IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING

CONTACT    SIGN IN    SIGN UP
    

Free RSS Feeds from Enterprise Management Associates (EMA)

Stay up to date on the latest IT and data management information from EMA, including Webinars, Radar Reports, white papers, impact briefs, advisory notes and more!

Select your preferred reader by selecting an icon on the right.



Current Feed Content:




Report Summary - Charting the Expanding Horizons of Big Data

PUBLISHED: Tue, 29 Nov 2016 00:00:00 +0000
AUTHOR: John Myers

This is a summary of the EMA/9sight research report, "Charting the Expanding Horizons of Big Data."

Full Report Abstract
Since its inception, the concept of "big data" has meant many things to many people. If you are a fan of the Apache Hadoop ecosystem, big data is the raison d'etre for your Hadoop environment and the sprawling zoological lexicon upon which that ecosystem is built and continues to evolve. If you are a devotee of multi-structured data such as JSON, XML, etc, your definition of big data revolves around how relational data management is not well-suited for the modern data architecture of event-based processing and the Internet of Things. And so on and so forth…

As it was explored since the inaugural EMA/9sight survey in 2012, big data is both a way to look at new sources of data and how organizations place that information under "new management." Big data attracted a wide range of application innovators, as well as many protesters against the dominance of relational databases and data warehouses. The EMA/9sight surveys use a deliberately broad definition of big data to inspire end users to think beyond the box of limiting definitions. This will let them see how a larger world of traditional data sources, data management, and processing can be interwoven with the new era. As was established in three (3) previous studies in 2012, 2013, and 2014/2015, big data offers a wide range of possibilities. The 2016 EMA/9sight Big Data End-user Survey continues to look at that range of possibilities for big data definitions, implementations, and technologies. 



Report Summary Prepared for Teradata - Charting the Expanding Horizons of Big Data

PUBLISHED: Tue, 29 Nov 2016 00:00:00 +0000
AUTHOR: John Myers

This is a summary of the EMA/9sight research report, "Charting the Expanding Horizons of Big Data" prepared for Teradata.

Full Report Abstract
Since its inception, the concept of "big data" has meant many things to many people. If you are a fan of the Apache Hadoop ecosystem, big data is the raison d'etre for your Hadoop environment and the sprawling zoological lexicon upon which that ecosystem is built and continues to evolve. If you are a devotee of multi-structured data such as JSON, XML, etc, your definition of big data revolves around how relational data management is not well-suited for the modern data architecture of event-based processing and the Internet of Things. And so on and so forth…

As it was explored since the inaugural EMA/9sight survey in 2012, big data is both a way to look at new sources of data and how organizations place that information under "new management." Big data attracted a wide range of application innovators, as well as many protesters against the dominance of relational databases and data warehouses. The EMA/9sight surveys use a deliberately broad definition of big data to inspire end users to think beyond the box of limiting definitions. This will let them see how a larger world of traditional data sources, data management, and processing can be interwoven with the new era. As was established in three (3) previous studies in 2012, 2013, and 2014/2015, big data offers a wide range of possibilities. The 2016 EMA/9sight Big Data End-user Survey continues to look at that range of possibilities for big data definitions, implementations, and technologies. 



Riverbed SteelCentral AppResponse 11 Enables Converged Network and Application Operations

PUBLISHED: Tue, 29 Nov 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

IT organizations have ceased treating network infrastructure as utilitarian plumbing. In this digital age, network and application managers know that as the foundational element of application delivery, the network must be monitored and optimized for application performance. The network is also an invaluable source of data for insight into application and service performance. These new realities are prompting application and network teams to collaborate. They need network and application performance management tools that can provide them with insight into how network health and performance affects application performance and end-user experience. This white paper explores these issues in depth and highlights Riverbed SteelCentral AppResponse 11, a new network and application performance management solution that leverages network packet data and encourages collaboration between application and network management teams. 



Crossing the Legacy ITSM Chasm: A Risk/Benefits Assessment

PUBLISHED: Mon, 28 Nov 2016 00:00:00 +0000
AUTHOR: Dennis Drogseth

IT Service Management (ITSM) is changing dramatically in scope and value in many IT environments, according to EMA industry research. And yet in some IT organizations, ITSM remains a reactive holdover with declining relevance to both the business and to IT as a whole. This can result in severe impacts on IT performance, business value, and business relevance, as well as escalating costs from administrative overhead and declining IT efficiencies due to lack of cohesive processes, automation, governance, and IT service insights. Legacy ITSM platforms can also impact ITSM efficiencies through rigidity, administrative overhead, and unnecessary consulting expense.

Informed by extensive EMA research and two compelling deployment narratives, this report examines what EMA calls "next-generation ITSM" and its contributions toward optimizing changing IT and business requirements. We will also contrast these advances with the risks of staying with legacy ITSM models and then evaluate and itemize the risks of "doing nothing" and allowing legacy ITSM to persist.



Charting the Expanding Horizons of Big Data

PUBLISHED: Mon, 21 Nov 2016 00:00:00 +0000
AUTHOR: John Myers

Since its inception, the concept of "big data" has meant many things to many people. If you are a fan of the Apache Hadoop ecosystem, big data is the raison d'etre for your Hadoop environment and the sprawling zoological lexicon upon which that ecosystem is built and continues to evolve. If you are a devotee of multi-structured data such as JSON, XML, etc, your definition of big data revolves around how relational data management is not well-suited for the modern data architecture of event-based processing and the Internet of Things. And so on and so forth…

As it was explored since the inaugural EMA/9sight survey in 2012, big data is both a way to look at new sources of data and how organizations place that information under "new management." Big data attracted a wide range of application innovators, as well as many protesters against the dominance of relational databases and data warehouses. The EMA/9sight surveys use a deliberately broad definition of big data to inspire end users to think beyond the box of limiting definitions. This will let them see how a larger world of traditional data sources, data management, and processing can be interwoven with the new era. As was established in three (3) previous studies in 2012, 2013, and 2014/2015, big data offers a wide range of possibilities. The 2016 EMA/9sight Big Data End-user Survey continues to look at that range of possibilities for big data definitions, implementations, and technologies. 



Wi-Fi Hardware and Management Trends, and Their impacts on Total Cost of Ownership

PUBLISHED: Fri, 18 Nov 2016 00:00:00 +0000
AUTHOR: David Monahan

It can be argued that the largest impact to workforce productivity in the last 20 years was the introduction of Wi-Fi networks. In today's workforce, moving from meeting to meeting or place to place is a job requirement; being tethered to a LAN port seems almost unfathomable. There are many factors driving the growth of Wi-Fi, including new standards with increased bandwidth, expanding use cases for mobile and Internet of Things devices, maturation of cloud-based management infrastructure, and the rise of virtualization and open source hardware for Wi-Fi. Given its importance and impact on productivity, choosing a solution to provide that connectivity is a critical business choice. Throughput, scalability, reliability and resiliency, simplicity, and ultimately cost all play a part in the vendor selection process and achieving a desired level of return on investment (ROI). This EMA paper discusses these factors in relation to total cost of ownership (TCO).



Ixia Security Fabric: Security Through Visibility, Context, and Simplicity

PUBLISHED: Tue, 15 Nov 2016 00:00:00 +0000
AUTHOR: David Monahan

Security professionals are overwhelmed by data. There is an overload of information presented to people with limited time and bandwidth. Without context, this information can also overwhelm tools, making security analysts' lives more difficult rather than hastening a path to incident response and resolution. When early detection and discovery fails, advanced persistent threats remain.

With dozens of disparate and often overlapping data sources, early warnings are frequently missed. Security monitoring solutions trigger alerts without adequate context for identification and categorization. In order to be most effective, security intelligence must be coupled with automation and orchestration tools designed specifically for enhanced protection, using information across multiple silos.

This is where Ixia Security Fabric comes in. It facilitates security operations and analysis, acting as an intelligent traffic manager with the ability to direct packets based on numerous administrator-defined criteria and augmenting that traffic with additional data and metadata through network and application protocol analysis. All of this is done to deliver greater context around incidents in a shorter period of time so analysts can achieve results faster. This allows them higher efficiency in operations and gives them time to address other operational issues in a proactive manner.

While this concept originated in network operations, its benefits have much further-reaching effects in the security world. The top four value drivers for Security Fabric include:
  • Visibility - Illuminating and overseeing network traffic originating from various input sources, including contextual intelligence using both data and metadata 
  • Context - Understanding the information provided by various sources through situational, protocol, behavioral, and time awareness
  • Performance - Maximizing resources by intelligently routing packets to the tool most appropriate to analyze them, thus protecting tools from unnecessary processing burdens
  • Resilience - Ensuring continuous function when a link or tool within the chain is overwhelmed or broken
Many point solutions have attempted to solve the context and automation problem using log file aggregation and flow analysis. Unfortunately, these disparate parts do not overcome the most critical shortcomings, notably intelligent traffic management and contextual analysis coupled with a smart console.

The Ixia Security Fabric offers simplicity and performance -- a recipe for success!



SaaS, On-Prem, or Hybrid: Which Application Performance Management (APM) Solution Is Best for Your Business?

PUBLISHED: Thu, 10 Nov 2016 00:00:00 +0000
AUTHOR: Julie Craig

In the midst of this massively changing IT landscape, IBM is addressing hybrid deployments head on with a new set of Application Performance Management (APM) solutions which are, themselves, built using a hybrid design. Intended to provide customers with a wide range of options for funding, hosting, deployment, and services, the IBM Application Performance Management Portfolio can assist businesses in making the transition to hybrid service delivery. Targeted specifically at IT Operations teams, application developers, and Line of Business (LOB) application owners, IBM APM delivers the automated core supporting modern hybrid deployments.

This Enterprise Management Associates (EMA) white paper profiles IBM's hybrid APM offerings and their value proposition to business and IT. It discusses the benefits and challenges of utilizing leading-edge APM tooling in SaaS and/or on-premises form factors to manage hybrid and non-hybrid applications. 

It also provides guidelines to help IT and LOB determine which APM form factor--on-premises hosted, cloud hosted, or a mix of both--best fits their specific development, testing, and monitoring requirements. Finally, it profiles the key differentiators that make IBM a compelling product choice for companies developing and delivering complex enterprise applications via cloud-based, on-premises, or hybrid deployment models.



Packet-Based Security Forensics: A Next-Generation Approach to Attack Remediation

PUBLISHED: Thu, 10 Nov 2016 00:00:00 +0000
AUTHOR: David Monahan

Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success.

This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.



Blind Trust Is Not A Security Strategy: Lessons From Cloud Adopters

PUBLISHED: Wed, 09 Nov 2016 00:00:00 +0000
AUTHOR: David Monahan

Enterprise Management Associates recently conducted a research project that investigated multiple aspects of cloud service providers and the adoption of their services. The research looked to identify major motivators and inhibitors of adopting cloud services for both compliance and non-compliance constrained workloads. Security emerged as the top adoption concern.  

The research showed that though they have differing responsibilities, both IT and security agreed that implementing proper security in their cloud environments is better than accelerating deployment speed but achieving a less secure environment. IT respondents admitted that they would rather suffer a delay for a new cloud application deployment than rapidly deploy an application into a potentially insecure environment and, even better, if they help the business people understand the issues, the business people agreed in nearly a 3 to 1 margin. IT sided with security to delay a product launch due to security concerns rather than suffer a significant security breach by a margin greater than 2 to 1.

Cloud adoption is a long-term partnership between the business and the provider. It provides a new toolset to address both traditional and new IT service delivery challenges. Within that toolset security, elasticity, and agility are all available to accelerate business service delivery, but the organization must evaluate its needs to determine not only current requirements but also expected future needs to ensure how each provider under consideration can or will meet those needs.



