Hock Tan, Broadcom President & CEO - In October I shared my thoughts about what a combined Broadcom and VMware will mean for customers. I wrote about the conversations I’ve had to date, the future of multi-cloud, and our philosophy on pricing, and I reiterated Broadcom’s commitment to keeping customers at the center of our business.
By Vadim Lander, Identity Security CTO & Distinguished Engineer - Identity in general is an area that is integral to everything customers do when building products and services or interacting directly with their customers. Everything you do requires your identity to be known at various levels of assurance: logging into a computer, banking transactions, cell phone apps, etc.
By Andy Nallappan, Chief Technology Officer and Head of Software Business Operations, Broadcom Software - Last month at Gartner Symposium in Orlando, Fla., I enjoyed talking with ZDNet’s Chris Preimesberger and Sahana Sarma, leader of Google Cloud’s transformation advisory, about the enterprise software landscape and how it is growing more complex and business-critical daily.
By Hock Tan, Broadcom President & CEO - Over the last several weeks, I have had the opportunity to visit with Broadcom customers around the world to discuss what’s on the horizon as they navigate increasingly complex IT operating environments. During these visits, I’ve also answered their questions and shared our vision of what a combined Broadcom and VMware will look like following the close of the transaction.
By Ilias Chantzos, Global Privacy Officer and Head of EMEA Government Affairs, Broadcom - On May 11, 2022, the European Union (EU) reached provisional agreement on the new Digital Operational Resilience Act (DORA). Despite the choice of term, there's nothing "provisional" about DORA. In fact, one of the world's most far-reaching cybersecurity regulations for financial services and their supply chains is a done deal.
By Hock Tan, President, Chief Executive Officer and Director, Broadcom - The Broadcom Inc. we know today first began more than 60 years ago as a semiconductor division of Hewlett-Packard in Palo Alto, CA. Since then, our foundational innovations have formed the building blocks of the transformational technologies that shape our lives today—our smartphones, our streaming services and our Wi-Fi, to name but a few. In fact, we estimate that more than 99 percent of all internet traffic crosses at least one Broadcom chip. That’s why Broadcom is what enables the great innovators of the world to keep on innovating.
By Clayton Donley, Vice President & General Manager, Identity Management Security, Broadcom Software - Although analysts have predicted the death of passwords for many years, passwords are still the predominant authentication credential used for many applications and IT systems. The reason for this is simple – everyone knows how passwords work, which makes them more convenient to use.
By Andy Nallappan, Chief Technology Officer and Head of Software Business Operations, Broadcom Software - The enterprise software that underpins day-to-day operations is under significant strain at many organizations. Between the now-prevalent hybrid cloud architecture and ongoing digital transformation efforts, entire industries are experiencing tectonic shifts in how they do business and disruptions from new competitors. For IT leaders, these changes have heightened their focus on software modernization.
By Hock Tan, President and Chief Executive Officer, Broadcom - It can’t be overstated: without public-private collaboration to secure our critical virtual and physical networks, economies and governments around the world would be at the mercy of bad actors. It’s in that commitment of collaboration to better protect critical infrastructures that I was proud to be nominated by the President of the United States to serve on the National Security and Telecommunications Advisory Committee (NSTAC), and why Broadcom Software was honored to accept Jen Easterly’s invitation to be one of the first private sector “alliance members” in CISA’s Joint Cyber Defense Collaborative (JCDC).
By Viki Paige, Head of Broadcom Software Marketing - As recently announced, Hock Tan, Broadcom Inc.’s President and CEO, will be also directly overseeing the operations of the Broadcom Software Group. Now that Hock is leading Broadcom Software, we sat down with him to learn more about his career, personal philanthropy and areas of achievement.
By Matt Hogstrom, Distinguished Engineer - The concept of devices all over the planet being able to access data no matter where it resides is at the core of modern computing. That’s why organizations keep their critical information in multiple environments, including private clouds, on-premises, and on the public cloud. Given this reality, the key for businesses to get the most value from their technology investments lies in achieving the right balance. Broadcom advises business leaders on the hybrid cloud strategies that can best position them for success.
By Tom Thorpe, Vice President International Markets, Broadcom Software - After a forced hiatus from face-to-face networking events due to the pandemic, our team has finally returned to in-person meetings – and we’ve picked up some invaluable insights about modern challenges.
By Rob Greer, Vice President and General Manager, Symantec Enterprise Division - As the GM of Symantec, I had the good fortune of being able to attend both the Gartner Security & Risk Management Summit and the 2022 RSA Conference the week of June 6. While attending two conferences on different coasts in a single week gave me jet lag, it also gave me a chance to hear again the concerns of some of the smartest security practitioners around – our customers.
By Andy Nallappan, Chief Technology Officer and Head of Software Business Operations, Broadcom Software - Enterprises and operators of critical infrastructure have long been on the front lines of cybersecurity. Most recently, new threats have been identified through our Symantec Threat Hunter team, including Lazarus, Verblecon and Daxin. And of course, the previous attacks forcing major service interruptions on large infrastructure.
By Liam O’Murchu, Director, Security Technology and Response - The ransomware threat now dominates every security discussion I have with customers. Their concerns are justified: ransomware gangs are more sophisticated, determined and eager than ever to extract huge ransom payments. They are also deploying surprisingly creative tactics. Gone are the days of merely encrypting or stealing files – now the bad guys are leaking stolen information to put added pressure on their victims.
By Andy Nallappan, Chief Technology Officer and Head of Software Business Operations, Broadcom Software - A couple of decades ago, when nearly all centralized computing ran in data centers, companies began talking about how to accelerate decision-making and reduce latency issues that frustrated users (commonly referred to as the "world wide wait"). This problem became more acute as the increasing use of mobile and IoT devices put new strain on existing internet infrastructure.
By Arnaud Taddei, Security Transformation Architects Practice Leader – International, Symantec, a division of Broadcom Software - Harmonization has become even harder with the intensification of geopolitical competition around key technology standards. China set a new bar with its China Standards 2035 plan, aspects of which many western countries fear risk fragmenting the Internet. The EU’s Internal Market Commissioner, Thierry Breton, stated in February, “We were too naive. We were open by default in the belief that things would go our way. But we can’t be open at any price.”
By Andy Nallappan, Chief Technology Officer and Head of Software Business Operations, Broadcom Software - The Artificial Intelligence (AI) transformation is taking place even faster than anticipated, with increasing numbers of enterprise companies incorporating AI software into their development process. As I mentioned in my previous predictions blog from December 2021, about what to expect in 2022, AI is not only based in the future — it is here.
By Jeff Henry, head of product strategy – Mainframe, Broadcom Software - Think about the importance of a single second in sports. In F1 racing, the average pit stop is just two to three seconds. The driver and crew know that getting the car in and out that quickly is what it takes to beat the competition to the checkered flag. How many basketball games or other sports competitions come down to a critical moment that makes all the difference? Queue the half court “buzzer beater,” last-second “Hail Mary” touchdown, or “photo finish” at the Kentucky Derby. Clearly, time matters!
By Ilias Chantzos, Global Privacy Officer and Head of EMEA Government Affairs, Broadcom Inc. - When it comes to avoiding ransomware attacks, no sector remains safe anymore. Yet, the financial services sector in particular remains a favorite target for cyber criminals. Indeed, financial institutions were disproportionately affected by ransomware in 2021, and the early indications for the New Year point to more of the same for 2022. n