The MarketWatch News Department was not involved in the creation of this content.
Jul 15, 2022 (Market Insight Reports) -- Market Study Report recently added a new title on 2022-2028 Global High Performance Data Analytics (HPDA) Market Report from its database. The report provides study with in-depth overview, describing about the Product, Size, Share, Industry Scope and elaborates market outlook and status to 2028.
According to the research report latest study, due to COVID-19 pandemic, the global High Performance Data Analytics (HPDA) market size is estimated to be worth US$ 9539.5 million in 2021 and is forecast to a readjusted size of USD 23000 million by 2028 with a CAGR of 13.4% during review period.
Request a sample Report of High Performance Data Analytics (HPDA) Market at: https://www.marketstudyreport.com/request-a-sample/4524105?utm_source=Marketwatch&utm_medium=SP
Global key companies of High Performance Data Analytics (HPDA) market include Cisco, SAP, HPE, Cray, and Dell, etc. In terms of revenue, the global top four players hold a share over % in 2021.
The High Performance Data Analytics (HPDA) market stands tall as one of the most proactive industry verticals, as claimed by a new research report. This research study forecasts this space to accrue substantial proceeds by the end of the projected period, aided by a plethora of driving forces that will fuel the industry trends over the forecast duration. A gist of these driving factors, in tandem with myriad other dynamics pertaining to the High Performance Data Analytics (HPDA) market, such as the risks that are prevalent across this industry as well as the growth opportunities existing in High Performance Data Analytics (HPDA) market, have also been outlined in the report.
A brief outline of the High Performance Data Analytics (HPDA) market scope:
One of the most vital pointers that makes the High Performance Data Analytics (HPDA) market report worth a purchase is the extensive overview of the competitive spectrum of the vertical. The study efficiently segregates the High Performance Data Analytics (HPDA) market into Cisco, SAP, HPE, Cray, Dell, Juniper Networks, IBM, Microsoft, Intel, Oracle, Red Hat, Teradata and SAS, as per the competitive hierarchy. In essence, these companies have been vying with one another to accrue a near-dominant position in the industry.
The report supplies substantial data regarding the market share that every one of these companies currently garner across this business, in tandem with the market share that they are expected to procure by the end of the forecast period. Also, the report elaborates on details pertaining to the products manufactured by each of these firms, that would help new entrants and prominent stakeholders work on their competition and strategy portfolios. Not to mention, their decision-making process is liable to get easier on account of the fact that the High Performance Data Analytics (HPDA) market report also enumerates a gist of the product price trends and the profit margins of each firm in the industry.
Questions that the High Performance Data Analytics (HPDA) market report answers with respect to the regional terrain of the business space:
Important takeaways from the study:
What questions does the report answer with respect to the segmentation of the High Performance Data Analytics (HPDA) market?
For More Details On this Report: https://www.marketstudyreport.com/reports/global-high-performance-data-analytics-hpda-market-2022-by-company-regions-type-and-application-forecast-to-2028?utm_source=Marketwatch&utm_medium=SP
About Us:
Market Study Report is a hub for market intelligence products and services.
We streamline the purchase of your market research reports and services through a single integrated platform by bringing all the major publishers and their services at one place.
Our customers partner with Market Study Report to ease their search and evaluation of market intelligence products and services and in turn focus on their company's core activities.
If you are looking for research reports on global or regional markets, competitive information, emerging markets and trends or just looking to stay on top of the curve then Market Study Report is the platform that can help you in achieving any of these objectives.
Contact Us:
Corporate Sales,
Market Study Report
Phone: 1-302-273-0910
Toll Free: 1-866-764-2150
Email: sales@marketstudyreport.com
News: https://www.nwdiamondnotes.com/
COMTEX_410222980/2599/2022-07-15T01:51:24
Is there a problem with this press release? Contact the source provider Comtex at editorial@comtex.com. You can also contact MarketWatch Customer Service via our Customer Center.
The MarketWatch News Department was not involved in the creation of this content.
The MarketWatch News Department was not involved in the creation of this content.
The "Cyber security as a Service Market" Research Report gives an inside and out outline and experiences into the market's size, incomes, different sections and drivers of improvement, as well as restricting elements and provincial modern presence. The objective of the statistical surveying study is to totally assess the 'Cyber security as a Service Sector' and get a survey makes sense of the business and its business possibilities. The concentrate likewise inspects the effect of COVID-19 on the business and income examinations when the pestilence. As per this, the client gets broad information on the business and firm from an earlier time, present, and future points of view, permitting them to put away cash and convey assets admirably.
To Know How Covid-19 Pandemic and Russia Ukraine War Will Impact This Market
In the current times when digitalization of operations and internal networks has become the prime agenda of enterprises across all industries globally, cyber security has become an important part in every industry due to complex network environments, advanced technology adoption, and growing IT infrastructure.
Market Analysis and Insights: Global Cyber security as a Service Market
The global Cyber security as a Service market size is projected to reach USD 37440 million by 2026, from USD 34780 million in 2020, at a CAGR of 7.1%% during 2021-2026.
Global Cyber security as a Service Scope and Market Size
Cyber security as a Service market is segmented by Type, and by Application. Players, stakeholders, and other participants in the global Cyber security as a Service market will be able to gain the upper hand as they use the report as a powerful resource. The segmental analysis focuses on revenue and forecast by Type and by Application in terms of revenue and forecast for the period 2015-2026.
This Cyber security as a Service Market Report offers analysis and insights based on original consultations with important players such as CEOs, Managers, and Department heads of suppliers, manufacturers, and distributors.
How much is the Cyber security as a Service market worth?
As a result of the Ukraine-Russia War and COVID-19 epidemic, the Cyber security as a Service market is estimated to be worth USD million in 2022 and is forecast to be worth USD million by 2026, with a CAGR estimated to generate a lot of revenue till 2026.
Get a sample Copy of the Cyber security as a Service Market Report 2022
The investigation report has solidified the examination of different factors that increment the market's turn of events. It lays out examples, limitations, and drivers that change the market in either a positive or negative manner. This part also gives the degree of different sections and applications that could influence the market from now into the foreseeable future. The point by point information relies upon most accurate things and essential accomplishments. This portion moreover gives an exploration of the volume of creation about the overall market and about each sort from 2017 to 2026.
What are the key companies covered in the Cyber security as a Service Market?
The Major Players covered in the Cyber security as a Service Market report are:
Get a sample PDF of report @https://www.360marketupdates.com/enquiry/request-sample/15875041
A thorough evaluation of the controls associated with the report portrays the separation to drivers and gives space for essential arrangement. Factors that obscure the market advancement are critical as they can be seen to devise different bends for getting hold of the advantageous entryways that are accessible in the reliably creating business area. Besides, pieces of information into market capable's viewpoints have been taken to appreciate the market better.
Cyber security as a Service Market - Size, Shares, Scope, Competitive Landscape and Segmentation Analysis:
The report focuses on the Cyber security as a Service market size, segment size (mainly covering product type, application, and geography), competitor landscape, accurate status, and development trends. Furthermore, the report provides strategies for companies to overcome threats posed by COVID-19. Technological innovation and advancement will further optimize the performance of the product, enabling it to acquire a wider range of applications in the downstream market. Moreover, customer preference analysis, market dynamics (drivers, restraints, opportunities), new product release, impact of COVID-19, regional conflicts and carbon neutrality provide crucial information for us to take a deep dive into the Cyber security as a Service market.
The major players in the global Cyber security as a Service Market are summarized in a report to understand their role in the market and future strategies. Numerous marketing channels and strategies are likely to thrive during the forecast period and were also identified in reports that help readers develop a winning approach.
Enquire before purchasing this report -https://www.360marketupdates.com/enquiry/pre-order-enquiry/15875041
What segments are covered in Cyber security as a Service Market report?
Cyber security as a Service Market is segmented on the basis of type, end-use industry and application. The growth amongst the different segments helps you in attaining the knowledge related to the different growth factors expected to be prevalent throughout the market and formulate different strategies to help identify core application areas and the difference in your target markets.
On the basis of Product Type, Cyber security as a Service Market is segmented into:
● Enterprise Security
● Endpoint Security
● Cloud Security
● Network Security
● Application Security
●
The report studies end-user applications in various product segments and the global Cyber security as a Service Market. By collecting important data from relevant sources, the report assesses the growth of individual market segments. In addition, the market size and growth rate of each segment is explained in the report. The report considers key geographic segments and describes all the favourable conditions driving market growth.
On the basis of the End Users / Applications, Cyber security as a Service Market is segmented into:
● IT and Telecom
● Retail
● BFSI
● Healthcare
● Defense/Government
● Automotive
● Education
● Oil and Gas
●
The country section of the report also includes individual market influences affecting current and future market trends and changes in market regulation at the country level.
