IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING

CONTACT    SIGN IN    SIGN UP
    

Free RSS Feeds from Enterprise Management Associates (EMA)

Stay up to date on the latest IT and data management information from EMA, including Webinars, Radar Reports, white papers, impact briefs, advisory notes and more!

Select your preferred reader by selecting an icon on the right.



Current Feed Content:




Best Practices for Optimizing IT with ITAM Big Data

PUBLISHED: Wed, 01 Jul 2015 00:00:00 +0000
AUTHOR: Dennis Drogseth

In this research report, we document some of the most prevalent obstacles to, and options for, achieving an accurate, current, and meaningful ITAM record across IT silos. We then show how an effective ITAM record can be meaningfully applied to critical business-driven IT strategies. Finally, we conclude by documenting the attributes of the most successful ITAM and financial management teams--who are they, and what makes them shine?



EMA Radar for Software-defined Storage: Q2 2015

PUBLISHED: Tue, 30 Jun 2015 00:00:00 +0000
AUTHOR: Jim Miller

Data creation is growing at unprecedented rates with the amount of information stored doubling every year. Data is now more active throughout the lifecycle, with analytics driving competitive advantage in sales and marketing and compliance requirements needed to be met to satisfy legal obligations as well as governance.The diversity and volume of data are placing extreme operational and capital demands on an already overburdened IT. Software-defined storage (SDS) is a new technology that targets meeting these new requirements while controlling costs. SDS aims at making storage application-aware, enabling server administrators, application managers, and developers to provision storage in a policy-driven, automated self-service manner.


This EMA Radar report focuses on the core capabilities needed to deliver SDS throughout the entire enterprise. There is much more diversity with storage solutions throughout the enterprise. Storage solutions, even those from the same vendor, can have unique hardware, operating systems, connectivity, services, application program interfaces, and data types (block, file, and object). An enterprise-wide approach is preferred because one cannot get the full benefit of software-defined storage unless it is implemented on all storage in the enterprise.



Report Summary - EMA Radar for Software-defined Storage: Q2 2015

PUBLISHED: Tue, 30 Jun 2015 00:00:00 +0000
AUTHOR: Jim Miller


Report Abstract
Data creation is growing at unprecedented rates with the amount of information stored doubling every year. Data is now more active throughout the lifecycle, with analytics driving competitive advantage in sales and marketing and compliance requirements needed to be met to satisfy legal obligations as well as governance.The diversity and volume of data are placing extreme operational and capital demands on an already overburdened IT. Software-defined storage (SDS) is a new technology that targets meeting these new requirements while controlling costs. SDS aims at making storage application-aware, enabling server administrators, application managers, and developers to provision storage in a policy-driven, automated self-service manner.

This EMA Radar report focuses on the core capabilities needed to deliver SDS throughout the entire enterprise. There is much more diversity with storage solutions throughout the enterprise. Storage solutions, even those from the same vendor, can have unique hardware, operating systems, connectivity, services, application program interfaces, and data types (block, file, and object). An enterprise-wide approach is preferred because one cannot get the full benefit of software-defined storage unless it is implemented on all storage in the enterprise.



Open Cloud Management and Orchestration 2015: Adoption and Experiences

PUBLISHED: Tue, 23 Jun 2015 00:00:00 +0000
AUTHOR: Dan Twing

Cloud services and technologies are quickly maturing, and a steadily increasing percentage of workloads are being moved to the cloud. While both public and private workload deployments are expected to rise steadily, the fastest growing category is hybrid cloud, which is growing by more than 40% annually. Hybrid cloud presents unique challenges as it brings significantly higher degrees of complexity and operational risk to deployments than pure cloud does. While most who have deployed cloud environments feel they have been successful, those who feel the most successful with their cloud implementations show higher adoption rates of orchestration and automation technologies such as OpenStack. Open cloud technologies are also viewed as contributing to more cost-effective and automated IT operations, with the significant majority if IT practitioners seeing open cloud technology as a catalyst for innovation.



Open Cloud Management and Orchestration 2015: Research Highlights for IBM

PUBLISHED: Mon, 22 Jun 2015 00:00:00 +0000
AUTHOR: Dan Twing

Cloud services and technologies are quickly maturing, and a steadily increasing percentage of workloads are being moved to the cloud. While both public and private workload deployments are expected to rise steadily, the fastest growing category is hybrid cloud, which is growing by more than 40% annually. Hybrid cloud presents unique challenges as it brings significantly higher degrees of complexity and operational risk to deployments than pure cloud does. While most who have deployed cloud environments feel they have been successful, those who feel the most successful with their cloud implementations show higher adoption rates of orchestration and automation technologies such as OpenStack. Open cloud technologies are also viewed as contributing to more cost-effective and automated IT operations, with the significant majority if IT practitioners seeing open cloud technology as a catalyst for innovation.



Report Summary - Open Cloud Management and Orchestration 2015: Adoption and Experiences

PUBLISHED: Mon, 22 Jun 2015 00:00:00 +0000
AUTHOR: Dan Twing

This is a summary document of the EMA research report "Open Cloud Management and Orchestration 2015: Adoption and Experiences."

 

Report Abstract

Cloud services and technologies are quickly maturing, and a steadily increasing percentage of workloads are being moved to the cloud. While both public and private workload deployments are expected to rise steadily, the fastest growing category is hybrid cloud, which is growing by more than 40% annually. Hybrid cloud presents unique challenges as it brings significantly higher degrees of complexity and operational risk to deployments than pure cloud does. While most who have deployed cloud environments feel they have been successful, those who feel the most successful with their cloud implementations show higher adoption rates of orchestration and automation technologies such as OpenStack. Open cloud technologies are also viewed as contributing to more cost-effective and automated IT operations, with the significant majority if IT practitioners seeing open cloud technology as a catalyst for innovation. 



The Borderless Enterprise: The Importance of Monitoring and Managing Cloud Applications and Shadow IT

PUBLISHED: Tue, 16 Jun 2015 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

On May 11, 2015, The enterprise network used to be a walled garden where the IT organization owned or controlled 100% of the infrastructure. With that control came a degree of predictability for IT operations, which could maintain a fairly static set of tools and processes for managing, optimizing, and securing the infrastructure. Cloud services and mobility have blurred the lines of that walled garden, creating a new borderless world where delivering secure, high-performance applications and services is a much more complex task.



2015 EMA Vendors to Watch: Application Management

PUBLISHED: Thu, 14 May 2015 00:00:00 +0000
AUTHOR: Julie Craig

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2015 EMA Vendors to Watch in the Application Management field including:

Agigee
StackStorm



Data-Driven Security Reloaded: Summary of Research Findings for Endpoint Threat Detection, Prevention, and Response

PUBLISHED: Fri, 08 May 2015 00:00:00 +0000
AUTHOR: David Monahan

Information security has always been a large producer and consumer of data. More sophisticated best practices and expanding compliance and regulatory requirements have almost exponentially accelerated the production and consumption of data. Event and activity logs have grown to big data proportions and the diversity of data being consumed has become significantly more varied. As a result, traditional log and event management tools and monitoring practices are becoming increasingly insufficient.

To add to this, the problem of maintaining security for an environment is at an all-time low. Executives are being dismissed or forced to resign post breach whether they knew about security issues prior to the breach or not. Threats seem to come from every angle. Not only are attackers consistently probing, but the attacks themselves are more persistent; once a foothold is achieved, detection and removal are also more difficult.

This research summary discusses how "the death of antivirus" has not meant the end of protecting the endpoint. Both management- and operations-level IT and information security practitioners are re-embracing the idea that, despite the onslaught of malware and other persistent threats to endpoints, prevention is possible with endpoint threat detection and response (ETDR) technologies.

Over the last year, ETDR solutions have seen a significant surge in adoption, jumping the technology chasm from an emerging technology into a growth technology (see Figure 1 in the Analysis Summary). Through a best of breed approach, administrators and security personnel responsible for protecting information are getting higher fidelity data to provide better context for preventing incidents in a world where traditional prevention methods have often failed. ETDR tools provide practitioners with a means to thwart attacks and verify success via bidirectional information exchange with other systems. Bit9 + Carbon Black and Enterprise Management Associates have partnered to provide this research, which identified that nearly 80% of respondents believed that ìconsistent prevention of stealthy threats, advanced persistent threats, or advanced target attacks are possible with technology solutions existing today."



2015 EMA Vendors to Watch: Service Management

PUBLISHED: Wed, 06 May 2015 00:00:00 +0000
AUTHOR: Dennis Drogseth

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2015 EMA Vendors to Watch in the Service Management field including:

FixStream



2015 EMA Vendors to Watch: Storage Management

PUBLISHED: Mon, 04 May 2015 00:00:00 +0000
AUTHOR: Jim Miller

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2015 EMA Vendors to Watch in the Storage Management field including:

Unitrends



Best Practices: Maximizing Efficiency Through Service Automation

PUBLISHED: Fri, 24 Apr 2015 00:00:00 +0000
AUTHOR: Steve Brasen

Survival in today's dynamic marketplaces is dependent on the prompt and reliable delivery of IT services. The demands from both customers and employees for more simplified access to IT services are driving organizations to become more agile in how the services are delivered and to ensure they meet rapidly increasing requirements for security, compliance, and user convenience. Making matters worse, IT organizations are consistently pressured to reduce operational costs while meeting these increased demands. In this white paper, EMA identifies key best practices for delivery IT services through the effective adoption of automation.



Effective Change Management: Maximizing IT Reliability Through Service Automation

PUBLISHED: Fri, 24 Apr 2015 00:00:00 +0000
AUTHOR: Steve Brasen

Survival in today's dynamic marketplaces is dependent on the prompt and reliable delivery of IT services. The demands from both customers and employees for more simplified access to IT services are driving organizations to become more agile in how the services are delivered and to ensure they meet rapidly increasing requirements for security, compliance, and user convenience. Making matters worse, IT organizations are consistently pressured to reduce operational costs while meeting these increased demands. In this white paper, EMA identifies key best practices for delivery IT services through the effective adoption of automation.



Empower Your Mobile Workforce: Adopting Service Automation to Achieve Unified Endpoint Management

PUBLISHED: Mon, 20 Apr 2015 00:00:00 +0000
AUTHOR: Steve Brasen

Empowering a mobile workforce is essential in any modern enterprise to meet business goals and remain competitive in the marketplace. The core goal of mobility is to enable users to access business resources -- including applications, data and other services (such as email, messaging and databases) -- from any device at any location at any time.In the white paper, EMA discusses the changing face of Enterprise Mobility Management and provides guidance on optimal methods for transitioning IT operations to support a mobile workforce.



