Our seasoned analysts couple their industry-leading B2B research with in-depth buyer intent data for unparalleled insights about critical technology markets.
Clients trust us across their GTMs—from strategy and product development to competitive insights and content creation—because we deliver high-quality, actionable support.
Browse our extensive library of research reports, research-based content, and blogs for actionable data and expert analysis of the latest B2B technology trends, market dynamics, and business opportunities.
Our seasoned analysts couple their industry-leading B2B research with in-depth buyer intent data for unparalleled insights about critical technology markets.
Clients trust us across their GTMs—from strategy and product development to competitive insights and content creation—because we deliver high-quality, actionable support.
Browse our extensive library of research reports, research-based content, and blogs for actionable data and expert analysis of the latest B2B technology trends, market dynamics, and business opportunities.
The broadening distribution of applications and employees away from traditional corporate locations is fueling complexity and creating networking and security challenges. Secure access service edge (SASE) technology can help address these issues, but adoption paths can widely vary.
To learn more about these trends, download the free infographic, Security Services Edge (SSE) Leads the Way to SASE.
In a landscape increasingly defined by data-driven insights and transformative AI, the alliance between Informatica and Amazon Web Services (AWS) has flourished. At AWS re:Invent 2023, Informatica, renowned for enterprise cloud data management, announced a trinity of integrations with AWS, marking another stride in their collaborative journey. This is just one of many “better together stories” we see across the data management industry, which greatly benefits organizations building modern data management platforms to fully empower their business with intelligent data insights to drive faster and better decision-making, competitive advantages, and innovation.
Organizations first need to build the proper data management infrastructure to achieve these results. In our 2023 “State of DataOps: Unleashing the Power of Data” research, we found that 39% of organizations find keeping pace with rapidly evolving technology and tools is one of their top challenges for data management, with 33% ranking the integration of disparate data sources, 32% limited resources and 29% lack of skills. All emphasize the need for solid, forward-thinking partners.
Some of the value brought by Informatica together with AWS in their announcement include these areas:
Strengthening Foundations for AI-powered Solutions
Informatica’s partnership expansion unveils a deeper integration with Amazon Bedrock, a managed service offering access to foundational models for generative AI applications. Leveraging Informatica’s Intelligent Data Management Cloud (IDMC), this integration ensures trusted data provisioning, enriching context for enhanced accuracy in pivotal AI use cases. The comprehensive suite of data management tools within IDMC, from cataloging to governance, amplifies Amazon Bedrock’s capabilities, empowering customers to harness AI’s potential.
Empowering Healthcare Data Management
Another milestone lies in the alignment with AWS HealthLake, a HIPAA-eligible service facilitating secure storage, transformation, and analysis of health data. Informatica’s IDMC, fortified with healthcare-specific accelerators, ensures seamless integration with AWS HealthLake. This synergy not only harmonizes master data but also furnishes a holistic view of healthcare entities. The result? Improved patient engagement, optimized provider networks, and elevated clinical outcomes—all within stringent compliance frameworks.
Redefining Data Lake Access and Governance
Recognized as a Launch Partner for Amazon S3 Access Grants, Informatica continues to innovate in data lake management. This integration addresses the need for streamlined, secure access to data stored in Amazon S3. By merging AI-powered data access management with Cloud Data Marketplace capabilities, Informatica simplifies self-service access while upholding enterprise-scale governance protocols.
A Testament to Mutual Growth
The resonance between Informatica and AWS signifies a commitment to advancing cloud, data, and AI capabilities. This underscores the significance of these integrations in empowering customers, particularly those in regulated industries, to seamlessly manage trusted data, driving intelligent decisions and operational efficiencies.
A Future of Data Transformation
As enterprises strive for agility and innovation, partnerships like the one between Informatica and AWS pave the way for cutting-edge solutions. These integrations exemplify a shared vision: to empower businesses with secure, governed, and actionable data—a fundamental pillar in shaping a data-driven future.
In essence, the amalgamation of Informatica’s robust data management suite with AWS’s scalable infrastructure heralds a new era of possibilities, where data becomes not just a resource but a catalyst for unprecedented growth and innovation.
Modern enterprise complexity is challenging cybersecurity programs. One of the biggest reasons is the broadening distribution of applications and employees away from traditional corporate locations, which is fueling complexity and creating networking and security challenges. Secure access service edge (SASE) technology can help address these issues, but adoption paths can widely vary. Indeed, the breadth of SASE and organizational considerations that must be accounted for when converging networking and security lead to a variety of starting points.
