Insight

  • Cloud Entitlements and Posture Management Trends

    Research Objectives

    Organizations are moving applications to the cloud and embracing digital transformation strategies to speed development cycles and better serve employees, partners, and customers. However, the subsequent faster release cycles and broad internet exposure increases the number of potential security incidents caused by misconfigurations, including a high number of those that are identity-related. Security teams are looking for efficient ways to drive actions that reduce security risk, including trimming excessive access permissions and fixing coding issues that make them vulnerable to attack.

    In order to gain further insights into these trends, TechTarget’s Enterprise Strategy Group (ESG) surveyed 383 IT and cybersecurity decision makers responsible for evaluating or purchasing cloud security technology products and services at midmarket (100 to 999 employees) and enterprise (1,000 or more employees) organizations in North America (US and Canada).

    This study sought to answer the following questions:

    • Of all the production server workloads used by organizations, approximately what percentage is run on public cloud infrastructure services today? How is this expected to change over the next 24 months?
    • To what extent do organizations plan to incorporate security processes and controls via their DevOps processes (i.e., DevSecOps)?
    • What are the biggest cloud security challenges organizations face? What issues, if any, associated with the misconfiguration of a cloud application or service have organizations detected within the last 12 months?
    • What were the most effective steps organizations have taken to improve the security posture of their cloud-native applications, infrastructure, and development environment?
    • Which group has the primary responsibility for securing organizations’ cloud-native applications and infrastructure? Which groups implement and operate the cybersecurity controls organizations employ to secure cloud-native applications?
    • What role, if any, did cloud entitlements play in any cybersecurity incidents organizations experienced due to multiple misconfigurations? Have cloud entitlements caused organizations to fail a security audit?
    • How important is CIEM to organizations in terms of reducing security risk?
    • What are the top business drivers behind investments in CSPM? What attributes would be most attractive to organizations as part of a comprehensive CSPM product offering?
    • What types of CSPM tools are organizations using?
    • Relative to other areas of cybersecurity, how do organizations expect their level of investment in CSPM to change, if at all, over the next 12 months?

    Survey participants represented a wide range of industries including manufacturing, technology, financial services, and retail/wholesale. For more details, please see the Research Methodology and Respondent Demographics sections of this report.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Cyber-threat Intelligence Programs

    Cyber-threat intelligence is analyzed information about cyber-threats that helps inform cybersecurity decision making. Although security professionals recognize the value of cyber-threat intelligence, many organizations still consume it on a superficial basis.

    Learn more about these trends with the infographic, Cyber-threat Intelligence Programs.

  • End-to-end Networking Visibility and Management

    Research Objectives

    Organizations are distributing applications across private data centers, multiple public clouds, and edge locations. Plus, hybrid work initiatives are enabling employees to work from home or other locations outside of traditional office settings. As a result, the network has become critical to ensuring secure connectivity. These modern, distributed networks create greater challenges for organizations as they can create blind spots and become operationally complex to effectively manage. In addition, organizations are exploring the use of new technologies that drive visibility, efficiency, and automation.

    To better understand how organizations are addressing end-to-end network visibility and management as well as adopting new technologies to drive greater operational efficiencies, Enterprise Strategy Group surveyed 339 IT and networking professionals responsible for network operations, architecture, and management at organizations in North America (US and Canada).

    This study sought to answer the following questions:

    • Approximately how many unique public cloud infrastructure service providers do organizations currently use?
    • Approximately how many remote offices/branch offices do organizations operate worldwide today, and how do they expect this to change over the next 24 months?
    • Approximately what percentage of organizations’ total employees are roaming users, and how do they expect this to change over the next 24 months?
    • What is the breakdown of where production applications and workloads run today, and how is this expected to change over the next 24 months?
    • What are the biggest reasons that organizations believe end-to-end network environments have become more complex?
    • How important do organizations believe it is to have unified end-to-end visibility of network environments? Why is unified end-to-end visibility viewed as important?
    • What challenges have organizations encountered, or what concerns do they have, with unifying network visibility capabilities? What benefits have organizations achieved, or do they expect to achieve, by unifying their end-to-end network visibility capabilities?
    • How important do organizations believe it is to have unified end-to-end management of network environments? Why is unified end-to-end management viewed as important?
    • What challenges have organizations encountered, or what concerns do they have, with unifying network management capabilities? What benefits have organizations achieved, or do they expect to achieve, by unifying their end-to-end network management capabilities?
    • How important is digital twin technology, or will it be, for the visibility and management of organizations’ end-to-end network environments?
    • To what extent are organizations using network automation technology? To what extent do organizations’ network automation solutions leverage AI/ML capabilities?
    • In which network domains are organizations currently using, or planning to use, network automation? What are, or likely will be, the most common uses for network automation?

