Cybersecurity & Networking

  • End-to-end Networking Visibility and Management

    Organizations are distributing applications across private data centers, public clouds, the edge, and hybrid work locations, creating management complexity and blinds spots for networking teams that are trying to ensure critical connectivity. As a result, organizations are exploring new strategies and technologies that drive visibility, efficiency, and automation.

    Learn more about these trends with the infographic, End-to-end Networking Visibility and Management.

  • The potential for serious business disruptions makes detecting threats quickly and accurately critical to preventing data loss, compliance violations, and lost revenue. Even as resources and users leave the traditional perimeter, the network should play a key role in detecting threats to avoid business disruption.

    Learn more about these trends with the infographic, The Evolving Role of Network Detection and Response.

  • What Security Teams Want from MDR Providers

    IT organizations shouldn’t be fooled by the name: Managed detection and response (MDR) providers are delivering much more than basic detection and response. With no end in sight for the cybersecurity skills shortage, MDR services can bring immediate expert resources online to help security teams gain control and set themselves up for future security program success. TechTarget’s Enterprise Strategy Group recently surveyed cybersecurity professionals in order to better understand these trends.

    Learn more about these trends with the infographic, What Security Teams Want from MDR Providers.

  • Research Objectives

    To gain insight into the market dynamics for integrated technology solutions from strategic partners, Enterprise Strategy Group surveyed 352 IT professionals in North America (US and Canada) involved in the purchases of integrated solutions at their organizations.

    Examples of integrated solutions include:

    • On-premises infrastructure such as multi-vendor converged infrastructure and data protection integrated with storage platforms.
    • Infrastructure-as-a-service/platform-as-a-service such as a virtualization platform integrated with a cloud-native infrastructure service.
    • Platforms/applications like APIs or other technology integrated into a broader platform or application.
    • Software-as-a-service such as marketing integration with a CRM.
    • Hybrid cloud like on-premises applications or infrastructure integrated with cloud services.
    • Cybersecurity such as firewalls integrated with public cloud infrastructure or integrated threat intelligence.
    • Data platforms and analytics like a data warehouse integrated with business intelligence.
    • Services provided on top of a vendor’s product or service, sometimes from a managed services provider.

    This study sought to answer the following questions:

    • What is the current status of integrated solution adoption? What technologies are customers purchasing or planning to purchase, and for what use cases?
    • What individuals or groups hold influence over the research, evaluation, purchase, and deployment of integrated solutions? Which individuals or groups hold the most influence?
    • What are the budget plans of organizations buying and planning to buy integrated solutions?
    • What are the business and technology drivers behind the purchase of integrated solutions?
    • What are the KPIs or metrics that organizations expect to improve with integrated solutions?
    • To what extent are integrated solutions meeting expectations for drivers and KPIs?
    • From where do organizations procure integrated solutions?
    • What challenges do organizations encounter throughout the research, evaluation, purchase, and deployment phases of integrated solution acquisitions?
    • When do organizations learn about integrated solutions when seeking technologies for certain use cases?
    • What sources do organizations use when researching integrated solutions?
    • How does the evaluation of integrated solutions compare with the evaluation of standalone technologies?
    • Do organizations also examine standalone technologies when seeking to meet requirements for certain use cases?
    • How do integrated solutions impact customer perceptions of the vendors involved with them?
    • To what degree does a relationship with one or both of the vendors affect selection and ultimately success?

    Survey participants represented a wide range of industries including manufacturing, technology, financial services, and retail/wholesale. For more details, please see the Research Methodology and Respondent Demographics sections of this report.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Cloud Entitlements and Posture Management Trends

    Research Objectives

    Organizations are moving applications to the cloud and embracing digital transformation strategies to speed development cycles and better serve employees, partners, and customers. However, the subsequent faster release cycles and broad internet exposure increases the number of potential security incidents caused by misconfigurations, including a high number of those that are identity-related. Security teams are looking for efficient ways to drive actions that reduce security risk, including trimming excessive access permissions and fixing coding issues that make them vulnerable to attack.

    In order to gain further insights into these trends, TechTarget’s Enterprise Strategy Group (ESG) surveyed 383 IT and cybersecurity decision makers responsible for evaluating or purchasing cloud security technology products and services at midmarket (100 to 999 employees) and enterprise (1,000 or more employees) organizations in North America (US and Canada).

    This study sought to answer the following questions:

    • Of all the production server workloads used by organizations, approximately what percentage is run on public cloud infrastructure services today? How is this expected to change over the next 24 months?
    • To what extent do organizations plan to incorporate security processes and controls via their DevOps processes (i.e., DevSecOps)?
    • What are the biggest cloud security challenges organizations face? What issues, if any, associated with the misconfiguration of a cloud application or service have organizations detected within the last 12 months?
    • What were the most effective steps organizations have taken to improve the security posture of their cloud-native applications, infrastructure, and development environment?
    • Which group has the primary responsibility for securing organizations’ cloud-native applications and infrastructure? Which groups implement and operate the cybersecurity controls organizations employ to secure cloud-native applications?
    • What role, if any, did cloud entitlements play in any cybersecurity incidents organizations experienced due to multiple misconfigurations? Have cloud entitlements caused organizations to fail a security audit?
    • How important is CIEM to organizations in terms of reducing security risk?
    • What are the top business drivers behind investments in CSPM? What attributes would be most attractive to organizations as part of a comprehensive CSPM product offering?
    • What types of CSPM tools are organizations using?
    • Relative to other areas of cybersecurity, how do organizations expect their level of investment in CSPM to change, if at all, over the next 12 months?