In order to investigate how businesses are faring with adoption plans, the use cases they seek to support, and the technologies they prioritize as part of SASE rollouts, TechTarget’s Enterprise Strategy Group surveyed 390 IT and cybersecurity professionals at organizations in North America (US and Canada) responsible for evaluating, purchasing, and managing network and/or network security technology products and services, specifically security service edge technology and processes.
This study sought to answer the following questions:
What are the drivers of interest in SASE? What are the initial use cases for SASE?
How long do organizations expect it to take to fully adopt a SASE architecture?
What cybersecurity challenges have been most impactful to organizations? What challenges do organizations face specifically with securing remote user access to corporate applications and resources?
Do organizations expect their initial approach to SASE to be security- or network-first?
What plans do organizations have to implement secure service edge technologies? What are the reasons organizations are interested in SSE?
What challenges have organizations faced, or do they expect to face, when implementing SSE?
What attributes are most important to organizations when considering an SSE solution?
How are organizations prioritizing different security tools, such as CASB, ZTNA, and SWG, as they build out their SSE architectures?
What do organizations believe are the most important attributes of a zero-trust network access solution as part of an SSE architecture?
What capabilities do organizations find most important in secure web gateway and CASB solutions as part of an SSE architecture?
How many technology vendors do organizations believe they will work with to support their SASE architecture? What are the drivers for organizations using more than one SASE vendor?
How do organizations view the current cybersecurity landscape in terms of management difficulty? How does this vary, if at all, according to current SSE adoption status?
What benefits have organizations recognized to date as a result of implementing SASE?
Survey participants represented a wide range of industries including manufacturing, technology, financial services, and retail/wholesale. For more details, please see the Research Methodology and Respondent Demographics sections of this report.
Already an Enterprise Strategy Group client? Log in to read the full report.
If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
The need to accelerate IT operations is perhaps more urgent than ever, as business and other organizational leaders look directly to IT to enable fast business decision-making. The good news is that technology quivers are brimming with tools to support operations acceleration, enabling organizations to speed both insights and outcomes as well as create an effective hybrid cloud ecosystem that is seamless and secure. Infrastructure modernization is evolving quickly, but bumps remain on the road toward cloud-like IT efficiency on premises and effective integration with public cloud infrastructure services.
To determine the current state of infrastructure modernization across the distributed cloud, Enterprise Strategy Group surveyed 377 IT professionals in North America (US and Canada) responsible for evaluating, purchasing, building, and managing application infrastructure in their organization.
This study sought to answer the following questions:
How fast do IT teams need to deploy applications and infrastructure compared with three years ago?
How are organizations responding to the need to accelerate IT operations?
How are IT budgets allocated between data centers and off-premises locations such as public cloud infrastructure services and edge?
What is the distribution of production applications between on-premises infrastructure and public cloud infrastructure services or platforms? How will this change in 24 months?
Are organizations deploying existing cloud applications or new applications on premises? Are organizations deploying existing on-premises or new applications on cloud infrastructure services?
How many cloud services providers are organizations using? What benefits do they seek?
What challenges do organizations face with multi-cloud deployments in terms of application deployment, management, and migration?
Are organizations using one primary cloud services provider or do they distribute requirements evenly across their providers?
What tools or technologies are organizations using to enable infrastructure automation? In which locations are these tools or technologies deployed?
What processes do organizations automate with infrastructure automation tools? What benefits do organizations seek from this automation? What challenges do they encounter?
What criteria are most important when selecting infrastructure automation tools?
How important are APIs in terms of supporting IT operational metrics or key performance indicators? What are the key selection criteria for APIs?
How often do organizations move data between data centers and public cloud services? What are the use cases for this movement?
How often do organizations move data between multiple cloud services providers? What are the use cases for this movement?
Survey participants represented a wide range of industries, including manufacturing, technology, financial services, and retail/wholesale. For more details, please see the Research Methodology and Respondent Demographics sections of this report.
Already an Enterprise Strategy Group client? Log in to read the full report.
If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
The level of interest in secure access service edge (SASE) architectures has exploded recently as organizations struggle to use traditional, on-premises-based network and security solutions to support distributed, cloud-centric enterprise environments. While this has been an increasing challenge over the last few years, the pandemic and resulting spike in newly remote workers pushed many organizations to a tipping point when it comes to both security and network traffic. Additionally, the broad applicability of SASE leads to some confusion on where to begin and which technologies are required, exacerbated by legacy organizational dynamics. While Enterprise Strategy Group has seen SASE elevated to a CIO/CISO-led initiative in some cases, inconsistencies remain for many organizations in day-to-day collaboration across network and security teams.
In order to investigate how the network is factoring into SASE adoption plans, TechTarget’s Enterprise Strategy Group surveyed 374 IT and networking professionals at organizations in North America (US and Canada) involved with networking technology and processes, specifically those familiar with both SD-WAN and SASE technologies.
