources and Pund-
technology, such as TCO, ROI, licensing and I’d clone myself, so I have more time. I IT. Of the big named firms, I think IDC does the
contract negotiation, and regulatory compliance love the high technology industry and the people best job of tracking unit shipments and revenues,
issues. In 1998, the rise of the internet and the in it. It’s fast paced and demanding but sometimes and Forrester Research delivers outstanding value
transition to digital media began to impact I wish we could have regular 8am-6pm business to its clients via its inquiries.
newspapers and magazine revenues, so I thought hours.
it was a good time to transition to the analyst HOW DO YOU STAY UP-TO-DATE
ranks. I joined Giga Information Group in the fall CAN YOU GIVE US A CASE STUDY THAT PROFESSIONALLY?

LD:
of 1998. HIGHLIGHTS WHAT ITIC CAN DO?

LD: I constantly read, take briefings with


WHAT IS THE MOST REWARDING I helped a corporate client negotiate a vendors and corporate clients, attend conferences,
EXPERIENCE YOU’VE HAD? better licensing deal with one of their vendors that and talk with peers.

LD:
saved them over $3 million. I also helped another
As a reporter I got to interview the late, client re-negotiate their sales contract after I
great, Robert Noyce, who co-founded Intel Corp determined that the sales person had deliberately If people want more information about you,
(along with Andrew Grove and Gordon Moore) overcharged them. I brought the incident to the where can they go?
and who, along with Jack Kirby, is credited with attention of a high level executive who quickly Visit ITIC: www.itic-corp.com

9
ASK THE EXPERT ■ SOCIAL MEDIA AND THE THREAT LANDSCAPE

Secure and
social
SAM MASIELLO (McAfee),
talks to ETM’S ALI KLAVER about the
changing threat landscape and how it
applies to organizations and social media,
now and in the future.

http://www.GlobalETM.com

22
SOCIAL MEDIA AND THE THREAT LANDSCAPE ■ ASK THE EXPERT

AK: SAM, HOW HAS THE THREAT LANDSCAPE CHANGED IN Companies have to make sure that they’re allowing access to these sites
THE PAST TWO YEARS? HAS IT CHANGED DRAMATICALLY IN because they provide huge marketing opportunities for them, but they also
THE PAST SIX MONTHS OR SO? have to make sure that they monitor the information their employees are

SM:
putting on these sites because they could also be high risk.
What we’ve seen over the past couple of years is the migration
from these end mass type of attacks where you see phishing emails sent to AK: I LIKE YOUR HYBRID APPROACH SAM, PARTICULARLY
millions of people. These show up on the radars of just about every filtering WHEN YOU’RE CONSIDERING MARKETING YOUR COMPANY,
provider and ISP fairly quickly, and they get shut down quickly. AND IT’S ALSO ABOUT EDUCATING THE EMPLOYEE AS WELL,
But it also extends to larger numbers of targeted attacks going after IF YOU’RE GOING TO ALLOW FREE AND OPEN ACCESS TO
individual organizations or groups of organizations, in an attempt to either VARIOUS SOCIAL MEDIA NETWORKS.
steal data or proprietary and intellectual property. DOES THIS FALL INTO BEST PRACTICES? CAN YOU
The game really has changed from the end map type of attacks where RECOMMEND FIVE OF THE MOST IMPORTANT BEST
they’ve tried to cast as wide a net as possible and see who they can get PRACTICES AN ORGANIZATION SHOULD FOLLOW TO
on their phish hook, to much more targeted attacks aimed at individual PROTECT THEIR NETWORK?

