Insight

  • Security Hygiene and Posture Management

    ESG conducted a comprehensive online survey of IT and cybersecurity professionals from private- and public-sector organizations in North America (United States and Canada) between August 3, 2021 and August 14, 2021. To qualify for this survey, respondents were required to be IT and cybersecurity professionals responsible for evaluating, purchasing, and utilizing products and services for security hygiene and posture management (i.e., vulnerability management, asset management, attack surface management, security testing tools, etc.).

    This Complete Survey Results presentation focuses on security posture management strategies today, including how organizations are addressing challenges and improving programs, how security and IT operations teams cooperate on all security posture management activities, and priorities associated with security posture management in the coming 12-18 months.

    (more…)

  • The Importance of DevOps

    GettyImages-160000854Rapidly responding to business objectives is critical to future-looking organizations. The adoption of DevOps is aimed at achieving business goals consistently and rapidly. DevOps is key to many organizations to increase agility and standardization of deployment. We have seen in our latest Technology Intentions Spending research survey that more than one-third of survey respondents said their organizations are extensive users of both DevOps and agile software development methodologies. (more…)

  • Security Hygiene and Posture Management

    Security posture management challenges are driven by the growing attack surface. Organizations have accelerated cloud computing initiatives and have been forced to support a growing population of remote users because of the pandemic. Firms are also deploying new types of devices as part of digital transformation initiatives, further exacerbating the growing attack surface, which leads to management challenges, vulnerabilities, and potential system compromises. Meanwhile, security teams are also concerned about recent cybersecurity issues including MS Exchange vulnerabilities, the SolarWinds hack, and the recent Log4j zero-day flaw. As a result, organizations are further assessing security posture management processes, examining vendor risk management requirements, and testing security more frequently.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Fueling Data Innovation with Self-service

    As organizations look to make data and analytics capabilities available to more stakeholders, providing the right tools, technology, and training for all employees rooted in self-service is proving valuable. A key benefit of self-service is productivity. Experts and generalists alike benefit from self-service technology to ensure faster ramp-up, fewer interruptions, and ongoing improvements in day-to-day tasks.

    (more…)

  • From Data Backup to Data Intelligence

    ESG conducted a comprehensive online survey of IT professionals from private- and public-sector organizations in North America (United States and Canada) between August 3, 2021 and August 14, 2021. To qualify for this survey, respondents were required to be IT professionals personally responsible for data protection and data management technology decisions for their organization.

    This Complete Survey Results presentation focuses on the evolution of traditional data protection processes to more holistic data management strategies in which data is better understood and reused for other technical and business purposes.

    (more…)

  • With a goal of broadening BI usage throughout the business, organizations are turning to advanced BI capabilities. Embedded analytics, mobile application delivery and support, augmented analytics, self-service enablement, low-code/no-code, and natural language querying are expected to rapidly grow in adoption to enable the business to better leverage data and empower more end-users to gain access to actionable insight.

    (more…)

  • Business intelligence has long served as a technology-driven process for analyzing data and delivering actionable information that helps a variety of roles—from executives and managers to business analysts and data scientists—make more informed business decisions. With the understanding that the goal of BI initiatives is to drive better business decisions that enable organizations to increase revenue, improve operational efficiency, and gain competitive advantages over business rivals, it is no surprise that organizations continue to prioritize BI, as can be seen through larger investments and more end-user exposure throughout the business.

    (more…)

  • April Fool’s Day is Every Day for Cyber Criminals

    GettyImages-653080422When April Fool’s Day comes around each year, it’s human nature to be a little more on-edge than usual. Your guard is up, and you can’t completely trust anyone (even your closest friends and family). So, for the whole day, you take extra precautions, carefully opening the present your friend just “wanted to drop by,” and not believing there’s “cake in the break room” until it’s fact checked. While it’s fun to dedicate one day per year to April Fool’s Day, organizations of all industries must take these precautions… every day of the year. Cyber criminals are looking for a way to break through security defenses 24/7/365, so organizations must also remain on the clock, working to protect their most critical assets. But when it comes to cyberattacks and protecting your data, the stakes are much higher than whether the cake in the break room is real or not.

    It’s easy to want to trust those around you – and the majority of people (I believe) do have good intentions for the most part! But, unfortunately, the increasing complexity of enterprise environments, coupled with the evolution of the threat landscape means that organizations must be much more judicious in how they assess trust. For this reason, many have begun to implement principles in support of a zero trust security strategy. Zero trust is exactly as it sounds – organizations should not inherently trust any user, device, or entity. Instead, they should function as if cyber criminals already have access to the corporate network and resources. While in the past, security may have been focused on establishing a defined perimeter inside which trust was inherently assumed, zero trust today requires an all-encompassing approach to continually evaluate, authorize, and authenticate every network transaction based on the risk it poses.

    ESG research revealed that 36% of survey respondents’ organizations experienced probing ransomware attacks on at least a monthly basis over the past 12 months.[1] Many organizations experience these daily. So what are organizations doing about this? 82% of surveyed organizations planned to increase spending on technologies, services, and personnel supporting zero trust in the next 12-18 months, and for those who had already adopted zero trust strategies, 84% believed them to be successful.[2] This is clearly an area of an investment for organizations, and it seems to be paying off for the earlier adopters.

    While it may be difficult to trust others when it comes to cybersecurity and cyber-attacks, the objective of ESG Validation reports is to provide an independent, trustworthy perspective of solutions so that IT decision makers can make better business decisions and find the best solutions for their needs. Check out these recent zero trust-related validation report: Google BeyondCorp Enterprise.

    Enterprise Strategy Group (ESG) is an IT analyst, research, validation, and strategy firm that gives the global IT community access to market intelligence and actionable insight. The Validation Team creates assets such as Validation reports, videos, webinars, and more, that help to communicate the technological and economic value of IT products and solutions.

    [1] Complete Survey Results: 2022 Technology Spending Intentions Survey Nov 24, 2021

    [2] Research Report: The State of Zero-trust Security Strategies Apr 12, 2021

  • Hyperconverged infrastructure (HCI), which combines compute, storage, and virtualization resources in a single system, continues to grow in popularity as delivery models evolve. Emerging, next-generation HCI solutions that support independently managed resources can be used in conjunction with traditional, clustered HCI to expand the IT ecosystem in a more holistic approach across the entire organization.

    (more…)

  • 2021 SASE Trends

    Interest in secure access service edge (SASE) architectures has exploded as IT organizations struggle using traditional solutions to support distributed enterprise environments.

    Learn more about this important transition with this Enterprise Strategy Group Infographic, 2021 SASE Trends.


    For more information or to discuss these findings with an analyst, please contact us.
  • Endpoint Security Trends

    To better secure their growing attack surface, IT and security teams are thinking differently about endpoint security platforms.

    Learn more about this shifting market with the Enterprise Strategy Group Infographic, Endpoint Security Trends.


    For more information or to discuss these findings with an analyst, please contact us.
  • SASE Trends

    The amount of interest in secure access service edge (SASE) architectures has exploded over the last 18 months. Organizations struggle using traditional, on-premises-based network and security solutions to support distributed, cloud-centric enterprise environments. While this has been an increasing challenge over the last few years, the pandemic and resulting spike in newly remote workers pushed many organizations to a tipping point. At the same time, the broad applicability of SASE leads to some confusion about where to begin and which technologies are required, exacerbated by legacy organizational dynamics.

    (more…)