Managing Encryption for Data Centers Is Hard. And It Will Get Harder – Data Center Knowledge

Give up on trying to do it all yourself and leave itto the experts.

Encryption is a core tenet for cybersecurity. Attackers can't steal data that's encrypted. No matter what Hollywood says, there's no way for a hacker to get through one layer of good encryption, much less "several layers of encryption."

Related: Why Google Cloud Turned to AMD to Solve for Runtime Encryption

But encryption comes with a lot of challenges.

In a survey last fall by the Cyber Security Competency Group, 66 percent of respondents said that the management of encryption keys was either a "big" or "medium" challenge for their companies.

Related: Quantum Computing Doesnt Threaten Good Encryption--Yet

Managing keys across multiple clouds was an even bigger challenge.

In a similar study by Ponemon Institute and Encryption Consulting last year, 60 percent of respondents said that key management was "very painful."

The top reason for the pain? Knowing who's in charge of all the keys. Other pain points include lack of skilled personnel and isolated or fragmented key management systems.

Meanwhile, encryption is evolving, and keeping on top of all the encryption algorithms is a challenge. Encryption involves some heavy-duty math. It's easy to make a mistake.

Within the next decade, respondents expect to see mainstream enterprise adoption for new approaches like multi-party computation, homomorphic encryption, and quantum algorithms.

As with any security technology, encryption is a constant game of cat and mouse. Attackers try to find vulnerabilities in algorithms. To keep up, defenders improve the algorithms themselves, strengthen how they are implemented, or increase the length of encryption keys.

That means any long-term encryption strategy has to allow for the possibility of upgrading either the algorithms or the keys.

Consider for example servers managing internet communications. To encrypt a message both the sender and the receiver have to agree on what encryption method and key length they are using, said Mike Sprunger, senior manager of cloud and network security at Insight.

"When those servers are deployed, they have a list of algorithms ranked from most desired to least desired and they will negotiate to find the highest-level match," he told DCK.

Unfortunately, those lists can get out of date, he said. "Often, when servers are deployed, they're never touched again."

The one bright side here is that online communications are ephemeral. Keys are created, used, and immediately discarded.

When it comes to long-term storage, however, those keys sometimes have to be good for years. Some companies have business or regulatory requirements to keep data for a decade or longer.

If the encryption becomes outdated or the keys themselves are compromised data centers have to decrypt all their old data and re-encrypt it again with new, better encryption.

"A good practice is to rotate keys regularly," said Sprunger.

This can easily become an administrative nightmare if a data center operator is doing it alone.

"The good vendors have a mechanism for going through and recycling and replacing keys," he said.

If anything goes wrong and keys are lost, so is the data.

Encryption also plays a role in generating the certificates used to digitally sign and authenticate systems, users, and applications. If those certificates expire, get lost, or get compromised, companies could lose access to their applications or attackers can gain access.

"Most organizations do not do a good job managing that," said Sprunger. "And if they don't manage the certificates properly, they run the risk of shutting down their organization. I recommend that if they're not good at managing certificates, they go to a third-party provider."

If encryption is handled by hardware, upgrading can be a particular challenge for data centers that have opted to buy and maintain their own equipment.

Hardware acceleration can result in both speed and security improvements, but the hard-coded algorithms can also become old and obsolete.

"Now I've got to go back in and replace equipment to get a different algorithm or a bigger key size," said Sprunger.

On the other hand, if there's a particular system that has embedded hardware-based encryption, like an encrypted drive, then when the devices are replaced the new ones will automatically have the newer and better encryption in them.

"That will be a fairly painless upgrade," said Tom Coughlin, IEEE fellow and president of Coughlin Associates.

With software-based encryption that encompasses multiple systems, upgrades can be a bigger challenge.

"There may be issues, depending upon how many of these exist and how much they depend upon each other," he said.

When choosing encryption vendors, data centers should look for those that are FIPS 140-2 compliant, said Insight's Sprunger, senior manager of cloud and network security at Insight.

Getting this certification is difficult and expensive, involving third-party security reviews, but is a federal mandate for government contracts.

"Having been a director of technical engineering for a company that built encryption appliances, it's an arduous process," he told DCK. "But table stakes."

Any vendor should be able to respond right away to questions about compliance, he said.

There are many vendors and organizations working on new encryption technologies and creating standards required to ensure that we're all moving in the same direction. Data center managers looking to buy equipment that will set them up for the future particularly the quantum future will have to wait for both technologies and standards to emerge.

The picture is a little bit clearer, for now at least, when it comes to symmetric encryption. That's when the same key is used to both lock and unlock the data such as when a company stores backups.

To keep data secure for a year or two, current 128-bit encryption is enough, said Simon Johnson, senior principal engineer at Intel.

"If you're looking to keep secrets beyond 15 to 20 years, then folks are starting to recommend at least 256 bits," he told DCK. That'll keep us secure even when the first wave of quantum computers gets here.

Fortunately, today's chips can support that level of encryption, Johnson said. "The AES (advanced encryption standard) operations are there for doing that. It's just a matter of changing your software to go those lengths."

Asymmetric encryption, where one key is used to encrypt a message and a different key is used to decrypt it, is a bit more challenging. This is the type of encryption used for communications and is also known as public key infrastructure.

The next stage of evolution of this type of encryption is still up in the air, he said.

"We're still waiting for NIST (National Institute of Standards and Technology) and the academic world to really focus on providing mechanisms that will do asymmetric encryption in the post-quantum world," he said. "We're waiting for standards. Not just Intel the world is waiting for standards. There's no post-quantum standards in that space."

But creating new encryption algorithms, testing them, developing standards, getting industry buy-in, and then deploying them will take years. And that's if the new algorithm fits into the protocols that are in place today.

"But who knows what these new algorithms will look like," he said.

For example, moving to elliptic curve algorithms, one of the early favorites for quantum-proof encryption, would be a ten-year horizon, he said.

He suggests that data center managers looking ahead should first of all move to 256 encryption to protect storage.

And for asymmetric encryption used in communications, larger key sizes should provide adequate security for the intermediate future, he said.

"So, five to eight years," he said. "Though nobody knows when this mysterious quantum computer is going to appear."