SM:
organizations and even individual people.
The messages they’re sending to these people to try to trick them You just mentioned the first one when you talked about
include much more personalized information—something to the effect of educating employees, and educating their users. I think that making sure
the phone number of the company or the CEO of the company that they you educate your users is the most important aspect of protecting the
generally don’t put in generic phishing emails—to make it look a bit more information that’s in, or going out, of an organization.
legitimate. The reality is that the user is the weakest link in the security chain—
It’s been fairly successful in some instances. A good example is whether it’s posting information on a social media site, clicking on an
something called Operation Aurora. We found that there were some attachment in an email, or protecting end-point devices against data
very high value target companies, like Google, that were being targeted leakage, viruses and spam. So I think you mentioned the first one very
specifically by cybercriminals to try to steal their intellectual property. eloquently, right off.
Imagine all the research projects that are going on at Google and We need to make sure we’re educating the users, to make sure they
what could be the next big money maker for them. If someone were to understand what is allowed and what spam and phishing emails look like. One
potentially get in there and steal that information prior to Google going to of the things very prevalent right now is fake AV, where you go to a website
market, then another company could beat them to it. and a window pops up saying that your machine is being scanned for a virus.

AK: WITH THE CONTINUED RISE OF SOCIAL MEDIA THESE


DAYS, THESE SORTS OF ATTACKS CAN ALMOST BE HIDDEN, IN

“company
... McAfee is the only
A SENSE, SO HOW SHOULD ORGANIZATIONS HANDLE SOCIAL
MEDIA? SHOULD THEY ALLOW LIMITED ACCESS, BAN IT

whose sole focus


COMPLETELY, OR BE COMPLETELY OPEN?

SM:
is on security.”
There is a lot of opinion on this topic and I think that it’s
important to discuss it because there are a lot of companies who have gone
to both ends of the extreme. Some allow it completely and don’t do any
sort of monitoring of the content; and there are some that, in an effort to
protect themselves, block all access to social media sites—which in my
personal opinion is a little draconian. It inevitably finds something because it’s actually a fake piece of
What you need to do is a hybrid approach. You need to be able to have malware that’s saying you have something wrong with your machine when
your marketing department and employees using these social media outlets you actually don’t. That’s one of the ways that people are being tricked
because right now it’s a great way to market your organization. into downloading fake antivirus software, giving up their credit card
Whether you’re a small or large company, social media is where people information, and downloading malware onto the machine.
are going now. They’re focusing less on individual advertisement-laden type The next four are kind of all bunched together, but they fall under a
sites, and going to social media sites where people have invested a lot of defence in depth type of approach. Push protection out from your network as
money in trying to promote their own brands. far as you possibly can so that you are only accepting traffic on your network
Since people are using social media sites like Facebook and MySpace that you have to, and not all of the attacks that are coming in from the outside.
much more frequently: it’s a great opportunity for these companies to be The reality is that the number of attacks is increasing in frequency and
able to have targeted advertisement based on people’s interests on these sophistication every single day, and so by pushing as much as that out into
social media sites. the cloud as you possibly can, you’re limiting the amount of bandwidth you
From a marketing standpoint, if a company is blocking access have to accept on your network for these attacks.
completely, they’re kind of missing the boat. But I think they also need to For the things that get passed to cloud—make sure you have perimeter
make sure that their employees aren’t doing anything that could potentially protection on your inbound network such as looking for spam and viruses,
violate the terms and conditions of their employment. and an IPS solution in place that’s looking for other intrusions that are
Like, for example, talking about proprietary projects, or talking about trying to attack your network.
proprietary technology or confidential projects. These water cooler-type Having endpoint protection in place is another big one because the
chats are potentially huge opportunities for data leakage. endpoint is no longer just the PC’s or the laptops that you have sitting

23
EXECUTIVE PANEL ■ ENTERPRISE SEARCH

Search—
What’s in it for you?
The search and content processing sector is in transi-
tion, making for both an exciting and a challenging time.
STEPHEN E. ARNOLD (ARNOLDIT.COM),
author of the first three editions of the Enterprise Search
report, seeks answers from KAMRAN KHAN
(SEARCH TECHNOLOGIES), PAUL DOSCHER
(EXALEAD), MARC KRELLENSTEIN
(LUCID IMAGINATION) and JASON HUNTER
(MARK LOGIC).

