SYDNEY, Nov. 30, 2012—Results of a study conducted by Silver Peak Systems, the leader in accelerating data over distance, revealed that software defined networking (SDN) has become a key ingredient to information technology (IT) strategy. Results showed that more than half (59 per cent) feel SDN is important to their IT strategies and 20 percent consider it “very important.”
The importance of SDN was also reflected in how soon IT managers plan to implement it. One-in-six IT managers intend to implement some form of SDN in less than 12 months, while 40 percent of those surveyed indicated that they would implement it in less than two years.
“Software defined networking is riding the fine line between promise and hype,” said Larry Cormier, senior vice president of worldwide marketing for Silver Peak. “The biggest issue is the constantly evolving definition of SDN. Do the results of this survey say we will see mass replacement of physical infrastructure in the next two years? No. But what is clear is that enterprise IT professionals are excited about virtualization. It is a proven path to both capital cost savings and operational efficiencies, which matches exactly our own recent experience as we’ve seen virtual WAN optimization adoption grow 900% in the last year.”
In other results from the study, two-thirds of those polled indicated that their companies were “going virtual” either because of better uptime and high availability (33.3%), or the ability to deliver new services faster (36.5%). Nearly three-quarters of respondents (73%) are currently using virtualization in their branch offices and nearly all (95%) have implemented virtualization in their data centers. Interestingly, given the choice between physical or virtual wide area network (WAN) optimization in the branch office, the vast majority (81.6%) indicated they prefer virtual.
“This finding certainly reinforces the value, flexibility and simplicity that IT professionals see in virtual solutions,” added Cormier.
The survey also looked at issues around cloud computing. Results show that that one-third of the respondents are currently leveraging the cloud as part of their enterprise infrastructures and nearly 20 percent plan to implement some form of cloud computing in the next 12 months. When asked about their concerns over the move to the cloud, nearly half (41.8%) were most concerned with security, while one-in-five (20%) were worried about reduced performance.
About Silver Peak
Silver Peak software accelerates data between data centers, branch offices and the cloud. The company’s software-defined acceleration solves network quality, capacity and distance challenges to provide fast and reliable access to data anywhere in the world. Leveraging its leadership in data center class wide area network (WAN) optimization, Silver Peak is a key enabler for strategic IT projects like virtualization, big data and disaster recovery. Download Silver Peak software today at www.silver-peak.com/marketplace. Note: Silver Peak Systems and the Silver Peak logo are trademarks of Silver Peak Systems, Inc. All other trademarks and registered trademarks are the property of their respective owners.
David Frost PR Deadlines, for Silver Peak Systems, Inc. +61.2.4341 5021 firstname.lastname@example.org
Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator
Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint
Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.
Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation
CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)