Skip to content

Posts tagged ‘Microsoft’

How To Know If An E-Mail Is Trustworthy

How To Know If An E-Mail Is Trustworthy

 

Bottom Line: Phishing is the leading cause of all breaches, succeeding because impersonation, redirection, and social engineering methods are always improving. And, phishing is only one way e-mails are used in fraud. Businesses need to understand if an e-mail address can be trusted before moving forward with a transaction.

Microsoft thwarts billions of phishing attempts a year on Office365 alone by relying on heuristics, detonation, and machine learning, strengthened by Microsoft Threat Protection Services. In 2018 Microsoft blocked 5 billion phish e-mails in Office 365 and detonated 11 billion unique items by ATP sandboxing. Microsoft is succeeding with its cybersecurity partners in defeating phishing attacks. Phishers are going to extraordinary lengths to discover new techniques to evade detection and successfully carry out phishing attempts. By analyzing Office 365 ATP signals, Microsoft sees phishers attempt to abuse many legitimate cloud services, including Amazon, Google, Microsoft Office365, Microsoft Azure, and others. Microsoft is creating processes that identify and destroy phishing attempts without impacting legitimate applications’ performance.

Phishers’ Favorite Trojan Horse Is Office365 Followed By Cybersecurity Companies  

Phishers are hiding malicious links, scripts and, in some cases, mutated software code behind legitimate Microsoft files and code to evade detection. Using legitimate code and links as a Trojan Horse to successfully launch a phishing campaign became very popular in 2019 and continues today. Cybercriminals and state-sponsored hackers have been mutating legitimate code and applications for years attempting to exfiltrate priceless data from enterprises and governments globally. Office365 is the phisher’s Trojan Horse of choice, closely followed dozens of cybersecurity companies that have seen hackers attempt to impersonate their products. Cybersecurity companies targeted include Citrix, Comodo, Imperva, Kaspersky, LastPass, Microsoft, BitDefender, CyberRoam, and others.

Using Trojan Horses To Hijack Search Results

In 2019 Microsoft discovered a sophisticated phishing attack that combined impersonation, redirection, and social engineering methods. The phishing attack relied on using links to Google search results as a Trojan Horse to deliver URLs that were poisoned so that they pointed to an attacker-controlled page, which eventually redirected to the phishing page. Microsoft discovered that a traffic generator ensured that the redirector page was the top result for specific keywords. The following graphic explains how the phishing attack was used to poison search results:

Using this workflow, phishers attempted to send phishing e-mails that relied on legitimate URLs as their Trojan Horses from legitimate domains to take advantage of the recipient’s trust. Knowing which e-mails to trust or not is becoming foundational to stopping fraud and phishing attacks.

How Kount Is Battling Sophisticated Attacks 

Meanwhile, e-mail addresses can be a valuable source of information for businesses looking to prevent digital fraud. Misplaced trust can lead to chargebacks, manual reviews, and other undesirable outcomes. But, Kount’s Real-Time Identity Trust Network calculates Identity Trust Levels in milliseconds, reducing friction, blocking fraud, and delivering improved user experiences. Kount discovered that e-mail age is one of the most reliable identity trust signals there are for identifying and stopping automated fraudulent activity.

Based on their research and product development, Kount announced Email First Seen capabilities as part of its AI-powered Identity Trust Global Network. Email First Seen applies throughout the customer journey, from payments to account login to account creation. The Identity Trust Global Network consists of fraud and trust signals from over half a billion e-mail addresses. It also spans 32 billion annual interactions and 17.5 billion devices across 75 business sectors and 50-plus payment providers and card networks. The network is linked by Kount’s next-generation artificial intelligence (AI) and works to establish real-time trust for each identity behind a payment transaction, log in or account creation

E-mail Age Is Proving To Be A Reliable Indicator Of Trust

A favorite tactic of cybercriminals is to create as many new e-mail aliases as they need to deceive online businesses and defraud them of merchandise and payments. Kount is finding that when businesses can identify the age of an e-mail address, they can more accurately determine identity trust. Kount’s expertise is in fraud prevention effectiveness, relying on a combination of fraud and risk signals to generate a complete picture of authentication details. The following graphic illustrates what a Kount customer using Email First Seen will see in every e-mail they receive.

