Showing 10 results
-
Tech Launch Perspective
Cybersecurity – Review of Google Cloud’s Product Announcements at RSAC 2025
July 22, 2025Google Cloud’s announcements at the RSA Conference (RSAC) 2025 advance its unified, intelligence‑centric cyber defense vision. Key updates fall into four strategic pillars: AI‑powered security operations – Gemini AI agents are embedded in the Security Operations platform, formerly Chronicle, to triage alerts autonomously, recommend remediation, and automate playbook execution through native Security Orchestration, Automation, and Response (SOAR) capabilities. This reduces Mean Time To Detect (MTTD) and Mean Time To Respond (MTTR) by minimizing manual intervention. Unified multi-cloud visibility – The new Google Unified Security platform converges Security Information and Event Management (SIEM), SOAR, and Threat Intelligence into a single console. Enhanced connectors extend telemetry coverage beyond Google Cloud Platform (GCP) to Amazon Web Services (AWS) and Microsoft Azure, delivering consistent monitoring across hybrid and multi-cloud estates. Data‑centric protection and compliance – Security Command Center’s Cloud‑native Application Protection Platform (CNAPP) adds Data Loss Prevention (DLP) and sensitive‑workload discovery features, enabling enterprises to enforce controls across Software‑as‑a‑Service (SaaS), container, and serverless environments. Assured Workloads updates address regional digital sovereignty requirements with country‑specific control configurations. Mandiant services for SOC transformation – New offerings such as Detection Migration and SOAR Engineering provide expert guidance for enterprises transitioning to Google’s platform. Flexible prepaid credits for Mandiant consulting, incident response, and training help organizations align service consumption with their evolving security needs. These capabilities strengthen Google Cloud’s position as a comprehensive cybersecurity provider. Nonetheless, enterprises will seek clearer AI governance, broader endpoint device coverage, and consistent product naming to avoid confusion stemming from frequent rebranding. -
Tech Launch Perspective
Cybersecurity – Review of CrowdStrike’s Product Announcements at RSAC 2025
July 22, 2025CrowdStrike used the RSA Conference (RSAC) 2025 to reinforce its unified, intelligence‑led cyber defense vision. The provider’s portfolio enhancements spanned four strategic pillars: Agentic AI for the Security Operations Centre (SOC) – Charlotte AI autonomously triages alerts, hunts threats with Falcon OverWatch managed hunting, and triggers remediation actions through Falcon for IT automation. This promises faster Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR) by minimizing costly human touchpoints. Identity‑centric security – Falcon Privileged Access applies behavioral risk analytics to grant or revoke elevated rights Just‑In‑Time (JIT) across on‑premises Active Directory (AD) and cloud Identity Providers (IdPs). By continuously monitoring privilege use, it blocks lateral movement and aligns with Zero Trust (ZT) principles. Unified data protection – Falcon Data Protection delivers real‑time Data Loss Prevention (DLP) that spans endpoints, cloud storage, and generative AI workloads. Organizations can enforce consistent controls and gain visibility into sensitive data flows irrespective of where users work. Cloud‑native threat detection and response – Falcon Cloud Security Innovations add runtime protection for containers, serverless functions, and AI models. New Shadow AI detection uncovers unsanctioned model usage, while expanded multi-cloud visibility reduces blind spots across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). Collectively, these launches position CrowdStrike to address key enterprise imperatives: shrinking breach windows, securing distributed identities, and protecting data in a perimeter‑less world. Nevertheless, large enterprises will expect transparent AI governance, tangible proof points on third‑party telemetry breadth, and clarity on how Falcon Data Protection differentiates from legacy DLP offerings. -
Tech Launch Perspective
Sovereign Cloud – Review of Google Cloud’s Product Update Announcements
June 30, 2025In May 2025, Google Cloud expanded its sovereign cloud offerings to address increasing demands for data sovereignty and operational autonomy. It launched Google Cloud Air-Gapped, a fully isolated environment designed for sectors with stringent data security requirements, such as defense and intelligence. This solution operates without external network connectivity and is authorized to handle US government Top Secret data. Google Cloud Dedicated, developed in partnership with Thales, a French leader in cybersecurity, offers region-specific services operated by local partners to meet national compliance standards, such as France’s SecNumCloud. The Google Cloud Data Boundary service expansion now offers customers granular control over data residency and access, complemented by the User Data Shield, which incorporates Mandiant’s security assessments to validate application security postures. While these initiatives demonstrate Google Cloud’s commitment to offering flexible, secure, and compliant cloud solutions, challenges remain. These challenges include the limited geographic availability of certain services and complexities in integrating sovereign solutions with existing multi-cloud architectures. Enterprises must carefully assess these factors when considering Google Cloud’s offerings for their sovereignty objectives. -