The Value of OpEx-based, Storage-as-a-Service (STaaS)

PUBLISHED: Wed, 09 Nov 2016 00:00:00 +0000
AUTHOR: Jim Miller

Overall, data growth within the typical data center is at 42% per year. New applications driven by big data, video, social media, and mobile devices are fueling this unparalleled growth in storage. Data is also kept active longer in the lifecycle as corporations use analytics to look for trends, opportunities, and competitive advantage. Budgets are not growing at the same rate as data. Both the growth in the volumes of the data, and the growth in the value of the data are driving an exponential cost curve that cannot be sustained by the traditional CapEx model. Cloud compute and storage use is growing exponentially as companies of all sizes look for ways to accelerate application rollouts, reduce capital costs, and lower operational overhead.This paper examines this storage situation and explores Zadara Storage's solution that provides high performance and highly available enterprise-class STaaS that reduces the burden of procuring and managing storage. How Zadara reduces the risks 
of traditional storage planning by migrating to an operational model that quickly adjusts to the dynamics of the enterprise without having to overprovision or risk not having sufficient resources is explored. 



Wi-Fi Hardware and Management Trends, and Their impacts on Total Cost of Ownership

PUBLISHED: Tue, 08 Nov 2016 00:00:00 +0000
AUTHOR: David Monahan

It can be argued that the largest impact to workforce productivity in the last 20 years was the introduction of Wi-Fi networks. In today's workforce, moving from meeting to meeting or place to place is a job requirement; being tethered to a LAN port seems almost unfathomable. There are many factors driving the growth of Wi-Fi, including new standards with increased bandwidth, expanding use cases for mobile and Internet of Things devices, maturation of cloud-based management infrastructure, and the rise of virtualization and open source hardware for Wi-Fi. Given its importance and impact on productivity, choosing a solution to provide that connectivity is a critical business choice. Throughput, scalability, reliability and resiliency, simplicity, and ultimately cost all play a part in the vendor selection process and achieving a desired level of return on investment (ROI). This EMA paper discusses these factors in relation to total cost of ownership (TCO).



The Industrialization of Fraud Demands a Dynamic Intelligence-driven Response

PUBLISHED: Fri, 21 Oct 2016 00:00:00 +0000
AUTHOR: David Monahan

As criminals discover the profitability of attacks against information systems, fraud has increased significantly with no end in sight. Adversaries learned the lucrative nature of harnessing cyber threats. Innovations now make it easier to steal from a wider range of victims, spurring the commercialization of multiple forms of crimeware and an entire Internet subculture known as the "Dark Web" or the "Dark Net," where both software and services can be rented or purchased. The Dark Net services gave rise to specialization, competitive pressures, and other factors that illustrate how fraud, abetted by cybercrime, grew from the unrelated activities of a few into an industry in its own right.

This industry produced a level of automation and sophistication in fraud techniques rivaling those of the legitimate business world. The commercial-grade packaging of complex threats makes it possible to readily convert personal systems into pawns that facilitate fraud, often unbeknownst to their rightful owners. Large-scale systems management capitalizes on the ability to harness entire networks of compromised hosts whose masters often avoid detection and eradication through highly nimble evasive tactics. The net result: an industrialized threat that costs businesses billions to trillions of dollars worldwide.

In this paper, Enterprise Management Associates (EMA) explores the response organizations must marshal to stand up to the threat of industrialized cybercrime. If attackers are well organized and well informed, take advantage of the latest innovations in the shadow market of crimeware and automation, and capitalize on intelligence to maintain their advantage, organizations must respond accordingly.
Coordinated strategies embracing multiple tactics to limit exposure and improve effectiveness are now mandated by guidance such as that of the PCI Council, the US Federal Financial Institutions Examinations Council (FFIEC), and other regulations worldwide, affecting businesses targeted by fraud. The RSA Fraud and Risk Intelligence services portfolio offers an example of just such a coordinated approach. With its early leadership in technologies and services that integrate intelligence with anti-fraud tactics in real-time, the RSA Fraud and Risk Intelligence portfolio provides organizations with the tools to enable strategies for confronting an industrialized threat with an industry-wide response.



Bot Defense: Insights Into Basic and Advanced Techniques for Thwarting Automated Threats

PUBLISHED: Fri, 21 Oct 2016 00:00:00 +0000
AUTHOR: David Monahan

This EMA white paper lays the foundation for what bots are, why they are a threat, how they are adapting to bypass traditional defense technology, and how to overcome those shortcomings. Most current solutions were designed to combat programming deficiencies and errors, such as those addressed in the Open Web Application Security Project (OWASP) Top 10 and SANS/Mitre Top 20, but are not sufficient to protect them from exploits in business logic.

Organizations hoping to gain the best defense from these newly-defined OWASP Automated Threats to Web Applications must understand and then adopt an adaptive defense that uses both older and new defense capabilities.



APM in the Digital Economy: What's Hot, What's Not, and What's on the Horizon

PUBLISHED: Thu, 20 Oct 2016 00:00:00 +0000
AUTHOR: Julie Craig

This research report details the results of survey-based research conducted during the spring of 2016. It assessed the top challenges encountered by IT organizations as they adapt to the collective impacts of the consumer economy, the growth of the public cloud, the rise of abstraction in the form of "software-defined everything," and the growing importance of software as an agent of change. Survey topics covered technology usage, current management practices supporting production applications running on- and off- premises, software development/delivery practices, tooling requirements, and API usage. 

The survey also assessed APM requirements for companies of every size running a wide variety of application and transaction types. Questions covered virtually every "flavor" of Application Management and User Experience solutions, including synthetics, application-aware networking, Real User Monitoring (RUM), browser/code injection, endpoint monitoring, Application Discovery and Dependency Mapping (ADDM), APM platforms and suites, and on- and off-premises hosted solutions. The result is a comprehensive perspective on APM usage, requirements, gaps, and near-term APM-related purchasing plans.



Taming IT Complexity With User Experience Monitoring

PUBLISHED: Thu, 20 Oct 2016 00:00:00 +0000
AUTHOR: Julie Craig

With multiple studies over the past 10 years, Enterprise Management Associates (EMA) has conducted extensive research on the value proposition of "UEM technologies," a term that encompasses multiple product categories, including synthetic monitoring and real user monitoring (RUM). Nearly all of these surveys reinforce the benefits of this class of tools. In support of cloud computing initiatives, for example, UEM technologies were shown to accelerate service deployments, reduce operational costs, and improve overall manageability. 

However, regardless of whether a digital service is hosted in the cloud or on premises, the user has become the center of the digital universe. And as service delivery becomes increasingly business-critical, UEM solutions become one of the few ways that the user experience can be accurately quantified, prioritized, and optimized. 
 
This EMA white paper highlights the growing importance of the digital user experience in maintaining customer satisfaction, whether these "customers" are internal or external to the business. A survey conducted by EMA in July 2016 shows the value proposition of UEM solutions in ensuring high-quality delivery of complex digital services.



Report Summary - APM in the Digital Economy: What's Hot, What's Not, and What's on the Horizon

PUBLISHED: Wed, 19 Oct 2016 00:00:00 +0000
AUTHOR: Julie Craig

 
Full Report Abstract
This research report details the results of survey-based research conducted during the spring of 2016. It assessed the top challenges encountered by IT organizations as they adapt to the collective impacts of the consumer economy, the growth of the public cloud, the rise of abstraction in the form of "software-defined everything," and the growing importance of software as an agent of change. Survey topics covered technology usage, current management practices supporting production applications running on- and off- premises, software development/delivery practices, tooling requirements, and API usage. 

The survey also assessed APM requirements for companies of every size running a wide variety of application and transaction types. Questions covered virtually every "flavor" of Application Management and User Experience solutions, including synthetics, application-aware networking, Real User Monitoring (RUM), browser/code injection, endpoint monitoring, Application Discovery and Dependency Mapping (ADDM), APM platforms and suites, and on- and off-premises hosted solutions. The result is a comprehensive perspective on APM usage, requirements, gaps, and near-term APM-related purchasing plans.



Report Summary - Optimizing IT for Financial Performance

PUBLISHED: Wed, 19 Oct 2016 00:00:00 +0000
AUTHOR: Dennis Drogseth

This is a summary of the Optimizing IT for Financial Performance research report.

Full Report Abstract
This research targets a critical sector in the story of IT cost/value optimization: optimizing IT for financial performance. To investigate this issue, EMA brought together multiple areas that are not always linked. These include IT service management (ITSM), IT asset management (ITAM), and software asset management (SAM), as well as analytics, automation, service modeling, discovery investments, and IT-to-business data sharing and visualization. The impacts of cloud, agile, and digital transformation were also considered. The goal therefore was not to do an in-depth but isolated view of a single traditional market, but rather to understand broader priorities of what IT stakeholders, executives, and business leaders are looking for as they seek to understand OpEx and CapEx IT costs more dynamically and relate them to business outcomes and business values.



Optimizing IT for Financial Performance

PUBLISHED: Wed, 19 Oct 2016 00:00:00 +0000
AUTHOR: Dennis Drogseth

This research targets a critical sector in the story of IT cost/value optimization: optimizing IT for financial performance. To investigate this issue, EMA brought together multiple areas that are not always linked. These include IT service management (ITSM), IT asset management (ITAM), and software asset management (SAM), as well as analytics, automation, service modeling, discovery investments, and IT-to-business data sharing and visualization. The impacts of cloud, agile, and digital transformation were also considered. The goal therefore was not to do an in-depth but isolated view of a single traditional market, but rather to understand broader priorities of what IT stakeholders, executives, and business leaders are looking for as they seek to understand OpEx and CapEx IT costs more dynamically and relate them to business outcomes and business values.



Managing Apple Devices in a Windows World

PUBLISHED: Mon, 03 Oct 2016 00:00:00 +0000
AUTHOR: Steve Brasen

While Windows PCs continue to comprise the core of business end user computing solutions, Apple macOS computers and iOS mobile devices are increasingly being adopted to satisfy evolving workforce requirements and preferences. This accelerating environment heterogeneity has exponentially amplified administration challenges for device provisioning, maintenance, and problem management. In this white paper, EMA identifies the unique requirements essential to supporting Apple device users as well as the best practices and solutions that should be adopted to support macOS and iOS endpoints side-by-side with Windows-based devices.



Unify Your Infrastructure Management Systems for the Internet of Things

PUBLISHED: Thu, 29 Sep 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Most enterprise network infrastructure teams already provide connectivity to at least one Internet of Things (IoT) initiative, and many of them play a leading role in planning, implementing, and managing IoT projects. To succeed with these projects, networking teams will need management tools that give them visibility and control over IoT devices and applications. Some networking professionals may be tempted to buy new management tools to address IoT, but this approach may lead to more complexity. Instead, enterprises should consider extending their existing network management systems to support IoT. This paper explores these issues in detail and identifies one example of a network management product whose users are currently extending to IoT, Infosim StableNet.



Everything Crosses the Wire: How ExtraHop Unlocks the Strategic Value of Your Network

PUBLISHED: Mon, 19 Sep 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Too many enterprises have failed to recognize the network as a strategic asset that can provide unique insight into not just IT operations, but business operations, too. In a digital business, every transaction and every business process crosses the network as data in motion. IT operations has an opportunity to leverage this data flowing across the network to gain insight into business and IT operations in a way that hasn’t been possible before. The ExtraHop stream analytics platform unlocks the power of the network, transforming data in motion into rich wire data to deliver real-time visibility, insight, and control for the real-time enterprise.



Ensuring Application Performance Across Hybrid Environments

PUBLISHED: Mon, 19 Sep 2016 00:00:00 +0000
AUTHOR: Julie Craig

IT organizations are facing a "brave new world" of performance monitoring in which visibility to execution is dramatically reduced and performance characteristics which have traditionally been accessible and visible are no longer available. Tasked to be responsible for service quality in a world over which they have little visibility or control, IT organizations are increasingly being challenged to manage systems which their tools donít fully support. In short, incumbent toolsets simply lack the capacity to monitor beyond borders and "into the cloud."

This Enterprise Management Associates (EMA) white paper discusses APM in the context of hybrid cloud monitoring. It touches on ways to develop better visibility into the actual execution of cloud applications for the purposes of performance/availability management and to support root cause analysis. Finally, it introduces Riverbed's SteelCentral APM solution suite as a potential answer to the inherent challenges of efficiently managing hybrid cloud services.



