Cybersecurity & Networking

  • Many organizations today rely on multiple cloud services to match the needs of their various IT operations, but this introduces a complex set of challenges for the networking teams in charge of such environments. Recent research by TechTarget’s Enterprise Strategy Group revealed that these teams have concerns about cybersecurity in multi-cloud networking environments as well as ideas regarding how to combat them.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • This Complete Survey Results presentation focuses on private 5G adoption, use cases, connected devices, benefits, challenges, comparisons with Wi-Fi deployments, third-party assistance, consumption models, supplier preferences, edge deployment factors, and future spending plans.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • This Complete Survey Results focuses on automation and AI maturity, network automation use cases, network domains using AI, network AI providers, network AI use cases, automation and AI performance against expectations, use cases for integrated AI, the challenges of using AI in the network, and generative AI use cases.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • And so it begins, again. A few weeks ago, I joined TechTarget’s Enterprise Strategy Group to lead the Networking and Network Management analysis practice, and I could not be more thrilled. I’ve spent the last 30-plus years in this space, working mostly for network management product vendors in engineering, product, project, marketing, partnership and executive leadership roles. Amid that 30-plus year span, there was also six-plus years as an industry analyst, putting my knowledge and experience to work in tracking and analyzing real life networking challenges and potential solutions. It is to this role that I now return, to study, learn, listen, contemplate, discuss and share findings and insights.

    Why so long in the sector? Reason number one: Networks have never been more essential. Just look at our tech-heavy economy and you quickly realize that without reliable, high-performing networks, at the local, wide area, data center and internet levels, everything grinds to a halt. Networks are the plumbing of the modern world, and just like the physical plumbing in our homes and businesses, they are often taken for granted because they just work. But when something doesn’t work, networks typically get the first blame. And while networks do have their fair share of culpability, the reality is that problem sources are more commonly elsewhere in the stack—in the apps, servers, storage, endpoint or, in no small percentage of cases, with Layer8—the user themselves.

    Reason number two: When there is a problem and there is no obvious cause—such as a server or switch on fire—then the network can be an excellent place from which to start the process of isolation and identification. Just like a traffic map for a busy metro area, viewed in Google Maps or Waze, you can use the network to quickly recognize where things are working smoothly and where they are not, so you can zoom in on the most likely source of issues, accelerating and focusing efforts to restore normal function.

    Reason number three: It’s never dull. There is so much change to keep up with. Networking technology has largely settled in at Layers 2-4, converging around Ethernet and TCP/IP, and this is a good thing. No one wants to go back to the days of FDDI, Token Ring, IPX and Banyan Vines, when interoperability was a massive challenge. But this convergence does not mean the fun is over. There is still innovation due to the relentless growth in network speeds and capacity, and we continue to see evolution and change in other parts of the stack. Witness the continued, rapid development of wireless access, such as WiFi 6, 6+, 7, and Private LTE and 5G. Look for some fresh insights coming from Enterprise Strategy Group on this topic very soon.

    And we can’t forget the fascinating work going on to support purpose-built generative AI (GenAI) infrastructure, including the use of both traditional networking technologies and specialized tech developed for storage networking such as RoCE—RDMA over Converged Ethernet—and Infiniband. I’ll be tracking the latter under the general heading of “Networking for AI.” I’ll be writing more on this very soon as well.

    Of course, the change does not stop there. Personally, I’m fascinated by a number of ongoing developments in the sector, and hope to spend time studying and covering the following issues and challenges:

    • Convergence of networking and network security. In my view, this is an absolute necessity in today’s connected world, lately manifesting using integrated functions, SASE, SSE and multipurpose monitoring and analytics techniques.
    • Multi-cloud, hybrid networking. This freight train has been heading toward us for a long time, bringing major complexity headaches, but also opportunities to rethink network strategies.
    • Network-as-a-Service. Part of a broader move toward a subscription basis for acquiring and licensing network technology, but also a great alternative for modernizing and hardening enterprise networks.
    • AI for Networking. GenAI and natural language processors are already working their way into network management tools for diagnostic and troubleshooting workflows, but can they also make a difference in planning, configuration and overall network automation?
    • Network Observability. Making sure that proactive, effective visibility exists across complex, hybrid networks, and is fully integrated with cross-domain observability stacks continues to be a priority for most but also a struggle for many.

    There’s more, but that should be enough to get me off and running. As I renew old contacts and make new ones across the networking sector, I’ll have my head up and ears open for feedback. What excites you about networking and network management today? What areas of change are you most interested in? I’d love to hear and discuss.