Read more:
Managing Encryption for Data Centers Is Hard. And It Will Get Harder - Data Center Knowledge

Worldwide Email Encryption Industry to 2026 – Rising Instances of Enterprise Email Threats is Driving Growth – ResearchAndMarkets.com – Yahoo Finance

TipRanks

Investors are always searching out the stock markets best opportunities. One of the go-to places for outsized returns, is the biotech sector. These companies, like investors, are also on a quest; to find medical solutions where needed. When one strikes medical gold, the rewards can be phenomenal for early investors who were quick to recognize the potential. However, where the space offers handsome reward, it is fraught with risk. Should a company fail to deliver the requirements to bring a treatment to market, the implications can be brutal for the stock, and therefore, to investors pockets. After the completion of clinical tests, the final hurdle in getting a drug approved is a date with the regulators. PDUFA (Prescription Drug User Fee Act) dates the deadline of the FDAs review of new drugs - determine whether a treatment is fit for purpose or not and a yay or nay can act as a major catalyst to send shares either soaring or crashing. With this in mind, we opened the TipRanks database to get the lowdown on three biotech stocks awaiting upcoming PDUFA dates. All are currently Buy-rated, with Street analysts predicting strong gains in the year ahead. Cormedix (CRMD) We'll start off with Cormedix, a biopharma company specializing in the field of infectious and inflammatory diseases, whose PDUFA date is fast-approaching. Cormedix sole focus right now is Defencath, a synthetic broad-spectrum antimicrobial and antifungal drug, and on February 28, the FDA will decide whether it cuts the mustard. The company has been developing the treatment to thwart catheter-related bloodstream infections (CRBSIs) in patients with end-stage renal disease receiving hemodialysis via a central venous catheter. Defencath is already on the market in Europe and other regions going by the brand name of Neutrolin. B. Riley analyst Andrew DSilva thinks the FDAs recent actions bode well for the drug's chances of approval. "CRMD was granted priority review for the candidate, which reduced the FDA's review time of the submission from ~10 months to ~6 months, and the FDA subsequently determined an AdCom meeting was not needed. As a result, we are increasing the probability of success related to an FDA approval from 70% to 85%, which is in line with typical approval rates seen for candidates once an NDA/BLA have been submitted," DSilva commented. Taking onto account the candidates Phase 3 study results, in which the treatment showed a statistically meaningful drop of 71% in CRBSI in patients undergoing hemodialysis compared to heparin, DSilva thinks Defencath could save the healthcare system around $1 billion a year. This is without even taking into account the benefits related to reduced antibiotic use, improved quality of life, reduced mortality, or a willingness-to-pay (WTP) per quality-adjusted life year (QALY) gained. DSilvas calculations lead him to believe Cormedix TAM (total addressable market) for hemodialysis is in the region of $1.7 billion. In line with his optimistic approach, DSilva rates CRMD an Outperform (i.e. Buy) along with a $25 price target. Should his thesis play out, a potential gain of 75% could be in the cards. (To watch DSilvas track record, click here) Overall, CRMD shares get a unanimous thumbs up, with 4 Buys backing the stocks Strong Buy consensus rating. Shares sell for $14.30, and the average price target of $22 suggests an upside potential of ~54% from that level. (See CRMD stock analysis on TipRanks) Kiniksa Pharmaceuticals (KNSA) Next up, we have Kiniksa Pharmaceuticals, and unlike Cormedix, the company has a varied pipeline of drugs in different stage of progress - all focusing on weakening diseases with significant unmet medical need. The upcoming catalyst for Kiniksa is the March 21 PDUFA date for rilonacept, for the treatment of recurrent pericarditis (RP), an agonizing and debilitating autoinflammatory cardiovascular disease. The FDA has granted both orphan drug and breakthrough therapy status for the treatment which showed positive topline results in the Phase 3 study. With roughly 40,000 patients with RP in the U.S. either looking for or undergoing medical treatment, Kiniksas focus is on bringing to market a treatment that not only addresses the symptoms of a pericarditis recurrence but also lowers the probability of future recurrences. Among the fans is Wedbush analyst David Nierengarten, who believes the company has the right approach. We believe the commercial messaging is sound and straightforward: in addition to the impressive top-line efficacy, key secondary endpoints of patient-reported quality-of-life and tapering of background medication support its use, the 5-star analyst opined. The analyst added, In all, we see KNSAs rational commercialization strategy for rilo as encouraging and expect the program to be well received by cardiologists who treat disproportionate numbers of recurrent pericarditis patients and by patients given the rapid onset of convincing benefit. Based on all of the above, Nierengarten rates KNSA an Outperform (i.e. Buy) along with a $35 price target. This target puts the upside potential at 55%. (To watch Nierengartens track record, click here) Other analysts share a similar enthusiasm with Nierengarten when it comes to KNSA. As 3 Buy ratings were assigned in the last three months compared to no Holds or Sells, the consensus is unanimous: the stock is a Strong Buy. Meanwhile, its $31.67 average price target puts the potential twelve-month gain at ~40%. (See KNSA stock analysis on TipRanks) Aveo Pharmaceuticals (AVEO) Hoping to provide better outcomes for patients, AVEO Pharmaceuticals advances targeted medicines for oncology and other unmet medical needs. The company has various drugs in development, but the focus right now is on the FDAs upcoming decision for Tivozanib, the companys drug for the third and fourth-line treatment of advanced renal cell carcinoma (RCC). The drug is already approved to treat adult patients with advanced renal cell carcinoma (RCC) in other regions, specifically in the European Union, Norway, New Zealand and Iceland. The PDUFA date is slated for March 31 and following the positive data from the late-stage study, Baird analyst Michael Ulz believes a successful outcome is in the cards. tivozanib was shown to significantly increase quality-adjusted time without symptoms or toxicity (Q-TWiST) compared to sorafenib (15.04 vs. 12.78 months; p=0.0493), further highlighting a differentiated tolerability profile based on a quality-of-life measure for tivozanib, despite similar overall survival (OS) outcomes... We continue to see potential for approval based on the TIVO-3 study and expect investor focus to remain on the upcoming PDUFA date (March 31), which we view as the next key catalyst," Ulz opined. To this end, Ulz rates AVEO a Buy along with a $17 price target. The implication for investors? Upside of 106%. (To watch Ulz's track record, click here) It has been relatively quiet when it comes to other analyst activity. In the last three months, only 2 analysts have issued ratings. However, as they were both Buys, the word on the Street is that AVEO is a Moderate Buy. Based on the $13.50 average price target, shares could climb ~64% higher in the next twelve months. (See AVEO stock analysis on TipRanks) To find good ideas for biotech stocks trading at attractive valuations, visit TipRanks Best Stocks to Buy, a newly launched tool that unites all of TipRanks equity insights. Disclaimer: The opinions expressed in this article are solely those of the featured analysts. The content is intended to be used for informational purposes only. It is very important to do your own analysis before making any investment.

Read more:
Worldwide Email Encryption Industry to 2026 - Rising Instances of Enterprise Email Threats is Driving Growth - ResearchAndMarkets.com - Yahoo Finance

Hardware-based Full Disk Encryption Market Recent Developments and Growth Analysis 2021 to 2025| Toshiba, Intel, Samsung Electronics, Kingston The…

Global Hardware-based Full Disk Encryption Market 2020 offers detailed research and analysis of the COVID-19 impact provided in-depth information on leading growth drivers, restraints, challenges, trends, and opportunities to offer a complete analysis of the global Hardware-based Full Disk Encryption market. Market participants can use the analysis on market dynamics to plan effective growth strategies and prepare for future challenges beforehand. Each trend of the global Hardware-based Full Disk Encryption market is carefully analyzed and researched about by the market analysts.