2016 EMA Vendors to Watch: Network Management

PUBLISHED: Thu, 15 Sep 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2016 EMA Vendors to Watch in the Network Management field including:

Aviatrix
Mist Systems 



Report Summary - Next-Generation Wide-Area Networking

PUBLISHED: Tue, 16 Aug 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This is a summary of the EMA research report, "Next-Generation Wide-Area Networking."

Full Report Abstract 
Current technology and business trends are transforming how distributed enterprises build and manage their wide-area networks (WANs) and deliver applications and services to remote users. Big data, the cloud, and the Internet of Things are just a few of the technologies that are forcing these changes. Meanwhile, enterprises are growing their WANs. They are adding more remote sites to their networks and connecting more endpoint devices to those remote sites.

This research report examines how enterprise network infrastructure teams responsible for planning, building, and managing the WAN are responding to all of these pressures. This report examines how networking professionals are using software-defined WAN (SD-WAN) and network functions virtualization. It also examines in detail the enterprise migration from WAN connectivity via private managed services to public internet and wireless WAN technologies. Finally, it identifies which tools enterprises are using to monitor and manage their evolving WANs.



Why Unified Management Is Central to Operational Transformation

PUBLISHED: Mon, 08 Aug 2016 00:00:00 +0000
AUTHOR: Dennis Drogseth

With all the attention being given to digital transformation, too few in the industry seem to realize that digital, IT, and operational transformation must go hand in hand. This has become all the more apparent given the complexities and challenges of hybrid cloud and the need for more agile ways of supporting the deployment and delivery of IT services. This report leverages EMA's consulting and research on operational transformation, as well as trends in analytics and service management, to show why a unified approach to monitoring and management across domains is central to all transformational initiatives. It will also introduce ManageEngine's unique capabilities for unified management delivered by OpManager and its native add-ons and integrations. 



Digital Transformation: Will Your Legacy Network Management Tools Fail You?

PUBLISHED: Thu, 04 Aug 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Many enterprises are embarking on a digital transformation journey that will drive growth and complexity in their networks. They are adopting new technologies like software-defined data centers, software-defined wide-area networks, hybrid clouds, and the Internet of Things. Legacy network management tools will often struggle with these changes. IT organizations will need tools that can scale and adapt to evolving digital infrastructures. This white paper explores these issues in detail and examines how SevOne's Digital Infrastructure Management Platform addresses them.



The Rise of the Internet of Things: Connecting Our World One Device at a Time

PUBLISHED: Wed, 03 Aug 2016 00:00:00 +0000
AUTHOR: John Myers

The Internet of Things (IoT) is a growing concept in terms of exposure. There are new estimates as to the number of linked devices almost every quarter. Some of these estimates go as far to say that in within five years, we will see nearly 40 billion connected devices around the globe. That would mean over five connected devices for every man, woman, and child on the planet. IoT is growing in terms of implementation. With this growth in the number of connected devices, there is a wave of adoption to take advantage of these devices. If we can enable our vehicles via connect car initiatives, if we can enable our offices and homes as part of smart building strategies, if we can learn more about our health and medical treatments with bio-medical sensors, we can improve not just our businesses, the environment, and our lives. We can also develop disruptive new ways of looking at business models, energy production, distribution, and how to treat disease and improve quality of life. 

This research will discuss the recent Enterprise Management Associates (EMA) global end user study, looking at different aspects of Internet of Things -- especially strategies, implementations, and projects. The EMA research panel is a well-balanced group of IT and business professionals from around the world. This research is based on 250 panelists who have visibility into strategy, budget, and implementation associated with their IoT initiatives. As part of this research, EMA delved into some key industry segments: healthcare, manufacturing, retail, and transportation. Each of these groups provides a unique opportunity to utilize IoT architectures and IoT devices to add value into their organizations.



EMA Radar for All-Flash Storage: Q3 2016

PUBLISHED: Wed, 03 Aug 2016 00:00:00 +0000
AUTHOR: Jim Miller

Flash technology proves to be one of the most disruptive forces in the marketplace since virtualization. The technology resulted in a major shift of storage capacity from performance hard disk drives (HDD) to flash-based solutions. 

Flash storage evolved in three unique stages: application-specific performance, virtualization, and primary storage. Initially, flash was used specifically for business critical applications and use cases such as VDI. These initial systems were all provided by start-ups and were very expensive relative to traditional storage arrays. As virtualization expanded, flash use increased as a way to solve the bottleneck of consolidated servers utilizing oversubscribed storage systems. Now, as the price of flash declines, it is being used for tier 1 primary storage. There are multiple deployment options for flash, including server and network-based flash. All-flash systems are network-based, large capacity solutions that can be shared across multiple servers. Today, all primary storage vendors have all-flash storage offerings. This radar report explores the all-flash systems. 



Report Summary - EMA Radar for All-Flash Storage: Q3 2016

PUBLISHED: Tue, 02 Aug 2016 00:00:00 +0000
AUTHOR: Jim Miller


Full Report Abstract
Flash technology proves to be one of the most disruptive forces in the marketplace since virtualization. The technology resulted in a major shift of storage capacity from performance hard disk drives (HDD) to flash-based solutions. 

Flash storage evolved in three unique stages: application-specific performance, virtualization, and primary storage. Initially, flash was used specifically for business critical applications and use cases such as VDI. These initial systems were all provided by start-ups and were very expensive relative to traditional storage arrays. As virtualization expanded, flash use increased as a way to solve the bottleneck of consolidated servers utilizing oversubscribed storage systems. Now, as the price of flash declines, it is being used for tier 1 primary storage. There are multiple deployment options for flash, including server and network-based flash. All-flash systems are network-based, large capacity solutions that can be shared across multiple servers. Today, all primary storage vendors have all-flash storage offerings. This radar report explores the all-flash systems. 



Next-Generation Wide-Area Networking

PUBLISHED: Fri, 29 Jul 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Current technology and business trends are transforming how distributed enterprises build and manage their wide-area networks (WANs) and deliver applications and services to remote users. Big data, the cloud, and the Internet of Things are just a few of the technologies that are forcing these changes. Meanwhile, enterprises are growing their WANs. They are adding more remote sites to their networks and connecting more endpoint devices to those remote sites.

This research report examines how enterprise network infrastructure teams responsible for planning, building, and managing the WAN are responding to all of these pressures. This report examines how networking professionals are using software-defined WAN (SD-WAN) and network functions virtualization. It also examines in detail the enterprise migration from WAN connectivity via private managed services to public internet and wireless WAN technologies. Finally, it identifies which tools enterprises are using to monitor and manage their evolving WANs.



EMA Radar for Mobile Security Management (MSM)

PUBLISHED: Wed, 27 Jul 2016 00:00:00 +0000
AUTHOR: Steve Brasen

Mobile workers are demanding unprecedented access to enterprise applications, data, and IT services from their smartphones and tablets. Enabling increased accessibility to these resources, however, can place a business at risk if proper security protocols are not enforced. This requires advanced capabilities in identity management, threat detection, and data loss prevention. Mobile security management (MSM) provides the processes and solutions necessary for security business resources at their source, when in transit, and on remote devices. This Enterprise Management Associates (EMA) RADAR report identifies the twelve leading MSM platforms and empirically compares and grades them against a broad range of measurements to determine overall product strengths and cost efficiencies.



Report Summary - EMA Radar for Mobile Security Management (MSM)

PUBLISHED: Wed, 27 Jul 2016 00:00:00 +0000
AUTHOR: Steve Brasen


Full Report Abstract
Mobile workers are demanding unprecedented access to enterprise applications, data, and IT services from their smartphones and tablets. Enabling increased accessibility to these resources, however, can place a business at risk if proper security protocols are not enforced. This requires advanced capabilities in identity management, threat detection, and data loss prevention. Mobile security management (MSM) provides the processes and solutions necessary for security business resources at their source, when in transit, and on remote devices. This Enterprise Management Associates (EMA) RADAR report identifies the twelve leading MSM platforms and empirically compares and grades them against a broad range of measurements to determine overall product strengths and cost efficiencies.



Report Summary - The Rise of the Internet of Things: Connecting Our World One Device at a Time

PUBLISHED: Tue, 26 Jul 2016 00:00:00 +0000
AUTHOR: John Myers

The Internet of Things (IoT) is a growing concept in terms of exposure. There are new estimates as to the number of linked devices almost every quarter. Some of these estimates go as far to say that in within five years, we will see nearly 40 billion connected devices around the globe. That would mean over five connected devices for every man, woman, and child on the planet. IoT is growing in terms of implementation. With this growth in the number of connected devices, there is a wave of adoption to take advantage of these devices. If we can enable our vehicles via connect car initiatives, if we can enable our offices and homes as part of smart building strategies, if we can learn more about our health and medical treatments with bio-medical sensors, we can improve not just our businesses, the environment, and our lives. We can also develop disruptive new ways of looking at business models, energy production, distribution, and how to treat disease and improve quality of life. 

This research will discuss the recent Enterprise Management Associates (EMA) global end user study, looking at different aspects of Internet of Things -- especially strategies, implementations, and projects. The EMA research panel is a well-balanced group of IT and business professionals from around the world. This research is based on 250 panelists who have visibility into strategy, budget, and implementation associated with their IoT initiatives. As part of this research, EMA delved into some key industry segments: healthcare, manufacturing, retail, and transportation. Each of these groups provides a unique opportunity to utilize IoT architectures and IoT devices to add value into their organizations.



Digital Transformation: Why It's Here Now, and How to Make the Most of It

PUBLISHED: Mon, 18 Jul 2016 00:00:00 +0000
AUTHOR: Dennis Drogseth

In this report we examine the highlights of some unique research done for HP Enterprise in January 2016, as well as supplemental research done by EMA in August 2015 on digital and IT transformation. This report also introduces some of the highlights of HP Enterprise's IT Operations Management portfolio in context with the requirements of successful transformational initiatives. 



Cisco Report Summary - The Rise of the Internet of Things: Connecting Our World One Device at a Time

PUBLISHED: Mon, 18 Jul 2016 00:00:00 +0000
AUTHOR: John Myers

The Internet of Things (IoT) is a growing concept in terms of exposure. There are new estimates as to the number of linked devices almost every quarter. Some of these estimates go as far to say that in within five years, we will see nearly 40 billion connected devices around the globe. That would mean over five connected devices for every man, woman, and child on the planet. IoT is growing in terms of implementation. With this growth in the number of connected devices, there is a wave of adoption to take advantage of these devices. If we can enable our vehicles via connect car initiatives, if we can enable our offices and homes as part of smart building strategies, if we can learn more about our health and medical treatments with bio-medical sensors, we can improve not just our businesses, the environment, and our lives. We can also develop disruptive new ways of looking at business models, energy production, distribution, and how to treat disease and improve quality of life. 

This research will discuss the recent Enterprise Management Associates (EMA) global end user study, looking at different aspects of Internet of Things -- especially strategies, implementations, and projects. The EMA research panel is a well-balanced group of IT and business professionals from around the world. This research is based on 250 panelists who have visibility into strategy, budget, and implementation associated with their IoT initiatives. As part of this research, EMA delved into some key industry segments: healthcare, manufacturing, retail, and transportation. Each of these groups provides a unique opportunity to utilize IoT architectures and IoT devices to add value into their organizations.



2016 EMA Vendors to Watch: Security & Risk Management

PUBLISHED: Thu, 14 Jul 2016 00:00:00 +0000
AUTHOR: David Monahan

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2016 EMA Vendors to Watch in the Security & Risk Management field, including Tender Armor and Verodin.

Additional vendors will be added to this document throughout the year.



Speeding Analytics Success with Data Warehouse Automation Infobrief

PUBLISHED: Fri, 01 Jul 2016 00:00:00 +0000
AUTHOR: John Myers

Data warehouse automation is an approach that utilizes automation technology and reusable tools to lower costs, improve quality, and better manage complex data management environments. Data warehouse automation technology enhances the planning, analysis, design, implementation, maintenance, and change management of analytical environments such as data warehouses, data marts, and data vaults. Unfortunately, many analytical environment implementers consider the concept of data warehouse automation as a non-option when it comes to the implementation of analytical environments. With these fears in mind, Enterprise Management Associates (EMA) implemented an end-user research study to investigate the adoption of DWA strategies within the community of organizations implementing analytical environments such as data warehouses, the implementation of those practices in projects, and how successful projects are within the context of those higher-level strategies.



