Insight

  • Zero-trust network access (ZTNA) is an important supporting component of zero-trust strategies that allows users to securely connect to the infrastructure, applications, and services they need to do their jobs from anywhere. Recent research by TechTarget’s Enterprise Strategy Group revealed some interesting findings when it comes to how this approach is stacking up to the technology that was previously predominately used for this functionality, VPN.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Microsegmentation is a strategy that has helped many network and cybersecurity teams by creating secure zones within the network; this makes individual parts more manageable at scale and ensure cyberattacks cannot run rampant through an open field of digital infrastructure. Recent research by TechTarget’s Enterprise Strategy Group studied this approach in the context of zero-trust strategies to see how organizations are faring and where they could use help.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Considering the multifaceted, constantly evolving threat landscape that today’s cybersecurity defenders contend with, it makes sense that many organizations opt to supplement internal skills with the expertise of third-party providers. Recent research by TechTarget’s Enterprise Strategy Group revealed that if they can get through the cacophony of incident response (IR) vendors and solutions available and select the right provider for their unique needs, organizations keeping such firms on retainer often fare better in IR than their counterparts who do not.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Improving Incident Response Posture

    Many organizations are struggling to operationalize incident response (IR) against a backdrop of expanding attack surfaces and a growing number of successful attacks. Recent research by TechTarget’s Enterprise Strategy Group revealed that challenges abound in these endeavors, with internal IR leadership and external service providers taking on nuanced roles in the process.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • The ever-increasing volume of distributed data generated by and available to the business continues to overwhelm data-centric stakeholders. As organizations struggle to gain a comprehensive picture of their data, yet another layer of complexity presents itself: rate of change. With the rate of change in the business often eclipsing the rate at which data can be collected and analyzed, organizations need help ensuring the timely delivery of accurate insight based on the current state of the business. By enabling users to access and analyze data without the need for specialist knowledge or coding expertise, AI is helping democratize analytics for the wider business. Users can quickly and easily explore and visualize data, gain new insight through better collaboration, and share results. Whether through augmented analytics or generative AI, AI is making it easier for users to find and analyze the data they need without the manual processes that typically deter broader BI and analytics adoption.

    To assess the state of analytics and BI platforms in today’s organizations, Enterprise Strategy Group surveyed 375 data and IT professionals in North America (US and Canada) involved with or responsible for evaluating, purchasing, managing, and building analytics and BI solutions.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • 2024 XDR and SOC Modernization Trends

    This Complete Survey Results presentation focuses on the people, processes, and technology supporting security operations modernization, including key requirements and expectations for both managed services and products serving XDR usage and SOC modernization.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Many organizations are worried about having a high percentage of code that is open source within their software, expressing concerns about the specific possibility of being victims of hackers targeting popular/commonly used open source software. Organizations are challenged with increased vulnerability across the software supply chain and need effective security solutions that can support the demands of cloud-native development. TechTarget’s Enterprise Strategy Group recently surveyed IT, cybersecurity, and application development professionals responsible for evaluating, purchasing, and utilizing developer-focused security products to gain insights into these trends.

    To learn more about these trends, download the free infographic, The Growing Complexity of Securing the Software Supply Chain.

  • Software is increasingly composed of open source software (OSS), with the majority of organizations reporting it constitutes more than half of their code composition. While it saves time for developers when they can utilize existing third-party code to build and run their applications, security teams need to understand the software components to put the processes in place to secure the applications.

    Consequently, many organizations are worried about having a high percentage of code that is open source, with some expressing concerns about the specific possibility of being victims of hackers targeting popular/commonly used OSS. Organizations are challenged with increased vulnerability across the software supply chain and with understanding how to effectively mitigate risk in light of recent targeted attacks. Organizations need effective software supply chain security solutions that can support the demands of cloud-native development.

    To gain further insight into these trends, TechTarget’s Enterprise Strategy Group surveyed 368 IT, cybersecurity, and application development professionals at organizations in North America (US and Canada) responsible for evaluating, purchasing, and utilizing developer-focused security products.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Rapid application development and deployment are major priorities for many organizations today, but the networking teams tasked with managing multi-cloud environments are struggling to ensure connectivity and security for these fast release cycles. Recent research by TechTarget’s Enterprise Strategy Group revealed that networking teams increasingly feel pressure to be more responsive to developer requests and must better align to and support modern application environments.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Many organizations today rely on multiple cloud services to match the needs of their various IT operations, but this introduces a complex set of challenges for the networking teams in charge of such environments. Recent research by TechTarget’s Enterprise Strategy Group revealed that these teams have concerns about cybersecurity in multi-cloud networking environments as well as ideas regarding how to combat them.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Navigating the Edge Data Deluge Is No Small Feat

    Edge computing locations are important and often mission-critical sites for business transactions and operations. As such, they can be the point of ingress for large volumes of data with varied processing and storage needs. Recent research by TechTarget’s Enterprise Strategy Group examined the storage profile of edge sites for further insights into this landscape.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Extreme temperatures, shocks, moisture, dust, strong vibrations, and even workplace-specific elements such as grease are just some of the environmental factors that can impair important IT infrastructure at the edge. Research by TechTarget’s Enterprise Strategy Group shows that when it comes to edge locations, ruggedized infrastructure and enclosures designed to withstand these conditions are pivotal, especially so for certain organizational profiles.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.