Kount’s Identity Trust Global Network relies on AI-based algorithms that can analyze all available identifiers or data points to establish real-time links between identity elements, and return identity trust decisions in real-time. Kount’s unique approach to using AI to improve customer experiences by reducing friction while blocking fraud reflects the future of fraud detection. Also, Kount’s AI can discern if additional authentication is needed to verify the identity behind the transaction and relies on half a billion e-mail addresses that are integral to AI-based analysis and risk scoring algorithms. Kount is making Email First Seen available to all existing customers for no charge. It’s been designed to be native on the Kount platform, allowing the information to be accessible in real-time to inform fraud and trust decisions.

Conclusion

In 2020 phishing attempts will increasingly rely on legitimate code, links, and executables as Trojan Horses to evade detection and launch phishing attacks at specific targets. Microsoft’s research and continued monitoring of phishing attempts uncovered architecturally sophisticated approaches to misdirecting victims through impersonation and social engineering.

The Most Innovative Tech Companies Based On Patent Analytics

The Most Innovative Tech Companies Based On Patent Analytics

istock

  • Microsoft, Apple, and IBM lead the world in hardware & software patent innovation according to PatentSight.
  • Samsung, Johnson & Johnson, LG Electronics. Alphabet, Qualcomm, Ford, Intel, Microsoft, Sony, and VW are the ten most innovative companies in the world, according to PatentSight’s patent analytics research.
  • Ford leads the global automotive industry in patent innovation, due in large part to successful R&D efforts in autonomous driving.

These and many other fascinating insights are from Swiss consulting firm EconSight’s patent analytics research that first identified all the patents that are supposed to protect particularly relevant innovations – in this case, defined as innovations for the digitization of applied technologies – using the PatentSight database. Companies not only have to maintain their innovative strength; they also have to continue to expand in comparison to previous years to take a leading position in the ranking. For additional details on the methodology and to request the rank of your company, please visit the PatentSight Innovation Ranking 2019 site here.

Key insights from EconSight’s patent analytics research defining the most innovative companies globally include the following:

  • 38 of the most innovative companies in the world are based in the U.S, 21 in China, and 15 from Europe. Chinese followed by Japanese-based companies lead the world in electronics innovation as measured by the uniqueness of patents produced. U.S. companies lead the world in medical technology patent innovation. The following graphic compares the number of companies within the global top 100 ranking by country and industry for 2019.

  • In the U.S., tech companies dominate the top 10 most innovative companies in 2019. Alphabet, Qualcomm, Intel, Microsoft, Honeywell, Apple, and GE are producing the most unique, differentiated and value-adding patents based on EconSight’s methodology. Medical technology companies show the greatest growth in innovative patent production as the graphic below illustrates:

  • The world’s most innovative medical technology companies’ patent focus is on biosensors, surgical robotics, shortening the time-to-market for pharmaceutical drugs, and funding startup incubators that yield new patents. Johnson & Johnson’s (J&J) multifaceted innovation strategy reflects the broader strategic vision of every medical technology company pursuing new intellectual property (IP) that leads to patent leadership. J&J acquired Auris Health and Verb Surgical, which is managed as a joint venture with Alphabet’s Verily medical division, which gives them a patent portfolio in healthcare intelligence. J&J has in total acquired over 300 companies in the medical technology industry according to PatentSight’s analysis. These acquisitions have moved them into biosensors, surgical robotics, and startups performing drug research.

The Most Innovative Tech Companies Based On Patent Analytics

  • Japanese robotics manufacturer Fanuc is the world’s most innovative automation technology company based on patent analysis. Since 2019 Fanuc has jumped 42 places in the ranking, from 61st to 19th. The global labor shortage in manufacturing is a contributing factor to the strong market demand Fanuc is seeing for all its robotics products and systems. The following are the top 25 robotics companies of 2019:

The Most Innovative Tech Companies Based On Patent Analytics

  • Ford leads the global automotive industry in patent innovation, while Volkswagen doubles down on patents over the last two years. Ford leads the world in patent innovation due to its rapid advances in autonomous vehicle development. Volkswagen’s rapid ascent in the automotive industry rankings has made them the most innovative company in Germany based on patent analytics this year. VW is investing in autonomous vehicles, and the networking of mobility participants, setting a solid foundation for future vehicle models today.

