IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING

CONTACT    SIGN IN    SIGN UP
    

Free RSS Feeds from Enterprise Management Associates (EMA)

Stay up to date on the latest IT and data management information from EMA, including Webinars, Radar Reports, white papers, impact briefs, advisory notes and more!

Select your preferred reader by selecting an icon on the right.



Current Feed Content:




Report Summary - EMA Radar for Enterprise Network Availability Monitoring System (ENAMS): Q3 2014

PUBLISHED: Thu, 24 Jul 2014 00:00:00 +0000
AUTHOR: Jim Frey

This is the summary of the EMA Radar for Enterprise Network Availability Monitoring System (ENAMS): Q3 2014.


Report Abstract
The practice of network availability monitoring can range from simple standalone up/down monitoring of individual devices to complex, highly customized and automated approaches that fully integrate into broader management systems architectures. Enterprise Management Associates (EMA) analysts define the term “Enterprise Network Availability Monitoring System” (ENAMS) to include network-centric monitoring solutions that are used by enterprise network operations and engineering teams to discover, monitor, assess, troubleshoot, and manage medium to large enterprise network infrastructures. For this EMA Radar Report, specific focus has been placed on two areas: the core capabilities and features that address network operators’ needs to ensure health and availability of the network; and the overall practitioner experience in procuring, deploying, administering, and using specific ENAMS products. In all, 17 products from 16 vendor suppliers are reviewed and compared in this study.



Attaining PCI 3.0 Compliance: Building on an Effective Systems Management Foundation

PUBLISHED: Wed, 23 Jul 2014 00:00:00 +0000
AUTHOR: David Monahan

As risks of data theft and the compromise of personal information have risen, the payment card industry has responded with one of the most prescriptive regulatory mandates to impact IT: the Payment Card Industry Data Security Standard. In November of 2013, the PCI Standards Council published the updated standard as PCI DSS 3.0. Enterprise Management Associates (EMA) evaluates how DELL's suite of products and solutions including DELL KACE, SonicWall, SecureWorks, and Data Protection Encryption, if implemented properly can help organizations address many requirements in the updated standard.  

Clearly, systems management is front-and-center when it comes to assuring many of the requirements, for building, deploying, configuring and maintaining secure systems that access and handle cardholder information. These requirements are not just limited to the data center; the PCI DSS is as specific about requirements affecting user endpoints that handle cardholder data as it is about servers and networks at the heart of payment card information systems. These diverse requirements call for systems management solutions that embrace breadth as well as depth in compliance-enabling capability.

In this paper, EMA evaluates the capabilities of many of DELL's solutions against specific PCI DSS requirements identifying which PCI 3.0 requirements those solutions address in both leading and key supporting roles. The Dell KACE family of systems management appliances and features are highlighted as examples that enable organizations of all sizes to manage their PCI compliance requirements without the cost and complexity often associated with more traditional approaches, supplemented by Dell SonicWall, Data Protection Encryption, and SecureWorks security services that help organizations implement PCI compliance with proven expertise. 



Data Capture and Network Forensics, State-of-the-Market: IBM Security QRadar Incident Forensics vs. Other Industry Tools

PUBLISHED: Sun, 20 Jul 2014 00:00:00 +0000
AUTHOR: David Monahan

The ability to capture, consume and correlate multifaceted data from all over the enterprise is a growing need. No single data source or type can provide sufficient forensic capabilities to solve all of today’s security problems. End user research conducted by ENTERPRISE MANAGEMENT ASSOCIATES (EMA) demonstrates that the data needs of security organizations are growing at breakneck speeds reaching volumes associated with Big Data. Log information from network and server infrastructure is no longer sufficient to provide a full picture. Security needs to process a broader and richer data set including network and Big Data repositories. Additionally, the security technology has to be able to correlate commonalities within those variant data streams to produce meaningful data trails and do it in as near to real time as possible. A 2013 study by Ponemon Institute identified that if a security incident can be resolved in less than 60 seconds, the remediation costs could be reduced by as much as 40%. 

Traditional log management tools do not contain the range of data or data mining and analysis capabilities to deliver true security analytics and forensics. Security Incident Event Management (SIEM) tools, provide more capabilities but are also insufficient for full forensic analysis. Fifty-three percent of EMA research respondents understood that Security Analytics and forensics tools augmented their SIEM tools and 46% understood that security analytics and forensics tools were a natural evolution of the traditional SIEM. A good rule to follow is that a SIEM should provide correlation, normalization and alerts on key events and have the ability to query the data to retrieve answers to complex questions about the specific environment. A security analytics solution is able to adapt to the activities and behaviors within its monitored environment providing improved visibility into activities and why they should be investigated. It can ingest non-standard log data types at Big Data proportions to provide visibility into abstract data relationships bringing attention to problems that operators and administrators hadn’ t even thought of.

The introduction of a forensics solution will provide the increased capabilities to reduce false positives and time spent per case, thereby increasing the incident response team’s ability to process the key highest risk incidents first and faster, and create a proper case file to manage all of the required data.

Having the capability of doubling the number of incidents the response team can resolve in minutes makes choosing the right solution imperative. This report evaluates security forensics tools from an operations standpoint and identifies IBM Security QRadar as a leader among those evaluated. The investigation discusses the evaluation criteria for 6 tools widely recognized for their support in forensics data gathering and processing, and provides evaluation input on several other tools.



Follow a Different Path: Data Discovery and Big Data

PUBLISHED: Wed, 16 Jul 2014 00:00:00 +0000
AUTHOR: John Myers

Big Data and multi-structured data stores are one of the fastest growing areas of data management for organizations implementing Big Data projects.  Many of these organizations in the early and late majority adopters are still looking for the best way to utilize these new data sources.  These sources could have the key to breakthrough business cases.  Alternatively, these Big Data sources could be the wrong information for an organization.  In either of these situations, the subject matter experts will lead the organization to the best use of Big Data sources.  Often, these non-technical business analysts from marketing, operations and finance know the detailed data of their businesses better than the CEOs.  They are best positioned to evaluate any integration of new Big Data sources into the business.  They need to be able to explore the Big Data sources to find the right matches.



3 Reasons to Avoid the Train Wreck that is: SQL on Hadoop

PUBLISHED: Mon, 14 Jul 2014 00:00:00 +0000
AUTHOR: John Myers

SQL on Hadoop is an interesting idea.  It links the data access standard of the Standard Query Language (SQL) with the latest trend in data stores – Apache Hadoop including MapReduce and the Hadoop Distributed File System (HDFS).  The reasons to marry these two technologies are clear.  A majority of the analytical and operational platforms that exchange information in mainstream information technology projects utilize some form of the SQL standard.  From SQL-92 to SQ-99 to the ISO variation, SQL has been one of the key elements in the adoption of relational databases using structured datasets.  SQL is based on the concept that the individual tables in a relational database have a relatively static structure and the metadata for those tables is available for the data access layer (SQL) to understand and access that data.  This is similar to having access to a map when attempting to give directions



EMA Radar for Business Intelligence Platforms for Mid-Sized Organizations: Q2 2014

PUBLISHED: Mon, 30 Jun 2014 00:00:00 +0000
AUTHOR: John Myers

The practices and the implementation of business intelligence are no longer reserved for large enterprises with dedicated information technology (IT) teams. Business intelligence practices such as reporting and analytics are making their way to businesses of all sizes. Smaller organizations once considered that business intelligence was beyond their capital budgets, staff resources and technical environments. These companies under 500 headcount, or their independently operating department brethren in larger enterprises, are often referred to as mid-sized organizations. These organizations are generally characterized by operating teams that due to operating constraints are focused more on effectively managing the top and bottom line of their businesses than they are on the technical elegance of how they operate their businesses. However, despite the focus on general business operations rather than technical implementations, mid-sized organizations have a strong interest in managing their businesses and utilizing all the resources at their disposal to drive revenue, lower costs and improve their margins.

Mid-sized organizations are finding that not only can they implement business intelligence practices and environments, but those practices are providing them with an advantage over their competitors. Some studies indicate that as much as a 20% increase in business performance can be achieved by mid-sized organizations that use business intelligence technologies and practices when the competition does not take advantage of those same facilities.



Report Summary - EMA Radar for Business Intelligence Platforms for Mid-Sized Organizations: Q2 2014

PUBLISHED: Mon, 30 Jun 2014 00:00:00 +0000
AUTHOR: John Myers

This is a summary of the EMA Radar for Business Intelligence Platforms for Mid-Sized Organizations: Q2 2014.

Full Report Abstract
The practices and the implementation of business intelligence are no longer reserved for large enterprises with dedicated information technology (IT) teams. Business intelligence practices such as reporting and analytics are making their way to businesses of all sizes. Smaller organizations once considered that business intelligence was beyond their capital budgets, staff resources and technical environments. These companies under 500 headcount, or their independently operating department brethren in larger enterprises, are often referred to as mid-sized organizations. These organizations are generally characterized by operating teams that due to operating constraints are focused more on effectively managing the top and bottom line of their businesses than they are on the technical elegance of how they operate their businesses. However, despite the focus on general business operations rather than technical implementations, mid-sized organizations have a strong interest in managing their businesses and utilizing all the resources at their disposal to drive revenue, lower costs and improve their margins.

Mid-sized organizations are finding that not only can they implement business intelligence practices and environments, but those practices are providing them with an advantage over their competitors. Some studies indicate that as much as a 20% increase in business performance can be achieved by mid-sized organizations that use business intelligence technologies and practices when the competition does not take advantage of those same facilities.



DevOps and Continuous Delivery: Ten Factors Shaping the Future of Application Delivery

PUBLISHED: Tue, 17 Jun 2014 00:00:00 +0000
AUTHOR: Julie Craig

IT organizations in general are walking a tightrope, attempting to balance business demands with the realities of day-to-day production support. In Psychology, “approach - avoidance” conflicts and “can’t win” situations result in high levels of inertia combined with high levels of stress. Yet modern IT organizations are confronted with the ultimate in dueling objectives: to keep production systems running flawlessly while absorbing constant, increasing levels of potentially disruptive change. 

This EMA Research Report examines the factors which make DevOps and Continuous Delivery agents of change within the enterprise. Focusing on custom (versus packaged) applications delivered by enterprise IT, this report delivers insights into the ways in which DevOps practices can provide a foundation for Continuous Delivery of production-ready code. 

The data within this report was gathered during Quarter 2 of 2014 from technology professionals “on the front lines” of application delivery. Their input reveals that, in this atmosphere of seemingly irreconcilable differences between inertia and change, both DevOps and Continuous Delivery are gaining traction. In context with one another, the two have the potential to reconcile these opposing objectives.



Operationalizing the Buzz: Big Data 2013 Research Summary for SAS

PUBLISHED: Wed, 11 Jun 2014 00:00:00 +0000
AUTHOR: John Myers

The world of Big Data is maturing at a dramatic pace and supporting many of the project activities, information users and financial sponsors that were once the domain of traditional structured data management projects. The 2013 EMA/9sight Big Data research makes a clear case for this maturation of Big Data as a critical approach for innovative companies. This year’s survey went beyond simple questions of strategy, adoption and use to explore why and how companies are utilizing Big Data. This year’s findings show an increased level of Big Data sophistication between 2012 and 2013 respondents. 

This research summary focuses on how SAS and their Big Data solutions are  positioned within the 2013 EMA/9sight research and the overall Big Data marketplace.



The Evolution of Data Driven Security

PUBLISHED: Thu, 05 Jun 2014 00:00:00 +0000
AUTHOR: David Monahan

Information Security has always been a large producer and consumer of data. More sophisticated best practices and expanding compliance and regulatory requirements have almost exponentially accelerated the production and consumption of data. Event and activity logs have grown to Big Data proportions and the diversity of data being consumed has become significantly more varied. As a result, traditional log and event management tools and monitoring practices are becoming increasingly insufficient.

This research studies how both management and operations level IT and information security practitioners perceive the change in the volume and types of data available and the tools needed to provide analysis to generate actionable threat intelligence. Security analytics tools provide practitioners a means to meet their needs for actionable threat intelligence and timely response to attacks to prevent attacks from becoming breaches.

