Cybersecurity

  • The endpoint device is the first link in the chain that connects a user to their work. In today’s typical corporate environment, IT organizations are tasked with supporting multiple endpoint devices per user across a range of hardware form factors and operating systems. In turn, acquisition, deployment, and ongoing management efforts are affected by this sprawl.

    To learn more about these trends, download the infographic, Endpoint Device Trends: Evaluating a Shifting Desktop and Laptop Procurement and Management Landscape.

  • Operationalizing Encryption and Key Management

    This Complete Survey Results presentation focuses on the usage and understanding of the full capabilities of encryption and key management solutions, as well as the cyberthreats and attack vectors that are driving an increased focus on encryption and key management strategies.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • 2024 Technology Spending Intentions Survey

    While macroeconomic conditions have improved over the last several months, many businesses are still taking a cautious approach to spending. However, for many organizations, this is not an option when it comes to technology investments that underpin digital transformation efforts and increasingly serve as competitive differentiators. With this in mind, TechTarget’s Enterprise Strategy Group surveyed 938 senior IT and business decision-makers to ascertain IT budget outlooks for 2024, both overall and for specific technologies, and to determine the key business and technology priorities driving these spending plans. Survey respondents were employed at midmarket (100 to 999 employees) and enterprise-class (1,000 employees or more) organizations in North America, EMEA, APAC, and Latin America. All respondents were personally responsible for or familiar with their organization’s 2023 IT spending, as well as their 2024 IT budget and spending plans at either an entire organization level or a business unit/division/branch level.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Fostering a strong cybersecurity culture is easily recognized by those in the profession as a foundational element of creating a robust security posture. However, recent research by TechTarget’s Enterprise Strategy Group  and the Information Systems Security Association (ISSA) found that many CISOs believe that most firms have a long way to go in establishing appropriate cybersecurity cultures within their organizations.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Today’s CISOs are asked to juggle business risk with security oversight across increasingly complex hybrid IT architectures in a state of constant change. Recent research by TechTarget’s Enterprise Strategy Group and the Information Systems Security Association (ISSA) reveals that this balancing act is getting increasingly difficult as CISOs strive to maintain business operations, keep their organizations safe, and mind their own career goals along the way.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Incident Response Strategies in the Spotlight

    Ransomware, business email compromise, and other attacks are increasingly evading cybersecurity defenses, causing IT and cybersecurity teams to further invest in incident response (IR) readiness. As such, incident response can no longer be viewed as an event-driven action but must be operationalized and become a core strategy within security operations. As security and line-of-business teams react to this new reality, new incident response strategies are needed for most.

    Few have the internal resources and capacity to handle this key function on their own, requiring many to leverage a service-based approach. While managed security service providers and managed detection and response service providers have become commonplace, a deeper partnership is needed to enable real-time IR services capable of mitigating damage from successful attacks. Cybersecurity leaders need to better understand the differentiation of IR services as a standalone offering versus those included in a broader set of service offerings to make more informed decisions.

    To gain further insight into these trends, TechTarget’s Enterprise Strategy Group surveyed 339 IT and cybersecurity professionals at organizations in North America (US and Canada) involved with incident response technologies and processes.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Organizations across industries are feeling the same pain from password-based authentication: Frustrated users can’t use easy-to-remember passwords because they’re easy to crack, and they struggle to use strong passwords without reusing them or resorting to other unsecure methods of recalling them. Research conducted by TechTarget’s Enterprise Strategy Group explored the use of Fast Identity Online (FIDO) to eliminate the use of passwords for securing access to enterprise systems.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Password-based authentication has proved itself insufficient in securing access to organizational resources in the face of the modern threat landscape. Recent research by TechTarget’s Enterprise Strategy Group revealed that although the use of multifactor authentication (MFA) strengthens security, it can add friction to the authentication process, and organizations are turning to adaptive MFA to balance security with a reasonable user experience.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • 2024 Technology Spending Intentions Survey

    This Complete Survey Results presentation focuses on 2024 IT budget expectations, technology initiatives and priorities, year-over-year spending changes (overall and by different technologies), cloud usage trends, and how digital transformation initiatives intersect with these considerations.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Incident Response Strategies in the Spotlight

    This Complete Survey Results presentation focuses on assessing the state of incident response (IR) strategies and readiness activities, including how organizations measure readiness, and highlights notable gaps and challenges organizations are struggling with as they strengthen IR readiness initiatives.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Cloud Detection and Response

    Increasingly dynamic cloud environments are presenting visibility challenges for security. Indeed, the majority of organizations claim that lack of access to physical networks, the dynamic nature of cloud-native applications, and elastic cloud infrastructure create blind spots, making security monitoring challenging. SOC teams need to address this cloud visibility gap by collecting, processing, monitoring, and acting upon information from an assortment of cloud security telemetry sources.

    Additionally, nearly all organizations experienced a cloud security incident in the last year, resulting in application downtime, unauthorized access, data loss, and compliance fines. Thus, cloud security limitations can impact the business. Understanding this risk, executives and corporate boards are demanding measurable progress. Given the rise of digital transformation and cloud-native software development, CISOs must align threat detection and response spending with an increasing array of cloud-based business-critical workloads.

    To gain further insight into these trends, TechTarget’s Enterprise Strategy Group surveyed 393 IT and cybersecurity professionals at organizations in North America (US and Canada) responsible for evaluating or purchasing cloud security technology products and services.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Ransomware Preparedness

    Ransomware is widely considered a critical and existential threat to the viability of any business. Given the high frequency of attacks and the impacts of successful ones such as data and infrastructure loss, many organizations are left with damages that have an effect well beyond IT. Attackers often go beyond valuable data assets by undermining key infrastructure components and exposing significant gaps, including those in the backup infrastructure itself. IT leaders must understand that the nature of the threat goes well beyond just data and focus on protecting and further leveraging their backup and recovery infrastructure to remove risk and minimize business impact through advanced capabilities. Overall, most organizations should consider key features to improve their cyber-resilience as they continue to battle ransomware and other cyber-risks.

    In order to gain further insight into these trends, TechTarget’s Enterprise Strategy Group surveyed 600 IT and cybersecurity professionals at organizations in North America (US and Canada) and Western Europe (UK, France, and Germany) personally involved with the technology and processes associated with protecting against ransomware. The research results were further used to create a multidimensional model to evaluate organizations’ progress over the last 18 months in preparing for these threats and identifying best practices.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.