Get a sample Copy of the Cyber security as a Service Market Report 2022
On the basis of the Geography, Cyber security as a Service Market is segmented into:
- North America [US, Canada, Mexico]
- Europe [Germany, UK, France, Russia, Italy, Rest of Europe]
- Asia-Pacific [China, India, Japan, South Korea, Southeast Asia, Australia, Rest of Asia Pacific]
- South America [Brazil, Argentina, Rest of South America]
- Middle East and Africa [GCC, North Africa, South Africa, Rest of Middle East and Africa]
Through a comparative examination of the past and present scenarios, the Cyber security as a Service research offers a complete blueprint of the industry scenario across the assessment timeframe; assisting stakeholders in establishing action plans that certain maximum growth while managing market risks. Furthermore, the study document provides a complete review of the major industry segments to discover the best investment opportunities. It also examines all of the major market participants in terms of their financials, growth plans, and product and service offerings to provide a comprehensive picture of the competitive environment.
Cyber security as a Service Market - Impact of Covid-19 and Recovery Analysis:
We have been tracking the direct impact of COVID-19 on this market, as well as the indirect impact from other industries. This report analyses the impact of the pandemic on the Cyber security as a Service market from a Global and Regional perspective. The report outlines the market size, market characteristics, and market growth for Cyber security as a Service industry, categorized by type, application, and consumer sector. In addition, it provides a comprehensive analysis of aspects involved in market development before and after the Covid-19 pandemic. Report also conducted a PESTEL analysis in the industry to study key influencers and barriers to entry.
Request A sample Copy of Cyber security as a Service Market Research Report 2022 Here
Cyber security as a Service Market Drivers and Restrains:
The Cyber security as a Service industry research report provides an analysis of the various factors driving the markets growth. It creates trends, constraints and impulses that change the market in a positive or negative direction. This section also discusses the various segments and applications that could affect the future Cyber security as a Service market. Details are based on current trends and past achievements. The report includes a comprehensive boundary condition assessment that compares drivers and provides strategic planning. The factors that impede market growth are fundamental because they create different curves to seize opportunities in emerging markets. We also gather information from the opinions of market experts to better understand the market.
Years considered for this report:
- Historical Years:2017-2021
- Base Year:2021
- Estimated Year:2022
- Forecast Period:2022-2026
What the Report has to Offer?
- Market Size Estimates:The report offers accurate and reliable estimation of the market size in terms of value and volume. Aspects such as production, distribution and supply chain, and revenue for the Cyber security as a Service market are also highlighted in the report
- Analysis on Market Trends:In this part, upcoming market trends and development have been scrutinized
- Growth Opportunities:The report here provides clients with the detailed information on the lucrative opportunities in the Cyber security as a Service market
- Regional Analysis:In this section, the clients will find comprehensive analysis of the potential regions and countries in the Cyber security as a Service market
- Analysis on the Key Market Segments:The report focuses on the segments: end user, application, and product type and the key factors fuelling their growth.
- Vendor Landscape:Competitive landscape provided in the report will help the companies to become better equipped to be able to make effective business decisions.
Reasons to buy this report:
- To gain insightful analyses of the market and have comprehensive understanding of the global market and its commercial landscape.
- Assess the production processes, major issues, and solutions to mitigate the development risk.
- To understand the most affecting driving and restraining forces in the market and its impact in the global market.
- Learn about the market strategies that are being adopted by leading respective organizations.
- To understand the future outlook and prospects for the market.
- Besides the standard structure reports, we also provide custom research according to specific requirements.
Inquire more and share questions if any before the purchase on this https://www.360marketupdates.com/enquiry/pre-order-enquiry/15875041
Cyber security as a Service Market - Table of Content (TOC):
1 Cyber security as a Service Market Overview
1.1 Product Overview and Scope of Cyber security as a Service Market
1.2 Cyber security as a Service Market Segment by Type
1.2.1 Global Cyber security as a Service Market Sales and CAGR Comparison by Type (2017-2026)
1.3 Global Cyber security as a Service Market Segment by Application
1.3.1 Cyber security as a Service Market Consumption (Sales) Comparison by Application (2017-2026)
1.4 Global Cyber security as a Service Market, Region Wise (2017-2026)
1.4.1 Global Cyber security as a Service Market Size (Revenue) and CAGR Comparison by Region (2017-2026)
1.4.2 United States Cyber security as a Service Market Status and Prospect (2017-2026)
1.4.3 Europe Cyber security as a Service Market Status and Prospect (2017-2026)
1.4.4 China Cyber security as a Service Market Status and Prospect (2017-2026)
1.4.5 Japan Cyber security as a Service Market Status and Prospect (2017-2026)
1.4.6 India Cyber security as a Service Market Status and Prospect (2017-2026)
1.4.7 Southeast Asia Cyber security as a Service Market Status and Prospect (2017-2026)
1.4.8 Latin America Cyber security as a Service Market Status and Prospect (2017-2026)
1.4.9 Middle East and Africa Cyber security as a Service Market Status and Prospect (2017-2026)
1.5 Global Market Size (Revenue) of Cyber security as a Service (2017-2026)
1.5.1 Global Cyber security as a Service Market Revenue Status and Outlook (2017-2026)
1.5.2 Global Cyber security as a Service Market Sales Status and Outlook (2017-2026)
1.6 Influence of Regional Conflicts on the Cyber security as a Service Industry
1.7 Impact of Carbon Neutrality on the Cyber security as a Service Industry
2 Cyber security as a Service Market Upstream and Downstream Analysis
2.1 Cyber security as a Service Industrial Chain Analysis
2.2 Key Raw Materials Suppliers and Price Analysis
2.3 Key Raw Materials Supply and Demand Analysis
2.4 Market Concentration Rate of Raw Materials
2.5 Manufacturing Process Analysis
2.6 Manufacturing Cost Structure Analysis
2.7 Major Downstream Buyers of Cyber security as a Service Analysis
2.8 Impact of COVID-19 on the Industry Upstream and Downstream
3 Players Profiles
4 Global Cyber security as a Service Market Landscape by Player
4.1 Global Cyber security as a Service Sales and Share by Player (2017-2022)
4.2 Global Cyber security as a Service Revenue and Market Share by Player (2017-2022)
4.3 Global Cyber security as a Service Average Price by Player (2017-2022)
4.4 Global Cyber security as a Service Gross Margin by Player (2017-2022)
4.5 Cyber security as a Service Market Competitive Situation and Trends
4.5.1 Cyber security as a Service Market Concentration Rate
4.5.2 Cyber security as a Service Market Share of Top 3 and Top 6 Players
4.5.3 Mergers and Acquisitions, Expansion
5 Global Cyber security as a Service Sales, Revenue, Price Trend by Type
5.1 Global Cyber security as a Service Sales and Market Share by Type (2017-2022)
5.2 Global Cyber security as a Service Revenue and Market Share by Type (2017-2022)
5.3 Global Cyber security as a Service Price by Type (2017-2022)
5.4 Global Cyber security as a Service Sales, Revenue and Growth Rate by Type (2017-2022)
6 Global Cyber security as a Service Market Analysis by Application
6.1 Global Cyber security as a Service Consumption and Market Share by Application (2017-2022)
6.2 Global Cyber security as a Service Consumption Revenue and Market Share by Application (2017-2022)
6.3 Global Cyber security as a Service Consumption and Growth Rate by Application (2017-2022)
7 Global Cyber security as a Service Sales and Revenue Region Wise (2017-2022)
7.1 Global Cyber security as a Service Sales and Market Share, Region Wise (2017-2022)
7.2 Global Cyber security as a Service Revenue and Market Share, Region Wise (2017-2022)
7.3 Global Cyber security as a Service Sales, Revenue, Price and Gross Margin (2017-2022)
7.4 United States Cyber security as a Service Sales, Revenue, Price and Gross Margin (2017-2022)
7.4.1 United States Cyber security as a Service Market Under COVID-19
7.5 Europe Cyber security as a Service Sales, Revenue, Price and Gross Margin (2017-2022)
7.5.1 Europe Cyber security as a Service Market Under COVID-19
7.6 China Cyber security as a Service Sales, Revenue, Price and Gross Margin (2017-2022)
7.6.1 China Cyber security as a Service Market Under COVID-19
7.7 Japan Cyber security as a Service Sales, Revenue, Price and Gross Margin (2017-2022)
7.7.1 Japan Cyber security as a Service Market Under COVID-19
7.8 India Cyber security as a Service Sales, Revenue, Price and Gross Margin (2017-2022)
7.8.1 India Cyber security as a Service Market Under COVID-19
7.9 Southeast Asia Cyber security as a Service Sales, Revenue, Price and Gross Margin (2017-2022)
7.9.1 Southeast Asia Cyber security as a Service Market Under COVID-19
7.10 Latin America Cyber security as a Service Sales, Revenue, Price and Gross Margin (2017-2022)
7.10.1 Latin America Cyber security as a Service Market Under COVID-19
7.11 Middle East and Africa Cyber security as a Service Sales, Revenue, Price and Gross Margin (2017-2022)
7.11.1 Middle East and Africa Cyber security as a Service Market Under COVID-19
8 Global Cyber security as a Service Market Forecast (2022-2026)
8.1 Global Cyber security as a Service Sales, Revenue Forecast (2022-2026)
8.1.1 Global Cyber security as a Service Sales and Growth Rate Forecast (2022-2026)
8.1.2 Global Cyber security as a Service Revenue and Growth Rate Forecast (2022-2026)
8.1.3 Global Cyber security as a Service Price and Trend Forecast (2022-2026)
8.2 Global Cyber security as a Service Sales and Revenue Forecast, Region Wise (2022-2026)
8.3 Global Cyber security as a Service Sales, Revenue and Price Forecast by Type (2022-2026)
8.4 Global Cyber security as a Service Consumption Forecast by Application (2022-2026)
8.5 Cyber security as a Service Market Forecast Under COVID-19
9 Industry Outlook
9.1 Cyber security as a Service Market Drivers Analysis
9.2 Cyber security as a Service Market Restraints and Challenges
9.3 Cyber security as a Service Market Opportunities Analysis
9.4 Emerging Market Trends
9.5 Cyber security as a Service Industry Technology Status and Trends
9.6 News of Product Release
9.7 Consumer Preference Analysis
9.8 Cyber security as a Service Industry Development Trends under COVID-19 Outbreak
9.8.1 Global COVID-19 Status Overview
9.8.2 Influence of COVID-19 Outbreak on Cyber security as a Service Industry Development
10 Research Findings and Conclusion
Purchase this report (Price 3900 USD for a Single-User License) -https://www.360marketupdates.com/purchase/15875041
Cyber security as a Service Market - Research Methodology:
The key research methodology is data triangulation which involves data processing, analysis of the impact of knowledge variables on the market, and first (industry expert) validation. Data collection and base year analysis is completed using data collection modules with large sample sizes. The market data is analyzed and forecasted using market statistical and coherent models. Also market share analysis and key analysis are the main success factors within the market report.
