Insight

  • Cohesity Launches GAIA: There’s More Than Meets the AI

    Cohesity recently introduced its new Gaia capability, bringing AI-powered enterprise search to its data backup environments.

    This is not an obligatory AI-washing announcement, as many vendors feel they must keep making these days. In contrast, Gaia uses AI to maximize the return on your secondary data assets.

    In 2019, TechTarget’s Enterprise Strategy Group introduced a maturity model that predicted the evolution of the traditional backup market into the data intelligence market, including the use of automation and AI/ML. In the model, we identified that the requirement for context and content about the data is becoming more acute as new regulations and the need for data to support digital transformation change the role of data in the enterprise. People, processes, and workflows must use data more intelligently. It’s really about business outcomes and the notion of data as a true asset that can be leveraged to create a return on investment or avoid costs and risks. Our model identified the critical role of AI/ML in reaching data management nirvana. 

    That’s what Gaia delivers in many ways, but there is more than meets the eye.

    Why? It uses retrieval-augmented generation (RAG) to give end users conversational and context-rich responses to gain insights from their secondary enterprise data.

    Cohesity’s new tool combines a conversational interface, AI-powered search—on indexed enterprise secondary data—and LLM response. It is designed to help organizations improve their decision-making speed and accuracy while securely searching enterprise data in a compliant fashion. Key features include natural language queries, role-based access, RAG capabilities, and a SaaS-based platform.

    The use case Cohesity is putting forward relates to investigative compliance research, such as detecting violations of personally identifiable information exposures—in other words, searching data from your backups for compliance issues. It is easy to imagine adding outside data to identify the penalties or other requirements associated with this internal data. The key is that this happens securely as “your” data is never exposed externally but can be augmented by or augment external data.

    Our initial view, with the caveat that our research firm has not functionally or technically validated the solution, is that Gaia is a timely platform that extends Cohesity’s capabilities, making it faster, more automated, and more efficient. Its AI assistant prioritizes privacy, risk mitigation, data protection, and security. 

    It is designed to change end users’ ability to unlock value in their company’s data assets without a Ph.D. in data science.

    We see the platform’s user-friendly interface and expandable ecosystem as critical to allow for external data integration and complex tasks to be performed with ease. It’s an ideal solution for enterprises seeking to maintain regulatory compliance, and its simple question-and-answer feature makes it an efficient tool for additional business and technical processes in time. 

    While it might be a little early to say with Gaia, one of the significant benefits of using generative AI for conversational search on enterprise data is its ability to deliver a personalized experience. Every person accessing the data will ask different questions, and it’s impossible to predict them all. For instance, someone could ask about compliance while another group asks about security. The variety of questions presents an exciting opportunity for Cohesity to provide a comprehensive, context-rich and tailored solution to its users.

    Beyond the compliance use case, we expect Cohesity to deliver what we call “generative data protection” capabilities through Gaia, focusing on cyber resilience and cyber recovery. These are inherently more complex than simply discovering data misuse or ineffective data governance policies, but they are also well-known territory for Cohesity’s platform.

    Also, we appreciated how Cohesity showed some transparency in the pricing model, and organizations will need guidance based on what they expect from their user base. There will likely be a gradual process as they navigate this, with limitations based on the number of answers and the amount of storage indexed. Monitoring this pricing model is crucial, as it may set the stage for the entire market.

    We believe that Cohesity has an excellent opportunity to establish itself as a leader in the market with this announcement, as it is capacity- and answer-based. Over time, the number of answers and capacity will likely determine the subscription price or pricing structure.

    While it might seem like the result of years of work in intelligent data management of non-production/backup data for Cohesity, it’s just the beginning of the next phase of their technological evolution. This new phase involves integrating technologies with a broad ecosystem of cyber and AI partners and the elephant in the room: Veritas. This will happen when the acquisition deal closes in the next few quarters. With this in mind, Cohesity must execute on all fronts to ensure the continued success of Gaia and the future “new” Cohesity. 

    Competitors are constantly working on their AI-focused initiatives, so Cohesity cannot afford to stand still. The year 2024 is sure to be an exciting year for the company and the market at large.

    Enterprise Strategy Group is a division of TechTarget. Its analysts have business relationships with technology vendors.

  • Informatica’s AI-Powered Cloud Data Access Management

    Welcome to the dawn of a new era in data management. Today, Informatica unveiled a groundbreaking advancement in the field: Cloud Data Access Management (CDAM), now available on Informatica’s Intelligent Data Management Cloud™ (IDMC). This marks a significant milestone as the industry’s first AI-powered data access management solution to revolutionize how organizations govern and leverage their data assets.

    In recent research from TechTarget’s Enterprise Strategy Group, we found that 62% of line-of-business stakeholders said they only somewhat trust their organization’s data, while 79% of organizations said they must use AI in mission-critical processes to better compete. This disparity between needing AI and trusting data needs to close quickly. We found that most organizations are heavily focused on data quality as part of data governance to gain trust and to deliver decision-making ready data to decision-empowered employees.

    The Informatica CDAM represents a path toward achieving these goals. With data becoming increasingly pivotal in driving business outcomes, it has become imperative for organizations to have robust governance mechanisms in place. CDAM catalyzes innovation, providing a comprehensive suite of tools and capabilities to empower businesses to unlock the full potential of their data while ensuring security, privacy, and compliance.

