Insight

  • Cloud Analytics Trends

    Discover why IT organizations consider the cloud critical to fueling data-driven success with this Enterprise Strategy Group Infographic, Cloud Analytics Trends.


    For more information or to discuss these findings with an analyst, please contact us.
  • Microsoft Makes Gains in Endpoint Security

    As expanding device diversity, zero trust, and extended detection and response initiatives drive organizations to reassess endpoint security solution investments, security teams are looking to replace existing tools with more capable, converged platforms. Significant advances in Microsoft’s native endpoint security prevention, detection, and response capabilities, together with attractive bundling and pricing options, have propelled a meteoric rise in the popularity of Microsoft Defender for Endpoint over the past two years. While many intend to use Defender as a core component within their endpoint security arsenal, many still plan to supplement, potentially spawning a new opportunity for other security providers to deliver specialized add-on solutions.

    (more…)

  • Hyperconverged Infrastructure Trends

    In order to gain insight into how infrastructure is evolving to take on today’s business challenges, ESG surveyed 348 IT decision makers at organizations in North America (US and Canada) responsible for their organization’s on-premises infrastructure, specifically usage of or plans for hyperconverged infrastructure.

    Survey participants represented a wide range of industries including manufacturing, financial services, retail, healthcare, and technology.

    (more…)

  • Enterprise Resource Planning Ecosystem Trends

    In order to gain insight into the current ERP landscape, including upgrade plans, business drivers, key features, purchase influencers, and deployment models, among others, ESG surveyed 193 qualified respondents at organizations in North America (US and Canada) personally responsible for their organization’s ERP systems and with significant knowledge of the associated plans and budgets.

    (more…)

  • Women in Cybersecurity: Elizabeth Gossell

    We’re excited to highlight Elizabeth Gossell for our second Women in Cybersecurity interview. Liz is the Principal Security Analyst for Danaher Corporation, a global science and technology conglomerate with subsidiaries operating across different market segments, including life sciences, diagnostics, and water. The company is no stranger to mergers and acquisitions, as it acquires roughly 10 companies each year. In this video interview, Liz speaks with Enterprise Strategy Group Sr. Analyst Melinda Marks about the evolving security challenges that come with M&A efforts, scaling, and sprawl, such as maintaining security consistency across all the organizations, and working quickly to secure new acquisitions.

    Liz also describes her many years of experience in the space, starting with an internship in cybersecurity years ago and working at Lockheed Martin and Tenable, where she originally met Melinda. “I’m a problem solver by nature,” said Liz, who is excited by the breadth and complexity of the challenges across cybersecurity, as well as the opportunity to put both her technical and non-technical skills into action to find a solution.

    Elizabeth is passionate about solving problems in new ways, by uniting a diverse group of people with different perspective, ideas, and skill sets. She encourages women to self-advocate, set boundaries, and ask for the opportunities they want to pursue, “Taking the reins of your career development early and being a strong advocate for yourself is absolutely critical.”

    Be sure to check out her story, and learn more about Liz and Danaher Corporation:

    Please visit Enterprise Strategy Group’s Women in Cybersecurity page, where you can also find a link to the full audio interview with Elizabeth, and join us to hear more inspiring stories in future episodes!

  • A Network-focused Approach to SASE

    Secure access service edge (SASE) offers opportunities for both networking and security, but in most organizations the security and networking teams still operate independently. This independence means enterprise strategies for pursuing SASE may often be focused either on networking or security. It should be noted, however, that some organizations are starting with a converged approach. Depending on who is leading the SASE initiative, priorities may differ. This brief will focus on the nearly one-third of organizations taking a network-focused approach to SASE implementation.

    (more…)

  • SASE: A Managed Service Opportunity

    Secure access service edge (SASE) frameworks are increasingly gaining interest with enterprise customers. The deployment of these services presents an opportunity to switch from perpetual licensing or even subscription licensing to delivering SASE as a managed service. The success of SD-WAN, a major component of a SASE framework, is certainly a driver for consuming SASE as a managed service as well. Organizations need to understand how managed service providers are delivering SASE, especially the ability to manage on-premises and cloud offerings.

    (more…)

  • The Growth of Network Automation and AI/ML

    Automation of network management, often through artificial intelligence and machine learning, holds great potential for helping businesses keep pace with rapidly expanding and complex distributed networks. But most organizations are reluctant to hand over all responsibility to intelligent systems. Change management to overcome AI skepticism, as well as gaining more experience using AI/ML, will build confidence and help drive adoption.

    (more…)

  • Cloud-native Application Trends

    Organizations that currently develop and deploy cloud-native applications use DevOps and agile development processes significantly more than those that don’t, suggesting that being cloud-native is as much about iterative methodologies as it is about technology. An organization’s use of cloud-native applications and adoption of iterative methodologies, including low code/no code, also strongly correlate to its digital transformation maturity.

    (more…)

  • Data Is the Business

    Building on existing trends favoring digital transformation initiatives, the pandemic sparked a further shift toward data-centric business models, with virtually all enterprises now using data to support the business and a remarkable one in five claiming data as their core business. To treat data like the business asset it has become, it must be de-risked, protected, made compliant, and leveraged. This will require IT professionals and vendors alike to develop intelligent data management strategies that not only preserve and protect data but also ready it for use in achieving business growth objectives.

    (more…)

  • Intelligent Data Management

    Driven by data’s rapid growth, the menace of cyber-threats and the enterprise push for digital transformation, among other factors, intelligent data management is fast becoming a priority for data protection and storage professionals. More than two-thirds rank it among their organizations’ top five data protection and management priorities, a dramatic change from two years ago when only a third of organizations considered intelligent data management a top priority. Among digitally mature organizations, adoption is even higher, suggesting that interest in this approach will continue to grow as digital laggards achieve digital transformation maturity. One in five organizations believe intelligent data management will replace their overall data protection strategies. Learn why now is the time to shift to intelligent data management.

    (more…)

  • Compliance and Data Sanitization

    Nearly 80% of organizations require data to be made compliant with external mandates or internal standards before it’s reused for non-production purposes. Most also sanitize such data, and increased confidence levels about passing compliance audits are especially pronounced among those that do. But many organizations don’t sanitize or apply compliance processes to all of their secondary data, and these partial approaches can limit the effectiveness of their de-risking efforts and leave them exposed to potential compliance issues.

    (more…)