Contact Us:
Email:sales@360marketupdates.com
Organization: 360 Market Updates
Phone: +14242530807 / + 44 20 3239 8187
For More Related Reports Click Here :Press Release Distributed by The Express Wire
To view the original version on The Express Wire visit Cyber security as a Service Market 2022, Business Quality Check, Global Review and Outlook by Top 10 Companies | 126 Report Pages
COMTEX_410228354/2598/2022-07-15T03:42:12
Is there a problem with this press release? Contact the source provider Comtex at editorial@comtex.com. You can also contact MarketWatch Customer Service via our Customer Center.
The MarketWatch News Department was not involved in the creation of this content.
More integrations between different parts of Cisco’s extensive portfolio in networking and security, combined with as-a-service consumption models meant to make customers’ lives a lot easier.
For years, Cisco events were mainly about adding new features, products, services and often entire acquired companies to the portfolio. This has resulted in an extensive and very powerful platform that you can use in any way you want as an organization. One consequence of this was that the portfolio could appear rather complex and confusing. The hybrid world organizations are moving towards add even more complexity. Organizations have moved towards a distributed and hybrid infrastructure, not to mention the impact that hybrid working has on their IT environments.
So some of the complexity has been created by Cisco itself, some is the result of general market developments. The good news from Cisco is that because of the important role it plays in these developments, the company can therefore also help solve them. Chuck Robbins, Cisco’s CEO, promises to do just that during the keynote: “We want to simplify the things we do with customers. We’re working hard on that, and we’ve made some good strides in doing so.” He is also refreshingly honest when he points out that while Cisco has made some progress, it really needs to improve. Among other things, he mentions simplifying licensing and merging the various platforms that Cisco has on offer.
One of the ways in which Cisco wants to simplify things is by linking platforms together. According to Todd Nightingale, the EVP for Enterprise Networking & Cloud of the company, Cisco has put the burden of the complexity of multiple platforms existing side by side on the customer for too long. He says the company is now seeing the impact of that with these customers. The IT experience is too complex, and that ultimately means the end-user experience suffers as well. In an interview with us, Nightingale qualifies this statement a bit further, when he says that it wasn’t only Cisco that was to ‘blame for this. It was how the industry as a whole worked. This resulted in tremendous progress, he states. However, the industry more or less forgot about the impact on customers in terms of user experience.
To counter the negative side effects of more than a decade of progress, Nightingale (and Cisco) made a big announcement during Cisco Live. In fact, it was the biggest announcement of Cisco Live. Not the most surprising by the way, because it was inevitably coming, but a very important one. Cisco is going to merge Meraki and Catalyst. That is, it will ensure that Catalyst products can be managed and monitored from Meraki’s cloud platform. In doing so, Cisco says it is merging the number one cloud-managed networking platform with the number one campus networking platform.
Mind you, it doesn’t mean that the current ways to manage and connect Catalyst hardware will be retired. There will still be support for Catalyst hardware from (on-premises) DNA Center. Customers and partners can also continue to use CLI to do the management. Lastly, all Catalyst hardware that has come to market since the introduction of the Catalyst 9000 series can become part of the new management environment.
Merging Meraki and Catalyst may be a good and timely move on paper. However, what does it mean in practice? Also, how will the market react to this merger? It’s not hard to imagine that not everyone will be happy with this. Partners and organizations have been using Catalyst for a long time now. Changing how they monitor and manage that platform is quite fundamental. We wouldn’t be surprised if many of them want to continue to use Catalyst hardware in the old way.
There are several reasons for this. The first is that until at least a few years ago, Meraki had an SMB/SME focus at Cisco as far as we know. As such, the Enterprise Networking division and the Meraki division are two different parts of the company. That must affect the capabilities that Meraki offers versus what Catalyst offered and is offering. The second reason is that many partners have created a business model around the ‘complex’ nature of Catalyst management. They don’t want to supply that up.
In time, these two parts will undoubtedly move (even further) towards each other. This will not be the case immediately at launch. In any event, Cisco will be more in the driver’s seat moving forward, according to Nightingale. That is, the new offering won’t be about having as many features as possible anymore. “We don’t necessarily want to try to be feature-complete, but use-case complete”, he states. This probably means that the number of features will decrease. Nightingale more or less confirms that. He gives a (hypothetical) example that the new environment may well reduce the way you do a specific configuration from twelve ways to two ways.
Mind you, reducing features, specs and options is not necessarily a bad idea. In fact, it’s where the market as a whole is headed. We are moving more and more towards a self-driving, autonomous network, in which AI will play an increasingly important role. That no longer includes extremely complex manual configurations. Whether all current Cisco customers and partners who use Catalyst hardware already think this way, however, we wonder. That may take some time. Cisco has quite a lot of legacy there (in the positive sense of the word). As far as we are concerned, however, Cisco has taken the right step by merging the two environments. It is now up to the company to convince customers and partners of its added value.
Merging Meraki and Catalyst is about reducing complexity in Cisco’s own portfolio. In addition to this, the company also announced something today that should address more general complexity. More specifically, complexity caused by the move towards a hybrid infrastructure. To address this, Cisco announces the Nexus Cloud SaaS offering. This will allow customers to manage their Nexus devices in their data centers from the cloud. Nexus Cloud is part of (or powered by) the Intersight Platform. Intersight is a collection of services that allows organizations to deploy and optimize their distributed infrastructure, among other things. Intersight sees all the endpoints in the infrastructure and analyzes the telemetry data they generate. Additionally, there are services within Intersight that deal with optimizing Kubernetes environments and HashiCorp Terraform environments.
Adding the management of Nexus devices into organizations’ private cloud should obviously simplify and speed up things like deployment and management (think upgrades) of infrastructure a lot. It also integrates with the other services within Intersight. That means you can now manage UCS servers, HyperFlex HCI, Nexus-based private clouds, cloud-native Kubernetes environments and third-party hardware from a single location. This should bring the promised simplification another step closer for customers.
The introduction of Nexus Cloud, by the way, is not a standalone event, according to Robbins. “Everything that we can deliver as a service, we want to start delivering as a service,” he stated during his keynote at Cisco Live. As was the case with the integration of Meraki and Catalyst, the “old” way will continue to be available as well. That is, if you don’t want to use Nexus Cloud, you don’t have to.
When we talk about making it easier to set up and deploy infrastructure, you can’t ignore security. Especially in a hybrid and distributed architecture, it can quickly become a confusing topic. Jeetu Patel, the EVP Security and Collaboration at Cisco, sees this as a golden opportunity for Cisco. This is because Cisco focuses on a platform approach to security. That approach entails deep integrations between different components within the portfolio. “The complexity of hybrid architectures and the increasingly sophisticated threats lead to a preference for an integrated approach to security,” he states.