Hyperglance: Streamlined Operations via Management System Abstraction

PUBLISHED: Thu, 30 Jun 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

As enterprises adopt hybrid software-defined infrastructure, IT organizations need management tools that provide visibility and control over the entire infrastructure domain. With increased virtualization, new software-defined technologies, and multiple public and private clouds, the levels of abstraction in these enterprises are simply too complex for the sprawling management toolsets that many IT organizations have in place. Organizations need to find ways to consolidate visibility and management wherever they can. Hybrid infrastructure management vendor Hyperglance offers enterprises a visibility and control layer inspired by video game graphics. It can collect data from multiple technologies and domains and present it in one interactive view with live fault and performance information that IT teams can immediately take action on from within the tool.



Digital Transformation: Unified Infrastructure Management is Critical

PUBLISHED: Fri, 24 Jun 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

To support digital transformation IT organizations will be asked to adopt new technologies and architectures, including software-defined networking, hybrid clouds, and the Internet of Things. Many IT organizations are finding that their existing infrastructure monitoring tools do not fully support these technologies. While many IT professionals will be tempted to buy new tools to operationalize these technologies, they may benefit from adopting unified infrastructure monitoring tools that can be extended to support new digital infrastructure. This white paper explores these issues in detail and reviews the suitability of ScienceLogic, a leading provider of hybrid infrastructure monitoring, for addressing these management gaps.



CA Unified Infrastructure Management Deepens its Visibility Into Cloud and Hybrid IT With Comprehensive New Capabilities

PUBLISHED: Wed, 22 Jun 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Hybrid IT and cloud architectures are key enablers of digital transformation, but IT operation will need the right tools to assure applications and service performance in these new environments. Hybrid IT combines a variety of legacy and next-generation technologies, which presents a conundrum for the IT organization. Do they combine their existing management and monitoring tools with new tools that address new technologies like containers, cloud, and software-defined infrastructure? Or should they take a more unified approach to IT operations but extend their existing monitoring tools?

For the sake of efficiency and operational effectiveness, Enterprise Management Associates (EMA) recommends that IT organizations extend the visibility of their existing tools whenever possible. This paper explores a leading option for that approach. With its Unified Infrastructure Monitoring (CA UIM) solution, CA offers a hybrid IT monitoring platform with visibility into traditional  and next-generation technologies. CA UIM's modular architecture allows CA to extend visibility into new technologies on a continuous basis without reboots or software upgrades.



How Freshservice is Helping to Transform IT Service Management

PUBLISHED: Tue, 21 Jun 2016 00:00:00 +0000
AUTHOR: Dennis Drogseth

Unifying IT through a cost-effective, versatile approach to service management may sound like one of those stories that's too good to be true. But this report highlights just such an example--a Freshservice adoption that has energized a global transportation services company where IT services and business services 100% coincide. This report also looks at how Freshservice functionality fits in with IT service management (ITSM) market requirements, as a way of positioning both our case study and Freshservice itself in a broader industry context.



Transforming SME Network Operations With Paessler PRTG Network Monitor

PUBLISHED: Fri, 20 May 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Network managers at small and medium enterprises face many of the same challenges that their counterparts at large enterprises face, plus a few of their own. For instance, networking professionals at smaller companies often operate enterprise-grade technologies with fewer resources and smaller budgets. Therefore, these individuals need network availability and performance monitoring systems that are tailored to the technical requirements and business needs of small and medium enterprises. Enterprise Management Associates research has identified the key challenges that smaller companies face with network operations and identified the management tool capabilities that deliver the most value to these organizations. This white paper explores these findings and examines how Paessler PRTG Network Monitor, a leading network monitoring tool, addresses the unique needs of small and medium companies.



Report Summary - Effective BYOD Management: Empowering a Mobile Workforce

PUBLISHED: Thu, 05 May 2016 00:00:00 +0000
AUTHOR: Steve Brasen

This is a summary of the EMA research report, "Effective BYOD Management: Empowering a Mobile Workforce."

Full Report Abstract
Enterprise professionals are increasingly employing personally-owned smartphones, tablets, and laptops to perform business tasks. Even business-owned devices are commonly employed by users to perform personal tasks. Bring-your-own-device (BYOD) processes are increasingly being adopted to isolate, provision, secure, and support business applications, data, and services without limiting any employee's personal use of the devices. Common technologies employed to accomplish this include containerization, app wrapping, virtualization, and the deployment of dedicated secure applications. This EMA primary research report identifies emerging BYOD requirements and correlates the value of enterprise-class BYOD solutions to help organizations determine the best approaches for empowering end users, reducing costs, and meeting enterprise security requirements.



2016 EMA Vendors to Watch: Application Management

PUBLISHED: Thu, 05 May 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2016 EMA Vendors to Watch in the Application Management field including:

NS1



Effective BYOD Management: Empowering a Mobile Workforce

PUBLISHED: Wed, 04 May 2016 00:00:00 +0000
AUTHOR: Steve Brasen

Enterprise professionals are increasingly employing personally-owned smartphones, tablets, and laptops to perform business tasks. Even business-owned devices are commonly employed by users to perform personal tasks. Bring-your-own-device (BYOD) processes are increasingly being adopted to isolate, provision, secure, and support business applications, data, and services without limiting any employee's personal use of the devices. Common technologies employed to accomplish this include containerization, app wrapping, virtualization, and the deployment of dedicated secure applications. This EMA primary research report identifies emerging BYOD requirements and correlates the value of enterprise-class BYOD solutions to help organizations determine the best approaches for empowering end users, reducing costs, and meeting enterprise security requirements.



Report Summary - Network Management Megatrends 2016: Managing Networks in the Era of the Internet of Things, Hybrid Cloud, and Advanced Network Analytics

PUBLISHED: Tue, 26 Apr 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy


Full Report Abstract
Networks have always been essential to the success of IT as they serve as the connective tissue for all other elements of IT infrastructure and services. However, in recent years, enterprises have begun leveraging networks as competitive assets. Given this reality, the network is now held to a higher standard of availability and performance than ever before. The tools and practices that network management teams use to deliver quality network services are more important than ever. 

This ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) research report takes a detailed look at the current state of networks and network management. It examines several major areas of change and evolution affecting network management, or what EMA calls "megatrends." These megatrends include hybrid cloud networking, the Internet of Things, advanced network analytics, network management outsourcing, and network management tool consolidation.



Network Management Megatrends 2016: Managing Networks in the Era of the Internet of Things, Hybrid Cloud, and Advanced Network Analytics

PUBLISHED: Thu, 14 Apr 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Networks have always been essential to the success of IT as they serve as the connective tissue for all other elements of IT infrastructure and services. However, in recent years, enterprises have begun leveraging networks as competitive assets. Given this reality, the network is now held to a higher standard of availability and performance than ever before. The tools and practices that network management teams use to deliver quality network services are more important than ever. 

This ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) research report takes a detailed look at the current state of networks and network management. It examines several major areas of change and evolution affecting network management, or what EMA calls "megatrends." These megatrends include hybrid cloud networking, the Internet of Things, advanced network analytics, network management outsourcing, and network management tool consolidation. 



LightCyber Report Summary - Achieving High-Fidelity Security

PUBLISHED: Fri, 08 Apr 2016 00:00:00 +0000
AUTHOR: David Monahan

This is a summary document, prepared for LightCyber, of the EMA research report, "Achieving High-Fidelity Security."


Full Report Abstract
The "High-Fidelity" research project was created to understand more about organizations' data collection and use habits with regard to security. Specifically, the research focused on the collection and use of network and endpoint data and examined how these data types are used individually and in tandem to create an information stream that provides high-value telemetry to its users about their environments.

Both network and endpoint data can be highly valuable in identifying threats from breaches (incursions into a secured environment) and compromises (the extraction of private/sensitive data or information) as well as malicious and negligent insider activities. However, these two data sources have their own strengths and weaknesses. Endpoints may suffer from inoperative/inoperable agents or a lack of deployment. Network segments may not have monitoring systems turned on or even installed, or their log detail and collection settings may not be high enough to provide sufficient detail.

Even in the cases where both network and endpoint data sources are active and operating as designed, neither data type is perfect for all use cases. But together network and endpoint data create a greater visibility than either can individually. Here the whole is truly greater than the sum of its parts.

This report outlines issues with data collection and use and shows how these gaps can impact an organization's ability to maintain high-fidelity security.



Advanced IT Analytics: A Look at Real Adoptions in the Real World

PUBLISHED: Thu, 07 Apr 2016 00:00:00 +0000
AUTHOR: Dennis Drogseth

The industry is abuzz with a mix of enthusiasm and confusion as advanced analytics are becoming assimilated by IT organizations for a wide variety of use cases, from performance to change and capacity planning, financial optimization, security, and support for cloud and agile. Part of the confusion stems from industry attempts to define advanced analytics for IT -- what EMA calls "advanced IT analytics" (AIA) -- far too narrowly, either purely in terms of discrete technologies or else as simply "big data." Another reason for the confusion is that the more prevalent nomenclature tends to direct advanced analytics for IT purely as an enabler for operations, whereas the data in this report shows just the opposite is true. AIA, as EMA understands it, provides a unifying layer that may support many IT as well as business roles.

Rather than forcing a template of technologies or data sources on our respondents, this exploratory research let the "real world" of active AIA deployments define itself. Our primary requirements included the following:

• AIA should be cross-domain and not restricted to just network, systems, application, database, or even business outcomes.
• AIA should require assimilating many different sources, whether third-party monitoring tools, different data sources, or ideally both. 
• Over and above this data, AIA requires the application of advanced heuristics, such as machine learning, advanced correlation, anomaly detection, or predictive trending.

We also required that all our respondents be actively engaged in their AIA initiative, either as managers or hands-on contributors. 



Viavi Observer SightOps: Infrastructure Monitoring for the Cloud Era

PUBLISHED: Tue, 22 Mar 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Enterprises are migrating applications and services to the cloud, but they are not completely abandoning their internal IT infrastructure. Network operations will be tasked with monitoring and troubleshooting both internal infrastructure and external public cloud infrastructure. Given this reality, network operations must adjust their management tools and practices for a hybrid world where applications and services span private infrastructure and public clouds. 

Viavi Solutions has introduced Observer SightOps, a cross-domain infrastructure monitoring system with visibility into private cloud, their associated components like virtualized servers, and leading public cloud environments. SightOps offers network operations an option for unified monitoring and troubleshooting of hybrid infrastructure.



Analytics in the Cloud

PUBLISHED: Wed, 09 Mar 2016 00:00:00 +0000
AUTHOR: Lyndsay Wise

Cloud adoption has increased over the past several years. Starting with the use of Salesforce.com for customer relationship management, organizations have leveraged the cloud to provide platform, operational, and analytical support. These organizations have experienced the benefits of quicker time to implement, while analytics and business intelligence in the cloud have been slower to reach widespread acceptance. Now, organizations are taking advantage of platforms, data integration, and analytics offerings to address their analytics and business intelligence requirements.

To determine the status of Analytics and Business Intelligence in the Cloud, Enterprise Management Associates (EMA) embarked on an end-user research study to examine the current state of cloud-based analytics. For this research, EMA invited pre-qualified business stakeholders and information technology professionals to complete an extensive web-based survey. As part of the survey, 208 panelists responded to an invitation to provide their insights on cloud-based analytics and business intelligence strategies and implementation practices. To offer a neutral enterprise view, the respondent pool was also balanced. Business stakeholders represented 53% of respondents. Technologists accounted for 47% of the panel. The survey was executed in September 2015 with respondents from around the world including North America and Europe.



2016 EMA Vendors to Watch: Systems Management

PUBLISHED: Wed, 09 Mar 2016 00:00:00 +0000
AUTHOR: Steve Brasen

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2016 EMA Vendors to Watch in the Systems Management field including: 

Smith Micro



2016 EMA Vendors to Watch: Storage Management

PUBLISHED: Wed, 09 Mar 2016 00:00:00 +0000
AUTHOR: Jim Miller

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2016 EMA Vendors to Watch in the Storage Management field including:

Cohesity
Datera



Report Summary - Analytics in the Cloud

PUBLISHED: Wed, 09 Mar 2016 00:00:00 +0000
AUTHOR: Lyndsay Wise

This is a summary document of the EMA "Analytics in the Cloud"research report.