28
ENTERPRISE SEARCH ■ EXECUTIVE PANEL

http://www.GlobalETM.com

SA: I’D LIKE TO ASK EACH OF OUR PARTICIPANTS TO BRIEFLY We see people doing things like creating content, retrieving it, reusing it,
INTRODUCE THEMSELVES AND POSITION THEIR FIRM’S delivering it, collaborating together, visualizing and analyzing, and as search
SEARCH SERVICES AND TECHNOLOGIES—PAUL WOULD YOU being at the heart of all these things.

MK:
LIKE TO START?

PD: I started Lucid Imagination in 2007 and I’ve been working in


I’ve been in software sales for over 30 years with a number of enterprise search for about 20 years. I was the Chief Technology Officer at
well known companies such as Oracle, BusinessObjects, VMware and a Northern Light back in the late ‘90s.
plethora of smaller companies. I started Lucid because I realized that there was now open source
Exalead was founded in 2000 by former AltaVista lead developers. software for search, Lucene and Solr, which was as good or better than the
Traditionally, the company focused on building large scale enterprise search commercial products, and was free. So the combination of that software, and
technology first distributed in 2004. We now have over 250 customers free, seemed winning to me.
worldwide such as the World Bank, PriceWaterhouseCoopers and La Poste We provide support, services and value-add software around Lucene and
in France. Solr—basically everything that the open source doesn’t have, we try to provide.
In the past year we’ve seen an evolution in enterprise search to We sell formal support contracts, provide consulting, training,
something that is now being commonly referred to as search-based knowledge base and other services, and provide additional software to
applications. We see huge opportunity as this market evolves to get closer to complement what’s in the open source.
mission-critical applications that are being delivered to our customers today
by Exalead CloudView technology. SA: PAUL, FROM EXALEAD, DOES A PLAIN VANILLA KEYWORD

KK:
SEARCH DELIVER VALUE FOR AN EMPLOYEE SEEKING BUSINESS
I’m the CEO and founder of Search Technologies. I started INFORMATION TODAY?

PD:
in the search business in the early ‘90s with Excalibur Technologies which
eventually became Convera. I founded Search Technologies in 2005 to focus I believe that it can, but when you use the words plain vanilla
primarily on helping customers to implement search solutions. keyword search, what you’re really talking about is how you can help people
Our business is about getting the solution working, rather than building navigate through a set of information so that they can get to the information
products, so we work with a number of search software providers, including they want.
some of the panellists today. We operate globally, and in our five year history The days of people doing a Google search where they get the top
we’ve delivered more than 20,000 days of consulting to over 150 customers. 10 results delivered page after page—those kinds of opportunities for
We’re search product agnostic, although a large proportion of our information are fast becoming very passé and frustrating for users.
implementation work today involves FAST Search from Microsoft, What we see today are applications that help the individual through very
SharePoint, the Google Search Appliance and also open source software such easy to use and flexible interfaces that give them the capacity to navigate
as Solr and Lucene. through information after it is intelligently combined in an index. Semantic

JH:
relevance is maintained and managed so that different styles of information,
I’m the Principal Technologist at Mark Logic. I’ve been here once integrated into an index, maintain their semantic relevance and
about six years, just after the company de-cloaked seven years ago and started integrity.
telling everyone what we do. Exalead builds very flexible and adaptable user interfaces to work across
We’ve now got around 200 customers, 160 employees, and do a lot of the entire ecosystem. It could be a very simple keyword search, or as complex
work in media, government and financial services with customers like Lexis as a dashboard that shows all sorts of graphical interfaces.
Nexus, Elsevier, the National Archives and Records Administration and We have a customer who is a very large logistics company and their
more. instantiation was in fact a keyword search. But the power of the retrieval, and
What we sell that all these people are using is an XML server—it’s an then the assistance through navigational tools to help the user drive down
XML-centric, transactional, search-centric, structure aware, schema free, to the specific items of information they want, has now become so advanced
very fast, clustered database server. So we think search-based applications are that you can build business intelligence-looking dashboards and people
key. We actually go as far as calling them information applications. won’t realize that it’s a search technology underneath. 