    Survey participants represented a wide range of industries including manufacturing, technology, financial services, and retail/wholesale. For more details, please see the Research Methodology and Respondent Demographics sections of this report.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Cyber-threat Intelligence Programs

    Cyber-threat intelligence is analyzed information about cyber-threats that helps inform cybersecurity decision making. Although security professionals recognize the value of cyber-threat intelligence, many organizations still consume it on a superficial basis.

    Learn more about these trends with the infographic, Cyber-threat Intelligence Programs.

  • End-to-end Networking Visibility and Management

    Research Objectives

    Organizations are distributing applications across private data centers, multiple public clouds, and edge locations. Plus, hybrid work initiatives are enabling employees to work from home or other locations outside of traditional office settings. As a result, the network has become critical to ensuring secure connectivity. These modern, distributed networks create greater challenges for organizations as they can create blind spots and become operationally complex to effectively manage. In addition, organizations are exploring the use of new technologies that drive visibility, efficiency, and automation.

    To better understand how organizations are addressing end-to-end network visibility and management as well as adopting new technologies to drive greater operational efficiencies, Enterprise Strategy Group surveyed 339 IT and networking professionals responsible for network operations, architecture, and management at organizations in North America (US and Canada).

    This study sought to answer the following questions:

    • Approximately how many unique public cloud infrastructure service providers do organizations currently use?
    • Approximately how many remote offices/branch offices do organizations operate worldwide today, and how do they expect this to change over the next 24 months?
    • Approximately what percentage of organizations’ total employees are roaming users, and how do they expect this to change over the next 24 months?
    • What is the breakdown of where production applications and workloads run today, and how is this expected to change over the next 24 months?
    • What are the biggest reasons that organizations believe end-to-end network environments have become more complex?
    • How important do organizations believe it is to have unified end-to-end visibility of network environments? Why is unified end-to-end visibility viewed as important?
    • What challenges have organizations encountered, or what concerns do they have, with unifying network visibility capabilities? What benefits have organizations achieved, or do they expect to achieve, by unifying their end-to-end network visibility capabilities?
    • How important do organizations believe it is to have unified end-to-end management of network environments? Why is unified end-to-end management viewed as important?
    • What challenges have organizations encountered, or what concerns do they have, with unifying network management capabilities? What benefits have organizations achieved, or do they expect to achieve, by unifying their end-to-end network management capabilities?
    • How important is digital twin technology, or will it be, for the visibility and management of organizations’ end-to-end network environments?
    • To what extent are organizations using network automation technology? To what extent do organizations’ network automation solutions leverage AI/ML capabilities?
    • In which network domains are organizations currently using, or planning to use, network automation? What are, or likely will be, the most common uses for network automation?

    Survey participants represented a wide range of industries including manufacturing, technology, financial services, and retail/wholesale. For more details, please see the Research Methodology and Respondent Demographics sections of this report.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • The Cloud Data Security Imperative

    Research Objectives

    Examine the impact of the public cloud on data security priorities.
    Determine the degree of separate versus unified approaches for cloud and on-premises data sets.
    Gain insight into top data security challenges and rate data loss from the cloud.
    Establish data security spending intentions and priorities.

    (more…)

  • Managing the Endpoint Vulnerability Gap

    Research Objectives

    Identify challenges, strategies, and trends in endpoint management and security.
    Determine if and how endpoint management and security functions and systems are converging.
    Highlight opportunities for improving endpoint management and security fueled by functional convergence.

    (more…)

  • Network Threat Detection Response Trends

    Research Objectives

    Gain insights into the challenges security teams face with the current threat detection and response landscape.
    Gauge the key capabilities organizations require from NDR tools and the use cases they are seeking to address.
    Examine how NDR tools are used today and where they fit into broader XDR plans and strategies.
    Understand why security teams are prioritizing NDR and the benefits they are seeing.

    (more…)

  • Top RSA Conference 2023 Trends and Topics

    endpoint_security_suiteTaking inspiration from the words of Helen Keller, “Alone we can do so little; together we can do so much,” the theme for RSA Conference 2023 is “Stronger Together.”

    (more…)

  • Cloud Entitlements and Posture Management Trends

    Research Objectives

    Ascertain key cloud adoption trends that drive the need for CSPM and CIEM solutions.
    Determine the top challenges organizations face in managing cloud security posture and infrastructure entitlements.
    Validate top requirements for CSPM and CIEM solutions.
    Highlight key roles involved in evaluating and purchasing solutions. (more…)