EMA surveyed nearly 300 personnel comparing and contrasting many of the responses by industry vertical, organizational revenue size, and personnel size.  A number of key findings and supporting details were brought to light in the areas of SIEM, Security Analytics and APT/ATA defense technologies. The data reveals many other useful points that will aid the IT/security practitioner and management in advancing the security toolset and practices and the impacts of key program factors.

Information exchnaged factors will include:
1) Rankings of 13 different tools categories with their respective deployment and satisfaction within the repspondent groups.   
2) Value of SIEM vs Security Analytics
3) Effectiveness and Value of security analytics tools as perceived by the business
4) Impact of security tools in incident response.



Next-Generation Asset Management and IT Financial Analytics: Optimizing IT Value in a World of Change

PUBLISHED: Thu, 15 May 2014 00:00:00 +0000
AUTHOR: Dennis Drogseth

How are IT organizations making the transition from a cost-centric, back-office operation to a value-driven business partner? The following research report across more than 150 respondents holds at least a few clues.
A few research highlights, below, help to substantiate this trend. 

* 43% of our respondents believed that asset and service management were at least to some degree integrated in their present environment, and 23% had committed plans to do so in the near future.  

* Spreadsheets still lead as a place for storing data (sad to say), however, 62% are modeling assets with attribute linkages such as customer, owner, SLA, and business outcome, and 57% have a CMDB deployed or plan, while 51% have application discovery and dependency mapping.



Priorities for Achieving Success in SDDC Deployments

PUBLISHED: Thu, 15 May 2014 00:00:00 +0000
AUTHOR: Jim Frey

The concept of a Software Defined Datacenter (SDDC) has captured the imagination of many, representing the culmination of virtualization and orchestration technology innovations by allowing automated deployment and management of virtual IT resources. This is the complete promise of the cloud, for internal and mixed/hybrid settings. But reaching that goal is not yet a simple process, due to the evolving nature of many of the requisite technology components and the current state of existing IT infrastructure. This white paper highlights results of EMA research into obstacles and priorities encountered by organizations embracing SDDC initiatives.



Managing Networks in the Age of Cloud, SDN, and Big Data: Network Management Megatrends 2014

PUBLISHED: Wed, 14 May 2014 00:00:00 +0000
AUTHOR: Jim Frey

Networks have never been more critical to the success of IT and the business.  New virtualization and Cloud technologies and services are remaking the face of IT and the way in which infrastructure is architected.  But the common thread throughout is the network, which must be both highly available and high performing.  The tools, technologies, and practices of network monitoring and management address these needs, and are thus essential to the success of every enterprise and governmental organization.

This Enterprise Management Associates (EMA) research report takes a detailed look at the current state of networks and network management, and examines five major areas of change and evolution affecting network management, including Cloud and virtualization, Software Defined Networking (SDN), Big Data, the rise of log data and APIs as management data sources, and the ongoing convergence of network operations teams and tools. The report also examines the context and influence that broader IT and organizational priorities and projects are having on network management priorities, as well as resulting requirements for network management products and solutions. The findings within this report reveal the experiences and objectives that a broad range of organizations have had regarding network management, and thus should serve as a source of requirements and input for strategic network engineering and operations planning.



Operationalizing the Buzz: Big Data 2013 Research Summary for Treasure Data

PUBLISHED: Thu, 08 May 2014 00:00:00 +0000
AUTHOR: John Myers

The world of Big Data is maturing at a dramatic pace and supporting many of the project activities, information users and financial sponsors that were once the domain of traditional structured data management projects.  The 2013 EMA/9sight Big Data research makes a clear case for this maturation of Big Data as a critical approach for innovative companies. This year's survey went beyond simple questions of strategy, adoption and use to explore why and how companies are utilizing Big Data. This year's findings show an increased level of Big Data sophistication between 2012 and 2013 respondents. 

This research summary focuses on how Treasure Data and their cloud-based Big Data solutions are  positioned within the 2013 EMA/9sight research and the overall Big Data marketplace.



Operationalizing the Buzz: Big Data 2013

PUBLISHED: Tue, 06 May 2014 00:00:00 +0000
AUTHOR: John Myers

The world of Big Data is maturing at a dramatic pace and supporting many of the project activities, information users and financial sponsors that were once the domain of traditional structured data management projects. The 2013 EMA/9sight Big Data research makes a clear case for this maturation of Big Data as a critical approach for innovative companies. This year's survey went beyond simple questions of strategy, adoption and use to explore why and how companies are utilizing Big Data. This year's findings show an increased level of Big Data sophistication between 2012 and 2013 respondents. 



Security Awareness Training: It's Not Just for Compliance

PUBLISHED: Thu, 17 Apr 2014 00:00:00 +0000
AUTHOR: David Monahan

Security is a key aspect of business in today's world. Announcements are made daily about new data thefts, breaches, and other related security issues, many of which originate as attacks against the workforce. Accordingly, the importance of the human component of security has become increasingly obvious.

The "Security Awareness Training: It's Not Just for Compliance" study conducted by Enterprise Management Associates is a groundbreaking research study examining the implementation and efficacy of security awareness and policy training programs across organizations ranging in size from small to medium businesses to large enterprises, including government entities. The full report analyzes details by organizational size in terms of personnel and revenue as well as by role within the business (IT, Security, and Line of Business), as well as evaluating responses by age groups, 30 years old and younger, thirty-one to forty-five and greater than forty-five.

This research comes at a time when organizations are seeing data breaches announced weekly. The study arms security and IT decision makers with insight on how to champion security awareness and policy programs where there are none and how to improve their existing programs.

The research study included over 600 respondents representing organizations ranging from 10,000 or more personnel, down to small businesses having fewer than 100 employees. Organizations also included public and private companies, government and non-profit groups. Respondents were evaluated collectively, by age group and organization size.



Avoiding the Barriers of In-Memory Business Intelligence: Making Data Discovery Scalable

PUBLISHED: Wed, 16 Apr 2014 00:00:00 +0000
AUTHOR: John Myers

When looking at the growth rates of the business intelligence platform space, it is apparent that acquisitions of new business intelligence tools have shifted dramatically from traditional data visualization and aggregation use cases to newer data discovery implementations. This shift toward data discovery use cases has been driven by two key factors: faster implementation times and the ability to visualize and manipulate data as quickly as an analyst can click a mouse. The improvements in implementation speeds stem from the use of architectures that access source data directly without having to first aggregate all the data in a central location such as an enterprise data warehouse or departmental data mart.  Altosoft's approach to in-memory for business intelligence and analytics meets these requirements and positions organizations to avoid the pitfalls associated with early stage in-memory implementations.  



Operationalizing the Buzz: Big Data 2013 Research Summary for Pivotal

PUBLISHED: Tue, 08 Apr 2014 00:00:00 +0000
AUTHOR: John Myers

The world of Big Data is maturing at a dramatic pace and supporting many of the project activities, information users and financial sponsors that were once the domain of traditional structured data management projects. The 2013 EMA/9sight Big Data research makes a clear case for this maturation of Big Data as a critical approach for innovative companies. This year's survey went beyond simple questions of strategy, adoption and use to explore why and how companies are utilizing Big Data. This year's findings show an increased level of Big Data sophistication between 2012 and 2013 respondents. 

This research summary focuses on how Pivotal and their Big Data solutions are positioned within the 2013 EMA/9sight research and the overall Big Data marketplace.



2014 EMA Vendors to Watch: Business Intelligence and Data Warehousing

PUBLISHED: Tue, 25 Mar 2014 00:00:00 +0000
AUTHOR: John Myers

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2014 EMA Vendors to Watch in the Business Intelligence and Data Warehousing field. Vendors will be added to this document throughout the year.



New Relic Unveils New Relic Insights: Software Analytics for Business Insight

PUBLISHED: Thu, 20 Mar 2014 00:00:00 +0000
AUTHOR: Julie Craig

While the IT-related value propositions of APM solutions are significant, the addition of Advanced Performance Analytics (APA) to such products extends their value beyond IT. There is a great deal of latent business-relevant information within software transactions, yet 99% of companies ignore this data as a source of useful business insight. EMA has extensively researched APA as a source of both IT and business insight. Advanced Performance Analytics, as EMA defines it, brings real-time or near real-time "big data" to IT operations, architects, service managers and even applications development, as well as IT executives and non-IT business stakeholders. Two use cases include: 

- Technical performance analytics supporting the resiliency of critical application and business services with a strong focus on triage and diagnostics
- Business impact management, which includes such factors as customer experience, business process impacts, business activity management and data such as revenue per transaction, abandonment rates, competitive impact, and IT operational efficiency.

While New Relicís traditional focus has been on technical performance analysis, the New Relic Insights product addresses business impact management as well. This new solution is designed to "crack open" transactional data to make business (and technology) insights available to business and IT stakeholders.

This EMA white paper discusses the value proposition of APM solutions, particularly when sophisticated analytics are added to the mix. In this context, it will describe the fundamental capabilities of New Relic Insights (Insights), along with the implications to customers, prospects and the industry at large.



Operationalizing the Buzz: Big Data 2013 Research Summary for Actian

PUBLISHED: Wed, 19 Mar 2014 00:00:00 +0000
AUTHOR: John Myers

The world of Big Data is maturing at a dramatic pace and supporting many of the project activities, information users and financial sponsors that were once the domain of traditional structured data management projects. The 2013 EMA/9sight Big Data research makes a clear case for this maturation of Big Data as a critical approach for innovative companies. This yearís survey went beyond simple questions of strategy, adoption and use to explore why and how companies are utilizing Big Data. This yearís findings show an increased level of Big Data sophistication between 2012 and 2013 respondents. 

This research summary focuses on how Actian and their Big Data solutions fit into the EMA/9sight research and the wider marketplace.



Operationalizing the Buzz: Big Data 2013 Research Summary for SAP

PUBLISHED: Wed, 19 Mar 2014 00:00:00 +0000
AUTHOR: John Myers

The world of Big Data is maturing at a dramatic pace and supporting many of the project activities, information users and financial sponsors that were once the domain of traditional structured data management projects. The 2013 EMA/9sight Big Data research makes a clear case for this maturation of Big Data as a critical approach for innovative companies. This year's survey went beyond simple questions of strategy, adoption and use to explore why and how companies are utilizing Big Data. This year's findings show an increased level of Big Data sophistication between 2012 and 2013 respondents. 

This research summary focuses on how SAP and their Big Data solutions fit into the EMA/9sight research and the wider marketplace.



Evolution to Revolution: Big Data 2.0

PUBLISHED: Wed, 12 Mar 2014 00:00:00 +0000
AUTHOR: Shawn Rogers

Big Data 2.0 has arrived and early adopters of Big Data 1.0 strategies are challenged by poorly integrated traditional systems that are inflexible and difficult to manage. The big data landscape continues to shift towards more sophisticated workloads that go beyond simple analytics towards operational processes that drive deep businesses value. Diverse data sources and real-time demands are changing traditional architectures to include an array of purpose-built platforms presenting new opportunities and challenges.



Improve IT Agility and Efficiency: Analytics Deliver New Insights into Operational Big Data

PUBLISHED: Thu, 27 Feb 2014 00:00:00 +0000
AUTHOR: Dennis Drogseth

IT Operations Analytics solutions help customers predict outages before they occur and search across massive amounts of data to find and resolve problems faster. The knowledge gained through analytics will help optimize a company's IT and application infrastructure. With the availability of Netcool Operations Insight, IBM is extending its leadership operations event and alarm management console to provide customers with intelligence from events for both real time and historical analytics to drive efficiencies and more agile and leaner operations.



A Brain for the Software Defined Data Center

PUBLISHED: Tue, 18 Feb 2014 00:00:00 +0000
AUTHOR: Torsten Volk, Former EMA Analyst

EMA analysts asked IT executives, IT operations staff and line of business managers and executives of 235 organizations with highly mature IT departments about the key obstacles and priorities to optimally deliver and manage applications. This EMA research has shown that IT service provisioning times in 2014 are still mostly measured in weeks or even months. This time can be broken down into a decision and planning period, and the time required for executing the actual provisioning actions. Therefore, tools to power the Software Defined Data Center (SDDC) must offer solutions for both the decision and the provisioning challenge.



