Blog categories

My blog posts and tweets are my own, and do not necessarily represent the views of my current employer (ESG), my previous employers or any other party.

I do not do paid endorsements, so if I am appear to be a fan of something, it is based on my personal experience with it.

If I am not talking about your stuff, it is either because I haven't worked with it enough or because my mom taught me "if you can't say something nice ... "

JBuff’s Data Protection Predictions for 2015

Last month, I sat down with my colleague, John McKnight, to give my predictions on how Data Protection will or should change in 2015 … in five minutes or less:

My top areas of interest for this year include:

Protecting SaaS applications, such as Office365, GoogleApps and SalesForce Protecting corporate data on endpoint devices […]

Why Doesn’t IT back up BYOD!?

ESG recently started offering TechTruths … single nuggets of data and the analyst perspectives of why they matter. Check out all of them via the link above, but here is my favorite so far on BYOD data protection:

So, why doesn’t IT back up BYOD endpoints?! It isn’t a rhetorical question.

I have always […]

The best accessories for Surface Pro don’t all come from Microsoft

A few months ago, I wrote about how my Surface Pro (v1) had become the only device that I travel with (blog).

Since then, I have streamlined optimized even further, with a few other gadgets.  In my travel bag:

Portable DVD/Blu-Ray from Buffalo ($85)

This ultra-portable Blu-Ray player/burner is barely larger than two blu-ray […]

You have one less way to recover your data – and you probably didn’t realize it

BE AWARE that today’s laptop and mobile devices have one less recovery option than they used to. 

This particular customer service announcement is targeted mostly at business executives and the IT professionals who support them.

  -  Those folks presume that device theft never happens and that they are too responsible to ever leave […]

I love my Surface Pro; here’s how I made it better

This is an absolutely phenomenal device – with enough CPU to do my day job while I travel, long enough battery to last a day of meetings (or a long flight), and light enough that it is now the only gadget that I put in my bag (leaving home my power-laptop and eReader).

That all […]

Mobile Device Backup may be Impossible

Doing a selective mobile device backup that separates work data and personal data can’t be done, says analyst Jason Buffington, but perhaps not for the reasons you think.

Before I get started, let me define the two basic types of endpoint devices: consumption devices and creation devices.

Consumption devices are like e-readers that fetch data […]

Data Protection in a BYOD World

One of the most complicated areas of data protection in IT today has to be around securing the data on endpoint devices (laptops & tablets). Frankly, most IT organizations weren’t able to do an effective job of protecting that data when the devices were corporate-owned, but with the myriad devices that are now in use, […]

JBuff’s BYOD Experiment (part 3 of 4) Corporate Expectations

A while back, I decided to do an experiment on BYOD — here are my results: JBuff’s BYOD experiment – part 1, Acquisition Challenges JBuff’s BYOD experiment – part 2, Getting Started with Data JBuff’s BYOD experiment – part 3, Corporate Expectations JBuff’s BYOD experiment – part 4, video excerpt from BYOD seminar JBuff’s BYOD […]

JBuff’s BYOD Experiment (part 2 of 4) Getting Started

A while back, I decided to do an experiment on BYOD — here are my results:

JBuff’s BYOD experiment – part 1, Acquisition Challenges JBuff’s BYOD experiment – part 2, Getting Started with Data JBuff’s BYOD experiment – part 3, Corporate Expectations JBuff’s BYOD experiment – part 4, video excerpt from BYOD seminar JBuff’s BYOD […]

JBuff’s BYOD Experiment (part 1 of 4) Acquisition Challenges

One of the more intersecting discussions in data protection is BYOD. When its not a corporately owned device, and therefore the IT department has far less influence (including perhaps the inability to install agent technologies on it) — who is responsible for backing up the data, and where should corporate data be backed up to […]

@JBuff on Twitter