Insight

  • The global pandemic significantly impacted organizations last year in many different ways. The biggest was undoubtedly the swift transition to work-from-home programs and the need to stand up technology to enable this shift. As a result, many organizations reported that these efforts had dramatically accelerated their company’s digital transformation efforts. ESG research validates this acceleration and highlights that some of the top goals of organizations’ digital transformation initiatives are to drive greater operational efficiencies and deliver differentiated customer experiences. Therefore, it shouldn’t be a surprise that technology vendors are also accelerating their efforts to deliver solutions to enable greater operational efficiency to address the increasing complexity arising from a highly distributed IT environment. A great example of this vendor transformation can be seen in the steps taken by Juniper Networks.

    (more…)

  • Cybersecurity in the C-Suite and Boardroom

    As organizations embrace digital transformation initiatives, business outcomes become inexorably linked to technology areas like application development, cloud computing, and IoT devices. Therefore, these technology assets must be protected to ensure continuity of business operations. The link between cybersecurity and the business has led to an industry declaration that, “Cybersecurity is a boardroom issue.” This statement is true yet simplistic. Executives and corporate directors have a fiduciary responsibility to shareholders and/or owners, so they are ultimately responsible for everything that drives the business, including managing cyber-risk and safeguarding business-critical technology assets. That said, cybersecurity can be a highly technical discipline. This brings up a few questions: Do executives really understand cybersecurity and its role in the business? And as technology further dominates the business landscape, are they investing appropriately in cybersecurity and driving a cybersecurity culture throughout their organizations?

    To explore the answers to these and other questions, ESG surveyed 365 senior business, cybersecurity, and IT professionals at organizations in North America (US and Canada) and Western Europe (UK, France, and Germany) working at midmarket (i.e., 100 to 999 employees) and enterprise-class (i.e., more than 1,000 employees) organizations

    (more…)

  • Trends in Identity and Access Management

    The broad adoption of public cloud services demands a retooling of identity and access management programs. Perimeter security must evolve from a traditional castle and moat model to one that focuses on cloud identities inclusive of service accounts, as well as individual users and the data they access. To protect sensitive cloud-resident data, cybersecurity and IT operations teams need to work with their line-of-business teams on strengthening identity programs with both the user experience and risk in mind.

    In order to gain insight into these trends, ESG surveyed 379 IT and cybersecurity professionals at organizations in North America (US and Canada) personally responsible for evaluating or purchasing identity and access management and cloud security technology products and services. This research aimed to understand the problem space, organizational responsibilities, compliance implications, and plans for securing user access to a wide portfolio of cloud services. The study also looked at the current and planned use of various authentication methods, privileged access management, device profiling, unified directories, user activity analytics, and service account protection.

    (more…)

  • Tape’s Place in an Increasingly Cloud-based IT Landscape

    Tape is back on the forefront with new use cases and possibilities. The need for unlimited and cost-conscious storage for long-term retention has never been stronger, particularly for “cold” layers of storage in public and private clouds. Hardware, software, and product usability evolutions make tape solutions an attractive option for long-term archiving, ransomware remediation, and massive storage for media or media-like applications.

    In order to gain insight into these trends, ESG surveyed 303 IT professionals at organizations in North America (US and Canada) personally responsible for or familiar with their organization’s data protection environment and strategy, including tape technology. The respondents’ organizations had to be current users of tape technology. This research aimed to understand the current state of enterprise tape deployments, uncover specific use cases (including vertical-specific ones), identify gaps, and highlight future expectations. Special attention was also paid to cloud use cases such as the usage of tape for long-term retention by hyperscalers, leveraging cloud-like services that use tape as a replacement for on-premises solutions and migration of tape to cloud.

    (more…)

  • Tape’s Place in an Increasingly Cloud-based IT Landscape

    ESG’s Master Survey Results provide the complete output of syndicated research surveys in graphical format. In addition to the data, these documents provide background information on the survey, including respondent profiles at an individual and organizational level. It is important to note that these documents do not contain analysis of the data.