Click the link to get a Sample Copy of the Report:

https://www.marketinsightsreports.com/reports/01122530266/global-hardware-based-full-disk-encryption-market-research-report-with-opportunities-and-strategies-to-boost-growth-covid-19-impact-and-recovery/inquiry?mode=48

Top Companies in the Global Hardware-based Full Disk Encryption Market: Toshiba, Intel, Seagate Technology PLC, Western Digital Corp, Micron Technology Inc, Samsung Electronics, Kingston, etc.

Market Overview:

Hardware encryption includes encoding of information or data into a structure, which is available to just approved clients. Encoding of the hardware requires a scrambling calculation that creates figure text, which can be perused simply after decoding. Interpreting this private information needs an approved client to type in a key or a secret word. In hardware-based encryption measure, both the encryption and unscrambling is done by singular processors. Encryption and unscrambling measure assumes a significant part in forestalling unapproved admittance to delicate or private information. Hardware encryption causes clients to secure private information during transmission and capacity. With progressions in innovation, driving business sector players are creating different hardware-scrambled answers for oblige the expanding requests in the capacity business which is giving rewarding hardware encryption market opportunity.

Market Segmented by Types:

Hard Disk Drive (HDD) FDE

Solid State Drives (SSD) FDE

Market Segmented by Applications:

IT and Telecom

BFSI

Government and Public Utilities

Manufacturing Enterprise

Others

Regional Analysis:

For comprehensive understanding of market dynamics, the global Hardware-based Full Disk Encryption Market is analyzed across key geographies namely: United States, China, Europe, Japan, South-east Asia, India and others. Each of these regions is analyzed on basis of market findings across major countries in these regions for a macro-level understanding of the market.

Important Features that are under Offering and Key Highlights of the Reports:

Detailed overview of Market

Changing market dynamics of the industry

In-depth market segmentation by Type, Application etc.

Historical, current and projected market size in terms of volume and value

Recent industry trends and developments

Competitive landscape of Market

Strategies of key players and product offerings

Potential and niche segments/regions exhibiting promising growth

Take a look at some of the important sections of the report:

Market Overview:It starts with product overview and scope of the global Hardware-based Full Disk Encryption market and later gives consumption and production growth rate comparisons by application and product respectively. In addition, it provides statistics related to market size, revenue, and production.

Production Market Share by Region:Apart from the production share of regional markets analyzed in the report, readers are informed about their gross margin, price, revenue, and production growth rate here.

Company Profiles and Key Figures:Each company profiling of leading players operating in the market growth keeping in view vital factors markets served, production sites, price, gross margin, revenue, production, product application, product specification, production sites and product introduction.

Manufacturing Cost Analysis: Readers are provided with detailed manufacturing process analysis, industrial chain analysis, manufacturing cost structure analysis, and raw materials analysis.

Market Dynamics:The analysts explore critical influence factors, market drivers, challenges, risk factors, opportunities, and market trends.

Browse for report description and TOC:

https://www.marketinsightsreports.com/reports/01122530266/global-hardware-based-full-disk-encryption-market-research-report-with-opportunities-and-strategies-to-boost-growth-covid-19-impact-and-recovery?mode=48

Finally, Hardware-based Full Disk Encryption Market report is the believable source for gaining the Market research that will exponentially accelerate your business. The report gives the principle locale, economic situations with the item value, benefit, limit, generation, supply, request and Market development rate and figure and so on. This report additionally Present new task SWOT examination, speculation attainability investigation, and venture return investigation.

Note: All the reports that we list have been tracking the impact of COVID-19. Both upstream and downstream of the entire supply chain has been accounted for while doing this. Also, where possible, we will provide an additional COVID-19 update supplement/report to the report in Q3, please check for with the sales team.

We Also Offer Customization on report based on specific client Requirement:

Free country Level analysis for any 5 countries of your choice.

Free Competitive analysis of any 5 key market players.

Free 40 analyst hours to cover any other data point.

About Us:

MarketInsightsReports provides syndicated market research on industry verticals including Healthcare, Information and Communication Technology (ICT), Technology and Media, Chemicals, Materials, Energy, Heavy Industry, etc. MarketInsightsReports provides global and regional market intelligence coverage, a 360-degree market view which includes statistical forecasts, competitive landscape, detailed segmentation, key trends, and strategic recommendations.

Contact Us:

Irfan Tamboli (Head of Sales) Market Insights Reports

Phone: + 1704 266 3234 | +91-750-707-8687

sales@marketinsightsreports.com | irfan@marketinsightsreports.com

Continued here:
Hardware-based Full Disk Encryption Market Recent Developments and Growth Analysis 2021 to 2025| Toshiba, Intel, Samsung Electronics, Kingston The...

Hardware Encryption Market From Key End-Use Sectors To Surge In The Near Future | Size, Key Companies, Trends, Growth And Regional Forecasts Research…

Global Hardware Encryption Industry: with growing significant CAGR during 2021-2026

Trending Hardware Encryption Market 2021: COVID-19 Outbreak Impact Analysis

Chicago, United States ,The report entitled Global Hardware Encryption Market 2021 by Manufacturers, Regions, Type and Application, Forecast to 2026 released byReport Hive Researchcomprises an assessment of the market which provides the real-time market scenario and its projections during 2021 to 2026 time-period. The report offers an understanding of the demographic changes that took place in recent years. The report presents an analysis of market size, share, growth, trends, statistical and comprehensive facts of the global Hardware Encryption market. This research study presents informative information and in-depth evaluation of the market and its segments based totally on technology, geography, region, and applications.

The report highlights several significant features of the global Hardware Encryption market encompassing competitive landscape, segmentation analysis, and industry environment. It shows the scope of the market and a brief overview of the definition and description of the product or service. The potential factors that can bring the market to the upward direction have been mentioned in the report. With this report, companies, as well as individuals interested in this report, will get proven valuable guidelines and direction so that they consolidate their position in the market.

The major players and the new entrants have been incorporating strategic merger and acquisition activities amongst each other to testify the factors responsible for changing dynamics. These changing dynamics implore the players to keep up with rising demands or present restrains so as to drive the broad scope of the global Hardware Encryption Market.

