Insight

  • The Modern Data Platform Drives Data-centric Organizations

    GettyImages-1367337633IT leads the modern data platform, functioning as the conduit, efficiently delivering the correct data to the right users, to empower data-driven decision-making in organizations. Over the last decade, IT vendors have been trying to develop and offer solutions to address the flood of data that companies manage. A modern data platform tries to solve this problem. It’s a combination of interoperable, scalable and modular technologies, working together to deliver an enterprise’s overall data needs.

    (more…)

  • 2023 Technology Spending Intentions Survey

    Research Objectives

    Ascertain IT budget outlook for 2023 overall and for specific technologies.

    Determine key business and technology priorities driving 2023 spending plans.

    Establish a profile of digitally mature companies in terms of the technologies and processes underlying their IT strategies.

    Monitor YoY trends with respect to technology adoption and changing customer preferences.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • GettyImages-1362980481At Big Data London, data quality and intelligence took center stage as companies strive for fast and efficient delivery of quality information — and the vendors to make it happen. Big Data London is the U.K.’s leading data and analytics event, with more than 150 vendors, 300 expert speakers, and an estimated 10,000 attendees coming together to discuss data-driven strategies. During the event, I interviewed seven vendors to get their perspectives and insights on where the market was going, the challenges they saw, and more.

    (more…)

  • Unlock Data Clean Rooms by Solving the People Problem

    dataops_skill_gap-fData clean rooms are moving into the mainstream as privacy concerns complicate measuring ad ROI, but the “people problem” poses challenges to data operation success. Data clean rooms are becoming the preeminent tool for brands to better understand the place of digital marketing within the broader marketing ecosystem. In fact, data clean rooms are key for measuring advertising effectiveness, especially as advertisers are relying on cookies less, due to privacy regulations and big tech changes.

    (more…)

  • The Advancing Role of Data-centric Developers

    GettyImages-1350230166More than ever, increases in data-centric developer reliance, data sources, and users push developers to understand IT purchasing to provide more value to data. The days of creating data-generating systems for a single operational or analytics application are over. Because of this, developers must become more data-centric to increase business agility and empower data consumers — including internal teams, partners, and customers. Data-centric developers are expanding their sphere of influence on IT purchasing decisions and maximizing the value of data.

    (more…)

  • Walking the Line: GitOps and Shift Left Security

    Research Objectives

    As organizations adopt modern software development processes, developers are empowered to quickly develop and release their applications by deploying them to the cloud. Security teams are challenged keeping up with the growth and speed of continuous integration/continuous deployment (CI/CD) cycles and their dynamic components.

    While the industry has been talking about shifting security left to help security scale with rapid development, organizations have faced challenges putting that into practice. Most cloud-native security incidents are caused by misconfigurations, putting pressure on security teams to find ways to incorporate security into development so coding issues are caught and fixed before deployment. Organizations also need to focus on better ways to work with developers for rapid remediation of any detected security issues.

    In order to gain insights into these trends, ESG surveyed 350 IT (30%) and cybersecurity (40%) decision makers, as well as application developers (30%), responsible for evaluating, purchasing, and utilizing developer-focused security products at midmarket (100 to 999 employees) and enterprise (1,000 or more employees) organizations in North America (US and Canada).


    (more…)

  • SaaS Data Protection: A Work in Progress

    Research Objectives

    Determine key challenges organizations face deploying and leveraging data protection mechanisms for their SaaS environments. Understand the education and best practices gaps that exist in protecting SaaS environments, with specific focus on key capabilities and data protection SLAs. Gain insights into key trends and requirements for successful high availability and data protection strategies for SaaS environments. Gauge end-users’ data protection knowledge and challenges for specific SaaS environments.

    (more…)

  • The State of Open Source in Cloud Analytics

    Many organizations use open source analytics and data management technology, which often serves as a foundation of their data-centric technology ecosystems. But deploying and managing open source tools and solutions are a challenge in many cases—a situation that calls for managed services to help ease the challenges and pave the way for increased open source adoption, especially in distributed cloud environments.

    (more…)

  • Many decision makers are interested in standardizing their analytics initiatives on a single cloud provider’s infrastructure and services. A large majority think their organization would be open to considering such a move. This research highlights what they’d be looking for by doing so—easier management, simplified support, and more. But it also points to a fundamental question: Can one vendor meet all of an organization’s data needs?

    (more…)

  • Walking the Line: GitOps and Shift Left Security

    Research Objectives

    Determine the extent to which organizations incorporate security into developer workflows. Understand the challenges organizations face with faster cloud-native development lifecycles. Gain insights into what types of solutions are most effective at securing software without slowing development processes. Gauge buyer preferences for vendor solutions, how solutions are deployed, and how to reduce work across teams.

    (more…)

  • SOC Modernization and the Role of XDR

    Explore new research into how security operations centers are coping with the massive scale needed to meet modern demands with this infographic, SOC Modernization and the Role of XDR.

  • Women in Cybersecurity: Barbie Bigelow

    This episode of Women in Cybersecurity features Barbie Bigelow, a veteran CIO, cybersecurity executive, board member, advisor, and investor. She is currently CEO of Emerald Growth Partners, LLC, (formerly Better Technology Partners, LLC), which she founded to help clients develop and execute strategic moves while leveraging technology to accelerate growth and increase margins. Clients have included Fortune 500 companies, startup ventures, and non-profits, and she is passionate about sharing her knowledge and increasing the number of women in leadership and board member roles.

    Barbie said she got into cybersecurity out of operational necessity; after all, if there is a cybersecurity incident, it affects operations. In her first CIO role at an electronics company, she created a cyber incident response team (CIRT). Since then, she’s held roles and advised companies on how to approach cybersecurity in ways to support technological innovation and business needs.

    Don’t miss her video below to learn about her story and her commitments to helping increase the number of women in leadership roles in cybersecurity. 

    Early in her career, Barbie held technical roles in engineering and program management. She spent 16 years as CIO for Lockheed Martin, and served in other CIO roles, gaining experience in the C-suite and leadership of professional services for companies across industries, including aerospace and defense, government agencies, manufacturing, and financial services.

    I think key to my success has been those P&L (profit and loss) and operational roles. There’s really no substitute for knowing business and working with customers in the roles I’ve had. The problems aren’t that different as you move from industry to industry, but the way that maybe people approach them is a little different. And being able to leverage a best practice in a different industry into your industry is a really powerful way to get better and bring innovation into your organization.

    About 10 years ago, when her company had a successful exit, she was planning on taking a break. But when some friends in the legal field needed help with a global company facing a cyber breach, she came in to help communicate with their Board of Directors and determine what needed to be done, taking on a year-and-a-half consultancy project with them. Then she launched her cyber consultancy company, working with boards advising on cyber risk and governance.

    Barbie is also active in the cybersecurity community and in increasing the number of women in the field and in leadership roles. In June, leveraging other groups that she works with – Women’s Business Collaborative (WBC), and Digital Directors Network (DDN) – with sponsorship from The Gula Tech Foundation, she launched The Women Cyber Governance Collaborative with the mission to equip women board directors and executive leadership with the capability to effectively govern the real and growing risks to organizations from cyber threats. Their goal is to both increase the pipeline of highly qualified cyber savvy women and increase the number of women in executive leadership and board director positions.

    It’s focused on training and advancing women in cybersecurity, technology executives, and women who are ready to go on the boards… So we teach technology executives about cyber governance and systemic risk.

    Check out Barbie’s resources and video below. 

    Resources:

    Be sure to visit Enterprise Strategy Group’s Women in Cybersecurity page, where you can view past episodes and connect with us to hear more inspiring stories in future shows.