Skip Links

We find industry experts to argue opposing views of a hot topic. Read through both points of view, vote for who you think got it most right, and weigh in with your own opinion, whether it is in agreement with one of the pros or introduces an angle you think they missed.

Additional Debates

Shadow IT: Boon or burden?

Shadow IT is defined as IT systems and/or services brought into the organization without IT approval. While it is often perceived as sneaky and potentially dangerous, some contend that Shadow IT can lead to innovation and increased productivity and efficiency.

View Debate »go to comments
  • VDI: Has the time arrived?

    Is it time to virtualize and centralize the resources so users can access “the desktop” from anywhere using anything, or does the venerable old workhorse still have a place in the modern organization?

    View Debate »go to comments
  • Is IT's influence expanding or eroding?

    Some contend that BYOD has taken off because employees want experiences that IT can't deliver, and the BYOD success is a sign that IT's influence is eroding. Poppycock, say others. Critical new technologies are constantly emerging and the role of technology in business success has never been greater. If anything, they say, IT's influence is expanding.

    View Debate »go to comments
  • Cloud sourcing: Consolidate suppliers or go best of breed?

    If you are going with public cloud services, there is a certain appeal to centralizing your apps with as few suppliers as possible to minimize the management overhead. But given the recent outages with Amazon and other leading players, some observers say you’re better off using a multi-cloud sourcing strategy. What’s more, a slew of specialized SaaS offerings are emerging that give you the option of taking a best of breed approach. Experts argue opposing views about cloud sourcing strategy.

    View Debate »go to comments
  • Tech Debate: Is BYOD better than company issued?

    The BYOD craze is sweeping organizations everywhere, but questions abound, everything from security and compliance to cost control/management.While BYOD lets IT piggyback on user enthusiasm for new productivity tools, is the risk worth it?

    View Debate »go to comments
  • Is the cloud ready for mission critical apps?

    Organizations are gaining confidence in cloud computing, although questions still swirl around everything from basic security and compliance controls to issues regarding supplier viability, ROI and, given the prominent outages of late, simple availability. 

    View Debate »go to comments
  • Security training: Requirement or boondoggle?

    Training is often cited as a critical component of the security puzzle because no security system is foolproof and users need to know the critical role they play. But others argue that too many security professionals rely on training as a cop out, a way to duck responsibility and blame, and that the nature of attacks today make training superfluous. 

    View Debate »go to comments
  • Security: On-premise or in the cloud?

    There are many things that are easier to do in the cloud, but is security one of them?  Proponents argue that basing security tools in the cloud provide all the benefits of any cloud-based resource, including low cost of entry, simplicity of maintenance/upgrades, etc.  But critics say not so fast.  Getting security is hard enough when you control all the resources.  Moving them to the cloud just further complicates the job.

    View Debate »go to comments
  • The better hire: the 50-year-old IT veteran or the fresh grad?

    Age vs. experience?  The argument dates back years and will likely never be resolved, but in the world of high tech, where firms are clamoring for IT skills and yet there are displaced workers looking for jobs, the debate rages on.  Do you go with the veteran whose wisdom has been refined by years of experience, or the young hot shot that has the latest tech chops?

    View Debate »go to comments
  • Mobile security: In the device or in the network?

    The explosion of smart mobile devices brings with it unparalleled enterprise risk. It is hard enough to secure corporate resources when they are in IT’s glass house, or at least on the company grounds. What to do when suddenly the tools, data and applications go wandering? The most fundamental question: Do you secure the device, or put your trust in network defenses?

    View Debate »go to comments
  • What to look for in network fabrics

    Fabric is one of the hottest topics in the data center, and with good reason. Virtualization of data center resources, an explosion of server-to-server traffic, and ever increasing application demands are stressing traditional infrastructures. But there are different ways to approach fabrics, all of which seem to have merit. What are the most important things to look for?

    View Debate »go to comments
  • Dictate the mobile device or let the user decide?