    At the heart of CDAM lies CLAIRE® AI engine, Informatica’s proprietary technology designed to harness the power of artificial intelligence for data management tasks. Leveraging advanced machine learning algorithms, CLAIRE empowers organizations to automate and streamline critical aspects of data governance, from classification and discovery to access control and policy enforcement. By integrating AI-driven capabilities into the fabric of IDMC, CDAM enables organizations to accelerate their journey toward data-driven decision-making. With automated, policy-based security and privacy controls driven by metadata intelligence, businesses can deploy new analytics and AI use cases, knowing that their data assets are safeguarded against unauthorized access and misuse. This is an excellent example of unleashing the power of AI in data governance.

    The need for scalable data access management has also become increasingly urgent in today’s fast-paced, data-driven world. With the proliferation of advanced analytics and AI technologies, organizations are grappling with the challenge of ensuring secure and compliant data access while also driving innovation and unlocking new growth opportunities.

    CDAM is poised to address the AI governance challenge head-on, providing organizations with the tools and capabilities they need to accelerate innovation on a foundation of AI-powered data governance. By automating and enforcing data access controls across their data estates, businesses can experience the full potential of their data assets, driving insights, innovation, and competitive advantage. At its core, CDAM is about empowering organizations to harness the full power of their data assets. By democratizing access to data and enabling self-service analytics, CDAM enables organizations to unlock new insights, drive innovation, and fuel growth. With CDAM, businesses can easily navigate the complex landscape of data governance, knowing that their data assets are secure, compliant, and ready to power the next wave of innovation. Anyone looking for an end-to-end data platform with strong governance should consider Informatica.

  • This Complete Survey Results presentation focuses on 2024 IT budget expectations, technology initiatives and priorities, year-over-year spending changes (overall and by different technologies), cloud usage trends, and how digital transformation initiatives intersect with these considerations among organizations with fewer than 100 employees.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Enabling Modern Business With Multi-cloud Networking

    Organizations are increasingly deploying applications across multiple public cloud locations in a meaningful way. This is vastly different from only three years ago when the majority of organizations were using multiple cloud service providers but primarily depending on only one for almost all of their service needs. Today it is common for organizations to deploy production and mission-critical applications across multiple public cloud service (e.g., IaaS) providers. Modern application environments are driving this adoption as organizations seek to optimize performance and quickly and easily set up connections to these cloud providers.

    In order to investigate how organizations are connecting to multiple public cloud providers, TechTarget’s Enterprise Strategy Group surveyed 337 IT and networking professionals at organizations in North America (US and Canada) familiar with their organization’s entire network environment and responsible for evaluating, purchasing, and/or operating corporate networking solutions, including data center, cloud, campus, branch, edge, WAN, and home office technology.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • 2024 Technology Spending Intentions Survey

    While macroeconomic conditions have improved over the last several months, many businesses are still taking a cautious approach to spending. However, for many organizations, this is not an option when it comes to technology investments that underpin digital transformation efforts and increasingly serve as competitive differentiators.

    To learn more about these trends, download the free infographic, 2024 Technology Spending Intentions Survey.

  • The endpoint device is the first link in the chain that connects a user to their work. In today’s typical corporate environment, IT organizations are tasked with supporting multiple endpoint devices per user across a range of hardware form factors and operating systems. In turn, acquisition, deployment, and ongoing management efforts are affected by this sprawl.

    To learn more about these trends, download the infographic, Endpoint Device Trends: Evaluating a Shifting Desktop and Laptop Procurement and Management Landscape.

  • Incident Response Strategies in the Spotlight

    Ransomware, business email compromise, and other attacks are increasingly evading cybersecurity defenses, causing IT and cybersecurity teams to further invest in incident response (IR) readiness. As such, incident response can no longer be viewed as an event-driven action but must be operationalized and become a core strategy within security operations. As security and line-of-business teams react to this new reality, new IR strategies are needed for most.

    To learn more about these trends, download the free infographic, Incident Response Strategies in the Spotlight.

  • Celebrating Enterprise Strategy Group’s Jon Oltsik

    In 2003, Jon Oltsik founded the Enterprise Strategy Group cybersecurity practice and has since seen it grow to include a team of dedicated analysts covering a variety of the most important industry categories. 

    Join us in celebrating Jon’s contributions over the years as he transitions to an Analyst Emeritus role by watching this tribute video.

  • Whether using traditional PCs or laptops, workstations, Macs, Chromebooks, or virtual desktops and applications, the endpoint device is the first link in the chain that connects a user to their work. In today’s typical corporate environment, IT organizations are tasked with supporting multiple endpoint devices per user across a range of hardware form factors and operating systems. Each device or OS type requires additional considerations for purchasing, deployment, management, and security. Acquisition, deployment, and ongoing management efforts are affected by this sprawl, with models often including thin clients, BYOD programs, unmanaged (zero-trust) devices, and corporate-managed devices.

    To gain further insight into these trends and understand how organizations are evolving their traditional endpoint strategies by incorporating new and alternative approaches, TechTarget’s Enterprise Strategy Group surveyed 354 IT professionals at organizations in North America (US and Canada) involved with their organization’s endpoint device purchasing, technology, and processes.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Operationalizing Encryption and Key Management

    This Complete Survey Results presentation focuses on the usage and understanding of the full capabilities of encryption and key management solutions, as well as the cyberthreats and attack vectors that are driving an increased focus on encryption and key management strategies.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Multi-cloud Networking Trends

    This Complete Survey Results presentation focuses on the current network requirements for multi-cloud environments, as well as the network and network security challenges associated with deploying, managing, and scaling multiple public cloud environments.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • This Complete Survey Results presentation focuses on the progression of zero-trust initiatives and how organizations are developing their strategies to support these efforts, including the most used tools and practices and what benefits these initiatives are yielding.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.