>>>>The study encompasses profiles of major companies operating in the global Hardware Encryption Market. Key players profiled in the report include: Western Digital Corp., Samsung Electronics Co., Seagate Technology, Micron Technology, Kingston Technology, Toshiba, Kanguru Solutions, Winmagic, Maxim Integrated Products, Netapp, Gemalto NV., Thales (E-Security)

Analysis of Global Hardware Encryption Market By Type: External Hard Disk DrivesInternal Hard Disk DriveSolid-State DriveInline Network EncryptorUsb Flash Drive

Analysis of Global Hardware Encryption Market By Application: Consumer ElectronicsIT & TelecomTransportationAerospace & DefenseHealthcareBFSIOthers

Main Aspects covered in the ReportOverview of the Hardware Encryption market including production, consumption, status & forecast and market growth2016-2020 historical data and 2021-2026 market forecastGeographical analysis including major countriesOverview the product type market including developmentOverview the end-user market including developmentImpact of Coronavirus on the Industry

Drivers And Risks:The report covers the basic dynamics of the global Hardware Encryption market. It scrutinizes several data and figures, and numerous volume trends. A number of potential growth factors, risks, restraints, challenges, market developments, opportunities, strengths, and weaknesses have been highlighted. Another factor affecting market growth has also been included in the report.

Regional Analysis:The report comprises of regional development status, covering all the major regions of the world. This regional status shows the size (in terms of value and volume), and price data for the global Hardware Encryption market. The development of the industry is assessed with information on the current status of the industry in various regions. Data type assessed concerning various regions includes capacity, production, market share, price, revenue, cost, gross, gross margin, growth rate, consumption, import, export, etc.

Report offers:

>>>>Get Full Customize report @ https://www.reporthive.com/request_customization/2315064

Regional coverage:North America (United States, Canada and Mexico), Europe (Germany, France, UK, Russia and Italy), Asia-Pacific (China, Japan, Korea, India and Southeast Asia), South America (Brazil, Argentina, Colombia etc.), Middle East and Africa (Saudi Arabia, UAE, Egypt, Nigeria and South Africa)

NOTE: Our team is studying Covid-19 impact analysis on various industry verticals and Country Level impact for a better analysis of markets and industries. The 2021 latest edition of this report is entitled to provide additional commentary on latest scenario, economic slowdown and COVID-19 impact on overall industry. Further it will also provide qualitative information about when industry could come back on track and what possible measures industry players are taking to deal with current situation.

Strategic Points Covered in TOC:

Chapter 1: Introduction, market driving force product scope, market risk, market overview, and market opportunities of the global Hardware Encryption market.

Chapter 2: Evaluating the leading manufacturers of the global Hardware Encryption market which consists of its revenue, sales, and price of the products.

Chapter 3: the competitive nature among key manufacturers, with market share, revenue, and sales.

Chapter 4: Presenting global Hardware Encryption market by regions, market share and revenue and sales for the projected period.

Chapters 5, 6, 7, 8 and 9: To evaluate the market by segments, by countries and by manufacturers with revenue share and sales by key countries in these various regions.

Profiling Key players: Western Digital Corp., Samsung Electronics Co., Seagate Technology, Micron Technology, Kingston Technology, Toshiba, Kanguru Solutions, Winmagic, Maxim Integrated Products, Netapp, Gemalto NV., Thales (E-Security)

In this report, Leading players of the global Hardware Encryption Market are analyzed taking into account their market share, recent developments, new product launches, partnerships, mergers or acquisitions, and markets served. We also provide an exhaustive analysis of their product portfolios to explore the products and applications they concentrate on when operating in the global Hardware Encryption Market. Furthermore, the report offers two separate market forecasts one for the production side and another for the consumption side of the global Hardware Encryption Market. It also provides useful recommendations for new as well as established players of the global Hardware Encryption Market.

Get Free Sample Copy of this report: https://www.reporthive.com/request_sample/2315064

Hardware Encryption Market CAGR Competitive Landscape, Market Research, Hardware Encryption Market Best Companies in The world , Hardware Encryption Market Top Companies in The world, Hardware Encryption Market Trend, Hardware Encryption Trends, Hardware Encryption growth, Hardware Encryption industry, Hardware Encryption Covid-19 Impact Analysis

Why Go For Report Hive Research?

Report Hive Research delivers strategic market research reports, statistical surveys, industry analysis and forecast data on products and services, markets and companies. Our clientele ranges mix of global business leaders, government organizations, SMEs, individuals and Start-ups, top management consulting firms, universities, etc. Our library of 700,000 + reports targets high growth emerging markets in the USA, Europe Middle East, Africa, Asia Pacific covering industries like IT, Telecom, Semiconductor, Chemical, Healthcare, Pharmaceutical, Energy and Power, Manufacturing, Automotive and Transportation, Food and Beverages, etc. This large collection of insightful reports assists clients to stay ahead of time and competition. We help in business decision-making on aspects such as market entry strategies, market sizing, market share analysis, sales and revenue, technology trends, competitive analysis, product portfolio, and application analysis, etc.

Get in Touch with Us :Report Hive Research500, North Michigan Avenue,Suite 6014,Chicago, IL 60611,United StatesPhone:+1 312-604-7084

https://neighborwebsj.com/

Visit link:
Hardware Encryption Market From Key End-Use Sectors To Surge In The Near Future | Size, Key Companies, Trends, Growth And Regional Forecasts Research...

Hardware-based Full Disk Encryption Market Size, Growth And Key Players- Seagate Technology PLC, Toshiba, Western Digital Corp, Intel, Samsung…

Fort Collins, Colorado: Reports Globe added the latest research report on future growth opportunities, development trends, and forecasts for 2027 of the Hardware-based Full Disk Encryption Market. Global Hardware-based Full Disk Encryption Market Report provides an overview of the segments and sub-segments including Product Types, Applications, Companies, and Regions. This report describes the overall size of the Hardware-based Full Disk Encryption market through analysis of historical data and future forecasts.

The report presents unique and pertinent factors that are expected to have a material impact on the Hardware-based Full Disk Encryption market during the forecast period. This report also provides an analysis of the impact of the COVID-19 pandemic on the Hardware-based Full Disk Encryption market. This report contains a substantial and detailed amount of information that will provide new entrants with the most complete understanding. The report explains the historical and current trends that are shaping the growth of the Hardware-based Full Disk Encryption market.

(Exclusive Offer: Flat 30% discount on this report)

Request a Sample Before Buying this Report @ https://reportsglobe.com/download-sample/?rid=178917

The Following Companies are Major Contributors to the Hardware-based Full Disk Encryption Market Research Report:

Segment Analysis

The report categorizes the Hardware-based Full Disk Encryption industry by segment, including product type and application. Each segment is valued based on its growth rate and share. In addition, analysts examined potential regions that could prove useful for Hardware-based Full Disk Encryption manufacturers in the coming years. The regional analysis includes reliable value and volume forecasts and thus helps market participants to better understand the Hardware-based Full Disk Encryption industry as a whole.