The Most Innovative Tech Companies Based On Patent Analytics

PatentSight Background

PatentSight – A Lexis Nexis company– specializes in cleaning and refining patent data and providing advanced patent analytics. Publicly available patent data simply cannot be used without qualitative preparation and correction. Due to the sheer mass (about 3.3 million new registrations in 2018 alone), all available patents cannot be viewed manually. Publications in many different languages and often very abstract contents make a manual review and evaluation difficult not only for laymen but also for experts. A further challenge is to level out the widely differing citation practices of national patent offices or to document the legal status of patents.

PatentSight, through manually supervised and scientifically developed algorithms, has best-in-class information on ownership data, going far beyond the testing standards recommended by the World Intellectual Property Organization (WIPO).

Moreover, PatentSight‘s proprietary patent valuation metrics reveal which patents are key, and which are superfluous. Based on citations, global protection, and several correction factors, EconSight leveraged these metrics to determine the most innovative companies.

Why Cybersecurity Needs To Focus More On Customer Endpoints

Why Cybersecurity Needs To Focus More On Customer Endpoints

  • Cloud-based endpoint protection platforms (EPP) are proliferating across enterprises today as CIOs and CISOs prioritize greater resiliency in their endpoint security strategies going into 2020.
  • Gartner predicts that Global Information Security and Risk Management end-user spending is forecast to grow at a five-year CAGR of 9.2% to reach $174.5 billion in 2022, with approximately $50B spent on endpoint security.
  • Endpoint security tools are 24% of all IT security spending, and by 2020 global IT security spending will reach $128B according to Morgan Stanley Research.
  • 70% of all breaches still originate at endpoints, despite the increased IT spending on this threat surface, according to IDC.

There’s a surge of activity happening right now in enterprises that are prioritizing more resiliency in their endpoint security strategies going into 2020. The factors motivating CIOs, CISOs, IT, and Practice Directors to prioritize endpoint resiliency include more effective asset management based on real-time data while securing and ensuring every endpoint can heal itself using designed-in regenerative software at the BIOS level of every device. CIOs say the real-time monitoring helps reduce asset management operating expense, a big plus many of them appreciate give their tight budgets. Sean Maxwell, Chief Commercial Officer at Absolute, says, “Trust is at the center of every endpoint discussion today as CIOs, CISOs and their teams want the assurance every endpoint will be able to heal itself and keep functioning.”

The Endpoint Market Is Heating Up Going Into 2020

Over thirty vendors are competing in the endpoint security market right now. A few of the most interesting are Absolute Software, Microsoft, Palo Alto Networks, and others who are seeing a surge of activity from enterprises based on discussions with CIOs and CISOs. Absolute Software’s Persistence self-healing endpoint security technology is embedded in the firmware of more than 500 million devices and gives CIOs, CISOs and their team’s complete visibility and control over devices and data. Absolute is the leading visibility and control platform that provides enterprises with tamper-proof resilience and protection of all devices, data, and applications.

Like Absolute, Microsoft is unique in how they are the only vendor to provide built-in endpoint protection at the device level, with the core focus being on the OS. Windows 10 has Windows Defender Antivirus now integrated at the OS level, the same System Center Endpoint Protection delivers in Windows 7 and 8 OS. Microsoft Defender Advanced Threat Protection (ATP) incident response console aggregates alerts and incident response activities across Microsoft Defender ATP, Office 365 ATP, Azure ATP, and Active Directory, in addition to Azure.

Further evidence of how enterprise customers are placing a high priority on endpoint security is the increase in valuations of key providers in this market, including Absolute Software (TSE: ABT) and others. Absolute’s stock price has jumped 13% in just a month, following their latest earnings announcement on November 12th with a transcript of their earnings call here. Absolute’s CEO Christy Wyatt commented during the company’s most recent earnings call that, “The ability to utilize near real-time data from the endpoint to… to deliver actionable insights to IT about where controls are failing and the ability to apply resilience to self-heal and reinforce those security controls will become a critical skill for every one of our customers. This is the essence of Absolute’s platform, which adds resiliency to our customer’s operations.” It’s evident from what CIOs and CISOs are saying that resiliency is transforming endpoint security today and will accelerate in 2020.