Providing integration between different components alone is not enough to get the desired simplicity. From Cisco’s point of view, there is also a fair amount of work to be done to make the experience as a whole as good as possible. That starts with something as simple as merging all the different clients into a single client or application. Now Cisco offers a VPN client, a client for DUO and about twenty more. “We really need to get away from that,” Patel indicates. So we will see a consolidation of all those security clients into one.
Solving the complexity of the past is part of Cisco’s ambition. However, this also has consequences during the development of new products and services. These must be as simple as possible from the outset, without losing any of their capabilities.
An example of such a new product is Cisco+ Secure Connect. This is (part of) the company’s SASE solution. “It’s completely turnkey and therefore easy to use,” says Patel. Cisco’s SASE offering also scales very well, with Points of Presence around the world. In addition to pre-login security, Cisco also doesn’t forget about post-login security. That’s why it developed Wi-Fi Fingerprint. This new feature makes it possible to offer continuous trusted access. The interesting thing about this feature is that it does not reveal where you are geographically, because that is undesirable. It scans the SSIDs in the area and thus determines whether an employee is in an environment where he or she can access the company network and resources with full privileges or not.
The cloud also plays an important role for Cisco in the area of security. During his keynote, Patel talked about, among other things, a firewall management center as a SaaS solution. This allows you to manage on-prem and cloud firewalls from a single location in the cloud.
All in all, Cisco wants to provide an end-to-end platform solution for prevention, detection, response and threat intelligence. The management of that platform must happen at a central location too. For that, Cisco seems to select the cloud.
Finally, there is the issue of lock-in. A vendor like Cisco has a very extensive portfolio. That immediately conjures up images of vendor lock-in. That may have been the case in the past, but has changed in accurate years. The fact that Cisco uses OpenAPI standards is an example of this. So you don’t have to buy everything from Cisco, and still have deep integrations with third-party tooling.
A final example of integration within Cisco and thus of simplifying offerings and reducing complexity is ThousandEyes WAN Insights. With Cisco’s acquisition of ThousandEyes a few years ago, Cisco acquired new WAN capabilities. One of those capabilities is ThousandEyes WAN Insights, which Cisco announced during Cisco Live. This is an integration between ThousandEyes’ offering and Cisco’s SD-WAN offering. In other words, it links the configurations of WAN connections to cloud services and other sites to the insights ThousandEyes has around the quality of the global backbone.
The idea behind ThousandEyes WAN Insights is that it is becoming increasingly important but also increasingly complex to optimally configure connections across the WAN. With this new offering, ThousandEyes continuously analyzes so-called path metrics from Cisco vAnalytics. Based on that, ThousandEyes WAN Insights provides recommendations back to Cisco SD-WAN to optimally route outbound traffic.
So ThousandEyes WAN Insights is about analyzing each individual path, not merely the connection between sites as a whole. In practice, there are often several such paths per connection. These often run via different networks, such as a provider’s fiber optic network and MPLS. According to the ThousandEyes WAN Insights announcement, it needs an average of at least 24 hours to gather the data it needs to make recommendations.
At the end of the day, the outcome of ThousandEyes WAN Insights should be that applications/environments such as Webex, Salesforce, Office 365 and Google Cloud perform better and that connections between branch offices and a data center have a higher availability and perform better.
More generally, according to Cisco, ThousandEyes WAN Insights allows you to move from a reactive to a proactive attitude. You no longer solve problems after they occur and your organization is therefore affected by them, but before this is the case. As far as we understand it, there is no automation yet of the steps to be taken to fix the upcoming problem. That is, ITOps teams need to get to work with the input from ThousandEyes. Toward the future, it should become possible to automate that step.
The announcements and strategy discussed in this article shows that Cisco takes its role as a major player in the IT and security industry seriously. It has to as well, by the way, otherwise it will lose that role. It is good to see that Cisco looks critically at its own offering too. Addressing the complexity of the current landscape starts with reducing complexity in its own offering. Not everyone will be happy with the changes. Then again, that always happens when you fundamentally change things.
Mind you, merging Meraki and Catalyst is also simply necessary in order to keep up with the other players. Enterprise networking is inexorably on the way to being cloud-managed. That’s the way it is nowadays. We are curious to see whether Meraki can carry and propagate the Catalyst legacy (in the positive sense of the word) from the cloud. In any case, Cisco will have to work hard to demonstrate the added value of this. It will certainly do so, if we are to believe Nightingale: “We are going to make it so convincing that customers will want to make the switch themselves.” That’s a nice promise, one we’ll keep in mind. We’ll be sure to come back to it in subsequent conversations with people at Cisco, too.
Editor’s note: For the first installment in this two-part series, click here to read, “Cisco on Routed Optical Networking: The efficiency of it all (Part 1)”.
5G is maturing but new service revenues remain elusive; operators have something of a tough road to hoe. As they try to figure out the new revenue piece–something that will certainly flow from delivering solutions to enterprises rather than selling more of [insert thing they could sell more of] to consumers–a secondary (primary maybe) goal is removing structural operational costs and automating whatever can be automated.
To the removal of structural costs, see the link to Part 1 of this story in the subheading. As for the automation of it all, we turn to an interview conducted on the sidelines of Cisco Live with Kevin Wollenweber, vice president of product management for Cisco’s Service Provider Network Systems business. One of the recurring themes of our conversation was how do operators–by and large risk-averse, bloated organizations seemingly unaware that their own corporate inertia is a primary culprit for stagnant ARPUs (my words, not his)–figure out what amount of automation is the correct amount of automation.
“The word automation means something different to everyone,” he said. “When we started down the path of automation, it was more about simple automation of tasks: I used to type these seven commands, now I write a script that automates the writing of those seven commands. What we’re really seeing now is the era of more automating intent, and delivering full use cases through automation. In terms of automation, I’m definitely seeing a shift of the [service] providers away from just task-based automation. They want to simplify how they use multiple tools and multiple technologies and deliver on these end use cases like what we’re doing with Routed Optical, or as they roll out Kubernetes infrastructure.”
When he’s talking through it with potential or existing customers, Wollenweber said he likes to boil things down to three primary tenets:
Wollenweber, pulling out another recurring theme from the larger Cisco Live program, pointed out that the technology isn’t really the hard part here. The bigger lift is assembling an organization in a manner that lets the technology do what’s is supposed to do which is drive operational savings. This is particularly important if you look at the vision of 5G network slicing wherein its most functional form a customer could enter network performance requirements into a portal and the operator’s network would provision and deliver those features automatically and end-to-end.
The friction is around the sheer complexity of the networks operators have built. There’s also something of a disconnect around the idea that in order to get to an end state (if there ever is an end state) of automated, intelligent, almost elegant, networks, things will probably have to get more complex before they get less complex.
“I would say a lot of the components and underlying building blocks, we’re delivering that today,” he said. “I think we see there’s going to be a lot of revenue that comes in from enterprises and private networks. The analogy I like to use a lot with what we’re doing with Routed Optical and a lot of these tools, think about Tesla and self-driving cars and what’s happening in that space. The goal isn’t to transform a car; it’s to transform the transportation industry. That’s what we’re trying to do with networks. I live in [network] transport. For me, you can’t build a house without a foundation. You can’t build a next-gen communications infrastructure without transport. What we’re really trying to do is transform the service provider infrastructure, drive that cost and efficiency moving forward.”
Cisco Systems is a company that has grown both organically and via acquisitions. As such, the networking giant has a huge portfolio of products and services that have historically been disparate. But Cisco is working to remedy that.
The company at Cisco Live 2022 unveiled a breakthrough in network management. The very popular Cisco Catalyst portfolio can now be managed via the cloud using the simple Meraki dashboard. But that’s not the only integration Cisco has been piecing together. The company’s flagship Webex collaboration offering is now feeding Cisco’s WAN Insights engine and the security portfolio is being united, according to the San Jose, Calif.-based company. It’s music to the ears of Cisco partners who are deploying these solutions but who now have a more unified networking, security and collaboration story to bring to their end customers.
Integration isn’t the only thing that has been keeping the company busy. Cisco Chair and CEO Chuck Robbins sat down with CRN at Cisco Live to talk about how the company is on “just the first step” of its unified networking story. He also discussed the macro issues that are impacting the tech industry, like supply chain constraints and how they are shaping the selling motion of channel partners. The global supply chain crisis has created a record-breaking backlog for Cisco, and the company is doing a lot of work behind the scenes to prioritize and triage the evolving situation. And speaking of selling motions, the Everything-as-a-Service (XaaS) model is gaining traction as the company released its second Cisco Plus offer earlier this month.
