Insight

  • Investigating the use of generative AI (GenAI) to make processes more efficient and increase output is now all but mandated to every technology team across industries. For proof that GenAI is catching on within IT, look no further than the network. Recent research by TechTarget’s Enterprise Strategy Group revealed that network teams are full steam ahead in applying GenAI to their practices, though with some precautions.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Securing the identities of both the humans and non-humans (also referred to as machines) that access systems to keep the business operating is a mission-critical task for cybersecurity teams. However, the constantly expanding nature of these identity estates make this job harder to do every day. Recent research by TechTarget’s Enterprise Strategy Group revealed that when identities are insufficiently secured, organizations become vulnerable to compromise and even successful cyberattacks.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Multifactor authentication (MFA) is a robust tool that teams tasked with securing a workforce’s credentials and identities frequently employ to ensure only the right people access critical systems and data. Recent research by TechTarget’s Enterprise Strategy Group shows that when it comes to making MFA a mandatory part of identity security for workforces, some firms are more apt to do so than others.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Offering seamless and personalized digital experiences for customers is a major directive for businesses operating in any market as this capability represents a competitive advantage and promotes brand loyalty. However, changing technology paradigms, an evolving cybersecurity landscape, and other factors can make this a tall order for the IT teams tasked with digital experience management. Recent research by TechTarget’s Enterprise Strategy Group revealed that employing a digital experience platform (DXP) can help organizations enhance and operationalize customer experiences and even guide digital experience strategies overall.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Digital experience optimization can be an exciting part of business strategy due to its potential to improve customer engagement and win brand loyalty. However, recent research by TechTarget’s Enterprise Strategy Group found that organizations are not eschewing precautions around cybersecurity in favor of other business motivations when considering platforms that enable digital experience operations.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Achieving Cyber and Data Resilience

    In the face of ransomware and other cybersecurity threats, organizations are concerned with cyber resilience, especially the resilience of their data assets. For most organizations, data is a prime asset that drives core business processes, and in many cases, data is the business. Teams face unique challenges in their data resilience initiatives that seek to combine data security posture management, data protection (recoverability), and data governance. TechTarget’s Enterprise Strategy Group recently surveyed IT professionals about these dynamics to gain insights into these trends.

    To learn more about these trends, download the free infographic, Achieving Cyber and Data Resilience.

  • Securing SaaS Ecosystems

    Organizations have shifted from using a few discrete cloud applications to supporting an entire ecosystem around SaaS. Because these applications often house sensitive data, it is critical that security teams ensure they are properly configured, malware and compromised users are detected, and data is protected, all while controlling access from a range of both internal and third-party users. TechTarget’s Enterprise Strategy Group recently surveyed IT and cybersecurity professionals involved with securing their organization’s SaaS applications to gain insights into these trends.

    To learn more about these trends, download the free infographic, Securing SaaS Ecosystems.

  • This month, IBM announced the 10th generation of its DS8000 enterprise storage solution, designed to deliver mission-critical resilience and high performance to support mainframe environments and provide enterprise-level application consolidation. In this latest generation, IBM integrates multiple enhancements, including upgrades of the internal architecture with NVME technology and PCIe Gen4.

    To learn more, download the free brief, IBM Enhances DS8000 Enterprise Storage in Its 10th Generation.

  • Securing SaaS Ecosystems

    Organizations have shifted from using a few discrete cloud applications to supporting an entire ecosystem around SaaS. Sanctioned applications, such as Salesforce or Office365, receive most of the attention. Yet when accounting for the third-party application extensions interconnected with these core applications, as well as unsanctioned applications employees use outside the purview of IT and security teams, the picture becomes much broader and more diverse. Because they often house sensitive data, it is critical that security teams ensure applications are properly configured, malware and compromised users are detected, and data is protected, all while controlling access from a range of both internal and third-party users. Yet an abundance of tools claiming to address these challenges has left many security teams unclear as to where to focus their attention.

    To gain further insight into these trends, TechTarget’s Enterprise Strategy Group surveyed 388 IT and cybersecurity professionals at organizations in North America (US and Canada) involved with securing their organization’s SaaS applications.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • DSPM comprises technology and processes that continuously monitor and assess an organization’s data security controls across all infrastructure, including on-premises data centers and private and public cloud environments. Recent data resilience research by TechTarget’s Enterprise Strategy Group revealed some interesting findings when it comes to DSPM solution deployment and top use cases. While DSPM tools are relatively quick to deploy compared to other security technologies, organizations need to consider the people, process and technology when implementing DSPM and ensure they strategically plan an approach that will meet future needs to support scale and innovation, including usage of AI and generative AI (GenAI).

    To learn more, download the free brief, Streamlining Data Security Posture Management (DSPM) Implementations.

  • This Complete Survey Results presentation focuses on the impacts of microservices, cloud-native application challenges, containers, multi-cluster and multi-namespace deployments, serverless deployments, infrastructure-as-code, open source tools for cloud management and automation, DevOps practices, and platform engineering.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Cisco Nexus Hyperfabric – The Rest of the Story

    Cisco has announced early availability of Cisco Nexus Hyperfabric and the 6000 Series switches, including a scope that goes well beyond what was announced in June for AI clusters. The new Nexus Hyperfabric is much broader and much more revolutionary for Cisco, greatly expanding the types of data center network deployments that can be addressed.

    To learn more, download the free brief, Cisco Nexus Hyperfabric – The Rest of the Story.