Cybersecurity & Networking

  • A Network Perspective on SASE and SD-WAN

    The level of interest in secure access service edge (SASE) architectures has exploded recently as organizations struggle to use traditional, on-premises-based network and security solutions to support distributed, cloud-centric enterprise environments. While this has been an increasing challenge over the last few years, the pandemic and resulting spike in newly remote workers pushed many organizations to a tipping point when it comes to both security and network traffic. Additionally, the broad applicability of SASE leads to some confusion on where to begin and which technologies are required, exacerbated by legacy organizational dynamics. While Enterprise Strategy Group has seen SASE elevated to a CIO/CISO-led initiative in some cases, inconsistencies remain for many organizations in day-to-day collaboration across network and security teams.

    In order to investigate how the network is factoring into SASE adoption plans, TechTarget’s Enterprise Strategy Group surveyed 374 IT and networking professionals at organizations in North America (US and Canada) involved with networking technology and processes, specifically those familiar with both SD-WAN and SASE technologies.

    This study sought to answer the following questions:

    • Do IT professionals believe their organizations’ network environments have become more complex over the last two years? What networking challenges have been most impactful to organizations? Specifically, what challenges do organizations face specifically with connecting employees to corporate applications and resources?
    • What types of network technologies comprise organizations’ network ecosystems?
    • What is the status of organizations’ SASE plans in terms of both SD-WAN and security services edge? Do organizations expect their initial approach to SASE to be security- or network-first? What are the drivers of interest in SASE?
    • How long do organizations expect it to take to fully adopt a SASE architecture?
    • How many technology vendors do organizations expect to work with to support their SASE architectures, both initially and once their implementation is complete? For organizations that expect to use more than one vendor for SASE once their initiative is complete, what are the reasons behind this strategy?
    • What are, or expected to be, organizations’ initial SASE use cases? What benefits have early SASE adopters recognized to date?
    • What are, or will be, the drivers for organizations to deploy SD-WAN?
    • How important is it to have AI/ML technology driving automation in organizations’ SD-WAN environments? What features make AI/ML important to these environments?
    • What actions will organizations take over the next 12-18 months to implement or optimize their SD-WAN strategies?
    • Do organizations plan to deploy SD-WAN to support their remote/hybrid workers? Would organizations be more likely to deploy SD-WAN technology to remote/hybrid workers, or do so more extensively, if it didn’t require deploying new hardware?
    • What actions have organizations taken, or do they plan to take over the next 12 months, to improve the collaboration across the different groups responsible for networking and security?

    Survey participants represented a wide range of industries including manufacturing, technology, financial services, and retail/wholesale. For more details, please see the Research Methodology and Respondent Demographics sections of this report.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Insights from Microsoft Ignite 2023

  • Discover what’s trending on our network to engage IT buyers in market now and improve marketing and sales effectiveness. This report covers trending areas of interest across 240+ IT markets over the last 6 months (April 2023 – September 2023) in five (5) regions across the TechTarget & BrightTALK network: WW, NA, EMEA, APAC, LATAM.

    In this report you will find:


    • The top 20 broad technology markets driving the most activity in the past 6 months. Activity data can help show where audience research is growing or declining and therefore help reinforce which markets are on the rise or declining.


    • The top 25 granular topics growing the most across the TechTarget and BrightTALK network in the last 6 months. This gives insight into the content areas that are on the rise right now to leverage in your conversations.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Recent prominent multifactor authentication-based breaches and friction in the end-user authentication experience have reached the ears of app developers, IT, and cybersecurity leadership. Organizations are now searching for alternative authentication methods to address the risks and challenges of multifactor authentication (MFA) and password-based authentication. TechTarget’s Enterprise Strategy Group recently surveyed IT, cybersecurity, and application development professionals to gain insights into these trends.

    Learn more about these trends with the free infographic, Passwordless in the Enterprise: The Dirty Secrets of Antiquated Authentication.

  • As AI continues its meteoric rise into business and IT environments, organizations are rapidly assembling or accelerating strategies to support AI technologies across every applicable area. Unlike niche technologies that impact only certain processes or personnel, AI has wide-ranging potential to transform entire businesses, IT environments, and associated teams. In turn, AI strategies must be multi-pronged efforts that properly align business objectives with AI initiatives and expectations, which requires thorough participation from stakeholders across the organization. The underlying infrastructure and other supportive elements must be fully capable of supporting that tandem strategy.