This study sought to answer the following questions:
Do IT professionals believe their organizations’ network environments have become more complex over the last two years? What networking challenges have been most impactful to organizations? Specifically, what challenges do organizations face specifically with connecting employees to corporate applications and resources?
What types of network technologies comprise organizations’ network ecosystems?
What is the status of organizations’ SASE plans in terms of both SD-WAN and security services edge? Do organizations expect their initial approach to SASE to be security- or network-first? What are the drivers of interest in SASE?
How long do organizations expect it to take to fully adopt a SASE architecture?
How many technology vendors do organizations expect to work with to support their SASE architectures, both initially and once their implementation is complete? For organizations that expect to use more than one vendor for SASE once their initiative is complete, what are the reasons behind this strategy?
What are, or expected to be, organizations’ initial SASE use cases? What benefits have early SASE adopters recognized to date?
What are, or will be, the drivers for organizations to deploy SD-WAN?
How important is it to have AI/ML technology driving automation in organizations’ SD-WAN environments? What features make AI/ML important to these environments?
What actions will organizations take over the next 12-18 months to implement or optimize their SD-WAN strategies?
Do organizations plan to deploy SD-WAN to support their remote/hybrid workers? Would organizations be more likely to deploy SD-WAN technology to remote/hybrid workers, or do so more extensively, if it didn’t require deploying new hardware?
What actions have organizations taken, or do they plan to take over the next 12 months, to improve the collaboration across the different groups responsible for networking and security?
Survey participants represented a wide range of industries including manufacturing, technology, financial services, and retail/wholesale. For more details, please see the Research Methodology and Respondent Demographics sections of this report.
Already an Enterprise Strategy Group client? Log in to read the full report.
If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
As cyber-attacks continue unabated, the global population depends upon cybersecurity professionals to protect them from a global army of state-sponsored actors, cyber-criminals, hacktivists, and script kiddies alike. Unfortunately, cybersecurity teams are often understaffed, lacking advanced skills, and working in an environment of constant pressure. To gain further insight into these trends, TechTarget’s Enterprise Strategy Group and the Information Systems Security Association (ISSA) surveyed 301 IT and cybersecurity professionals at organizations all over the world.
This study sought to answer the following questions:
Why has working as a cybersecurity professional become more difficult today than it was two years ago?
How satisfied are cybersecurity professionals at their current jobs? What are the biggest factors for determining their level of job satisfaction?
How likely are cybersecurity professionals to leave their current job in 2023 for any reason, including retirement, career change, and leaving for another cybersecurity job?
How do cybersecurity professionals characterize the stress level typically associated with their careers?
What are the most stressful aspects of jobs/careers as a cybersecurity professional?
What actions do cybersecurity professionals believe would be the most helpful for the advancement of their careers?
How would cybersecurity professionals characterize the cybersecurity culture at their organization?
At any time in their career, have cybersecurity professionals experienced a situation in which the organization they worked for was knowingly ignoring security best practices and/or regulatory compliance requirements? If put in that situation, would these cybersecurity professionals be willing to act as whistleblowers?
How has the global cybersecurity skills shortage impacted cybersecurity professionals’ organizations? How do they think that has changed over the last two years?
What actions do cybersecurity professionals believe could be taken to address the impact of the cybersecurity skills shortage?
How difficult is it for organizations to recruit and hire cybersecurity professionals?
Do organizations have a chief information security officer (CISO), or similar position, in place today? To whom does the CISO report? What do cybersecurity professionals believe is the most important quality of a successful CISO?
Do cybersecurity professionals think their organization’s CISO’s level of participation with executive management and the board of directors is adequate?
How would cybersecurity professionals characterize the working relationships between their organization’s cybersecurity and IT departments and between cybersecurity and lines-of-business groups?
Which actions do cybersecurity professionals believe their organization could take to improve cybersecurity programs?
Survey participants represented a wide range of industries including manufacturing, technology, financial services, and retail/wholesale. For more details, please see the Research Methodology and Respondent Demographics sections of this report.
I recently attended Commvault’s Shift event on November 8 in New York City, along with over 200 customers and partners. I am not easily impressed; it comes with the territory of being an industry analyst. Not this time. The company organized an event that marks another strategic turning point for Commvault. This time, it’s about AI. As I wrote in 2020 and the year before, this is no longer the legacy company of a few years ago. It is intent on leapfrogging others in the market—again. Competitors should take close notice.
Credit: Photo by Christophe Bertrand
A few years ago, Commvault redefined itself under the leadership of its then-new (and current) CEO, Sanjay Mirchandani, by making two critical moves: the acquisition of Hedvig and the creation of Commvault Cloud (previously known as Metallic). These significant strategic investments were critical to meet market requirements and competitive pressures at the time and directly positioned the company for today and for what it will be next.
