Insight

  • Today, it is common for organizations to deploy production and mission-critical applications across multiple public cloud service (e.g., IaaS) providers. Modern application environments are driving this trend as organizations seek to optimize performance and quickly and easily set up network connections to these cloud providers.

    To learn more about these trends, download the free infographic, Enabling Modern Business With Multi-cloud Networking.

  • Department heads the world over are hearing mandates to infuse data science and machine learning (ML) into their operations as quickly as possible. However, ascertaining the goals of these projects and securing the requisite budget are not simple tasks. Recent research by TechTarget’s Enterprise Strategy Group revealed that funding and confusion follow ML and data science initiatives almost everywhere they appear.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • The use of artificial intelligence (AI) and machine learning (ML) to supercharge business operations has captured the imaginations of stakeholders from every business line and department, especially with the rapid popularity of generative artificial intelligence (GenAI) tools. Along with all this excitement comes myriad concerns regarding the ethical use of such tools. TechTarget’s Enterprise Strategy Group recently surveyed data professionals to find out how they’re balancing AI use with ethical and governance standards.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Informing business decisions with the valuable insights hidden within troves of data can only be accomplished with robust data science practices. And those data science practices cannot get off the ground without educated, motivated, and well-supported data scientists. Recent research by TechTarget’s Enterprise Strategy Group revealed several key factors can improve (or hinder) the development of these teams and professionals in their pursuit of data science goals.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Data science has established itself as a critical factor to success in today’s competitive business climate. Recent research by TechTarget’s Enterprise Strategy Group found that organizations purchasing supporting data science technologies are looking for help with several critical stages of the data lifecycle.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Paramount to the success of data science initiatives is enabling as many users as possible within the organization to work with the data and tools that make these projects actionable. Recent research by TechTarget’s Enterprise Strategy Group examined the experiences of data science stakeholders and where they see room for improvement in terms of team collaboration and technology support.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Organizations across industries are making data science a strategic charter as they seek new operational efficiencies and competitive advantage. Recent research by TechTarget’s Enterprise Strategy Group revealed that agreeing on the foundational elements of data science and how to measure success are critical yet evolving elements of this consequential discipline.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • As businesses come to understand the benefits of streamlining the machine learning (ML) lifecycle to faster achieve their data-driven goals, their focus turns to optimizing ML operations (MLOps). Recent research by TechTarget’s Enterprise Strategy Group revealed vast room for improvement in terms of deploying models to production and overcoming various challenges with MLOps.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • This Complete Survey Results presentation focuses on the current state and maturity of contact center technology and how it is deployed, how contact center buying teams are structured, how the market convergence of UCaaS and CCaaS affects these dynamics, and the current prioritization of artificial intelligence within contact center strategies.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • After working for 17 years in IT, I had a huge personal epiphany: I discovered cybersecurity is my passion and wanted to exclusively pursue that in my career going forward. Let me explain how I had this seminal moment.

    As early as I can remember, I’ve always loved technology—especially anything involving computers. I started my professional career in the mid-1990s working in the channel for a boutique systems integration firm in Houston providing technology solutions to Fortune 2000 companies. In my first role, I was a developer building enterprise applications. These were the early days of client-server architecture, where I developed new applications that replaced older legacy systems. Daily discussions of Java, relational databases, and multithreading were commonplace.

    Life was great for a few years until my company decided to spin out that part of the business. Fortunately for me, I was able to transition into a network engineering role within the company. I established net-new local area networks for clients, managed existing networks, and occasionally got the opportunity to set up a new firewall here and there. Equipped with years of hands-on technical experience under my belt, I moved into a technical pre-sales role, working closely with account executives selling various technology solutions to clients. In my final channel role after moving to the San Francisco Bay Area, I managed a team of network engineers and oversaw successful professional service delivery for the West region.