Hardware-based Full Disk Encryption Market Segmentation, By Type

Hardware-based Full Disk Encryption Market Segmentation, By Application

Request a Discount on the report @ https://reportsglobe.com/ask-for-discount/?rid=178917

Geographical scenario:

-Middle East and Africa (Gulf States and Egypt)-North America (USA, Mexico and Canada)-South America (Brazil etc.)-Europe (Turkey, Germany, Russia, UK, Italy, France, etc.)-Asia Pacific (Vietnam, China, Malaysia, Japan, Philippines, Korea, Thailand, India, Indonesia, and Australia)

Scope of the Report:

The Hardware-based Full Disk Encryption Market Research Report is a comprehensive publication that aims to determine the financial outlook for the market. For the same reason, it offers a detailed understanding of the competitive landscape. It examines some of the leading players, their leadership styles, their status in research and development, and their expansion strategies.

The report also includes product portfolios and a list of products in development. It provides a detailed explanation of the advanced technologies and investments to upgrade existing technologies.

Collectively, this research repository encapsulates data of Hardware-based Full Disk Encryption market to offer strategic decision-making abilities to various investors, business owners, decision-makers as well as policymakers.

View market snapshot before purchasing @ https://reportsglobe.com/product/hardware-based-full-disk-encryption/

Key questions answered in the report:

1. What is the Keyword Markets Growth Potential?2. Which product segment will get the lions share?3. Which regional market will lead in the coming years?4. Which application segment will grow steadily?5. What growth opportunities could arise in the Hardware-based Full Disk Encryption industry in the coming years?6. What are the main challenges for the Hardware-based Full Disk Encryption market in the future?7. Which companies lead the Hardware-based Full Disk Encryption market?8. What are the main trends that are positively influencing market growth?9. What growth strategies are players considering to stay in the Hardware-based Full Disk Encryption market?

Table of Contents

1 scope of research2 summary3 Competition from manufacturers4 Market size by type5 Market size by application6 Market Size by Region7 Company profileEight value chain and sales channel analyzes9 Analysis of market drivers, opportunities, challenges and risk factors10 key findings from the Hardware-based Full Disk Encryption study11 Appendix

Request customization of the report @ https://reportsglobe.com/need-customization/?rid=178917

Key target audience for Hardware-based Full Disk Encryption report:

The report is insightful documentation and provides significant insights to customers, business owners, decision-makers, providers, distributors, suppliers, policymakers, manufacturers, investors, and individuals who have a keen interest in the Hardware-based Full Disk Encryption market.

How Reports Globe is different than other Market Research Providers:

The inception of Reports Globe has been backed by providing clients with a holistic view of market conditions and future possibilities/opportunities to reap maximum profits out of their businesses and assist in decision making. Our team of in-house analysts and consultants works tirelessly to understand your needs and suggest the best possible solutions to fulfill your research requirements.

Our team at Reports Globe follows a rigorous process of data validation, which allows us to publish reports from publishers with minimum or no deviations. Reports Globe collects, segregates, and publishes more than 500 reports annually that cater to products and services across numerous domains.

Contact us:

Mr. Mark Willams

Account Manager

US: +1-970-672-0390

Email: [emailprotected]

Website: Reportsglobe.com

Sarkari Results, Thrive Market Research

More here:
Hardware-based Full Disk Encryption Market Size, Growth And Key Players- Seagate Technology PLC, Toshiba, Western Digital Corp, Intel, Samsung...

Encryption Software Market Size, Top Key Players, Applications, Business Statistics, Trends and Forecast 2021-2027 – Express Keeper

Fort Collins, Colorado: The Reports Globe added a new major research report covering the Encryption Software Market. The study aims to provide global investors with a groundbreaking decision-making tool that covers the key fundamentals of the Encryption Software market. The research report will give the total global market revenue with historical analysis, metrics including total revenue, total sales, key products, instrumental factors, and challenges. The reporting data comes from extensive primary and secondary sources of information with a reliable comprehensive view of the Encryption Software market. The research report relies on global governance bodies as the primary data sources with independent analysis of projections and objective estimates of growth.

The Encryption Software Market research report will also examine the key stakeholders market share in their global potential for global converters. This qualitative and quantitative analysis includes key product offerings, key differentiators, revenue shares, market size, market conditions and strategies. The report will also cover key agreements, collaborations, and global partnerships that will soon change global market dynamics.

Global Encryption Software Market was valued at 6.87 billion in 2019 and is projected to reach USD43.38 billion by 2027, growing at a CAGR of 27.96% from 2020 to 2027.

(Exclusive Offer: Flat 30% discount on this report)

Download Exclusive Sample PDF along with few company profiles @ https://reportsglobe.com/download-sample/?rid=30360

Market Research Report Covers Impacts of COVID-19 To The Market.

The COVID-19 pandemic has dramatically changed the dynamics of the Encryption Software market. This market research report has extensive data on the impact on the market. The companys research and analyst team monitored the market during the coronavirus crisis and spoke to industry experts to finally prepare a detailed analysis of the future market size. They followed a rigorous research methodology and participated in primary and secondary research to produce the Encryption Software market report.

This market report contains the parameters it provides to new and new market entrants through potential sales growth, profit potential, product mix, price factors and structured market data. This report contains important government policies and regulations that largely govern the Encryption Software market. In addition, it provides the industry players with a comprehensive view of the Encryption Software market including the most recent deals, mergers, acquisitions, partnerships, and even defaults.

The prominent Companies Covered in the Market Report

Request a Discount on the report @ https://reportsglobe.com/ask-for-discount/?rid=30360

Market Segments and Sub-segments Covered in the Report are as per below:

Geographical scenario:

The report explains the current Encryption Software market trends in regions spanning North America, Latin America, Europe, Asia Pacific, the Middle East, and Africa, with an emphasis on the market performance of the major countries in each region.

This market segmentation analysis is intended to support companies in developing product development and marketing strategies in their respective regions. Reports Globe also offers customization of reports and quarterly/yearly report updates to help companies adopt A-Games.

View market snapshot before purchasing @ https://reportsglobe.com/product/global-encryption-software-market/

Following major key questions are addressed through this global research report:

1. What will be the Encryption Software market size over the forecast period?2. What are the demanding regions for making significant growth in the upcoming future?3. What are the challenges in front of the Encryption Software market?4. Who are the key vendors in the Encryption Software market?5. What are the effective sales patterns and methodologies for boosting the performance of the Encryption Software market?6. What are the different ways to find out potential customers as well as global clients?7. Which factors are hampering the Encryption Software market?8. What are the outcomes of SWOT and porters five techniques?9. What are the demanding trends of the Encryption Software market?

Key strategic developments in the Encryption Software market:

This global study also includes the key strategic developments of the Encryption Software market including the new product launchings, partnerships and collaboration among the key players functioning at the global level.

Request customization of the report @ https://reportsglobe.com/need-customization/?rid=30360

Key target audience for Encryption Software report:

The report is insightful documentation and provides significant insights to customers, business owners, decision-makers, providers, distributors, suppliers, policymakers, manufacturers, investors, and individuals who have a keen interest in the Encryption Software market.