The strategic shift (pun intended) Commvault is operating is the culmination of a multifaceted technology optimization strategy through operational automation, unification, and efficiency at the platform level and a focus on data resilience at scale. These two key areas of operations and resilience were critical in building and evolving the Commvault Cloud offering while preserving the traditional installed base of on-premises and hybrid customers. The company now claims 4,000 customers for its as-a-service offering. That’s an impressive number.
This is happening at a critical time in a market that has shifted from traditional disaster recovery to cyber-recovery or cyber-resilience, a fact that ESG recently researched and confirmed.1 Ransomware fundamentally affects business processes and operations, with significant compliance and financial exposure ramifications. The devastating impacts of repeated and often successful ransomware cyber-attacks have become the new normal, making ransomware an existential threat for many organizations. In our recent research, most respondents recognized that ransomware supersedes all other potential threats. Unfortunately, most are not well prepared to deal with it. Few organizations can successfully restore all of their data.
The other key trend affecting the data-protection space and beyond is the need to simplify and optimize processes and operations at scale. Many IT teams are trying to keep pace with data growth, and our research shows that they also struggle to protect mission-critical applications and deliver on key recovery objectives. Many IT and cloud operations professionals tasked with backup and recovery responsibilities drown in complexity, multiple tools, and inconsistent processes. Combine this with ransomware and you have a perfect storm. This is reflected in extended RPOs and RTOs and heightened business-level risk.
Disaster recovery is crucial to business continuity, especially regarding application and data recovery. Testing is a critical best practice that helps identify potential issues with people, processes, and technology and enables corrective measures to be taken. Regular testing is essential for gauging one’s ability to recover from a disaster. However, many organizations find it too complex and expensive to conduct frequent testing. This can lead to extended intervals between tests, which may cause critical interdependencies between infrastructure and security teams to be overlooked. This is particularly concerning in ransomware attacks, where the need for effective collaboration between teams is paramount. Cost and the lack of skill sets are also significant factors that hinder frequent testing.
Recognizing this fundamental market change, Commvault has made additional strategic platform investments to bring together data protection, security (including SIEM/SOAR ecosystem integrations), intelligence, and recovery with machine learning and AI operationalizing the most complex and error-prone tasks.
On the ransomware front, the platform can help improve recoverability with what the company calls a “cleanroom recovery service,” allowing users to test and detect threats without impacting production. In partnership with Microsoft Azure, the platform uses AI to verify “clean” recovery points and provides a fully ready environment to recover. This is key because hardware microcode or operating systems that make up infrastructure can also be affected by cyber-attacks. So not only does one need a clean recovery point, but one also needs a clean environment to restart.
A few years ago, Commvault made some crucial architectural decisions that are beneficial because they now clearly help differentiate the company. For instance, separating the control plane from the data plane and the storage plane is now paying off since it allows for an any-to-any set of permutations for moving data around for backup and recovery, whether on-premises or in the cloud. Today, most enterprises operate in a hybrid and multi-cloud environment.
Combining testing and recovery capabilities with ecosystem partnerships and integrations, the company is positioning itself as a critical player in the security supply chain without losing its focus on what it does best: data resilience and recoverability. Cloud burst capabilities help address cost at scale by only using compute for a controlled time at a fraction of the cost of a hardware-based approach. This removes the last significant objection to frequent cyber-resilience testing or recovery testing.
Commvault recognizes that it is not a security company but a data-resilience platform company, one that is part of an ecosystem in which security technology players provide part of the broader solution.
Over the past few months, I’ve noticed a company that’s less timid and more assertive. They are not afraid to take on their competitors and are doing so effectively with clear and precise messaging. The marketing team has executed its strategy well, and I believe that this same team will be the driving force behind the success of recent announcements, which will go beyond just the technological aspect.
Discover what’s trending on our network to engage IT buyers in market now and improve marketing and sales effectiveness. This report covers trending areas of interest across 240+ IT markets over the last 6 months (April 2023 – September 2023) in five (5) regions across the TechTarget & BrightTALK network: WW, NA, EMEA, APAC, LATAM.
In this report you will find:
• The top 20 broad technology markets driving the most activity in the past 6 months. Activity data can help show where audience research is growing or declining and therefore help reinforce which markets are on the rise or declining.
• The top 25 granular topics growing the most across the TechTarget and BrightTALK network in the last 6 months. This gives insight into the content areas that are on the rise right now to leverage in your conversations.
Already an Enterprise Strategy Group client? Log in to read the full report.
If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.