Tech Launch Perspective
IBM Z17 – Review of IBM’s Next-Generation Mainframe Solution
June 30, 2025In April 2025, IBM unveiled the latest evolution of its mainframe portfolio with the introduction of IBM Z17, advancing its long-standing leadership in mainframes. IBM has long been a cornerstone in the evolution of enterprise computing, with its mainframe systems being vital in supporting mission-critical operations across industries. Known for their reliability, security, and performance, IBM has consistently adapted its mainframes to meet changing business needs. IBM Z17 focuses on delivering alignment with enterprise hybrid cloud and sustainability goals. It stands out with features such as quantum-safe encryption through Crypto Express 8S, Watsonx Assistant for Z, Operations Unite, and AI-enabled processing at the core. It introduces enhanced security features and hybrid cloud readiness, offering enterprises a flexible, future-ready solution to modernize while empowering mission-critical workloads in a rapidly transforming digital landscape. This evolution in the Z series reinforces IBM’s commitment to autonomous IT, streamlining operations, enhancing user experiences, while addressing long-standing challenges such as talent shortages and legacy system constraints. -
Tech Launch Perspective
Cybersecurity – Review of SentinelOne’s Product Launch Announcements at RSAC 2025
June 30, 2025In this report, we assess SentinelOne’s evolving cybersecurity portfolio, emphasizing the strategic innovations showcased at the RSA Conference (RSAC) 2025. SentinelOne introduced Purple AI Athena, an agentic AI that autonomously triages, investigates, and remediates security incidents. It also enhanced Singularity Hyperautomation, a no‑code workflow engine that converts analyst actions into reusable playbooks and integrates with third‑party Security Information and Event Management (SIEMs) and data lakes for a unified security‑operations view. These enhancements aim to tackle persistent Security Operations Center (SOC) challenges by filtering alert noise, expediting investigations, and orchestrating cross‑tool responses at machine speed. SentinelOne also strengthened its multi‑cloud workload‑protection capabilities and highlighted interoperability across containerized and serverless environments. However, the expanded automation features may overlap with established Security Orchestration, Automation, and Response (SOAR) platforms, and large enterprises will scrutinize Purple AI’s explainability and guardrails before adopting autonomous response at scale. SentinelOne’s future roadmaps must clarify integration depth with legacy security stacks and outline a robust AI governance framework. -
Tech Launch Perspective
AI Infrastructure – Review of Dell Technologies’ Product Announcements at Dell Technologies World 2025
June 26, 2025As enterprise AI adoption scales, organizations are actively investing in infrastructure that supports diverse AI workloads, from training to inference, across data center and edge environments. AI is driving demand for specialized chips, private cloud flexibility, and scalable performance aligned with governance requirements. This report reviews Dell Technologies’ AI infrastructure-related announcements made at Dell Technologies World 2025. It outlines Dell’s current infrastructure positioning and details the key products and capabilities launched across compute, storage, and orchestration layers. It further maps these announcements to broader enterprise infrastructure themes and offers a structured view of how Dell is designing products for modular AI deployments and stack extensibility. The report is intended to help technology decision-makers, partners, and infrastructure stakeholders understand the scope of Dell’s product updates and their relevance within the AI infrastructure landscape. -
Tech Launch Perspective
Microsoft Security – Review of Microsoft Security’s Product Launch at RSAC ’24