Data-Driven Security Reloaded: Summary of Research Findings - Damballa

PUBLISHED: Thu, 16 Apr 2015 00:00:00 +0000
AUTHOR: David Monahan

Information security has always been a large producer and consumer of data. More sophisticated best practices and expanding compliance and regulatory requirements have almost exponentially accelerated the production and consumption of data. Event and activity logs have grown to big data proportions and the diversity of data being consumed has become significantly more varied. As a result, traditional log and event management tools and monitoring practices are becoming increasingly insufficient.

To add to this, the success record of maintaining security for an environment is at an all-time low. Executives are being dismissed or forced to resign post breach whether they knew about security issues prior to the breach or not. Threats seems to come from every angle. Not only are attackers consistently probing, but the attacks themselves are more persistent and difficult to block; once a foothold is achieved, detection and removal are also more difficult.

This research summary discusses how both management- and operations-level IT and information security practitioners are impacted by staffing shortages, lack of visibility into their environments, and how they are getting higher fidelity data to provide better context for detection and response to incidents in a world where prevention has often failed. Security analytics tools provide practitioners with a way to meet their actionable threat intelligence needs for an appropriately prioritized, timely response to attacks. Damballa and Enterprise Management Associates have partnered to provide this research, which identified that across the board, 79% of respondents were only "somewhat confident" in to "highly doubtful" of  their ability to detect an important security issue before it had significant impact. In contrast , 95% of the participants using security analytics were between "highly confident" in and "somewhat confident" of their ability to detect similar issues, thus demonstrating that the information security discipline needs next generation analytics capabilities to be successful in the age of advanced and persistent threats.



Data-Driven Security Reloaded: Summary of Research Findings - Prelert

PUBLISHED: Wed, 15 Apr 2015 00:00:00 +0000
AUTHOR: David Monahan

Information security has always been a large producer and consumer of data. More sophisticated best practices and expanding compliance and regulatory requirements have almost exponentially accelerated the production and consumption of data. Event and activity logs have grown to big data proportions and the diversity of data being consumed has become significantly more varied. As a result, traditional log and event management tools and monitoring practices are becoming increasingly insufficient.

To add to this, the success record of maintaining security for an environment is at an all-time low. Executives are being dismissed or forced to resign post breach whether they knew about security issues prior to the breach or not. Threats seems to come from every angle. Not only are attackers consistently probing, but the attacks themselves are more persistent and difficult to block; once a foothold is achieved, detection and removal are also more difficult.

This research summary discusses how both management- and operations-level IT and information security practitioners are impacted by staffing shortages, lack of visibility into their environments, and how they are getting higher fidelity data to provide better context for detection and response to incidents in a world where prevention has often failed. Security analytics tools provide practitioners with a way to meet their actionable threat intelligence needs for an appropriately prioritized, timely response to attacks. Prelert and Enterprise Management Associates have partnered to provide this research, which identified that across the board, 79% of respondents were only "somewhat confident" in to "highly doubtful" of  their ability to detect an important security issue before it had significant impact. In contrast , 95% of the participants using security analytics were between "highly confident" in and "somewhat confident" of their ability to detect similar issues, thus demonstrating that the information security discipline needs next generation analytics capabilities to be successful in the age of advanced and persistent threats.



Unlocking Your IT Data with User-Driven BI: Five Essential Components for Successful Business Discovery

PUBLISHED: Wed, 15 Apr 2015 00:00:00 +0000
AUTHOR: Shawn Rogers, Former EMA Analyst

IT teams spend so much of their time putting together environments for other teams and departments that they rarely have the opportunity to build systems for themselves. However, with the pressures associated with lowering IT budgets and the ability of cloud-based systems to move costs from capital budgets to operational expense budgets, IT teams need to investigate user-driven and discovery platforms to identify cost savings and spur innovation in their own environments. This EMA white paper explores the five essential components required to drive successful business discovery for IT professionals.



Unlocking Your Financial Data with User-Driven BI: Five Essential Components for Successful Business Discovery

PUBLISHED: Tue, 14 Apr 2015 00:00:00 +0000
AUTHOR: Shawn Rogers, Former EMA Analyst

All corporations rely on their finance group to provide insight, accounting services and management of the financial foundation that supports and enables the company's strategic initiatives. Overall corporate health and well-being is supported by the finance function and all other areas of the business are dependent upon it for success and resources. Line of business executives have learned to run their business with data and a critical source of this information is produced and managed by finance. This EMA white paper explores the five essential components required to drive successful business discovery for finance professionals.



Achieving Agile IT Operations with Unified Infrastructure Monitoring

PUBLISHED: Mon, 13 Apr 2015 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Enterprise IT organizations are often organized into subgroups of technology specialists responsible for managing a particular domain in the organization, such as servers, networks, storage, virtualization, or applications. This siloed approach to IT  operations is a natural outgrowth of the specialization of administrators who are equipped with narrowly focused management tools. As long as these administrators continue to live in their management silos, infrastructure operations will be slow to respond to change, and operational workflows will be slow and choppy. This status quo may have been acceptable a decade ago, but many enterprises have found that business conditions can no longer abide. Enterprises need to streamline IT operations to support a more agile approach to delivering new services and revenue-generating applications. The essential ingredient in achieving this aim is an infrastructure management toolset that breaks down silos and unifies monitoring and workflows. The time has come for unified infrastructure monitoring tools.



Empowering Business Professionals with Self-Service BI: Five Essential Components for Successful Business Discovery

PUBLISHED: Mon, 13 Apr 2015 00:00:00 +0000
AUTHOR: Shawn Rogers, Former EMA Analyst

Self-service business intelligence helps line of business professionals to gain access to data and insights without the delays often caused by interacting directly with IT. Empowering these users has a positive effect on the a companies ability to react to competition and market influences. There are multiple components to a successful business discovery culture. Many are covered in this EMA paper.



Unlocking Your Marketing Data with User-Driven BI: Five Essential Components for Successful Business Discovery

PUBLISHED: Mon, 13 Apr 2015 00:00:00 +0000
AUTHOR: Shawn Rogers, Former EMA Analyst

There are 5 essential components for successful business discovery and each plays a critical role in driving the success of marketing professionals. Campaign performance, customer segmentation, web analytics, social media analysis and cost reduction are all important goals supported by user-driven business intelligence.



The Power of Two: Why Network and Application Visibility Are Better Together

PUBLISHED: Thu, 09 Apr 2015 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Enterprises have long considered live visibility into both network and application activity to be "must-haves" for many aspects of IT planning and operations. But the greatest value and impact is achieved when those two viewpoints are brought together so that relationships and dependencies can be revealed and understood by multiple relevant stakeholders. Never has this need for unified visibility been more critical than it is with the move to the hybrid enterprise, through which IT leverages a mix of on-premises and cloud-based resources to meet the needs of the served organization. This report reviews the primary challenges that IT teams face in establishing unified visibility and the key requirements that management solutions must meet to address those challenges, and it examines a Riverbed solution that has been specifically designed to offer a path to success.



Analytics in the Cloud Research Summary for MicroStrategy

PUBLISHED: Thu, 09 Apr 2015 00:00:00 +0000
AUTHOR: John Myers

Cloud-based applications have been mainstream since Salesforce.com brought customer relationship management to the masses in the 2000s. Cloud implementations had the advantage of providing faster time to provisioning and a significantly different cost structure from traditional software implementations based on on-premises installations. However, analytics and business intelligence in the cloud were slower to reach widespread acceptance. First, analytical and business intelligence applications have different data schema implementations from traditional operational applications. These applications can be uniquely configured for individual organizations and are often more difficult to implement on a mass basis than they might be for an operational system.

To determine the status of Analytics and Business Intelligence in the Cloud, Enterprise Management Associates (EMA) embarked on an end-user research study to look at the current state of cloud-based analytics. For this research, EMA invited pre-qualified business stakeholders and information technology professionals to complete an extensive web-based survey. As part of the survey, 257 panelists responded to an invitation to provide their insights on cloud-based analytics and business intelligence strategies and implementation practices. To offer a neutral enterprise view, the respondent pool was also balanced. Business stakeholders represented 44% of respondents. Technologists were 56% of the panel. The survey was executed in November 2014 with respondents from around the world including North America and Europe.



EMA Research Report: What is the Future of IT Service Management?

PUBLISHED: Wed, 08 Apr 2015 00:00:00 +0000
AUTHOR: Dennis Drogseth

This research approached ITSM via a triangle of vectors recognizing the importance of technology and organization, as well as process (including dialog and communication). EMA believes that ITSM has evolved to reflect multiple interdependencies that can only be understood by this multifaceted approach--and that this approach is also the best way to understand future ITSM directions. EMA even went beyond service-desk-specific technologies and looked at trends such as cloud and agile; big data and analytics; automation and mobile--along with examining questions relating to best practices, organizational priorities, and communication issues. 



Insights Across the Hybrid Enterprise: Big Data 2015

PUBLISHED: Tue, 07 Apr 2015 00:00:00 +0000
AUTHOR: John Myers

Since its inception, the concept of "big data" has been widely associated with a single data management platform--Hadoop. This connection may be due to the popularity of the use of the Hadoop platform to store and process large amounts of multi-structured data. However, Hadoop is not the only answer to the question of "what is big data?"

As was explored in the inaugural EMA/9sight survey in 2012, big data is both a way to look at new sources of data and how organizations place that information under management. Big data has attracted a wide range of application innovators as well as many protesters against the dominance of relational databases and data warehouses. The EMA/9sight surveys use a deliberately broad definition of big data to inspire end users to think beyond the box of Hadoop. The survey explores the wide range of ways in which non-traditional data, often in combination with more traditional types, has enabled new or improved business processes. As was established in previous studies in 2012 and 2013 and again in 2014, big data offers a wide range of possibilities, but the name "big data" itself keeps media and industry eyes focused on size as the defining feature.