    Survey participants represented a wide range of industries including manufacturing, technology, financial services, and retail/wholesale. For more details, please see the Research Methodology and Respondent Demographics sections of this report.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Data Protection Issues for Salesforce Persist

    Mission-critical applications and their associated data must meet stringent data protection SLAs to support business processes, mitigate risk, and place organizations in a favorable position should data loss occur, particularly when due to ransomware. However, a disconnect and many misconceptions exist when protecting SaaS workloads’ data to foster recoverability. The impact of this phenomenon hits SaaS deployments across the board, including Salesforce, which is detailed in this brief. IT professionals, workload owners, and business leaders must closely inspect their current data protection apparatus and processes for Salesforce workloads to put in place effective and efficient data protection solutions.

    (more…)

  • The SaaS Backup Disconnect: Data Loss Is Real!

    The SaaS backup disconnect persists and is causing data loss. One-third of IT professionals don’t do anything to protect their SaaS-resident application data as they believe it is the vendor’s responsibility. The problem with the state of SaaS data protection is that current misunderstandings can lead to data loss, with a majority of organizations reporting lost SaaS-resident data in the last year. There are many ways to lose SaaS data, whether through external events such as cyber-attacks or via internal events. Organizations using SaaS applications should consider deploying third-party solutions that meet core requirements to properly protect their data and ensure recoverability of these mission-critical workloads.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • The Cloud Data Security Imperative

    Research Objectives

    Examine the impact of the public cloud on data security priorities.
    Determine the degree of separate versus unified approaches for cloud and on-premises data sets.
    Gain insight into top data security challenges and rate data loss from the cloud.
    Establish data security spending intentions and priorities.

    (more…)

  • Managing the Endpoint Vulnerability Gap

    Research Objectives

    Identify challenges, strategies, and trends in endpoint management and security.
    Determine if and how endpoint management and security functions and systems are converging.
    Highlight opportunities for improving endpoint management and security fueled by functional convergence.

    (more…)

  • Network Threat Detection Response Trends

    Research Objectives

    Gain insights into the challenges security teams face with the current threat detection and response landscape.
    Gauge the key capabilities organizations require from NDR tools and the use cases they are seeking to address.
    Examine how NDR tools are used today and where they fit into broader XDR plans and strategies.
    Understand why security teams are prioritizing NDR and the benefits they are seeing.

    (more…)

  • Top RSA Conference 2023 Trends and Topics

    endpoint_security_suiteTaking inspiration from the words of Helen Keller, “Alone we can do so little; together we can do so much,” the theme for RSA Conference 2023 is “Stronger Together.”

    (more…)

  • Digital Experience Platform Trends

    Research Objectives

    Today’s businesses are evolving rapidly to meet new customer expectations. This includes leveraging digital experience platforms to help deliver strategic digital transformation initiatives. Modern organizations are demanding more and faster results from their digital transformation investments, especially around the customer experience (CX). Measuring the impact of these initiatives is important as organizations seek to identify what is working and what needs adjusting. Additionally, it is imperative to understand how organizations are using DXPs to enhance the end-to-end customer journey in response to today’s dynamic market and technology landscape.

    (more…)
  • Cloud Entitlements and Posture Management Trends

    Research Objectives

    Ascertain key cloud adoption trends that drive the need for CSPM and CIEM solutions.
    Determine the top challenges organizations face in managing cloud security posture and infrastructure entitlements.
    Validate top requirements for CSPM and CIEM solutions.
    Highlight key roles involved in evaluating and purchasing solutions. (more…)

  • Customer Experience Strategies and Technology Frameworks

    Research Objectives

    Gauge the current state and maturity of customer experience strategies and the technology frameworks supporting themUnderstand the top barriers that are preventing organizations from improving customer experienceEstablish how CX buying teams are structured and their involvement in the purchase cycleDetermine investment priorities and future plans for CX-related platforms and technologies.

     


    (more…)