    In 2013, an opportunity presented itself to join an early-stage Silicon Valley cloud security startup, which I enthusiastically jumped headfirst into—it’s a requirement to work for a startup at least once if you live in the Bay Area, right? In that role, I became educated with the security market landscape and the challenges and use cases security vendors were addressing. Product vendors solving real-world security challenges were and still are extremely interesting to me. This was my lightbulb moment! It was at that point, I realized I wanted to exclusively pursue security in some capacity going forward in my career.

    After learning a lot about securing cloud resources and wearing multiple hats, I left the startup world behind to join the competitive and market intelligence team at Tenable, where I became an expert in all things vulnerability management. I supported the sales team in winning deals, advised product management on key roadmap capabilities, features, and use cases, and also identified opportunities for partnerships and acquisitions. I spent over three years at Tenable until their IPO in 2018.

    From there, I moved into a market intelligence role at Synopsys, where I was responsible for tracking the broader market landscape, discovering inorganic growth opportunities. I also helped them broaden their application security portfolio in building business cases for the acquisitions of three security companies: Tinfoil Security in 2020, Code Dx in 2021, and WhiteHat Security in 2022.

    The Move to ESG

    Over the years, I’ve had the good fortune to get to know many well-respected industry analysts who cover the security space. I have admired and appreciated their data and reports, which were critical to me for understanding the direction of the market. So, with over 10 years of experience working for security vendors in addition to my broad technical background, it was a natural fit to transition to an industry analyst role myself.

    I am excited to join TechTarget’s Enterprise Strategy Group because it provides an opportunity to leverage my existing knowledge of the security landscape while also assisting vendors at the same time. From my time working on the vendor side, I keenly understand the dynamics of the security market and the challenges that vendors face at different maturity levels, and I look forward to conducting new research.

    My core coverage areas include vulnerability and risk management, with my first research projects focused on risk management coming soon—stay tuned! I’ll also be assisting with adjacent areas, including application security, cloud security, and API security, since I have deep expertise with those areas as well. I’m looking forward to working with clients and engaging with companies in the space. If you’d like to get in touch to learn about Enterprise Strategy Group research and how we may be able to help, you can reach me on LinkedIn or send an email to [email protected].

  • The need to modernize cybersecurity strategies to keep pace with IT innovation is clear. Zero-trust architectures have taken the pole position as the best approach to achieve this goal. Unfortunately, the breadth of the initiative and the nuance between zero-trust strategies and the tools supporting these strategies can become lost, causing confusion. IT and security leaders need guidance and proof points from early adopters to avoid false starts and more quickly see positive results.

    To gain further insight into these trends, TechTarget’s Enterprise Strategy Group surveyed 379 IT and cybersecurity professionals at organizations in North America (US and Canada) involved with zero-trust technologies and processes.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Working in cybersecurity for the past 20-plus years has been satisfying because I enjoy helping enterprises to secure their infrastructure and stop bad actors from perpetrating their nefarious deeds. I also love cybersecurity because of the dynamism; the enterprise attack surface is always in flux as businesses grow and deploy new applications, adversary attacks are always changing, and cybersecurity technologies are continually evolving to counter threats. I have excelled in product marketing by understanding a problem area and distilling down to its compelling essence: why a security team should change what they are doing, why change now, and why they should use my approach to implement that change.

    Understanding the customer problem, creating that sense of urgency so your problem bubbles to the top, and differentiating the solution poses an ongoing challenge to any product marketer. Enterprises have a laundry list of security challenges along with finite resources. Chief information security officers—CISOs—with constrained resources need to zero in on those projects that have the most impact and ROI. The security vendor challenge lies in cutting through the market noise with clear and concise messaging so that the problem you solve makes the short list of projects, and that your offering makes the short list of solutions being evaluated to solve a CISO’s problem.

    The through line in my journey is cybersecurity product marketing—getting inside the security team’s heads, understanding their pain, and how to message around solving that pain. I have worked my way from product manager to product marketing manager to product marketing director and vice president of product marketing and vice president of marketing. I can empathize with today’s product marketing challenges because I have experienced them.

    My Background

    Following college, I landed at Oracle Corporation in Unix technical support, and then combined my Oracle experience with a UCLA MBA to land at Hewlett Packard Company. I had various roles at HP that exposed me to B2B marketing and the IT sales process.