From the company’s simplification and integration work to supply chain and XaaS, here’s what Robbins told CRN in an exclusive interview at Cisco Live 2022.
Join Australia’s most influential channel partners at CRN Pipeline 2022 to reconnect after two extraordinary years of change!
With the announcement of Catalyst support on the Meraki platform, how big a deal is it that administrators can manage their network from a single pane of glass from the cloud?
I think it’s a significant milestone and I think it’s just the first phase. Todd [Nightingale, executive vice president and general manager of Cisco’s enterprise networking and cloud business] has done a great job with the organization of getting them here. But there’s a long list of things we’re going to do to leverage that [Meraki] dashboard and help continue to expand it, from monitoring to some level of configuration to looking at the rationalization of platforms over time. There’s a lot of things that will come as a result of it. I’m just really happy we got that out and proud of what they announced.
Partners are saying Cisco is tearing down walls to create a more unified networking story. Do you agree with that assessment?
I think that we’re bringing more offers to the market today that require integration across business units than we ever have, and this is probably a banner day for that. But there’s a lot more coming.
Look at the integrations between ThousandEyes and Talos Threat Intelligence service within AppDynamics. One of the ironic things they figured out is that Webex actually has a lot of analytics about internet performance, so now it’s feeding the [WAN Insights] engine data. Then, you have observability integration with Intersight, and [Nightingale] and Jonathan [Davidson, executive vice president and general manager, Cisco Mass-Scale Infrastructure] are working on private 5G and Wi-Fi 6 stuff together. There’s a lot of cross business unit work going on, and I think it’s a muscle that we’re going to build even more effectively as we go forward.
How is Cisco prioritizing its record-breaking backlog in the midst of a constrained supply chain?
We have a team of people that are doing this. And obviously, when the customer ordered matters. That’s the basic principle. But then you can imagine that we are working hard to prioritize first responders and those who have regulatory requirements. And a lot of those come in sort of ad hoc from customers who send us notes. I will say, though, that customers have been very conscientious about escalating for exceptions only when they need them. And in many cases, that conversation is around, ‘I need this stuff, I don’t need that—you can push it out, so don’t worry about that—but I need this stuff if you can help me.” And so, it’s actually allowed us to, in some cases, serve other customers. It’s just been complicated. It’s a daily triage for our team to try to get this done.
Do you think the supply chain crisis will accelerate the XaaS trend?
Considering that a lot of our services have hardware built into the core service, I wouldn’t say that it’s a significant accelerant because I’ve actually had some conversations where some of our challenges in getting some of these things adopted is actually still supply chain and trying to get that stuff out there. Like [for Cisco Plus] Hybrid Cloud, we went out and we allocated some equipment from our capacity to make sure we were getting those early adopters up and running so we could get the feedback because otherwise it would have taken a little longer, so I don’t think that you’re seeing an accelerant. I think [XaaS] is not immune to supply chain challenges, unfortunately. For pure SaaS offers, it’s obviously a different story.
Are partners coming along with Cisco on the XaaS business model transformation?
I think they are coming along with us. We just launched the SASE [Cisco Plus Secure Connect Now], and Cisco Plus Hybrid Cloud is still in early adoption. We have some architectural systems work that we’re doing that’ll make it a much more simple way for us to offer everything as a service. That work is being done right now and should come online in the fall, which will supply us the ability to accelerate a lot of offers in this space.
What I would say, though, is one of the big things that we have seen in the partner community is a serious uptake on taking our technology and delivering managed services to the customer. I think the desire for these kinds of services from the customer is real. We launched a new [partner program role] called ‘Provider,’ which is a managed service provider program and there are almost 2,000 partners now that are delivering something. So, for me, that validates the model. And I think over time, what you’ll see is partners having a combination of their unique intellectual property baked into a managed service that they can deliver, as well as in some cases, they may deliver ours as a service to their customers as well. I think that’s where we’ll end up—probably 2023—we’ll start to see that really come together.
Customers don’t want to be systems integrators. It just takes too long. So, you create two opportunities where partners can go in and do that systems integration work more effectively and more quickly—that’s an opportunity for them. But at the end of the day, [customers] want the outcome one way or the other, buy it as a service, or buy it as an integrated, tightly wrapped solution from a partner. I think that’s where they’re building their managed service offerings as well, even if it’s just the management of on-premises capabilities. If it’s all packaged and done, I think a customer finds that more attractive because it helps them get to that outcome they’re trying to get to.
How important is it that partners wrap their own services around XaaS and Cisco managed services?
I think you’ll see us expose APIs on our own services. If you look at Meraki, that’s a great example where we deliver that as a service. But we also have partners who take that and add their own layer of capabilities on top because of the APIs we expose. So, I think you’ll see that that opportunity arise as well. But my view is to the extent you can, you want to supply the partners the ability to add their intellectual property to it to differentiate their solutions.
Is your channel mix changing due to Cisco’s growing base of cloud and hyperscale business?
I think it has to anytime you start partnering with new partners, [especially] big ones. We’re doing more with the hyperscalers for sure [and] building out in the cloud marketplaces. And then, obviously looking at the managed services opportunity—we have really spent a lot of time at the leadership team level with Oliver [Tuszik, Cisco’s channel chief, pictured] around cloud marketplaces and managed services in particular, as he’s taken on this whole routes-to-market responsibility. Those are two of the big ones that we’re focused on right now. I think anytime you do that, you’ll see a big shift.
We’ve always been in the managed services space, but [Tuszik] has invested pretty significantly on service creation resources to help our partners actually think about and build plans to create those services—the marketing plans and sales plans. And it feels like customers are adopting those even at a faster pace than they used to. I would say that that particular provider will become a greater percentage. But it might still be some traditional providers who have moved into that space. It might be the same partner, but a different profile of what they look like.
Where should Cisco partners be placing their bets right now?
I think, clearly, security, which I think many of them already are. I think if you look at customers trying to re-architect their fundamental infrastructure to deal with these traffic patterns that we’re facing today, I think, ironically, partners could have a big role to play in just thinking about how you architect that. I think getting in the early phases of the observability space would be a good area for partners to start looking at, but it may not be for everybody early on, but over the next year or two, it would be one that I would definitely look at.
Then, obviously, hybrid work and really helping customers think through their strategy for hybrid work, I think that’s another big area. I also think DevNet. Grace [Francisco, vice president of Cisco developer relations strategy and experience] came in, and working for Liz [Centoni, Cisco’s chief strategy officer and general manager of applications], rearchitected our entire DevNet program. There’s now a standardized API architecture that teams are building, which gives these partners opportunities to build businesses on top of our platforms.
I have to say there’s probably more opportunity today than we’ve seen in 20 years. And I think that’s true for the partners as well.
Endpoint Detection and Response Market report lists the leading competitors, type, application and provides the insights, strategic industry Analysis of the key factors influencing the market during 2022- 2027.
The “Endpoint Detection and Response Market” expected to grow considerably in the forecast period 2022- 2027. The Research report sheds light on Leading Players details with best facts and figures, meaning, definition, SWOT analysis, expert opinions and growth of Endpoint Detection and Response industry in upcoming years. Leading companies of Endpoint Detection and Response Market are: Carbon Black, Inc., Cisco Systems, Inc., … The report provides key statistics on the market status of the leading Endpoint Detection and Response market Trends, share and opportunities in the market.
The Endpoint Detection and Response market is expected to register a CAGR of over 22.87% during the forecast period 2021 – 2027. The report outlines cloud and on-premise service providers of endpoint detection and response software and service in various industries.
Get a sample copy of the report at-https://www.marketreportsworld.com/enquiry/request-sample/12347304
Company Coverage: –
– Carbon BlackInc.
– Cisco SystemsInc.
– CrowdstrikeInc.
– Symantec Corporation
– Cybereason Inc.
– Deep Instinct
– Digital Guardian
– FireeyeInc.
– Guidance SoftwareInc.
– McAfeeInc.
– RSA Security (EMC)
Get a sample Copy of the Endpoint Detection and Response Market Report 2022
Market Players Competitor Analysis:
Endpoint detection and response (EDR) tools and solutions emphasize on the investigation, detection, and easing of suspicious activities of various problems on endpoints and hosts. The market for EDR tools is increasing at significant momentum across the world, Thanks to the constant advancements in the new technologies of Artificial Intelligence (AI), cloud computing, and the Internet of Things (IoT). Its implementation across security and detection malware which helps to pave the new way for the more significant development of Endpoint detection and response (EDR).