  • TechTarget and Enterprise Strategy Group ran a global survey examining where buyers source information throughout their purchase journey. This report focuses on responses from almost 700 global technology buyers of which 385 were Sr. IT or Business Leadership. Below are 5 insights you can learn from this report:

    • Media types B2B buyers rely on when building a vendor shortlist
    • Channels where B2B buyers are spending more time doing research
    • What buyers want from vendor content including what motivates them to attend webinars
    • Trends in vendor loyalty, including what causes customers to switch vendors/suppliers
    • What tech vendors need to do to maintain a strong ongoing relationship with their customers
    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • EMEA Tech Buyers Media Consumption Habits in 2024

    TechTarget and Enterprise Strategy Group ran a global survey examining where buyers source information throughout their purchase journey. This report focuses on responses from 240 EMEA technology buyers across IT management and senior business roles. Below are 5 insights you can learn from this report:

    • Media types B2B buyers rely on when building a vendor shortlist
    • Channels where B2B buyers are spending more time doing research
    • What buyers want from vendor content including what motivates them to attend webinars
    • Trends in vendor loyalty, including what causes customers to switch vendors/suppliers
    • What tech vendors need to do to maintain a strong ongoing relationship with their customers
    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • APAC Tech Buyers Media Consumption Habits in 2024

    TechTarget and Enterprise Strategy Group ran a global survey examining where buyers source information throughout their purchase journey. This report focuses on responses from 135 APAC technology buyers across IT management and senior business roles. Below are 5 insights you can learn from this report:

    • Media types B2B buyers rely on when building a vendor shortlist
    • Channels where B2B buyers are spending more time doing research
    • What buyers want from vendor content including what motivates them to attend webinars
    • Trends in vendor loyalty, including what causes customers to switch vendors/suppliers
    • What tech vendors need to do to maintain a strong ongoing relationship with their customers
    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • The need to modernize cybersecurity strategies to keep pace with IT innovation is clear. Zero-trust architectures have taken the pole position as the best approach to achieve this goal. Unfortunately, the breadth of the initiative and the nuance between zero-trust strategies and the tools supporting these strategies can become lost, causing confusion. IT and security leaders need guidance and proof points from early adopters to avoid false starts and more quickly see positive results.

    To learn more about these trends, download the free infographic, Trends in Zero Trust: Strategies and Practices Remain Fragmented, but Many Are Seeing Success.

  • The need to modernize cybersecurity strategies to keep pace with IT innovation is clear. Zero-trust architectures have taken the pole position as the best approach to achieve this goal. Unfortunately, the breadth of the initiative and the nuance between zero-trust strategies and the tools supporting these strategies can become lost, causing confusion. IT and security leaders need guidance and proof points from early adopters to avoid false starts and more quickly see positive results.

    To gain further insight into these trends, TechTarget’s Enterprise Strategy Group surveyed 379 IT and cybersecurity professionals at organizations in North America (US and Canada) involved with zero-trust technologies and processes.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • This Complete Survey Results presentation focuses on 2024 IT budget expectations, technology initiatives and priorities, year-over-year spending changes (overall and by different technologies), cloud usage trends, and how digital transformation initiatives intersect with these considerations among organizations with fewer than 100 employees.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Enabling Modern Business With Multi-cloud Networking

    Organizations are increasingly deploying applications across multiple public cloud locations in a meaningful way. This is vastly different from only three years ago when the majority of organizations were using multiple cloud service providers but primarily depending on only one for almost all of their service needs. Today it is common for organizations to deploy production and mission-critical applications across multiple public cloud service (e.g., IaaS) providers. Modern application environments are driving this adoption as organizations seek to optimize performance and quickly and easily set up connections to these cloud providers.

    In order to investigate how organizations are connecting to multiple public cloud providers, TechTarget’s Enterprise Strategy Group surveyed 337 IT and networking professionals at organizations in North America (US and Canada) familiar with their organization’s entire network environment and responsible for evaluating, purchasing, and/or operating corporate networking solutions, including data center, cloud, campus, branch, edge, WAN, and home office technology.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Incident Response Strategies in the Spotlight

    Ransomware, business email compromise, and other attacks are increasingly evading cybersecurity defenses, causing IT and cybersecurity teams to further invest in incident response (IR) readiness. As such, incident response can no longer be viewed as an event-driven action but must be operationalized and become a core strategy within security operations. As security and line-of-business teams react to this new reality, new IR strategies are needed for most.

    To learn more about these trends, download the free infographic, Incident Response Strategies in the Spotlight.