Insight

  • This Complete Survey Results presentation focuses on non-human identities (NHIs), including the hurdles to gaining visibility and lifecycle control over NHIs as well as the business agility and compliance challenges posed by the management of NHIs.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Companies are regressing in the ability to manage cyber-risk and vulnerabilities due to a lack of broad asset discovery and state monitoring, deficient surface depth threat intelligence and point-in-time assessment, and insufficient vulnerability context to make prioritization possible. A lack of automation is creating an environment where the time it takes to assess state and security posture takes too long, causing analysis to be conducted on stale context. Recent research by TechTarget’s Enterprise Strategy Group reveals that cybersecurity leaders must focus on improving what data they collect, while building a system that is fast enough to keep up with a modern enterprise environment’s pace of change. To achieve this, organizations expect cyber-risk management tools to consolidate disparate data sets into something much broader over time and build a continuous approach to vulnerability and risk management.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Customer service is a hard job, whether in a contact center or in the field or in a store. Organizations face an ongoing challenge of recruiting, developing, and retaining customer service employees, and they are looking to cutting-edge technologies like generative AI (GenAI) for help. The use of AI and other advanced technologies for customer service is a classic case of combining technology with people and processes to solve problems. TechTarget’s Enterprise Strategy Group recently surveyed IT and customer service professionals to gain insights into these trends.

    To learn more about these trends, download the free infographic, The Impact of GenAI on the Evolution of Customer Service and Support Technologies.

  • Cyber-risk Management Best Practices

    Today’s business technology ecosystems consist of hybrid or multi-cloud environments, ephemeral assets, expanding attack surfaces, external connections, and dynamic cloud-native applications. These infrastructure complexities present new challenges for asset visibility, understanding attack surfaces, securing business-critical assets, and managing their associated risk. TechTarget’s Enterprise Strategy Group recently surveyed IT and cybersecurity professionals to gain insight into trends surrounding the challenges of addressing modern cyber-risk.

    To learn more about these trends, download the free infographic, Cyber-risk Management Best Practices.

  • Cyber-risk Management Best Practices

    Cyber-risk management is critical for any modern business operation or initiative, with adherence to security standards and best practices, continuous risk assessments and vulnerability scanning, and better understanding of asset state driving practices maturity. But addressing cyber-risk is becoming more complex with expanding attack surfaces, evolving cybersecurity threats, novel forms of data breaches, new attack vectors, and previously unknown vulnerabilities.

    Further, organizations are increasingly managing workloads in cloud environments for the benefits of scale and productivity in addition to on-premises data centers. So, today’s modern ecosystems consist of hybrid or multi-cloud environments, ephemeral assets, expanding attack surfaces, external SaaS and third-party connections, and dynamic cloud-native applications. These infrastructure complexities present new challenges for asset visibility, understanding attack surfaces, securing business-critical assets, and managing their associated risk.

    To gain further insights into these trends, TechTarget’s Enterprise Strategy Group surveyed 375 IT and cybersecurity professionals in North America (US and Canada) involved with cybersecurity risk management technology and processes at their organization.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Customer service is a hard job, whether in a contact center or in the field or in a store. This industry employs millions around the world but has a notoriously high turnover rate. It follows then that companies and other organizations face an ongoing challenge of recruiting, developing, and retaining customer service employees. Employers need to balance efficiency and empathy, with respect to both employee and customer experience (CX), and they are looking to cutting-edge technologies like generative AI (GenAI) for help.

    CX currently experiences a deficit at a business-strategy level compared with business applications such as ERP and SCM. The use of AI and other advanced technologies for customer service is a classic case of combining technology with people and processes to solve problems.

    To further assess and understand current customer service and experience strategies and how GenAI is used to support these efforts, TechTarget’s Enterprise Strategy Group surveyed 375 IT and customer service professionals at midmarket and enterprise organizations in North America (US and Canada).

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • This Complete Survey Results presentation focuses on the extent to which organizations are experimenting with GenAI in support of their customer service and experience efforts, including the scale and scope of the opportunities and challenges likely to be created by the use of GenAI.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Organizations are increasingly adopting DevOps practices to shift IT and operations left to developers so they can provision and deploy their software applications with the help of cloud services. At the same time, they’re attempting to shift the associated cybersecurity responsibilities left as well—a practice known as DevSecOps. Recent research by TechTarget’s Enterprise Strategy Group investigated the state of adopting DevSecOps to integrate security into the software development lifecycle (SDLC), including teams’ progress, top challenges, and investment plans.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Facing demands to increase productivity and scale, organizations are moving to cloud-native application development and delivery leveraging continuous integration and continuous deployment (CI/CD) pipelines and Kubernetes to automate deployment. Platform solutions offering to gather telemetry and automate security tools and processes can help security teams prioritize and drive actions that have a high impact on reducing risk. Recent research by TechTarget’s Enterprise Strategy Group revealed how organizations desire to leverage suites and platforms procured from a smaller set of vendors or even a single vendor to reduce complexity and realize a unified cybersecurity posture across distributed cloud environments.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Despite their need for comprehensive cybersecurity programs, midmarket and small enterprise organizations often have limited budgets and resources, making attracting skilled personnel challenging for these firms. Gaps in security visibility, policies, processes, and infrastructure plus a tendency to use older systems and software make these organizations more vulnerable to attack than businesses with more mature and better funded cybersecurity cultures. TechTarget’s Enterprise Strategy Group recently surveyed IT and cybersecurity professionals to gain insights into these trends.

    To learn more about these trends, download the free infographic, Midmarket and Small Enterprise Cybersecurity Program Development: A Work in Progress.

  • Google Cloud presented a bold and sweeping vision of its plan to build on its position as the fourth-largest software company to lead the fast-emerging enterprise market for artificial intelligence solutions at its recent London summit. Building on the blizzard of new product announcements made at its Next conference earlier in the year, the company is turning its focus to integration in order to reduce friction and drive better outcomes for customers. As new data from TechTarget’s Enterprise Strategy Group confirms the huge level of enterprise interest in generative AI, the additions seem very well timed.

    To learn more, download the free brief, Google Cloud Turns Up the Heat on Generative AI at London Summit.