Key Takeaways From Conversations With Enterprise Cybersecurity Leaders

The conversations with CIOs, CISOs, and IT Directors provided valuable insights into why resiliency is becoming a high priority for endpoint security strategies today. The following are key takeaways from the conversations:

  • Known humorously as the “fun button” cybersecurity teams enjoy being able to brick any device any time while monitoring the activity happening on it in real-time. One CIO told the story of how their laptops had been given to a service provider who was supposed to destroy them to stay in compliance with the Health Insurance Portability and Accountability Act (HIPAA), and one had been resold on the back market, ending up in a 3rd world nation. As the hacker attempted to rebuild the machine, the security team watched as each new image was loaded, at which time they would promptly brick the machine. After 19 tries, the hacker gave up and called the image re-build “brick me.”
  • IT budgets for 2020 are flat or slightly up, with many CIOs being given the goal of reducing asset management operating expenses, making resiliency ideal for better managing device costs. The more effectively assets are managed, the more secure an organization becomes. That’s another motivating factor motivating enterprises to adopt resiliency as a core part of the endpoint security strategies.
  • One CIO was adamant they had nine software agents on every endpoint, but Absolute’s Resilience platform found 16, saving the enterprise from potential security gaps. The gold image an enterprise IT team was using had inadvertently captured only a subset of the total number of software endpoints active on their networks. Absolute’s Resilience offering and Persistence technology enabled the CIO to discover gaps in endpoint security the team didn’t know existed before.
  • Endpoints enabled with Resiliency have proven their ability to autonomously self-heal themselves, earning the trust of CIOs and CISOs, who are adopting Absolute to alleviate costly network interruptions and potential breaches in the process. 19% of endpoints across a typical IT network require at least one client or patch management repair monthly, according to Absolute’s 2019 Endpoint Security Trends Report. The report also found that increasing security spending on protecting endpoints doesn’t increase an organizations’ safety – and in some instances, reduces it. Having a systematic, design-in solution to these challenges gives CIOs, CISO, and their teams greater peace of mind and reduces expensive interruptions and potential breaches that impede their organizations’ growth.

 

The Best IoT Companies To Work For In 2019 Based On Glassdoor

Employees would most recommend the following companies to their friends looking for an IoT job:  IGELSAPARMFortinetGoogleMicrosoftBoschSamsaraSchneider ElectricSiemensDell TechnologiesRed HatCisco Systems and Trend Micro. These 14 companies are the highest rated by employees working for them based on a comparison of Computer Reseller News’ Internet of Things 50, 2019  with their respective Glassdoor scores as of today, Sunday, August 18, 2019.

Forbes readers’ most frequent requests center on which companies are the best to work for in emerging technology fields, including IoT. The Computer Reseller News’ Internet of Things 50, 2019 list of companies is used to complete the analysis as it is an impartial, independent list created by CRN. Using the CRN list as a foundation, the following analysis captures the best companies in their respective areas today.

Comparing the Glassdoor scores of the (%) of employees who would recommend this company to a friend and (%) of employees who approve of the CEO, the following analysis was completed. 14 IoT companies on the list have very few (less than 20) or no Glassdoor reviews, so they are excluded from the rankings. In 2017 I did a factor analysis and found that companies who flood Glassdoor with fake reviews hit a wall around ten posts. With those findings in mind, an IoT company would need a minimum of 20 current employee interviews to be included in the final recommended list. Please find the full data set available for download here. The best IoT companies to work for are shown below and please click on the graphic to expand for easier reading:

The highest-rated IoT CEOs on Glassdoor as of August 18, 2019, include the following:

CEO Company Name  % of employees who approve of the CEO as of August 18, 2019, on Glassdoor 2019 CRN Internet of Things Categories
Jed Ayres, CEO, North America IGEL 100% IoT Software and Services
Bill McDermott, CEO (Glassdoor Top CEOs of 2019) SAP 96% IoT Software and Services
Satya Nadella, CEO (Glassdoor Top CEOs of 2019) Microsoft 96% IoT Software and Services
Sanjit Biswas, Founder, CEO Samsara 96% IoT Hardware
James Whitehurst, President, CEO Red Hat 96% IoT Software and Services
Volkmar Denner, CEO Bosch 94% IoT Hardware
Simon Segars, CEO ARM 93% IoT Hardware
Jean-Pascal Tricoire, CEO (Glassdoor Top CEOs of 2019) Schneider Electric 93% Industrial Internet of Things (IoT) Providers
Ken Xie, Founder, Chairman, CEO Fortinet 92% IoT Security
Thomas Kurian, CEO Google Cloud 92% IoT Software and Services
Michael Dell, Chairman, CEO Dell Technologies 92% IoT Hardware
Eva Chen, CEO Trend Micro 92% IoT Security
Joe Kaeser, CEO Siemens 91% Industrial Internet of Things (IoT) Providers
Chuck Robbins, CEO (Glassdoor Top CEOs of 2019) Cisco Systems 91% IoT Hardware

5 Ways To Demystify Zero Trust Security

Bottom Line: Instead of only relying on security vendors’ claims about Zero Trust, benchmark them on a series of five critical success factors instead, with customer results being key.