Full Report Abstract
Cloud adoption has increased over the past several years. Starting with the use of Salesforce.com for customer relationship management, organizations have leveraged the cloud to provide platform, operational, and analytical support. These organizations have experienced the benefits of quicker time to implement, while analytics and business intelligence in the cloud have been slower to reach widespread acceptance. Now, organizations are taking advantage of platforms, data integration, and analytics offerings to address their analytics and business intelligence requirements.

To determine the status of Analytics and Business Intelligence in the Cloud, Enterprise Management Associates (EMA) embarked on an end-user research study to examine the current state of cloud-based analytics. For this research, EMA invited pre-qualified business stakeholders and information technology professionals to complete an extensive web-based survey. As part of the survey, 208 panelists responded to an invitation to provide their insights on cloud-based analytics and business intelligence strategies and implementation practices. To offer a neutral enterprise view, the respondent pool was also balanced. Business stakeholders represented 53% of respondents. Technologists accounted for 47% of the panel. The survey was executed in September 2015 with respondents from around the world including North America and Europe.



EMA Radar for Workload Automation (WLA): Q1 2016

PUBLISHED: Tue, 08 Mar 2016 00:00:00 +0000
AUTHOR: Dan Twing

Hybrid cloud, DevOps, big data and digitalization are driving a need for more sophisticated workload automation, which underpins the consistent delivery of traditional and cutting edge workloads. Modern workloads require more sophistication; data is collected from a greater variety of sources, and the success or failure of job streams can be directly exposed to both business users and customers. Significant enhancements in workload automation (WLA) tools have been added in recent years to address these trends. This Enterprise Management Associates (EMA) RADAR report identifies the thirteen leading WLA platforms and empirically compares and grades them against a broad range of measurements to determine overall product strengths and cost efficiencies.

Evaluated solutions include:

1. Arcana
2. ASCI
3. Automic
4. BMC
5. CA Technologies
6. Cisco Systems
7. Flux
8. HelpSystems
9. IBM
10. MVP Software
11. SMA Solutions
12. Stonebranch
13. Vinzant



Report Summary - EMA Radar for Workload Automation (WLA): Q1 2016

PUBLISHED: Tue, 08 Mar 2016 00:00:00 +0000
AUTHOR: Dan Twing

 
Full Report Abstract
Hybrid cloud, DevOps, big data and digitalization are driving a need for more sophisticated workload automation, which underpins the consistent delivery of traditional and cutting edge workloads. Modern workloads require more sophistication; data is collected from a greater variety of sources, and the success or failure of job streams can be directly exposed to both business users and customers. Significant enhancements in workload automation (WLA) tools have been added in recent years to address these trends. This Enterprise Management Associates (EMA) RADAR report identifies the thirteen leading WLA platforms and empirically compares and grades them against a broad range of measurements to determine overall product strengths and cost efficiencies.

Evaluated solutions include:

1. Arcana
2. ASCI
3. Automic
4. BMC
5. CA Technologies
6. Cisco Systems
7. Flux
8. HelpSystems
9. IBM
10. MVP Software
11. SMA Solutions
12. Stonebranch
13. Vinzant



Master Data Management for Data-driven Organizations Key Findings - Prepared for Talend

PUBLISHED: Tue, 01 Mar 2016 00:00:00 +0000
AUTHOR: John Myers

Data-driven organizations are breaking down barriers to new and innovative markets via access to a higher level of information and leveraging that information at speeds that previous organizations could only dream of. At the core of this disruption is the ability to provide context to viewing habits, passenger and driver quality, and purchase history. All of these concepts require disruptive, data-driven organizations to have access to the most up-to-date metadata on customers, products, and locations, as well as a robust master data management (MDM) practice to leverage that information in the right places and at the right times.



Master Data Management for Data-driven Organizations Report Summary - Prepared for Talend

PUBLISHED: Tue, 01 Mar 2016 00:00:00 +0000
AUTHOR: John Myers

Data-driven organizations are breaking down barriers to new and innovative markets via access to a higher level of information and leveraging that information at speeds that previous organizations could only dream of. At the core of this disruption is the ability to provide context to viewing habits, passenger and driver quality, and purchase history. All of these concepts require disruptive, data-driven organizations to have access to the most up-to-date metadata on customers, products, and locations, as well as a robust master data management (MDM) practice to leverage that information in the right places and at the right times.



Achieving High-Fidelity Security

PUBLISHED: Wed, 17 Feb 2016 00:00:00 +0000
AUTHOR: David Monahan

The "High-Fidelity" research project was created to understand more about organizations' data collection and use habits with regard to security. Specifically, the research focused on the collection and use of network and endpoint data and examined how these data types are used individually and in tandem to create an information stream that provides high-value telemetry to its users about their environments.

Both network and endpoint data can be highly valuable in identifying threats from breaches (incursions into a secured environment) and compromises (the extraction of private/sensitive data or information) as well as malicious and negligent insider activities. However, these two data sources have their own strengths and weaknesses. Endpoints may suffer from inoperative/inoperable agents or a lack of deployment. Network segments may not have monitoring systems turned on or even installed, or their log detail and collection settings may not be high enough to provide sufficient detail.

Even in the cases where both network and endpoint data sources are active and operating as designed, neither data type is perfect for all use cases. But together network and endpoint data create a greater visibility than either can individually. Here the whole is truly greater than the sum of its parts.

This report outlines issues with data collection and use and shows how these gaps can impact an organization's ability to maintain high-fidelity security.



Closing SDN and NFV Management Gaps for Communication Service Providers with CA Virtual Network Assurance

PUBLISHED: Wed, 17 Feb 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Enterprise Management Associates (EMA) research has revealed that communications service providers that have adopted software-defined networking (SDN) and network functions virtualization (NFV) lack the tools they need to manage these new networks. Unless they modify or replace their operations support and readiness tools and service assurance systems, these communications service providers will fail to gain a return on investment with SDN and NFV. CA Technologies has introduced Virtual Network Assurance, a software gateway that SDN- and NFV-enables its leading network management products. 



CA Virtual Network Assurance Enables Enterprises to Manage SDN and NFV

PUBLISHED: Wed, 17 Feb 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Enterprise Management Associates research has revealed that early adopters of software-defined networking (SDN) and network functions virtualization (NFV) lack the tools they need to manage these new networks. Unless they modify or replace their monitoring and troubleshooting tools, these enterprises will fail to gain a return on investment with SDN. CA Technologies has introduced Virtual Network Assurance, a software gateway that SDN/NFV-enables its leading network management products.



Report Summary - Achieving High-Fidelity Security

PUBLISHED: Wed, 17 Feb 2016 00:00:00 +0000
AUTHOR: David Monahan

This is a summary of the EMA research report, "Achieving High-Fidelity Security."


Full Report Abstract
The "High-Fidelity" research project was created to understand more about organizations' data collection and use habits with regard to security. Specifically, the research focused on the collection and use of network and endpoint data and examined how these data types are used individually and in tandem to create an information stream that provides high-value telemetry to its users about their environments.

Both network and endpoint data can be highly valuable in identifying threats from breaches (incursions into a secured environment) and compromises (the extraction of private/sensitive data or information) as well as malicious and negligent insider activities. However, these two data sources have their own strengths and weaknesses. Endpoints may suffer from inoperative/inoperable agents or a lack of deployment. Network segments may not have monitoring systems turned on or even installed, or their log detail and collection settings may not be high enough to provide sufficient detail.

Even in the cases where both network and endpoint data sources are active and operating as designed, neither data type is perfect for all use cases. But together network and endpoint data create a greater visibility than either can individually. Here the whole is truly greater than the sum of its parts.

This report outlines issues with data collection and use and shows how these gaps can impact an organization's ability to maintain high-fidelity security.



Report Summary - Managing Tomorrow's Networks: The Impacts of SDN and Network Virtualization on Network Management

PUBLISHED: Thu, 28 Jan 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This is a summary of the Enterprise Management Associates (EMA) research report, "Managing Tomorrow's Networks: The Impacts of SDN and Network Virtualization on Network Management."

Full Report Abstract
Software-defined networking (SDN) has the potential to be the most disruptive technology the networking industry has seen in a generation. While SDN and related technologies, such as network virtualization and network functions virtualization (NFV), offer both enterprises and network service providers the opportunity to make their networks more agile, automated, and transformative for the business, there are many unanswered questions. For instance, we don't fully understand how networking organizations will engineer and operationalize SDN. Furthermore, it is becoming quite clear that existing network management tools and practices are not fully prepared to support these new architectures.

This research study explores these issues in detail. EMA has surveyed early SDN adopters among enterprises and network service providers to understand how organizations are using SDN, network virtualization, and NFV. More importantly, this study reveals just how prepared these early adopters are to manage these technologies. It assesses the readiness of enterprises to manage data-center SDN underlays and overlays, software-defined WAN, campus SDN, and enterprise NFV. The research also reveals the abilities of network service providers to manage SDN and NFV in their telco networks.

As this report will demonstrate, the majority of enterprises and service providers have discovered that their existing network engineering, monitoring, and troubleshooting tools do not fully support SDN, NFV, and network virtualization. This EMA research report identifies the functional requirements that SDN adopters want added to their management systems. It also explores the use cases, benefits, and organizational impacts of SDN adoption. 



Real-Time Network Telemetry Is Essential to SDN Management and Orchestration

PUBLISHED: Fri, 22 Jan 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Software-defined networking (SDN) introduces unprecedented dynamism and virtualization to the core networks of communications service providers (CSPs) and very large enterprises. Given that CSPs use management systems that were designed to operate and maintain static, hardware-centric network infrastructure, network operators are discovering that their existing toolsets aren't ready to support SDN. They need new tools with real-time visibility and analytics that can help them validate that the highly programmable SDN technologies they are implementing are actually helping them achieve their network transformation objectives. Packet Design is leveraging its heritage as a route analytics innovator to deliver an SDN management and orchestration solution to CSPs and large enterprises.



Insights Across the Hybrid Enterprise: Big Data 2015 Research Summary for Teradata

PUBLISHED: Wed, 13 Jan 2016 00:00:00 +0000
AUTHOR: John Myers

Since its inception, the concept of "big data" has been widely associated with a single data management platform: Hadoop. This connection may be due to the popularity of the use of the Hadoop platform to store and process large amounts of multistructured data. However, Hadoop is not the only answer to the question of "what is big data?"

As was explored in the inaugural EMA/9sight survey in 2012, big data is both a way to look at new sources of data and how organizations place that information under management. Big data has attracted a wide range of application innovators as well as many protesters against the dominance of relational databases and data warehouses. The EMA/9sight surveys use a deliberately broad definition of big data to inspire end users to think beyond the box of Hadoop. The survey explores the wide range of ways in which nontraditional data, often in combination with more traditional types, has enabled new or improved business processes. As was established in previous studies in 2012 and 2013 and again in 2014, big data offers a wide range of possibilities, but the name "big data" itself keeps media and industry eyes focused on size as the defining feature.



Managing Tomorrow's Networks: The Impacts of SDN and Network Virtualization on Network Management

PUBLISHED: Mon, 11 Jan 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Software-defined networking (SDN) has the potential to be the most disruptive technology the networking industry has seen in a generation. While SDN and related technologies, such as network virtualization and network functions virtualization (NFV), offer both enterprises and network service providers the opportunity to make their networks more agile, automated, and transformative for the business, there are many unanswered questions. For instance, we don't fully understand how networking organizations will engineer and operationalize SDN. Furthermore, it is becoming quite clear that existing network management tools and practices are not fully prepared to support these new architectures.

This research study explores these issues in detail. EMA has surveyed early SDN adopters among enterprises and network service providers to understand how organizations are using SDN, network virtualization, and NFV. More importantly, this study reveals just how prepared these early adopters are to manage these technologies. It assesses the readiness of enterprises to manage data-center SDN underlays and overlays, software-defined WAN, campus SDN, and enterprise NFV. The research also reveals the abilities of network service providers to manage SDN and NFV in their telco networks.