With the 2014 survey, these previous observations continue to hold true. However, there is an evolving market in which size is not everything, and speed, in all its aspects, has grown in importance for respondents. Furthermore, respondents continue to include a wide range of data structures, from highly irregular to strongly modeled, within the scope of their projects. This refocusing of implementers’ attention on speed and structure reduces overall growth in big data by some measures and requires EMA/9sight to explore how consideration of speed and structure are changing market dynamics. The 2014 survey also included investigations into the highly visible topics of data-driven cultures, the Internet of Things, and data lake architectures.



Demystifying the Internet of Things: Implementing IoT Solutions

PUBLISHED: Fri, 03 Apr 2015 00:00:00 +0000
AUTHOR: John Myers

As data becomes a more pervasive aspect of business and virtually all human activity, a rapidly growing number of physical objects have been modified or augmented to produce data, or to transmit data that previously would have been available only by directly observing the object / device (e.g., home heating and cooling via thermostat). Sensors now send relentless updates on the movement of merchandise into and out of inventory, the location of vehicles within a fleet, or the performance of individual components within a system. The network that connects these various items is the Internet, and the name given to the phenomenon of connecting physical objects in this way is the Internet of Things (IoT).

Over a relatively short period of time, IoT data has become a major contributor to many big data environments. According to the 2014 EMA/9sight End-User Big Data research, 41% of the stakeholders surveyed identified machine-generated data as one of the contributors to their big data environments, making it the most frequently cited source of data.



2015 EMA Vendors to Watch: Business Intelligence and Data Warehousing

PUBLISHED: Tue, 31 Mar 2015 00:00:00 +0000
AUTHOR: John Myers

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2015 EMA Vendors to Watch in the Business Intelligence and Data Warehousing field including:
 
Alation



Quick Guide to Packet-Monitoring Infrastructure for Mid-tier Enterprises

PUBLISHED: Wed, 11 Mar 2015 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Packet-monitoring technologies have long served as essential tools for troubleshooting and managing the performance and security of networks. However, these tools are only as effective as the quality of the data fed to them. Large enterprises often deploy their packet-monitoring tools with network visibility infrastructure, including taps and packet-monitoring switches. Typically, packet-monitoring switches, also known as network visibility controllers, offer a rich set of traffic grooming features that help enterprises optimize and load balance the packet streams that are delivered to their monitoring tools. One might be tempted to assume that mid-tier enterprises, whose networks are smaller, would have far fewer requirements for packet-monitoring technologies. That is almost never the case.



Follow a Different Path: Data Discovery and Big Data

PUBLISHED: Wed, 11 Mar 2015 00:00:00 +0000
AUTHOR: John Myers

Big Data and multi-structured data stores are one of the fastest growing areas of data management for organizations implementing Big Data projects. Many of these organizations in the Early and Late Majority Adopters are still looking for the best way to utilize these new data sources. These sources could have the key to breakthrough business cases. Alternatively, these Big Data sources could be the wrong information for an organization. In either of these situations, the subject matter experts will lead the organization to the best use of Big Data sources. Often, these non-technical business analysts from marketing, operations and finance know the detailed data of their businesses better than the CEOs. They are best positioned to evaluate any integration of new Big Data sources into the business. They need to be able to explore the Big Data sources to find the right matches



Best Practices: Maximizing Efficiency Through Service Automation

PUBLISHED: Tue, 10 Mar 2015 00:00:00 +0000
AUTHOR: Steve Brasen

Survival in today's dynamic marketplaces is dependent on the prompt and reliable delivery of IT services. The demands from both customers and employees for more simplified access to IT services are driving organizations to become more agile in how the services are delivered and to ensure they meet rapidly increasing requirements for security, compliance, and user convenience.  Making matters worse, IT organizations are consistently pressured to reduce operational costs while meeting these increased demands. In this white paper, EMA identifies key best practices for delivery IT services through the effective adoption of automation.



Managing Networks Today: Network Management Megatrends 2014 Research Highlights (Sponsored by WildPackets)

PUBLISHED: Tue, 10 Mar 2015 00:00:00 +0000
AUTHOR: Jim Frey, Former EMA Analyst

Network management has always been essential in enterprises large and small, but continual changes in the managed environment and the increasing criticality of IT infrastructure to business success means network managers and operators need to continually ensure they are using the best tools, technologies, and practices at all times. In 2014, Enterprise Management Associates (EMA) published "Managing Networks in the Age of Cloud, SDN, and Big Data: Network Management Megatrends," a landmark study documenting the latest needs and requirements. This paper reviews several key findings and recommendations.



Managing Networks Today: Network Management Megatrends 2014 Research Highlights (Sponsored by Cisco)

PUBLISHED: Mon, 09 Mar 2015 00:00:00 +0000
AUTHOR: Jim Frey, Former EMA Analyst

The increasingly critical role that IT plays in enabling business is driving renewed focus on the network, which provides the essential connectivity between customers and end users and the datacenters hosting applications and services, as well as within those data centers. But establishing and maintaining the upper hand in ensuring highly reliable, high-performing networks means that network managers and operators need to keep up with new technology introductions while ensuring that they are using the best tools, technologies, and practices at all times. Enterprise Management Associates (EMA) published "Managing Networks in the Age of Cloud, SDN, and Big Data: Network Management Megatrends 2014," a landmark study documenting the latest needs and requirements for excellence in network management. This paper reviews several key findings and recommendations.



2015 EMA Vendors to Watch: Network Management

PUBLISHED: Tue, 03 Mar 2015 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2015 EMA Vendors to Watch in the Network Management field including:

Avi Networks
Dispersive Technologies
Real Status
VeloCloud
YOTTAA 



Delivering Effective Service Automation through Cloud Technologies

PUBLISHED: Mon, 02 Mar 2015 00:00:00 +0000
AUTHOR: Jim Frey, Former EMA Analyst

Capturing the full business value of cloud is one of today's key challenges for enterprise IT. The most important strategic characteristics of cloud -- agility, resiliency and efficiency -- can only be fully harnessed if the IT organization possesses the automation, orchestration and integration capabilities required to tie together hardware and software in a manner similar to those used for any other business processes. This is a non-trivial challenge as there are many different clouds, both private and public, available today, each of which is targeted toward a specific set of use cases. Centrally enforcing compliance, security and cost efficiency to enable the organization to take full advantage of today's world of many clouds requires a service management platform that facilitates policy driven provisioning and management of complete services that consist of application and infrastructure components sourced from multiple clouds.



Optimizing the Unknown: Making IT Data Work for You with Blazent's Integrated Data Analytics

PUBLISHED: Tue, 24 Feb 2015 00:00:00 +0000
AUTHOR: Dennis Drogseth

All IT processes depend on good data. So do effective communication and dialog within IT, as well as action based on shared, current, and relevant insights. Moreover, good IT data can support business alignment and even optimization to business needs and requirements. Only accurate data that spans siloed toolsets can provide a solid foundation for automation and analytics--those technology investments that are making the IT "conversation" more dynamic and empowering.
This report provides an introduction to Blazent's Integrated Data Analytic solutions with their unique and broad-ranging capabilities in a number of key areas.



Closing the Endpoint Security Gap: Bit9 + Carbon Black Partner with Microsoft to Maximize ROI

PUBLISHED: Mon, 23 Feb 2015 00:00:00 +0000
AUTHOR: David Monahan

For endpoint protection, traditional signature-based antivirus protection is insufficient, so organizations must find its successor. However in many industries, organizations continue to rely upon traditional antivirus as a first line defense or to meet out of date language in regulatory compliance requirements. Depending upon the progressiveness or open-mindedness of the organizations auditor and his/her desire to "check the box," organizations responsible to compliance regulations can be handcuffed to solutions that may meet compliance requirements, but do not provide sufficient security.

Bit9 + Carbon Black has partnered with Microsoft to provide enhanced prevention, detection and response capabilities to organizations who are using traditional antivirus but also recognizing it as insufficient for complete endpoint threat detection and response (ETDR). This paper discusses key benefits of the Bit9 + Carbon Black partnership with Microsoft to provide comprehensive endpoint defense and enhanced alerting capabilities. In the course of the discussion, the paper covers both the financial and operational values of using Microsoft System Center Endpoint Protection (SCEP) and the Enhanced Mitigation Experience Toolkit (EMET) in conjunction with Bit9 + Carbon Black to meet regulatory, compliance, or internal requirements and simultaneously improve organizational security posture, business return on investment (ROI), and in some cases, simultaneously reduce IT spend.



Leveraging Log Data: Highlights from "Log Analytics for Network Operations Management 2014" Research

PUBLISHED: Fri, 20 Feb 2015 00:00:00 +0000
AUTHOR: Jim Frey, Former EMA Analyst

It is a well-established practice for network managers to gather Simple Network Management Protocol (SNMP) data and metrics from network devices, complemented by NetFlow and packet inspection, for planning, monitoring, and troubleshooting network health and performance. But network log data is becoming increasingly important for these purposes as well. Research by Enterprise Management Associates (EMA) in early 2014 found that network log data is actually the most common data source in use today for planning, monitoring, and troubleshooting network health and performance. In November 2104, EMA released the findings from "Log Analytics for Network Operations Management," a follow-on study documenting current uses and best practices for using log data as part of network management. In this study, over 60% of research participants indicated that log data was more important than any other network management data type. This paper reviews several key findings and recommendations.



Best Practices in Lifecycle Management: Comparing Suites from Dell, LANDESK, Microsoft, and Symantec

PUBLISHED: Tue, 17 Feb 2015 00:00:00 +0000
AUTHOR: Steve Brasen

Given the complexity of todayís dynamic IT infrastructures and the broad range of management disciplines necessary to support them, choosing a lifecycle management solution can be a difficult and bewildering project.  To assist in the evaluation of automated lifecycle management platforms, Enterprise Management Associates (EMA) has conducted a side-by-side functional and financial comparison of solution suites from four of the leading vendors in this market space: Dell, LANDesk, Microsoft, and Symantec.   Key best practices in lifecycle management are explained and used as a framework for identifying critical points of comparison and a detailed financial evaluation goes beyond just license costs to help determine total cost of ownership of each platform. This EMA analysis includes a comparison of over 50 functional capabilities across seven key areas ñ Asset and Discovery Management; Provisioning; Security and Patch Management; Third-Party Patch Deployment; Configuration Compliance and Remediation; Process Automation and Service Desk; and Interfaces and Reporting - and breaks-out management capailities across a variety of endpoint platforms, including Windows, Mac, Linux, UNIX, and Chromebooks.



