Insight

  • Modern IT environments are often marked by a labyrinth of applications being deployed in various on-premises and off-premises locations based on myriad factors like use case, compliance, team preference, and many more. Though many organizations prefer to deploy new applications on cloud infrastructure for cost and agility benefits, there are instances where even those firms keep workloads in the data center. Recently, TechTarget’s Enterprise Strategy Group had the opportunity to ask IT professionals why this is sometimes the case.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • In contending with a variety of deployment locations to maximize the use, effectiveness, security, and compliance of myriad applications in use by their organizations, IT professionals tasked with infrastructure management must establish effective policies to guide decisions. While some organizations deploy nearly all new applications in the cloud as a rule, many also consider the individual needs of the application at hand. Recent research by TechTarget’s Enterprise Strategy Group revealed interesting motivations behind the use of both policies.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • A variety of distributed applications are powering today’s businesses. As such, the connections and net-functionality of these applications are a critical focus for the teams tasked with maintaining them. Recent research by TechTarget’s Enterprise Strategy Group reveals a complex landscape here, fraught with challenges, negative service impacts, and difficult decisions.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • The pervasive use of public cloud providers has unlocked agility, cost-savings, and more for modern IT organizations. But one provider often can’t do it all for every business. Recent research from TechTarget’s Enterprise Strategy Group reveals some interesting findings regarding IT teams’ decisions to utilize a secondary cloud provider beyond their primary vendor.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Cross-cloud Application Migration Becomes Commonplace

    The modern infrastructure environments most IT teams contend with demand conscious deployment decisions based on the requirements of the business line, security, compliance and governance considerations, and much more. Recent research by TechTarget’s Enterprise Strategy Group revealed that migrating workloads to, from, and between clouds is increasingly common as organizations balance these considerations across the intricate web of their evolving modern environments.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • IT organizations are contending with distributed environments spanning their traditional on-premises data centers, multiple public cloud providers, and the edge and colocation locations that fall in between. Recent research by TechTarget’s Enterprise Strategy Group reveals that, in addition to the application deployment and management decisions that accompany these environments, modern IT organizations have some interesting decisions to make when it comes to their spending on the related technologies.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Collaboration Tool Security Risks Proliferate

    Our more mobile, distributed workforce has become dependent on a diverse collection of digital communication and collaboration tools, expanding the attack surface and creating new opportunities for adversaries to evade security controls. Many organizations currently lack visibility and control of one or more of the many tools their workers depend on. While email security strategies remain critical, new, more comprehensive security strategies are needed that are capable of monitoring and protecting sensitive data and access to both sanctioned and unsanctioned tools.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Despite ongoing advancements to cloud-delivered, native email security controls, organizations still view email as the most vulnerable to attack compared to other communication and collaboration mechanisms. Research by Enterprise Strategy Group also showed that most organizations have encountered challenges and gaps in their primary email security solution. As threats continue to penetrate security controls, organizations are using a layered approach that most commonly includes the addition of third-party controls.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • The use of two or more cloud computing services (i.e., multi-cloud strategies) is a modern reality for businesses looking to serve the technology requirements of their teams and thrive in a competitive landscape. TechTarget’s Enterprise Strategy Group recently surveyed IT professionals on the status of their multi-cloud strategies (and providers) today.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Recent prominent multifactor authentication-based breaches and friction in the end-user authentication experience have reached the ears of app developers, IT, and cybersecurity leadership. Organizations are now searching for alternative authentication methods to address the risks and challenges of multifactor authentication (MFA) and password-based authentication. TechTarget’s Enterprise Strategy Group recently surveyed IT, cybersecurity, and application development professionals to gain insights into these trends.

    Learn more about these trends with the free infographic, Passwordless in the Enterprise: The Dirty Secrets of Antiquated Authentication.