Insight

  • Under nearly universal mandates to accelerate IT operations, organizations across industries are turning to AI and GenAI to help automate processes, streamline knowledge management, and more. Recent research by TechTarget’s Enterprise Strategy Group discovered that different industries have diverse priorities and expectations for AI’s potential in these regards.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • With data now at the forefront of practically every modern business strategy, IT operations teams carry a massive responsibility to ensure the proper infrastructure is in place to deliver that data to stakeholders with high levels of availability, performance, and security. Recent research by TechTarget’s Enterprise Strategy Group shows that while this burden is consistent across all organization sizes, teams tend to face different requirements depending on the scope of their employee base.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • This Complete Survey Results presentation focuses on application development trends driving the need to modernize associated cybersecurity programs, including the top challenges and incidents that application security teams have experienced with their current tools and processes.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Pure Storage has unveiled Real-time Enterprise File, a wide-ranging software update to its storage platform that enables IT organizations to better respond to the realities of managing modern file storage supporting demanding workloads such as AI, analytics, and VDI. The update is designed to enable customers to more quickly respond to changing application demands in real time, while reducing total cost of ownership.

  • It is a messy state of affairs when the tools purchased in support of security operations add excessive management overhead, stealing precious time away from the limited skilled security personnel that are so important to the overall security agenda. Recent research by TechTarget’s Enterprise Strategy Group found that security operations are continuing to become more difficult and are often made more so by an overabundance of point tools that burden cybersecurity staff with complexity. Consolidation initiatives are underway for most, but as IT innovations spur the need for new security tools, security leaders face a conundrum about how to get out of this cycle of complexity.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Streamlining Security Operations With Generative AI

    Virtually every business line is exploring and investing in generative AI (GenAI) to gain operational and competitive advantage. The realm of cybersecurity is no different, where security leaders are investing in GenAI to gain efficiencies in security operations (SecOps) in hopes of outmaneuvering their criminal adversaries—who are also likely pushing the limits of what GenAI can do to help achieve their means. Recent research by TechTarget’s Enterprise Strategy Group revealed that SecOps is ripe with opportunity for the use of GenAI, especially for organizations with certain characteristics.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • The Evolution of Network Security

    As IT environments have grown more distributed and diverse, network security tools generally and firewalls specifically have become fragmented. Historically, the choice between CSP firewalls, cloud-native firewalls, and firewall capabilities from networking tools boiled down to ease of use and efficiency versus functionality and efficacy. However, organizations can no longer make tradeoffs. TechTarget’s Enterprise Strategy Group recently surveyed IT and cybersecurity professionals involved with network security technology and processes to gain insights into these trends.

    To learn more about these trends, download the free infographic, The Evolution of Network Security.

  • HPE Private Cloud AI Available for Virtual Assistants

    This month, HPE announced that its HPE Private Cloud AI is available to order. This new integrated and pre-validated solution combines hardware and software from both HPE and NVIDIA and it is designed to accelerate deployment of infrastructure for AI and shorten time to value for AI initiatives. The new solution accelerators give enterprises the ability to deploy virtual assistants with one click and operationalize them in seconds, simplifying the process from end to end.

    To learn more, download the free brief, HPE Private Cloud AI Available for Virtual Assistants.

  • As IT environments have grown more distributed and diverse, network security tools, generally, and firewalls, specifically, have become fragmented. The availability of CSP firewalls, cloud-native firewalls, and firewall capabilities from networking tools has created confusion in the market. Historically, the choice between many of these options boiled down to ease of use and efficiency versus functionality and efficacy. However, organizations can no longer make tradeoffs. They require the best of both worlds and need help understanding their options for network security and the best fit for the use cases they need to support.

    To gain insights into these trends, TechTarget’s Enterprise Strategy Group surveyed 358 IT and cybersecurity professionals in North America (US and Canada) involved with network security technology and processes at their organization.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • AI is slightly older and more established than the fever-pitch hype in the past few years around the technology’s new possibilities may suggest. In the realm of networking, AI has been put to use rather extensively already. In fact, research by TechTarget’s Enterprise Strategy Group recently found compelling connections between organizations’ network automation proficiency and their AI maturity level.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Investigating the use of generative AI (GenAI) to make processes more efficient and increase output is now all but mandated to every technology team across industries. For proof that GenAI is catching on within IT, look no further than the network. Recent research by TechTarget’s Enterprise Strategy Group revealed that network teams are full steam ahead in applying GenAI to their practices, though with some precautions.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Securing the identities of both the humans and non-humans (also referred to as machines) that access systems to keep the business operating is a mission-critical task for cybersecurity teams. However, the constantly expanding nature of these identity estates make this job harder to do every day. Recent research by TechTarget’s Enterprise Strategy Group revealed that when identities are insufficiently secured, organizations become vulnerable to compromise and even successful cyberattacks.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.