Insight

  • The Impact of the Cloud on DLP

    digital_shieldCloud adoption is ubiquitous, and many organizations have adopted a cloud-first deployment policy. However, organizations continue to use on-premises infrastructure. Thus, the new normal IT infrastructure is hybrid multi-cloud. In such an environment, the perimeter becomes amorphous and dynamic, changing rapidly as organizations spin up new applications.

    Unfortunately, one-third of respondents to “The State of Data Privacy and Compliance” research survey said they have lost cloud-resident data. More concerning is that an additional 28% of organizations suspect they have lost cloud-resident data but don’t know for sure because they lack data observability. Read my blog, Data security requires DLP platform convergence, to learn more.

  • The Demise of EDR?

    As a top investment priority for security organizations, detection and response programs are entering a significant transition as attack surface expansion and threat complexity drive the need for more comprehensive visibility, detection, and response. The extended detection and response (XDR) movement has spawned a plethora of new solution offerings capable of detecting advanced threats by aggregating, correlating, and analyzing telemetry from endpoints, networks, the cloud, and identities together with a new level of more extensive threat intelligence. What impact – if any – do IT and cybersecurity teams anticipate XDR having on their current endpoint detection and response (EDR) solutions?

    (more…)

  • Cloud Analytics Trends

    Discover why IT organizations consider the cloud critical to fueling data-driven success with this Enterprise Strategy Group Infographic, Cloud Analytics Trends.


    For more information or to discuss these findings with an analyst, please contact us.
  • Microsoft Makes Gains in Endpoint Security

    As expanding device diversity, zero trust, and extended detection and response initiatives drive organizations to reassess endpoint security solution investments, security teams are looking to replace existing tools with more capable, converged platforms. Significant advances in Microsoft’s native endpoint security prevention, detection, and response capabilities, together with attractive bundling and pricing options, have propelled a meteoric rise in the popularity of Microsoft Defender for Endpoint over the past two years. While many intend to use Defender as a core component within their endpoint security arsenal, many still plan to supplement, potentially spawning a new opportunity for other security providers to deliver specialized add-on solutions.

    (more…)

  • Hyperconverged Infrastructure Trends

    In order to gain insight into how infrastructure is evolving to take on today’s business challenges, ESG surveyed 348 IT decision makers at organizations in North America (US and Canada) responsible for their organization’s on-premises infrastructure, specifically usage of or plans for hyperconverged infrastructure.

    Survey participants represented a wide range of industries including manufacturing, financial services, retail, healthcare, and technology.

    (more…)

  • Enterprise Resource Planning Ecosystem Trends

    In order to gain insight into the current ERP landscape, including upgrade plans, business drivers, key features, purchase influencers, and deployment models, among others, ESG surveyed 193 qualified respondents at organizations in North America (US and Canada) personally responsible for their organization’s ERP systems and with significant knowledge of the associated plans and budgets.

    (more…)

  • Women in Cybersecurity: Elizabeth Gossell

    We’re excited to highlight Elizabeth Gossell for our second Women in Cybersecurity interview. Liz is the Principal Security Analyst for Danaher Corporation, a global science and technology conglomerate with subsidiaries operating across different market segments, including life sciences, diagnostics, and water. The company is no stranger to mergers and acquisitions, as it acquires roughly 10 companies each year. In this video interview, Liz speaks with Enterprise Strategy Group Sr. Analyst Melinda Marks about the evolving security challenges that come with M&A efforts, scaling, and sprawl, such as maintaining security consistency across all the organizations, and working quickly to secure new acquisitions.

    Liz also describes her many years of experience in the space, starting with an internship in cybersecurity years ago and working at Lockheed Martin and Tenable, where she originally met Melinda. “I’m a problem solver by nature,” said Liz, who is excited by the breadth and complexity of the challenges across cybersecurity, as well as the opportunity to put both her technical and non-technical skills into action to find a solution.

    Elizabeth is passionate about solving problems in new ways, by uniting a diverse group of people with different perspective, ideas, and skill sets. She encourages women to self-advocate, set boundaries, and ask for the opportunities they want to pursue, “Taking the reins of your career development early and being a strong advocate for yourself is absolutely critical.”

    Be sure to check out her story, and learn more about Liz and Danaher Corporation:

    Please visit Enterprise Strategy Group’s Women in Cybersecurity page, where you can also find a link to the full audio interview with Elizabeth, and join us to hear more inspiring stories in future episodes!

  • A Network-focused Approach to SASE

    Secure access service edge (SASE) offers opportunities for both networking and security, but in most organizations the security and networking teams still operate independently. This independence means enterprise strategies for pursuing SASE may often be focused either on networking or security. It should be noted, however, that some organizations are starting with a converged approach. Depending on who is leading the SASE initiative, priorities may differ. This brief will focus on the nearly one-third of organizations taking a network-focused approach to SASE implementation.

    (more…)

  • SASE: A Managed Service Opportunity

    Secure access service edge (SASE) frameworks are increasingly gaining interest with enterprise customers. The deployment of these services presents an opportunity to switch from perpetual licensing or even subscription licensing to delivering SASE as a managed service. The success of SD-WAN, a major component of a SASE framework, is certainly a driver for consuming SASE as a managed service as well. Organizations need to understand how managed service providers are delivering SASE, especially the ability to manage on-premises and cloud offerings.

    (more…)

  • The Growth of Network Automation and AI/ML

    Automation of network management, often through artificial intelligence and machine learning, holds great potential for helping businesses keep pace with rapidly expanding and complex distributed networks. But most organizations are reluctant to hand over all responsibility to intelligent systems. Change management to overcome AI skepticism, as well as gaining more experience using AI/ML, will build confidence and help drive adoption.

    (more…)

  • Cloud-native Application Trends

    Organizations that currently develop and deploy cloud-native applications use DevOps and agile development processes significantly more than those that don’t, suggesting that being cloud-native is as much about iterative methodologies as it is about technology. An organization’s use of cloud-native applications and adoption of iterative methodologies, including low code/no code, also strongly correlate to its digital transformation maturity.

    (more…)

  • Data Is the Business

    Building on existing trends favoring digital transformation initiatives, the pandemic sparked a further shift toward data-centric business models, with virtually all enterprises now using data to support the business and a remarkable one in five claiming data as their core business. To treat data like the business asset it has become, it must be de-risked, protected, made compliant, and leveraged. This will require IT professionals and vendors alike to develop intelligent data management strategies that not only preserve and protect data but also ready it for use in achieving business growth objectives.

    (more…)