SMBs Soar to the Cloud to Combat Cyber Attacks

PUBLISHED: Tue, 04 Feb 2014 00:00:00 +0000
AUTHOR: David Monahan

In recent years, researchers have noted sharp increases in the number of successful attacks against the small- to medium-sized business (SMB). These attacks are ever increasing and successful due primarily to two factors. First, SMBs have valuable assets to be had. Secondly they don't have the budgets to support the security talent and in-house technology they desperately need to adequately defend those
assets. EMA analysts see that this is a part of the SMB lifecycle, the consequence of long-term security neglect. Longstanding resource insufficiency and the limited availability of security expertise has left many SMBs vulnerable to the expanding epidemic of attacks that have the efficiency and impact fully industrialized scale. Today, however, SMBs are recognizing that they can leverage cloud-based security technologies and services to make significant advances in reversing the consequences of long-term neglect, giving them the opportunity to rebalance the scales to their advantage. As a long term player and an established leader in cloud security, Qualys is among those championing this trend, with solutions such as QualysGuard Express Lite, which is tailored to the needs of the SMB.



2014 EMA Vendors to Watch: Systems Management

PUBLISHED: Tue, 04 Feb 2014 00:00:00 +0000
AUTHOR: Steve Brasen

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2014 EMA Vendors to Watch in the Systems Management field. Vendors that EMA designates to be "Vendors to Watch" will be added to this document throughout the year.



2013 EMA Vendors to Watch: Application Management

PUBLISHED: Wed, 29 Jan 2014 00:00:00 +0000
AUTHOR: Julie Craig

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2013 EMA Vendors to Watch in the Application Management field. Vendors will be added to this document throughout the year.



2013 EMA Vendors to Watch: Network Management

PUBLISHED: Wed, 29 Jan 2014 00:00:00 +0000
AUTHOR: Jim Frey

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2013 EMA Vendors to Watch in the Network Management field. Vendors will be added to this document throughout the year.



2014 EMA Vendors to Watch: Information Management

PUBLISHED: Wed, 29 Jan 2014 00:00:00 +0000
AUTHOR: Evan Quinn, Former EMA Analyst

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2014 EMA Vendors to Watch in the Information Management field. Vendors will be added to this document throughout the year.



Obstacles and Priorities on the Journey to the Software-Defined Data Center

PUBLISHED: Mon, 27 Jan 2014 00:00:00 +0000
AUTHOR: Torsten Volk, Former EMA Analyst

Organizations have long been frustrated with slow delivery of new applications and IT's common lack of ability to optimally operate, manage and update these applications. Public cloud services have benefited greatly as a result, due to the perception that they are faster to deploy and easier to manage. But internal IT must respond as well. The concept of the Software-Defined Data Center (SDDC) picked up tremendous traction in 2013 and it is safe to predict that the SDDC will become one of the dominating trends in enterprise IT in 2014. At the core of the SDDC is the belief that in order to better serve the business, IT infrastructure--internal and external--must be controlled centrally and become radically aligned along application and service requirements. Deploying, operating, managing and updating applications in the most cost-effective, secure, agile and policy-compliant manner is the key goal of the SDDC. Business units are exerting a tremendous amount of pressure on the IT department to accelerate this process, requiring IT to obtain new skills, such as "programming," and to focus on developing cross-domain expertise.

Today there are no central management technologies that are able to control and unify the entire data center and the public cloud. However, this Enterprise Management Associates (EMA) research illustrates that successfully implementing the SDDC starts with an IT operations mindset that focuses on reinventing the infrastructure provisioning and management process in a much more policy-driven manner. Study respondents acknowledged the fact that the SDDC cannot be implemented in the form of a technology project, but rather constitutes a concept that describes guidelines that follow the multi-year vision of entirely closing the traditional gap between enterprise IT and the business.

The SDDC today can also be described as a strategic shift that requires sometimes drastic changes in culture, organization and processes, more than posing a technology challenge. Positioning the SDDC as simply a technology challenge would be simplifying this complex topic and lead to missed expectations. This EMA study is taking a look into the future by focusing on the expertise and opinions of early adopters and visionaries to determine obstacles and priorities on the way to managing the data center and external resources--IaaS, PaaS, SaaS and ultimately BPaaS--in a performance-, resilience-, security- and SLA-driven manner.

Study respondents identified "centralized management across a massively heterogeneous IT infrastructure," "repeatable configuration of software and infrastructure for optimal application deployment" and "orchestration and automation for application deployments across silos" as the core priorities on the journey to the SDDC today. Organizations indicated plans to rely on IT vendors for help in the form of professional consulting and implementation services in the areas of "legacy infrastructure integration" and improved "IT alignment with business requirements."

In 2014, data center investments will focus on capacity management tools, multi-virtualization and/or multi-cloud management platforms, configuration management software and solutions for the centralized management of physical, virtual and cloud resources. Organizations are also seeking to benefit from the ROI and cost advantages of Software Defined Storage (SDS), software-defined networking and network virtualization. All three of these technologies can be seen as catalysts for a more application-centric data center. 

OpenStack, by the end of 2014, will be found within approximately half of IT departments within the EMA sample of early adopters. However, until business-critical use cases become more common for OpenStack deployments, EMA is unwilling to declare OpenStack the winner of the IaaS race.

In short, 2014 is the year of the SDDC and providing developers and applications owners with what they need to successfully deploy, operate and manage an ever-growing number of enterprise applications.



Six Priorities for Unified Communications Management

PUBLISHED: Fri, 10 Jan 2014 00:00:00 +0000
AUTHOR: Jim Frey

Unified communications (UC) technologies that take advantage of common/converged IP networks have reached mainstream status, but the operational planning, monitoring, and troubleshooting of these critical services remains a challenge for many IT organizations. Management tools, technologies, and practices play a crucial role in helping to proactively protect and assure the availability and performance of UC applications, as well as providing the means for rapidly troubleshooting and restoring services when issues arise. This EMA whitepaper reviews the six top priorities for efficient and effective UC management, and presents CA Unified Communications Monitor (CA UC Monitor), the CA Technologies solution for addressing these needs.  Also included is a case study illustrating the way in which CA UC Monitor has been employed within a large enterprise setting.  



Workload Automation: The Business Process Integration Hub in the Age of Cloud and Big Data

PUBLISHED: Mon, 23 Dec 2013 00:00:00 +0000
AUTHOR: Torsten Volk, Former EMA Analyst

Today, enterprise IT is all about delivering services to the business in a well performing, secure, compliant and reliable manner. These services often depend on data and applications located on a variety of operating systems and even public cloud services, such as Amazon EC2 or Microsoft Windows Azure. The more seamlessly, rapidly and reliably these applications are able to exchange data, the better business units can take advantage of IT services and deliver value to their customers. Workload Automation (WA) should be seen as the plumbing that connects all of the operating systems, applications (custom and off-the-shelf ) and data sources (relational and unstructured). In short, WA is today's business process integration hub and therewith a central key for ultimate IT efficiency and effectiveness. This white paper is based on the EMA WA research report from September of 2013 -- Workload Automation in an Era of Cloud, Analytics, Enterprise Mobility, DevOps and Big Data -- and will explore how organizations of any size and vertical can benefit by recognizing the importance of WA software within a cloud and big data context.



It's All About the App: Application-Centric Systems Management

PUBLISHED: Thu, 19 Dec 2013 00:00:00 +0000
AUTHOR: Torsten Volk, Former EMA Analyst

Business staff is not interested in the technical details and explanations of why their application fails to perform adequately. When emails are delayed due to Exchange performance problems, the productivity of the entire organization is impacted. When customer or patient records are unavailable because of storage capacity issues, financial and even health consequences can be dire. Downtime of online storefronts -- no matter the root-cause -- can quickly threaten the reputation or even the survival of an ecommerce-driven business. Therefore, a modern approach to systems management is required where the entire stack, consisting of applications, databases, virtual machines, physical hosts, datastores, LUNs and storage arrays, must be managed in an application-centric manner. EMA research has shown that the traditional siloed approach to systems management is no longer viable and that technical issues must be evaluated and qualified based on their relevance to overall application performance and reliability. In short, application context is key when it comes to modern systems management.



Effective Systems Management for Healthcare

PUBLISHED: Thu, 19 Dec 2013 00:00:00 +0000
AUTHOR: Torsten Volk, Former EMA Analyst

As described in a recent Enterprise Management Associates (EMA) white paper, application-aware systems management is a central challenge within modern enterprise IT. This application centricity is specifically important in healthcare settings, such as hospitals, specialty care centers and doctors' offices. These healthcare institutions cannot afford downtime or lackluster performance, as they must optimally utilize the time of doctors, nurses and other medical staff to ensure the best possible patient care, as well as financial viability of the overall organization. Furthermore, high-dollar medical equipment, such as MRI, CT or digital X-ray machines rely on the optimal operations of the institution's medical applications and the servers, network and storage resources on which they depend. 

Healthcare IT environments need a pragmatic monitoring and management solution that is easy to deploy, operate and manage. This EMA white paper will explore systems management requirements derived from the specific challenges faced by the healthcare institutions today. 



Application Performance Management (APM) in the Age of Hybrid Cloud: Ten Key Findings

PUBLISHED: Mon, 16 Dec 2013 00:00:00 +0000
AUTHOR: Julie Craig

Enterprise Management Associates (EMA) has been following the impact of Cloud on application management for more than five years. This report highlights ten key takeaways from the most recent survey on the topic, conducted in October of 2013.


An assessment of the 2013-2014 technology landscape reveals an industry in flux. As a result, application management in general, and Application Performance Management (APM) in particular, are among today's hottest topics in enterprise management.

While many IT organizations still lack a good answer for managing on-premise-delivered applications, the extension of application execution into the Cloud introduces a host of additional management concerns. At the same time, companies of every size are incorporating new application architectures into existing application systems, extending into the mobile world, and sharing application connectivity with converged networks carrying voice and video. 

Each of these factors carries staffing, performance, and cost-related impacts, all of which are generating a new level of interest in the APM market. Public Cloud, in particular, introduces a host of APM challenges relating to relinquishment of visibility and control. This is complicated by the fact that, while businesses are increasingly extending the reach of the data center into the Cloud, many are still taking a largely manual approach to application management. 

Gathering insight into such environments, and managing them as production services, are among the biggest challenges facing IT organizations today. Regardless of who delivers the service, IT still "gets the call" when users experience problems. 

For this study, EMA surveyed more than 150 IT professionals with expertise in the APM space. The result is a wealth of detailed information about the ways in which businesses are delivering and managing both Cloud- and on-premise- hosted applications. 



Report Summary - Application Performance Management (APM) in the Age of Hybrid Cloud: Ten Key Findings

PUBLISHED: Mon, 16 Dec 2013 00:00:00 +0000
AUTHOR: Julie Craig


Report Abstract
Enterprise Management Associates (EMA) has been following the impact of Cloud on application management for more than five years. This report highlights ten key takeaways from the most recent survey on the topic, conducted in October of 2013.

An assessment of the 2013-2014 technology landscape reveals an industry in flux. As a result, application management in general, and Application Performance Management (APM) in particular, are among today's hottest topics in enterprise management.

While many IT organizations still lack a good answer for managing on-premise-delivered applications, the extension of application execution into the Cloud introduces a host of additional management concerns. At the same time, companies of every size are incorporating new application architectures into existing application systems, extending into the mobile world, and sharing application connectivity with converged networks carrying voice and video. 

Each of these factors carries staffing, performance, and cost-related impacts, all of which are generating a new level of interest in the APM market. Public Cloud, in particular, introduces a host of APM challenges relating to relinquishment of visibility and control. This is complicated by the fact that, while businesses are increasingly extending the reach of the data center into the Cloud, many are still taking a largely manual approach to application management. 

Gathering insight into such environments, and managing them as production services, are among the biggest challenges facing IT organizations today. Regardless of who delivers the service, IT still "gets the call" when users experience problems. 

For this study, EMA surveyed more than 150 IT professionals with expertise in the APM space. The result is a wealth of detailed information about the ways in which businesses are delivering and managing both Cloud- and on-premise- hosted applications. 



2013 EMA Vendors to Watch: Information Management

PUBLISHED: Fri, 06 Dec 2013 00:00:00 +0000
AUTHOR: Evan Quinn, Former EMA Analyst

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2013 EMA Vendors to Watch in the Information Management field. Vendors will be added to this document throughout the year.