Analytics, Zero Trust Dominated RSA

Analytics dashboards dominated RSA from a visual standpoint, while Zero Trust Security reigned from an enterprise strategy one. Over 60 vendors claimed to have Zero Trust Security solutions at RSA, with each one defining the concept in a slightly different way.

RSA has evolved into one of the highest energy enterprise-focused conferences today, and in 2019 Zero Trust was center stage in dozens of vendor booths. John Kindervag created the Zero Trust Security framework while at Forrester in 2010. Chase Cunningham, who is a Principal Analyst at Forrester today, is a leading authority on Zero Trust and frequently speaks and writes on the topic. Be sure to follow his blog to stay up to date with his latest research. His most recent post, OK, Zero Trust Is An RSA Buzzword — So What?, captures the current situation on Zero Trust perfectly. Becca Chambers’ blog post, Talking All Things Zero Trust at RSA Conference 2019, includes an insightful video of how the conferences’ attendees define Zero Trust.

With so many vendors claiming to offer Zero Trust solutions, how can you tell which ones have enterprise-ready, scalable solutions?  The following are five ways to demystify Zero Trust:

  1. Customer references are willing to talk and case studies available. With the ambitious goal of visiting every one of the 60 vendors who claimed to have a Zero Trust solution at RSA, I quickly realized that there’s a dearth of customer references. To Chase Cunningham’s point, more customer use cases need to be created, and thankfully that’s on his research agenda. Starting the conversation with each vendor visited by asking for their definition of Zero Trust either led to a debate of whether Zero Trust was needed in the industry or how their existing architecture could morph to fit the framework. Booth staffs at the following companies deserve to be commended for how much they know about their customers’ success with Zero Trust: AkamaiCentrifyCiscoMicrosoftMobileIronPalo Alto NetworksSymantec, and Trend Micro. The team at Ledios Cyberwho was recently acquired by Capgemini, was demonstrating how Zero Trust applied to Industrial Control Systems and shared a wealth of customer insights as well.
  2. Defines success by their customers’ growth, stability and earned trust instead of relying on fear. A key part of de-mystifying Zero Trust is seeing how effective vendors are at becoming partners on the journey their customers are on. While in the Centrify booth I learned of how Interval International has been able to implement a least privilege model for employees, contractors, and consultants, streamline user onboarding, and enable the company to continue its rapid organic growth. At MobileIron, I learned how NASDAQ is scaling mobile applications including CRM to their global sales force on a Zero Trust platform. The most customer-centric Zero Trust vendors tend to differentiate on earned trust over selling fear.
  3. Avoid vendors who have a love-hate relationship with Zero Trust. Zero Trust is having an energizing effect on the security landscape as it provides vendors with a strategic framework they can differentiate themselves in. Security vendors are capitalizing on the market value right now, with product management and engineering teams working overtime to get new applications and platforms ready for market. I found a few vendors who have a love-hate relationship with Zero Trust. They love the marketing mileage or buzz, yet aren’t nearly as enthusiastic about changing product and service strategies. If you’re looking for Zero Trust solutions, be sure to watch for this and find a vendor who is fully committed.
  4. Current product strategies and roadmaps reflect a complete commitment to Zero Trust. Product demos at RSA ranged from supporting the fundamentals of Zero Trust to emulating its concepts on legacy architectures. One of the key attributes to look for is how perimeterless a given security application is that claims to support Zero Trust. How well can a given application protect mobile devices? An IoT device? How can a given application or security platform scale to protect privileged credentials? These are all questions to ask of any vendor who claims to have a Zero Trust solution. Every one of them will have analytics options; the question is whether they fit with your given business scenario. Finally, ask to see how Zero Trust can be automated across all user accounts and how privileged access management can be scaled using Identity Access Management systems including password vaults and Multi-Factor Authentication (MFA).
  5. A solid API strategy for scaling their applications and platforms with partner successes that prove it. One of the best questions to gauge the depth of commitment any vendor has to Zero Trust is to ask about their API strategy. It’s interesting to hear how vendors with Zero Trust-based product and services strategies are scaling inside their largest customers using APIs. Another aspect of this is to see how many of their services, system integration, technology partners are using their APIs to create customized solutions for customers. Success with an API strategy is a leading indicator of how reliably any Zero Trust vendor will be able to scale in the future.

