Insight

  • Due to the criticality of data to virtually all operations today, data resilience is a major focus for infrastructure and cybersecurity teams alike. One need only look at security incidents at Colonial Pipeline and Change Healthcare to understand the enterprise concern. While many look to third-party tools for help with the important task of data discovery in support of resilience, a significant contingent of organizations prefer internally developed tools. Recent research by TechTarget’s Enterprise Strategy Group found that the decision to use third-party vendor services or internally developed data discovery tools can correlate to organizational priorities and affect data resilience solution adoption.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • While even the best-resourced IT organization can perpetually feel like they need more help on hand to contend with the intense cybersecurity threat landscape, some organizations are solving the situation by deploying third-party tools to supersede internally developed tools. Internal resource constraints are forcing firms to find novel ways of stretching thin pools of expertise and resources to achieve an acceptable cybersecurity posture. When it comes to the critical task of ensuring resilience from attacks or even accidental corruption for precious data assets, recent research by TechTarget’s Enterprise Strategy Group found that organizations lacking skill sets are more likely to deploy commercial tools for data discovery and classification rather than develop and maintain internally developed tools.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Platforms Are Critical for SaaS Security

    Maintaining a strong SaaS security posture that includes the right controls, levels of visibility, and threat detection while accounting for new application types like generative AI is a complex task today. Recent research by TechTarget’s Enterprise Strategy Group suggests that the platform approach is coming to the fore as a preferred strategy for IT teams that need to bring a range of functionality together for the crucial task of securing SaaS applications.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Enterprise Browsers Gain Traction

    Securing access across different types of user device and corporate resources continues to challenge even the most sophisticated IT organizations. Enterprise browsers provide an alternative to strictly network-based solutions by adding security enforcement closest to where many users spend the majority of their time: the browser. Recent research by TechTarget’s Enterprise Strategy Group investigated IT decision-makers’ perspectives on how enterprise browsers fit into their broader network security strategies.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • As organizations are under increasing pressure to boost productivity and gain a competitive advantage, they are modernizing application development processes. However, as the adoption of new technologies helps them scale software development for greater speed and volume of releases, security teams need to keep pace to effectively manage risk and protect applications from threats. TechTarget’s Enterprise Strategy Group recently surveyed IT, cybersecurity, and application development professionals to gain insights into these trends.

    To learn more about these trends, download the free infographic, Modernizing Application Security to Scale for Cloud-native Development.

  • As organizations are under increasing pressure to boost productivity and gain a competitive advantage, they are modernizing application development processes. However, as the adoption of new technologies helps them scale software development for greater speed and volume of releases, security teams need to keep pace to effectively manage risk and protect applications from threats. Traditional application security methods may be disruptive or even slow down development processes. As development teams scale using cloud-native technologies and modernized processes, the higher chance for mistakes creates software vulnerabilities that leave them susceptible to attack. Security teams need a modernized approach to efficiently incorporate security tools and processes across the software development lifecycle while promoting business growth by supporting development as it scales.

    To gain insights into these trends, TechTarget’s Enterprise Strategy Group surveyed 350 IT, cybersecurity, and application development professionals in North America (US and Canada) responsible for evaluating, purchasing, and utilizing developer-focused security products.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Modern Business Is Multi-cloud by Design

    Deploying applications in the optimal location is a critical task for IT professionals and developers today as running applications in the wrong environment can result in a variety of consequences, ranging from cost overruns to cybersecurity incidents. When it comes to applications that need to run in the cloud, the decision for many organizations can become which cloud, because their environments comprise multiple public cloud service providers (CSPs). Recent research by TechTarget’s Enterprise Strategy Group revealed that rather than being a result of haphazard additions of CPSs over time, businesses are deliberately bolstering their application deployment strategies with multiple clouds.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Data and Security Fuel Colocation Demands

    As organizations consider the optimal location to deploy their critical applications, they must evaluate numerous factors in their decisions such as traditional concerns around cybersecurity as well as evolving requirements for data flows. Recent research by TechTarget’s Enterprise Strategy Group suggests that amid these important considerations, colocation deployment options are increasingly favorable application deployment locations.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Amid the many technological advances networking teams are exploring to advance their private 5G initiatives today is the multi-operator core network (MOCN) and its strong promises of operating efficiency. With potential to provide benefits in welcome areas like cost optimization and scalability, many organizations are exploring the use of these neutral host or MOCN approaches. Recent research by TechTarget’s Enterprise Strategy Group suggests that this key enabling technology for private 5G goals may soon see broader application.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Today’s edge sites conduct critical business and customer service functions, often performing local data collection and processing, distributing workloads, and providing real-time insights. With these expedient insights representing crucial competitive differentiation in many cases, recent research by TechTarget’s Enterprise Strategy Group revealed that 5G is viewed as an important enabling technology for strong connectivity at the edge.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Rethinking Database Requirements in the Age of AI

    This Complete Survey Results presentation focuses on database adoption trends, emerging database considerations, evaluation and purchase criteria, database management challenges, vector trends, RAG trends, database strategies to support GenAI initiatives, stakeholders, governance, and cloud database trends.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • At its recent Analyst Day event, Ericsson laid out updated details regarding the company’s evolutionary push, turning from its deep wireless communications and service provider heritage toward solving the wireless networking needs of enterprises large and small. The new solution lineup is hitting the market at a time when TechTarget’s Enterprise Strategy Group is seeing rapidly increasing interest in 5G, both for wireless WAN and private cellular networking. The new three-part Ericsson Enterprise product strategy provides important new choices for enterprises considering cellular networking options for both inside and outside their perimeters.

    To learn more, download the free brief, Ericsson Ramps Focus on Enterprise Wireless Solutions.