29
ANALYST FEATURE ■ VIRTUAL DESKTOP INFRASTRUCTURE

LAURA DIDIO (ITIC)


talks about the partnerships, and
divisions, between the two sets of
players in the current virtual desktop
infrastructure market—Citrix/
Microsoft and VMware/EMC.

The HEAT is on
T
here’s no hotter market in high tech this year than Virtual Citrix and Microsoft unveiled a series of VDI initiatives that include
Desktop Infrastructure (VDI) and you don’t need sales and aggressive pricing and more simplified licensing models. To demonstrate just
unit shipment statistics to prove it. No, the best measurement how committed they are to taking on VMware and EMC, the two firms even
of VDI’s hotness is the sudden flurry of vendor announcements went so far as to combine their respective VDI graphics technologies.
accompanied by a concomitant rise in vitriol. At stake is the leadership position in the nascent, but rapidly expanding,
The main players in the VDI market are actually two sets of pairs. It’s global VDI market. The results of the ITIC 2010 Global Virtualization
Citrix and Microsoft lining up against VMware and EMC for round two in Deployment and Trends Survey, which polled 800+ businesses worldwide in
the ongoing virtualization wars. On March 18, Citrix and Microsoft came December/January, indicate that 31% of respondents plan to implement VDI
out swinging, landing the first potent, pre-emptive punches right where they in 2010—that’s more than double the 13% that said they would undertake a
hope will hurt VMware the most: in its pocketbook. VDI deployment in 2009.

40
CHANGEVIRTUAL DESKTOP INFRASTRUCTURE ■ ANALYST FEATURE

Application virtualization is also on the use personal devices or public networks to Cash-strapped corporations and IT
rise. The same ITIC survey found that 37% access their corporate data. departments are all on the lookout for top notch
of participants plan application virtualization Microsoft also made another move towards products at bargain basement prices. And it
upgrades this year, up from 15% who responded simplifying its virtualization licensing plan. doesn’t get much better for customers than the
affirmatively to the same question in 2009. Starting July 1, Microsoft SA customers will no free Rescue for VMware VDI program.
The current installed base of VDI longer be required to purchase a separate license VMware built up a commanding lead in
deployments is still relatively small; hence to access Windows via a VDI. the server virtualization arena over the last
the statistics that show the number of five years by virtue of being first to market
deployments doubling year over year must • THE “RESCUE FOR VMWARE VDI” and delivering leading edge features and
be considered in that context. Nonetheless, (THE NAME SAYS IT ALL) performance in its signature ESX Server
double digit deployment figures are evidence This promotion is a direct attack on product. VMware’s competitors have spent
of strengthening demand and a market

“Hardware vendors like Dell, HP and


that is robustly transitioning from niche to
mainstream.
The spate of announcements from
Microsoft and Citrix were clearly intended to
IBM et al all have a stake in the
future success
capitalize on the growth spurt in VDI. At the
same time, the companies threw down the