    While many organizations are consistent in their efforts to build AI strategies, the components and direction of those strategies often vary. To assess the evolving AI landscape and the infrastructure that supports it, TechTarget’s Enterprise Strategy Group surveyed 375 data and IT professionals in North America (US and Canada) responsible for strategizing, evaluating, purchasing, and/or managing infrastructure specifically supporting AI initiatives for their organization. This study sought to answer the following questions:

    • What are the primary business objectives for implementing AI? How long does it take for organizations to start seeing value from AI initiatives?
    • What are the top challenges organizations encounter when implementing AI?
    • What individuals or teams influence decision making related to infrastructure used to support AI initiatives? Which of these has the most influence on final decisions?
    • How are organizations planning to address skills gaps related to the selection, implementation, and management of infrastructure supporting AI initiatives?
    • In which physical locations do organizations primarily deploy their AI infrastructure? What are the top factors that influence the choice of these locations? Are AI environments mostly centralized, mostly decentralized, or an even mix of both?
    • What capabilities of AI infrastructure are most important?
    • Are organizations using internal resources, third-party resources, or both to manage their AI infrastructure?
    • How important is sustainability and environmental responsibility when selecting AI infrastructure? How important is a vendor’s stance on these factors when making purchase decisions for AI infrastructure?
    • What types of data do organizations use to build and train AI models and algorithms? What steps do organizations take to ensure accuracy in the data used for building and training these models?
    • How do organizations handle the movement of the large amounts of data required to support AI initiatives? What challenges are involved with this process?
    • How are organizations using synthetic and third-party data to support AI model training?
    • How are organizations using generative AI (GenAI)? What challenges are they encountering?
    • To what extent are developers leveraging AI infrastructure resources? How do developers access these resources?
    • How do organizations measure the success and effectiveness of AI initiatives?
    • What is AI’s impact on employee productivity, processes, workflows, competitiveness, and other factors?

    Survey participants represented a wide range of industries, including financial, manufacturing, retail/wholesale, and healthcare, among others. For more details, please see the Research Methodology and Respondent Demographics sections of this report.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Women in Cybersecurity: Fleur Chapman

    For this episode, I had the opportunity to interview Fleur Chapman, chief operating officer for ITC Secure. Although she more recently joined the cybersecurity field, her analytical and project management skills, her background in economics, finance, and even speech and drama, have contributed to her current role running operations at a global cyber security services company. Be sure to watch the full video to hear the full interview. Below are some highlights and resources that she shared.

    Jump to video >>

    Using Her Analytics and Project Management Background

    Chapman came into cybersecurity when she was recruited to her role due to her experience as a technical project manager and consultant in previous roles. With her education in finance and econ, and a teacher’s diploma in speech and drama, she started her career in the public sector, working for the Ministry of Education in New Zealand.

    She described one of her roles for the Ministry of Education where she led the implementation of the first births data matching programme in NZ. Analytical by nature, she enjoyed interfacing with software developers, third-party vendors, internal and external stake holders, and realized her passion for quality and delivery.

    She earned IT service management certifications and ran projects overseeing operational teams, transactional data systems, delivering strategy and policy initiatives, transformational change, data privacy, identity and access management (IAM) solutions, and regulatory compliance programs.

    At one point, she managed the technical assurance program for Transport. She said it was a huge challenge, but she wasn’t satisfied. She wanted to go further than project or program management, and she wanted a more strategic role in the private sector.

    She was a contractor delivering managed service projects when she started working with ITC Secure. She worked on several projects, including implementing governance risk and compliance (GRC) for a large customer, and she worked on incident response services for a remote security operations center (SOC). This experience helped her move to an internal role as programme director, and then she was head of compliance. She also set up their risk and compliance function, GDPR, and governance model, and then become their Chief Operating Officer.

    Security Challenges and Goals

    Her role is broad – she helps global customers with risk and compliance, and she works on internal information security, legal and operations. Operations includes 24×7 managed services, the SOC, the network operations center (NOC), governance, and their platform team.

    Her biggest challenges: the skills shortage, evolving threat landscape, ever changing technologies, and thinking about third party risk.

    “If you miss something, you’re remembered for what you missed, not the constant good stuff that you’ve caught. You have to make sure you have robust processes in place, as well as everchanging technologies, keeping up to date with technological advancements, offering more to customers for less.”

    For third-party risk, she said they are constantly reassessing their third parties, direct and indirect suppliers. “We are judged by the suppliers we use and the threats we expose.”

    People, Process and Technology

    “We have to think about confidentiality, integrity and availability of the information – it’s vital. The key thing for our business is to prevent sensitive info from falling into the wrong hands.”

    So her background in the public sector with process and procedures is helpful with fundamentals around change management, incident management, access control, and authorization.

    “Procedures underpin how to provide your best services. We can guarantee services with confidentiality and integrity,” she said. “Humans make mistakes, so minimizing risk comes back to standardizing, documenting, managing and monitoring. It’s a constant challenge. There is no blame culture. People will make mistakes, but how do you identify them and learn. You can identify opportunities to improve services and operational security.”

    Advice and Resources

    Chapman has experience taking on roles to rescue failing projects due to constraints around timeframes, costs, or mistakes that people have made. Her advice:

    “Be confident in yourself and your ability. There is no challenge too great, never be afraid to ask for guidance from your leaders or your peers,” she said. “I’ve had situation where I had to tell myself to step back, take a breath, pause, and think before your next course of action, never respond straightaway to the email that angered you. Not to sweat the small stuff, know what to let go of, and what to push.”

    While this is useful advice earned from experience that you can’t learn from a book, Chapman mentioned that she is an avid reader for advice and inspiration. Two recent books she recommends:

    To listen to the full interview, click here.

    Be sure to also visit our Women in Cybersecurity page, where you can view past episodes and connect with us to hear more inspiring stories in future shows!

  • 6 Reasons Cisco Acquired Splunk