2013 EMA Vendors to Watch: Business Intelligence and Data Warehousing

PUBLISHED: Thu, 05 Dec 2013 00:00:00 +0000
AUTHOR: John Myers

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2013 EMA Vendors to Watch in the Business Intelligence and Data Warehousing field. Vendors will be added to this document throughout the year.



How Small and Midsize Data Centers Can Benefit from Unified Infrastructure

PUBLISHED: Thu, 21 Nov 2013 00:00:00 +0000
AUTHOR: Torsten Volk, Former EMA Analyst

In small and midsize organizations, IT staff often wears many hats. This means that the same administrator who provisions the servers for a new environment also has to configure the required networking resources, as well as carve out storage volumes and configure the hypervisor. Furthermore, the same jack-of-all-trades employee might be responsible for compliance, patch management and security of the new environment, while at the same time ensuring application availability and performance. To make matters more challenging, we often find significantly less automation in small and midsize data centers, making provisioning and management of application environments a manual task. As a result, a lot of time and money is spent on "keeping the lights on," while IT staff is faced with configuration drift and inconsistent provisioning practices that can lead to security vulnerabilities, SLA violations, and general inefficiency in terms of operational expense (OPEX). With each server, network, and storage hardware refresh, there is a new layer of operational complexity, leading to a more heterogeneous environment, with many technology islands and proprietary management tools. This complexity, combined with a lack of integration and automation leads to decreased operational agility.



Achieving Unified IT Visibility with Data Center Infrastructure Management (DCIM)

PUBLISHED: Mon, 18 Nov 2013 00:00:00 +0000
AUTHOR: Steve Brasen

As enterprises are constantly pressured to provide IT services that are highly-available, eminently extensible, and cost-effective, organizations have had to rapidly adopt new technologies and services to meet expanding requirements. However, the optimization of existing resources and the rapid delivery of new services is often challenging to IT managers due to the intricate complexities inherent in any dynamic data center. In this white paper, EMA reveals how a unified approach to data center infrastructure management (DCIM) delivers more efficient IT services, improving both the reliability and the cost-effectiveness of IT infrastructures.



EMA Radar for Application Discovery and Dependency Mapping (ADDM): Q4 2013

PUBLISHED: Mon, 18 Nov 2013 00:00:00 +0000
AUTHOR: Dennis Drogseth

The Application Discovery and Dependency Mapping (ADDM) market is evolving rapidly, and in multiple directions at once. The ten vendors featured in this EMA Radar -- AppEnsure, ASG, BMC, HP, IBM, ManageEngine, Neebula, OpTier, Riverbed and ServiceNow -- are both collectively and individually reflective of this richness, diversity and innovation. And given this, EMA has made its categories reflective of two interrelated by distinct groups. Foundational or multi-use case ADDM solutions are represented by offerings from ASG, BMC, HP, IBM, and ServiceNow. Performance-optimized ADDM solutions, some of which approach multi-use case in diversity of function, include AppEnsure, ManageEngine, Neebula, OpTier and Riverbed.    

 



Data Modeling in a Coordinated Data Management Environment: The Key to Business Agility in the Era of Evolving Data

PUBLISHED: Wed, 06 Nov 2013 00:00:00 +0000
AUTHOR: John Myers

From analytics and reporting to database administration to new areas of data-centric application development, the ability to effectively manage metadata and provide visibility into data model structures will be the key allowing these disparate groups to manage data across initiatives. Implementation of a Coordinated Data Management Environment makes faster response, and thus Business Agility, possible. Rather than creating the spider web of connections between systems, a single point of information regarding the data source metadata in a business is created.  



Network Visibility Controllers: Best Practices for Mainstreaming Monitoring Fabrics

PUBLISHED: Thu, 31 Oct 2013 00:00:00 +0000
AUTHOR: Jim Frey

Packet inspection technologies for monitoring network activity and network security are not only here to stay, their use continues to expand. The scale and criticality of networked infrastructures within the enterprise is growing as well. Finally, the cost of management tools for maintaining vigilance and assuring reliable performance within IT is similarly growing apace. This perfect storm has led to a rapid evolution of a specialized product technology category that Enterprise Management Associates (EMA) has defined as Network Visibility Controllers (NVCs). Also known as network monitoring switches or network packet brokers, NVCs have quickly established themselves as an essential building block for network and security packet monitoring fabrics, allowing flexibility and resilience along with significant cost savings for the race to monitor and secure modern enterprise networks. This EMA research report investigates current uses of NVCs, the influence of the changing monitored environment, and the best practices experiences of organizations large and small who have embraced this technology.



Pragmatic Endpoint Management: Empowering an SMB Workforce in the Age of Mobility

PUBLISHED: Mon, 21 Oct 2013 00:00:00 +0000
AUTHOR: Steve Brasen

An increasing number of enterprise requirements necessary to enable a productive and mobile workforce are challenging small and medium-sized businesses (SMBs) with limited administrative staff and operational budgets to reliably support endpoints and deliver business applications, data and other services. In this white paper, EMA provides actionable guidance on which processes and technologies to adopt that overburdened AMB IT  support into delivering more efficient and effective endpoint management while reducing support efforts and operational costs.



Software Defined Monitoring: Keeping Monitoring and Management in Synch with Dynamic Networks and Infrastructures

PUBLISHED: Sun, 20 Oct 2013 00:00:00 +0000
AUTHOR: Jim Frey

Changes are a constant in IT, and most changes bring with them new challenges for maintaining sufficiently complete monitoring to reasonably assure performance and security of applications and services.  New initiatives such as Cloud, virtualization, mobility, and BYOD all add new layers of complexity, variability, and barriers to the visibility required for adequate monitoring. Another example is the recent advent of programmable, Software-Defined Networking (SDN), which promises the potential for networks that are more business-aligned and application-aware than ever before possible. In order to achieve the full potential of any new IT initiative, operational monitoring and management tools, technologies, and practices must also evolve.  Increasingly critical packet monitoring fabrics are no exception, and will need to adapt as well. This EMA paper examines the impact that such changes, and SDN in particular, have on monitoring, the requirements for making sure operational visibility and control can keep pace, and the visibility fabric solution approach offered by Gigamon to address the needs.



Optimizing Your Service Delivery: Change is in Your Hands

PUBLISHED: Wed, 16 Oct 2013 00:00:00 +0000
AUTHOR: Torsten Volk, Former EMA Analyst

Rapid deployment and efficient management of secure, compliant and reliable IT services constitutes a critical business differentiator today for almost any organization. Business staff quickly and easily orders and accesses personal IT services and therefore expects this same end user focus from the corporate IT department. To keep up with this new set of demands, a paradigm shift in enterprise IT must occur, away from the currently still prevalent infrastructure centric paradigm -- focused on the efficient management and provisioning of hardware and software resources -- toward a truly business centric approach. Eventually, non-IT services provided by different departments, such as Human Resources, Operations, Finance, Facilities and Customer Services, will also be delivered through the corporate service portal. Ultimately, enterprise IT will also be expected to offer standardized vertical solutions, directed at healthcare, financial, manufacturing or professional services use cases. 

The CTO and CIO roles must initiate and support this paradigm shift. Every new technology introduced has to be evaluated based on its business value, in addition to its technical specifications. High end features and performance metrics matter significantly less than the new technology's ability to seamlessly integrate within the current data center infrastructure. Ultimately, IT needs to transform into a broker of business critical services. Success will be measured by the ability to eliminate complexity and rapidly provide impactful hybrid services that improve the competitive position of the entire organizations in the marketplace. 



Empowering Your Mobile Workforce: Change is in Your Hands

PUBLISHED: Wed, 16 Oct 2013 00:00:00 +0000
AUTHOR: Steve Brasen

The adoption of trending technologies, such as workforce mobility, are essential to ensuring any modern enterprise remains competitive, profitable, agile and successful in meeting organizational goals. Process and technology changes, however, are rarely adopted without resistance from both users and administrators and can be disruptive to business productivity. IT managers are often caught between the need to meet emerging enterprise requirements and having to address the substantial challenges of implementing change. In this edition of EMA's series of "Change is in Your Hands" white papers, actionable guidance is provided on the best approaches to empowering a mobile workforce while reducing administrative efforts.



Embracing Trends and Technologies: Change is in Your Hands

PUBLISHED: Wed, 16 Oct 2013 00:00:00 +0000
AUTHOR: Steve Brasen

Few processes are as impactful to business operations as the introduction of technology changes. This is particularly true of trending technologies supporting IT service optimization, cloud computing, and workforce mobility, which collectively represent a radical departure from traditional methods of enterprise computing. In this white paper, EMA offers actionable guidance on best practices to for introducing change and on the adoption of unified management solutions that facilitate simplified, reliable, and cost-effective implementations.



Innovating Through Cloud Technologies: Change is in Your Hands

PUBLISHED: Tue, 15 Oct 2013 00:00:00 +0000
AUTHOR: Torsten Volk, Former EMA Analyst

Realizing the business value of cloud is one of today's key challenges in enterprise IT. The key strategic capabilities of cloud -- agility, resiliency and efficiency -- can only be harnessed if the IT organization possesses the automation, orchestration and integration capabilities required to tie together hardware and software along the lines of business processes. This is a non-trivial challenge as there are many different clouds -- private and public -- available today, each of which is targeted toward a specific set of use cases. Centrally enforcing compliance, security and cost efficiency to enable the organization to take full advantage of today's world of many clouds requires a service management platform that facilitates policy driven provisioning and management of entire services consisting of application and infrastructure components sourced from multiple clouds.
EMA research shows that organizations typically encounter numerous challenges when leveraging cloud. These issues do not emerge on PowerPoint during the cloud vendor's sales presentation, but become evident when the cloud deployment project begins. In addition, most enterprises have much work left to do in terms of data center automation, as well as breaking down technology silos. Cloud platforms must integrate with the existing data center infrastructure, including enterprise applications and data sources, in order to facilitate the generation of true business value.



A New Vision for High Velocity Application Delivery: How an Automated Lifecycle Approach to DevOps Supports the Agile Business

PUBLISHED: Mon, 07 Oct 2013 00:00:00 +0000
AUTHOR: Julie Craig

This is the age of the high velocity business. The rates of change experienced in nearly every industry during the past five years have been unprecedented. Some of these changes occurred as a result of the "great recession", the ensuing economic meltdown, and the massive legislative and regulatory modifications which followed. Others related to cost reductions across the board, with virtually every IT department "doing more with less". Mergers and acquisitions took a toll on business and IT resources as well, as diverse companies were integrated into single entities. Technology innovations also had an impact, as the growth of Cloud and mobile altered both IT and customer engagement patterns. 

Today, this transformed business landscape is dramatically accelerating the need to adapt. While it seems intuitive that the most innovative companies with the smartest executives have been the most successful in weathering these storms, the reality is that good ideas no longer suffice. In fast-changing business environments, the ability to execute is equally important. Execution, combined with innovative thinking and good ideas, is the key differentiator setting leading companies apart from trailing competitors. 

This emphasis on execution is one reason why Agile development and Continuous Delivery of business software have become such hot topics. Today's businesses run on software, and their ability to adapt is largely dependent on the speed with which they can transform ideas into action across the entire application delivery chain. 

This white paper describes this evolution. It discusses key concepts supporting the Agile business and the foundational role of enterprise management tools in automating the "ideas to action" cycle. It approaches these topics from a lifecycle perspective, encompassing modern DevOps products and practices. Finally it details the key role played by CA Technologies' DevOps-focused solutions in enabling Agile application delivery.



Cloud, Big Data, Analytics, and Diagnostics Chart the Future of Application Performance Management (APM)

PUBLISHED: Fri, 27 Sep 2013 00:00:00 +0000
AUTHOR: Julie Craig

This EMA white paper discusses the challenges of managing applications in highly dynamic application environments, such as those which are heavily virtualized and those running on public and private Clouds. Modern enterprise applications are engineered for agility and are frequently deployed over scalable, elastic IT infrastructures. The benefits of virtualization, public/private Cloud, and hybrid deployments can include flexibility, efficiency, and business enablement. However, these benefits come at a price. 