Growing Demand for Endpoint Detection and Response (EDR)
Rise in the complexity and number of complex systems being deployed across the organizations, and strict compliance requirements and rules for generating and changing passwords make it complicated to manage a large number of passwords. Further, the Breach and data stolen problems often cause expensive delays and loss of productivity. Such issues are easily solved while using Endpoint Detection and Response solutions and software are used either the on-premise environment or in a hosted environment over the cloud. Increased instances of attacks, by hackers on the organizations have increased which led to the concern towards password security solutions, and this is helping in growing demand for password management solutions around the globe.
The rapidly growing cloud platform market presents a great opportunity in the hosted of Endpoint Detection and Response market. Low success of EDR self-service projects among end-users until now is a key concern among industry players. However, as the awareness of the benefits of deploying such a model is increasing it is anticipated that self-service solutions would find rising demand during the coming years.
As, according to Breach Level index, everyday 7,125,940 data records are being stolen or lost which led to the increase in the breach level. As the demand for the Endpoint detection and response market is directly related to the level of the breach or stolen of valuable information, the more data theft and breaches will be there, higher is the demand for Endpoint detection and response market.
North America the largest market in terms of global share
Due to the high availability of adequate infrastructure, the presence of numerous global financial institutions, high frequency of cyber-attacks, and increased adoption of technologies, is expected to drive the growth of the Endpoint Detection and Response market in North America region. Different enterprises (Small and medium) in this region are steadily adopting Endpoint Detection and Response market with additional support from the advent of modern technology and Internet of things (IoT). The occurrence of a large number of competitors in the market along with rising cases of cyber security and breach of valuable information is expected to drive the market. As the demand for the Endpoint Detection and Response market is directly related to the data breach, the more data breach around the globe, higher is the demand for Endpoint Detection and Response market.
Key developments in the market
• Feb 2021: Cisco offers new Cloud-Based Endpoint Security Solutions for the Managed Security Service Providers. With this product innovation it will help to provides advanced internet security, malware protection, and enterprise mobility management.
• Oct 2017: Symantec introduces new endpoint security for the cloud generation to defense against cyber-attacks such as WannaCry and Petya. With this product innovation, the new security solutions can apply across all devices, networks, and applications to combat growing threats.
Major players: CARBON BLACK, INC., CISCO SYSTEMS, INC., CROWDSTRIKE, INC., SYMANTEC CORPORATION, CYBEREASON INC., DEEP INSTINCT, DIGITAL GUARDIAN, FIREEYE, INC., GUIDANCE SOFTWARE, INC., MCAFEE, INC., and RSA SECURITY (EMC), among others.
To Understand How COVID-19 Impact is Covered in This Report. Get sample copy of the report at –https://www.marketreportsworld.com/enquiry/request-covid19/12347304
Reasons to Purchase this Report:
Customization of the Report:
Enquire before Purchasing this report at-https://www.marketreportsworld.com/enquiry/pre-order-enquiry/12347304
Regional Analysis: –
– North America
– Asia-Pacific
– Europe
– South America
– Africa
Some Major Points from TOC: –
1. Introduction
1.1. Key Study Deliverables
1.2. Market Definition
1.3. Study Assumptions
2. Research Methodology
3. Executive Summary
4. Market Insights
4.1. Endpoint Detection and Response Market Overview
4.2. Porter’s Five Forces Analysis
4.2.1. Bargaining Power of Suppliers
4.2.2. Bargaining Power of Consumers
4.2.3. Threat of New Entrants
4.2.4. Threat of Substitute Products and Services
4.2.5. Competitive Rivalry in the Industry
4.3. Industry Value Chain Analysis
4.4. Industry Policies
5. Market Dynamics
5.1. Endpoint Detection and Response Market Drivers
5.1.1. High Proliferation Of IoT and SMART Devices
5.1.2. Increasing Demand to Reduce IT Security Risk
5.1.3. Increasing Instances of Enterprise Endpoint Targeted Attacks
5.2. Endpoint Detection and Response Market Challenges
5.2.1. High Demand for Integrated Security Solutions and Lack of Technological Awareness of EDR Solutions 5.2.2. Shortage of Skilled Workforce
6. Technology Snapshot
7. Endpoint Detection and Response (EDR) Market – Segmentation
7.1. Endpoint Detection and Response Market By Deployment Type
7.1.1. Cloud
7.1.2. On-premise
7.2. Endpoint Detection and Response Market By Component
7.2.1. Solutions
7.2.2. Services
7.3. Endpoint Detection and Response Market By Solution Type
7.3.1. Workstations
7.3.2. Mobile Devices
7.3.3. Servers
7.3.4. Point of Sale Terminals
7.3.5. Others
7.4. Endpoint Detection and Response Market By Organization Size
7.4.1. Small and Medium Enterprises
7.4.2. Large Enterprises
7.5. Endpoint Detection and Response Market By End-user Industry
7.5.1. BFSI
7.5.2. IT and Telecom
7.5.3. Manufacturing
7.5.4. Healthcare
7.5.5. Retail
7.5.6. Others
7.6. Endpoint Detection and Response Market By Region
7.6.1. North America Endpoint Detection and Response Market
7.6.1.1. United States
7.6.1.2. Canada
7.6.2. Europe
7.6.2.1. United Kingdom
7.6.2.2. Germany
7.6.2.3. France
7.6.2.4. Rest of Europe
7.6.3. Asia-Pacific
7.6.3.1. Japan
7.6.3.2. China
7.6.3.3. India
7.6.3.4. Rest of Asia-Pacific
7.6.4. Latin America
7.6.5. Middle East and Africa
8. Endpoint Detection and Response Market Companies
8.1. Carbon Black Inc.
8.2. Cisco Systems Inc.
8.3. Crowdstrike Inc.
8.4. Symantec Corporation
8.5. Cybereason Inc.
8.6. Deep Instinct
8.7. Digital Guardian
8.8 Fireeye Inc.
8.9. Guidance Software Inc.
8.10. Panda Security
8.11. Sophos Group PLC
8.12. Gemalto
8.13. F-Secure
8.14. Fortinet
8.15. RSA Security (EMC)
*List Not Exhaustive
9 .Endpoint Detection and Response Market Investment Analysis
10. Future of the Endpoint Detection and Response (EDR) Market AAAA
Browse complete table of contents at-https://www.marketreportsworld.com/TOC/12347304
About Us:-
Market Reports Worldis the Credible Source for Gaining the Market Reports that will Provide you with the Lead Your Business Needs. Market is changing rapidly with the ongoing expansion of the industry. Advancement in the technology has provided today’s businesses with multifaceted advantages resulting in daily economic shifts. Thus, it is very important for a company to comprehend the patterns of the market movements in order to strategize better. An efficient strategy offers the companies with a head start in planning and an edge over the competitors.
CONTACT US
Email: [email protected]
Phone: US +(1) 424 253 0946 /UK +(44) 203 239 8187
Press Release Distributed by The Express Wire
To view the original version on The Express Wire visit Endpoint Detection and Response Market Size In 2022 is estimated to grow at a modest CAGR| Latest Trend, Competitors
The best Linux training providers and online courses provide a simple way to learn to work with the commonly used open source (opens in new tab) Linux operating system.
This is increasingly important because Linux is becoming an important operating system to be familiar with in business, not least because the majority of web servers run on various Linux platforms. Whether it's RedHat (opens in new tab), FreeBSD (opens in new tab), Ubuntu (opens in new tab), Debian (opens in new tab) or CentOS (opens in new tab), it can help to be familiar with at least some of the basic operations, whether for accessing them directly, for understanding IT reports, or even to better understand security concerns.
Perhaps more importantly, these are also the common platforms for cloud services (opens in new tab), so to administrate these it can be very helpful indeed to have a good knowledge of Linux behind you, along with some experience of using it.
Of course, you don't even have to be a business user to want to learn Linux. After all, while Linux operating systems require regular security updates, they are rarely targeted by computer viruses simply because Linux computers are such a small market share.
And while you can opt to buy a PC or laptop running Linux (opens in new tab), it's also often possible to run many distros of Linux on an old and unused machine. Even better perhaps would be to use virtualization on your own machine, which can then be used to set up and install any and as many different flavors of Linux as you like.
If you're keen to get started but never dared take the plunge, here we'll feature the best in beginner courses on training to use Linux.
We've also featured:
Udemy is an online learning platform for those willing to develop their professional skills. And there are a number of courses available for learning Linux, such as Jason Cannon's popular Linux for Beginners course.
As the course is offered on the Udemy platform, you benefit from a detailed course overview and can find out a little bit more about your instructor.
The only course requirements are basic IT literacy and a willingness to learn. Linux for Beginners also covers setting up Linux in a virtual machine, so you can experiment without interfering with your current system setup.
The course is delivered via a series of self-paced online videos which take around six hours to complete. Linux for Beginners covers all the basics and another major boon is that it’s a highly inexpensive option.
Read our full Udemy learning platform review.