Accelerating Analytics Business Value: Leveraging the Modern Analytics Paradigm

PUBLISHED: Mon, 09 Feb 2015 00:00:00 +0000
AUTHOR: John Myers

A fundamental shift is occurring in analytics. Traditional analytics is giving way to a modern approach that will, at last, help businesses realize the full value of their data by infusing analytics into all aspects of the business, not just stand-alone silos. The shift is concurrent with the emergence and maturation of big data technologies, with these driving forces: New data sources and types, consumerization of analytics, and mass personalization of analytic insights and actions. The business drivers behind the modern analytics paradigm emerge from changes brought about by rapidly evolving big data technologies and the methodologies that support them. As they have always done, businesses are looking to maximize the value of their data sets and the processes that support them. 



Three Important Reasons for Privileged Identity Management (and One Surprising Benefit)

PUBLISHED: Thu, 05 Feb 2015 00:00:00 +0000
AUTHOR: Scott Crawford, Former EMA Analyst

High-privilege access is one of the most sensitive aspects of IT. Administrative accounts have the ability to make sweeping and fundamental changes to IT systems on which the business may depend. When used in ways not intended, the impact of this capability can cause a wide spectrum of damage, from security threats and compliance violations, to incidents that tarnish the reputation of the business itself.

For these reasons and more, privileged access visibility and control has been recommended -- and often required:

• By a variety of regulatory mandates
• To assure responsible governance
• To improve security

Privilege management delivers these values -- and more. In this report, Enterprise Management Associates (EMA) examines the ways in which privilege visibility and control not only helps organizations achieve these objectives, but also delivers a benefit that many may not realize: improved IT reliability that can help reduce operational costs. The characteristics of an effective solution are examined, along with evidence from EMA research that supports the values of a more consistent approach to operational IT control.



Log Analytics for Network Operations Management

PUBLISHED: Tue, 03 Feb 2015 00:00:00 +0000
AUTHOR: Jim Frey, Former EMA Analyst

As network managers, engineers, and operators strive to protect the integrity and performance of enterprise networks, they are faced with an onslaught of data and metrics.  They must wade quickly and carefully through this deluge in order to perform monitoring, troubleshooting, and planning. With recent trends moving technology toward software-defined and programmable infrastructure, as well as the parallel convergence of IT operations across multiple technology domains, network log data is being increasingly both used and appreciated. This ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) research report takes a detailed look at the ways in which which network log data is being harvested, analyzed, and used for network operations management. Included are recommendations for best practices based on the experiences and findings of enterprise practitioners. 



2015 EMA Vendors to Watch: Security & Risk Management

PUBLISHED: Tue, 03 Feb 2015 00:00:00 +0000
AUTHOR: David Monahan

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2015 EMA Vendors to Watch in the Security & Risk Management field, including Illumio, PFP Cybersecurity, and Twistlock.

Additional vendors will be added to this document throughout the year.



Unified Network Management: The Key to Operational Efficiency

PUBLISHED: Mon, 26 Jan 2015 00:00:00 +0000
AUTHOR: Jim Frey, Former EMA Analyst

As the world of IT converges, within the data center, within networking technologies, between voice and data, and in more ways to come, it is also appropriate to examine how management tools and technologies can be converged in order to best meet the needs of IT planning and operations. Within the scope of network management, this means adopting products that integrate or unify management capabilities, features, and functions. Though many network management product choices may sound similar on paper, there are distinct differences that should be understood. This white paper examines how a unified approach can both improve operational efficiency and lower total cost of ownership (TCO), the unified solution offered by Entuity as an example, and some real world examples of how the Entuity solution has been deployed within live production environments.



Customer Perspectives on HP Operations Analytics: Optimizing the Value of IT Through Big Data

PUBLISHED: Wed, 21 Jan 2015 00:00:00 +0000
AUTHOR: Dennis Drogseth

HP is unique in the industry in recognizing that AOA is an architectural as well as a "toolset" imperative--and as such becomes a potent layer over and above traditional monitoring tools. AOA can enable nothing less than a new way of working for IT. 

This report looks at HP's Operations Analytics, or "OpsAnalytics," in the context of two customer deployments. These interviews provide insight into what HP Operations Analytics can do, the problems it can address, and just what this new way of working (or as HP calls it the "new style of IT") might look like with an OpsAnalytics investment.



Evolving from Systems Management to Service Management with HP Operations Bridge: A View from Four Real-World Deployments

PUBLISHED: Wed, 21 Jan 2015 00:00:00 +0000
AUTHOR: Dennis Drogseth

This report is designed to provide insights into HP Operations Bridge values, benefits, drivers and use cases through interviews and analysis of four deployments. The goal is to offer up a more tangible context for assessing when and how OpsBridge can support individual IT choices and priorities.



Ensuring IT Efficiencies Through Enterprise Process Automation

PUBLISHED: Wed, 21 Jan 2015 00:00:00 +0000
AUTHOR: Steve Brasen

Enterprise success in today’s dynamic marketplaces is contingent on the agility of a business to rapidly perform tasks that address key needs and requirements. To maintain a competitive edge, However, to achieve this, organizations must adopt business-focused IT processes that consist of a variety of disparate and complex tasks that can be extremely difficult to orchestrate. In this white paper, EMA identifies how to effectively manage complex task by enabling an integrated approach to process automation and job scheduling.



Analytics in the Cloud

PUBLISHED: Wed, 14 Jan 2015 00:00:00 +0000
AUTHOR: John Myers

Cloud-based applications have been mainstream since Salesforce.com brought customer relationship management to the masses in the 2000s. Cloud implementations had the advantage of providing faster time to provisioning and a significantly different cost structure from traditional software implementations based on on-premises installations. However, analytics and business intelligence in the cloud were slower to reach widespread acceptance. First, analytical and business intelligence applications have different data schema implementations from traditional operational applications. These applications can be uniquely configured for individual organizations and are often more difficult to implement on a mass basis than they might be for an operational system.

To determine the status of Analytics and Business Intelligence in the Cloud, Enterprise Management Associates (EMA) embarked on an end-user research study to look at the current state of cloud-based analytics. For this research, EMA invited pre-qualified business stakeholders and information technology professionals to complete an extensive web-based survey. As part of the survey, 257 panelists responded to an invitation to provide their insights on cloud-based analytics and business intelligence strategies and implementation practices. To offer a neutral enterprise view, the respondent pool was also balanced. Business stakeholders represented 44% of respondents. Technologists were 56% of the panel. The survey was executed in November 2014 with respondents from around the world including North America and Europe.



Achieving Next-Gen NAC Results: Essential Implementation, Process and Control Considerations

PUBLISHED: Fri, 09 Jan 2015 00:00:00 +0000
AUTHOR: Scott Crawford, Former EMA Analyst

Business wants more fluid access to data while IT organizations must maintain security. As the diversity of users and devices, and the variety of access and multitude of threats to network resources and sensitive information have grown, so has the need for more flexible and automated ways to effectuate security policies, controls and enforcement. Rarely is this need more keenly felt than at the network endpoint, where people, technology, information assets and requirements for security and compliance meet most directly. IT consumerization and "bring your own device" (BYOD) trends have brought these issues to a head, forcing IT organizations to rethink how to enable and secure the use of managed and personal mobile devices to further business advantage.

These factors have given rise to Network Access Control (NAC) solutions for enabling a proactive approach to managing network admission and endpoint compliance risks. Today's NAC technologies are delivering that promise for many -- provided that organizations understand the considerations for a successful NAC deployment and how to recognize solutions that can address their requirements, not only to meet the needs of protecting the business, but to enable its people to continue to work efficiently.

In this paper, EMA examines the fundamentals that yield an informed approach to selecting and deploying NAC. Considered will be how today's approaches offer the means to identify and authenticate endpoint devices and offer a wide range of options for pre- and post-admission policy definition, enforcement and remediation that enable organizations to find the right balance of accessibility and security that best fits their needs.

The essentials of NAC functionality are described, along with key considerations for implementation that can produce more effective NAC results. Three enterprises that have adopted the ForeScout CounterACT solution are offered as examples of successful NAC deployments. They illustrate how comprehensive device discovery, real-time endpoint monitoring, flexible policy definition and effective control compatible with existing infrastructure answers many of the most critical requirements for guest management, endpoint compliance, mobile security and protecting sensitive information assets.



Technology Business Management in Two Deployments: Making the "Business of IT" Real

PUBLISHED: Fri, 09 Jan 2015 00:00:00 +0000
AUTHOR: Dennis Drogseth

This report presents two case studies that show how "managing IT as a business" can be both real and successful--while also clarifying how the phrase can become actualized in the real world by introducing the concept of Technology Business Management (TBM). Both case studies are Apptio deployments--as is fitting given Apptio's leadership in creating the market's first true TBM solution. While other vendors may follow--EMA research ("The Many Faces of Advanced Operations Analytics," September, 2014) indicates a strong surge of IT interest in this arena--so far Apptio has taken the lead position in understanding the TBM opportunity and delivering a compelling solution for it. 



Public Cloud Comes of Age: Application Performance Management (APM) Strategies & Products for Production-Ready Cloud Ecosystems

PUBLISHED: Tue, 16 Dec 2014 00:00:00 +0000
AUTHOR: Julie Craig

Today, IT organizations are seeking new ways to manage the fallout that always results from rapid, often unplanned change. Modern applications are part of today’s “Extended Enterprise,” in which applications can traverse multiple locations and spheres of control. Integrated applications are spanning on-premise and cloud, mobile, Internet of Things (IoT), and social media platforms, often connected by a host of custom code dubbed the “API Economy.” From this perspective, modern applications are as much an echo of the past as the wave of the future.

Prior EMA studies have extensively researched cloud, DevOps, and Continuous Delivery. This is the first in a series of studies building on this foundation by focusing on the enterprise management implications of this wave of innovation as engulfs the Extended Enterprise. 

This Enterprise Management Associates (EMA) research study approaches the Extended Enterprise from the manageability perspective. It includes results of a recent survey covering these topics and an Appendix listing enterprise management vendors who have self-identified as supporting performance monitoring and triage of public cloud applications. It is, in essence, an introductory evaluation of the ways in which companies are actively utilizing these technologies in production (or not), how they are managing them (or not), and their key challenges as they break new ground.



