Insight

  • For many organizations in recent years, the spotlight has been on technologies that support strong communication and collaboration between increasingly distributed employees and teams. Research by TechTarget’s Enterprise Strategy Group asked IT decision-makers around the world about their spending intentions for such technologies in 2024.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • End-user Computing Spending Trends

    End users today rely on a litany of computing devices to connect them to the systems and people they need to complete their jobs from increasingly distributed locations. Recent research by TechTarget’s Enterprise Strategy Group sought to understand organizations’ investment plans for end-user computing technologies in 2024.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • As ransomware attacks ravage data systems and operations across industries, data protection and cybersecurity leaders are finding that their recoverability falls short in the face of this threat. Recent research by TechTarget’s Enterprise Strategy Group finds most organizations have a long way to go in bringing ransomware service-level agreements (SLAs) in line with those of traditional recovery operations to protect their critical data assets and reputations.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Mitigating Ransomware Is a Business Imperative

    Ransomware has burdened data protection and cybersecurity professionals alike since its inception in the modern threat landscape. Recent research by TechTarget’s Enterprise Strategy Group showed that this now-mainstay threat is no longer an anxiety for only IT professionals tasked with managing its mitigation but also affects roles and lines of business throughout organizations that must combat it.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • As organizations seek the optimal mix of security, agility, and cost efficiency in their data environments, they increasingly find themselves working with both on-premises and public cloud technologies. These hybrid environments provide numerous benefits for differing data types and workloads, but they can also cause operational complexity for the IT professionals tasked with deploying, managing, and maintaining a variety of technologies across numerous vendor products. Recent research by TechTarget’s Enterprise Strategy Group found that IT teams are looking to solidify their cloud experiences as these hybrid trends evolve.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • With data powering everything from product development and tailored customer experiences to compliance with legal and ethical standards, most organizations are open to collecting as much data as they can to fuel competitive advantage and keep their operations humming. But funneling in data from every source available can cause challenges for the IT teams tasked with operationalizing this data and keeping it safe. Recent research by TechTarget’s Enterprise Strategy Group shows that most organizations are aware of this mounting problem and carefully planning solutions.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Organizations continue to modernize their infrastructure to meet transformation mandates and position themselves for success in the digital era. As data plays a perpetually rising role in helping businesses differentiate, storage infrastructure becomes even more critical, especially in the face of today’s extensive AI opportunity. However, the pace and extent to which organizations can begin to capitalize on these opportunities varies widely.

    To learn more about these trends, download the free infographic, Navigating the Cloud and AI Revolution: The State of Enterprise Storage and HCI.

  • Edge IT and application environments often serve as the face of the business, creating and delivering the key customer experience. They are also often a core location of essential operations, determining operational efficiency. In an era when nearly every business is a digital business, digital operations at the edge are crucial to achieving competitive success in the market.

    To learn more about these trends, download the free infographic, Unleashing the Edge: Business Drivers, Challenges, and Requirements in Edge Infrastructure and Environments.

  • The Risk: Nonhuman Identities

    The number of nonhuman identities such as API keys, OAuth tokens, and service accounts has grown dramatically, and those credentials pose a significant risk as adversaries can use them to compromise core systems and steal sensitive data. The scale of the challenge is big; the number of nonhuman identities—also called machine identities—typically outstrips the number of human identities in larger enterprises.

    Enterprises frequently lack visibility into those identities to track their creation, usage, and access privileges. Managing nonhuman identities is considerably different than traditional human identity and access management (IAM), as nonhuman identities have different lifecycles, workflows, and policies.

    This issue is something that established players and a collection of startups in IAM, privileged access management (PAM), and cloud infrastructure entitlement management (CIEM) are looking to solve. Astrix Security announced a Series A round of funding in mid-2023, Clutch Security recently came out of stealth, and Oasis Security announced an A round in January 2024.

    Understanding Interest in Managing Nonhuman Identities

    In looking at what people sought in machine identity management in various TechTarget resources, some interesting data pops out:

    • About 20% of the people looking were from IT security, while about 80% was spread across responsibilities including IT systems management, IT infrastructure and cloud operations, application development, and so forth.
    • 80% of the people searching came from organizations with more than 1,000 employees.

    The interest in nonhuman identity management is shared across many disciplines, the largest of which is the security team. This is a grounds-up phenomenon driven by staff, managers, and directors. And while the interest in nonhuman identity management is large and growing, the biggest interest is in midmarket (1,000-10,000 employees) and large­ (10,000-plus employees) enterprises.

    There are plenty of smaller, tech-forward companies that are looking at this—about 20% of the organizations have fewer than 1,000 employees—but the volume of the interest comes from bigger organizations researching the topic.

    Diverse Interest in Nonhuman Identity Management

    IT security teams have frequently been criticized for managing last year’s security risks rather than working with peer functions and lines of business to counter emerging risks to the business. When new technology comes along, the IT security team can be behind the curve in collaborating across the organization with constituencies like IT operations or DevOps partners to address new risks—with DevSecOps frequently a dream rather than a reality. And security teams have been criticized in the past for hindering business innovations in pursuit of controlling risk. The diverse interest in nonhuman identity management might signal that dynamic is changing, with the security teams actively collaborating with adjacent IT functions to get ahead of the nonhuman identity management challenge. Nonhuman identity management is a dynamic space. If you are involved in managing nonhuman identities and want to exchange ideas, give me a shout to share what you are doing.

    All data from this blog are from TechTarget Buyer Intent Data, based on aggregated audience activities over the 3-month period between January 2024 and March 2024, submarket: Machine Identity Management.

  • Organizations continue to modernize their infrastructure to meet transformation mandates and position themselves for success in the digital era. As data continues to play a central role in helping businesses differentiate, storage infrastructure becomes critical, which is now thrown into even sharper relief as the large AI opportunity becomes apparent. However, the pace and extent to which organizations can begin to capitalize on these opportunities varies widely, especially when set against the backdrop of macro challenges and preexisting priorities. This study provides a detailed view into how organizations are evolving their storage and related infrastructure, including hyperconverged infrastructure, to meet the broad range of IT objectives at both strategic and tactical levels.

    To assess the state of enterprise storage and HCI, Enterprise Strategy Group surveyed 375 IT professionals in North America (US and Canada) responsible for evaluating, purchasing, and managing data storage technologies (including external disk-based storage systems) for their organization.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Organizations continue to modernize their infrastructure to meet transformation mandates and position themselves for success in the digital era. As data continues to play a central role in helping businesses differentiate, storage infrastructure becomes critical, which is now thrown into even sharper relief as the large AI opportunity becomes apparent. However, the pace and extent to which organizations can begin to capitalize on these opportunities varies widely, especially when set against the backdrop of macro challenges and preexisting priorities. This study provides a detailed view into how organizations are evolving their storage and related infrastructure, including hyperconverged infrastructure, to meet the broad range of IT objectives at both strategic and tactical levels.

    To assess the state of enterprise storage and HCI, Enterprise Strategy Group surveyed 375 IT professionals in North America (US and Canada) responsible for evaluating, purchasing, and managing data storage technologies (including external disk-based storage systems) for their organization.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • In today’s rapidly evolving cybercrime landscape, cyber-risk management and threat prevention are key for effective cloud threat detection and response practices. However, recent research by TechTarget’s Enterprise Strategy Group found that the speed and scale of modern development cycles presents unique challenges for the security teams tasked with protecting their organizations’ valuable cloud assets.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.