The Linux Foundation offers a number of online courses via the edX platform including this Introduction to Linux. One very attractive feature of these courses is that some of them are free to take, such as Introduction to Linux, although there is an additional fee if you want a formal 'certificate of completion'. However, there are also a number of paid for courses, which can cost anywhere from a few hundred dollars to a few thousand.
Introduction to Linux has been prepared by Jerry Cooperstein, the Training Program Director for the Linux Foundation, and there's even a short welcome message from the creator of the Linux kernel, Linus Torvalds himself; so it's safe to say you're in good hands.
The course is designed as a series of learning videos to help people who have basic IT skills to become familiar with Linux, both using a graphical interface and the command line.
Introduction to Linux is more than just text and videos, however. There are a number of ‘try it yourself’ activities, too, which allow you to perform tasks such as working with files.
Although the images and diagrams used in the videos are rather simplistic, this course is very popular on edX (being rated at 4/5 stars) and is an excellent way to familiarize yourself with the essentials of Linux.
The training website formerly named Lynda.com and now rebranded as LinkedIn Learning hosts dozens of Linux-related courses including this one, which has the full title of Linux Foundation Certified System: Essential Commands (Ubuntu).
The course focuses on mastery of the basic commands involving administration of the Ubuntu OS, one of the most popular flavors of Linux. Essential Commands (Ubuntu) is authored by Scott Simpson, who has also designed a number of Linux-related courses.
To access this course, you must first subscribe to Lynda. There's a basic and premium price plan – premium subscribers can store course materials offline, as well as obtain practice materials. Whichever option you choose, there's a 30-day free trial.
The course focuses specifically on Ubuntu, which is wise as it's one of the most popular distributions for beginners, and this focus allows for a greater level of detail than the more generic courses we've looked at. This said, some of the instructions are a little vague in places, such as the part dedicated to setting up Ubuntu in a virtual machine.
Read our full LinkedIn Learning review.
CBT Nuggets is an online learning platform hosting dozens of training courses from big players like Cisco. Payment of a monthly fee gives you access to all CBT courses – plus there's also a free 7-day trial to supply the system a whirl.
While there are a number of Linux courses available, the Linux Foundation Certified SysAdmin might be especially useful due to it being focused on the various routine tasks a SysAdmin would be expected to face.
There are more introductory courses available, but do watch the dates, as some courses are quite old, and while essential Linux commands may not have changed there's always the danger of working with depreciated code commands.
Regardless, CBT also allows you to watch training videos on its mobile app, which is available for Apple, Amazon and Android devices.
The instructor has a wonderful flair for making boring concepts entertaining. On one occasion he uses his video lecture tool to draw a picture of a puppy as he launches into a detailed diatribe on software repositories.
If you are willing to pay the subscription fee for CBT Nuggets, there are further training courses you can take for Linux and other platforms.
Red Hat Enterprise Linux (often shortened to RHEL) is a commercially developed version of Linux mainly used in big businesses. Red Hat offers comprehensive training courses for those interested in becoming a Red Hat Certified Systems Administrator.
Red Hat System Administration part one is the initial step in this journey and is designed for those who may be familiar with Linux, but haven't used it in depth. Unlike other training providers, Red Hat offers a variety of ways to undertake the course at different costs.
The training is regularly punctuated with practical exercises which test your knowledge. Each exercise will tell you whether to access your 'server' or 'desktop' virtual machine, both of which are set up for you, so you can start training right away.
This training course has been devised by the very same company that developed Red Hat Enterprise Linux, an obvious strong point because it means that all course materials come straight from the horse's mouth. However, the courses can be quite expensive and probably more aimed at enterprises looking to train employees rather than interested individuals.
QA has been around for 30 years and offers a tremendous amount of courses for professionals to gain certification and new skills. Its website includes eight Linux courses, including Linux System Fundamentals, which is aimed at IT pros with little or no experience of the OS.
All training is guided by an instructor at one of the QA training centers around the UK, or alternatively you can remotely attend a course. After contacting QA for clarification, we found the course fee is the same, regardless of which method you choose. At the time of writing, however, the 'Attend from Anywhere' option is currently unavailable for this course.
Linux System Fundamentals lives up to its name in that the course focuses strongly on helping you master the Linux command line. The desktop environment and graphical editors are discussed towards the end of the training, however. This means it's truly cross-platform, as you can use whichever Linux distribution you prefer to train with.
Reed.co.uk is best known as a recruitment website, but it also hosts a number of online courses including Ubuntu Linux for Beginners. These are in fact designed by third parties, as is the case with this course which comes from the good people at Skill Success.
Ubuntu Linux for Beginners is available as a series of video lectures, allowing you to learn at your own pace. The training itself is divided into 11 topics, covering areas such as installing Ubuntu on a virtual machine, getting started with the Ubuntu desktop and command line, setting up your own web server, basic programming and connecting via SSH.
Some of the sections are overly detailed and not really suitable for beginners to Linux, but you can always skip past these and return to them at a later date. The course currently offers excellent value-for-money, although note that the heavy discount seen at the time of writing isn’t always available (although the good news is it seems to be a recurring affair).
VTC is an online learning platform specifically geared to help trainees Boost their software skills. The Introduction to Linux course is designed to welcome newcomers to Linux and provide them with some basic knowledge of the operating system.
Unlike many of the other courses we’ve looked at, this one offers the first three chapters free of charge to visitors. This represents an excellent sneak preview and allows you to become accustomed to navigating the course outline.
After the third chapter, you can choose to pay a nominal one-time fee to access the rest of the course online, or for a similar fee you can obtain the entire course for offline viewing.
Introduction to Linux covers basic knowledge such as using the command line, hardware, networking and the X Window manager.
The course overview itself is easy to navigate and you can go back and replay videos as you wish. There's no section provided on the web page for taking notes, though, so you'll need your own text editor for this.
Government ministers and members of Parliament (MPs) have met with tech sector representatives to discuss plans for the future of the UK’s £150bn digital economy.
Tech industry figures from Zoom, Cisco, Infosys, Meta and trade association TechUK met with policymakers at the Tech Policy Leadership Conference on 20 June 2022, where they discussed the government’s new digital strategy, overcoming the UK’s tech-related skills deficit, and the government’s views on data adequacy with the European Union (EU).
Announced 13 June, the government’s digital strategy aims to help coordinate and focus efforts around the UK’s digital economy.
The government has said the strategy “brings cross-government tech and digital policies together in one unified roadmap for ensuring digital technology, infrastructure and data drives economic growth and innovation in the coming years. The plan will lead to new jobs, skills and services that benefit and level up the whole of the UK.”
Speaking at the TechUK-organised conference, digital minister Chris Philp said the digital strategy is critical to the economic future of the UK and can help deal with a range of economic issues – from wage stagnation, flatlining productivity and inflation.
“We see the growth in the tech sector and the diffusion of digital strategies and technologies across the whole economy as being a fundamental part of the answer to these economic challenges,” he said.
“The jobs that tech creates tend to be much more productive, have much better pay, encapsulate innovation and growth, and be inherently productivity creating. So by being more productive, obviously, we can reduce prices, we can produce more for the same amount of input.
“So, for all of these fundamental challenges our country and our economy faces, we see technology and the digital economy as the answer.”
Asked by Computer Weekly how inequality factors into the digital strategy – both generally (given that around one in five people in the UK live in poverty) and regionally (of the £12.4bn raised by tech startups in 2022 so far, £8.6bn went to those in London) – Philp said that there were already a number of public-private partnerships underway based around reskilling people.
“There’s a very explicit focus on digital skills and digital literacy outside of the southeast and, in particular, work with people from less advantaged backgrounds,” he said. “There’s also a massive issue with industry not being representative, for example, of women or minorities, so there’s a desire to do a lot more work there.
“There’s 2,000 masters courses in artificial intelligence [AI]. There’s, I think, 2,000 scholarships to go with that, and those scholarships are expressly reserved for people from underrepresented backgrounds, so there are things like that [which] we can do to try and to move the needle.”
In terms of investment outside the southeast, Philp noted the UK now has a number of unicorn tech companies (those valued at over $1bn) outside of London, as well as funds such as the Northern Powerhouse Investment Fund, which Philip said had £500m of government money with “an express mandate to invest across the north of England”.
On the government’s upcoming Digital Markets, Competition and Consumer Bill, Philp added that it would be published in draft form during the current Parliamentary session before being introduced formally as soon as possible after that, so that industry has time to provide feedback on the direction it is taking.
During a panel on WFH and the Future of Work, Conservative MP Matt Warman, who is leading the government review into the future of work in the UK, said that the government’s primary focus at the moment is around building up people’s digital skills: “Everything comes back to skills…you’re going to see the creeping inclusion of tech into more and more jobs, and we need a workforce that has the skills to tackle it.”