July 03, 2024Microsoft's cybersecurity landscape in 2024 reveals its strategic investments in innovation, particularly in integrating Defender, Sentinel, and Co-pilot, and challenges in maturing existing capabilities. While these integrated solutions show promise, recent security breaches and identified vulnerabilities in Defender for Office 365 raise concerns about Microsoft's overall security offerings. In this report, we highlight the need for Microsoft to rebuild trust with federal agencies and enterprise customers by further developing Sentinel’s investigation and forensic capabilities to address evolving threats and customer requirements. The report offers detailed customer feedback, additional pain points and unmet needs, and a thorough competitive landscape review of Microsoft’s position in the cybersecurity market. It also provides actionable recommendations for Microsoft to enhance its security posture, mitigate vulnerabilities, and ensure a more secure future for its customers in an increasingly complex threat environment. Scope All industries and geographies Contents In this report, we examine: Microsoft’s cybersecurity strategy, its investments in innovation, integrated solutions (Defender, Sentinel, and Co-pilot), and key challenges Key findings and recommendations, Microsoft’s strengths and weaknesses, and improvement areas in the cybersecurity landscape Impact of security incidents on customer trust, vulnerabilities in Defender for Office 365, and the need for enhanced forensic capabilities in Sentinel Membership(s) Cybersecurity Sourcing and Vendor Management -
Tech Launch Perspective
Cloud ERP – Review of SAP Sapphire 2024 Event
June 20, 2024At its Sapphire event in Orlando, Florida on June 3-5, 2024, SAP announced the release of new features for its cloud ERP and Joule offering. This release strengthens SAP’s cloud and generative AI capabilities across industries to enhance customer value. In this report, we analyze this new release, assessing how SAP’s offering aligns with enterprise objectives and requirements, and identifying both strengths and areas for improvement. Scope All industries and geographies The report is based on Everest Group’s assessment of the information released by SAP during its Sapphire 2024 event Contents In this report, we: Outline key cloud ERP objectives and requirements Examine the themes that drive and limit demand Detail SAP’s current positioning and its cloud ERP offerings Analyze the new release’s strengths and areas of improvement Membership(s) Enterprise Platform Services (EPS) Sourcing and Vendor Management -
Tech Launch Perspective
Security – Review of Google Next ’24 Product Launch
May 06, 2024During its Google Cloud Next ’24 event, in Las Vegas on April 9-11, 2024, Google Cloud emphasized its dedication to AI security by introducing Gemini, a large language model designed to revolutionize threat detection and response. This innovation uses AI and zero-trust principles to automate tasks and strengthen security posture. Additionally, Google Cloud announced advances in simplifying endpoint security, streamlining processes, and improving threat mitigation. Another key theme was the focus on intelligence-driven security operations. By leveraging AI and analytics, Google Cloud aims to provide proactive threat intelligence and real-time threat detection, enabling faster and more agile incident response. In this report, we provide our cutting-edge insights into the new product release and explore its potential to address key challenges and objectives, empowering informed early-stage product decisions. Scope All industries and geographies The report is based on our assessment of information released by Google Cloud during its Google Cloud Next ’24 event Contents In this report, we: Outline key security issues and objectives, as well as themes that are driving and inhibiting demand Detail Google’s current positioning with respect to its security products portfolio Analyze the product’s strengths and areas of improvement Membership(s) Cybersecurity Sourcing and Vendor Management -
Tech Launch Perspective
Modern Infrastructure – Review of Google Next ’24 Product Launch
April 18, 2024In its Google Cloud Next ’24 event, held April 9-11, 2024, in Las Vegas, Google Cloud announced the release of new features under its Modern Infrastructure offering. With this release, Google has strengthened its best-of-breed positioning in data and AI workloads with strong connects in the developer ecosystem that work on enterprise-grade APIs, containers, and networking infrastructure. In this report, we gives enterprises our leading-edge view of this new product release and its potential value in addressing their key issues and objectives to aid them in early product decision-making. Scope All industries and geographies The report is based on our assessment of information released by Google Cloud at its Google Cloud Next ’24 event Contents In this report, we: Outline key enterprise infrastructure issues and objectives, as well as themes that are driving and inhibiting demand and the extent to which this new offering addresses those issues Detail Google’s current positioning and its Modern Infrastructure’ product components Provide our expert take on what works and what could be better Membership(s) Cloud and Infrastructure Services Sourcing and Vendor Management