Blog posts by Alexei Balaganski


Google Cloud Advances Security Capabilities by Acquiring SOAR Vendor Siemplify

Yesterday, Google has announced that it has acquired Siemplify , a well-known provider of security orchestration, automation and response (SOAR) solutions, for an undisclosed amount. The stated strategic goal of this acquisition is to “change the rules on how organizations hunt, detect, and respond to threats”. The SOAR capabilities of the Siemplify platform will be integrated into Google’s own Chronicle security analytics platform to provide even better visibility and productivity for security analysts. Now, at the first glance, one could simply ask:...


Finding a Setting Worthy of Your “Crown Jewels”

Modern businesses depend on digital information. For quite a few years already, it’s been considered the world’s most valuable commodity, worth more than oil, gold, or even printer ink. Some of the world’s largest companies have turned data into their primary source of income, generating billions in profits every year, but for the rest of us, there is always data that is critical for our business’s success or even basic survival. Information such as intellectual property, customer data, or financial records is rightfully called “crown jewels.”...


Low-Code Should Not Be Low-Effort for Vendors

The idea of low-code/no-code (LC/NC) application development seems to be extremely popular nowadays, to the point of it almost becoming a marketing buzzword similar, say, to “Zero Trust”. For decades, creating “proper” application software was a complex and tedious process that required qualified professional developers to produce even the smallest app. Organizations only had two choices: either purchase an existing off-the-shelf product from a software vendor or commission an internal or external development team to design, code, test, and deploy a custom...


Brace Yourselves: A New HeatWave is Coming

I’ve always been a bit baffled by the enduring popularity of MySQL. I mean, it’s great and we have been using it in many internal projects for years, but what makes it so popular even nowadays, when the competition from other vendors, commercial or open-source, is so strong? And yet, 26 years after the first release, MySQL is still the most popular open-source database in the world, an integral part of every web development stack, the one product you expect to find on every hosting platform, and, of course, in every public cloud. MySQL: a database for all applications?...


Fighting Data Friction, One Battle at a Time

Data friction is arguably the biggest obstacle for every organization on its journey to achieve optimal business productivity. Even if you have not heard the term before, you’ve definitely faced its consequences in one form or another (most probably, even in multiple different forms). You need your product’s sales data for EMEA, but it’s not a top priority for your IT team? Your marketing team would love to derive better insights from your customer data, but your ERP system is not supported by their fancy cloud service? Your developers must wait several days to get an...


Quantum Computing: Where to Start Today

Quantum computing is one of those topics that always seem to exist just out of our reach. Well over a decade ago we were promised that a real quantum computer will appear just in a few years, and for most people, this feeling remains the same even now. But is this assumption correct? Do we really need to wait a few years more until the fastest, biggest, and most reliable quantum computers will finally find their way into every industry? Or is it something we should already be considering today? Understanding (or at least trying to) quantum computing Now, I will not attempt to explain...


Oracle’s Crypto-Secure Data Management

Oracle has unveiled new interesting capabilities in the Oracle database today, which they refer to as Immutable and Blockchain tables . While I am not entirely convinced by the names they have chosen, I can absolutely get behind the overall Crypto-secure data management concept that has emerged along with them. Whenever people discuss various applications of cryptography for information protection, they almost inevitably tend to think about encryption or, in other words, protecting the data’s confidentiality. However, while keeping the data out of reach of unauthorized persons...


Zero Trust: We’re Nowhere Near the End of the Story Yet

Oh, how time flies! It seems that the whole story of Zero Trust as a revolutionary concept for designing computer networks began just yesterday, but it’s been over a decade already. In fact, the very idea that was later somewhat awkwardly named “de-perimeterization” was being discussed nearly 20 years ago. Back then, in the early 2000s, years before the era of the cloud and ubiquitous presence of smart mobile devices, organizations were already feeling the pressure to reorganize their networks for the digital transformation – establishing communications to their...


This Is Why We Can’t Have Nice Things

I had no intention to write any blog posts during the holidays or, God forbid, do any predictions for the next year (look how relevant last year’s predictions turned out to be). However, an interesting story involving Ticketmaster, a large American ticket sales company, has caught my eye and made me think once again about my career in cybersecurity. The whole story goes all the way back to 2013, but the details have only recently been unsealed after the company has entered into a plea agreement and agreed to pay a $10 million fine for illegal access to a competitor’s...


MySQL Analytics Engine: Almost Too Good to Be True?

Whether you’re a fan of MySQL or not, you cannot dispute the fact that it is the world’s most popular open-source database by a large margin (incidentally, it’s also the second most popular database ever, behind only its owner Oracle’s flagship commercial product). 25 years after its inception, MySQL has evolved into an essential and truly ubiquitous component of every web application stack and cloud platform. Even though some database experts might frown upon it for lacking “enterprise capabilities”, it is widely used by the largest enterprises around...

Stay Connected

KuppingerCole on social media

Subscribe to our Podcasts

KuppingerCole Podcasts - listen anywhere

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00