Multiple factors, such as varying workload requirements, public Cloud performance variability, and "just in time" provisioning introduce risks to quality of service. Performance and availability can be compromised, particularly when IT organizations lack Application Performance Management (APM) solutions designed to support dynamic infrastructures.
 
IBM SmartCloud Application Performance Management (SmartCloud APM) is engineered to support dynamic, complex, and mission critical applications, regardless of their execution environment. This paper details the reasons why it is important for today's management toolsets to support Cloud and similar dynamic infrastructures, and highlights IBM's answer to the challenges of building service assurance into complex application ecosystems. 



Supporting Workforce Mobility: Best Practices in Enterprise Mobility Management

PUBLISHED: Fri, 27 Sep 2013 00:00:00 +0000
AUTHOR: Steve Brasen

Business success in meeting today's dynamic organizational requirements is dependent on its ability to empower a mobile workforce. Business IT resources -- including application, data, and services -- must be securely and reliably accessible by every device employed to perform business tasks, regardless of whether it is owned by the business or by an employee, and all endpoints (including desktop PCs and mobile devices) must be provisioned and supported without violating enterprise policies. This EMA white paper identifies key management processes necessary for enabling workforce mobility, including asset lifecycle management, resource provisioning, security and compliance, and problem management.



Rightsizing Your Network Performance Management: Four Case Studies

PUBLISHED: Thu, 26 Sep 2013 00:00:00 +0000
AUTHOR: Tracy Corbo

As networking has matured, the focus of engineering and operations has shifted from connectivity to optimization, and from availability to performance. Rising interest in understanding the broader operations picture, spanning network, servers, and applications, has also transformed the demands of management tools and technologies. In parallel, there has been no break in the long-standing mantra for doing more with less -- both in terms of monetary and human resources. These shifts are prompting reevaluations of monitoring strategies and products in organizations of all sizes, but particularly in larger enterprises, where effective management can have a dramatic impact on IT's ability to fulfill its critical business-enabling role. This Enterprise Management Associates (EMA) white paper examines the importance of finding extensible, cost-effective network performance management solutions that fit deployment needs beyond the NOC to extend value into the datacenter, and thus deliver greater Total Cost of Ownership (TCO) benefits. Included is a detailed analysis of four use case examples from organizations that have deployed SolarWinds Network Performance Monitor (NPM) to monitor and manage their production environments based on such goals and objectives.



Best Practices in Lifecycle Management: Comparing Suites from Dell, LANDesk, Microsoft, and Symantec

PUBLISHED: Tue, 24 Sep 2013 00:00:00 +0000
AUTHOR: Steve Brasen

Given the complexity of today's dynamic IT infrastructures and the broad range of management disciplines necessary to support them, choosing a lifecycle management solution can be a difficult and bewildering project. To assist in the evaluation of automated lifecycle management platforms, Enterprise Management Associates (EMA) has conducted a side-by-side functional and financial comparison of solution suites from four of the leading vendors in this market space: Dell KACE, LANDesk, Microsoft, and Symantec. Key best practices in lifecycle management are explained and used as a framework for identifying critical points of comparison and a detailed financial evaluation goes beyond just license costs to help determine total cost of ownership of each platform. This EMA analysis includes a comparison of over 45 features across seven key areas -- Discovery, Inventory, and Asset Management; Bare Metal Provisioning; Software Distribution; Security and Patch Management; Configuration Compliance and Remediation; Process Automation and Service Desk; and Interfaces and Reporting.



ROI For NCM Solutions in Enterprise Environments

PUBLISHED: Mon, 23 Sep 2013 00:00:00 +0000
AUTHOR: Tracy Corbo

Manual processes for maintaining and managing network equipment configurations do not scale as networks grow in size and geographic distribution, even to modest sizes. Manual configuration of networking equipment creates inconsistencies that can lead to poor network performance as well as allowing for errors to be introduced that can result in network outages, costing companies time, money, and lost productivity. The SolarWinds Network Change Manager (NCM) is an example of a network change and configuration solution that can be purchased and used on its own or as part of an integrated overall network performance management solution. This EMA white paper examines the opportunities for realizing the ROI of implementing such a solution and examines four case examples where organizations deployed SolarWinds NCM in their production environments and how it is helped them save time and money as well as improve their operational efficiency. 



Troubleshooting Performance in Virtualized Application Delivery Architectures

PUBLISHED: Thu, 19 Sep 2013 00:00:00 +0000
AUTHOR: Jim Frey

Cloud computing and BYOD are creating new challenges and demand more fluid IT infrastructure environments. BYOD and our increased mobility have created data security concerns and represent a true business and technology dilemma. Virtualized application delivery architectures such as XenApp from Citrix Systems have evolved to help solve this problem by removing sensitive corporate data and applications from end users devices and keeping it in the data center where it can be centrally managed and controlled. One of the biggest challenges with delivering virtualized application environments is that they can be difficult to troubleshoot. Without the right management tools, technologies, and practices, maintaining high levels of performance will be more hope than strategy. In order to reduce operational risk and limit productivity impact of performance issues, IT operations must embrace approaches that provide deep visibility along with assisted analysis and interpretation of performance behaviors in these types of environments. This EMA whitepaper reviews the key challenges and requirements for performance management specifically related to Citrix XenApp deployments and examines the Riverbed Performance Management solution in that light.



Manage Your Network Infrastructure for Optimal Application Performance

PUBLISHED: Wed, 18 Sep 2013 00:00:00 +0000
AUTHOR: Jim Frey

The days when network managers could simply be concerned with interoperability and uptime are long past, and the focus has turned towards recognizing and eliminating performance degradations. This demand has also elevated and coalesced specifically around gaining a direct understanding of how applications and services -- the life's blood of IT-enabled organizations -- are performing from the network perspective. Management products that address these objectives are known as Application-aware Network Performance Management (ANPM) solutions, and are increasingly becoming essential tooling for enterprise network management and operations teams. This ENTERPRISE MANAGEMENT ASSOCIATES (EMA) white paper examines the drive behind and requirements for ANPM solutions, so that network engineers, managers, and operators can recognize, characterize, troubleshoot, and communicate details of how applications and services perform as they transit the network.



Workload Automation in an Era of Cloud, Analytics, Enterprise Mobility, DevOps and Big Data

PUBLISHED: Mon, 16 Sep 2013 00:00:00 +0000
AUTHOR: Torsten Volk, Former EMA Analyst

Almost one third of organizations (30%) and over half of companies with the most mature Workload Automation (WLA) software deployments (56%) currently consider abandoning their WLA vendor and migrating to a "superior" software solution. To make matters even more interesting, only 19% believe that there is no better WLA software out there than the product(s) they are currently using. In other words, 81% of organizations feel locked in by their WLA software vendor and believe that the cost of breaking out of this "embracement" would be too high to justify migrating to a better tool. These findings fundamentally contradict the common belief that there is no growth potential in the marketplace for WLA software.



Optimizing VDI Success: The Network Factor

PUBLISHED: Mon, 09 Sep 2013 00:00:00 +0000
AUTHOR: Jim Frey

As organizations seek to continue leveraging the advantages of virtualization technologies, many are embracing virtualization of end user desktops via approaches such as Virtual Desktop Infrastructure (VDI). But while VDI solutions promise significant security and operational efficiency improvements, they also bring with them unique deployment challenges. If organizations hope to reap the full benefit of a VDI deployment, they must assure the best possible end user experience, or adoption will stall and the project will fail. The network plays a critical role in making that a reality, particularly when trying to extend VDI deployments to remote/branch sites where WAN links will be a part of the connectivity picture. This EMA white paper examines the challenges of VDI in the branch and how Riverbed's solutions are designed to ensure that the network can deliver on the promise of VDI.



2013 EMA Vendors to Watch: Security & Risk Management

PUBLISHED: Thu, 05 Sep 2013 00:00:00 +0000
AUTHOR: David Monahan

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2013 EMA Vendors to Watch in the Security & Risk Management field. Vendors will be added to this document throughout the year.



2013 EMA Vendors to Watch: Systems Management

PUBLISHED: Tue, 13 Aug 2013 00:00:00 +0000
AUTHOR: Torsten Volk, Former EMA Analyst

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2013 EMA Vendors to Watch in the Systems Management field. Vendors will be added to this document throughout the year.



Effective IT Operations with Data Center Infrastructure Management (DCIM)

PUBLISHED: Fri, 09 Aug 2013 00:00:00 +0000
AUTHOR: Steve Brasen

Faced with rapidly expanding requirements for increased reliability and cost-effectiveness in IT services, today's Enterprise IT Operations are challenged with increasingly complex data center infrastructures. Data Center Infrastructure Management (DCIM) delivers the key capabilities necessary to transition to more efficient and effective IT service and systems management by delivering automated monitoring and management support that enhance service process at every stage in the maturity of an IT infrastructure.

This EMA white paper provides the prescriptive model for transitional to dynamic and holistic IT operations management of data center resources with the adoption of processes including asset management, problem management, access and control, visual modeling, capacity planning, root cause analysis, and workload automation.



Data Center Automation in the Age of Cloud

PUBLISHED: Mon, 15 Jul 2013 00:00:00 +0000
AUTHOR: Torsten Volk, Former EMA Analyst

While "cloud" is one of today's most discussed topics, the fact that the majority of enterprises do not receive the expected ROI out of their cloud projects is little known. Based on the foundation of Enterprise Management Associates' (EMA's) Demystifying Cloud study, this new research will demonstrate how cloud ROI directly depends on Data Center Automation (DCA) and how organizations can improve their DCA strategy to receive more value from their cloud.

The degree of adoption of each individual DCA discipline2 ranges from 34% of organizations for "Showback" to 66% of companies for "automated backup and recovery." All the remaining disciplines, such as "change and configuration management" (53%), "database automation" (49%), "OS provisioning" (47%), "storage automation" (56%), "server automation" (54%), and "job scheduling" (53%), show adoption rates that lie somewhere within this range. These adoption rates illustrate that there is still much homework to be done when it comes to DCA.

There is a direct logical connection between cloud ROI and DCA, as by definition, cloud requires automation to deliver business value through enabling the self-service provisioning of pooled resources. Without the presence of the above mentioned DCA tools or disciplines, the availability of cloud puts a growing strain on data center staff, as cloud would allow business units to provision their own application environments in a self-service fashion, while IT operations staff would have to scramble to deploy and manage the underlying resource requirements.

The "reduction of OPEX," "increased IT staff productivity," and the "reduction of human errors" are the key business drivers of DCA. These business drivers complement and enable the two most important strategic cloud goals -- "agility" and "reliability" -- as identified in EMA's Demystifying Cloud study.



Monitoring IT for Real-time Operational Performance

PUBLISHED: Fri, 12 Jul 2013 00:00:00 +0000
AUTHOR: Jim Frey

Expectations have never been higher for enterprise IT to empower businesses to grow, doing more business, faster and more efficiently. IT infrastructure and applications are constantly evolving to meet this need, and IT Operations must follow suit as well, by shifting from a best-efforts near-real-time strategy towards true real-time, and focusing on performance more than availability. Operations management tools, technologies, and practices must all be reviewed and revised in order to effect this necessary change. This Enterprise Management Associates (EMA) white paper reviews the essential requirements for organizations to successfully embrace real-time operational performance monitoring objectives, and reviews the CorvilNet solution as a contributing element on the path to successful real-time operations. 



ROI For IPAM Solutions in Small-Mid Sized Enterprise Environments

PUBLISHED: Tue, 02 Jul 2013 00:00:00 +0000
AUTHOR: Tracy Corbo

Our growing dependency on IP-based networks, coupled with an ever-increasing number of IP-based devices and connectivity, results in rapid consumption of available IP address space. The problem is exasperated as a company grows, adding more IP-based infrastructure that can often span multiple geographic regions. When an organization is small, this is typically managed with paper and pencil or in an Excel spreadsheet. As long as the network remains relatively static, such techniques are typically sufficient. However, as a network grows and more frequent changes are being made, the IP address schema requires more frequent updating and is being altered by an increasing number of people, thereby making the spreadsheet approach unsustainable over the long term. Manual processes become inefficient as changes become more frequent, causing erroneous or out-of-date information, as well as reducing operational productivity. The business case for a formal and centralized IP Address Management (IPAM) solution becomes clear as it brings order to chaos, creates an audit trail through change tracking, and reduces the chances for costly, manually introduced errors. 

This EMA whitepaper examines the opportunities for realizing the ROI of controlled management of IP addresses, including a detailed analysis of three use case examples of organizations that deployed the SolarWinds IP Address Manager solution.



HP Operation Analytics: A New Analytics Platform to Support the Transformation of IT

PUBLISHED: Wed, 26 Jun 2013 00:00:00 +0000
AUTHOR: Dennis Drogseth

As IT organizations face dramatic challenges in response to changing technology and business pressures, it's clear that a "business as usual" approach can all too easily lead to a "going-out-of-business" result. The size, scale and ecosystem interdependencies of many IT organizations, are redirecting management and monitoring requirements away from deterministic methods of working, to optimizing a far more dynamic set of non-deterministic relationships and patterns across a sprawling universe of application and infrastructure, partner and supplier, and third-party service provider interdependencies.
  
Given these requirements, and the still elusive allure of "big data" in optimizing IT efficiencies, HP's introduction of Operations Analytics has all the makings of a visionary industry event. This new platform, which provides a unique vehicle for supporting advanced analytics capabilities over a wide variety of structured and unstructured data sources, represents the industry's very first true example of an extensible, platform-scalable, analytics architecture.  



Three Important Reasons for Privileged Access Management (and One Surprising Benefit)

PUBLISHED: Mon, 17 Jun 2013 00:00:00 +0000
AUTHOR: Scott Crawford, Former EMA Analyst

High-privilege access is one of the most sensitive aspects of IT. Administrative accounts have the ability to make sweeping and fundamental changes to IT systems on which the business may depend. When used in ways not intended, the impact of this capability can cause a wide spectrum of damage, from security threats and compliance violations, to incidents that tarnish the reputation of the business itself.

For these reasons and more, privileged access visibility and control has been recommended -- and often required:

• By a variety of regulatory mandates
• To assure responsible governance
• To improve security

Privilege management delivers these values -- and more. In this report, Enterprise Management Associates (EMA) examines the ways in which privilege visibility and control not only helps organizations achieve these objectives, but also delivers a benefit that many may not realize: improved IT reliability that can help reduce operational costs. The characteristics of an effective solution are examined, along with evidence from EMA research that supports the values of a more consistent approach to operational IT control.



Ecosystem Cloud: Managing and Optimizing IT Services Across the Full Cloud Mosaic

PUBLISHED: Thu, 13 Jun 2013 00:00:00 +0000
AUTHOR: Dennis Drogseth

While many in the industry view cloud as a fundamentally separate landscape with its own rules and requirements, the data behind this report would indicate that the cloud mosaic continues to tie back into traditional, non-cloud and even non-virtual infrastructures. The goal suggested by this research would be to find increasingly better ways to optimize the heterogeneous whole, or in other words the "ecosystem" of cloud service providers (CSPs), other service providers, and internal cloud deployments within a single IT organization. In many verticals, these ecosystems are broadened to include partners and suppliers with roots going back well before cloud meant something other than "wide area network."

Ecosystem Cloud: Managing and Optimizing Cloud Across the Full Cloud Mosaic is research dedicated to looking at this very phenomenon across verticals and company sizes in 2013.



The Industrialization of Fraud Demands a Dynamic Intelligence-Driven Response

PUBLISHED: Mon, 10 Jun 2013 00:00:00 +0000
AUTHOR: Scott Crawford, Former EMA Analyst

As criminals have discovered the profitability of attacks against information systems, the impact of fraud has grown. Adversaries have discovered the lucrative nature of harnessing cyber threats. Their innovations have made it easier to steal from a wider range of victims. This has spurred the commercialization of crimeware and services -- which, in turn, has given rise to specialization, competitive pressures, and other factors that illustrate how fraud, abetted by cyber crime, has grown from the unrelated activities of a few into an industry in its own right.

This industry has produced a level of automation and sophistication in fraud techniques to rival those of the legitimate business world. The commercial-grade packaging of complex threats makes it possible to readily convert personal systems into pawns that facilitate fraud, often unbeknownst to their rightful owners. Large-scale systems management capitalizes on the ability to harness entire networks of compromised hosts whose masters often avoid detection and defeat through highly nimble evasive tactics. The net result: an industrialized threat that has real impact on businesses worldwide.

In this paper, EMA explores the response organizations must marshal to stand up to the threat of industrialized cyber crime. Coordinated strategies embracing multiple tactics to limit exposure and improve effectiveness are now mandated by guidance such as that of the US Federal Financial Institutions Examinations Council (FFIEC) and other regulators worldwide. The RSA Fraud and Risk Intelligence portfolio is highlighted as an example of such a coordinated approach.



IBM SmartCloud APM Entry Edition (EE): Easy on-Ramp to Application Performance Management (APM) with Room to Grow

PUBLISHED: Fri, 31 May 2013 00:00:00 +0000
AUTHOR: Julie Craig

This May 2013 paper highlights IBM’s new SmartCloud APM Entry Edition (EE) in the context of IBM’s broader APM portfolio. The new product delivers a cost-effective, easy-to-consume entry point to APM, while providing a step-wise growth path to IBM’s full-featured SmartCloud APM Standard Edition as a company grows and requirements change.

The information in this paper will likely be of interest to multiple audiences, from mid-range IT professionals such as architects and application managers to C level executives and IBM’s trusted advisor business partners. It presents IBM’s answer to the challenges of “real world” APM from both a technical and business perspective and describes a simple, incremental approach to delivering the APM value proposition to companies of virtually any size.



Overcoming Fragmentation and Blind Spots in Network, Endpoint and Server Security

PUBLISHED: Tue, 28 May 2013 00:00:00 +0000
AUTHOR: Scott Crawford, Former EMA Analyst

Despite the fact that today's IT security threats have advanced across a spectrum of sophistication and scale, defenses continue to fail with alarming consistency. The evolution of defense has produced fragmentation among security tools that keeps them from working together to deliver more effective response. The gap between network security technologies and defenses on endpoints and servers is a particularly pointed example. Attacks detected in the network often target endpoints and servers as their primary objective; yet, when attacks are first recognized in network content, network-based defenses rarely coordinate the engagement of endpoint and server tools when they could have the greatest positive impact, before an exploit succeeds, defeating much of the early-warning value of security intelligence. This is in direct contrast to the systematic nature of today's more advanced threats, which often follow a definite sequence of actions toward achieving their objectives.

The evolution of advanced network security has emerged as a direct response to these more sophisticated attacks. In large measure, however, this evolution has outpaced endpoint and server defenses, leaving a blind spot in strategies that limit the effectiveness of these new techniques. In this report, EMA describes how Bit9 is helping to close these gaps and eliminate blind spots at servers and endpoints that are often the target of these attacks, enabling organizations to build a more complete approach through greater visibility, proactive host protection that stands legacy assumptions on their head, and integration with network technologies that heightens the impact of advanced threat defense.



Unified Endpoint Management: The Convergence of Enterprise Requirements for Supporting PCs and Mobile Devices

PUBLISHED: Thu, 23 May 2013 00:00:00 +0000
AUTHOR: Steve Brasen

The broad adoption of mobile devices in the performance of business tasks has fundamentally altered the IT requirements for ensuring employee productivity. Users now demand access to critical business application at any time, at any location, and on any device. Unified endpoint management solutions deliver common IT services to multiple devices securely and with minimal administrative effort. To help identify the IT services that are most advantaged by a unified management process, EMA performed primary, survey-based research involving more than 500 business professionals that actively use smartphones, tablets, laptops, and/or desktop PCs. In this EMA research report, key findings on each device platform are compared, including current and future device adoption, device application uses, practices in data loss prevention, security and compliance, desktop virtualization, and the breadth of enterprise support provided.



EMA Radar for Application-Aware Network Performance Management 2013: Illuminating the Pipes

PUBLISHED: Fri, 26 Apr 2013 00:00:00 +0000
AUTHOR: Jim Frey

The days when network managers could simply be concerned with interoperability and uptime are long past, and the focus has turned towards recognizing and eliminating performance degradations. This demand has also elevated and coalesced specifically around gaining a direct understanding of how applications and services -- the life's blood of IT-enabled organizations -- are performing from the network perspective.  Management products that address these objectives are known as Application-aware Network Performance Management (ANPM) solutions, and are increasingly becoming essential tooling for enterprise network management and operations teams. 

For this EMA Radar Report, focus was placed specifically on core capabilities and features associated with the needs that network engineers, managers, and operators have to recognize, characterize, troubleshoot, and communicate details of how applications and services perform as they transit the network. Three common use cases -- capacity planning, sustained monitoring, and troubleshooting -- were examined in detail for solutions that are based (at least in part) on inspection of network packets or collection and analysis of flow records such as NetFlow, IPFIX, and sFlow.  A total of 24 ANPM solutions were reviewed in detail and ranked according to solution impact, resource efficiency, and vendor strength.



DevOps for a New Millennium: A Lifecycle Perspective Supporting Business Growth in an Altered Economy

PUBLISHED: Thu, 25 Apr 2013 00:00:00 +0000
AUTHOR: Julie Craig

This April 2013 report highlights "real world" DevOps as it is practiced by modern companies. It utilizes a combination of EMA Research, DevOps vendor information, and customer case studies to drive home the fact that DevOps has evolved to be far different in practice than is typically presented and generally understood.

During the depths of the "great recession" -- the years between 2008 and 2012 -- hard economic times drove a new pragmatism. Previously content with recouping the costs of enterprise management investments within two to three years, customers demanded payback within 6 to 12 months. Limited budget dollars were spent on investments with near-immediate Return on Investment (ROI). Cloud, wireless, and virtualization grew accordingly, as businesses became more adept at using technology to reduce costs.  

Not coincidentally, Agile development and "DevOps" became hot topics. Both satisfied two key requirements that surfaced during the recession: budget maximization and the "need for speed." Industries and regulatory requirements were changing so quickly that software Development and Operations teams were hard pressed to keep up. 

The "DevOps" term is used to describe the process of managing the handoffs necessary for Development and Operations teams to work in a collaborative manner. DevOps promises to introduce agility, repeatability, quality, and governance into application delivery via collaboration between the two key teams responsible for the overall process.

Today, we are emerging from the economic "dark ages." Agile development practices have become the de facto standard for software development. However while the benefits of Agile have been proven many times over, many IT leaders still have their doubts about DevOps. A primary reason is because traditional DevOps thinking focuses primarily on the Testing through Deployment stages of the application lifecycle.

Enterprise Management Associates (EMA) has been researching the growth of both Agile and DevOps practices for several years and found that DevOps has evolved as a far more cross-functional, collaborative, and lifecycle-focused activity than traditionally understood. It now spans the application lifecycle versus being confined to a "point in time" handover of responsibility at deployment. 

This paper describes the "new DevOps" in more detail, and illustrates these points with research, end-user case studies, and vendor input.



EMA/CXP Research Report: The Changing Role of the Service Desk in the Age of Cloud and Agile

PUBLISHED: Fri, 19 Apr 2013 00:00:00 +0000
AUTHOR: Dennis Drogseth

In Q2 2012 and Q1 2013, EMA and CXP in France joined in a unique research effort focusing on the role of the Service Desk in the age of Cloud and Agile. An effective service desk can no longer be a separate kingdom devoted to reigning in operations and providing a primarily reactive foundation for dealing with customer complaints. As this research shows, service desks are undergoing pressures to become more diverse and better integrated across a wide range of technologies, in which automation, mobility and enhanced visibility and analytic insights can more proactively complement and inform on traditional ITSM processes. 



Quantifying Data Center Efficiency: Achieving Value with Data Center Infrastructure Management

PUBLISHED: Thu, 18 Apr 2013 00:00:00 +0000
AUTHOR: Steve Brasen

Data Center Infrastructure Management (DCIM) solutions, such as those offered by FieldView Solutions, facilitate substantial opportunities for improving IT reliability, performance and cost effectiveness. By evaluating the environment improvement results of actual FieldView customers, EMA has gauged the level of efficiency improvements that can be expected with the introduction of DCIM processes. In the white paper, EMA reveals the detailed results of the research and identifies expected saving in energy consumption, carbon generation, and the total cost of maintaining data center facilities and operations.



Taking Big Data Beyond the Hype

PUBLISHED: Tue, 09 Apr 2013 00:00:00 +0000
AUTHOR: Shawn Rogers

There is more than one way to execute against the challenges and opportunities of Big Data computing. Big Data lives within the enterprise on a variety of platforms that reach beyond Hadoop and other popular Big Data frameworks. Innovative companies are strategically deploying Hybrid Data Ecosystems that provide flexibility, better economics and faster performance against todays widely varied data sources. This EMA paper explores the Hybrid Data Ecosystem and how it supports Big Data across multiple platforms.



Setbacks Help Us March Onward: Unified Data Integration Platforms Power Business Innovation

PUBLISHED: Fri, 05 Apr 2013 00:00:00 +0000
AUTHOR: John Myers

As we move into the new Big Data Revolution, the pace of innovation in business, and the importance of a flexible and agile approach to support that change, will increase at a rapid pace. Data integration organizations and IT departments will be at the leading edge of this change.  They need to learn from the "series of experiences" from earlier projects and keep "marching onward." The lessons from innovations in other industries will have particular relevance in the new Big Data Revolution. Business stakeholders, in Marketing, Customer Care and Sales, will expect more from their technology partners. Those stakeholders and Finance teams of the CFO's office will push for faster solutions, reduced cost of ownership and lower implementation risks.



VDI Impact on Networks and Network Management: Challenges, Successes, and Best Practices

PUBLISHED: Wed, 03 Apr 2013 00:00:00 +0000
AUTHOR: Jim Frey

The allure of hosted desktop solutions is strong and growing. These solutions offer compelling advantages in data protection, user mobility, and managed support. But a successful deployment of hosted desktop approaches, such as the most recent iteration known as Virtual Desktop Infrastructure, or VDI, requires not only the procurement and deployment of software licenses and careful planning around back-end systems and storage, but also careful planning and execution within the network realm. This is necessary in order to assure that session quality tolerances and constraints can be met, both initially and as scale is achieved. 

Interestingly, but not all that surprisingly, networking professionals are often not involved in the planning of VDI deployments, though they are most certainly held responsible if something in the network causes VDI experience to fall below expectations. They are also expected to take the lead when troubleshooting of performance issues is needed. As with any relatively new technology, IT must learn from early experiences in deployment and adjust plans and practices appropriately if long-term success is to be expected.

This research report looks in detail at the emerging impacts and concerns that the deployment of virtual desktop infrastructure solutions are having across all lifecycle phases of planning, deploying, monitoring, and troubleshooting enterprise IP networks. The final results and findings of this report should serve as a source for establishing and tuning enterprise network management tools, technologies, and practices plans to reduce operational risk and assure optimal return on investment in the highly visible, strategic technology that VDI has become within so many organizations.



Powering Analytics with In-Memory Database Management Systems Comparative Analysis: Kognitio Analytical Platform, SAP HANA and Oracle TimesTen

PUBLISHED: Wed, 27 Mar 2013 00:00:00 +0000
AUTHOR: John Myers

The features and functions of data management platforms in general, and database management systems (DBMS) in particular, are changing quickly. Over the past five years, the data management industry has seen the traditional relational databases lose market share, innovation credentials and presence among implementers as a "top of mind" solution.  Among the technologies challenging traditional relational platforms are analytical databases, NoSQL data stores such as Apache Hadoop, and in-memory database management platforms.

Each of those solutions brings a unique value proposition to the world of data management. Analytical database platforms bring the power of analytical processing that challenges traditional relational database management systems for complex ad-hoc queries. NoSQL platforms, often open source technologies, bring an economical solution that challenges the capital investment business case for traditional data stores.  In-memory data management platforms bring simplicity of design by putting the data alongside the CPU in main memory. In addition, in-memory database platforms bring a superior speed of response when workload is freed from the "mechanics" of accessing information on disk, rotational (HD) or solid state (SSD), as part of query processing.



Aligning Network Management With Converging Operational Priorities Cisco Prime Infrastructure

PUBLISHED: Mon, 04 Mar 2013 00:00:00 +0000
AUTHOR: Jim Frey

The age of cloud and virtualization is spawning renewed focus on networking, increasing the demands that networks be highly resilient at all times. While advanced features within network technologies clearly play a role in meeting this need, advances in network management technologies and practices are also an essential ingredient. This has driven demand for converging and integrating network management tools and functions, to pave the way for better awareness of the role that networks play in the organizations they are designed to support, and also for improving efficiency and accuracy in planning and operations. In this Enterprise Management Associates (EMA) whitepaper, the essential drivers and requirements for converging, unifying, and aligning network management are examined, and the newly updated Cisco Prime Infrastructure management solution is reviewed in this context.



EMA Radar for Private Cloud Platforms: Q1 2013

PUBLISHED: Wed, 27 Feb 2013 00:00:00 +0000
AUTHOR: Torsten Volk, Former EMA Analyst

This ENTERPRISE MANAGEMENT ASSOCIATES (EMA) Radar Report analyses the marketplace for private cloud technologies from a customer perspective. Therefore, the only vendors included in this report are the ones with a sizable number of production deployments. In the end, EMA reviewed and empirically compared the 13 leading private cloud vendors in terms of "Solution Impact" -- features, architecture, and integration -- and "Resource Efficiency" -- time, effort, and cost. In order to ensure an "apples to apples" comparison, there are two Radar charts, one for solutions that focus on lightweight IaaS-centric private clouds (Abiquo, Citrix, Egenera, Embotics, Morphlabs, and Nimbula) and another for much more comprehensive, application-aware private cloud platforms (ASG, BMC, CA Technologies, Hewlett-Packard, IBM, Microsoft, and VMware).



Innovation in Cloud Analytics

PUBLISHED: Wed, 13 Feb 2013 00:00:00 +0000
AUTHOR: Shawn Rogers

Cloud computing delivers an array of enterprise value impacting capital and operational costs. As the sector has matured more companies are crafting solutions that leverage the core competency of Cloud computing to deliver better analytics. This EMA white paper highlights the cloud solutions of Teradata and provides details on how each delivers cloud value to end users.



What You Should Know About Licensing for Network Monitoring Solutions

PUBLISHED: Mon, 11 Feb 2013 00:00:00 +0000
AUTHOR: Jim Frey

Network monitoring systems are a must-have for organizations of all sizes. When evaluating alternative solutions, focus is often placed on comparing features and ease of use, but understanding the total cost of the alternatives is very important. The core licensing structure, whether it be device-based, port or interface-based, or measurement-based, can have a big impact on license costs up front and over time, as well as on the administrative workload for maintaining the solution in production. This EMA paper reviews the essential components of network monitoring tool costs, compares several licensing model approaches, and examines Ipswitch WhatsUp Gold as an example of a solution that uses device-based licensing.



Seven Best Practices for Network Management - How HP Intelligent Management Center Supports Effective Planning and Operations

PUBLISHED: Tue, 22 Jan 2013 00:00:00 +0000
AUTHOR: Jim Frey

With networking becoming an increasingly critical component of IT infrastructure for connecting physical, virtual and cloud-based resources with users/customers, networking planning, engineering, and operations pros need to raise their game. This includes recognizing how to evolve network management best practices and how network management tools can be best deployed to help improve operational efficiency, communicate within and outside operations teams, reduce operating risks and ensure optimal resilience. This white paper examines seven areas currently challenging network managers and the best practices that are emerging as a result, and further assesses how the Intelligent Management Center solution from HP aligns with those practices to enable success.



Achieving NAC Results: Essential Implementation, Process and Control Considerations

PUBLISHED: Thu, 10 Jan 2013 00:00:00 +0000
AUTHOR: Scott Crawford, Former EMA Analyst

Business wants more fluid access to data while IT organizations must maintain security. As the diversity of users and devices, and the variety of access and multitude of threats to network resources and sensitive information have grown, so has the need for more flexible and automated ways to effectuate security policies, controls and enforcement. Rarely is this need more keenly felt than at the network endpoint, where people, technology, information assets and requirements for security and compliance meet most directly. IT consumerization and "bring your own device" (BYOD) trends have brought these issues to a head, forcing IT organizations to rethink how to enable and secure the use of managed and personal mobile devices to further business advantage.

These factors have given rise to Network Access Control (NAC) solutions for enabling a proactive approach to managing network admission and endpoint compliance risks. Today's NAC technologies are delivering that promise for many -- provided that organizations understand the considerations for a successful NAC deployment and how to recognize solutions that can address their requirements, not only to meet the needs of protecting the business, but to enable its people to continue to work efficiently.

In this paper, EMA examines the fundamentals that yield an informed approach to selecting and deploying NAC. Considered will be how today's approaches offer the means to identify and authenticate endpoint devices and offer a wide range of options for pre- and post-admission policy definition, enforcement and remediation that enable organizations to find the right balance of accessibility and security that best fits their needs.

The essentials of NAC functionality are described, along with key considerations for implementation that can produce more effective NAC results. Three enterprises that have adopted the ForeScout CounterACT solution are offered as examples of successful NAC deployments. They illustrate how comprehensive device discovery, real-time endpoint monitoring, flexible policy definition and effective control compatible with existing infrastructure answers many of the most critical requirements for guest management, endpoint compliance, mobile security and protecting sensitive information assets.



Demystifying Cloud

PUBLISHED: Tue, 08 Jan 2013 00:00:00 +0000
AUTHOR: Torsten Volk, Former EMA Analyst

Narrowing and ultimately closing the gap between enterprise IT and the business has been a core challenge for decades. Private cloud is the "delivery vehicle" that ultimately will enable enterprise IT to bridge this divide and equip the entire organization with the agility and efficiency required to better compete in the marketplace. 

This Enterprise Management Associates (EMA) research report examines how small, medium, and large enterprises across industries have implemented private cloud technologies to deliver business value. Observing the roles of IT operations staff, application developers, and business stakeholders throughout this process provides a unique perspective on customer requirements and challenges. Cloud today constitutes a central platform, where IT operations staff provision building blocks (software and hardware), which then are consumed by application developers and business stakeholders. The more easily developers and line of business staff can take advantage of these building blocks, the better they will be able to turn IT into a competitive differentiator for the entire organization.

While a growing number of application developers and business users are taking advantage of cloud today, there are still significant roadblocks on the journey of turning IT into a true differentiator. The study found a surprising lack of integration of private cloud technologies with existing IT management systems. This deficit can quickly lead to technology silos, where private cloud adds to the existing datacenter complexity instead of providing a consolidation and unification layer.

For a significant share of enterprises, the lack of private cloud integration planning has led to budget overruns and longer than anticipated durations of private cloud implementation projects. As a result, ease of use and ease of implementation are todayís core requirements when it comes to evaluating private cloud technologies.

This EMA research report identified security, storage, and a general lack of datacenter automation as the critical challenges of private cloud. The ability of private cloud vendors to help customers overcome these challenges will be key. Further lessons from this research are:

- Multi-hypervisor strategies are real and fueled by private cloud adoption
- The public cloud constitutes the third most common hypervisor and must therefore be governed by the private cloud
- Workload portability and cloud bursting are becoming more and more critical
- Converged infrastructure is becoming more popular as a foundation for cloud

The Demystifying Cloud research project provides guidance to organizations considering the purchase of cloud technologies, by allowing them to learn from the lessons of enterprises that already have been through the initial release of their private cloud deployment. Private cloud technology vendors may find this research interesting, as it will help them better understand customer pain points and therefore provide inspiration for their product roadmap.



Closing Critical IT Security Gaps for More Effective Defense

PUBLISHED: Mon, 07 Jan 2013 00:00:00 +0000
AUTHOR: Scott Crawford, Former EMA Analyst

In the last few years, the scale and sophistication of IT security threats have grown at an explosive rate. Organizations have to contend with industrialized attacks, which, in some cases, rival the size and sophistication of the largest legitimate computing efforts. In addition, they also have to guard against a more focused adversary with the resources and capabilities to target highly sensitive information, often through long-term attack campaigns.

Regardless of their origins, today's attacks are succeeding far too frequently -- and one big reason is the limitation of legacy security tools. Modern attacks may leverage several techniques in multiple phases. Traditional technologies often lack integration and insight across these phases, exacerbating exposure to these types of attacks. Defenses that must depend on what they already know may also fail when they cannot recognize a previously unknown attack or threat vector.

To confront continuously evolving threats, defenses must leverage more effective insight into attack behavior, when it is actually observed.
In this report, EMA examines the underlying causes of the failures of many existing security technologies, and how these technologies must evolve to overcome them. FireEye is highlighted as an example of a vendor that has pioneered an approach to breaking down many of the gaps left open by traditional security defenses. With an insight-driven approach that integrates analysis of threat behavior across multiple vectors, including Web, email, and files, FireEye technology is featured as a pioneering example of security technology designed to better address the nature of today’s complex threats.



Using Converged Infrastructure Management to Optimize the Planning and Operations of Cisco Environments

PUBLISHED: Thu, 03 Jan 2013 00:00:00 +0000
AUTHOR: Jim Frey

The steady convergence within IT infrastructure and IT operations organizations is fueling a drive for tightly integrated, converged infrastructure management options. But even as infrastructure convergence takes place, the pace of technology evolution and introduction has not slowed. As such, management approaches must keep up with significant rates of innovation and change. This EMA whitepaper focuses on the intersection of these two forces and how two IT industry leaders, Cisco and CA Technologies, are working together to optimize converged management in key areas of technology change and convergence, such as Voice/Video/Data, the Wide Area Network, and the datacenter.



Simplifying IT Risk Management in Converged Infrastructures

PUBLISHED: Wed, 02 Jan 2013 00:00:00 +0000
AUTHOR: Scott Crawford, Former EMA Analyst

Virtualization has transformed IT as few technologies before it.  In order to take advantage of the many benefits of virtualization, many organizations are also moving toward converged environments. While their computing, networking and storage resources are virtualized, they are still running on a physical infrastructure.  This virtual and physical infrastructure consolidation can lead to significant security, compliance and IT risk management concerns.

In this report, EMA highlights aspects of virtualized and converged infrastructures that organizations must address, in order to manage IT risk effectively. The value of a "data-driven" approach to management is highlighted as a way to overcome technology silos that separate the management of physical and virtual environments from a security, risk and compliance controls perspective. The report concludes with EMA recommendations on integrating virtual systems management into an overall view of enterprise security and operational IT risk.



EMA Radar for Advanced Performance Analytics (APA) Use Cases: Q4 2012

PUBLISHED: Tue, 11 Dec 2012 00:00:00 +0000
AUTHOR: Dennis Drogseth

Advanced Performance Analytics (APA), as Enterprise Management Associates (EMA) defines it, brings real-time or near real-time "big data" to IT operations, architects, service managers and even applications development, as well as IT executives and non-IT business stakeholders. A record twenty-two vendors are included in this industry assessment. They are: AccelOps, AppFirst, Appnomic Systems, BMC, Compuware, eG Innovations, eMite, FireScope, Fluke Networks, HP, IBM, Interlink Software, ManageEngine, Neebula, Netuitive, OPNET, OpTier, Prelert, Quest Software, SevOne, Splunk, and Zyrion.

Download the free summary PDF here.



EMA Radar for Data Center Infrastructure Management (DCIM): Q4 2012

PUBLISHED: Tue, 11 Dec 2012 00:00:00 +0000
AUTHOR: Steve Brasen

Although only fully defined in the past few years, Data Center Infrastructure Management (DCIM) has been broadly accepted as the primary method for achieving effective and efficient IT implementations, operations, and management processes. The ability to leverage analytics and detailed modeling capabilities to provide real time visibility across complex IT ecosystems enables organization to optimize a variety of critical infrastructure support elements, including energy efficiency, heat distribution, space management, network connectivity and system performance. Of the hundreds of solutions on the market claiming these capabilities, only a handful have been identified by EMA to deliver full DCIM support. In this EMA Radar Report, seven of these leading DCIM solution sets have been reviewed and empirically compared across a broad range of measurements that identify product strengths and overall cost efficiency. Participating vendors include Cormant, Emerson Network Power, FieldView Solutions, iTRACS, Modius, Nlyte Software, and Raritan.

Download the free summary PDF here.



The Mandate for Unified Network Management: What it is and Why You Need it

PUBLISHED: Fri, 07 Dec 2012 00:00:00 +0000
AUTHOR: Jim Frey

As the world of IT converges, within the data center, within networking technologies, between voice and data, and in more ways to come, it is also appropriate to examine how management tools and technologies can also be converged in order to best meet the needs of IT planning and operations. Within the scope of network management, this means adopting products that integrate or unify management capabilities, features, and functions. Though many network management product choices may sound similar on paper, there are distinct differences that should be understood. This white paper examines the business and technical demands behind unified network management and what is truly meant by and possible via a unified network management approach. This paper also examines an exemplary solution offered by Entuity, including case examples of how the solution has been deployed as unified network management within live production environments.



Beyond the Next Generation: Putting Advanced Network Security to Work

PUBLISHED: Tue, 27 Nov 2012 00:00:00 +0000
AUTHOR: Scott Crawford, Former EMA Analyst

A number of network security technologies have arisen that claim to be the "next generation" of network defense -- but what does this concept actually mean? In the view of Enterprise Management Associates analysts, the term has become marginalized by technologies that pigeonhole capability into silos of functionality such as firewalls or intrusion prevention systems. In fact, in EMA's view, the common requirements of application awareness, deep inspection for deep understanding of network content and behavior, and a "data-driven" approach to security that demands the ability to both generate and consume sources of intelligence, are leading to the increased convergence of network security capabilities. Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before.

In this report, EMA highlights specific examples of the ways in which these converged security systems put today's more advanced capabilities to work in practical application. The IBM Security Network Protection XGS 5000 is profiled as an example of this trend, delivering not only intelligence-driven, application aware defense against a variety of threats, but also the extensibility required to equip today's organizations to confront whatever may come tomorrow.



Technology Product Management: The Missing Lifecycle

PUBLISHED: Mon, 19 Nov 2012 00:00:00 +0000
AUTHOR: Charlie Betz, Former EMA Analyst

IT services and assets have well understood lifecycles. However, the technology products that underpin both services and assets are often poorly understood. IT product retirements and accompanying upgrade cycles are often unexpected and disruptive, affecting areas as diverse as architecture, human resources, security, engineering, and operations. Ultimately, the technology product lifecycle profoundly influences IT service delivery, yet this influence is indirect and requires careful management. 

Clean master data is a must; too often, vendor products are known by different names across functional areas. IT vendor management, IT human resources, IT architecture, and IT security may know a given product by four different names, weakening the organization's ability to effectively manage its suppliers and its IT estate. 

BDNA provides a solution to these challenges, offering both a high value master data catalog and the ability to translate and align your data with this catalog. BDNA's master data catalog, Technopedia, provides a clean data set representing hundreds of thousands of IT products, functional categorizations, release and retirement dates, and much more. This vendor and product master data is difficult for even the largest IT organizations to develop and maintain. With such a trusted source, the overall IT product lifecycle can be managed as an integrated, end-to-end process.



Why You Need to Consider Privileged Access Management (and What You May Not Know About It That You Should)

PUBLISHED: Tue, 13 Nov 2012 00:00:00 +0000
AUTHOR: Scott Crawford, Former EMA Analyst

Access controls that define a specific set of privileges linked to individuals have become well accepted as a fundamental security practice. Why, then, are these same principles so rarely applied to the most sensitive access of all: administrative accounts that enable fundamental control of IT?

This distressing situation is more than a paradox. The abuse that poorly managed administrative access make possible has led to incidents having a real impact on organizations worldwide.

In this report, Enterprise Management Associates examines some of the most common excuses organizations give to justify this oversight. Among these are concerns that privileged access management (PAM) solutions are too complex, disruptive, or poorly fitted to business requirements. EMA counters this concern with an examination of the ways in which modern PAM solutions are transparent in deployment, providing the control and monitoring capability organizations need to bring privileged access in line with accepted management practices. Organizations should gain a new appreciation for the value of flexibility in policy control and comprehensive reporting that not only closes one of the most egregious IT risk gaps in many organizations, but also delivers value beyond security or compliance alone.



EMA Radar for Integration Technologies for Hybrid Cloud: Q4 2012

PUBLISHED: Fri, 02 Nov 2012 00:00:00 +0000
AUTHOR: Julie Craig

Today's companies are increasingly "integrating the Cloud". SaaS to SaaS, on-premise to SaaS, and multi-platform integrations are commonplace. This EMA Radar examines the technologies companies are using to accomplish these integrations, as well as the scenarios, roles, and processes that are driving this evolution.

This research represents a new "take" on integration that goes beyond traditional on-premise integration products in terms of versatility and ease of use. Readers should note that this is less a head-to-head product evaluation than a buying guide aimed at helping companies make product choices that are in line with their specific requirements.

The products in this paper are diverse, yet share common functionality addressing hybrid Cloud integration and governance. For example, they vary considerably in terms of the types of integrations and platforms they support, ideal users, breadth of technology coverage, manageability, and cost efficiency. 

What they do have in common is that they provide the underlying "glue" supporting hybrid Cloud implementations in a variety of permutations. While most focus on data- or application-level integration for Software as a Service (SaaS), several also have some level of support for Platform as a Service (PaaS) and/or Infrastructure as Service (IaaS) integrations as well. The goal is to enable readers to make more informed choices in developing a "short list" of vendors to evaluate, regardless of what types of Cloud integration projects they have in mind.



Big Data Comes of Age

PUBLISHED: Thu, 01 Nov 2012 00:00:00 +0000
AUTHOR: Shawn Rogers

In the Information Technology (IT) industry, 2012 has been the year of Big Data. From a standing start toward the end of the last decade, Big Data has become one of the most talked about topics in IT. There is hardly a vendor who does not have a solution or, at least, a go-to-market strategy. Beyond IT, even the financial and popular press discusses its merits and debates its drawbacks. And yet, the debate of exactly how to define Big Data remains.  In this joint study between EMA’s Shawn Rogers and John Myers, and 9sight Consulting’s Dr Barry Devlin, respondents clearly indicated that their Big Data solutions range far beyond social media and machine-generated data to include all types of traditional transactional business data.
 
The concept of Big Data has evolved in two key directions. First, was the growing understanding that while size is important, the technology implications of data structure and processing speed are at least as important. Second, what really matters for Big Data is what systemic business cases it supports and what real analytic and operational value can be extracted from it.
 
Big Data has driven change in our traditional data management strategies and has found a home in an expanding information ecosystem that many companies struggle to manage today. This landscape was once dominated by the enterprise data warehouse (EDW) on the informational side and an array of largely monolithic transaction processing systems on the operational side. This has now given way to an array of data management platforms, including NoSQL platforms like Hadoop.



The Role of Collaboration in Business Intelligence

PUBLISHED: Wed, 31 Oct 2012 00:00:00 +0000
AUTHOR: Shawn Rogers

"Two heads are better than one." It may be an old saying, but it is still true today. In today's fast paced, economically challenged environment, making better decisions is not just a "nice-to-have," it is vital to the very survival of businesses. Collaborative Business Intelligence is a relatively new concept in which the two technologies of Business Intelligence (BI) and collaboration are beginning to merge in support of a new and improved decision-making environment. This research is authored by Dr. Claudia Imhoff of Intelligent Solutions, Colin White of BI Research, and Shawn Rogers of Enterprise Management Associates.


     

Subscribe Now!


Subscribe with My Yahoo!

Subscribe with NewsGator

Subscribe with My AOL

Subscribe with Bloglines

Subscribe with Netvibes

Subscribe with Google

EMA on Facebook   EMA on LinkedIn   EMA on Twitter   EMA RSS   EMA on YouTube

©1996-2014 Enterprise Management Associates, Inc. All rights reserved.
EMA™, ENTERPRISE MANAGEMENT ASSOCIATES®, and the mobius symbol are registered trademarks or common-law trademarks of Enterprise Management Associates, Inc.
Site Terms & Conditions | Integrity Policy | Site Map | My Account
Hide
Subscribe to EMA RSS Feed
Email
Show