The Rise of DevTestOps

PUBLISHED: Mon, 15 Dec 2014 00:00:00 +0000
AUTHOR: Tracy Corbo

Traditional IT models are rapidly giving way to dynamic, flexible, on-demand designs that incorporate virtualization, cloud, and mobility. These new models shake up the status quo, and applications that worked well in a controlled private network are now subject to the unpredictability of the public Internet, While development teams and operations teams have evolved creating the DevOps movement, testing too often gets overlooked. This white paper examines the concept of DevTestOps as a way to ensure that high levels of functionality and performance are maintained enabling rapid application rollouts and changes with high quality. This provides the actionable insight and automation to drive the modern application lifecycle.



Overcoming Automation Fatigue: Best Practices for Accelerating Incident Resolution

PUBLISHED: Wed, 12 Nov 2014 00:00:00 +0000
AUTHOR: Steve Brasen

While organizations often adopt automation to try to improve incident resolution times, automation alone can actually create more problems than it resolves while  addressing only a limited number of incidents. To compensate, administrators often over-automate processes, making them difficult to manage and eminently error-prone because they are too complicated to modify or diagnose. Described in this EMA white paper are key best practices for accelerating incident resolution while minimizing administrative efforts by empowering support agents with modular process workflows.



ITIL Resources Adoptions and Priorities: A Global View

PUBLISHED: Mon, 10 Nov 2014 00:00:00 +0000
AUTHOR: Dennis Drogseth

With the creation of Axelos in 2013—a joint venture between Capita and the UK Project Office—the chance arose to reinvest in the IT Infrastructure Library (ITIL) as the leading global source of best practices for service management.  ITIL’s quiet rise through the 1990’s led to a substantial and growing awareness in the early years of this millennium, as IT organizations increasingly sought to take charge of their services in a more cohesive, more business-aligned, more measured and more cross-domain manner, than in the past.  

The results of the research below largely reaffirm ITIL’s value, and do so in the face of those very forces, such as cloud and agile, that some industry experts are claiming render ITIL less relevant.  The research also suggests clear priorities for how IT organizations, IT executives and professionals can better optimize their use of ITIL resources, as well as how ITIL might, itself, evolve to support the continued evolution of IT service management in the face of both cultural and technological change.



Solving the Application Performance Dilemma in the Hybrid Enterprise

PUBLISHED: Tue, 04 Nov 2014 00:00:00 +0000
AUTHOR: Jim Frey, Former EMA Analyst

The mainstream adoption of web-based applications, whether internally hosted, cloud-hosted, or SaaS, is transforming the ways in which enterprise-class applications are built, deployed, and consumed. While the evolution brings new levels of cost efficiency and flexibility, it also introduces new and unique visibility and control challenges for IT organizations, which must meet performance and user experience expectations in addition to basic availability. IT teams must adopt a two-pronged approach to meeting this challenge, combining performance visibility with proactive optimization technologies. This EMA white paper examines the scope of challenges for assuring web-based and SaaS application performance, and reviews a solution offered by Riverbed that is designed to meet these new requirements.



Mitigating User-Based Risks: Where Infrastructure Monitoring Falls Short, User-Based Monitoring Excels

PUBLISHED: Wed, 29 Oct 2014 00:00:00 +0000
AUTHOR: David Monahan

Though every organization wants to believe that all of their employees, interns, contractors, consultants, vendors, and partners are above reproach and all threats are external, the truth is somewhere in the middle. Research shows that there is an upward trend of suspicious activities that can be used as breach indicators, including unauthorized accesses that lead to a data breach. Sixty-nine percent of reported security incidents involved an insider.  Of the insiders that were part of a data breach, administrators were only 16%. In cases of administrator-caused data breaches, 62% were determined to be human error. Most interestingly, 10% of the threat actors were unknown. In these cases, the infrastructure logging was so deficient that it was impossible for forensic investigators to use it to determine the attack origin regardless of time or money spent.  This begs the question what else is there?  The answer is user-based monitoring.



Pragmatic Capacity Management: Getting the Most Out of Your Data Center Investments

PUBLISHED: Thu, 23 Oct 2014 00:00:00 +0000
AUTHOR: Steve Brasen

Traditional capacity management practices rely on the intentional overprovisioning of IT infrastructure servers and other resources to ensure performance is maintained even during unexpectedly high peak loads. However, this approach rarely delivers on providing the expected performance and reliability effects -- and almost never justifies the excessive costs involved. Revealed in this white paper are key practices for enabling a business-focused approach to capacity management that maximizes both effectiveness and efficiency in IT investments.



EMA Research Report: Optimizing IT Operations with Automation and Analytics

PUBLISHED: Tue, 14 Oct 2014 00:00:00 +0000
AUTHOR: Steve Brasen

While IT operations managers broadly recognize that automation is the key to improving IT performance while reducing administrative efforts, it is often unclear how to strategically employ automation to meet SLA requirements and business goals. To gauge the state and effectiveness of enterprise IT’s ability to meet expanding requirements, EMA conducted primary, survey-based research evaluating real world conditions and use cases. Included in this EMA Research Report are the key findings from the study, including detailed results identifying critical requirements for enabling proactive IT management, the effectiveness of adopting automation, and how organizations are dealing with siloed organizational structures.



Streamlining the Process of Business Intelligence with JReport

PUBLISHED: Mon, 06 Oct 2014 00:00:00 +0000
AUTHOR: John Myers

In the 2014 EMA RADAR for Business Intelligence Platforms for Mid-Sized Organizations, JReport was reviewed along with 11 other business intelligence platforms. EMA assessed Jinfonet Software’s JReport to be one of the EMA RADAR Value Leaders, as it demonstrated above average scores in all five evaluation categories. Jinfonet Software develops and markets the JReport product suite, a business intelligence and reporting solution, with the goal of simplifying the complexity of data visualization and analysis. With an extensible API set and flexible architecture, JReport embeds easily into any application or OEM product for Java and .NET environments. JReport's reporting and data visualization enables data consumers to make better business choices. 



EMA Research Report: Enabling Unified Endpoint and Service Management for a Mobile Workforce

PUBLISHED: Fri, 03 Oct 2014 00:00:00 +0000
AUTHOR: Steve Brasen

The need for enterprises to support a mobile workforce is increasingly impacting how enterprises deliver, secure, and manage devices, applications, data, and services. In this research report, EMA evaluates survey responses from more than 200 IT professionals to identify key enterprise challenges and requirements for supporting a mobile workforce.In particular, the research gauges the level of awareness and need for a Unified Endpoint Management approach that enables centralized management across all endpoint device types -- desktop, laptops, tablets and smartphones.



The Right Database for the Right Data

PUBLISHED: Thu, 02 Oct 2014 00:00:00 +0000
AUTHOR: John Myers

As organizations grow to rely more heavily on data from the multiple, multi-structured sources, there is increasing pressure to implement a solution that will appropriately address disparate data types while still leveraging the investment made in more traditional infrastructure. An existing Oracle or other RDBMS remains a crucial component of an HDE (Hybrid Data Architecture), one that organizations prefer to supplement or augment rather than have to replace.

In particular, NoSQL environments can address the challenges raised by HDE infrastructures via two distinct use cases:

1. Working Alongside Established Infrastructure -- A NoSQL environment can operate in parallel with other technologies within the HDE.
2. Integrating Established Infrastructure -- A NoSQL environment can serve as the foundation and underlying fabric for the entire HDE infrastructure.

This EMA position paper outlines how MarkLogic can work with traditional RDBMS environments such as Oracle to implement both of the NoSQL use cases described above.



Proactively Building Competitive Advantage: Mastering Business with the Speed of In-Memory Computing

PUBLISHED: Thu, 25 Sep 2014 00:00:00 +0000
AUTHOR: John Myers

The pace of business is increasing whether or not your organization wants to participate. Competitors and new business entrants are looking for ways to expand or establish their positions in your market. One of the key techniques of establishing competitive advantage is to decrease the time between when data is available and when action can be taken based on that information. Demanding decreased time between information and action, many organizations are increasing their use of low-latency operational and analytical processing.

By reducing the latency in operational and analytical processing, organizations can move from a traditional information strategy that often looked backward at the events that happened to a more proactive approach that allows organizations to capitalize on events as they occur and even predict what may happen next. This change to a more proactive operational mindset can improve their businesses by increasing their revenues, lowering their costs or improving their overall margins.



EMA Research Report: The Many Faces of Advanced Operations Analytics

PUBLISHED: Tue, 23 Sep 2014 00:00:00 +0000
AUTHOR: Dennis Drogseth

In the summer of 2014, EMA completed a research project including 150 US respondents and 100 European respondents on Advanced Operations Analytics (AOA). "Advanced Operations Analytics" is EMA's term for big data as used by IT for a variety of use cases. These include optimizing service performance, minimizing security issues, managing change and optimizing capacity across internal IT and the extended enterprise (partners, service providers, suppliers, etc.) and ultimately governing IT more effectively as a business in support of the business its serves. While these are indeed separate areas with largely separate constituents and traditionally separate markets—EMA's premise was that effective AOA investments are beginning to blend those values and promote more effective ways of working across IT. To large degree, that premise was borne out this research.



Desktop Automation: Effective Desktop Operations & Management with Cloud Orchestration

PUBLISHED: Tue, 09 Sep 2014 00:00:00 +0000
AUTHOR: Steve Brasen

As businesses strive to meet the evolving requirements for more flexible, reliable, and dynamic end-user computing services that empower end-user productivity, they look to adopt more dynamic processes for monitoring and managing desktop services. Rising to meet the challenges are Desktop Automation solutions that enable centralized management and holistic visibility into the provisioning and use of workspaces, applications, and other IT services. This EMA white paper identifies how organizations can make informed decisions on how to optimally configure, deploy, and service desktop resources by leveraging the powerful features of a Desktop Automation implementation.



2014 EMA Vendors to Watch: Storage

PUBLISHED: Tue, 02 Sep 2014 00:00:00 +0000
AUTHOR: Jim Miller

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2014 EMA Vendors to Watch in the Storage field including CloudPhysics and Nimble Storage.



Broadening the Reach of Information: Spreading the Base of Data Blending

PUBLISHED: Mon, 18 Aug 2014 00:00:00 +0000
AUTHOR: John Myers

The concept of self-service data blending gives analytical teams comprised of business analysts and data scientists the ability to obtain, explore, combine, and possibly create the information that they are looking for without the constraints of having to explain it in advance. The ability to mix between customer information in CRM platforms and product information in Supply Chain systems is the key to understanding purchasing patterns. However, many times the relationship between disparate information sources can be difficult to define. This is where being able to pull together ideas from different "aisles" in the corporate supply of data becomes important.  Equally, if not more important, is the ability for business stakeholders to have that ability in their own hands as opposed to waiting for centralized IT resources.