    The list of benefits for the Bring Your Own Device movement is long, but so is the list of associated risks. Is the time right to connect employee gadgets to the company network, or should we be more circumspect?

    View Debate »go to comments
  • iOS vs. Android in the enterprise

    Apple iOS and Google Android have emerged as the two most popular operating system platforms for mobile devices, both smartphones and tablets.  They are also both backed by rich development and application ecosystems. There are, however, pluses and minuses when it comes to enterprise adoption. Which one has the leg up?  We went to a company, MEDL Mobile, that develops for both to give us the opposing views.

    View Debate »go to comments
  • Is broadband stimulus really needed?

    Proponents say government funding of broadband build out will help the US stay relevant in this online world, and ultimately benefit small business and translate into jobs.  Critics say the private sector is doing just fine, thank you, and that the monies could be put to better use.

    View Debate »go to comments
  • The future of end user computing: Two visions

    Personal computing as we know it is changing as hordes of workers arrive with their favorite new tech tools and demand access to corporate resources.  We ask two companies likely to play key roles in the flexible new world of end user computing – VMware and Citrix -- to spell out the future as they see it.  Who do you think is better positioned to deliver on the promise? Cast your vote.

    View Debate »go to comments
  • Are we winning the cyber security war?

    In the cat and mouse game that is enterprise security, it is hard to determine who has the upper hand, so we put the question to two experts.  Give their arguments a read, vote on the position you most agree with and add your thoughts in the forum below.

    View Debate »go to comments
  • IPS: Best of breed or integrated solution?

    The age old question about whether to go with best-of-breed products or integrated solutions is particularly salient when it comes to intrusion-prevention systems. Security is an area where you need the best possible point product, the best of breed folks argue. But the evolved threats require a more holistic view that can only be achieved by taking more factors into account, the integrated solution suppliers counter. Who is right? You decide.

    View Debate »go to comments
  • Should you share breach information?

    When companies suffer a security breach today they face that core dilemma: Tell the world and hope the honesty helps others, or keep it under wraps to avoid tarnishing the brand and duck possible lawsuits? One thing is clear from the arguments below: It is time for the government to take the guesswork out of the equation.

    View Debate »go to comments
  • Is a tablet a PC?

    Given the success of the iPad, you would think the world had discovered something new. But is a tablet really that different than a PC? Aren’t all the functions virtually the same? Or do tablets, with their new shape and touch interface, really represent a departure from the PC as we know it?View Debate »go to comments
  • Enterprise WAN connectivity: MPLS VPN vs. Public Internet

    MPLS is the Cadillac of enterprise WAN services, having earned its stripes as the link option of choice because of its reliability, flexibility and controls.  But upstarts are saying that, with a little ingenuity, they can use Internet pipes to achieve the same ends at a better price.  

    View Debate »go to comments
  • Hosted productivity suites: Google Apps or Microsoft Office 365?

    Microsoft and Google agree that hosted productivity suites offer unique benefits for evolving business needs. Of course the two behemoths traveled very different paths to reach this conclusion, and bring different strengths to their respective offerings. Which one is right you? View Debate »go to comments
  • Layered security defenses: What layer is most critical, network or endpoint?

    There is little argument that a defense in depth model is the best way to safeguard the enterprise, but which layer is most critical? Some would say the application layer will ultimately emerge as the Holy Grail, and that may prove true down the pike (a future debate?), but here we examine two of the more common approaches, the network layer vs. the endpoint.

    View Debate »go to comments
  • Desktop virtualization: niche solution, or new desktop standard?

    Desktop virtualization promises to simplify management, increase efficiency and improve security, but it doesn’t come cheap and requires a big rethink. Will the latter forever relegate desktop virtualization to a few corners of the enterprise, or will the allure of the former convince corporations it is time to start from scratch?

    View Debate »go to comments
  • Apple iPad or Blackberry PlayBook for the enterprise?

    The iPad has taken the world by storm, but RIM hopes to parlay its dominant Blackberry enterprise presence into a meaningful tablet advantage with the new PlayBook. Which tablet wins?

    View Debate »go to comments