Insight

  • Understanding and applying generative AI (GenAI) requires a deep technical knowledge base, and many organizations struggle to stay abreast of the ever-evolving landscape. Which model is best for our use case? How can we incorporate our own data? How can we get started with responsible AI? Moreover, implementing and scaling GenAI solutions demands substantial computational resources and robust IT infrastructure. These factors coupled with the need to comply with data privacy regulations and AI ethics norms are creating a troubling scenario for organizations that want to leverage this powerful technology but need help getting started and eventually scaling its use within the business.

    The growing partner ecosystem plays a crucial role in supporting GenAI, especially as organizations rapidly ramp up initiatives. Many organizations rely on partners to bridge skill gaps and navigate the intricacies of GenAI development. This collaborative approach not only addresses the need for expertise but also fosters a learning environment, allowing organizations to upskill their teams.

    To gain further insight into these trends and challenges, TechTarget’s Enterprise Strategy Group surveyed 382 professionals at organizations in North America (US and Canada) involved in the strategy, decision-making, selection, deployment, and management of generative AI initiatives and projects at their organization and familiar with their organization’s use of third parties to support generative AI initiatives.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • This Complete Survey Results presentation focuses on security needs and preferred strategies for midmarket and small enterprise organizations, including the current state of security program development and the associated gaps and challenges.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • This Complete Survey Results presentation focuses on generative AI adoption drivers, capabilities, prioritization, investment, stakeholders, metrics delivery methods, challenges, skills, partner types, and partner engagement and collaboration trends.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Due to the criticality of data to virtually all operations today, data resilience is a major focus for infrastructure and cybersecurity teams alike. One need only look at security incidents at Colonial Pipeline and Change Healthcare to understand the enterprise concern. While many look to third-party tools for help with the important task of data discovery in support of resilience, a significant contingent of organizations prefer internally developed tools. Recent research by TechTarget’s Enterprise Strategy Group found that the decision to use third-party vendor services or internally developed data discovery tools can correlate to organizational priorities and affect data resilience solution adoption.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • While even the best-resourced IT organization can perpetually feel like they need more help on hand to contend with the intense cybersecurity threat landscape, some organizations are solving the situation by deploying third-party tools to supersede internally developed tools. Internal resource constraints are forcing firms to find novel ways of stretching thin pools of expertise and resources to achieve an acceptable cybersecurity posture. When it comes to the critical task of ensuring resilience from attacks or even accidental corruption for precious data assets, recent research by TechTarget’s Enterprise Strategy Group found that organizations lacking skill sets are more likely to deploy commercial tools for data discovery and classification rather than develop and maintain internally developed tools.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Platforms Are Critical for SaaS Security

    Maintaining a strong SaaS security posture that includes the right controls, levels of visibility, and threat detection while accounting for new application types like generative AI is a complex task today. Recent research by TechTarget’s Enterprise Strategy Group suggests that the platform approach is coming to the fore as a preferred strategy for IT teams that need to bring a range of functionality together for the crucial task of securing SaaS applications.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Enterprise Browsers Gain Traction

    Securing access across different types of user device and corporate resources continues to challenge even the most sophisticated IT organizations. Enterprise browsers provide an alternative to strictly network-based solutions by adding security enforcement closest to where many users spend the majority of their time: the browser. Recent research by TechTarget’s Enterprise Strategy Group investigated IT decision-makers’ perspectives on how enterprise browsers fit into their broader network security strategies.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • As organizations are under increasing pressure to boost productivity and gain a competitive advantage, they are modernizing application development processes. However, as the adoption of new technologies helps them scale software development for greater speed and volume of releases, security teams need to keep pace to effectively manage risk and protect applications from threats. TechTarget’s Enterprise Strategy Group recently surveyed IT, cybersecurity, and application development professionals to gain insights into these trends.

    To learn more about these trends, download the free infographic, Modernizing Application Security to Scale for Cloud-native Development.

  • As organizations are under increasing pressure to boost productivity and gain a competitive advantage, they are modernizing application development processes. However, as the adoption of new technologies helps them scale software development for greater speed and volume of releases, security teams need to keep pace to effectively manage risk and protect applications from threats. Traditional application security methods may be disruptive or even slow down development processes. As development teams scale using cloud-native technologies and modernized processes, the higher chance for mistakes creates software vulnerabilities that leave them susceptible to attack. Security teams need a modernized approach to efficiently incorporate security tools and processes across the software development lifecycle while promoting business growth by supporting development as it scales.

    To gain insights into these trends, TechTarget’s Enterprise Strategy Group surveyed 350 IT, cybersecurity, and application development professionals in North America (US and Canada) responsible for evaluating, purchasing, and utilizing developer-focused security products.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Modern Business Is Multi-cloud by Design

    Deploying applications in the optimal location is a critical task for IT professionals and developers today as running applications in the wrong environment can result in a variety of consequences, ranging from cost overruns to cybersecurity incidents. When it comes to applications that need to run in the cloud, the decision for many organizations can become which cloud, because their environments comprise multiple public cloud service providers (CSPs). Recent research by TechTarget’s Enterprise Strategy Group revealed that rather than being a result of haphazard additions of CPSs over time, businesses are deliberately bolstering their application deployment strategies with multiple clouds.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Data and Security Fuel Colocation Demands

    As organizations consider the optimal location to deploy their critical applications, they must evaluate numerous factors in their decisions such as traditional concerns around cybersecurity as well as evolving requirements for data flows. Recent research by TechTarget’s Enterprise Strategy Group suggests that amid these important considerations, colocation deployment options are increasingly favorable application deployment locations.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Amid the many technological advances networking teams are exploring to advance their private 5G initiatives today is the multi-operator core network (MOCN) and its strong promises of operating efficiency. With potential to provide benefits in welcome areas like cost optimization and scalability, many organizations are exploring the use of these neutral host or MOCN approaches. Recent research by TechTarget’s Enterprise Strategy Group suggests that this key enabling technology for private 5G goals may soon see broader application.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.