Insight

  • Organizations across industries are feeling the same pain from password-based authentication: Frustrated users can’t use easy-to-remember passwords because they’re easy to crack, and they struggle to use strong passwords without reusing them or resorting to other unsecure methods of recalling them. Research conducted by TechTarget’s Enterprise Strategy Group explored the use of Fast Identity Online (FIDO) to eliminate the use of passwords for securing access to enterprise systems.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Password-based authentication has proved itself insufficient in securing access to organizational resources in the face of the modern threat landscape. Recent research by TechTarget’s Enterprise Strategy Group revealed that although the use of multifactor authentication (MFA) strengthens security, it can add friction to the authentication process, and organizations are turning to adaptive MFA to balance security with a reasonable user experience.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Endpoint Device Trends

    This Complete Survey Results presentation focuses on the state of endpoint device preferences and priorities as well as how organizations are evolving their traditional endpoint strategies by incorporating new and alternative approaches.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • 2024 Technology Spending Intentions Survey

    This Complete Survey Results presentation focuses on 2024 IT budget expectations, technology initiatives and priorities, year-over-year spending changes (overall and by different technologies), cloud usage trends, and how digital transformation initiatives intersect with these considerations.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Plans for Remote Worker SD-WAN Deployments

    The rise in popularity of remote workstyles is one of the major contributing factors to the increasingly distributed nature of modern IT environments. One of the ways networking teams have been dealing with secure connectivity to remote workers is SD-WAN technology. Recent research by TechTarget’s Enterprise Strategy Group examining the use of SD-WAN in SASE strategies uncovered some nuanced challenges organizations are facing in their pursuit of more extensive SD-WAN rollouts to remote sites.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • This Complete Survey Results presentation focuses on understanding the current and future landscape of enterprise storage and HCI environments, including storage capacity, data growth, adoption of on- and off-premises storage technologies, file and block storage challenges, flash storage trends, persistent storage trends, investment and spending strategies, vendor evaluation, AI-led decision-making, and HCI deployment trends.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Remote work, cloud adoption, and other IT trends have driven increasing interest in secure access service edge (SASE) architectures. Networking teams especially tout this technology because they have a history of securing connectivity with SD-WAN. Recent research by TechTarget’s Enterprise Strategy Group investigated how this team is converging with cybersecurity teams to securely connect their distributed environments.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • The AI and Automation Mandate for SD-WAN

    In pursuit of their secure network connectivity goal, networking teams are using SD-WAN technology to support highly distributed IT environments. However, any efficiency gained from this technology can quickly be overshadowed by the massive burden of overseeing hundreds to potentially hundreds of thousands of sites in enterprise and even midmarket organizations. Recent research by TechTarget’s Enterprise Strategy Group shows that networking professionals consider artificial intelligence (AI) and automation crucial to relieving the burden of this situation while ensuring cybersecurity remains a priority.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Incident Response Strategies in the Spotlight

    This Complete Survey Results presentation focuses on assessing the state of incident response (IR) strategies and readiness activities, including how organizations measure readiness, and highlights notable gaps and challenges organizations are struggling with as they strengthen IR readiness initiatives.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Cloud Detection and Response

    Increasingly dynamic cloud environments are presenting visibility challenges for security. Indeed, the majority of organizations claim that lack of access to physical networks, the dynamic nature of cloud-native applications, and elastic cloud infrastructure create blind spots, making security monitoring challenging. Additionally, nearly all organizations experienced a cloud security incident in the last year, which can result in application downtime, unauthorized access, data loss, and compliance fines.

    To learn more about these trends, download the free infographic, Cloud Detection and Response.

  • Ransomware is widely considered a critical and existential threat to the viability of any business. Given the high frequency of attacks and the impacts of successful ones such as data loss, many organizations are left with damages that have an effect well beyond IT. Attackers often undermine key infrastructure components and expose significant gaps, so IT leaders must focus on protecting and further leveraging their backup and recovery infrastructure to remove risk and minimize business impact.

    To learn more about these trends, download the free infographic, Ransomware Preparedness: Lighting the Way to Readiness and Mitigation.

  • The State of DataOps: Unleashing the Power of Data

    For most organizations, data is no longer only one of many elements that contribute to the success of business initiatives. On the contrary, data increasingly is the business, wielding formidable influence and power across numerous factors. In turn, organizations are investing significant resources into the development of DataOps strategies that formalize parts and processes inherent to the data pipeline.

    To learn more about these trends, download the free infographic, The State of DataOps: Unleashing the Power of Data.