Insight

  • Organizations of all varieties understand that pursuing digital transformation goals without modernizing their infrastructure is like trying to drive a racecar on a dirt road; without a smooth, optimized terrain, all the advanced technology has no way to succeed. However, recent research by TechTarget’s Enterprise Strategy Group finds that many encounter critical roadblocks as they race to optimize storage amid flash, software-defined, and cloud-native technology advancements.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Recent research by TechTarget’s Enterprise Strategy Group revealed that although public cloud adoption remains strong, many IT organizations are expressing a desire—and in some instances, a preference—for on-premises infrastructure options, which could herald an on-premises storage infrastructure “renaissance” in 2024 and beyond.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Consumption-based Storage Continues to Build

    While on-premises storage solutions coexist with cloud services at many organizations today to serve the varying needs of different workloads, IT teams often want these technologies to be the same in one way: the consumption model. Recent research by TechTarget’s Enterprise Strategy Group investigated this trend and its effects on not only IT operations but also staff roles.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Zero-trust network access (ZTNA) is an important supporting component of zero-trust strategies that allows users to securely connect to the infrastructure, applications, and services they need to do their jobs from anywhere. Recent research by TechTarget’s Enterprise Strategy Group revealed some interesting findings when it comes to how this approach is stacking up to the technology that was previously predominately used for this functionality, VPN.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Microsegmentation is a strategy that has helped many network and cybersecurity teams by creating secure zones within the network; this makes individual parts more manageable at scale and ensure cyberattacks cannot run rampant through an open field of digital infrastructure. Recent research by TechTarget’s Enterprise Strategy Group studied this approach in the context of zero-trust strategies to see how organizations are faring and where they could use help.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Considering the multifaceted, constantly evolving threat landscape that today’s cybersecurity defenders contend with, it makes sense that many organizations opt to supplement internal skills with the expertise of third-party providers. Recent research by TechTarget’s Enterprise Strategy Group revealed that if they can get through the cacophony of incident response (IR) vendors and solutions available and select the right provider for their unique needs, organizations keeping such firms on retainer often fare better in IR than their counterparts who do not.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Improving Incident Response Posture

    Many organizations are struggling to operationalize incident response (IR) against a backdrop of expanding attack surfaces and a growing number of successful attacks. Recent research by TechTarget’s Enterprise Strategy Group revealed that challenges abound in these endeavors, with internal IR leadership and external service providers taking on nuanced roles in the process.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • The ever-increasing volume of distributed data generated by and available to the business continues to overwhelm data-centric stakeholders. As organizations struggle to gain a comprehensive picture of their data, yet another layer of complexity presents itself: rate of change. With the rate of change in the business often eclipsing the rate at which data can be collected and analyzed, organizations need help ensuring the timely delivery of accurate insight based on the current state of the business. By enabling users to access and analyze data without the need for specialist knowledge or coding expertise, AI is helping democratize analytics for the wider business. Users can quickly and easily explore and visualize data, gain new insight through better collaboration, and share results. Whether through augmented analytics or generative AI, AI is making it easier for users to find and analyze the data they need without the manual processes that typically deter broader BI and analytics adoption.

    To assess the state of analytics and BI platforms in today’s organizations, Enterprise Strategy Group surveyed 375 data and IT professionals in North America (US and Canada) involved with or responsible for evaluating, purchasing, managing, and building analytics and BI solutions.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • 2024 XDR and SOC Modernization Trends

    This Complete Survey Results presentation focuses on the people, processes, and technology supporting security operations modernization, including key requirements and expectations for both managed services and products serving XDR usage and SOC modernization.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Many organizations are worried about having a high percentage of code that is open source within their software, expressing concerns about the specific possibility of being victims of hackers targeting popular/commonly used open source software. Organizations are challenged with increased vulnerability across the software supply chain and need effective security solutions that can support the demands of cloud-native development. TechTarget’s Enterprise Strategy Group recently surveyed IT, cybersecurity, and application development professionals responsible for evaluating, purchasing, and utilizing developer-focused security products to gain insights into these trends.

    To learn more about these trends, download the free infographic, The Growing Complexity of Securing the Software Supply Chain.

  • Software is increasingly composed of open source software (OSS), with the majority of organizations reporting it constitutes more than half of their code composition. While it saves time for developers when they can utilize existing third-party code to build and run their applications, security teams need to understand the software components to put the processes in place to secure the applications.

    Consequently, many organizations are worried about having a high percentage of code that is open source, with some expressing concerns about the specific possibility of being victims of hackers targeting popular/commonly used OSS. Organizations are challenged with increased vulnerability across the software supply chain and with understanding how to effectively mitigate risk in light of recent targeted attacks. Organizations need effective software supply chain security solutions that can support the demands of cloud-native development.

    To gain further insight into these trends, TechTarget’s Enterprise Strategy Group surveyed 368 IT, cybersecurity, and application development professionals at organizations in North America (US and Canada) responsible for evaluating, purchasing, and utilizing developer-focused security products.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Rapid application development and deployment are major priorities for many organizations today, but the networking teams tasked with managing multi-cloud environments are struggling to ensure connectivity and security for these fast release cycles. Recent research by TechTarget’s Enterprise Strategy Group revealed that networking teams increasingly feel pressure to be more responsive to developer requests and must better align to and support modern application environments.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.