Transform IT Data into Real-time Operational Intelligence with Network Data Analytics

PUBLISHED: Thu, 14 Aug 2014 00:00:00 +0000
AUTHOR: Jim Frey, Former EMA Analyst

Whether or not IT is considered strategic within any individual organization, it has become a mission-critical aspect of business processes and business results for the vast majority of modern companies. As such, it is essential for organizational leaders and IT leaders alike to maintain crisp focus on how well the applications and services delivered and maintained by IT are fulfilling those necessary roles. IT monitoring technologies can provide operational insights for assuring the health and performance of infrastructure and applications, but typically are designed for technologists and not the business community as a whole. Further, most such tools are designed to provide occasional snapshots, not continuous intelligence in the same way that business operates -- in true real time. A promising new technique translates IT data into direct business performance insights in real time, using a method known as network data analytics. This Enterprise Management Associates (EMA) paper details essentials of such an approach and describes an example solution offered by Corvil.



Foundations for a Data Driven Enterprise The Rapidly Evolving Hadoop-based Enterprise Data Hub

PUBLISHED: Fri, 08 Aug 2014 00:00:00 +0000
AUTHOR: Evan Quinn, Former EMA Analyst

First generation Hadoop, while useful for analytics projects for data science specialists, lacked the enterprise-class data management features required for more widely used operational applications. With the maturation of Hadoop, and of a few Hadoop commercial distribution, a more general use data management platform, known as an enterprise data hub, enables the types of applications of interest to data driven organizations. In particular, MapR M7 Enterprise Database Edition commercial Hadoop distribution adds the high availability, security, data management, and application flexibility required for the coming generation of enterprise data hubs.



EMA Radar for Enterprise Network Availability Monitoring Systems (ENAMS): Q3 2014

PUBLISHED: Thu, 07 Aug 2014 00:00:00 +0000
AUTHOR: Jim Frey, Former EMA Analyst

The practice of network availability monitoring can range from simple standalone up/down monitoring of individual devices to complex, highly customized and automated approaches that fully integrate into broader management systems architectures. Enterprise Management Associates (EMA) analysts define the term “Enterprise Network Availability Monitoring System” (ENAMS) to include network-centric monitoring solutions that are used by enterprise network operations and engineering teams to discover, monitor, assess, troubleshoot, and manage medium to large enterprise network infrastructures. For this EMA Radar Report, specific focus has been placed on two areas: the core capabilities and features that address network operators’ needs to ensure health and availability of the network; and the overall practitioner experience in procuring, deploying, administering, and using specific ENAMS products. In all, 17 products from 16 vendor suppliers are reviewed and compared in this study.



Big Data: Any Data. Any Time

PUBLISHED: Mon, 04 Aug 2014 00:00:00 +0000
AUTHOR: John Myers

Where 2012 and early 2013 were about “What is this Big Data stuff we have collected?”, 2014 represents the point where the rubber meets the road on implementing Big Data initiatives. The “mystery” of Big Data is beginning to wane and organizations are seeing the value of Big Data projects in how they can help add to top line revenue, lower bottom line costs and improve overall corporate margins.



Report Summary - EMA Radar for Enterprise Network Availability Monitoring Systems (ENAMS): Q3 2014

PUBLISHED: Thu, 24 Jul 2014 00:00:00 +0000
AUTHOR: Jim Frey, Former EMA Analyst

This is the summary of the EMA Radar for Enterprise Network Availability Monitoring Systems (ENAMS): Q3 2014.


Report Abstract
The practice of network availability monitoring can range from simple standalone up/down monitoring of individual devices to complex, highly customized and automated approaches that fully integrate into broader management systems architectures. Enterprise Management Associates (EMA) analysts define the term “Enterprise Network Availability Monitoring System” (ENAMS) to include network-centric monitoring solutions that are used by enterprise network operations and engineering teams to discover, monitor, assess, troubleshoot, and manage medium to large enterprise network infrastructures. For this EMA Radar Report, specific focus has been placed on two areas: the core capabilities and features that address network operators’ needs to ensure health and availability of the network; and the overall practitioner experience in procuring, deploying, administering, and using specific ENAMS products. In all, 17 products from 16 vendor suppliers are reviewed and compared in this study.



Attaining PCI 3.0 Compliance: Building on an Effective Systems Management Foundation

PUBLISHED: Wed, 23 Jul 2014 00:00:00 +0000
AUTHOR: David Monahan

As risks of data theft and the compromise of personal information have risen, the payment card industry has responded with one of the most prescriptive regulatory mandates to impact IT: the Payment Card Industry Data Security Standard. In November of 2013, the PCI Standards Council published the updated standard as PCI DSS 3.0. Enterprise Management Associates (EMA) evaluates how DELL's suite of products and solutions including DELL KACE, SonicWall, SecureWorks, and Data Protection Encryption, if implemented properly can help organizations address many requirements in the updated standard.  

Clearly, systems management is front-and-center when it comes to assuring many of the requirements, for building, deploying, configuring and maintaining secure systems that access and handle cardholder information. These requirements are not just limited to the data center; the PCI DSS is as specific about requirements affecting user endpoints that handle cardholder data as it is about servers and networks at the heart of payment card information systems. These diverse requirements call for systems management solutions that embrace breadth as well as depth in compliance-enabling capability.

In this paper, EMA evaluates the capabilities of many of DELL's solutions against specific PCI DSS requirements identifying which PCI 3.0 requirements those solutions address in both leading and key supporting roles. The Dell KACE family of systems management appliances and features are highlighted as examples that enable organizations of all sizes to manage their PCI compliance requirements without the cost and complexity often associated with more traditional approaches, supplemented by Dell SonicWall, Data Protection Encryption, and SecureWorks security services that help organizations implement PCI compliance with proven expertise. 



Data Capture and Network Forensics, State-of-the-Market: IBM Security QRadar Incident Forensics vs. Other Industry Tools

PUBLISHED: Sun, 20 Jul 2014 00:00:00 +0000
AUTHOR: David Monahan

The ability to capture, consume and correlate multifaceted data from all over the enterprise is a growing need. No single data source or type can provide sufficient forensic capabilities to solve all of today’s security problems. End user research conducted by ENTERPRISE MANAGEMENT ASSOCIATES (EMA) demonstrates that the data needs of security organizations are growing at breakneck speeds reaching volumes associated with Big Data. Log information from network and server infrastructure is no longer sufficient to provide a full picture. Security needs to process a broader and richer data set including network and Big Data repositories. Additionally, the security technology has to be able to correlate commonalities within those variant data streams to produce meaningful data trails and do it in as near to real time as possible. A 2013 study by Ponemon Institute identified that if a security incident can be resolved in less than 60 seconds, the remediation costs could be reduced by as much as 40%. 

Traditional log management tools do not contain the range of data or data mining and analysis capabilities to deliver true security analytics and forensics. Security Incident Event Management (SIEM) tools, provide more capabilities but are also insufficient for full forensic analysis. Fifty-three percent of EMA research respondents understood that Security Analytics and forensics tools augmented their SIEM tools and 46% understood that security analytics and forensics tools were a natural evolution of the traditional SIEM. A good rule to follow is that a SIEM should provide correlation, normalization and alerts on key events and have the ability to query the data to retrieve answers to complex questions about the specific environment. A security analytics solution is able to adapt to the activities and behaviors within its monitored environment providing improved visibility into activities and why they should be investigated. It can ingest non-standard log data types at Big Data proportions to provide visibility into abstract data relationships bringing attention to problems that operators and administrators hadn’ t even thought of.

The introduction of a forensics solution will provide the increased capabilities to reduce false positives and time spent per case, thereby increasing the incident response team’s ability to process the key highest risk incidents first and faster, and create a proper case file to manage all of the required data.

Having the capability of doubling the number of incidents the response team can resolve in minutes makes choosing the right solution imperative. This report evaluates security forensics tools from an operations standpoint and identifies IBM Security QRadar as a leader among those evaluated. The investigation discusses the evaluation criteria for 6 tools widely recognized for their support in forensics data gathering and processing, and provides evaluation input on several other tools.



Follow a Different Path: Data Discovery and Big Data

PUBLISHED: Wed, 16 Jul 2014 00:00:00 +0000
AUTHOR: John Myers

Big Data and multi-structured data stores are one of the fastest growing areas of data management for organizations implementing Big Data projects.  Many of these organizations in the early and late majority adopters are still looking for the best way to utilize these new data sources.  These sources could have the key to breakthrough business cases.  Alternatively, these Big Data sources could be the wrong information for an organization.  In either of these situations, the subject matter experts will lead the organization to the best use of Big Data sources.  Often, these non-technical business analysts from marketing, operations and finance know the detailed data of their businesses better than the CEOs.  They are best positioned to evaluate any integration of new Big Data sources into the business.  They need to be able to explore the Big Data sources to find the right matches.



3 Reasons to Avoid the Train Wreck that is: SQL on Hadoop

PUBLISHED: Mon, 14 Jul 2014 00:00:00 +0000
AUTHOR: John Myers

SQL on Hadoop is an interesting idea.  It links the data access standard of the Standard Query Language (SQL) with the latest trend in data stores – Apache Hadoop including MapReduce and the Hadoop Distributed File System (HDFS).  The reasons to marry these two technologies are clear.  A majority of the analytical and operational platforms that exchange information in mainstream information technology projects utilize some form of the SQL standard.  From SQL-92 to SQ-99 to the ISO variation, SQL has been one of the key elements in the adoption of relational databases using structured datasets.  SQL is based on the concept that the individual tables in a relational database have a relatively static structure and the metadata for those tables is available for the data access layer (SQL) to understand and access that data.  This is similar to having access to a map when attempting to give directions



EMA Radar for Business Intelligence Platforms for Mid-Sized Organizations: Q2 2014

PUBLISHED: Mon, 30 Jun 2014 00:00:00 +0000
AUTHOR: John Myers

The practices and the implementation of business intelligence are no longer reserved for large enterprises with dedicated information technology (IT) teams. Business intelligence practices such as reporting and analytics are making their way to businesses of all sizes. Smaller organizations once considered that business intelligence was beyond their capital budgets, staff resources and technical environments. These companies under 500 headcount, or their independently operating department brethren in larger enterprises, are often referred to as mid-sized organizations. These organizations are generally characterized by operating teams that due to operating constraints are focused more on effectively managing the top and bottom line of their businesses than they are on the technical elegance of how they operate their businesses. However, despite the focus on general business operations rather than technical implementations, mid-sized organizations have a strong interest in managing their businesses and utilizing all the resources at their disposal to drive revenue, lower costs and improve their margins.

