Insight

  • Heightened attention around strengthening network security for the cloud has rejuvenated a well-established market. Recent research by TechTarget’s Enterprise Strategy Group investigated where organizations prefer to procure their cloud- firewalls from, with the data offering conflicting views of what comes next.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Organizations are looking to adopt generative AI (GenAI) to enable employees, especially software developers, to increase productivity and gain a competitive advantage. TechTarget’s Enterprise Strategy Group research shows that with cloud-native application development, most organizations are either already using GenAI and chatbot tools or they are planning to use them. However, because application security teams need effective programs to ensure security of their software applications, their top concerns are around GenAI usage. As modern application security should enable use of innovative technologies to support business growth, this brief explores strategies to support secure GenAI use.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • 2025 Technology Spending Intentions Survey

    Persisting macroeconomic uncertainty is not dampening IT investment plans as organizations rush to outfit their environments with the transformative potential of AI while ensuring their valuable data—data inevitably fed into large language models—is kept secure. To track these trends, Informa TechTarget’s Enterprise Strategy Group surveyed 1,351 senior IT and business decision-makers to ascertain IT budget outlooks for 2025, both overall and for specific technologies, and to determine the key business and technology priorities driving these spending plans. Survey respondents were employed at midmarket (100 to 999 employees) and enterprise-class (1,000 employees or more) organizations in North America, EMEA, APAC, and Latin America. All respondents were personally responsible for or familiar with their organization’s 2024 IT spending, as well as their 2025 IT budget and spending plans at either an entire organization level or a business unit, division, or branch level.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Modern application architectures with complex relationships and ephemeral resources have resulted in a proliferation of non-human access to communicate and exchange data. Enterprise IT cybersecurity and operations teams are recognizing the risk associated with the large and growing volume of non-human identities. As cloud adoption and automation continue to grow, effective non-human identity management has become essential for maintaining security, facilitating business operations, and supporting digital transformation initiatives. TechTarget’s Enterprise Strategy Group recently surveyed IT, cybersecurity, and DevOps, platform, and cybersecurity engineering professionals to gain insights into these trends.

    To learn more about these trends, download the free infographic, Managing Non-human Identities for an Effective Cybersecurity Program.

  • Enterprise IT cybersecurity and operations teams are recognizing the risk associated with the large and growing volume of non-human identities (NHIs). Modern application architectures with complex relationships and ephemeral resources have resulted in a proliferation of non-human access to communicate and exchange data. NHI is an emerging space with unique characteristics and lifecycle requirements when compared with the more established human identity and access management (IAM) domain. Inadequate security for non-human identities poses significant security risks given the significant access and privileges provided to non-human identity infrastructure. Specifically, poor security for NHIs can lead to data breaches, operational disruptions, and compliance violations. As cloud adoption and automation continue to grow, effective non-human identity management has become essential for maintaining security, facilitating business operations, and supporting digital transformation initiatives.

    To gain further insight into these trends and issues, TechTarget’s Enterprise Strategy Group surveyed 367 IT, cybersecurity, and DevOps, platform, and cybersecurity engineering professionals at organizations in North America (US and Canada) involved with or responsible for the technologies and processes that secure non-human identities and machine workloads.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Data Governance Strategies Evolve as AI Spreads

    Organizations take numerous steps to address ethical considerations and bias in their data usage, reflecting a wide-reaching understanding that data cannot be used without barriers. However, the blinding speed of data-hungry AI deployments pressures these efforts to be implemented and executed efficiently. Research by TechTarget’s Enterprise Strategy Group investigated how organizations are addressing data governance for AI amid these dynamics.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • IT and data teams are under pressure to snap their operations into compliance with the EU Artificial Intelligence Act, which went into effect August 1, 2024. The EU AI Act serves several purposes, including outlining requirements and obligations around specific uses of AI for both AI developers and deployers. Research by TechTarget’s Enterprise Strategy Group investigated organizations’ awareness of and plans for compliance with this new regulation in the era of booming AI initiatives.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • This Complete Survey Results presentation focuses on non-human identities (NHIs), including the hurdles to gaining visibility and lifecycle control over NHIs as well as the business agility and compliance challenges posed by the management of NHIs.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Companies are regressing in the ability to manage cyber-risk and vulnerabilities due to a lack of broad asset discovery and state monitoring, deficient surface depth threat intelligence and point-in-time assessment, and insufficient vulnerability context to make prioritization possible. A lack of automation is creating an environment where the time it takes to assess state and security posture takes too long, causing analysis to be conducted on stale context. Recent research by TechTarget’s Enterprise Strategy Group reveals that cybersecurity leaders must focus on improving what data they collect, while building a system that is fast enough to keep up with a modern enterprise environment’s pace of change. To achieve this, organizations expect cyber-risk management tools to consolidate disparate data sets into something much broader over time and build a continuous approach to vulnerability and risk management.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Customer service is a hard job, whether in a contact center or in the field or in a store. Organizations face an ongoing challenge of recruiting, developing, and retaining customer service employees, and they are looking to cutting-edge technologies like generative AI (GenAI) for help. The use of AI and other advanced technologies for customer service is a classic case of combining technology with people and processes to solve problems. TechTarget’s Enterprise Strategy Group recently surveyed IT and customer service professionals to gain insights into these trends.

    To learn more about these trends, download the free infographic, The Impact of GenAI on the Evolution of Customer Service and Support Technologies.

  • Cyber-risk Management Best Practices

    Today’s business technology ecosystems consist of hybrid or multi-cloud environments, ephemeral assets, expanding attack surfaces, external connections, and dynamic cloud-native applications. These infrastructure complexities present new challenges for asset visibility, understanding attack surfaces, securing business-critical assets, and managing their associated risk. TechTarget’s Enterprise Strategy Group recently surveyed IT and cybersecurity professionals to gain insight into trends surrounding the challenges of addressing modern cyber-risk.

    To learn more about these trends, download the free infographic, Cyber-risk Management Best Practices.