How Reports Globe is different than other Market Research Providers:

The inception of Reports Globe has been backed by providing clients with a holistic view of market conditions and future possibilities/opportunities to reap maximum profits out of their businesses and assist in decision making. Our team of in-house analysts and consultants works tirelessly to understand your needs and suggest the best possible solutions to fulfill your research requirements.

Our team at Reports Globe follows a rigorous process of data validation, which allows us to publish reports from publishers with minimum or no deviations. Reports Globe collects, segregates, and publishes more than 500 reports annually that cater to products and services across numerous domains.

Contact us:

Mr. Mark Willams

Account Manager

US: +1-970-672-0390

Email: [emailprotected]

Web: reportsglobe.com

Read the original here:
Encryption Software Market Size, Top Key Players, Applications, Business Statistics, Trends and Forecast 2021-2027 - Express Keeper

Biden Justice Dept. Asks British Court to Approve Assange Extradition – The New York Times

WASHINGTON The Biden administration has signaled that for now it is continuing its predecessors attempt to prosecute Julian Assange, the WikiLeaks founder, as the Justice Department filed a brief this week appealing to a British court to overturn a ruling that blocked his extradition to the United States.

This week, human rights and civil liberties groups had asked the acting attorney general, Monty Wilkinson, to abandon the effort to prosecute Mr. Assange, arguing that the case the Trump administration developed against him could establish a precedent posing a grave threat to press freedoms.

The Justice Department had been due to file a brief in support of its appeal of a judges ruling last month blocking the extradition of Mr. Assange on the grounds that American prison conditions are inhumane.

The appeal was lodged on Jan. 19 the last full day of the Trump administration so the decision to proceed with filing the brief was the first opportunity for the Biden administration to reconsider the disputed prosecution effort. A spokeswoman from the Crown Prosecution Office said on Friday that the American government filed the brief on Thursday.

The brief itself was not immediately available. Filings in British court, unlike in the United States, are not public by default. Marc Raimondi, a Justice Department spokesman, said the American government was not permitted to distribute it, but confirmed its filing.

We are continuing to seek extradition, he said.

The case against Mr. Assange is complex and does not turn on whether he is a journalist, but rather on whether the journalistic activities of soliciting and publishing classified information can be treated as a crime in the United States. The charges center on his 2010 publication of diplomatic and military files leaked by Chelsea Manning, not his later publication of Democratic Party emails hacked by Russia during the 2016 election.

Prosecutors have separately accused him of participating in a hacking conspiracy, which is not a journalistic activity. The immediate issue at hand in the extradition case, however, is neither of those things, but rather whether American prison conditions are inhumane.

In January, a British judge, Vanessa Baraitser of the Westminster Magistrates Court, denied Mr. Assanges extradition citing harsh conditions for security-related prisoners in American jails and the risk that Mr. Assange might be driven to commit suicide if held under them. She held that the mental condition of Mr. Assange is such that it would be oppressive to extradite him to the United States.

In its new brief, the Justice Department was expected to defend how the federal Bureau of Prisons handles security inmates and to argue that such conditions were not a legitimate reason for the close American ally to block an otherwise valid extradition request.

Rebecca Vincent, the director of international campaigns for Reporters Without Borders, said the group was extremely disappointed that the Biden Justice Department had pressed on with the effort to bring Mr. Assange to the United States for prosecution.

This marks a major missed opportunity for President Biden to distance himself from the Trump administrations terrible record on press freedom, Ms. Vincent said.

She warned: The U.S. government is creating a dangerous precedent that will have a distinct chilling effect on national security reporting around the world. No journalist, publisher or source can be confident that they wouldnt be criminally pursued for similar public interest reporting.

Ms. Vincent also characterized the case against Mr. Assange as political. In January, however, Judge Baraitser had rejected Mr. Assanges arguments that the American charges against him were politically motivated, ruling that they had been brought in good faith. The Justice Department had said that it was gratified by that part of her ruling.

During the Obama administration, Justice Department officials weighed whether to charge Mr. Assange. But they worried that doing so would raise novel First Amendment issues and could establish a precedent that could damage press freedoms in the United States, since traditional news organizations like The New York Times also sometimes publish information the government has deemed classified.

The Obama administration never charged Mr. Assange. But the Trump administration moved forward with a prosecution. Its first indictment merely accused Mr. Assange of a hacking conspiracy, but it then filed a superseding indictment charging him under the Espionage Act in connection with publishing classified documents.

In 2019, as Mr. Biden was seeking the Democratic Partys nomination for president, The Times asked whether he would keep or jettison the novel Espionage Act charges against Mr. Assange the Trump administration had brought.

In a written answer, Mr. Biden demurred from taking a position on the case but drew a line between journalistic activities and hacking.

Journalists have no constitutional right to break into a government office, or hack into a government computer, or bribe a government employee, to get information, Mr. Biden wrote, adding, We should be hesitant to prosecute a journalist who has done nothing more than receive and publish confidential information and has not otherwise broken the law.

Charlie Savage reported from Washington, and Elian Peltier from London.

Read the original:
Biden Justice Dept. Asks British Court to Approve Assange Extradition - The New York Times

Same as the Old Boss, Julian Assange Edition – CounterPunch.org – CounterPunch

Drawing by Nathaniel St. Clair

On February 9, the US Justice Department announced that US President Joe Biden, as in so many other areas, intends to serve Donald Trumps second term when it comes to persecuting heroes guilty of exposing US war crimes and embarrassing American politicians.

As Trumps presidency drew to an end, some activists held out hope that hed pardon political prisoner Julian Assange, whose incarceration at the hands of the Swedish, British, and US governments has, according to the UNs Working Group on Arbitrary Detention, gone on for more than a decade now (between British prisons and de facto house arrest in Ecuadors London embassy). No dice. Trump handed out plenty of pardons to political cronies, but left Assange in stir.

In January, British judge Vanessa Baraitser declined to extradite the founder of WikiLeaks to the US on trumped up (pun intended) espionage charges. Not because the charges are clearly nonsense, though they are. Nor because neither Assanges person or his alleged actions were subject to US jurisdiction, though they werent. She denied the extradition because she (probably correctly) considers Assange a suicide risk if hes handed over.

The Biden regime intends to appeal Baraitsers decision instead of dropping the false charges, firing the prosecutors who filed them, pardoning Assange, and awarding him the Presidential Medal of Freedom, all of which would come to far to less than he deserves.

Bidens attitude is less surprising than Trumps. During the 2016 campaign, Trump praised WikiLeaks for releasing Democratic National Committee emails that detailed the joint campaign between the DNC and Hillary Clintons presidential campaign to ensure that she, and not US Senator Bernie Sanders, received the partys presidential nomination.

Prior to that, WikiLeaks had embarrassed then Secretary of State Clinton with its Cablegate release, which demonstrated that Clinton had ordered US diplomats to spy on UN officials.