of the VDI
gauntlet with initiatives aimed at solidifying and
expanding their base of current VDI customers
while serving the dual purpose of luring
VMware customers away from that company’s market.”
VDI platform.
They include:
VMware. Like the VDI Kick Start program, it the last several years playing catch up in server
• “VDI KICK START” runs through December 31, 2010. virtualization. This allowed them to charge a
This wide-ranging sales promotion, which runs Under the terms of this deal, any Microsoft premium price for its premier offerings.
through December 31, 2010, seeks to jumpstart Software Assurance licensing/maintenance Depending on the size and scope of the
VDI deployments by lowering the entry level customer can replace their existing VMware individual organization’s server virtualization
pricing for customers purchasing Microsoft and View licenses for free. VMware View users who deployment, customers paid on average 35%
Citrix technologies. opt out of that platform in favor of the Citrix to as much as 75% higher for VMware server-
As part of this deal, existing Microsoft client and Microsoft offerings will receive up to 500 based offerings. There were surprisingly few
access licensing (CAL) customers will pay $28 XenDesktop VDI Edition device licenses and complaints.
per desktop for uP to 250 users to purchase the up to 500 Microsoft VDI Standard Suite device The emerging VDI and application
Microsoft Virtual Desktop Infrastructure Suite, licenses free for an entire year once they trade in virtualization markets are a different
Standard edition, and Citrix’s XenDesktop their VMware View licenses. story. Only about 5-8% of organizations
VDI Edition for one year. That’s roughly a 50% Dai Vu, Microsoft’s director of worldwide have fully virtualized their desktop
discount off the list prices that corporations virtualization marketing, said the infrastructure. So it’s too soon to declare a clear
have paid up until now for their annual CALs. announcements were all about delivering more market winner.
This is crucial for cost-conscious businesses. value to desktop customers and simplifying and It’s safe to say that Citrix, Microsoft and
Client access licenses typically represent extending organizations’ licensing rights. VMware are all market leaders in this segment.
the lion’s share of their licensing deals since The Citrix/Microsoft announcements also This time around though, Microsoft and
desktops outnumber servers in mid-sized and cement the close working partnership and the Citrix are determined not to let VMware and
large enterprises. In addition, the two firms “enemy of my enemy is my friend” relationship EMC run away with the race by building an
merged Microsoft’s 3D graphics technology the firms have enjoyed for many years. By insurmountable lead.
for virtual desktops, called RemoteFX, with bundling their respective VDI offerings Meanwhile, VMware and EMC have not
Citrix’s high-definition HDX technology in together, the two companies should also ensure been idle. Former Microsoft executive Paul
order to deliver greater integration and higher integration and interoperability which are Maritz succeeded VMware founder Diane
performance capabilities. crucial components for each and every layer in a Greene following her 2008 departure as the
virtualized data center environment. company’s president and chief executive
• THE MICROSOFT VIRTUAL officer. Since then he has made tangible moves
DESKTOP ACCESS (VDA) VMWARE AND EMC: NOT to bolster VMware’s position in the VDI and
LICENSE PLAN STANDING STILL application virtualization arenas. Maritz and
Organizations that use Thin Client devices VMware and EMC executives have yet to EMC CEO Joe Tucci make a formidable
which are not included or covered under publicly respond to the Microsoft/Citrix combination, as do EMC and VMware.
Microsoft’s SA maintenance plan can now initiatives. However, it’s almost certain that EMC purchased VMware in 2004 for $635
purchase the VDA licenses at a retail price of VMware will have to offer its current and million and it owns an 86% majority stake in the
$100 per device per annum. This targets end prospective VDI accounts incentives to counter server virtualization market leader. In the past
users who travel or telecommute and need to the Microsoft/Citrix alliance. several years, VMware’s fortunes and revenues

41
ANALYST FEATURE ■ REVIEW

IBM’s POWER7
in review BILL
In February IBM announced its latest microprocessor,
POWER7, along with changes to the latest version of AIX
which supports the advanced features of POWER7.
MORA N (PTAK NOEL & ASSOCIATES)
discusses chip properties and compares its performance to the
older POWER6 while examining the competitive implications
of the new systems.

BACKGROUND
The POWER architecture had its start in the late 1980s
as an IBM effort to create a lower cost RISC processor
for low end and mid-range systems. It attracted
attention in the marketplace with the PowerPC
alliance which consisted of IBM, Apple and Motorola.
Over the years, Apple and Motorola dropped out
while IBM continued to develop the architecture for
its servers.
One has to acknowledge IBM’s persistence and
the investment protection it has delivered to its
customers. For example, IBM provided increased
performance and price/performance to its long time
AS/400 customers (renamed to System i). iOS will
take advantage of most of the high-end features of
POWER7 with some exceptions that are only available
with AIX 6.

THE NEW CHIP


IBM spent little announcement time discussing
the new chip. Rather, they focused on their new
systems. This is because customers are generally more
interested in new system (or package) features that
help the performance of their particular workloads and
less so on the chip specifications.

