Insight

  • This Complete Survey Results presentation focuses on the experiences of cybersecurity professionals, including performance assessments of their cybersecurity leaders and their suggestions for what organizations can do to help cybersecurity professionals succeed.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • The Emergence of Encryption Teams

    The risk of data breach exposing sensitive or confidential information has never been higher, with firms recognizing that their revenue and reputation are on the line. As a result, encryption for data in motion and at rest has become a mainstay technology for businesses conducting digital transactions. Recent research by TechTarget’s Enterprise Strategy Group suggests that assembling teams to support this important strategy provides organizations with a stronger cybersecurity posture.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • The Post-quantum Cryptography Journey Has Started

    The National Institute of Standards and Technology (NIST) has begun the process of standardizing encryption algorithms designed to withstand attacks by quantum computers. While no quantum computers are currently capable of breaking existing encryption algorithms, that will eventually change as quantum computing evolves and matures. Recent research by TechTarget’s Enterprise Strategy Group investigated how organizations understand and manage post-quantum cryptography (PQC) technologies today in anticipation of the quantum future.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • 2024 Cloud Security Platforms and DevSecOps

    This Complete Survey Results presentation focuses on the scope of cloud-native application development environments, including the top challenges associated with securing cloud-native applications and the security solutions in place to protect cloud infrastructure and applications.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • The aftereffects of the pandemic have continued to disrupt contact centers, where staffing shortages and skill gaps make it difficult to manage customer interactions across channels. To address these challenges, organizations are increasingly turning to cloud-based solutions like contact center-as-a-service (CCaaS) and unified communication-as-a-service (UCaaS). These platforms can connect agents with internal specialists for faster issue resolution and empower them with AI tools to improve efficiency. For busy agents, AI can become a powerful assistant, enabling quick access to knowledgebases for answering customer questions, suggesting response wording for optimal service, and ensuring interactions meet established KPIs.

    To gain further insight into these trends, TechTarget’s Enterprise Strategy Group surveyed 347 IT and business professionals at organizations in North America (US and Canada) responsible for or involved with contact center technology and processes.

    The research assessed the current state and maturity of contact center technology, how it is deployed, the structure of contact center buying teams, and the prioritization of artificial intelligence within contact center strategies. Key areas of investigation included the biggest challenges contact centers face, such as security and privacy, integration, customer retention rates, and maintaining agent performance and productivity.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Security operations grow more difficult each year due to issues like the persistent threat landscape, a growing attack surface, and the volume and complexity of security alerts. Additionally, many SOC teams remain understaffed and lack advanced security operations skills. To address these challenges, CISOs are open to evaluating new technologies in areas like advanced analytics for threat detection and process automation for incident response. TechTarget’s Enterprise Strategy Group recently surveyed IT and cybersecurity professionals responsible for or involved with security operations technology and processes to gain insights into these trends.

    To learn more about these trends, download the free infographic, The Race to Support Overwhelmed Security Teams With XDR and SOC Modernization.

  • Security operations grow more difficult each year due to issues such as the persistent threat landscape, a growing attack surface, and the volume and complexity of security alerts. Additionally, many SOC teams remain understaffed and lack advanced security operations skills. To address these challenges, CISOs are open to evaluating new technologies in areas like advanced analytics for threat detection and process automation for incident response.

    Additionally, many organizations have active initiatives to consolidate security operations tools. SOC technology consolidation and integration efforts are aimed at improving security efficacy, reducing operational overhead, and building a SOC technology architecture that can keep up with the pace and scale of hybrid IT.

    Threat detection and response priorities include operationalizing threat intelligence, improving the integration of asset management data with security operations, and improving alert triage and prioritization. This indicates that existing SOC operations activities are inadequate, and organizations will subsequently spend accordingly to address current limitations.

    To gain further insight into these trends, TechTarget’s Enterprise Strategy Group surveyed 374 IT and cybersecurity professionals at organizations in North America (US and Canada) responsible for or involved with security operations technology and processes.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • From burgeoning new technologies to quickly evolving digital initiatives, a slew of factors is conspiring to make the modern IT infrastructures that support business goals highly complex. Recent research by TechTarget’s Enterprise Strategy Group found that managers of these infrastructures are looking to make specific investments in monitoring, management, and automation to harden and optimize the security of these critical environments.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Businesses have been using FinOps to manage their operational expenditures related to cloud use to great effect. Recent research by TechTarget’s Enterprise Strategy Group revealed that this business practice is evolving from quick wins and cost cutting to a holistic approach to managing cloud financials.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • While economic uncertainty may cause some organizations to hold back on IT investments, that isn’t an option for those with charters to digitally transform. Recent research by TechTarget’s Enterprise Strategy Group showed that digitally mature organizations have nuanced spending plans for 2024 compared with their less digitally advanced counterparts.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.