Conclusion

RSA is in many ways a microcosm of the enterprise security market in general and Zero Trust specifically. The millions of dollars in venture capital invested in security analytics and Zero Trust made it possible for vendors to create exceptional in-booth experiences and demonstrations – much the same way venture investment is fueling many of their roadmaps and sales teams. Zero Trust vendors will need to provide application roadmaps that show their ability to move beyond prevention of breaches to more prediction, at the same time supporting customers’ needs to secure infrastructure, credentials, and systems to ensure uninterrupted growth.

Microsoft Leads The AI Patent Race Going Into 2019

  • There have been over 154,000 AI patents filed worldwide since 2010 with the majority being in health fields (29.5%), Industry-specific solutions (25.3%) and AI-based digital security (15.7%).
  • AI-based marketing patents are the fasting growing global category, reaching a Compound Annual Growth Rate (CAGR) of 29.3% between 2010 and 2018.
  • The second- and third-fastest growing global AI patent categories between 2010 and 2018 are AI-based digital security (23.4% CAGR) and AI-based mobility (23% CAGR).
  • 79,936 patents were filed in the United States between 2010 and 2018, with the majority being in the health field (32.6%) followed by Industry-specific solutions (20.5%) and AI-based digital security (18%).
  • Machine learning dominates the AI patent landscape today, leading all categories of AI patents including deep learning and neural networks.

These and many other insights are from an excellent presentation recently given by Kai Gramke, Managing Director of EconSight titled Artificial Intelligence As A Key Technology and Driver of Technological Progress. EconSight clients include the Swiss Federal Council, German Federal Chancellery, leading European think tanks, research institutes and half of the German DAX-30 companies.  The presentation and information shared in this post were generated using the PatentSight analytics platform. PatentSight is a LexisNexis company and you can learn more about them here.  The following are the key takeaways from Kai’s recent research and presentation using PatentSight:

  • EconSight finds that Microsoft leads the AI patent race going into 2019 with 697 world class patents that the firm classifies as having a significant competitive impact as of November 2018. Out of the top 30 companies and research institutions as defined by EconSight in their recent analysis, Microsoft has created 20% of all patents in the global group of patent-producing companies and institutions. The following graphic provides a comparison of the top 3o in the group. Please click on the graphic to expand it for easier reading.

  • Machine learning dominates the AI patent landscape today, leading all categories of AI patents including deep learning and neural networks.  Machine learning is based on the foundational concepts of Bayesian analysis, data mining, and predictive analytics. Machine learning algorithms and the applications they rely on are designed to find patterns in large-scale data sets, while also being able to solve complex, constraint-based problems by learning from the data.  Enterprise software companies including Microsoft, SAP, and others are actively developing AI technologies that integrate into their existing platforms, streamlining adoption across their many customers. Please click on the graphic to expand for easier reading.

  • There have been 225,833 AI-based patents filed globally since 2000, with 30.7% being Industry specific (Industry 4.0 on the graphic below) followed by health-related patents (28.1%) 13.8% of all AI-based patents are for digital security and 11.9% for energy. It’s interesting to note that the fastest growing patents between 2000 and 2018 are for applying AI to marketing (22% CAGR) and AI-based digital security (18.8% CAGR). Please click on the graphic to expand for easier reading.

The Best Big Data Companies And CEOs To Work For In 2018

Forbes readers’ most common requests center on who the best companies are to work for in analytics, big data, data management, data science and machine learning. The latest Computer Reseller News‘ 2018 Big Data 100 list of companies is used to complete the analysis as it is an impartial, independent list aggregated based on CRN’s analysis and perspectives of the market. Using the CRN list as a foundation, the following analysis captures the best companies in their respective areas today.

