Insight

  • MDR Providers: The New Horizon for Security Services

    Enterprise Strategy Group research revealed that managed detection and response (MDR) providers are currently delivering much more value beyond basic detection and response services, meaning that the use of MDR providers can be a key strategy within modern security programs.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Most organizations are actively engaged in observability programs, and half of these companies have added AIOps capabilities that provide better end-to-end visibility and real-time analytical insights into their applications and infrastructure environments. Key purchasing decision makers are IT professionals and application developers who report significant benefits as a result of deploying AIOps tools. However, there’s a notable split in priorities between IT teams and DevOps/developers that can greatly influence purchasing decisions.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Organizations practicing observability are increasingly integrating AIOps tools and techniques to speed process automation, increase end-to-end visibility, provide real-time data analysis, and yield trustworthy outcomes. Midsize and large organizations are making immediate plans to expand their observability investments, and more than half of these companies plan to add AIOps tools. Though still considered in the early stages of widespread deployment, AIOps has shown strong results in simplifying operations and accelerating the scaling of observability practices.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • The use of generative artificial intelligence (GenAI) programs is becoming ubiquitous in business operations across organizations as departments and individuals attempt to inject efficiency into their processes using this fast-growing technology. Unfortunately, its rapid pace of adoption has cybersecurity teams racing to keep up. Recent research by TechTarget’s Enterprise Strategy Group explores how IT professionals and business decision makers plan to apply governance and policies to their organizations’ usage of GenAI.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • From skills shortages to nuanced cyber-attacks, cybersecurity leaders have well-documented challenges that threaten the successful protection of businesses. Generative artificial intelligence (GenAI) has burst onto the scene promising a long list of potential applications, with cybersecurity improvement touted among them. Recent research by TechTarget’s Enterprise Strategy Group examined early cybersecurity use cases for this technology to get a sense of where GenAI could alter modern cybersecurity practices.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Identity Needs a Seat at the Cybersecurity Table

    Identity is rooted in IT operations. In fact, when most people think of identity, they think of access management, as in identity and access management, or IAM.

    The shift to the cloud and remote work, combined with the rise of phishing and other identity-related attacks, puts identity security at the forefront of cybersecurity concerns.

    Read my blog to learn more about identity’s relationship to cybersecurity.

  • Organizations across markets and geographies are expecting generative artificial intelligence (GenAI) to disrupt and transform their business processes. Recent research by TechTarget’s Enterprise Strategy Group revealed some interesting findings when it comes to customer experience (CX) use cases for this buzzy technology.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Research Objectives

    • Identify the state of contemporary application infrastructure environments across the distributed cloud.
    • Determine the trajectory of infrastructure strategies both on- and off-premises.
    • Explore application strategies and their impact on infrastructure decisions.
    • Monitor the movement of applications and data across the distributed cloud.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Securing the API Attack Surface

    Research Objectives

    • Validate API usage and growth patterns associated with cloud adoption and digital transformation.
    • Highlight the challenges security teams are facing in securing their APIs.
    • Examine current API security approaches and their effectiveness.
    • Determine best practices for improving API security.
    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • 2023 SASE Series: SSE Leads the Way Toward SASE

    Research Objectives

    • Identify top drivers for SASE and SSE initiatives and whether they are changing.
    • Understand the primary technologies and capabilities users are seeking in SSE solutions.
    • Determine if companies are making progress with organizational changes to support network and cybersecurity convergence.
    • Monitor interest in single-vendor solutions and anticipated project timelines. (more…)
  • Securing the API Attack Surface

    Organizations across industries need effective API security solutions to reduce cybersecurity risk as cloud-native development scales. This can help their teams discover, manage, configure, monitor, and protect their APIs to keep pace with modern software development.

    Learn more about these trends with the infographic, Securing the API Attack Surface.

  • Generative artificial intelligence (GenAI) recently stormed the market and mindshare of decision makers across industries and major geographic markets. Business leaders see a massive opportunity to positively impact operations and customer strategies with GenAI, but its adoption and use across all business units carry a fair share of trepidation.

    Learn more about these trends with the infographic, Beyond the GenAI Hype: Real-world Investments, Use Cases, and Concerns.