66
EVENTS AND FEATURES ■ 2010

Events and features 2010


ETM is focusing on:
Security, BI and the
Cloud
GARTNER SOURCING SUMMIT TDWI EUROPEAN CONFERENCE GARTNER APPLICATION AND
DATES:30 May – 1 June 2010 DATES: 14 – 16 June 2010 ARCHITECTURE SUMMIT
LOCATION: Tokyo, Japan LOCATION: Munich, Germany DATES: 12 – 13 July 2010
URL: www.gartner.com/it/page.jsp?id=1267919 URL: www.tdwi.eu/nc/en/events/conferences/ LOCATION: Tokyo, Japan
tdwi-2010-munich.html URL: www.gartner.com/it/page.jsp?id=1267916
GARTNER PPM AND IT GOVERNANCE
SUMMIT CODE GENERATION CONFERENCE 2010 GARTNER BUSINESS INTELLIGENCE AND
DATES:7 – 9 June 2010 DATES: 16 – 18 June 2010 INFORMATION MANAGEMENT SUMMIT
LOCATION: Orlando, FL LOCATION: Cambridge, UK DATE: 14 July 2010
URL: www.gartner.com/it/page.jsp?id=1216519 URL: www.codegeneration.net/cg2010 LOCATION: Tokyo, Japan
URL: www.gartner.com/it/page.jsp?id=1267917
INTEROP TOKYO ENTERPRISE ARCHITECTURE
DATES: 7 – 11 June 2010 CONFERENCE EUROPE (EAC 2010) BLACK HAT US 2010
LOCATION: Tokyo, Japan DATES: 16 – 18 June 2010 DATES: 24 – 29 July 2010
URL: www.interop.com LOCATION: London, UK LOCATION: Las Vegas, LV
URL: www.irmuk.co.uk/eac2010 URL: www.blackhat.com
GARTNER OUTSOURCING SUMMIT 2010 –
LATIN AMERICA GARTNER SECURITY AND RISK GOVERNMENT CLOUD 2010
DATES: 8 – 9 June 2010 MANAGEMENT SUMMIT DATE: 11 August 2010
LOCATION: Sao Paulo, Brazil DATES: 21 – 23 June 2010 LOCATION: Singapore
URL: www.gartner.com/it/page.jsp?id=1188515 LOCATION: Washington, DC URL: www.futuregov.net/events/government-
URL: www.gartner.com/it/page.jsp?id=1180650 cloud-forum-2010
GARTNER SOA AND APPLICATION
DEVELOPMENT AND INTEGRATION TECHCONNECT WORLD TDWI WORLD CONFERENCE
SUMMIT DATES: 21 – 25 June 2010 DATES: 15 – 20 August 2010
DATES: 14 – 15 June 2010 LOCATION: Anaheim, CA LOCATION: San Diego, CA
LOCATION: London, UK URL: www.techconnectworld.com URL: www.tdwi.org/Education/Conferences/
URL: www.gartner.com/it/page.jsp?id=1128412 index.aspx
CLOUD COMPUTING WORLD FORUM
GARTNER IT INFRASTRUCTURE, DATES: 29 June – 1 July 2010 PII 2010 – PRIVACY IDENTITY
OPERATIONS AND MANAGEMENT LOCATION: London, UK INNOVATION
SUMMIT URL: www.cloudwf.com DATES: 17 – 19 August 2010
DATES: 14 – 16 June 2010 LOCATION: Seattle, WA
LOCATION: Orlando, FL THE GREEN ENTERPRISE WORLD FORUM URL: www.techpolicycentral.com/pii/featured/
URL: www.gartner.com/it/page.jsp?id=1219216 DATES: 1 July 2010 events-calendar.php
LOCATION: London, UK
URL: www.greenenterpriseforum.com

Interested in contributing?
If you’re an analyst, consultant or an independent and would like to contribute a vendor-neutral piece to future issues of ETM,
please contact the managing editor:
Ali Klaver: aklaver@enterpriseimi.com.

82
ETM Q2 ISSUE ■ 2010

To read the

full version of the Q2 issue,


please go to

“www.globalETM.com”
please go to
full version of the Q2 issue,
To read the

TBC

S-ar putea să vă placă și