Cybersecurity & Networking

  • SD-WAN and security technologies have been converging via SASE to simplify the infrastructure stack and deliver better experiences and protection for users. However, questions remain as to how quickly organizations are acting to tightly couple both networking and security tools and teams. While convergence has an appealing value proposition, it can be difficult to implement in practice. Enterprise Strategy Group recently cybersecurity, networking, and IT professionals to gain insights into these trends.

    To learn more, download the free infographic, Networking and Security Convergence: Assessing SASE Progress and Best Practices.

  • SD-WAN and security technologies have been converging via SASE to simplify the infrastructure stack and deliver better experiences and protection for users. However, questions remain as to how quickly organizations are acting to tightly couple both networking and security tools and teams. Network and security organizations have different objectives, KPIs, workflows, and vendor preferences. Taken together, this means that while convergence has an appealing value proposition, it can be difficult to implement in practice. Networking and security leaders need to understand where their forward-thinking peer organizations are in this process to plan accordingly and, ultimately, solve the key business challenges they face.

    To gain insights into these trends, Enterprise Strategy Group surveyed 428 cybersecurity, networking, and IT professionals in North America (U.S. and Canada) involved with SASE technology and processes.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • This Complete Survey Results presentation focuses on the challenges organizations face maintaining separate networking and security teams and tools and the subsequent desire to merge these functions, as well as the drivers, use cases, and key attributes organizations associate with SASE.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • Organizations Set Their Sights on Private 5G

    Private 5G networking is increasingly considered a viable option for organizations seeking to modernize their networks and expand their speed, reliability, security, and connectivity capabilities. While this remains a somewhat nascent market as 5G networks continue to grow, adoption is beginning across businesses of various sizes. Recent research by Enterprise Strategy Group sought to understand how organizations approach private 5G in their enterprise operations today.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • Different businesses can have vastly different priorities when it comes to their Wi-Fi deployment choices. For example, while firms in highly regulated industries like healthcare and financial services will prioritize stringent security and control capabilities, those with rapid seasonal transaction fluctuations such as retail will privilege high-performance features. Recent research by Enterprise Strategy Group investigated how organizations in different industries are navigating their Wi-Fi deployment decisions among the solutions available today.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • AI is impacting virtually every aspect of technology and operations, and security operations and the use of MDR services are no exception. While AI-enabled security solutions are poised to change the way security programs operate, they are also impacting the types of managed security services and the use of MDR services as they exist today. Enterprise Strategy Group recently surveyed IT and cybersecurity professionals to gain insights into these trends.

    To learn more, download the free infographic, The Changing Role of Managed Detection and Response (MDR) Providers in the AI Era.

  • As organizations increasingly move workloads to the cloud and security responsibility becomes decentralized, the difficulty in maintaining visibility across network resources and configuration hygiene rises. AWS Shield network security director can help organizations understand network security in place and make needed changes to mitigate risk for better security and compliance.

    To learn more, download the free brief, AWS Shield Network Security Director Provides Mapping for Contextual Understanding to Mitigate Risk and Speed Response.

  • Wi-Fi Evolution: WLAN in the Age of AI

    While much of the technology underpinning wired enterprise networks is mature, the same cannot be said about wireless networks, which continue to change and evolve. Nowhere else is this more evident than within Wi-Fi standards, which endured three major updates in the past 10 years alone, moving from Wi-Fi 5 to Wi-Fi 6 and 6E, and now on to Wi-Fi 7. Each iteration brings new capabilities but also new challenges that can prevent network teams from obtaining the full value of the upgrade. Enterprise Strategy Group recently surveyed networking professionals to gain insights into these trends.

    To learn more, download the free infographic, Wi-Fi Evolution: WLAN in the Age of AI.

  • Wi-Fi Evolution: WLAN in the Age of AI

    While much of the technology underpinning wired enterprise networks has stabilized and matured, the same cannot be said about wireless networks, which continue to change and evolve. Nowhere else is this more evident than within Wi-Fi standards, which endured three major updates in the past 10 years alone, moving from Wi-Fi 5 to Wi-Fi 6 and 6E, and now on to Wi-Fi 7. Each iteration brings not only new capabilities and features, but also new challenges that can prevent network teams from obtaining the full value of the upgrade. Important new initiatives such as AI and IoT are adding urgency to upgrades, driving efforts to ensure new applications can achieve full potential where wireless LAN technologies are involved.

    To gain further insight into these trends, Enterprise Strategy Group surveyed 370 networking professionals at organizations with 500 or more employees in North America (U.S. and Canada) involved with or responsible for building and managing wireless network technology and processes at their organization.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • Wi-Fi Evolution: WLAN in the Age of AI

    This Complete Survey Results presentation focuses on Wi-Fi deployment drivers and objectives; features and functions for Wi-Fi 6, 6E, and 7; concerns with Wi-Fi upgrades; LAN and WAN expansions; management and monitoring integration; private 5G and comparisons with Wi-Fi; and budgets.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • Extreme Connect: Fabric Switching and AI

    At Extreme Connect 2025 in Paris, the top-level theme was about the company’s new, AI-native Extreme Platform ONE solution. And while that is a powerful story in and of itself, another important subtheme emerged around the success its customers are having with Extreme Fabric, a Layer 2 simplified fabric based on Shortest Path Bridging (SPB) that enables network and security automation across campus, branch, and data center.

    To learn more, download the free brief, Extreme Connect: Fabric Switching and AI.

  • Reaching a Tipping Point With API Security

    Application security has become more difficult in large part due to the wide range of tactics attackers can use to exploit their targets. APIs in particular have been a growing concern as applications become more interconnected and reliant on microservices. Recent research by Enterprise Strategy Group, now part of Omdia, found that API security vulnerabilities have not been receiving the attention and resources needed to appropriately mitigate growing threats, but that might be changing.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us