    This Master Survey Results presentation focuses on 2020 IT trends for the existing and emerging technology influencing tape usage, buying intentions of IT teams, existing challenges and drivers influencing buying decisions, and buyer preferences for changing tape topologies.

    (more…)

  • GettyImages-637920192Somewhere around 2015, the security industry adopted a new mantra, “cybersecurity is a boardroom issue.” This statement was supported by lots of independent research, business press articles, webinars, local events, and even sessions at RSA and Black Hat crowing about the burgeoning relationship between CISOs, business executives, and corporate boards.

    At the beginning of last year, I noticed that boardroom buzz about cybersecurity hadn’t really changed over the past 5 years – same old tired rhetoric and hyperbole. Hmm. Certainly, things must have progressed in that 5-year timeframe, right?

    (more…)

  • 2021 Technology Spending Intentions Survey

    Based on a survey of 664 global IT and business professionals at enterprise and midmarket organizations, the 2021 Technology Spending Intentions Survey examines the key business and technology priorities driving 2021 spending plans across a range of technology markets including infrastructure, cloud services, cybersecurity, artificial intelligence (AI), analytics, data protection, mobility, business applications, and more.

    (more…)

  • MSP Partner Landscape 2020

    ESG’s Master Survey Results provide the complete output of syndicated research surveys in graphical format. In addition to the data, these documents provide background information on the survey, including respondent profiles at an individual and organizational level. It is important to note that these documents do not contain analysis of the data.

    This Master Survey Results presentation focuses on 2020 MSP landscape best practices and actions; standout vendor offerings, programs, and support; and differences between small and larger partners.

    (more…)

  • Data Protection Predictions for 2021

    No one could have predicted the COVID-19 pandemic and the profound impact it has had on our lives, our society, the way we now work, how we market our products, and the ripple effects on IT infrastructure and data in general. This once-in-a-lifetime event is placing data protection at the top of many lists, something that our research highlighted in 2020 and, looking ahead to 2021, will directly affect IT strategies against a backdrop of accelerated digital transformation/optimization.


    For more information or to discuss these findings with an analyst, please contact us.
  • Network Security Predictions for 2021

    Enterprise Strategy Group’s John Grady outlines seven network security predictions for 2021, including:

    • Remote work and zero trust access will remain top drivers for SASE through next year.
    • The appliance market evolves to remain relevant.
    • Runtime application security continues to converge.
    • API protection gets its due attention as part of WAAP.

    For more predictions and a look back at how significant 2020 was for network security, download the full brief.


    If you’re interested in learning more or would like to discuss these findings with an analyst, please contact us.
  • Data Protection Trends and Strategies for Containers

    Container adoption is accelerating and so too is the requirement to properly protect container environments and the data in them. ESG research indicates that, so far, IT professionals are kicking the can down the road. While many recognize the growing importance of containers relative to other vital application platforms, confidence levels in organizations’ ability to protect containerized workloads are lagging. As was the case with other recent disruptive shifts in the IT landscape, including the VMware and cloud computing phenomena, newer data protection approaches are needed.

    In order to gain insight into these trends, ESG surveyed 334 IT professionals at organizations in North America (US and Canada) personally responsible for or familiar with their organization’s container-based application environment and strategy, including the associated data protection tools and processes.

    (more…)

  • Trends in IAM: Cloud-driven Identities

    ESG’s Master Survey Results provide the complete output of syndicated research surveys in graphical format. In addition to the data, these documents provide background information on the survey, including respondent profiles at an individual and organizational level. It is important to note that these documents do not contain analysis of the data.

    This Master Survey Results presentation focuses on current identity and access management (IAM) challenges and threats, as well as strategies and buying intentions, including assessing the prioritization of IAM and identity governance and administration (IGA) technologies.

    (more…)