He suggested that, to make updating digital skills more appealing and less expensive for people, any training going forward should take a hybrid approach of “being partly online and partly in real life” to take advantage of the shift to working from home (WFH) facilitated by the pandemic.
Charlotte Holloway, director of government relations for UK and Ireland at Zoom and member of the TechUK board, cited a May 2022 report by the company which showed that the UK has been “a world leader in the way it adopted digital technologies”, including Zoom, during the pandemic.
“SME adoption [of digital technologies] was the highest of any G7 country, and we see the vast majority of employees want to see hybrid and or remote working continue,” she said.
However, Warman noted that there are still huge chunks of the economy for which working from home is never going to be relevant, because those jobs simply cannot be done remotely.
“Hybrid working and working from home is important, but it is a subset of flexible working, which potentially has a lot more to offer…we don’t want to inadvertently do something that exaggerates the differences between one part of the economy and another,” she said.
With the pandemic facilitating a greater shift to working from home in some sectors, Justin Madders, Labour’s shadow minister for employment rights, said “the future is hybrid” and that Labour would push the presumption that flexible working is a right, rather than something employees only have a right to request.
He agreed with Warman that “it’s really important we don’t forget all those jobs that you can never do remotely”, adding that the increasing use of AI and automation in decision-making and recruitment in companies needs to be a focus area for policymakers.
In particular, Madders noted the need for transparency, explainability and accountability when it comes to companies using AI or algorithms to make decisions regarding their employees.
On this point, Warman added that it is unacceptable for companies using algorithms in decision-making to push accountability onto the algorithm itself: “You wouldn’t allow that kind of outsourcing in any other area of business, so why should you here? The tech sector does have a frustrating and almost entirely self-defeating tendency of saying, whatever it is, ‘It’s so new and so radical it has to be treated legally differently’.”
Madders also indicated his support for a “right to switch off” – which would allow employees to ignore work-related communications such as emails and texts outside their contracted working hours – although Warman added that this would have to be done in a way that promotes flexibility for employees rather than a mandatory work cut-off time.
On 17 June, the government published its response to a consultation on the Data Reform Bill, pledging to press ahead with a number of changes, that the government says will boost businesses, protect consumers and seize the “benefits” of Brexit.
Its proposals include clamping down what it perceives as red tape around privacy and data protection to save an estimated £1bn, while strengthening data protection standards, reforming the Information Commissioner’s Office (ICO), giving innovators and researchers more flexibility in how they use data in their work, and increasing fines for people who misuse data.
Commenting on the Reform Bill, Philp told TechUK conference attendees the government “do intend that burdens on business here in the UK will be lighter than the equivalent’s elsewhere”, claiming this would not be done at the expense of privacy.
“We’re not going to make data available to people who are going to abuse or misuse it, and we do want to achieve those legitimate and important privacy considerations in a way that poses fewer burdens, so by making the regulatory regime more principles-based and outcome-based, rather than prescriptive,” he said.
Speaking in the same session, TechUK’s director of technology and innovation Sue Daley said it was critical that the UK retain its data adequacy agreements with the EU: “That is crucial to industry, not just our industry…every industry, data crosses every industry in every sector.”
The European Commission granted the UK data adequacy in June 2021, allowing businesses to continue exchanging data with Europe, but warned it may yet be revoked should the UK’s new data protection rules diverge significantly from the EU’s.
According to Philp, however: “The way that we’ve designed these data changes have been done with the purpose in mind of making sure that adequacy can be maintained – there’s no legitimate legal or technical basis upon which adequacy might be revoked.”
He added that UK government discussions were held with the European Commission during the adequacy proposal process “to make sure they didn’t pose any legal or technical risk to adequacy… so it is our firm intention and expectation that adequacy will be maintained”.
Since log analysis entails looking for a needle in a haystack, the main question is: What is the fastest way to find the needle?
Logs are ideal for storage and performance purposes because they carry so much information in a tiny space. On the other side of the coin, this makes log files hard to read and can be a costly affair during software downtime, as getting to the root cause of a software incident becomes cumbersome.
Addressing this stalemate, SiliconANGLE Media’s livestreaming studio theCUBE and root-cause-as-a-service provider Zebrium Inc. recently aired an exclusive event focusing on why finding the root cause should not be a painful process because all that is needed is automating the observer.
During the event, Dave Vellante, chief research officer of Wikibon Inc. and theCUBE industry analyst, led several sessions highlighting root cause as a service, or RCaaS, and how Cisco Systems Inc. validated RCaaS at 95.8% accuracy. Experts guests included Zebrium’s Larry Lancaster, founder and chief technology officer, and Rod Bagg, founder and vice president of engineering, as well as Cisco’s Atri Basu (pictured, left), resident philosopher, and Necati Çehreli (pictured, right), technical leader of the customer experience innovation, automation and disruption team. (* Disclosure below.)
“It’s one thing to observe the stack end to end, but who is automating the observers?” Vellante asked in his introduction to the event. “Zebrium is using unsupervised machine learning to detect anomalies and pinpoint root causes, and delivering it as an automated service.”
In case you missed it, here are three key insights from the “Root Cause as a Service” event:
Whenever a software failure or incident strikes, finding the root cause requires a DevOps engineer, site reliability engineer, or developer to go through log files manually. Not only is this mindboggling, but it’s costly, because the mean time to resolve, or MTTR, can range from hours to days. Therefore, automating the observer becomes necessary to avoid failure, according to Bagg.
“It’s great to know that something went wrong, but the root cause of why it’s happening is going to be buried in log files … to get there fast, you better automate or you’re just doomed for failure, and that’s where we come in,” Bagg stated.
Automating the observer is a stepping stone toward tackling downtime fast, and Zebrium caters for this through RCaaS, which enables root cause analysis in minutes. Bagg pointed out how RCaaS could have saved an SRE of a certain AIOps company hours of downtime.
“He hadn’t put that integration in, so it wasn’t in his dashboard when he had this incident, but it was certainly in ours,” Bagg said. “It literally would’ve saved him hours and hours. They had this issue going on for over 24 hours, and we had the answer right there in five minutes.”
Here’s theCUBE’s complete video interview with Larry Lancaster and Rod Bagg:
Dealing with logs is not an easy manual task, because even with a keen eye and significant expertise, finding the right context still takes hours. Millions and billions of lines of software and infrastructure log data have to be analyzed to unravel the details of the problem.
Since a person is limited to what they can filter manually, RCaaS takes the pain away of digging through logs through unsupervised machine learning, and it can be deployed both on-prem and in the cloud, according to Lancaster.
“Observability is a property of a system, but the problem is if it’s too complicated, you just push the bottleneck up to your eyeball,” he stated. “You can run it on-prem, just like we run it in our cloud. You can run it in your cloud or your own infrastructure.”
RCaaS not only offers an end-to-end view, but also provides a detailed root cause analysis for fast resolution. Even though this sounds too good to be true, Cisco Tested the benefits: The company gave Zebrium’s RCaaS solution a 95% accuracy rating after testing it, according to Lancaster.
“People have been trying to figure out how to automate this human part of finding the root cause indicators for a long time, and until Zebrium came along, I would argue no one’s really done it right,” he said. “So [Cisco] ran that data through the Zebrium software, and what they found was that in more than 95% of those incidents, Zebrium reflected the correct root cause indicators at the correct time.”
Since software logs are esoteric and compressed, getting visual cues becomes cumbersome. As a result, doing log analysis emerges as a black-and-white process because memorizing between the lines is difficult. Nevertheless, Zebrium’s RCaaS adds color to this process for better and faster insights, according to Cisco’s Basu.
“If you think about log analysis, it is indeed black and white,” he stated. “You’re looking at it on a terminal screen where the background is black, and the text is white. But what Zebrium does is it provides a lot of color and context to the whole process by using their interactive histogram and summaries of every incident.”
Even though log analysis plays an instrumental role when unearthing details of software downtime, it is a labor-intensive and time-consuming process.
About 8,000 engineers under Cisco’s support arm — Technical Assistance Center — used to spend 24,000 hours daily doing log analysis, which compromised their efficiency, according to Basu.
“The anecdotal evidence was that, on average, an engineer will spend three out of their eight hours reviewing logs either online or offline,” he pointed out. “ … 8,000-plus engineers, and so three hours a day; that’s 24,000 man-hours a day spent on log analysis.”
After facing challenges around maintaining its internal automation system, Cisco wanted to automate 50% of its log analysis, but RCaaS drove it to 95%, according to Cisoc’s Çehreli.
“With a sample set of close to 200 SaaS, we found out the majority of the time, almost 95% of the time, the engineer could find the log they were looking for in Zebrium’s analysis,” he stated.
Here’s theCUBE’s complete video interview with Atri Basu and Necati Çehreli:
To watch all of theCUBE’s coverage of the “Root Cause as a Service” event, see the complete event video below: