Insight

  • Cyber-risk Management Best Practices

    Cyber-risk management is critical for any modern business operation or initiative, with adherence to security standards and best practices, continuous risk assessments and vulnerability scanning, and better understanding of asset state driving practices maturity. But addressing cyber-risk is becoming more complex with expanding attack surfaces, evolving cybersecurity threats, novel forms of data breaches, new attack vectors, and previously unknown vulnerabilities.

    Further, organizations are increasingly managing workloads in cloud environments for the benefits of scale and productivity in addition to on-premises data centers. So, today’s modern ecosystems consist of hybrid or multi-cloud environments, ephemeral assets, expanding attack surfaces, external SaaS and third-party connections, and dynamic cloud-native applications. These infrastructure complexities present new challenges for asset visibility, understanding attack surfaces, securing business-critical assets, and managing their associated risk.

    To gain further insights into these trends, TechTarget’s Enterprise Strategy Group surveyed 375 IT and cybersecurity professionals in North America (US and Canada) involved with cybersecurity risk management technology and processes at their organization.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Customer service is a hard job, whether in a contact center or in the field or in a store. This industry employs millions around the world but has a notoriously high turnover rate. It follows then that companies and other organizations face an ongoing challenge of recruiting, developing, and retaining customer service employees. Employers need to balance efficiency and empathy, with respect to both employee and customer experience (CX), and they are looking to cutting-edge technologies like generative AI (GenAI) for help.

    CX currently experiences a deficit at a business-strategy level compared with business applications such as ERP and SCM. The use of AI and other advanced technologies for customer service is a classic case of combining technology with people and processes to solve problems.

    To further assess and understand current customer service and experience strategies and how GenAI is used to support these efforts, TechTarget’s Enterprise Strategy Group surveyed 375 IT and customer service professionals at midmarket and enterprise organizations in North America (US and Canada).

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • This Complete Survey Results presentation focuses on the extent to which organizations are experimenting with GenAI in support of their customer service and experience efforts, including the scale and scope of the opportunities and challenges likely to be created by the use of GenAI.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Organizations are increasingly adopting DevOps practices to shift IT and operations left to developers so they can provision and deploy their software applications with the help of cloud services. At the same time, they’re attempting to shift the associated cybersecurity responsibilities left as well—a practice known as DevSecOps. Recent research by TechTarget’s Enterprise Strategy Group investigated the state of adopting DevSecOps to integrate security into the software development lifecycle (SDLC), including teams’ progress, top challenges, and investment plans.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Facing demands to increase productivity and scale, organizations are moving to cloud-native application development and delivery leveraging continuous integration and continuous deployment (CI/CD) pipelines and Kubernetes to automate deployment. Platform solutions offering to gather telemetry and automate security tools and processes can help security teams prioritize and drive actions that have a high impact on reducing risk. Recent research by TechTarget’s Enterprise Strategy Group revealed how organizations desire to leverage suites and platforms procured from a smaller set of vendors or even a single vendor to reduce complexity and realize a unified cybersecurity posture across distributed cloud environments.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Despite their need for comprehensive cybersecurity programs, midmarket and small enterprise organizations often have limited budgets and resources, making attracting skilled personnel challenging for these firms. Gaps in security visibility, policies, processes, and infrastructure plus a tendency to use older systems and software make these organizations more vulnerable to attack than businesses with more mature and better funded cybersecurity cultures. TechTarget’s Enterprise Strategy Group recently surveyed IT and cybersecurity professionals to gain insights into these trends.

    To learn more about these trends, download the free infographic, Midmarket and Small Enterprise Cybersecurity Program Development: A Work in Progress.

  • Google Cloud presented a bold and sweeping vision of its plan to build on its position as the fourth-largest software company to lead the fast-emerging enterprise market for artificial intelligence solutions at its recent London summit. Building on the blizzard of new product announcements made at its Next conference earlier in the year, the company is turning its focus to integration in order to reduce friction and drive better outcomes for customers. As new data from TechTarget’s Enterprise Strategy Group confirms the huge level of enterprise interest in generative AI, the additions seem very well timed.

    To learn more, download the free brief, Google Cloud Turns Up the Heat on Generative AI at London Summit.

  • A promising new crop of vendors has sprouted up to address application security posture management (ASPM). While new research from TechTarget’s Enterprise Strategy Group on modern application security trends revealed challenges streamlining remediation efforts to reduce cybersecurity incidents and their effects that an ASPM might able to address, it is a newly emerging area that needs to be better defined to help orchestrate better security processes and tools throughout the software development lifecycle.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • As modern applications are often no longer tied to their underlying infrastructure, consist of numerous loosely coupled microservices, and can rapidly move and scale, corporate IT needs urgent help to understand and prioritize the potential impact of the yellow and red lights on their monitoring dashboards. This is where observability must come in, in place of traditional monitoring, to save the day. While monitoring is a mostly static discipline based on the collection of predefined metrics and logs—often separate from applications, infrastructure, and services to detect anomalies or failures—observability provides deeper insights into the key factors influencing application performance and resilience.

    To learn more, download the free brief, LogicMonitor Brings Foundation for High Impact AI to Hybrid Observability.

  • The Need for Effective Secrets Management

    As modern application development processes enable teams to increase productivity and scale, effective secrets management plays a crucial role. Research from TechTarget’s Enterprise Strategy Group showed that security, application development, and infrastructure teams are challenged with secrets management—the processes and tools used to securely store, manage, and access sensitive credential information such as passwords, API keys, digital certificates, and encryption keys—and need an effective strategy to mitigate risk.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Understanding and applying generative AI (GenAI) requires a deep technical knowledge base, substantial computational resources, robust IT infrastructure, and even compliance with data privacy regulations and AI ethics norms. Many organizations struggle to stay abreast of this ever-evolving landscape. The growing partner ecosystem plays a crucial role in supporting GenAI, with many organizations relying on partners to bridge skill gaps and navigate the intricacies of development. TechTarget’s Enterprise Strategy Group recently surveyed professionals involved in GenAI initiatives and projects at their organization and familiar with their organization’s use of third parties to support GenAI initiatives to gain insights into these trends.

    To learn more about these trends, download the free infographic, Navigating the Generative AI Partner and Alliance Landscape.

  • Evolution of Digital Experience Platforms