Mid-sized organizations are finding that not only can they implement business intelligence practices and environments, but those practices are providing them with an advantage over their competitors. Some studies indicate that as much as a 20% increase in business performance can be achieved by mid-sized organizations that use business intelligence technologies and practices when the competition does not take advantage of those same facilities.



Report Summary - EMA Radar for Business Intelligence Platforms for Mid-Sized Organizations: Q2 2014

PUBLISHED: Mon, 30 Jun 2014 00:00:00 +0000
AUTHOR: John Myers

This is a summary of the EMA Radar for Business Intelligence Platforms for Mid-Sized Organizations: Q2 2014.

Full Report Abstract
The practices and the implementation of business intelligence are no longer reserved for large enterprises with dedicated information technology (IT) teams. Business intelligence practices such as reporting and analytics are making their way to businesses of all sizes. Smaller organizations once considered that business intelligence was beyond their capital budgets, staff resources and technical environments. These companies under 500 headcount, or their independently operating department brethren in larger enterprises, are often referred to as mid-sized organizations. These organizations are generally characterized by operating teams that due to operating constraints are focused more on effectively managing the top and bottom line of their businesses than they are on the technical elegance of how they operate their businesses. However, despite the focus on general business operations rather than technical implementations, mid-sized organizations have a strong interest in managing their businesses and utilizing all the resources at their disposal to drive revenue, lower costs and improve their margins.

Mid-sized organizations are finding that not only can they implement business intelligence practices and environments, but those practices are providing them with an advantage over their competitors. Some studies indicate that as much as a 20% increase in business performance can be achieved by mid-sized organizations that use business intelligence technologies and practices when the competition does not take advantage of those same facilities.



DevOps and Continuous Delivery: Ten Factors Shaping the Future of Application Delivery

PUBLISHED: Tue, 17 Jun 2014 00:00:00 +0000
AUTHOR: Julie Craig

IT organizations in general are walking a tightrope, attempting to balance business demands with the realities of day-to-day production support. In Psychology, “approach - avoidance” conflicts and “can’t win” situations result in high levels of inertia combined with high levels of stress. Yet modern IT organizations are confronted with the ultimate in dueling objectives: to keep production systems running flawlessly while absorbing constant, increasing levels of potentially disruptive change. 

This EMA Research Report examines the factors which make DevOps and Continuous Delivery agents of change within the enterprise. Focusing on custom (versus packaged) applications delivered by enterprise IT, this report delivers insights into the ways in which DevOps practices can provide a foundation for Continuous Delivery of production-ready code. 

The data within this report was gathered during Quarter 2 of 2014 from technology professionals “on the front lines” of application delivery. Their input reveals that, in this atmosphere of seemingly irreconcilable differences between inertia and change, both DevOps and Continuous Delivery are gaining traction. In context with one another, the two have the potential to reconcile these opposing objectives.



Operationalizing the Buzz: Big Data 2013 Research Summary for SAS

PUBLISHED: Wed, 11 Jun 2014 00:00:00 +0000
AUTHOR: John Myers

The world of Big Data is maturing at a dramatic pace and supporting many of the project activities, information users and financial sponsors that were once the domain of traditional structured data management projects. The 2013 EMA/9sight Big Data research makes a clear case for this maturation of Big Data as a critical approach for innovative companies. This year’s survey went beyond simple questions of strategy, adoption and use to explore why and how companies are utilizing Big Data. This year’s findings show an increased level of Big Data sophistication between 2012 and 2013 respondents. 

This research summary focuses on how SAS and their Big Data solutions are  positioned within the 2013 EMA/9sight research and the overall Big Data marketplace.



The Evolution of Data Driven Security

PUBLISHED: Thu, 05 Jun 2014 00:00:00 +0000
AUTHOR: David Monahan

Information Security has always been a large producer and consumer of data. More sophisticated best practices and expanding compliance and regulatory requirements have almost exponentially accelerated the production and consumption of data. Event and activity logs have grown to Big Data proportions and the diversity of data being consumed has become significantly more varied. As a result, traditional log and event management tools and monitoring practices are becoming increasingly insufficient.

This research studies how both management and operations level IT and information security practitioners perceive the change in the volume and types of data available and the tools needed to provide analysis to generate actionable threat intelligence. Security analytics tools provide practitioners a means to meet their needs for actionable threat intelligence and timely response to attacks to prevent attacks from becoming breaches.

EMA surveyed nearly 300 personnel comparing and contrasting many of the responses by industry vertical, organizational revenue size, and personnel size.  A number of key findings and supporting details were brought to light in the areas of SIEM, Security Analytics and APT/ATA defense technologies. The data reveals many other useful points that will aid the IT/security practitioner and management in advancing the security toolset and practices and the impacts of key program factors.

Information exchnaged factors will include:
1) Rankings of 13 different tools categories with their respective deployment and satisfaction within the repspondent groups.   
2) Value of SIEM vs Security Analytics
3) Effectiveness and Value of security analytics tools as perceived by the business
4) Impact of security tools in incident response.



Next-Generation Asset Management and IT Financial Analytics: Optimizing IT Value in a World of Change

PUBLISHED: Thu, 15 May 2014 00:00:00 +0000
AUTHOR: Dennis Drogseth

How are IT organizations making the transition from a cost-centric, back-office operation to a value-driven business partner? The following research report across more than 150 respondents holds at least a few clues.
A few research highlights, below, help to substantiate this trend. 

* 43% of our respondents believed that asset and service management were at least to some degree integrated in their present environment, and 23% had committed plans to do so in the near future.  

* Spreadsheets still lead as a place for storing data (sad to say), however, 62% are modeling assets with attribute linkages such as customer, owner, SLA, and business outcome, and 57% have a CMDB deployed or plan, while 51% have application discovery and dependency mapping.



Priorities for Achieving Success in SDDC Deployments

PUBLISHED: Thu, 15 May 2014 00:00:00 +0000
AUTHOR: Jim Frey, Former EMA Analyst

The concept of a Software Defined Datacenter (SDDC) has captured the imagination of many, representing the culmination of virtualization and orchestration technology innovations by allowing automated deployment and management of virtual IT resources. This is the complete promise of the cloud, for internal and mixed/hybrid settings. But reaching that goal is not yet a simple process, due to the evolving nature of many of the requisite technology components and the current state of existing IT infrastructure. This white paper highlights results of EMA research into obstacles and priorities encountered by organizations embracing SDDC initiatives.



Managing Networks in the Age of Cloud, SDN, and Big Data: Network Management Megatrends 2014

PUBLISHED: Wed, 14 May 2014 00:00:00 +0000
AUTHOR: Jim Frey, Former EMA Analyst

Networks have never been more critical to the success of IT and the business.  New virtualization and Cloud technologies and services are remaking the face of IT and the way in which infrastructure is architected.  But the common thread throughout is the network, which must be both highly available and high performing.  The tools, technologies, and practices of network monitoring and management address these needs, and are thus essential to the success of every enterprise and governmental organization.

This Enterprise Management Associates (EMA) research report takes a detailed look at the current state of networks and network management, and examines five major areas of change and evolution affecting network management, including Cloud and virtualization, Software Defined Networking (SDN), Big Data, the rise of log data and APIs as management data sources, and the ongoing convergence of network operations teams and tools. The report also examines the context and influence that broader IT and organizational priorities and projects are having on network management priorities, as well as resulting requirements for network management products and solutions. The findings within this report reveal the experiences and objectives that a broad range of organizations have had regarding network management, and thus should serve as a source of requirements and input for strategic network engineering and operations planning.



Operationalizing the Buzz: Big Data 2013 Research Summary for Treasure Data

PUBLISHED: Thu, 08 May 2014 00:00:00 +0000
AUTHOR: John Myers

The world of Big Data is maturing at a dramatic pace and supporting many of the project activities, information users and financial sponsors that were once the domain of traditional structured data management projects.  The 2013 EMA/9sight Big Data research makes a clear case for this maturation of Big Data as a critical approach for innovative companies. This year's survey went beyond simple questions of strategy, adoption and use to explore why and how companies are utilizing Big Data. This year's findings show an increased level of Big Data sophistication between 2012 and 2013 respondents. 

This research summary focuses on how Treasure Data and their cloud-based Big Data solutions are  positioned within the 2013 EMA/9sight research and the overall Big Data marketplace.



Operationalizing the Buzz: Big Data 2013

PUBLISHED: Tue, 06 May 2014 00:00:00 +0000
AUTHOR: John Myers

The world of Big Data is maturing at a dramatic pace and supporting many of the project activities, information users and financial sponsors that were once the domain of traditional structured data management projects. The 2013 EMA/9sight Big Data research makes a clear case for this maturation of Big Data as a critical approach for innovative companies. This year's survey went beyond simple questions of strategy, adoption and use to explore why and how companies are utilizing Big Data. This year's findings show an increased level of Big Data sophistication between 2012 and 2013 respondents. 



Unlocking Your Sales Data with User-Driven BI: Five Essential Components for Successful Business Discovery

PUBLISHED: Mon, 05 May 2014 00:00:00 +0000
AUTHOR: Shawn Rogers, Former EMA Analyst

Sales organizations are a critical component in the success of a company and they require the ability to see and understand the business clearly. Competitive landscapes are getting more complex and difficult to navigate making it more difficult to compete. Speed and accuracy play a role in how efficiently a sales organization can react to opportunities and trends. This white paper explores the five essential components rehired to drive successful business discovery for sales professionals



Security Awareness Training: It's Not Just for Compliance

PUBLISHED: Thu, 17 Apr 2014 00:00:00 +0000
AUTHOR: David Monahan

Security is a key aspect of business in today's world. Announcements are made daily about new data thefts, breaches, and other related security issues, many of which originate as attacks against the workforce. Accordingly, the importance of the human component of security has become increasingly obvious.