    My cybersecurity journey started at Trend Micro, where I started off leading field marketing in Latin America—si, hablo español!­—and ended up leading the team marketing data center security products. I subsequently gravitated to smaller startups focused on data security. I landed at Vormetic, now part of Thales, where I learned about encryption and key management technology and gained an appreciation of data security complexity. There are typically tradeoffs in different vendor approaches to meeting enterprise data security requirements, and providing information to educate on those nuances for sophisticated buyers makes the difference between vendor success and failure. I then got the startup bug and led marketing at PrivateCore—a seed round startup, acquired by Facebook—working to establish a new category that is now known as confidential computing.

    Cybersecurity is always changing with a frequent risk of cybersecurity myopia. Industry analysts have helped me to understand the big picture and industry trends.

    Opportunity came knocking at Nok Nok Labs, a founding member of the FIDO—Fast IDentity Online— Alliance, where I learned about identity and access management (IAM) met many of the “identerati,” the experts and thought leaders that share and define the way we manage identities online. My tenure was during the early days of FIDO; it is gratifying to see how passwordless authentication has grown and passkeys are taking off.

    My product marketing journey also took a plunge into the managed detection and response (MDR) space, where I was part of the product marketing team Arctic Wolf Networks, and I subsequently landed at ReliaQuest, where I was responsible for product marketing around the core ReliaQuest GreyMatter security operations platform. While the MDR managed security service provider (MSSP) space was growing exponentially, all vendors were challenged in overcoming market confusion and navigating the hodgepodge of terms describing the space—MDR, MSSP, SOC as a service, managed XDR, co-managed SIEM, and so forth.

    Value From Industry Analysts

    I have briefed industry analysts throughout my journey as I established and tuned my messaging, educated the market, and helped drive demand. The analyst community provides an essential perspective for both vendors and enterprises that consume vendor products. Cybersecurity is always changing with a frequent risk of cybersecurity myopia. Industry analysts have helped me to understand the big picture and industry trends. They also helped me to optimize my message and skate to where the hockey puck was going—h/t to Wayne Gretsky.

    The analyst community has also helped me educate the market and generate demand for my products; enterprise customers want the insightful and credible research that analysts produce so they can understand trends, see what their peers are doing, and make informed technology decisions.

    The Move to ESG

    TechTarget’s Enterprise Strategy Group analysts have distinguished themselves with exceptional and discerning research and commentary. In my experience, they have represented the gold standard in what industry analysts can provide. Enterprise Strategy Group’s acquisition by TechTarget further increases their reach and influence, delivering useful research to buyers who are considering solutions. I’m very proud to join a stellar team.

    I am excited to land as an industry analyst at Enterprise Strategy Group because it allows me to analyze the industry big picture. Working for a vendor requires you to dive deeply into your technology and the market, but you are seeing your slice of the market. Analysts have the opportunity to talk to all of the vendors and understand what is happening at a macro level.

    While change is endemic to cybersecurity, I also found painful inertia in the marketplace. A regular occurrence when reading sales win/loss reports was seeing “decision postponed” as the most frequent reason for losing a deal. The biggest marketplace competitor at every place I worked was inertia. My frustration button lights up when reading news headlines about this data breach or that compliance fine knowing that there are solid solutions in the market that could have avoided catastrophe. The analyst research that Enterprise Strategy Group produces helps inform the market and facilitate change and improvement.

    My coverage area at Enterprise Strategy Group is IAM and data security, both of which are undergoing incredible change as data proliferates and identities evolve. Exploring concepts such as identity as the new perimeter, zero-trust architectures, identity threat detection and response, privacy and data sovereignty, data security posture management, and applying generative AI across IAM and data security are a few of the reasons why my coverage area is particularly exciting. I am looking forward to reconnecting with old acquaintances and making new ones. If you are an innovator in IAM or data security, I want to understand what you are doing! You can reach me on LinkedIn or send an email to [email protected].