And even before that, WikiLeaks had released Collateral Murder, a classified US military video of US troops murdering Iraqi civilians and Reuters journalists in Baghdad. The murders took place before Obama became president, but his regime participated in the militarys cover-up of the incident and oversaw its failure to bring the killers to justice.

You can probably see why Joe Biden is less inclined than Donald Trump to let such a criminal walk free. If theres a mystery here, its not why Biden wont do the right thing; its why Trump didnt.

The wheels of justice may turn slowly, but if they grind exceedingly fine the British courts will deny extradition with finality and free Assange, while Biden, Trump, and numerous others will eventually answer to charges of violating US Code, Title 18, Sections 241 and 242 conspiracy against Julian Assanges rights and deprivation of those rights under color of law.

View post:
Same as the Old Boss, Julian Assange Edition - CounterPunch.org - CounterPunch

UK government to appoint free speech champion to spearhead right-wing offensive at universities – WSWS

Education Secretary Gavin Williamson has announced plans to guarantee free speech at UK universities. The government is creating the legal framework for state intervention on the campuses, to protect right-wing reactionaries and silence protest.

Williamsons proposals include placing a free speech condition on universities which want to access public funding, allowing the Office for Students (OfS) to fine institutions which breach the condition, appointing a free speech champion to investigate alleged breaches and recommend redress, and allowing academics, students or visiting speakers to sue for compensation where they claim to have had their free speech infringed.

The requirements will also apply directly to student unions, which the government is looking at bringing under the remit of the OfS instead of the Charity Commission.

The announcement follows a letter sent by Williamson to the outgoing and incoming heads of the OfS, Sir Michael Barber and Lord Wharton of Yarm. Under the heading Specific priorities, the education secretary criticised Barber for failing to intervene aggressively enough on the campuses and called on Wharton to do more:

[T]o date there has been little regulatory action taken by the OfS in relation to potential breaches of the registration conditions relating to freedom of speech and academic freedom I intend to publish a policy paper on free speech and academic freedom in the near future and I would like the OfS to continue to work closely with the Department to deliver this shared agenda and ensure our work is closely aligned. I would also like it to take more active and visible action to challenge concerning incidents that are reported to it or which it becomes aware of, as well as to share information with providers about best practice for protecting free speech beyond the minimum legal requirements.

Wharton is a Tory peer who was given the OfS position despite lacking any experience in the higher education sector.

Williamsons free speech proposals are taken almost word-for-word from a report by the right-wing Policy Exchange thinktank last summer, Academic freedom in the UK: Protecting viewpoint diversity. The report called for a Director for Academic Freedom, an academic freedom clause, for the OfS to be willing to exercise its existing powers to fine HEPs [higher education providers] for alleged breaches of academic freedom and for student unions to be subject to the same regulations.

Tom Simpson, a professor at Oxford University and an associate fellow at the Policy Exchange, welcomed Williamsons proposals, before asserting that a very online culture allows the views of a minority to exert disproportionate influence on administrators, and to exert a chilling effect on other academics.

The World Socialist Web Site described the Policy Exchange report as a manifesto for a political alliance of the Tory government and its social Darwinist periphery, the libertarian right, and the most right-wing sections of the Labour Party. It argues for a combined intervention into both academia and student politics on campus to suppress left-wing protest and give free-reign to far-right ideologues.

That the right feel able to posture as defenders of democratic rights is thanks to the role played by the pseudo-left and identity politics on campus. A similar report by the right-wing Adam Smith Institute (ASI) states, Student unions are perceived as ineffective by students, lack democratic legitimacy, and undermine freedom of association and expression Only one-in-ten students actively participate in student union elections.

This much is true. But contrary to the ASIs self-serving claims, it is a result of the right-wing climatethe scramble of the affluent middle class for personal advance based on assertions of identitywhich dominates official campus politics.

Identity politics has nothing to do with socialist politics, which seeks to unify the working class, allied with the best elements of student youth, in a struggle not for individual or sectional advantage but for social equality. Rooted in irrationalist and reactionary postmodern philosophy, identity politics is opposed to the Enlightenment, and above all Marxism, and is advanced by the pseudo-left to obscure the fundamental division in societyclass.

Lacking popular support or democratic principles, the identity politicians have utilised the practice of no platforming inherited from the 1970s. The tactic gained broader sympathy among students several decades ago because it targeted fascists and the far-right. Even then, it had dangerous political implications in that it was often linked to appeals for proscriptions and bans by the state and other institutions when history has shown repeatedly that measures nominally introduced against the right are then routinely deployed against the left.

The lurch to the right by the petty-bourgeois layers that find a home either in the Labour Party apparatus, various identity-based groups and campaigns, and in the pseudo-left groups, has exposed more clearly the reactionary implications of no-platforming.

By far the most outrageous case is the attempted blacklisting of WikiLeaks founder Julian Assange, on grounds of the Swedish states concocted sexual assault investigation. In 2012, George Galloway was banned by the National Union of Students on the grounds of being a rape denier for defending Assange. In 2015, Cambridge Students Union attempted to ban Assange from speaking on campus, and Sheffield Students Union tried the same in 2016. Both efforts were overturned by popular opposition.

Campus identity politics assumes its most absurd dimensions in the conflict between different identity groups. In 2016, a National Union of Students LGBT representative at Canterbury University refused to speak alongside gay rights advocate Peter Tatchell, accusing him of being racist and transphobic. In 2015, the student unions womens officer at Cardiff University led a petition of 3,000 students to bar feminist campaigner Germaine Greer from speaking, again for her transphobic views. In 2015, feminist Julie Bindel was barred from speaking at Manchester University students union, which claimed her presence could incite hatred towards and exclusion of our trans students. Bristol University students union voted for a blanket ban on trans-exclusionary radical feminists, most prominently Greer, in 2018. Last year, Oxford historian of class and gender relations Selina Todd was no-platformed by the Oxford International Womens Festival after being labelled a transphobe.

online meeting: Saturday, February 20, 2pm GMT

No to the reopening of unsafe schools! For a European-wide political strike!

This is a reactionary, anti-democratic mess. The de facto drawing of a line between someone like Tatchell and members of the far-right is hysterical nonsense and has repulsed large sections of the population, opening the door to government intervention on the campuses, which will be used to invite in the real fascistic right.

Under the protection of the governments new free speech requirements, student protests of the kind which challenged social Darwinist pseudoscientist Noah Carl being awarded a prestigious research fellowship at Cambridge University will be suppressed. Academics like Oxfords Nigel Biggar, who specialises in apologias for the crimes of the British Empire, will be allowed to get on with their mission of creating a right-wing counter-spiral in academia.

The fascists Tommy Robinson and Stephen Bannon, French National Rally leader Marine Le Pen and Alternative for Germany spokesperson Alice Weidel have previously been invited to speak at the Oxford Union, all provoking significant opposition that would now be punished as an attack on free speech. Such invites of despised far-right figures will be encouraged at campuses across the country, led by so-called free speech societies set up by darling of the Tory right and anti-lockdown campaigner Toby Young. Young was the Tories first pick to lead the OfS before his attendance at a secret eugenics conference was exposed in the London Student .