As this report will demonstrate, the majority of enterprises and service providers have discovered that their existing network engineering, monitoring, and troubleshooting tools do not fully support SDN, NFV, and network virtualization. This EMA research report identifies the functional requirements that SDN adopters want added to their management systems. It also explores the use cases, benefits, and organizational impacts of SDN adoption. 



EMA Radar for Mobile Device Management (MDM): Q1 2016

PUBLISHED: Mon, 28 Dec 2015 00:00:00 +0000
AUTHOR: Steve Brasen

Productivity with an increasingly mobile workforce is dependent on the reliability and performance of portable devices -- including smartphones and tablets -- to access and run business applications while still meeting business requirements for security and compliance. Mobile device management (MDM) provides the endpoint-focused processes and solutions for accelerating user productivity and device reliability. This Enterprise Management Associates (EMA) RADAR report identifies the sixteen leading MDM platforms and empirically compares and grades them against a broad range of measurements to determine overall product strengths and cost efficiencies.



Report Summary - EMA Radar for Mobile Device Management (MDM): Q1 2016

PUBLISHED: Mon, 28 Dec 2015 00:00:00 +0000
AUTHOR: Steve Brasen

This is a summary of the EMA Radar for Mobile Device Management (MDM): Q1 2016.


Full Report Abstract
Productivity with an increasingly mobile workforce is dependent on the reliability and performance of portable devices -- including smartphones and tablets -- to access and run business applications while still meeting business requirements for security and compliance. Mobile device management (MDM) provides the endpoint-focused processes and solutions for accelerating user productivity and device reliability. This Enterprise Management Associates (EMA) RADAR report identifies the sixteen leading MDM platforms and empirically compares and grades them against a broad range of measurements to determine overall product strengths and cost efficiencies.



Automating for Digital Transformation: Tools-Driven DevOps and Continuous Software Delivery in the Enterprise

PUBLISHED: Tue, 15 Dec 2015 00:00:00 +0000
AUTHOR: Julie Craig

This Enterprise Management Associates (EMA) research report builds on EMA's earlier research on these same topics. It reflects the findings of survey data gathered during the month of October, 2015 from technology professionals "on the front lines" of application delivery. It assesses the degree of alignment between IT and business, uncovers best practices for DevOps and Continuous Delivery in high performing companies, and evaluates the role of tools in promoting a growing Digital Economy. Finally, it identifies the links between both DevOps and Continuous Delivery and revenue growth and reveals the top "wish list" tools in these spaces for 2016.



Report Summary - Automating for Digital Transformation: Tools-Driven DevOps and Continuous Software Delivery in the Enterprise

PUBLISHED: Tue, 15 Dec 2015 00:00:00 +0000
AUTHOR: Julie Craig

This is a summary of the EMA research report, "Automating for Digital Transformation: Tools-Driven DevOps and Continuous Software Delivery in the Enterprise."


Full Report Abstract
This Enterprise Management Associates (EMA) research report builds on EMA's earlier research on these same topics. It reflects the findings of survey data gathered during the month of October, 2015 from technology professionals ìon the front linesî of application delivery. It assesses the degree of alignment between IT and business, uncovers best practices for DevOps and Continuous Delivery in high performing companies, and evaluates the role of tools in promoting a growing Digital Economy. Finally, it identifies the links between both DevOps and Continuous Delivery and revenue growth and reveals the top "wish list" tools in these spaces for 2016.



IBM Rolls Out Smart IT Solutions with Runbook Automation and Alert Notification Services

PUBLISHED: Fri, 04 Dec 2015 00:00:00 +0000
AUTHOR: Dennis Drogseth

The notion that IT organizations are at a pivotal point in their evolution has almost become a cliché.  Terms like "cloud," "mobile," "agile," and "digital transformation" are among the phrases that often herald how and why IT must change. 

However, what's too often neglected in all the glitz and hype is the need to combine accessible, enabling technological advances with a well-thought-out human interface, along with process values and a clear understanding of role-related and organizational needs. Indeed, in EMA's recent research on digital and IT transformation, issues in organization, process, and dialog trumped technology-specific roadblocks for both business and IT stakeholders. And when it came to metrics, availability and performance stood out as the top concerns for all roles. After all, it’s hard for a service to be transformative when it’s not there!

It's therefore with delight that EMA has had the privilege of reviewing IBM's new offerings for runbook automation and alert notification. The two solutions are meaningfully intertwined with an eye to clear benefit-driven parameters, and both offer what might be called an "IT-smart" approach to building new levels of effectiveness in IT operations, as well as improved efficiencies between operations and the service desk.



Unified Performance Management: Moving Beyond the Silos

PUBLISHED: Mon, 23 Nov 2015 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Enterprises are adopting hybrid clouds and software-defined infrastructure to accelerate their ability to deliver scalable applications in a very competitive business environment. These new architectures are extremely complex, which is forcing IT organizations to establish multidisciplinary cross-domain operations teams to support them. These teams need unified performance management and service assurance platforms that encourage collaboration and provide cross-domain operational visibility. Riverbed SteelCentral Platform is an example of a management system that combines application performance management (APM), network performance management (NPM) and network configuration management into a unified solution that helps IT operations support application delivery more effectively and efficiently.



Analytics in the Cloud Research Summary for SAP

PUBLISHED: Mon, 16 Nov 2015 00:00:00 +0000
AUTHOR: John Myers

Cloud-based applications have been mainstream since Salesforce.com brought customer relationship management to the masses in the 2000s. Cloud implementations had the advantage of providing faster time to provisioning and a significantly different cost structure from traditional software implementations based on on-premises installations. However, analytics and business intelligence in the cloud were slower to reach widespread acceptance. First, analytical and business intelligence applications have different data schema implementations from traditional operational applications. These applications can be uniquely configured for individual organizations and are often more difficult to implement on a mass basis than they might be for an operational system.

To determine the status of Analytics and Business Intelligence in the Cloud, Enterprise Management Associates (EMA) embarked on an end-user research study to look at the current state of cloud-based analytics. For this research, EMA invited pre-qualified business stakeholders and information technology professionals to complete an extensive web-based survey. As part of the survey, 257 panelists responded to an invitation to provide their insights on cloud-based analytics and business intelligence strategies and implementation practices. To offer a neutral enterprise view, the respondent pool was also balanced. Business stakeholders represented 44% of respondents. Technologists were 56% of the panel. The survey was executed in November 2014 with respondents from around the world including North America and Europe.



2015 EMA Vendors to Watch: Network Management

PUBLISHED: Fri, 13 Nov 2015 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2015 EMA Vendors to Watch in the Network Management field including:

Arkin
Avi Networks
Dispersive Technologies
Kentik
Real Status
Teridion
VeloCloud
YOTTAA 



Advanced Security Analytics in Achieving Continuous Security Intelligence

PUBLISHED: Tue, 03 Nov 2015 00:00:00 +0000
AUTHOR: David Monahan

Information Security has always been a large producer and consumer of data. More sophisticated best practices and expanding compliance and regulatory requirements have almost exponentially accelerated the production and consumption of data. Event and activity logs have grown to Big Data proportions and the diversity of data being consumed has become significantly more varied. As the need for continuous security intelligence and accelerated incident response increases, traditional log and event management tools and monitoring practices are becoming increasingly insufficient.

IT and Security are deluged with thousands of alerts daily, a majority of which appear to be critical, making response an insurmountable task with affordable staff levels and traditional tools. With so many critical alerts, they have moved from the analogy of finding the needle in the haystack to identifying and prioritizing THE needle in the stack of needles.

The era of Big Data has begun demonstrating to information security that there is more that can, and must, be done to identify threats, reduce risk, address fraud and improve compliance monitoring activities by bringing better context to data creating information for actionable intelligence. 

This research studies how both management and operations level IT and information security practitioners perceive the change in the volume and types of data available and the tools needed to provide analysis to generate actionable threat intelligence. 

Advanced security analytics provide new adaptive algorithms called Machine Learning and Big Data analysis techniques that can be utilized to identify abstract data relationships, anomalies, trends, fraudulent and other behavioral patterns, creating information where only data existed. The era of Big Data is driving the next technology evolution. 

Security analytics, though a relatively new field of technology, is the next step in detection and response technology, with possible impacts on prevention as well. Machine-learning algorithms and analysis techniques have advanced far beyond the capabilities of what was available in the commercial markets only 2-3 years ago. They also address the issue dubbed "We don’t know what we don't know." Security analytics' core function is to monitor and collect vast amounts of information from the environment to identify threats that indicate elevated risk and ultimately prevent lateral spread of those threats and data exfiltration. To succeed in this endeavor, the analytics platform performs the identification of threats and prioritization of threats without the requirement for the administrators and analysts to create policies or rules.

Security analytics tools provide practitioners a means to meet their needs for continuous actionable security intelligence to provide timely response to attacks to prevent attacks from becoming breaches.



Overcoming the Top 5 Challenges to Windows 10 Adoption

PUBLISHED: Mon, 02 Nov 2015 00:00:00 +0000
AUTHOR: Steve Brasen

The introduction of Windows 10 promises a wealth of advantages for enhancing user experiences. Most notably, it unifies the operating environment across mobile and PC endpoints. However, organizations faced with performing mass migrations to the new platforms face a number of significant challenges. Revealed in this EMA white paper are the top 5 challenges to the enterprise adoption of Windows 10 and the prescriptive identification of solutions that will ensure simplified, reliable, and cost-effective migration processes.



2015 EMA Vendors to Watch: Storage Management

PUBLISHED: Fri, 16 Oct 2015 00:00:00 +0000
AUTHOR: Jim Miller

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2015 EMA Vendors to Watch in the Storage Management field including:

A3CUBE
Catalogic
ioFABRIC
Unitrends
XOcur



Automic Continuous Delivery for Siebel: Pain Relief for Siebel Agility Headaches

PUBLISHED: Tue, 13 Oct 2015 00:00:00 +0000
AUTHOR: Julie Craig

Recently, Automic has augmented its flagship Automic Release Automation product (ARA) with a new set of capabilities and templates supporting the unique architectural, operational, and administrative aspects of Oracle's Siebel Customer Relationship Management (CRM) solution. Automic Continuous Delivery for Siebel enables development teams to deliver Siebel-specific upgrades and modifications at a level of agility commensurate with that of the web applications and mobile ìappsî that interoperate with Siebel code and data.

This Enterprise Management Associates (EMA) white paper details the capabilities of this new solution and its value proposition for companies seeking to accelerate Continuous Delivery in Siebel environments.



Report Summary - Security Awareness Training: Are We Getting Any Better at Organizational and Internet Security?

PUBLISHED: Tue, 06 Oct 2015 00:00:00 +0000
AUTHOR: David Monahan


Full Report Abstract
2014 was dubbed "the year of the breach" as over a billion consumer records across nearly every industry vertical worldwide were exposed, costing billions of dollars in recovery costs and lost revenue for the affected organizations. Though this was a tough wake-up call, many organizations have seen that technology, though a necessary part of a security strategy, is not able to fully prevent breaches. They see that people are now most often the weakest link in security defense. At the same time, the old strategies of locking down everything so people cannot possibly cause a problem increases worker and business friction to a point that is unacceptable to both, putting security programs, and the security personnel, at-risk. To achieve both security and usability, security teams must create a change in the mentality and even business culture that by making personnel more aware of and vigilant against the various attacks they face on a near daily basis.

For the 2015 Security Awareness Training: Are We Getting Any Better at Organizational and Internet Security? report, EMA surveyed nearly 600 people in North America across the small-to-medium businesses (SMB), midmarket, and enterprise spaces. Respondents represented line of business, IT, and security/fraud/risk across major verticals including education, finance/banking/insurance, government/nonprofit, health care/medical/pharma, retail, and utilities/infrastructure. 

The research revealed that a tremendous shift in awareness training programs has taken place, especially across the previously underserved SMB space. While in 2014 56% of individuals reported they had not received any training from their organizations, in 2015, 59% indicated they had now received some level of training. Many positive trends continued in the research showing the following.