Using the 2018 Big Data 100 CRN list as a baseline to compare the Glassdoor scores of the (%) of employees who would recommend this company to a friend and (%) of employees who approve of the CEO, the following analysis was completed today. 25 companies on the list have very few (less than 15) or no Glassdoor reviews, so they are excluded from the rankings. Based on analysis of Glassdoor score patterns over the last four years, the lower the number of rankings, the more 100% scores for referrals and CEOs. These companies, however, are included in the full data set available here. If the image below is not visible in your browser, you can view the rankings here.

 

The highest rated CEOs on Glassdoor as of May 11, 2018 include the following:

Dataiku Florian Douetteau 100%
StreamSets Girish Pancha 100%
MemSQL Nikita Shamgunov 100%
1010 Data Greg Munves 99%
Salesforce.com Marc Benioff 98%
Attivio Stephen Baker 98%
SAP Bill McDermott 97%
Qubole Ashish Thusoo 97%
Trifacta Adam Wilson 97%
Zaloni Ben Sharma 97%
Reltio Manish Sood 96%
Microsoft Satya Nadella 96%
Cloudera Thomas J. Reilly 96%
Sumo Logic Ramin Sayar 96%
Google Sundar Pichai 95%
Looker Frank Bien 93%
MongoDB Dev Ittycheria 92%
Snowflake Computing Bob Muglia 92%
Talend Mike Tuchen 92%
Databricks Ali Ghodsi 90%
Informatica Anil Chakravarthy 90%

 

The Best Software Companies To Work For In 2018, According To Glassdoor

These and other findings are based on an analysis of Glassdoor rankings of Software Magazine’s 2017 Software 500 list of the leading software companies globally. An Excel spreadsheet was first created using the 2017 Software 500 list as the basis of the Glassdoor company comparisons. Rankings from Glassdoor were added today for the (%) of employees who would recommend this company to a friend and (%) of employees who approve of the CEO.The Software 500 list was used to preserve impartiality in the rankings.  The original data set the analysis is based on is available for download here in Microsoft Excel format.

To gain greater insights into the data sets a series of cross-tabulations and correlation analyses were done using IBM SPSS Statistics Version 25. The analysis shows CEOs have an even greater impact on improving their company’s recommendation scores, rising to 82% this year from 70% in 2015. The analysis also showed that companies who flood Glassdoor with fake reviews hit a wall around 10 posts, down from 15 in 2015. This doesn’t stop some companies from offering cash, prizes, and merchandise to their employees in exchange for positive reviews. Relying on Glassdoor and ideally in-office visits to see how a company culture is and how your potential boss treats others is ideal.

The following are the highest rated software companies to work for in 2018, based the (%) of employees who would recommend the company to a friend:

The following companies scored between 80% and 89% on the rating % of employees who would recommend this company to a friend:

Please see the entire data set for the rankings of all companies included in the Software Magazine 500 here in Microsoft Excel format.

The Era Of The Intelligent Cloud Has Arrived

intelligent cloudBottom line: Enterprises are impatient to translate their investments in cloud apps and the insight they provide into business outcomes and solid results today.

The following insights are based on a series of discussions with C-level executives and revenue team leaders across several industries regarding their need for an Intelligent Cloud:

  • In the enterprise, the cloud versus on-premise war is over, and the cloud has won. Nearly all are embracing a hybrid cloud strategy to break down the barriers that held them back from accomplishing more.
  • None of the C-level executives I’ve spoken with recently are satisfied with just measuring cloud adoption. All are saying the want to measure business outcomes and gain greater insights into how they can better manage revenue and sales cycles.
  • Gaining access to every available legacy and 3rd party system using hybrid cloud strategies is the new normal. Having data that provides enterprise-wide visibility gives enterprises greater control over every aspect of their selling and revenue management processes. And when that’s accomplished, the insights gained from the Intelligent Cloud can quickly be turned into results.

Welcome to the Era of the Intelligent Cloud

The more enterprises seek out insights to drive greater business outcomes, the more it becomes evident the era of the Intelligent Cloud has arrived. C-level execs are looking to scale beyond descriptive analytics that defines past performance patterns.  What many are after is an entirely new level of insights that are prescriptive and cognitive. Getting greater insight that leads to more favorable business outcomes is what the Intelligent Cloud is all about. The following Intelligent Cloud Maturity Model summarizes the maturity levels of enterprises attempting to gain greater insights and drive more profitable business outcomes.

maturity model

 

Why The Intelligent Cloud Now?  

