Insight

  • Organizations practicing observability are increasingly integrating AIOps tools and techniques to speed process automation, increase end-to-end visibility, provide real-time data analysis, and yield trustworthy outcomes. Midsize and large organizations are making immediate plans to expand their observability investments, and more than half of these companies plan to add AIOps tools. Though still considered in the early stages of widespread deployment, AIOps has shown strong results in simplifying operations and accelerating the scaling of observability practices.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • The use of generative artificial intelligence (GenAI) programs is becoming ubiquitous in business operations across organizations as departments and individuals attempt to inject efficiency into their processes using this fast-growing technology. Unfortunately, its rapid pace of adoption has cybersecurity teams racing to keep up. Recent research by TechTarget’s Enterprise Strategy Group explores how IT professionals and business decision makers plan to apply governance and policies to their organizations’ usage of GenAI.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • From skills shortages to nuanced cyber-attacks, cybersecurity leaders have well-documented challenges that threaten the successful protection of businesses. Generative artificial intelligence (GenAI) has burst onto the scene promising a long list of potential applications, with cybersecurity improvement touted among them. Recent research by TechTarget’s Enterprise Strategy Group examined early cybersecurity use cases for this technology to get a sense of where GenAI could alter modern cybersecurity practices.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Identity Needs a Seat at the Cybersecurity Table

    Identity is rooted in IT operations. In fact, when most people think of identity, they think of access management, as in identity and access management, or IAM.

    The shift to the cloud and remote work, combined with the rise of phishing and other identity-related attacks, puts identity security at the forefront of cybersecurity concerns.

    Read my blog to learn more about identity’s relationship to cybersecurity.

  • Organizations across markets and geographies are expecting generative artificial intelligence (GenAI) to disrupt and transform their business processes. Recent research by TechTarget’s Enterprise Strategy Group revealed some interesting findings when it comes to customer experience (CX) use cases for this buzzy technology.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Research Objectives

    • Identify the state of contemporary application infrastructure environments across the distributed cloud.
    • Determine the trajectory of infrastructure strategies both on- and off-premises.
    • Explore application strategies and their impact on infrastructure decisions.
    • Monitor the movement of applications and data across the distributed cloud.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Securing the API Attack Surface

    Research Objectives

    • Validate API usage and growth patterns associated with cloud adoption and digital transformation.
    • Highlight the challenges security teams are facing in securing their APIs.
    • Examine current API security approaches and their effectiveness.
    • Determine best practices for improving API security.
    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • 2023 SASE Series: SSE Leads the Way Toward SASE

    Research Objectives

    • Identify top drivers for SASE and SSE initiatives and whether they are changing.
    • Understand the primary technologies and capabilities users are seeking in SSE solutions.
    • Determine if companies are making progress with organizational changes to support network and cybersecurity convergence.
    • Monitor interest in single-vendor solutions and anticipated project timelines. (more…)
  • Securing the API Attack Surface

    Organizations across industries need effective API security solutions to reduce cybersecurity risk as cloud-native development scales. This can help their teams discover, manage, configure, monitor, and protect their APIs to keep pace with modern software development.

    Learn more about these trends with the infographic, Securing the API Attack Surface.

  • Generative artificial intelligence (GenAI) recently stormed the market and mindshare of decision makers across industries and major geographic markets. Business leaders see a massive opportunity to positively impact operations and customer strategies with GenAI, but its adoption and use across all business units carry a fair share of trepidation.

    Learn more about these trends with the infographic, Beyond the GenAI Hype: Real-world Investments, Use Cases, and Concerns.

  • According to The Life and Times of Cybersecurity Professionals Volume VI (2023), the cybersecurity skills shortage continues unabated, leaving a majority of organizations with an ever-growing gap in the cybersecurity skills needed to reduce their cyber-risk from the latest threats. As the void widens, cybersecurity professionals bear the brunt: More than half find their jobs harder than two years ago, with many facing ongoing internal issues and new external challenges from an increase in cybersecurity complexity to a surge in cyber-attacks against an expanding attack surface. Chronic understaffing remains a major contributor to these issues and associated ramifications, with roughly one out of five professionals having even considered making a career switch, mainly out of frustration with what they perceive as organizational neglect and the sheer stress of their jobs.

    (more…)

  • Research Objectives

    • Assess the career progression of cybersecurity professionals.
    • Determine whether cybersecurity professionals are satisfied with their careers and current jobs.
    • Measure the impact of the global cybersecurity skills shortage and uncover what organizations are doing in response.
    • Monitor cybersecurity leadership stat