** Training content is becoming more accessible to organizations of all sizes from both a delivery and cost perspective.
** Programs are becoming more effective and have better measurement and management capabilities.
** Due to training, employees are better at recognizing various forms of social engineering.
** Trained personnel recognize that they make better security choices at home as well as at work, further increasing the value of training.

Through awareness, as a collective corporate and Internet populace we are becoming more diligent in detecting and avoiding compromise by social engineering methods, especially phishing attacks. However, attackers are constantly honing their skills and adapting their attack methods. Only through continued diligence and expansion can we be successful in the long run. Program content and delivery must change to include new attack methods and programs must continue to expand to train the other 41% that have not received training as of yet.



Digital and IT Transformation: A Global View of Trends and Requirements

PUBLISHED: Wed, 30 Sep 2015 00:00:00 +0000
AUTHOR: Dennis Drogseth

The world of IT services and the world of business or organizational services are coming together as never before. This is true both in terms of the magnitude of the impacts on IT culture and organization, and in terms of the variety of ways that IT services, digital services, and business services are becoming a single interconnected continuum. The two key drivers for this transformation are actually intertwined--the fact that digital services are impacting, and in many cases recreating, entire business models is not at all unrelated to the emergence of a new population of consumers that are far more inclined to view digital services as a part of their everyday lives. 

The term most often applied to this transition as viewed from a business perspective is "digital transformation." When an organization is focused on IT becoming more effective in and of itself in support of the business, the term most typically used has been "IT transformation."  

In order to provide a data-driven foundation for addressing the many challenges described above, Enterprise Management Associates (EMA) undertook research targeting digital and IT transformation. Our goal was to discover what the truth really is surrounding these critical (and sometimes overused) terms. To optimize the depth and value of this unique research, EMA partnered with the IT Transformation Institute.



Report Summary - Digital and IT Transformation: A Global View of Trends and Requirements

PUBLISHED: Wed, 30 Sep 2015 00:00:00 +0000
AUTHOR: Dennis Drogseth

This is a summary of the EMA research report, Digital and IT Transformation: A Global View of Trends and Requirements.

Full Report Abstract
The world of IT services and the world of business or organizational services are coming together as never before. This is true both in terms of the magnitude of the impacts on IT culture and organization, and in terms of the variety of ways that IT services, digital services, and business services are becoming a single interconnected continuum. The two key drivers for this transformation are actually intertwined--the fact that digital services are impacting, and in many cases recreating, entire business models is not at all unrelated to the emergence of a new population of consumers that are far more inclined to view digital services as a part of their everyday lives. 

The term most often applied to this transition as viewed from a business perspective is "digital transformation." When an organization is focused on IT becoming more effective in and of itself in support of the business, the term most typically used has been "IT transformation."  

In order to provide a data-driven foundation for addressing the many challenges described above, Enterprise Management Associates (EMA) undertook research targeting digital and IT transformation. Our goal was to discover what the truth really is surrounding these critical (and sometimes overused) terms. To optimize the depth and value of this unique research, EMA partnered with the IT Transformation Institute.



2015 EMA Vendors to Watch: Hybrid Cloud & Infrastructure Management Research (HCIM)

PUBLISHED: Fri, 25 Sep 2015 00:00:00 +0000
AUTHOR: Dan Twing

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2015 EMA Vendors to Watch in the Hybrid Cloud & Infrastructure Management Research (HCIM) field including: 

Sysdig
ZeroStack



Copy Data Management, An Economic Impact Analysis

PUBLISHED: Tue, 22 Sep 2015 00:00:00 +0000
AUTHOR: Jim Miller

Storage is now the leading consumer of the IT budget in most enterprises. A large contributor to storage costs is the number of data copies needed for the many mission-critical functions that IT handles such as data protection, business analytics and test development. A copy data management solution can bring efficiencies to the copy data management function, while improving IT's ability to meet its service level agreements (SLAs) and other commitments to the business. Catalogic's ECX extends beyond traditional copy data management solutions, allowing the IT team to manage the process of copy creation, and to orchestrate the use of copy data in support of the various functions that require it. ECX is unique in that it is designed to plug into the existing virtualization and storage technologies that are already deployed in the data center, rather than requiring the deployment of net new infrastructure. This has the potential to yield significant ROI to the IT organization and can deliver costs savings measured in millions of dollars over brief time horizons. This paper identifies and quantifies the cost savings realized from ECX, using a hypothetical IT environment for a medium-to-large business.  While the paper quantifies the costs for a specific environment, the results can be extrapolated up or down to predict cost savings for other organizations



Report Summary - EMA Research Report: Data-Driven Security Reloaded: A Look into Data and Tools Used for Prevention Detection and Response

PUBLISHED: Mon, 21 Sep 2015 00:00:00 +0000
AUTHOR: David Monahan


Full Report Abstract
Security professionals often wrestle with the unknown, struggling with a daunting array of exposures and threats. They are not trying to identify the needle in the haystack but the needle in the stack of needles. Each activity within a network, system, or application may be "the one" that indicates an Advanced Persistent Threat (APT) has taken hold or an insider has gone rogue and requires a response. But how do they know which one is the one?

In most cases, the key to success is not just more data but better data -- data that provides context to improve incident analysis and, therefore, appropriate and timely response. Better data can also help security teams to be more proactive. Accurate and timely information in the volumes collected today, however, is not manageable by human hands and eyes alone. Security professionals need the tools that allow them to identify the how and where attacks succeed in overcoming defenses.

In the update to the 2014 Evolution of Data-Driven Security study, Enterprise Management Associates (EMA) returns with updated research that encompasses the insight of over 200 IT and security practitioners and management worldwide, ranging from the SMBs to the enterprise markets across key industry verticals including financial, retail, federal government & aerospace, local government, technology, manufacturing, and utilities & infrastructure. EMA explores how data-driven security continues to evolve security tactics looking at 18 different categories of security tools to understand security management and strategy, and the data sources fueling those efforts.

Some of the questions this new research will answer include:
  • How is the data explosion affecting security prevention, detection, and response?
  • What are the best tools of gaining context for security alerts?
  • Which is more important for gaining context, endpoint data or
  • network data?
  • Which types of data and tools are most useful for improving prevention?
  • Which types of data and tools are most useful for improving detection?
  • Which types of data and tools are most useful for improving response?
  • What are the preferred tools and data for data analysis?



Security Awareness Training: Are We Getting Any Better at Organizational and Internet Security?

PUBLISHED: Tue, 15 Sep 2015 00:00:00 +0000
AUTHOR: David Monahan

2014 was dubbed "the year of the breach" as over a billion consumer records across nearly every industry vertical worldwide were exposed, costing billions of dollars in recovery costs and lost revenue for the affected organizations. Though this was a tough wake-up call, many organizations have seen that technology, though a necessary part of a security strategy, is not able to fully prevent breaches. They see that people are now most often the weakest link in security defense. At the same time, the old strategies of locking down everything so people cannot possibly cause a problem increases worker and business friction to a point that is unacceptable to both, putting security programs, and the security personnel, at-risk. To achieve both security and usability, security teams must create a change in the mentality and even business culture that by making personnel more aware of and vigilant against the various attacks they face on a near daily basis.

For the 2015 Security Awareness Training: Are We Getting Any Better at Organizational and Internet Security? report, EMA surveyed nearly 600 people in North America across the small-to-medium businesses (SMB), midmarket, and enterprise spaces. Respondents represented line of business, IT, and security/fraud/risk across major verticals including education, finance/banking/insurance, government/nonprofit, health care/medical/pharma, retail, and utilities/infrastructure. 

The research revealed that a tremendous shift in awareness training programs has taken place, especially across the previously underserved SMB space. While in 2014 56% of individuals reported they had not received any training from their organizations, in 2015, 59% indicated they had now received some level of training. Many positive trends continued in the research showing the following.

** Training content is becoming more accessible to organizations of all sizes from both a delivery and cost perspective.
** Programs are becoming more effective and have better measurement and management capabilities.
** Due to training, employees are better at recognizing various forms of social engineering.
** Trained personnel recognize that they make better security choices at home as well as at work, further increasing the value of training.

Through awareness, as a collective corporate and Internet populace we are becoming more diligent in detecting and avoiding compromise by social engineering methods, especially phishing attacks. However, attackers are constantly honing their skills and adapting their attack methods. Only through continued diligence and expansion can we be successful in the long run. Program content and delivery must change to include new attack methods and programs must continue to expand to train the other 41% that have not received training as of yet.



OpenStack Demands New Approach to Application Delivery: Self-Service, Multitenancy, Elastic Scale, and Guaranteed Application Performance

PUBLISHED: Mon, 14 Sep 2015 00:00:00 +0000
AUTHOR: Tracy Corbo, Former EMA Analyst

For any organization that wishes to control its cloud infrastructure without getting locked into a vendor-specific cloud universe, OpenStack offers an ideal foundation for building a flexible cloud ecosystem. At its heart, OpenStack provides a set of open cloud computing services that can run on standard commodity hardware. In building out that cloud infrastructure, however, it is critical to work both visibility and application delivery into the design. Traditional methods for handling application delivery, such as load balancers (LBs) and application delivery controllers (ADCs), were designed for on-premise data centers and fell into the domain of the network administrators. Cloud computing represents a fundamental shift in both operational and administrative models. Cloud computing has moved the compute component from a dedicated application-to-fixed infrastructure model to one that is based on a detached set of pooled resources shared across multiple applications requiring minimal hands-on intervention from networking experts. Consequently, traditional methods for monitoring, troubleshooting, and optimizing application delivery are not effective in this new cloud paradigm. This white paper examines the challenges of guaranteeing application performance in OpenStack-based cloud environments and looks at new alternatives to traditional application delivery solutions.



LiveAction: The Visibility Assurance Solution for Cisco Intelligent WAN

PUBLISHED: Fri, 11 Sep 2015 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

With its support of advanced Cisco technologies like Performance Routing and Application Visibility and Control, network performance management vendor LiveAction provides critical visibility and service assurance capabilities to Intelligent WAN (IWAN), Cisco's software-defined WAN (SD-WAN) solution. In general, SD-WAN solutions like IWAN introduce new and powerful technologies that help enterprises reduce costs and improve network performance and reliability. However, to fully take advantage of these technologies in IWAN, enterprises need a visibility and assurance platform that fully exposes IWAN's underlying technologies to the network management team. LiveAction provides that management and visibility layer. It empowers users to provision, monitor, and troubleshoot IWAN and adopt an application-centric, policy-based approach to wide-area networking. 



EMA Radar for Business Intelligence Platforms for Midsized Organizations: Q4 2015

PUBLISHED: Wed, 09 Sep 2015 00:00:00 +0000
AUTHOR: Lyndsay Wise

This EMA RADAR report focuses on how business intelligence platforms meet the unique needs of the midsized market place and which influences have the most impact on the operation of those smaller businesses. Looking at nine vendors in the business intelligence platform marketplace, EMA found that midsize organizations can expect to derive robust benefit from the participating vendors in this EMA RADAR report. Four (4) were rated as Value Leaders--the highest ranking category--in the RADAR evaluation. Another five (5) of the nine (9) vendors were scored in Strong Value--the second highest ranking category. This scoring shows that midsized organizations that are considering any of the solutions included in the EMA RADAR report will find significant value.



Report Summary - EMA Radar for Business Intelligence Platforms for Midsized Organizations: Q4 2015

PUBLISHED: Wed, 09 Sep 2015 00:00:00 +0000
AUTHOR: Lyndsay Wise

This is a summary of the EMA Radar for Business Intelligence Platforms for Midsized Organizations: Q4 2015.


Report Abstract
This EMA RADAR report focuses on how business intelligence platforms meet the unique needs of the midsized market place and which influences have the most impact on the operation of those smaller businesses. Looking at nine vendors in the business intelligence platform marketplace, EMA found that midsize organizations can expect to derive robust benefit from the participating vendors in this EMA RADAR report. Four (4) were rated as Value Leaders--the highest ranking category--in the RADAR evaluation. Another five (5) of the nine (9) vendors were scored in Strong Value--the second highest ranking category. This scoring shows that midsized organizations that are considering any of the solutions included in the EMA RADAR report will find significant value.



