Insight

  • In contending with a variety of deployment locations to maximize the use, effectiveness, security, and compliance of myriad applications in use by their organizations, IT professionals tasked with infrastructure management must establish effective policies to guide decisions. While some organizations deploy nearly all new applications in the cloud as a rule, many also consider the individual needs of the application at hand. Recent research by TechTarget’s Enterprise Strategy Group revealed interesting motivations behind the use of both policies.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • A variety of distributed applications are powering today’s businesses. As such, the connections and net-functionality of these applications are a critical focus for the teams tasked with maintaining them. Recent research by TechTarget’s Enterprise Strategy Group reveals a complex landscape here, fraught with challenges, negative service impacts, and difficult decisions.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • The pervasive use of public cloud providers has unlocked agility, cost-savings, and more for modern IT organizations. But one provider often can’t do it all for every business. Recent research from TechTarget’s Enterprise Strategy Group reveals some interesting findings regarding IT teams’ decisions to utilize a secondary cloud provider beyond their primary vendor.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Cross-cloud Application Migration Becomes Commonplace

    The modern infrastructure environments most IT teams contend with demand conscious deployment decisions based on the requirements of the business line, security, compliance and governance considerations, and much more. Recent research by TechTarget’s Enterprise Strategy Group revealed that migrating workloads to, from, and between clouds is increasingly common as organizations balance these considerations across the intricate web of their evolving modern environments.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • IT organizations are contending with distributed environments spanning their traditional on-premises data centers, multiple public cloud providers, and the edge and colocation locations that fall in between. Recent research by TechTarget’s Enterprise Strategy Group reveals that, in addition to the application deployment and management decisions that accompany these environments, modern IT organizations have some interesting decisions to make when it comes to their spending on the related technologies.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Collaboration Tool Security Risks Proliferate

    Our more mobile, distributed workforce has become dependent on a diverse collection of digital communication and collaboration tools, expanding the attack surface and creating new opportunities for adversaries to evade security controls. Many organizations currently lack visibility and control of one or more of the many tools their workers depend on. While email security strategies remain critical, new, more comprehensive security strategies are needed that are capable of monitoring and protecting sensitive data and access to both sanctioned and unsanctioned tools.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Despite ongoing advancements to cloud-delivered, native email security controls, organizations still view email as the most vulnerable to attack compared to other communication and collaboration mechanisms. Research by Enterprise Strategy Group also showed that most organizations have encountered challenges and gaps in their primary email security solution. As threats continue to penetrate security controls, organizations are using a layered approach that most commonly includes the addition of third-party controls.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • The use of two or more cloud computing services (i.e., multi-cloud strategies) is a modern reality for businesses looking to serve the technology requirements of their teams and thrive in a competitive landscape. TechTarget’s Enterprise Strategy Group recently surveyed IT professionals on the status of their multi-cloud strategies (and providers) today.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Recent prominent multifactor authentication-based breaches and friction in the end-user authentication experience have reached the ears of app developers, IT, and cybersecurity leadership. Organizations are now searching for alternative authentication methods to address the risks and challenges of multifactor authentication (MFA) and password-based authentication. TechTarget’s Enterprise Strategy Group recently surveyed IT, cybersecurity, and application development professionals to gain insights into these trends.

    Learn more about these trends with the free infographic, Passwordless in the Enterprise: The Dirty Secrets of Antiquated Authentication.

  • As AI continues its meteoric rise into business and IT environments, organizations are rapidly assembling or accelerating strategies to support AI technologies across every applicable area. While many organizations are consistent in their efforts to build AI strategies, the components and direction of those strategies often vary. TechTarget’s Enterprise Strategy Group recently surveyed data and IT professionals responsible for the infrastructure supporting AI initiatives at their organization to gain insights into these trends.

    To learn more about these trends, download the free infographic, Navigating the Evolving AI Infrastructure Landscape.

  • As AI continues its meteoric rise into business and IT environments, organizations are rapidly assembling or accelerating strategies to support AI technologies across every applicable area. Unlike niche technologies that impact only certain processes or personnel, AI has wide-ranging potential to transform entire businesses, IT environments, and associated teams. In turn, AI strategies must be multi-pronged efforts that properly align business objectives with AI initiatives and expectations, which requires thorough participation from stakeholders across the organization. The underlying infrastructure and other supportive elements must be fully capable of supporting that tandem strategy.

    While many organizations are consistent in their efforts to build AI strategies, the components and direction of those strategies often vary. To assess the evolving AI landscape and the infrastructure that supports it, TechTarget’s Enterprise Strategy Group surveyed 375 data and IT professionals in North America (US and Canada) responsible for strategizing, evaluating, purchasing, and/or managing infrastructure specifically supporting AI initiatives for their organization. This study sought to answer the following questions:

    • What are the primary business objectives for implementing AI? How long does it take for organizations to start seeing value from AI initiatives?
    • What are the top challenges organizations encounter when implementing AI?
    • What individuals or teams influence decision making related to infrastructure used to support AI initiatives? Which of these has the most influence on final decisions?
    • How are organizations planning to address skills gaps related to the selection, implementation, and management of infrastructure supporting AI initiatives?
    • In which physical locations do organizations primarily deploy their AI infrastructure? What are the top factors that influence the choice of these locations? Are AI environments mostly centralized, mostly decentralized, or an even mix of both?
    • What capabilities of AI infrastructure are most important?
    • Are organizations using internal resources, third-party resources, or both to manage their AI infrastructure?
    • How important is sustainability and environmental responsibility when selecting AI infrastructure? How important is a vendor’s stance on these factors when making purchase decisions for AI infrastructure?
    • What types of data do organizations use to build and train AI models and algorithms? What steps do organizations take to ensure accuracy in the data used for building and training these models?
    • How do organizations handle the movement of the large amounts of data required to support AI initiatives? What challenges are involved with this process?
    • How are organizations using synthetic and third-party data to support AI model training?
    • How are organizations using generative AI (GenAI)? What challenges are they encountering?
    • To what extent are developers leveraging AI infrastructure resources? How do developers access these resources?
    • How do organizations measure the success and effectiveness of AI initiatives?
    • What is AI’s impact on employee productivity, processes, workflows, competitiveness, and other factors?

    Survey participants represented a wide range of industries, including financial, manufacturing, retail/wholesale, and healthcare, among others. For more details, please see the Research Methodology and Respondent Demographics sections of this report.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.