Insight

  • The Evolution of Network Security

    As IT environments have grown more distributed and diverse, network security tools generally and firewalls specifically have become fragmented. Historically, the choice between CSP firewalls, cloud-native firewalls, and firewall capabilities from networking tools boiled down to ease of use and efficiency versus functionality and efficacy. However, organizations can no longer make tradeoffs. TechTarget’s Enterprise Strategy Group recently surveyed IT and cybersecurity professionals involved with network security technology and processes to gain insights into these trends.

    To learn more about these trends, download the free infographic, The Evolution of Network Security.

  • HPE Private Cloud AI Available for Virtual Assistants

    This month, HPE announced that its HPE Private Cloud AI is available to order. This new integrated and pre-validated solution combines hardware and software from both HPE and NVIDIA and it is designed to accelerate deployment of infrastructure for AI and shorten time to value for AI initiatives. The new solution accelerators give enterprises the ability to deploy virtual assistants with one click and operationalize them in seconds, simplifying the process from end to end.

    To learn more, download the free brief, HPE Private Cloud AI Available for Virtual Assistants.

  • As IT environments have grown more distributed and diverse, network security tools, generally, and firewalls, specifically, have become fragmented. The availability of CSP firewalls, cloud-native firewalls, and firewall capabilities from networking tools has created confusion in the market. Historically, the choice between many of these options boiled down to ease of use and efficiency versus functionality and efficacy. However, organizations can no longer make tradeoffs. They require the best of both worlds and need help understanding their options for network security and the best fit for the use cases they need to support.

    To gain insights into these trends, TechTarget’s Enterprise Strategy Group surveyed 358 IT and cybersecurity professionals in North America (US and Canada) involved with network security technology and processes at their organization.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • AI is slightly older and more established than the fever-pitch hype in the past few years around the technology’s new possibilities may suggest. In the realm of networking, AI has been put to use rather extensively already. In fact, research by TechTarget’s Enterprise Strategy Group recently found compelling connections between organizations’ network automation proficiency and their AI maturity level.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Investigating the use of generative AI (GenAI) to make processes more efficient and increase output is now all but mandated to every technology team across industries. For proof that GenAI is catching on within IT, look no further than the network. Recent research by TechTarget’s Enterprise Strategy Group revealed that network teams are full steam ahead in applying GenAI to their practices, though with some precautions.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Securing the identities of both the humans and non-humans (also referred to as machines) that access systems to keep the business operating is a mission-critical task for cybersecurity teams. However, the constantly expanding nature of these identity estates make this job harder to do every day. Recent research by TechTarget’s Enterprise Strategy Group revealed that when identities are insufficiently secured, organizations become vulnerable to compromise and even successful cyberattacks.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Multifactor authentication (MFA) is a robust tool that teams tasked with securing a workforce’s credentials and identities frequently employ to ensure only the right people access critical systems and data. Recent research by TechTarget’s Enterprise Strategy Group shows that when it comes to making MFA a mandatory part of identity security for workforces, some firms are more apt to do so than others.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Offering seamless and personalized digital experiences for customers is a major directive for businesses operating in any market as this capability represents a competitive advantage and promotes brand loyalty. However, changing technology paradigms, an evolving cybersecurity landscape, and other factors can make this a tall order for the IT teams tasked with digital experience management. Recent research by TechTarget’s Enterprise Strategy Group revealed that employing a digital experience platform (DXP) can help organizations enhance and operationalize customer experiences and even guide digital experience strategies overall.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Digital experience optimization can be an exciting part of business strategy due to its potential to improve customer engagement and win brand loyalty. However, recent research by TechTarget’s Enterprise Strategy Group found that organizations are not eschewing precautions around cybersecurity in favor of other business motivations when considering platforms that enable digital experience operations.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Achieving Cyber and Data Resilience

    In the face of ransomware and other cybersecurity threats, organizations are concerned with cyber resilience, especially the resilience of their data assets. For most organizations, data is a prime asset that drives core business processes, and in many cases, data is the business. Teams face unique challenges in their data resilience initiatives that seek to combine data security posture management, data protection (recoverability), and data governance. TechTarget’s Enterprise Strategy Group recently surveyed IT professionals about these dynamics to gain insights into these trends.

    To learn more about these trends, download the free infographic, Achieving Cyber and Data Resilience.

  • Securing SaaS Ecosystems

    Organizations have shifted from using a few discrete cloud applications to supporting an entire ecosystem around SaaS. Because these applications often house sensitive data, it is critical that security teams ensure they are properly configured, malware and compromised users are detected, and data is protected, all while controlling access from a range of both internal and third-party users. TechTarget’s Enterprise Strategy Group recently surveyed IT and cybersecurity professionals involved with securing their organization’s SaaS applications to gain insights into these trends.

    To learn more about these trends, download the free infographic, Securing SaaS Ecosystems.

  • This month, IBM announced the 10th generation of its DS8000 enterprise storage solution, designed to deliver mission-critical resilience and high performance to support mainframe environments and provide enterprise-level application consolidation. In this latest generation, IBM integrates multiple enhancements, including upgrades of the internal architecture with NVME technology and PCIe Gen4.

    To learn more, download the free brief, IBM Enhances DS8000 Enterprise Storage in Its 10th Generation.