Events in Germany provide a sharp warning. On February 3, seventy German academics founded the Network for Academic Freedom with the declared mission of rehabilitating discredited Professor Jrg Baberowskia leading academic voice of right-wing extremismto promote other far-right voices and demonise students who voice opposition to the relativisation of the crimes of German imperialism, in particular of the Third Reich.

The hypocrisy of the British governments claim to be acting in defence of free speech is on display in Williamsons letter to the OfS heads. Two subheadings below Free Speech and Academic Freedom is Antisemitism, under which the education secretary asks the OfS to help force higher education institutions to adopt the International Holocaust Remembrance Alliance (IHRA) definition of antisemitism. The IHRA definition provides a mechanism to attack free speech regarding opposition to Israel and the ethnic-nationalist ideology of Zionism. It has been used to justify the mass purge of left-wing Labour members and the cancellation of pro-Palestinian events.

The UK government is also proceeding with a review of left-wing extremism aimed at criminalising huge swathes of the left. It will target far-Left fringe groups accused of hijacking important causes and mainstream cultural activitythat is, seeking to advocate their political views. The outcome of this review will build upon the surveillance of students already in place under the Prevent scheme supposedly targeting radicalisation by Islamist groups.

The International Youth and Students for Social Equality (IYSSE) unequivocally oppose the governments attempt to regulate political life on campus. State intervention must be opposed and political disputes fought out democratically among students, including, as an urgent question, how to oppose the sharp turn to the right being carried out by the ruling class.

Sign up for the WSWS Educators Newsletter

Receive news updates and information on the fight against the unsafe reopening of schools.

Go here to read the rest:
UK government to appoint free speech champion to spearhead right-wing offensive at universities - WSWS

Weighing The Hidden Costs Of Open Source – IT Jungle

February 15, 2021Alex Woodie

One of the perceived benefits of using open source software is cost. Its often free to obtain, and users can get technical support au gratis through community supported websites. But what is often missing from that equation are hidden costs associated with running that software in production environments. An IDC report commissioned from IBM seeks to put a number to those costs.

In production environments, where the risk of a business interruption due to IT issues is high, companies must make the conscious decision to dedicate some of its staffs time to supporting a given piece of open source software, according to the IDCs report, titled The Business Value of IBM Open Source Support.

The IT professionals must know how the open source software works, and what to do if there is a configuration or operational problem, according to IDC authors Al Gillen and Matthew Marden. These resources need to be available when the software is in use, and if it is supporting a 247 operation, it may be necessary to have technical expertise on call around the clock, the pair write in the report.

Version control is another cost that must be factored into the equation. New releases of open source software are issued frequently sometimes on a weekly basis, according to IDC and this software must be vetted to ensure that the fixes and new features they contain are compatible with existing software (not to mention ensuring that it doesnt contain viruses or other malware). Major upgrades are occasionally necessary to ensure the company can continue to benefit from the new features, and to ensure that it doesnt break other software.

Another hidden cost highlighted by the IDC is the time that the in-house IT expert will dedicate to the community around the open source project. While not every IT professional contributes to the upkeep and development of open source software (and some companies may prefer their employees not spend any time on it), many IT pros do spend not insignificant amounts of time on these endeavors. If nobody ever contributed any time, the open source community would likely cease to exist.

The IDC highlighted several situations where self-support of software could be less than ideal. For example, a newly found security vulnerability in an update, or a configuration issue in the software thats not easily resolved by onsite IT staff. These issues could potentially lead to downtime, and thus the company would seek to avoid such situations.

Some of the open source software projects that IBM supports.

There are commercial support packages available for many major open source products and projects. Red Hat, which IBM acquired for $34 billion in 2019, is perhaps the best example of the commercial open source business plan in action.

Linux is one of the most widely used open source projects in the world, and is installed on the majority of the worlds new servers. Customers are free to use whatever Linux distribution suits their fancy: Ubuntu, Kubuntu, Fedora, Nitrux, Kodachi, Puppy Linux, and CentOS, among dozens of other (colorfully named) distros.

But for organizations that want the peace of mind of having a vendor providing professional support, Red Hat Enterprise Linux (RHEL) is a popular option. (And following Red Hats decision to cease supporting CentOS, to the chagrin of organizations that had been expecting that support through 2029, RHEL may become even more popular.)

Whats the value of commercial support for open source software, and specifically, IBMs open source support package? IDC convened a panel of 11 folks from 11 large companies in the U.S., India, France, Spain, the UK, and Nigeria. The 10+ companies had an annual revenue of about $11 billion and about 38,000 employees (although the median figures were $1.6 billion and 12,250, respectively, which meant there were one or more really, really big firms driving the average up).

The companies in the panel told IDC there were multiple reasons for their decision to go with IBM open source support, including having the confidence in using a trusted vendor with deep practical and institutional knowledge of the technologies and how to support their IT organizations, IDC says.

The customers specific support needs varied with the types of types of software they were using. Some users stated they were afraid that the complexity of their systems would impact operating systems and databases, while others said they desired the confidence of having a vendor stand behind security and DevOps tools.

One customer with a support contract for an application runtime/database stated: We tested a workload without strict policies and what we learned is that without the policies associated with paid support from IBM, the project was not well-managed, and the housekeeping wasnt done. A vendors support team can keep your house in order . . . IBM helps provide that structure, according to the report.

Source: The Business Value of IBM Open Source Support

IDC calculated that IBMs support offering provided IT staff productivity benefits to the tune of $1.6 million per year, while risk mitigation and business productivity and IT infrastructure cost reductions amounted to around $200,000 each. When it added it all up, IDC found that the average IBM customer realized an annual benefit of $2.08 million per organization.

For IBM i shops considering adopting open source software, the availability of IBMs open source support program should give them peace of mind.

We stared back in 2006 by putting PHP onto the IBM i platform. We did that specifically because clients were telling us they needed it, Alison Butterill, the IBM i product offering manager for IBM, said during the recent IBM i Marketplace webinar hosted by HelpSystems.

The numbers have dramatically increased since then. We went from one language to 350-plus environments in open source, she said. On top of that we worked with the support team and now have a support offering for open source environments on IBM i.

Thats the biggest push that we have for getting adoption up on open source, she continued. Many clients were interested but without a support operation, they couldnt pass company audits. Now having a support contract for those open source languages and open source environments, they can get the benefits of open source and they can have a support contract to back it up.

You can download the IDC report here.

Open Source The Path To Software Riches For IBM i

The Impact On IBM i Of Big Blues Acquisition Of Red Hat

IBM Brings More Open Source to IBM i

Read the original here:
Weighing The Hidden Costs Of Open Source - IT Jungle