Cybersecurity

  • As organizations today face pressure to boost their productivity and scale while efficiently optimizing resources, they are increasingly utilizing cloud services to deliver cloud-native applications. In recognition of the impact of security incidents on their cloud-native applications, cybersecurity teams need to look for ways to gain unified visibility and control to efficiently manage risk and rapidly respond to attacks by incorporating security into DevOps processes (DevSecOps) and utilizing cloud security platforms. Enterprise Strategy Group recently surveyed IT, cybersecurity, and application development professionals to gain insights into these trends.

    To learn more, download the free infographic, The State of DevSecOps and Cloud Security Platforms.

  • Today’s cybersecurity teams encounter issues such as fragmented tools, siloed data, and increased operational complexity, reducing their effectiveness in managing business and technology risks. Recent findings from Enterprise Strategy Group show a shift toward tool consolidation and the integration of cybersecurity data security fabrics and comprehensive platforms to tackle these challenges. This brief examines how consolidation and the emergence of AI capabilities are pushing the adoption of data fabrics.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • This Complete Survey Results presentation focuses on the scope of cloud-native application development environments, including the top challenges associated with securing cloud-native applications and the security solutions in place to protect cloud infrastructure and applications.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • As organizations today face pressure to boost their productivity and scale while efficiently optimizing resources, they are increasingly utilizing cloud services to deliver cloud-native applications. Cybersecurity teams recognize the impact of security incidents on their cloud-native applications, including application downtime, business disruption, compliance fines, and negative brand reputation. They need effective cybersecurity solutions that address security risk from development to deployment to ensure security teams can support business growth.

    The efforts to modernize application development utilizing cloud services are focused on optimizing efficiency for growth and scale. However, having separate, siloed security tools that work in different parts of the software development lifecycle works against the speed and efficiency that organizations are trying to achieve. As a result, organizations need to look for ways to gain unified visibility and control to efficiently manage risk and rapidly respond to threats and attacks by incorporating DevSecOps and utilizing cloud security platforms.

    To gain insights into these trends, Enterprise Strategy Group surveyed 373 IT, cybersecurity, and application development professionals in North America (U.S. and Canada) responsible for evaluating or purchasing cloud security technology products and services.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • Securing applications against exploit, denial of service, and other forms of cyberattack is a mission-critical goal for many cybersecurity teams today. However, due to the distributed nature of most IT environments, responsibility for application security involves a range of roles and teams such as those supporting cloud computing, on-premises technologies, networking, fraud, application development, and more. Recent research by Enterprise Strategy Group, now part of Omdia, investigated the degree of collaboration between these teams that contribute to the efficacy of the application security programs.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • Reaching a Tipping Point With API Security

    Application security has become more difficult in large part due to the wide range of tactics attackers can use to exploit their targets. APIs in particular have been a growing concern as applications become more interconnected and reliant on microservices. Recent research by Enterprise Strategy Group, now part of Omdia, found that API security vulnerabilities have not been receiving the attention and resources needed to appropriately mitigate growing threats, but that might be changing.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • The Future of SecOps in an AI-driven World

    Security operations (SecOps) is a mainstay of modern security programs. Once focused on reactive, alert-driven activities, today’s security operations have expanded to a risk mitigation function, inclusive of both proactive and reactive strategies like threat detection, response, and recovery. With such a broad scope of responsibility, it’s no surprise that the number and complexity of systems and technologies involved continue to grow, heavily influenced by the more recent explosion of generative AI (GenAI) adoption. TechTarget’s Enterprise Strategy Group recently surveyed IT and cybersecurity professionals to gain insights into these trends.

    To learn more, download the free infographic, The Future of SecOps in an AI-driven World.

  • The Future of SecOps in an AI-driven World

    SecOps is a mainstay of modern security programs. Once focused on reactive, alert-driven activities, today’s SecOps has expanded to a risk mitigation function, inclusive of both proactive and reactive strategies like security posture management, core security controls optimization and tuning, detection and response, and recovery in the event of a harmful cyberattack. This expanded agenda has also increased collaboration with other functions, including risk management, IT, OT, software development and engineering, supply chain management, and more. With such a broad scope of responsibility, it’s no surprise that the number and complexity of systems and technologies involved continue to grow, heavily influenced by the more recent explosion of GenAI adoption.

    Despite all of this, for the first time in the past five years, this research indicates that the scales are tipping, as more organizations reported this year that SecOps is getting easier. This improvement is fueled by three industry mega-trends: tool consolidation, the application of GenAI within SecOps, and the effectiveness of XDR solutions.

    To gain further insights into these mega-trends and other developments in the security operations space, Enterprise Strategy Group surveyed 366 IT and cybersecurity professionals at large midmarket and enterprise organizations in North America (U.S. and Canada) involved with security operations technology and processes.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • The Future of SecOps in an AI-driven World

    This Complete Survey Results presentation focuses on current security operations programs and posture, including security operations centers, and how automation and generative AI (GenAI) technologies are helping to augment and optimize these environments.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • Application environments are more complex than ever, with web applications increasingly cloud-resident, containerized, connected via APIs, and delivered via CDNs. On top of this increasingly heterogeneous environment, security responsibility is distributed across a variety of roles and personas. This has resulted in complexity and tool sprawl as security teams struggle to keep pace, with attackers understanding this and using it to their advantage. TechTarget’s Enterprise Strategy Group recently surveyed IT and cybersecurity professionals to gain insights into these trends.

    To learn more, download the free infographic, Balancing Requirements for Application Protection.

  • Application environments are more complex than ever, with web applications increasingly cloud-resident, containerized, connected via APIs, and delivered via CDNs. On top of this increasingly heterogeneous environment, security responsibility is distributed across a variety of roles and personas. This has resulted in complexity and tool sprawl as security teams struggle to keep pace. Attackers understand this and use it to their advantage through exploits against known vulnerabilities and advanced campaigns that use a variety of tactics such as bots that amplify denial-of-service and credential attacks on web applications and the APIs that tie them together. While platforms are attractive, security cannot be compromised. Security leaders need to understand the actions that forward-thinking organizations have undertaken to properly assess which tools are best positioned to solve the key business challenges they face.

    To gain insights into these trends, Enterprise Strategy Group surveyed 383 IT and cybersecurity professionals in North America (U.S. and Canada) involved with securing their organization’s web applications and APIs.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • This Complete Survey Results presentation focuses web application environments, challenges with protecting public-facing web applications, attack impacts, threat vectors, web application firewall (WAF) usage and preferences, bot management, consolidated solutions, personnel, spending, and future plans.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us