Moving to the Cloud: The Emerging Paradigm for Analytical Environment

PUBLISHED: Wed, 05 Aug 2015 00:00:00 +0000
AUTHOR: John Myers

Although viewed as a fairly recent phenomenon, the emergence of the cloud computing paradigm has been decades in the making. With this cloud infrastructure in place, software vendors began introducing the multitenant software as a service (SaaS) solutions, enabling the enterprise to outsource the management of critical enterprise applications. These applications not only provided significant business value in their own right, they served as a vital proof-of-concept for secure and high-performance delivery to the enterprise via the cloud. The evolution of the cloud continued with the introduction of infrastructure as a service (IaaS) offerings, providing computing and storage resources for companies who wanted to deploy noncloud-native applications and processes via the cloud. This was followed by the introduction of platform as a service (PaaS) offerings, which provide a cloud-based framework by which the enterprise can develop and manage its own applications.

The movement of data, resources, and processes to the cloud represents one of the most significant shifts in the history of enterprise computing, bringing about the same kinds of widespread transformation as such previous game changing developments as the introduction of personal computers and the advent of the Worldwide Web. And the trend is far from over. If anything, movement to the cloud is accelerating as the reliability of the platform becomes apparent to organizations that have implemented it, as services offered via the cloud continue to grow and mature, and as rapidly changing business requirements propel businesses to adopt new practices, processes, and methodologies favoring decentralized, non-localized, and/or virtualized deployment.



Combining Log, Metric, and Flow-Based Analytics: A Solution for Integrated, Real-Time Network Operations

PUBLISHED: Tue, 28 Jul 2015 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Log data analysis has traditionally been a forensic tool. The vast amount of machine data contained in log records has always been too unwieldy for real-time analysis and, therefore, has been difficult to integrate into infrastructure performance monitoring workflows. Instead, network engineers have relied on data sources that enable near-real-time analysis, such as Simple Network Management Protocol (SNMP) polling, flow analysis, and packet analysis. If and when network managers did turn to log analysis, it was only to understand an event long after it happened. But the log analytics status quo is changing. Increasingly, network managers are looking for ways to integrate log data into their overall performance management toolsets. This paper examines how log analytics can enhance network performance management. It also looks at how one solution from SevOne combines device metric analysis and network flow analysis with real-time log analytics to enhance network visibility and streamline triage and diagnostics workflows.



Back to the Future with the "API Economy": Management Strategies for a New Wave of Integrated Applications

PUBLISHED: Mon, 27 Jul 2015 00:00:00 +0000
AUTHOR: Julie Craig

APIs provide a way for one software application or system to interact with another. Some enterprise IT organizations are acting as API providers--creating APIs to provide access to their own internal systems. Others are acting as API consumers--connecting their own applications to those of other entities by using APIs provided by those entities. And a hefty percentage of companies are doing both.
However, with all the hype around the so-called "API economy," APIs aren't a shiny new technology--they've been around a long time. And in the final analysis, APIs are simply codeóproprietary code--allowing disparate systems to interoperate. 

In a world accustomed to the ease of use and high performance of commercial products supporting Enterprise Application Integration (EAI) and Enterprise Service Bus (ESB) connections, APIs are a clunky, inelegant solution. Each is custom written and must be manually maintained to keep pace with business and industry changes. Performance is variable and unpredictable, based on the connection method, the availability/capacity of back-end systems, and the efficiency of the code itself. As API usage escalates, capacity demands on back-end systems can grow exponentially. And to top it all off, many traditional Application Performance Management (APM) solutions lack support for API connections, making troubleshooting and root-cause analysis difficult.

With this survey-based research, Enterprise Management Associates (EMA) analysts set out to assess the API economy from multiple dimensions. Examining both the "consumer" and "provider" sides of the equation, the study explores the challenges of API usage in todayís production environments. This white paper summarizes the survey findings on the deployment, management, and governance-related challenges of delivering API-driven services. 



Report Summary - Back to the Future with the API Economy: Management Strategies for a New Wave of Integrated Applications

PUBLISHED: Mon, 27 Jul 2015 00:00:00 +0000
AUTHOR: Julie Craig


Full Report Abstract 
APIs provide a way for one software application or system to interact with another. Some enterprise IT organizations are acting as API providers--creating APIs to provide access to their own internal systems. Others are acting as API consumers--connecting their own applications to those of other entities by using APIs provided by those entities. And a hefty percentage of companies are doing both.
However, with all the hype around the so-called "API economy," APIs aren't a shiny new technology--they've been around a long time. And in the final analysis, APIs are simply codeóproprietary code--allowing disparate systems to interoperate. 

In a world accustomed to the ease of use and high performance of commercial products supporting Enterprise Application Integration (EAI) and Enterprise Service Bus (ESB) connections, APIs are a clunky, inelegant solution. Each is custom written and must be manually maintained to keep pace with business and industry changes. Performance is variable and unpredictable, based on the connection method, the availability/capacity of back-end systems, and the efficiency of the code itself. As API usage escalates, capacity demands on back-end systems can grow exponentially. And to top it all off, many traditional Application Performance Management (APM) solutions lack support for API connections, making troubleshooting and root-cause analysis difficult.

With this survey-based research, Enterprise Management Associates (EMA) analysts set out to assess the API economy from multiple dimensions. Examining both the "consumer" and "provider" sides of the equation, the study explores the challenges of API usage in today's production environments. This white paper summarizes the survey findings on the deployment, management, and governance-related challenges of delivering API-driven services. 



Analytics in the Cloud: Five Components for Success

PUBLISHED: Thu, 23 Jul 2015 00:00:00 +0000
AUTHOR: Lyndsay Wise

Cloud solutions have arrived and are here to stay. Innovative companies are reviewing their data management strategies to identify where and how cloud implementations should play a role. These new programs are driven by an array of cloud-based value propositions and technology advancements that enable companies to disrupt traditional data management paradigms in favor of new ways to create value. Analytics has followed this trend and is providing new opportunities to serve enterprise end users and projects.

Cloud-based analytics are becoming commonplace as most industry sectors identify opportunities to augment or replace existing infrastructure with this cutting edge technology in the goal of providing a scalable and effective cloud-based analytical environment, there are several critical and integrated considerations for successful cloud implementations.

* Analytic Performance
* Flexibility
* Advanced Technologies
* Expert Support
* Enterprise Ecosystem

Each of these are required for an organization to make the most of their cloud analytics projects and should be fully evaluated and considered when making a choice regarding a cloud data management platform provider.



2015 EMA Vendors to Watch: Systems Management

PUBLISHED: Wed, 22 Jul 2015 00:00:00 +0000
AUTHOR: Steve Brasen

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2015 EMA Vendors to Watch in the Systems Management field including: 

IndependenceIT
SIOS Technology



EMA Research Report: Big Data Impacts on IT Infrastructure and Management

PUBLISHED: Wed, 22 Jul 2015 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Big data analytics enjoys a great deal of well-earned hype today. The application of advanced analytics to structured, partially structured, and unstructured data can unearth important insights that were previously impossible to find. If used correctly, big data can transform a business in countless ways. This research study by Enterprise Management Associates seeks to understand how big data impacts and transforms IT infrastructure. Not only does this report examine how the collection and analysis of vast amounts of data affects IT infrastructure and IT management practices. It also reveals how IT organizations transform themselves when they start to export IT infrastructure monitoring data to big data environments for advanced analytics. This report shows how big data analytics for IT enhances IT planning, monitoring, and troubleshooting practices and also reveals the types of IT monitoring data that organizations leverage for those purposes. Serving as a guide to enterprises that want to apply big data technology to their IT organizations, this report offers a roadmap not just for the optimization of IT infrastructure and operations, but also for the improved alignment of IT and business.



Understanding the Role Data Discovery Plays to Support Business Intelligence Strategy

PUBLISHED: Mon, 20 Jul 2015 00:00:00 +0000
AUTHOR: Lyndsay Wise

To meet modern business challenges -- including increases in competition, globalization, customer feedback through social media, and expanding supply chains and partnerships—organizations need to gain actionable insights from increasingly large and complex data sources. "Actionable" is key, because insights without impact mean little to the business. In essence, the challenge for most organizations is monetizing data: making money or saving money with data.  

To understand the role of data discovery in a business intelligence (BI) strategy, we should review the three ways organizations can apply BI based on different types of use. A successful information strategy employs all three to support better technology use and to make better decisions. These are Strategic, Analytical, and Operational.

The value of applying these three areas of BI should be obvious, but sometimes organizations get stuck applying one level without developing a comprehensive approach to analytics. This can limit the value of business intelligence because businesses look at their high-level goals or identify trends, but do not proactively monitor operational performance to identify how to meet targets and address challenges as they occur. Luckily, current technology can support these three areas without having to invest in separate initiatives. 



Impact of Purpose-Built Big Data Applications: Keeping Pace with the Speed of Business

PUBLISHED: Thu, 16 Jul 2015 00:00:00 +0000
AUTHOR: John Myers

Total cost of ownership (TCO) is a critical concern of organizations implementing big data initiatives. To that end, the acceleration of time to value is of great interest to sponsors of big data projects. Another reality of big data initiatives is that line of business executives and business-oriented analysts are important big data consumers. Application flexibility and ease of use can improve both technical and business-oriented staff productivity, also contributing to reductions in overall TCO.

As part of the need to shrink TCO, the concept of the purpose-built big data application (BDA) has arisen. BDAs provide organizations with a standardized framework that improves time to value. They also provide the flexibility to meet changing business requirements by bridging investment, time, and skills gaps. BDAs provide the pace of time to value that the speed of business requires.



EMA Research Report: Data-Driven Security Reloaded: A Look into Data and Tools Used for Prevention Detection and Response

PUBLISHED: Wed, 15 Jul 2015 00:00:00 +0000
AUTHOR: David Monahan

Security professionals often wrestle with the unknown, struggling with a daunting array of exposures and threats. They are not trying to identify the needle in the haystack but the needle in the stack of needles. Each activity within a network, system, or application may be "the one" that indicates an Advanced Persistent Threat (APT) has taken hold or an insider has gone rogue and requires a response. But how do they know which one is the one?

In most cases, the key to success is not just more data but better data -- data that provides context to improve incident analysis and, therefore, appropriate and timely response. Better data can also help security teams to be more proactive. Accurate and timely information in the volumes collected today, however, is not manageable by human hands and eyes alone. Security professionals need the tools that allow them to identify the how and where attacks succeed in overcoming defenses.

In the update to the 2014 Evolution of Data-Driven Security study, Enterprise Management Associates (EMA) returns with updated research that encompasses the insight of over 200 IT and security practitioners and management worldwide, ranging from the SMBs to the enterprise markets across key industry verticals including financial, retail, federal government & aerospace, local government, technology, manufacturing, and utilities & infrastructure. EMA explores how data-driven security continues to evolve security tactics looking at 18 different categories of security tools to understand security management and strategy, and the data sources fueling those efforts.

Some of the questions this new research will answer include:
  • How is the data explosion affecting security prevention, detection, and response?
  • What are the best tools of gaining context for security alerts?
  • Which is more important for gaining context, endpoint data or
  • network data?
  • Which types of data and tools are most useful for improving prevention?
  • Which types of data and tools are most useful for improving detection?
  • Which types of data and tools are most useful for improving response?
  • What are the preferred tools and data for data analysis?


     

Subscribe Now!


Subscribe with My Yahoo!

Subscribe with NewsGator

Subscribe with My AOL

Subscribe with Bloglines

Subscribe with Netvibes

Subscribe with Google

EMA on Facebook   EMA on LinkedIn   EMA on Twitter   EMA RSS   EMA on YouTube

©1996-2016 Enterprise Management Associates, Inc. All rights reserved.
EMA™, ENTERPRISE MANAGEMENT ASSOCIATES®, and the mobius symbol are registered trademarks or common-law trademarks of Enterprise Management Associates, Inc.
Site Terms & Conditions | Integrity Policy | Site Map | My Account
Hide
Subscribe to EMA RSS Feed
Email
Show