The "Security Awareness Training: It's Not Just for Compliance" study conducted by Enterprise Management Associates is a groundbreaking research study examining the implementation and efficacy of security awareness and policy training programs across organizations ranging in size from small to medium businesses to large enterprises, including government entities. The full report analyzes details by organizational size in terms of personnel and revenue as well as by role within the business (IT, Security, and Line of Business), as well as evaluating responses by age groups, 30 years old and younger, thirty-one to forty-five and greater than forty-five.

This research comes at a time when organizations are seeing data breaches announced weekly. The study arms security and IT decision makers with insight on how to champion security awareness and policy programs where there are none and how to improve their existing programs.

The research study included over 600 respondents representing organizations ranging from 10,000 or more personnel, down to small businesses having fewer than 100 employees. Organizations also included public and private companies, government and non-profit groups. Respondents were evaluated collectively, by age group and organization size.



Avoiding the Barriers of In-Memory Business Intelligence: Making Data Discovery Scalable

PUBLISHED: Wed, 16 Apr 2014 00:00:00 +0000
AUTHOR: John Myers

When looking at the growth rates of the business intelligence platform space, it is apparent that acquisitions of new business intelligence tools have shifted dramatically from traditional data visualization and aggregation use cases to newer data discovery implementations. This shift toward data discovery use cases has been driven by two key factors: faster implementation times and the ability to visualize and manipulate data as quickly as an analyst can click a mouse. The improvements in implementation speeds stem from the use of architectures that access source data directly without having to first aggregate all the data in a central location such as an enterprise data warehouse or departmental data mart.  Altosoft's approach to in-memory for business intelligence and analytics meets these requirements and positions organizations to avoid the pitfalls associated with early stage in-memory implementations.  



Operationalizing the Buzz: Big Data 2013 Research Summary for Pivotal

PUBLISHED: Tue, 08 Apr 2014 00:00:00 +0000
AUTHOR: John Myers

The world of Big Data is maturing at a dramatic pace and supporting many of the project activities, information users and financial sponsors that were once the domain of traditional structured data management projects. The 2013 EMA/9sight Big Data research makes a clear case for this maturation of Big Data as a critical approach for innovative companies. This year's survey went beyond simple questions of strategy, adoption and use to explore why and how companies are utilizing Big Data. This year's findings show an increased level of Big Data sophistication between 2012 and 2013 respondents. 

This research summary focuses on how Pivotal and their Big Data solutions are positioned within the 2013 EMA/9sight research and the overall Big Data marketplace.



2014 EMA Vendors to Watch: Business Intelligence and Data Warehousing

PUBLISHED: Tue, 25 Mar 2014 00:00:00 +0000
AUTHOR: John Myers

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2014 EMA Vendors to Watch in the Business Intelligence and Data Warehousing field including:
 
BlueData
DataTorrent
FirstRain
Interana
Splice Machine
Snowflake 
ThoughtSpot
VisualCue
X15 Software 



New Relic Unveils New Relic Insights: Software Analytics for Business Insight

PUBLISHED: Thu, 20 Mar 2014 00:00:00 +0000
AUTHOR: Julie Craig

While the IT-related value propositions of APM solutions are significant, the addition of Advanced Performance Analytics (APA) to such products extends their value beyond IT. There is a great deal of latent business-relevant information within software transactions, yet 99% of companies ignore this data as a source of useful business insight. EMA has extensively researched APA as a source of both IT and business insight. Advanced Performance Analytics, as EMA defines it, brings real-time or near real-time "big data" to IT operations, architects, service managers and even applications development, as well as IT executives and non-IT business stakeholders. Two use cases include: 

- Technical performance analytics supporting the resiliency of critical application and business services with a strong focus on triage and diagnostics
- Business impact management, which includes such factors as customer experience, business process impacts, business activity management and data such as revenue per transaction, abandonment rates, competitive impact, and IT operational efficiency.

While New Relicís traditional focus has been on technical performance analysis, the New Relic Insights product addresses business impact management as well. This new solution is designed to "crack open" transactional data to make business (and technology) insights available to business and IT stakeholders.

This EMA white paper discusses the value proposition of APM solutions, particularly when sophisticated analytics are added to the mix. In this context, it will describe the fundamental capabilities of New Relic Insights (Insights), along with the implications to customers, prospects and the industry at large.



Operationalizing the Buzz: Big Data 2013 Research Summary for Actian

PUBLISHED: Wed, 19 Mar 2014 00:00:00 +0000
AUTHOR: John Myers

The world of Big Data is maturing at a dramatic pace and supporting many of the project activities, information users and financial sponsors that were once the domain of traditional structured data management projects. The 2013 EMA/9sight Big Data research makes a clear case for this maturation of Big Data as a critical approach for innovative companies. This yearís survey went beyond simple questions of strategy, adoption and use to explore why and how companies are utilizing Big Data. This yearís findings show an increased level of Big Data sophistication between 2012 and 2013 respondents. 

This research summary focuses on how Actian and their Big Data solutions fit into the EMA/9sight research and the wider marketplace.



Operationalizing the Buzz: Big Data 2013 Research Summary for SAP

PUBLISHED: Wed, 19 Mar 2014 00:00:00 +0000
AUTHOR: John Myers

The world of Big Data is maturing at a dramatic pace and supporting many of the project activities, information users and financial sponsors that were once the domain of traditional structured data management projects. The 2013 EMA/9sight Big Data research makes a clear case for this maturation of Big Data as a critical approach for innovative companies. This year's survey went beyond simple questions of strategy, adoption and use to explore why and how companies are utilizing Big Data. This year's findings show an increased level of Big Data sophistication between 2012 and 2013 respondents. 

This research summary focuses on how SAP and their Big Data solutions fit into the EMA/9sight research and the wider marketplace.



Evolution to Revolution: Big Data 2.0

PUBLISHED: Wed, 12 Mar 2014 00:00:00 +0000
AUTHOR: Shawn Rogers, Former EMA Analyst

Big Data 2.0 has arrived and early adopters of Big Data 1.0 strategies are challenged by poorly integrated traditional systems that are inflexible and difficult to manage. The big data landscape continues to shift towards more sophisticated workloads that go beyond simple analytics towards operational processes that drive deep businesses value. Diverse data sources and real-time demands are changing traditional architectures to include an array of purpose-built platforms presenting new opportunities and challenges.



Improve IT Agility and Efficiency: Analytics Deliver New Insights into Operational Big Data

PUBLISHED: Thu, 27 Feb 2014 00:00:00 +0000
AUTHOR: Dennis Drogseth

IT Operations Analytics solutions help customers predict outages before they occur and search across massive amounts of data to find and resolve problems faster. The knowledge gained through analytics will help optimize a company's IT and application infrastructure. With the availability of Netcool Operations Insight, IBM is extending its leadership operations event and alarm management console to provide customers with intelligence from events for both real time and historical analytics to drive efficiencies and more agile and leaner operations.



A Brain for the Software Defined Data Center

PUBLISHED: Tue, 18 Feb 2014 00:00:00 +0000
AUTHOR: Torsten Volk, Former EMA Analyst

EMA analysts asked IT executives, IT operations staff and line of business managers and executives of 235 organizations with highly mature IT departments about the key obstacles and priorities to optimally deliver and manage applications. This EMA research has shown that IT service provisioning times in 2014 are still mostly measured in weeks or even months. This time can be broken down into a decision and planning period, and the time required for executing the actual provisioning actions. Therefore, tools to power the Software Defined Data Center (SDDC) must offer solutions for both the decision and the provisioning challenge.



SMBs Soar to the Cloud to Combat Cyber Attacks

PUBLISHED: Tue, 04 Feb 2014 00:00:00 +0000
AUTHOR: David Monahan

In recent years, researchers have noted sharp increases in the number of successful attacks against the small- to medium-sized business (SMB). These attacks are ever increasing and successful due primarily to two factors. First, SMBs have valuable assets to be had. Secondly they don't have the budgets to support the security talent and in-house technology they desperately need to adequately defend those
assets. EMA analysts see that this is a part of the SMB lifecycle, the consequence of long-term security neglect. Longstanding resource insufficiency and the limited availability of security expertise has left many SMBs vulnerable to the expanding epidemic of attacks that have the efficiency and impact fully industrialized scale. Today, however, SMBs are recognizing that they can leverage cloud-based security technologies and services to make significant advances in reversing the consequences of long-term neglect, giving them the opportunity to rebalance the scales to their advantage. As a long term player and an established leader in cloud security, Qualys is among those championing this trend, with solutions such as QualysGuard Express Lite, which is tailored to the needs of the SMB.



2014 EMA Vendors to Watch: Systems Management

PUBLISHED: Tue, 04 Feb 2014 00:00:00 +0000
AUTHOR: Steve Brasen

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2014 EMA Vendors to Watch in the Systems Management field including Power Assure.



2013 EMA Vendors to Watch: Application Management

PUBLISHED: Wed, 29 Jan 2014 00:00:00 +0000
AUTHOR: Julie Craig

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2013 EMA Vendors to Watch in the Application Management field including Cloud Technology Partners and CopperEgg. 



2013 EMA Vendors to Watch: Network Management

PUBLISHED: Wed, 29 Jan 2014 00:00:00 +0000
AUTHOR: Jim Frey, Former EMA Analyst

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2013 EMA Vendors to Watch in the Network Management field including:
 
ActionPacked Networks
Cumulus Networks
Kemp Technologies
LiveQoS
NetYCE
Pica8
Talari Networks



2014 EMA Vendors to Watch: Information Management

PUBLISHED: Wed, 29 Jan 2014 00:00:00 +0000
AUTHOR: Evan Quinn, Former EMA Analyst

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2014 EMA Vendors to Watch in the Information Management field including SnapLogic.


     

Subscribe Now!


Subscribe with My Yahoo!

Subscribe with NewsGator

Subscribe with My AOL

Subscribe with Bloglines

Subscribe with Netvibes

Subscribe with Google

EMA on Facebook   EMA on LinkedIn   EMA on Twitter   EMA RSS   EMA on YouTube

©1996-2015 Enterprise Management Associates, Inc. All rights reserved.
EMA™, ENTERPRISE MANAGEMENT ASSOCIATES®, and the mobius symbol are registered trademarks or common-law trademarks of Enterprise Management Associates, Inc.
Site Terms & Conditions | Integrity Policy | Site Map | My Account
Hide
Subscribe to EMA RSS Feed
Email
Show