Line-of-business leaders across all industries want more from their cloud apps than they are getting today. They want the ability to gain greater insights with prescriptive and cognitive analytics. They’re also asking for new apps that give them the flexibility of changing selling behaviors quickly.  In short, everyone wants to get to the orchestration layer of the maturity model, and many are stuck staring into a figurative rearview mirror, using just descriptive data to plan future strategies.  The future of enterprise cloud computing is all about being able to deliver prescriptive and cognitive intelligence. One of the hottest companies to watch in real-time SAP and Salesforce integration is enosiX. Their customer wins show how the foundations of the Intelligent Cloud are being created by integrating legacy SAP ERP systems and Salesforce today.

Consider the following takeaways:

 

Who Is Delivering The Intelligent Cloud Today?

Just how far advanced the era of the Intelligent Cloud is became apparent during the Microsoft Build Developer Conference last week in San Francisco.  A fascinating area discussed was Microsoft Cognitive Services and their implications on the Cortana Intelligence Suite. Microsoft is offering a test drive of Cognitive Services here. Combining Cognitive Services and the Cortana Intelligence Suite, Microsoft has created a framework for delivering the Intelligent Cloud. The graphic below shows the Cortana Analytics Suite.
Cortana suite

 

Five Key Take-Aways From North Bridge’s Future Of Cloud Computing Survey, 2015  

  • bostonSaaS is the most pervasive cloud technology used today with a presence in 77.3% of all organizations, an increase of 9% since 2014.
  • IT is moving significant processing to the cloud with 85.9% of web content management, 82.7% of communications, 80% of app development and 78.9% of disaster recovery now cloud-based.
  • Seeking simple and clear relationships, over 50% of enterprises opt for online purchasing or direct to provider purchasing of cloud services. Online buying is projected to increase over the next two years up to 56%.
  • Vendor leadership/consolidation continues to take hold with 75% of enterprises using fewer than ten

These and many other insights are from North Bridge Growth Equity and Venture Partners’ Future of Cloud Computing Survey published on December 15th. North Bridge and Wikibon collaborated on the study, interviewing 952 companies across 38 different nations, with 65% being from the vendor community and 35% of enterprises evaluating and using cloud technologies in their operations  The slide deck is accessible on SlideShare here:

Key takeaways from the study include the following:

  1. Wikibon forecasts the SaaS is worth $53B market today and will grow at an 18% Compound Annual Growth Rate (CAGR) from 2014 to 2026. By 2026, the SaaS market will be worth $298.4B according to the Wikibon forecast. The fastest growing cloud technology segment is Platform-as-a-Service (PaaS), which is valued at $2.3B today, growing at a CAGR of 38% from 2014 to 2026.  Infrastructure-as-a-Service (IaaS) has a market value of $25B and is growing at a 19% CAGR in the forecast period.  Please see the graphic from the report below and a table from Wikibon’s excellent study, Public Cloud Market Forecast 2015-2026 by Ralph Finos published in August.

SaaS Graphic from North Bridge study

 

Public Cloud Vendor Revenue Projection

  1. Cloud-based applications are becoming more engrained in core business processes across enterprises. The study found that enterprises are migrating significant processing, systems of engagement and systems of insight to the cloud beyond adoption levels of the past.  81.3% of sales and marketing, 79.9% of business analytics, 79.1% of customer service and 73.5% of HR & Payroll activities have transitioned to the cloud. The impact on HR is particularly noteworthy as in 2011; it was the third least likely sector to be disrupted by cloud computing.
  1. 78% of enterprises expect their SaaS investments to deliver a positive Return on Investment (ROI) in less than three months. 58% of those enterprises who have invested in Platform-as-a-Service (PaaS) expect a positive ROI in less than three months.
  1. Top inhibitors to cloud adoption are security (45.2%), regulatory/compliance (36%), privacy (28.7%), lock-in (25.8%) and complexity (23.1%). Concerns regarding interoperability and reliability have fallen off significantly since 2011 (15.7% and 9.9% respectively in 2015).
  1. Total private financing for cloud and SaaS startup has increased 4X over the last five years. North Bridge and Wikibon found that average deal size rose 1.8X in the same period. The following graphic provides an overview of cloud and SaaS finance trends from 2010 to present.

cloud and saas financing

 

%d bloggers like this: