IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING

CONTACT    SIGN IN    SIGN UP
    

Free RSS Feeds from Enterprise Management Associates (EMA)

Stay up to date on the latest IT and data management information from EMA, including Webinars, Radar Reports, white papers, impact briefs, advisory notes and more!

Select your preferred reader by selecting an icon on the right.



Current Feed Content:




Report Summary - Next-Generation Network Packet Brokers: Defining the Future of Network Visibility Fabrics

PUBLISHED: Wed, 12 Sep 2018 00:00:00 +0000
AUTHOR: Shamus McGillicuddy


Full Report Abstract
This Enterprise Management Associates research report examines emerging requirements for delivering network traffic data to out-of-band and inline network and security analysis tools. Specifically, it looks at the current usage of and emerging best practices for network visibility fabrics and network packet brokers. Based on a survey of 250 IT professionals, the research also explores next-generation use cases like traffic monitoring in virtualized infrastructure and the public cloud, and it looks at evolving form factors, such as disaggregated "white box" network packet brokers.



Next-Generation Network Packet Brokers: Defining the Future of Network Visibility Fabrics

PUBLISHED: Mon, 10 Sep 2018 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This Enterprise Management Associates research report examines emerging requirements for delivering network traffic data to out-of-band and inline network and security analysis tools. Specifically, it looks at the current usage of and emerging best practices for network visibility fabrics and network packet brokers. Based on a survey of 250 IT professionals, the research also explores next-generation use cases like traffic monitoring in virtualized infrastructure and the public cloud, and it looks at evolving form factors, such as disaggregated "white box" network packet brokers.



Report Summary - Data Lakes for Business: Big Data 2018 End-User Research Results

PUBLISHED: Wed, 05 Sep 2018 00:00:00 +0000
AUTHOR: John Myers, Former EMA Analyst

Summary document of the EMA research report, "Data Lakes for Business: Big Data 2018 End-User Research Results."

Report Abstract
Big data is a way to look at new sources of data--structured, multi-structured, and unstructured--and how organizations place these sources of information under "new management." The EMA Big Data surveys use deliberately broad definitions of big data and data lakes to inspire end users to think beyond limiting definitions. For big data, users should look beyond just unstructured data, and for data lakes, they should look beyond "just" Hadoop. This allows organizations to face the challenges that their legacy data management practices and platforms could not. They can evaluate how opportunities opened companies to a larger world with IoT sensor and mobile app data, augmented with customer and product information from enterprise applications. Additionally, companies can examine how traditional analytical architectures, such as the data warehouse, work with new modern data science implementations and how logical architectures that include relational databases and NoSQL platforms, such as Hadoop, MongoDB, and Cassandra, can be interwoven. 

As was established in four previous studies since 2012, the broad concept of the data lake offers a range of possibilities and use cases. Beyond the initial stages of a simple exploration repository, combined data lakes (such as the EMA Hybrid Data Ecosystem) have grown to support and include traditional operational and analytical environments. In this edition of the EMA Big Data survey, a deep dive on the data lake architecture provides interesting insight. As a leading data management architecture associated with Hadoop environments, and potential coopetition for traditional enterprise data warehouses, the data lake provides both great opportunity and potential risk for organizations implementing this modern data architecture.



Responsible User Empowerment: Enabling Privileged Access Management (PAM)

PUBLISHED: Wed, 05 Sep 2018 00:00:00 +0000
AUTHOR: Steve Brasen

Today's tech-oriented workforces are more knowledgeable and capable with utilizing enterprise IT devices, applications, and services than ever before, and many have more than a basic understanding of the inner workings of business critical system. However, a lack of constraints on the types of tasks they are permitted to perform often leads to unqualified users having an inflated sense of expertise and a belief that they can manage systems as well (if not better) than the trained administrators responsible for supporting them. To help educate organizations on best practices and optimal approaches to privileged access management (PAM), EMA has conducted primary, survey-based research to identify the current level of risk organizations are assuming in allowing open access to IT resources that require elevated controls and protections. Presented in this report are the key conclusions achieved from the research results as well as actionable guidance on how to responsibly enable privileged access.



Report Summary - Responsible User Empowerment: Enabling Privileged Access Management (PAM)

PUBLISHED: Wed, 05 Sep 2018 00:00:00 +0000
AUTHOR: Steve Brasen


Today's tech-oriented workforces are more knowledgeable and capable with utilizing enterprise IT devices, applications, and services than ever before, and many have more than a basic understanding of the inner workings of business critical system. However, a lack of constraints on the types of tasks they are permitted to perform often leads to unqualified users having an inflated sense of expertise and a belief that they can manage systems as well (if not better) than the trained administrators responsible for supporting them. To help educate organizations on best practices and optimal approaches to privileged access management (PAM), EMA has conducted primary, survey-based research to identify the current level of risk organizations are assuming in allowing open access to IT resources that require elevated controls and protections. Presented in this report are the key conclusions achieved from the research results as well as actionable guidance on how to responsibly enable privileged access.



Corvil Profile and Report Summary - EMA Radar for Network-Based Security Analytics: Q3 2018

PUBLISHED: Tue, 04 Sep 2018 00:00:00 +0000
AUTHOR: David Monahan

Corvil's vendor profile and report summary from the EMA Radar for Network-Based Security Analytics: Q3 2018.


Full Report Abstract

The speed of detection and mitigation are the true issues today. How fast is as fast as possible? Over the last few years, research like the Verizon Data Breach Investigation Report demonstrated that "as fast as possible" has not been nearly fast enough. Compromises can happen in hours, but identifying an attack may not take place for months or years.

 

It is this issue that focused innovators on how to identify and respond to security incidents faster. The first challenge is being able to wade through the incessant and overwhelming noise of alerts, and reduce them to a workable volume of real problems that can be clearly defined and addressed quickly. 

 

Over the past several years, numerous startup companies were established to address the gap in analytics and visibility of real issues in the sea of alerts. Security analytics solutions were initially designed to perform one or more of three primary types of security-focused analytics: User and Entity Behavior Analytics (UEBA), Anomaly Detection, and Predictive Analytics. Since their inception much of these analytics have merged, leaving only a thin line between combined UEBA/Anomaly Detection and Predictive Analytics.

 

This report is the second of a two-part series. Part one, released earlier this year, delved into the platforms, solutions, and products supplying log-based security analytics for the express purpose of providing them with fewer actionable alerts without the side effects that can filter out alerts on actual threat activity. This second report focuses on vendors that use network information, such as net flows, deep packet inspection, and forensic packet analysis, to gather telemetry.

 

This report evaluates vendors across five major categories supported by over 130 KPIs. EMA evaluated and scored each vendor under the same documented criteria. Each participating vendor has a profile that outlines their solution, its strengths and weaknesses, and its performance ratings compared to the other vendors evaluated. It also documents key decision-making factors important to the buying process and ultimately depicts the vendors relationship to each other based on value vs. functionality.

Evaluated Vendors include: 

  1. Awake Security
  2. Balbix
  3. Cisco
  4. Corvil
  5. ExtraHop
  6. HPE Aruba
  7. Preempt
  8. ProtectWise
  9. RedLock
  10. SS8
  11. Vectra Networks 
  12. Versive 

 

 



Data Lakes for Business: Big Data 2018 End-User Research Results

PUBLISHED: Fri, 31 Aug 2018 00:00:00 +0000
AUTHOR: John Myers, Former EMA Analyst

Big data is a way to look at new sources of data--structured, multi-structured, and unstructured--and how organizations place these sources of information under "new management." The EMA Big Data surveys use deliberately broad definitions of big data and data lakes to inspire end users to think beyond limiting definitions. For big data, users should look beyond just unstructured data, and for data lakes, they should look beyond "just" Hadoop. This allows organizations to face the challenges that their legacy data management practices and platforms could not. They can evaluate how opportunities opened companies to a larger world with IoT sensor and mobile app data, augmented with customer and product information from enterprise applications. Additionally, companies can examine how traditional analytical architectures, such as the data warehouse, work with new modern data science implementations and how logical architectures that include relational databases and NoSQL platforms, such as Hadoop, MongoDB, and Cassandra, can be interwoven. 

As was established in four previous studies since 2012, the broad concept of the data lake offers a range of possibilities and use cases. Beyond the initial stages of a simple exploration repository, combined data lakes (such as the EMA Hybrid Data Ecosystem) have grown to support and include traditional operational and analytical environments. In this edition of the EMA Big Data survey, a deep dive on the data lake architecture provides interesting insight. As a leading data management architecture associated with Hadoop environments, and potential coopetition for traditional enterprise data warehouses, the data lake provides both great opportunity and potential risk for organizations implementing this modern data architecture.



EMA Radar for Network-Based Security Analytics: Q3 2018

PUBLISHED: Tue, 31 Jul 2018 00:00:00 +0000
AUTHOR: David Monahan

The speed of detection and mitigation are the true issues today. How fast is as fast as possible? Over the last few years, research like the Verizon Data Breach Investigation Report demonstrated that "as fast as possible" has not been nearly fast enough. Compromises can happen in hours, but identifying an attack may not take place for months or years.

 

It is this issue that focused innovators on how to identify and respond to security incidents faster. The first challenge is being able to wade through the incessant and overwhelming noise of alerts, and reduce them to a workable volume of real problems that can be clearly defined and addressed quickly. 

 

Over the past several years, numerous startup companies were established to address the gap in analytics and visibility of real issues in the sea of alerts. Security analytics solutions were initially designed to perform one or more of three primary types of security-focused analytics: User and Entity Behavior Analytics (UEBA), Anomaly Detection, and Predictive Analytics. Since their inception much of these analytics have merged, leaving only a thin line between combined UEBA/Anomaly Detection and Predictive Analytics.

 

This report is the second of a two-part series. Part one, released earlier this year, delved into the platforms, solutions, and products supplying log-based security analytics for the express purpose of providing them with fewer actionable alerts without the side effects that can filter out alerts on actual threat activity. This second report focuses on vendors that use network information, such as net flows, deep packet inspection, and forensic packet analysis, to gather telemetry.

 

This report evaluates vendors across five major categories supported by over 130 KPIs. EMA evaluated and scored each vendor under the same documented criteria. Each participating vendor has a profile that outlines their solution, its strengths and weaknesses, and its performance ratings compared to the other vendors evaluated. It also documents key decision-making factors important to the buying process and ultimately depicts the vendors relationship to each other based on value vs. functionality.

Evaluated Vendors include: 

  1. Awake Security
  2. Balbix
  3. Cisco
  4. Corvil
  5. ExtraHop
  6. HPE Aruba
  7. Preempt
  8. ProtectWise
  9. RedLock
  10. SS8
  11. Vectra Networks 
  12. Versive 

 

 



EMA Top 3 Report: Ten Priorities for Enabling Secure Access to Enterprise IT Services

PUBLISHED: Tue, 24 Jul 2018 00:00:00 +0000
AUTHOR: Steve Brasen

Enterprise productivity, profitability, and success in meeting business objectives are dependent on the ability of workforces to access and utilize the applications, data, email, and other IT services necessary to complete job tasks. However, increased pressure to enable workforce mobility and the distribution of IT services across a variety of public and private hosting environments have challenged organizations to grant secure and reliable access to those resources. This Enterprise Management Associates (EMA) decision guide is intended to provide actionable advice on the best practices and solutions organizations should adopt to empower end-user productivity while minimizing risk profiles.





EMA Research Findings: DevOps 2020 Top3 and Innovator Award Announcement

PUBLISHED: Wed, 18 Jul 2018 00:00:00 +0000
AUTHOR: Steve Hendrick

This report describes recent worldwide EMA DevOps research that analyzed DevOps strategies, challenges, tool use across 20 DevOps markets, product effectiveness, and product satisfaction.  Product-level customer insights were then filtered through EMA evaluation criteria to identify the Top3 vendor products and Innovative vendor products across eight DevOps market segments.  This report describes how vendors products were evaluated and who received Top 3 and Innovator awards.



The Future of Network Operations: Dynamic Visualization and Automation

PUBLISHED: Fri, 29 Jun 2018 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Network managers often build their careers on their ability to fix problems. Whether that comes from proactive problem prevention or reactive troubleshooting, it’s all about uptime for them. However, today’s enterprise expects more from the network and the network team. The modern network manager needs to be a partner, not a firefighter. They need to optimize their tools and processes to move on from the troubleshooting mindset. This will require advanced network visualization solutions and increased network automation. This paper reviews these issues in detail and reviews the capabilities of NetBrain, a provider of dynamic network mapping and automation technology. 



Unifying IT Decision-Making for Digital War Rooms: A Deep Dive Into How to Succeed in the Age of Cloud and Agile - Report Summary for Moogsoft

PUBLISHED: Wed, 13 Jun 2018 00:00:00 +0000
AUTHOR: Dennis Drogseth

This report examines the digital war room problem from multiple dimensions. These include roles and responsibilities (from operations to DevOps), emerging organizational patterns, technology priorities, toolset adoption and toolset issues, metrics and success rates, and patterns that indicate success or, conversely, might otherwise lead to failure.


It also introduces Moogsoft’s AIOps’ capabilities to help transform war-room operations.



Adopting Effective Solutions in Endpoint Detection and Response: An Objective Comparison of Tanium Core and 1E Tachyon

PUBLISHED: Thu, 07 Jun 2018 00:00:00 +0000
AUTHOR: Steve Brasen

Rapidly evolving requirements for security, compliance, and service management of enterprise endpoint devices is necessitating faster and more detailed visibility into end user computing conditions. Endpoint detection and response platforms (EDRP) have risen in popularity for their ability to rapidly respond to these business requirements across particularly large support stacks. In order to help organizations identify the optimal endpoint detection and response solutions necessary to achieve their unique organizational requirements, Enterprise Management Associates (EMA) conducted an objective and independent evaluation of two of the leading EDRP currently available: Tanium Core and 1E Tachyon.



How to Assemble the Ultimate Network Management Toolset

PUBLISHED: Thu, 07 Jun 2018 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

EMA research determined that network infrastructure teams are finally embracing next-generation technologies, like public and private clouds and software-defined networking. Regardless of where they are on the network transformation journey, network managers need to become more strategic about network management tools. Based on the latest research from Enterprise Management Associates, this white paper offers a guide to building a network management tool strategy. 



Converging the Foundational Pillars of Data: Predicting the Future of Data Management

PUBLISHED: Thu, 31 May 2018 00:00:00 +0000
AUTHOR: John Myers, Former EMA Analyst

Modern data-driven organizations are shaping the next wave of business innovation. These companies are focused on using data and information to refine and optimize existing lines of business or create new and disruptive revenue models. Traditionally, enterprises view data as a record of what occurred. They call upon it only as a reflective lens, or a rear-facing view, on the performance of the organization.
 
These organizations are only able to implement innovative approaches because they have access to internal and external data and possess the ability to leverage that data into the disruptive insights. Data-driven organizations stand upon the foundational pillars of modern data management: Enterprise Applications, Analytical Platforms, Big Data Environments and Cloud Deployments.  These pillars provide much of the data that organizations put into their disruptive business models and improved practices, from information about business processes, transactions, and supply chain inventories from their enterprise applications, to historical data and analysis about customers, products, and suppliers in various analytical platforms, to social media and streaming event and granular detail data in big data environments, to third-party data and managed environments in cloud deployments.
  
Yet, the demands of data-driven organizations to do more with the information they have access to puts pressure on these foundational pillars. A solution to increasing pressure on a foundation is to spread out the supporting structure, which distributes the load better across the foundation. However, in the case of data-driven initiatives, the purpose of strengthening the pillars is to bring them closer together and align/converge their strengths to better support information distribution, deployment speed, and strategic management. 



Handling Too Much Data and Finding Too Little Information Strategies for Managing the Unintended Consequences of Data-Driven Organizations

PUBLISHED: Fri, 18 May 2018 00:00:00 +0000
AUTHOR: John Myers, Former EMA Analyst

Organizations that already adopted data-driven strategies are going to find, establish, and maintain competitive advantage over traditional rivals in competing marketplaces. They will develop new markets and opportunities that traditional enterprises will have difficulty capitalizing. Yet, opportunity costs come with the value of data-driven initiatives.

Few organizations can effectively construct and operate the supporting environments that data-driven strategies demand. Internet-focused organizations have certain advantages in their technology-oriented cultures and presence of digitally-native data sources. Whether it is in terms of modern data center infrastructure for on-premises deployments, or virtual private clouds, or utilizing public cloud resources, the CIOs and IT departments of data-driven organizations are oriented toward supporting, deploying, and staffing complex data landscapes. Many traditional companies, and even some startups in Internet-focused markets, have difficulty handling the data necessary for data-driven strategies.

Even for organizations that can manage data collection and storage, there are issues with the proper utilization of the data. It is one thing to collect a mass of data from IoT devices or mobile apps; it is another to prepare and correlate the data to compare the actions of a customer on a smartphone with their brick-and-mortar purchase history. This management, curation, and operational execution is crucial to making the proper targeted offers to customers and prospects at the correct time.

Finally, as data is collected and correlated, it needs to be curated as an asset. Understanding data quality and the association of data to relevant customer, product, or location domains is part of managing customer relationships and product portfolios. Creating enterprise catalogs of the data and metadata across a landscape can be a significant challenge for organizations whose primary goal is manufacturing or supply chain distribution. Yet, this is a key component in the ability for organizations to evaluate and value their data as an asset, meet requirements for internal risk controls, and meet compliance for governmental regulation.



2018 EMA Vendors to Watch: Security and Risk Management

PUBLISHED: Thu, 17 May 2018 00:00:00 +0000
AUTHOR: David Monahan

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2018 EMA Vendors to Watch in the Security & Risk Management field, including Berry Technologies, Cy-oT, HackerOne, Immersive Labs, ShieldX, Twistlock.

Additional vendors will be added to this document throughout the year.



Report Summary - EMA Radar for Enterprise Hybrid Infrastructure Management

PUBLISHED: Fri, 27 Apr 2018 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This is a summary of the "EMA Radar for Enterprise Hybrid Infrastructure Management."

Full Report Abstract

Network monitoring solutions rarely focus exclusively on the network today. These products need visibility across the entire data center as well as into public cloud environments. Enterprises need service-centric visibility into hybrid infrastructures that span multiple data centers and clouds. Such tools can support the network operations center and cross-domain IT operations teams. 

Given this market evolution, EMA has replaced the Enterprise Network Availability Monitoring System (ENAMS) Radar the new Enterprise Hybrid Infrastructure Management (EHIM) Radar. This report evaluates IT monitoring systems with deep network visibility and very good monitoring visibility into the full data center infrastructure stack and public cloud environments. Such products allow IT operations teams to monitor private, hybrid, and multi-cloud infrastructure. 

The vendors evaluated in this study include:

1. AdRem
2. CA
3. Centerity
4. IBM
5. Infosim
6. Ipswitch
7. Kaseya
8. Micro Focus
9. ManageEngine
10. OpsView
11. Paessler
12. ScienceLogic
13. SolarWinds
14. Zenoss  



Extending Competitive Advantage in Telecom: Top Five Use Cases for Advanced AI Analytics in Telecom Services

PUBLISHED: Thu, 26 Apr 2018 00:00:00 +0000
AUTHOR: John Myers, Former EMA Analyst

The number of events that the mobile telecom segment handles is staggering. Activation and provisioning events occur daily for any of the five billion people with mobile phones  around the globe. Voice calls, SMS texts and messaging, and Internet connectivity have grown with the deep penetration of mobile services. Companies need to direct these events across and between carrier networks to ensure a seamless and efficient connection experience. With all of these network events, it is very difficult for the "human" resources at various carriers to put themselves in the middle of the analysis process associated with telecom operations. From the ordering and provisioning process to support over five billion subscribers worldwide, to the number of events created during 2-4 hours per day of smartphone usage,  the amount of information generated and in need of analysis to ensure the sound operations and fiscal health of a mobile telecom carrier is astounding.  

All types of organizations, telecommunications providers included, have mixed success with implementing AI analytics. The limited successes come in terms of siloed or compartmentalized efforts in one area or another, or constraints associated with data quality. For telecom providers, silos are based not just on barriers between departments such as network, marketing, and customer care. They are based on differences between data structures. Some silos are in a structured relational data format from operations support (OSS) platforms. Others are in a multi-structured, formatted data format, such as XML and JSON. These siloed analytics projects do not scale very well and often require the statisticians and data scientists who create them to spend an inordinately large amount of time tuning and maintaining them. In terms of quality, problems with data, such as customer account, usage, or location, make the results not just poor, but damaging. Low data quality in AI analytics can result in poor customer experience and increase risk for churn.

Deploying an approach using advanced AI analytics requires understanding the analytical models, and also how to implement the machine learning algorithms required to continually find and refine the results to take action where appropriate. It is not enough to flag anomalies. It must also minimize the false positives that can waste the time of human analysts in network operations, fraud management, security, and customer care.



EMA Radar for Enterprise Hybrid Infrastructure Management

PUBLISHED: Wed, 25 Apr 2018 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Network monitoring solutions rarely focus exclusively on the network today. These products need visibility across the entire data center as well as into public cloud environments. Enterprises need service-centric visibility into hybrid infrastructures that span multiple data centers and clouds. Such tools can support the network operations center and cross-domain IT operations teams. 

Given this market evolution, EMA has replaced the Enterprise Network Availability Monitoring System (ENAMS) Radar the new Enterprise Hybrid Infrastructure Management (EHIM) Radar. This report evaluates IT monitoring systems with deep network visibility and very good monitoring visibility into the full data center infrastructure stack and public cloud environments. Such products allow IT operations teams to monitor private, hybrid, and multi-cloud infrastructure. 

The vendors evaluated in this study include:

1. AdRem
2. CA
3. Centerity
4. IBM
5. Infosim
6. Ipswitch
7. Kaseya
8. Micro Focus
9. ManageEngine
10. OpsView
11. Paessler
12. ScienceLogic
13. SolarWinds
14. Zenoss



Network Management Megatrends 2018: Exploring NetSecOps Convergence, Network Automation, and Cloud Networking

PUBLISHED: Tue, 24 Apr 2018 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Based on a survey of 250 North American and European IT decision-makers, the Enterprise Management Associates® (EMA™) Network Management Megatrends 2018 research examines evolving network management tool requirements, new network operations organizational strategies, emerging drivers of network decision-making, leading challenges to network operations, and more. It also looks at the impact of emerging macro trends, like cloud networking, the convergence of network operations and IT security, network automation, and the expansion of network management outsourcing.



EMA Radar for Log-Based Security Analytics: Q2 2018

PUBLISHED: Wed, 18 Apr 2018 00:00:00 +0000
AUTHOR: David Monahan

Cybersecurity as a discipline is a fast-paced, dynamic area. New and innovative attack methods are combined with old ones to make nearly infinite avenues of attack. Whether an attack is a single packet compromise or a low-and-slow attack drawn out over many days, the defenders are responsible for identifying and stopping the attacks as soon as possible. It’s the last phrase that is the issue. How fast is as fast as possible? It seems that over the last few years, "as fast as possible" has not been nearly fast enough. Compromises can happen in hours, but identification may not take place for months to years.

It is this issue that drew innovators to try to figure out how to identify and respond to security incidents faster. The first challenge is being able to wade through the incessant and overwhelming noise of alerts and reduce them to a small trickle of real problems that can be clearly defined and addressed quickly.

Over the past several years, numerous startup companies were established to address this gap in analytics and visibility of real issues in the sea of alerts. Security analytics solutions were initially designed to perform one or more of three primary types of security-focused analytics: User and Entity Behavior Analytics (UEBA), Anomaly Detection, and Predictive Analytics. Since their inception, much of these analytics have merged, leaving only a thin line between a combined UEBA/Anomaly Detection and Predictive Analytics.

This report, which is part one of a two-part series, delves into the platforms, solutions, and products supplying log-based security analytics to security practitioners for the express purpose of providing them with fewer actionable alerts without the tuning side effects that can filter out alerts on actual threat activity. The report evaluates vendors across five major categories supported by over 100 KPIs. EMA evaluated, scored, and ranked each vendor under the same documented criteria. Each participating vendor has a profile that outlines the solution, including its strengths and weaknesses, in comparison to the other vendors evaluated. It also documents key decision-making factors important to the buying process and ultimately depicts the vendors’ relationship to each other based on value vs. functionality.

Part two will follow the same methodology, but will focus on security analytics solutions that primarily rely on network-based data for analysis.



Report Summary - Unifying IT Decision-Making for Digital War Rooms: A Deep Dive Into How to Succeed in the Age of Cloud and Agile

PUBLISHED: Wed, 11 Apr 2018 00:00:00 +0000
AUTHOR: Dennis Drogseth


Full Report Abstract
As EMA examined them, war rooms could be physical, virtual, or hybrid--which turned out to be the predominant case. They could be highly automated or not, or made up of consistent, well-defined teams or not. What made them war rooms in all cases was the need for collaborative decision making across silos, and the need for urgency and efficiency in taking effective action.

This report will examine the war room problem from multiple dimensions. These include roles and responsibilities (from operations to DevOps), emerging organizational patterns, technology priorities, toolset adoption and toolset issues, metrics and success rates, and patterns that indicate success or, conversely, might otherwise lead to failure.



Unifying IT Decision-Making for Digital War Rooms: A Deep Dive Into How to Succeed in the Age of Cloud and Agile

PUBLISHED: Mon, 02 Apr 2018 00:00:00 +0000
AUTHOR: Dennis Drogseth

As EMA examined them, war rooms could be physical, virtual, or hybrid--which turned out to be the predominant case. They could be highly automated or not, or made up of consistent, well-defined teams or not. What made them war rooms in all cases was the need for collaborative decision making across silos, and the need for urgency and efficiency in taking effective action.

This report will examine the war room problem from multiple dimensions. These include roles and responsibilities (from operations to DevOps), emerging organizational patterns, technology priorities, toolset adoption and toolset issues, metrics and success rates, and patterns that indicate success or, conversely, might otherwise lead to failure.



Looking Before You Leap Into the Cloud: A Planned Approach to Cloud Implementations Prevents Pain, Rework, and Frustration

PUBLISHED: Tue, 27 Mar 2018 00:00:00 +0000
AUTHOR: John Myers, Former EMA Analyst

In the era of data-driven cultures, the transformational impact of analytics initiatives grows more each year. Traditional analytics environments, such as dashboarding and reporting, expand from business analysts to include frontline employees in operations, the warehouse, and at the point of sale.  Advanced predictive and prescriptive analytics initiatives spread from marketing, to finance and customer care, to IoT real-world environments. Streaming data spurs the development and deployment of real-time analytics applications leveraging machine learning (ML) and artificial intelligence (AI) initiatives. These advancements in data and analytics are helping large enterprises reinvent themselves.  

In each of these transformational areas, analytical initiative deployments benefit from cloud-based deployments. Speed of provisioning and pay-as-you-go (operational expense: OPEX) models make cloud solutions very attractive. Some organizations will jump into a "swipe and go" cloud implementation that focuses more on short-term convenience and speed of deployment. This is a short-sighted approach.   

Modern data-driven organizations require more from their implementations. They need corporate-wide data management and visibility. They need speed and flexibility in their options for configuration, processing, and deployment of complex, multi-disciplinary analytics use cases. They need solutions that benefit everyone and facilitate safe self-service and collaboration. A coordinated data environment strategy that considers private and public cloud resources and provides a standardized approach across all of company's data assets and analytics efforts will make a real difference to an organization's success.



Streamlining Your Data Pipelines: Applying Automation to Streaming Data

PUBLISHED: Fri, 23 Mar 2018 00:00:00 +0000
AUTHOR: John Myers, Former EMA Analyst

Data-driven organizations push the envelope as they seek competitive advantage. They look for new, innovative ways to utilize the information they have to lower costs and improve operational efficiency and customer experience. This information comes from existing enterprise applications, such as enterprise resource planning, customer relationship management, and supply chain management, as well as new data sources such as social media platforms, like Facebook or Twitter, and big data sources, such as Hadoop and NoSQL.

Data-driven organizations are also focusing on the adoption and utilization of streaming event data sources coming from real-time applications associated with orders, fulfillment and payment, Internet of Things (IoT) device and sensor event data, and mobile app and online portal navigation information. These streaming event sources promise to accelerate the collection, analysis, and action taken to build competitive advantage. Organizations that can spot and act on trends in their operations, customer tastes, and overall market conditions in real time have a clear advantage over their competitors, who are taking days, if not weeks or months, to find those same opportunities.

To manage the new challenges of constructing and maintaining streaming data pipelines, automation strategies and practices provide organizations with the ability to capitalize on the opportunities of streaming data without taking on a challenge destined for failure. Key considerations for implementing automation in association with streaming include: 

1. Growth in the adoption of streaming data strategies with IoT, enterprise applications, and mobile and online data
2. Complexity of streaming data management and engineering across multiple points
3. Value of automation for data infrastructure engineering initiatives to increase scale and maintainability 
4. Strategic impact of automation on streaming environments  
5. Value of business outcomes for automation practices



EMA Innovator Awards: Networking: Second Half 2017

PUBLISHED: Thu, 08 Mar 2018 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This report recognizes three EMA Innovator Award winners that advanced the networking industry during the second half of 2017. EMA bases its award selection upon its original research on enterprise networking trends, interaction with the industry, and conversations with network practitioners. To be eligible for this round of awards, vendors had to announce a product or technology in the second half of 2017. 



Pragmatic Identity and Access Management

PUBLISHED: Thu, 01 Mar 2018 00:00:00 +0000
AUTHOR: Steve Brasen

Today's business success is dependent on the secure availability of software resources, including applications, data, and other services. Identity and access management (IAM) processes and solutions are the first line of defense for ensuring secure access to enterprise software services. An increasing reliance on applications distributed across internal, external, public, and private hosting environments are creating new challenges for enabling IAM solutions that are cost-effective, easy to manage, and do not diminish end-user productivity. To help definitively identify evolving requirements, challenges, and optimal solutions, Enterprise Management Associates (EMA) conducted primary, survey-based research identifying real-world businesses and experiences with various IAM approaches. Revealed in this report are the key findings from that research as well as conclusions on how to implement a pragmatic IAM solution.



Plotting the Course of Your Big Data Analytics Strategy

PUBLISHED: Thu, 01 Mar 2018 00:00:00 +0000
AUTHOR: John Myers, Former EMA Analyst

As data-driven strategies become engrained within an enterprise, they will turn to big data analytics to fulfill the need for information. Companies need to have the flexibility to provision for a range of data consumers, including employees, partners, and customers, to support their analytical initiative. Those data-driven initiatives involve exploration, machine learning, and operational analytics applications to support topline revenue growth, limit bottom-line costs, and improve the margins and operational efficiencies of the organization. 


As data-driven organizations attempt to implement big data analytics beyond the relatively small scope of their established data science teams as part of their big data analytics journey, they need to plot a course that allows them to be successful long-term. Using best practices and deployments from the early stage of big data analytics adoption can lead companies down a path that not only has technical limitations, but constrains the organization from taking advantage of their data assets.



Report Summary - Pragmatic Identity and Access Management

PUBLISHED: Tue, 27 Feb 2018 00:00:00 +0000
AUTHOR: Steve Brasen

This is a summary of the EMA research report, "Pragmatic Identity and Access Management."


Full Report Abstract
Today's business success is dependent on the secure availability of software resources, including applications, data, and other services. Identity and access management (IAM) processes and solutions are the first line of defense for ensuring secure access to enterprise software services. An increasing reliance on applications distributed across internal, external, public, and private hosting environments are creating new challenges for enabling IAM solutions that are cost-effective, easy to manage, and do not diminish end-user productivity. To help definitively identify evolving requirements, challenges, and optimal solutions, Enterprise Management Associates (EMA) conducted primary, survey-based research identifying real-world businesses and experiences with various IAM approaches. Revealed in this report are the key findings from that research as well as conclusions on how to implement a pragmatic IAM solution.



Ten Priorities for Container Management and DevOps in Production and at Scale in 2018 - EMA Top 3 Report and Decision Guide for Enterprise

PUBLISHED: Mon, 26 Feb 2018 00:00:00 +0000
AUTHOR: Torsten Volk

DevOps and containers enable enterprises to deliver better customer value in a more cost-effective manner by institutionalizing an automated, continuous, and rapid development, build, test, release, and deployment process.

Based on primary research data obtained from 300 U.S. enterprises, this report presents ten key priorities for successfully leveraging containers in production and at scale, within a DevOps context. These priorities will be the foundation for the EMA Top 3 awards presented to the outstanding vendors in each container management-related software category.

This report focuses on providing guidance that will help enable enterprises to transform into digital attackers by leveraging containers and DevOps to serve their customers faster, better, and cheaper on a continuous basis. 



Micro Focus Network Operations Management Suite Supports SDN and Network Virtualization Engineering and Operations

PUBLISHED: Mon, 12 Feb 2018 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Software-defined networking (SDN) is no longer hype. Enterprises are evaluating, testing, purchasing and deploying the technology today. SDN adds new network elements, new abstractions, new protocols, and new device relationships to data center networks. To ensure that enterprises succeed with SDN, network management tools must evolve to support these new architectures. 

Network fault and performance monitoring tools along with network configuration and change management (NCCM) tools have an important role to play in future SDN engineering and operations. Many of the network management challenges that SDN presents to enterprises are addressable by existing tools, as long as those tools evolve to work with SDN. This white paper explores how network management tools should adapt to SDN. It also explores how Micro Focus' Network Operations Management Suite is adapting to SDN and leveraging integrations within its core components, Network Automation and Network Node Manager, to offer enterprises a single state-of-the-art network management solution for their combined SDN, virtual and traditional networks.



Orchestrating Digital Workspaces: The Emerging Digital Transformation of End User Computing

PUBLISHED: Mon, 12 Feb 2018 00:00:00 +0000
AUTHOR: Steve Brasen

Emerging requirements to support workforce mobility and distributed software ecosystems are dramatically increasing the complexity of supporting end user computing. Digital workspaces offer the most effective approach to ensuring the reliable and secure delivery of applications, data, and other services to any device at any location while minimizing management efforts and related costs. This white paper is the first in a series providing survey-based research results identifying evolving end user management requirements and optimal solutions for transitioning to a digital workspace environment.



Orchestrating Digital Workspaces: The Evolving State of Endpoint Management

PUBLISHED: Mon, 12 Feb 2018 00:00:00 +0000
AUTHOR: Steve Brasen

Emerging requirements to support workforce mobility and distributed software ecosystems are dramatically increasing the complexity of supporting end user computing. Digital workspaces offer the most effective approach to ensuring the reliable and secure delivery of applications, data, and other services to any device at any location while minimizing management efforts and related costs. This white paper is the second in a series providing survey-based research results identifying evolving end user management requirements and optimal solutions for transitioning to a digital workspace environment.



Orchestrating Digital Workspaces: Step-by-Step Guide to Making the Vision a Reality

PUBLISHED: Mon, 12 Feb 2018 00:00:00 +0000
AUTHOR: Steve Brasen

Emerging requirements to support workforce mobility and distributed software ecosystems are dramatically increasing the complexity of supporting end user computing. Digital workspaces offer the most effective approach to ensuring the reliable and secure delivery of applications, data, and other services to any device at any location while minimizing management efforts and related costs. This white paper is the third in a series providing survey-based research results identifying evolving end user management requirements and optimal solutions for transitioning to a digital workspace environment.



Unshackle Your Network Team From Cost and Capacity Constraints With Network-as-a-Service Solution From Alcatel-Lucent Enterprise

PUBLISHED: Thu, 08 Feb 2018 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Network managers and engineers are mandated to support a broad set of new digital initiatives, but they must do so within the constraints of a limited budget and with minimal personnel. To meet the demands of the business, the network infrastructure team needs solutions that allow them to build and manage networks that are flexible, affordable, and easy to implement and manage.

This paper explores these challenges in depth and also reviews Alcatel-Lucent Enterprise’s new Network-as-a-Service solution, a suite of network hardware and management software that addresses all of these challenges. Enterprises can consume the entire suite of hardware and management software on a pay-as-you-go model with subscription fees based on actual network consumption or on an installed capacity.



Rise of the CDO and Strategic Data Governance: EMA CDO End-User Research Results Summary

PUBLISHED: Wed, 17 Jan 2018 00:00:00 +0000
AUTHOR: John Myers, Former EMA Analyst

Data-driven companies are pushing the envelope and disrupting how organizations view, value, and utilize information. Data-driven cultures make information the fuel for their business models and operations. They look at internal and external information sources as the keys to building competitive advantage in their markets, maintaining and expanding their influence with customers, and establishing stronger relationships with their partners.

As these firms seek ways to differentiate their offerings for new revenues, target their consumers to improve customer experience, and lower their operational costs to improve margins, they adopt new ways of managing and governing data in parallel.

The siloed approaches of data stewards and architects in the past were sufficient on individual projects or engagements, capable of crafting and implementing governance and management practices. However, data-driven organizations and data-focused applications require a more strategic approach. This approach needs to raise the visibility and importance of data governance and management to the correct levels for success within an enterprise. 

This strategic approach needs to focus data governance and management strategies on successful outcomes associated with data management tasks, such as accomplishing goals for the various line of business stakeholders within the organization, by spreading them throughout an enterprise. From the CxO suite, where business strategy based on information is set, to frontline employees who understand, touch, and utilize data every day, companies need to align and focus on how data impacts topline revenues and bottom-line profits.



Advanced Network Analytics: Applying Machine Learning and More to Network Engineering and Operations

PUBLISHED: Tue, 16 Jan 2018 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This EMA end-user research study examines how enterprises extract more value and insights from network data through the use of advanced analytics technology, including predictive analysis, machine learning, and more. Based on a survey of 200 IT professionals directly involved in network analytics initiatives, this report identifies technology choices, data collection strategies, project drivers, organizational impacts, and business and technology challenges. 



EMA Radar for Digital Threat Intelligence Management: Q4 2017

PUBLISHED: Wed, 10 Jan 2018 00:00:00 +0000
AUTHOR: David Monahan

Threat intelligence has been around in one form or another for many years. Only in the last few years did the information really become digestible for any but the largest organizations. Its most recent form evolved into platforms that collect and analyze information through various automated and manual means. The information is focused on delivering indicators of a valid threat against the company. Rather than terabytes of superfluous data, organizations that invest in the toolset can specify what types of information they are most interested in and begin collection.

Some vendors focus on specific types of infringement, like brand infringement or domain abuse. Others focus on data sources like social media or the dark web. The third group has a broader coverage, looking at many different sources, analyzing and correlating them, and delivering directed information on the infringement. As expected, greater or premium coverage often demands a premium price, so those looking into the solutions should evaluate the scope they really need instead of just what they want.

EMA is seeing a surge of M&A activity, as well as significant infusions of capital in the established companies. Only some of the companies in the space are profitable at this time, though the analysis points to a number of them crossing into profitability later in 2018.



Advanced Network Analytics: The Future of Network Engineering and Operations

PUBLISHED: Tue, 09 Jan 2018 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

As enterprises adopt new technologies to thrive in the digital economy, IT organizations must deliver high-performing and agile networks to support them. Yesterday’s network engineering and operations tools aren’t adequate for this new reality. Network teams need advanced analytics solutions that can glean more insight and value from network data and streamline and optimize networking tasks.

This whitepaper, based on a survey of 200 involved in advanced network analytics initiatives, offers insights from a forthcoming research report from Enterprise Management Associates (EMA), “Advanced Network Analytics: Applying Machine Learning and More to Network Engineering and Operations.”



EMA Radar for Workload Automation (WLA): Q4 2017

PUBLISHED: Mon, 11 Dec 2017 00:00:00 +0000
AUTHOR: Dan Twing

Hybrid cloud, DevOps, big data and digitalization are driving a need for more sophisticated workload automation, which underpins the consistent delivery of traditional and cutting edge workloads. Modern workloads require more sophistication; data is collected from a greater variety of sources, and the success or failure of job streams can be directly exposed to both business users and customers. Significant enhancements in workload automation (WLA) tools have been added in recent years to address these trends. This Enterprise Management Associates (EMA) RADAR report identifies the fourteen leading WLA platforms and empirically compares and grades them against a broad range of measurements to determine overall product strengths and cost efficiencies.

Evaluated solutions include:

1. Arcana
2. Arvato Systems
3. ASCI
4. BMC
5. CA Automic
6. Flux
7. HelpSystems
8. IBM
9. InfiniteDATA
10. MVP Software
11. SMA Solutions
12. Stonebranch
13. Tidal
14. Vinzant
 
Additionally, products that augment or enrich WLA solutions were covered in this report as well. These include:
 
1. Beta Systems
2. Digitate
3. SMA Ascern
4. Terma Software  



Data-Driven Security Tools: The Value of Network Security Policy Management Tools

PUBLISHED: Mon, 11 Dec 2017 00:00:00 +0000
AUTHOR: David Monahan

This report queried companies that use Network Security Policy Management (NSPM) tools and companies that do not in order to compare and contrast their security change management process, timeliness and efficacy. The evaluation considered whether there were any differences in their inherent risk profiles and if or how NSPM created improvements in security performance.

In fact, organizations leveraging NSPM demonstrated significant advantages in both IT operations (ITOps) and security operations (SecOps). Advantages included more consistent security policies, which led to fewer attack surfaces, shorter change approval and implementation processes, fewer change-related outages, more successful business continuity and disaster recovery testing, and more.

Participants coming from environments where NSPM was not used felt they had strong IT and security visibility, but had more significant issues with poorly implemented security policies, non-standardized policies, and failed cloud migrations for critical business applications. The NSPM group had a more realistic outlook.



Research Summary: Network Security Policy Management Tools - Tying Policies to Process, Visibility, Connectivity, and Migration

PUBLISHED: Mon, 11 Dec 2017 00:00:00 +0000
AUTHOR: David Monahan

This is a summary of the EMA research report, "Data-Driven Security Tools: The Value of Network Security Policy Management Tools", sponsored by AlgoSec.

Full Report Abstract
This report queried companies that use Network Security Policy Management (NSPM) tools and companies that do not in order to compare and contrast their security change management process, timeliness and efficacy. The evaluation considered whether there were any differences in their inherent risk profiles and if or how NSPM created improvements in security performance.

In fact, organizations leveraging NSPM demonstrated significant advantages in both IT operations (ITOps) and security operations (SecOps). Advantages included more consistent security policies, which led to fewer attack surfaces, shorter change approval and implementation processes, fewer change-related outages, more successful business continuity and disaster recovery testing, and more.

Participants coming from environments where NSPM was not used felt they had strong IT and security visibility, but had more significant issues with poorly implemented security policies, non-standardized policies, and failed cloud migrations for critical business applications. The NSPM group had a more realistic outlook.



Research Summary: The Value of Using Security Policy Orchestration and Automation to Improve Change Management and SecOps

PUBLISHED: Mon, 11 Dec 2017 00:00:00 +0000
AUTHOR: David Monahan

This is a summary of the EMA research report, "Data-Driven Security Tools: The Value of Network Security Policy Management Tools", sponsored by Firemon.

Full Report Abstract
This report queried companies that use Network Security Policy Management (NSPM) tools and companies that do not in order to compare and contrast their security change management process, timeliness and efficacy. The evaluation considered whether there were any differences in their inherent risk profiles and if or how NSPM created improvements in security performance.

In fact, organizations leveraging NSPM demonstrated significant advantages in both IT operations (ITOps) and security operations (SecOps). Advantages included more consistent security policies, which led to fewer attack surfaces, shorter change approval and implementation processes, fewer change-related outages, more successful business continuity and disaster recovery testing, and more.

Participants coming from environments where NSPM was not used felt they had strong IT and security visibility, but had more significant issues with poorly implemented security policies, non-standardized policies, and failed cloud migrations for critical business applications. The NSPM group had a more realistic outlook.



Report Summary - EMA Radar for Workload Automation (WLA): Q4 2017

PUBLISHED: Mon, 11 Dec 2017 00:00:00 +0000
AUTHOR: Dan Twing


Full Report Abstract
Hybrid cloud, DevOps, big data and digitalization are driving a need for more sophisticated workload automation, which underpins the consistent delivery of traditional and cutting edge workloads. Modern workloads require more sophistication; data is collected from a greater variety of sources, and the success or failure of job streams can be directly exposed to both business users and customers. Significant enhancements in workload automation (WLA) tools have been added in recent years to address these trends. This Enterprise Management Associates (EMA) RADAR report identifies the fourteen leading WLA platforms and empirically compares and grades them against a broad range of measurements to determine overall product strengths and cost efficiencies.

Evaluated solutions include:

1. Arcana
2. Arvato Systems
3. ASCI
4. BMC
5. CA Automic
6. Flux
7. HelpSystems
8. IBM
9. InfiniteDATA
10. MVP Software
11. SMA Solutions
12. Stonebranch
13. Tidal
14. Vinzant
 
Additionally, products that augment or enrich WLA solutions were covered in this report as well. These include:
 
1. Beta Systems
2. Digitate
3. SMA Ascern
4. Terma Software 



How SysSecOps Can Help Lower Costs, Improve Security, and Make Admins Look Like Heroes

PUBLISHED: Thu, 30 Nov 2017 00:00:00 +0000
AUTHOR: Paula Musich

Organizations rarely attempt to measure the ROI of the security tools they deploy to protect their information assets. The emergence of SysSecOps could change that as the concept takes hold in more organizations stretched thin by the shortage of skilled security and operations professionals. SysSecOps combines endpoint protection, security and operations functions to provide a common view across those disciplines of how the endpoint security posture affects the overall risk within the IT environment. It helps to break down the walls between different silos within the IT organization, which enables greater collaboration and a more streamlined approach to securing and assuring the availability and performance of a range of different endpoints. The ability to easily understand, in precise detail, what is actually running on the endpoint is key to achieving hard cost savings and soft cost savings. It is also essential to see how programs residing there are behaving. The growing crop of SysSecOps tools, such as Ziften's Zenith platform, allows IT organizations to discover unused assets and eliminate the costs associated with them, streamline help desk operations to better serve end users and improve their productivity, and improve vulnerability management to stay ahead of threats, especially costly ransomware.



Enterprise Automation Brings Confidence and Control to Managing File Transfers

PUBLISHED: Mon, 27 Nov 2017 00:00:00 +0000
AUTHOR: Dan Twing

Moving data in a coordinated and controlled fashion can be an elusive goal for many organizations. Digitalization of business is increasing the importance of moving data effectively. Legacy attempts to improve file transfers have created a patchwork of batch files, scripts, and use of file transfer tools that offer some improvement, but create silos of automation that are difficult and inefficient to maintain.

Companies need a consolidated and coordinated approach to automation. Workload Automation (WLA) tools bring many advantages to centralizing the management of file transfers. Enterprise WLA tools provide cross-platform visibility, permissions control, file security, SLA awareness, compliance reporting, and other best practices that benefit the management of file transfers. A WLA tool helps an organization learn to speak a common automation language and builds skills that reduce errors, speeds development, and removes repetitive, low-skilled work, which increases productivity and reliability in defining automated tasks. ASCI ActiveBatch one of the leading WLA tools, and includes comprehensive managed file transfer capabilities. Learn why EMA believes that enterprise clase WLA tools are the logical place to manage file transfers.



2017 Next-Generation Endpoint Security Vendor Landscape and Five-Year Market Forecast

PUBLISHED: Mon, 13 Nov 2017 00:00:00 +0000
AUTHOR: David Monahan

This is the second iteration of this report (the first was distributed in 2015). The vendor-related research focuses on solution providers that are supplying proactive next-generation endpoint security services covering prevention, detection, and response. EMA provided all identified participants the opportunity to participate in a vendor-answered questionnaire and interviews. EMA then combined that information with research efforts external to the providers to create company profiles and assess each vendor on their applicability to the space, as well as their market share by revenue and license volumes. Most of the vendors competing in this space emerged or refocused in the last few years, with only a few having competed in the market for more than five years.

As with any study, this study is only as good as its data inputs. This research identified 42 solution-provider candidates as participants. Of those companies, eleven vendors elected not to respond or share data. Within the remaining 31, some were unable to provide complete data due to company policies limiting some analysis, but efforts were made to fill in as many blanks as possible using publically-available information.

The NGES market is highly competitive. With a 2014/2015 annual growth rate over 100 percent and 2016-2017 shaping up similarly, NGES is pushing a five-year average annual growth rate of over 50 percent. 



Redefine Client Incident Remediation With Voyance by Nyansa

PUBLISHED: Thu, 28 Sep 2017 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This white paper examines the value of the Remediation Engine, a new capability of the Nyansa Voyance user performance management platform. The Remediation Engine leverages full-stack network analytics to provide a workflow for proactive prevention of user network problems. This solution should help network managers reduce the amount of time they spend troubleshooting and allow them to deliver a more consistent user experience to the enterprise. 



EMA Research Report: Enterprise Data Center Network Transformation

PUBLISHED: Tue, 26 Sep 2017 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Today's enterprises increasingly require data center networks that are more agile, higher performing, more resilient, and more automated. To meet these requirements, IT organizations are adopting new network technologies, including software-defined networks, network virtualization, network orchestration and automation software, disaggregated switches, and much more. This end-user research report is based on a survey of 200 IT professionals directly involved in data center network transformation projects. It identifies the technologies and strategies they use and the challenges that enterprises face with such transformation initiatives. It also identifies some emerging best practices. 



Leaders in Advanced IT Analytics (AIA): A Buyer's Guide for Investing in Innovation

PUBLISHED: Tue, 19 Sep 2017 00:00:00 +0000
AUTHOR: Dennis Drogseth

There may be no more critical arena of innovation for IT organizations in the digital age than advanced IT analytics (AIA)—most commonly called “operational analytics.” EMA has chosen a different label because the values of AIA, while often centered on operations, go far beyond classic IT operations in terms of the stakeholders supported.


This buyer’s guide is an industry-first effort to bring individualized attention to 13 vendors evaluated by EMA as leading innovators in AIA. Each vendor offering will be characterized in detail and mapped against a set of shopping cart criteria directed at everything from time to value and cloud-readiness to business impact and business alignment. This report is not about a footrace with winners and losers; rather it is a highly individualized look at 13 vendors that are already leading in AIA innovation—each with a distinctive footprint and any one of which might be the one best optimized to meet your needs and priorities.

 



EMA Radar for Storage Intelligence: Q4 2017

PUBLISHED: Sun, 17 Sep 2017 00:00:00 +0000
AUTHOR: Steve Brasen

No information technology (IT) infrastructure resource is as essential to ensuring business performance and productivity as storage. Processes for data access, distribution, and protection are directly impacted by the configurations of storage arrays, SAN fabrics, NAS systems, backup and disaster recover (BDR) devices, and hosted cloud storage solutions. Recognizing the importance of these resources but lacking visibility into their functional performance, most organizations overprovision storage solutions in order to ensure business requirements are continuously met. Storage Intelligence solutions provide key insights into the entire storage ecosystem, enabling informed decision making on improving service performance and reliability, the proactive identification of potential problems and identifying opportunities for reducing the cost of operations.  

In order to help organizations determine the most effective storage intelligence solution to meet their unique business requirements, Enterprise Management Associates (EMA) has identified the nine leading platforms and performed a side-by-side comparison to determine their product strengths and cost efficiencies. Evaluated solutions include: 
  • Aptare StorageConsole: Capacity Manager
  • HPE Nimble Infosight
  • IBM Spectrum Control Storage Insights
  • ioFABRIC Vicinity
  • NetApp OnCommand Insight
  • SolarWinds Storage Resource Monitor
  • Tintri Analytics
  • Virtual Instruments VirtualWisdom
  • Visual Storage Intelligence



Report Summary - EMA Radar for Storage Intelligence: Q4 2017

PUBLISHED: Sun, 17 Sep 2017 00:00:00 +0000
AUTHOR: Steve Brasen


Full Report Abstract
No information technology (IT) infrastructure resource is as essential to ensuring business performance and productivity as storage. Processes for data access, distribution, and protection are directly impacted by the configurations of storage arrays, SAN fabrics, NAS systems, backup and disaster recover (BDR) devices, and hosted cloud storage solutions. Recognizing the importance of these resources but lacking visibility into their functional performance, most organizations overprovision storage solutions in order to ensure business requirements are continuously met. Storage Intelligence solutions provide key insights into the entire storage ecosystem, enabling informed decision making on improving service performance and reliability, the proactive identification of potential problems and identifying opportunities for reducing the cost of operations.  

In order to help organizations determine the most effective storage intelligence solution to meet their unique business requirements, Enterprise Management Associates (EMA) has identified the nine leading platforms and performed a side-by-side comparison to determine their product strengths and cost efficiencies. Evaluated solutions include: 
  • Aptare StorageConsole: Capacity Manager
  • HPE Nimble Infosight
  • IBM Spectrum Control Storage Insights
  • ioFABRIC Vicinity
  • NetApp OnCommand Insight
  • SolarWinds Storage Resource Monitor
  • Tintri Analytics
  • Virtual Instruments VirtualWisdom
  • Visual Storage Intelligence



EMA Innovator Awards: VMworld 2017 - Top 3

PUBLISHED: Tue, 12 Sep 2017 00:00:00 +0000
AUTHOR: Torsten Volk

It’s All About the Business
Enterprise Management Associates (EMA) Innovators of VMworld 2017 allhave one thing in common. They align IT with the business by making apps and services faster, cheaper and easier deploy and manage. EMA Innovators can be startups with a compelling value proposition or they could be more established vendors with an interesting new release around VMworld.

DevOps Needs Business Driven IT
EMA research has shown that silos still are the key obstacles of cost effective and business-driven hybrid IT management. New megatrends such as DevOps and containers introduce additional pressure on the enterprise to break out of these management silos and implement a much more business-driven IT operations paradigm.



EMA Innovator Awards: Networking, First Half 2017

PUBLISHED: Tue, 22 Aug 2017 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

The EMA Innovator Awards recognize products and services that demonstrate true innovation in the IT industry. On a rolling basis, EMA analysts present these awards to vendors that have advanced their respective industries and solved pressing problems for their customers. 

This report recognizes three EMA Innovator Award winners that advanced the networking industry during the first half of 2017. The following pages explore how these award-winning products address the challenges that today’s network managers struggle with. 



Network Management Tool Consolidation Is Essential To Effective IT Operations

PUBLISHED: Thu, 10 Aug 2017 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Many network managers use a large and fragmented set of tools to monitor and troubleshoot their networks. As network complexity increases with the adoption of new technologies like cloud computing and the Internet of Things, network managers must modernize and consolidate their management systems. This paper offers evidence for why this is important and provides some guidance on how to proceed.



There's No Gas Cap on A Tesla: The New Requirements for Cloud Data Warehousing

PUBLISHED: Wed, 02 Aug 2017 00:00:00 +0000
AUTHOR: John Myers, Former EMA Analyst

Corporate expectations are different than they were ten or even five years ago. The promise of business intelligence and data warehousing has always been to provide business value through data consolidation and analysis. The reality of the market, however, is that traditional implementations of BI, analytics, and data warehousing platforms fall short. 

This is where cloud-based environments come into play. With more flexibility, centralized data access, and broader scalability, organizations can adopt a more agile approach to their data-driven analytics implementations through cloud-based adoption strategies. Because of this level of flexibility, organizations can leverage technology in a way that best meets their needs and not be held to the limits of technology. 



EMA Research Report: Integrating SecOps With Operations, Development, and ITSM in the Age of Cloud and Agile

PUBLISHED: Tue, 18 Jul 2017 00:00:00 +0000
AUTHOR: Dennis Drogseth

Although the term "SecOps" has been a focal point for industry discussion and debate over the last few years, it has only recently emerged as a reality. This research shows that the integration of security operations, fraud, and compliance with critical areas in IT is now delivering significant values while posing both technology and cultural/process challenges.

This report uniquely addresses SecOps initiatives in terms of role, team leadership, success rates, company size, vertical adoptions, and geography. It provides telling insights into technology priorities, process, and best practices and metrics for critical use cases--including integrated security/compliance for performance and availability management, change and configuration management, and IT asset management and audits. The report also addresses how cloud, agile, digital transformation, and mobile all impact SecOps directions.



Report Summary - Integrating SecOps With Operations, Development, and ITSM in the Age of Cloud and Agile

PUBLISHED: Tue, 18 Jul 2017 00:00:00 +0000
AUTHOR: Dennis Drogseth

This is a summary of the EMA research report, "Integrating SecOps With Operations, Development, and ITSM in the Age of Cloud and Agile."

Full Report Abstract
Although the term "SecOps" has been a focal point for industry discussion and debate over the last few years, it has only recently emerged as a reality. This research shows that the integration of security operations, fraud, and compliance with critical areas in IT is now delivering significant values while posing both technology and cultural/process challenges.

This report uniquely addresses SecOps initiatives in terms of role, team leadership, success rates, company size, vertical adoptions, and geography. It provides telling insights into technology priorities, process, and best practices and metrics for critical use cases--including integrated security/compliance for performance and availability management, change and configuration management, and IT asset management and audits. The report also addresses how cloud, agile, digital transformation, and mobile all impact SecOps directions.



Best Practices for Successful Digital Experience Management

PUBLISHED: Tue, 18 Jul 2017 00:00:00 +0000
AUTHOR: Dennis Drogseth

Expectations for digital user experience have never been higher, and the bar is constantly being raised by an ever-demanding, sophisticated audience of internal and external users. Simultaneously, the complexity involved in IT monitoring is skyrocketing with cloud technology and Agile development. To succeed, enterprises need a comprehensive digital experience management (DEM) solution that addresses the key use cases across IT and the business and enables the company to ensure an excellent user experience for every business-critical application in their portfolio. Accomplishing this is easier said than done. This paper reviews the principles and best practices to enable IT to survive this perfect storm where rising expectations meet escalating complexity.



A Strategic Guide to Application-Centric Infrastructure Performance Management

PUBLISHED: Fri, 07 Jul 2017 00:00:00 +0000
AUTHOR: Steve Brasen

Modern IT ecosystems have become incredibly complex.IT organizations need tools capable of helping them evolve from silo-focused to application-focused management techniques designed to transform groups of diverse technology silo experts into cross-functional application support teams. In this white paper, EMA identifies the characteristics of modern applications that make both application- and infrastructure-focused management capabilities essential elements of modern management tools portfolios. It also defines new tooling capabilities focusing on Application-centric Infrastructure Performance Management (App-centric IPM), a new approach to monitoring and managing the impact of infrastructure performance on application performance. Additionally highlighted is the role of App-centric IPM as complementary to traditional Application Performance Management (APM) toolsets in order to enable holistic visibility and comprehensive support for infrastructure elements that will dramatically improve application performance and availability.



State of File Collaboration Security - File Insecurity: the Final Data Leakage Frontier

PUBLISHED: Wed, 05 Jul 2017 00:00:00 +0000
AUTHOR: David Monahan

This Enterprise Management Associates (EMA) research report, "State of File Collaboration Security," offers insights into file data leakage risks and incidents, security process and control maturity, perceived cloud-based file platform threats, and anticipated investments that attempt to preempt file access and usage exposures. Sponsored by FinalCode, the research serves to provide IT professionals an understanding of where their organization sits on the file security spectrum, how policy and controls staff may need to consider existing and new file collaboration risks, and how organizations should move to close file data leakage gaps.



A Roadmap to Successful Network Operations With SolarWinds

PUBLISHED: Fri, 30 Jun 2017 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

With organizations embracing transformational technologies like mobility, the Internet of Things, and the cloud, enterprise network infrastructure requirements are evolving rapidly. In the face of this change, network infrastructure teams need to maximize the time they spend on planning, designing, implementing, and optimizing new network connectivity and services. To accomplish this, network managers must modernize the tools they use for monitoring and troubleshooting their networks. This paper offers a roadmap for network tool modernization and reviews two leading network management solutions from SolarWinds, Network Operations Manager and Network Automation Manager, both based on the SolarWinds Orion® Platform. 



EMA Top 3: Ten Priorities for Hybrid Cloud, Containers, and DevOps in 2017 - Enterprise Decision Guide

PUBLISHED: Thu, 29 Jun 2017 00:00:00 +0000
AUTHOR: Torsten Volk

Introduction
This Enterprise Management Associates (EMA) decision guide focuses on how enterprises should manage hybrid cloud, containers, and DevOps to provide their business with an optimal IT environment where innovation can be delivered in the most efficient and effective manner.

Why You Should Read this Research Report
IT and software development decision makers and influencers will learn the following:
  • Ten priorities for efficiently managing hybrid cloud, containers, and DevOps
  • Concrete EMA recommendations for effectively implementing these priorities
  • EMA Top Three Products to optimally implement each recommendation

Research Methodology
All research results in this report are based on EMA's survey of 260 randomly-selected North American enterprises with 500 or more employees across all industries. Clustering these survey results by theme led to our ten priorities. EMA analysts examined each of these priorities within the context of today's key challenges of leveraging containers, hybrid cloud, and machine learning to reach the optimal compromise between rapid software releases and reliability of IT operations.

Report Metrics
260 Enterprises surveyed
87% Using private or public cloud
10 Key trends identified

IN A NUTSHELL: 2017 TOP PRIORITIES
  • Control your hybrid cloud cost.
  • Enforce security and compliance.
  • Private cloud is coming back.
  • Plan for container management.
  • Demand single pane of glass monitoring.
  • Evaluate hyperconverged systems for your scale-out cloud. 
  • Focus on integration between cloud and data centers.
  • Push your developers toward server-less functions.
  • Bring automation and full visibility to your DevOps process. 
  • Evaluate machine learning for operations management.

What Are the EMA Top Three?
EMA's Top Three products were selected because they enable customers to address the ten key IT operations priorities in 2017 in a convincing and often innovative manner. Please regard this report as a guide to help IT influencers and decision makers in their project planning and vendor selection processes. It is not a feature-by-feature comparison of all included vendors. In certain cases, EMA included products that are still in a late beta or preview stage simply to recognize a vendor's excellent alignment with research results. On the other hand, you may miss more traditional products that did not make it into the report, simply because newcomers took their spot.



Report Summary - Next-Generation IT Service Management: Changing the Future of IT

PUBLISHED: Thu, 15 Jun 2017 00:00:00 +0000
AUTHOR: Dennis Drogseth

This is a summary of the EMA research report, "Next-Generation IT Service Management: Changing the Future of IT."

Full Report Abstract
While IT service management (ITSM) has too often been viewed by the industry as an area of reactive management with fading process efficiencies and legacy concerns, the truth couldn't be more different. As this research shows, in many organizations ITSM is becoming a hub of innovation, unifying IT across its many silos, promoting and measuring IT operational efficiencies, and consolidating insights critical for IT-to-business planning supportive of both IT and digital transformation. 

In this report, we examine ITSM from various perspectives--organizational role of respondents, company size and vertical, geographical differences, and success-related patterns of behavior. Targeted at IT executives and technical adopters across not only ITSM teams but also operations, development, and IT asset management (ITAM) teams as well as those in other related areas, this report shows what's really occurring with ITSM initiatives in both North America and Europe and provides a blueprint for how best to accelerate forward into a truly next-generation status.



Next-Generation IT Service Management: Changing the Future of IT

PUBLISHED: Wed, 14 Jun 2017 00:00:00 +0000
AUTHOR: Dennis Drogseth

While IT service management (ITSM) has too often been viewed by the industry as an area of reactive management with fading process efficiencies and legacy concerns, the truth couldn't be more different. As this research shows, in many organizations ITSM is becoming a hub of innovation, unifying IT across its many silos, promoting and measuring IT operational efficiencies, and consolidating insights critical for IT-to-business planning supportive of both IT and digital transformation. 

In this report, we examine ITSM from various perspectives--organizational role of respondents, company size and vertical, geographical differences, and success-related patterns of behavior. Targeted at IT executives and technical adopters across not only ITSM teams but also operations, development, and IT asset management (ITAM) teams as well as those in other related areas, this report shows what's really occurring with ITSM initiatives in both North America and Europe and provides a blueprint for how best to accelerate forward into a truly next-generation status.



Seven Rules for Big Data Analytics Deployment

PUBLISHED: Tue, 23 May 2017 00:00:00 +0000
AUTHOR: John Myers, Former EMA Analyst

The future of business intelligence (BI) for data-driven organizations will revolve around analytics using big data. Organizations that can use fine-grained information that either was not previously available or was not properly used will be prepared for new business models and the changing economy that data-driven strategies and culture empower. In contrast, organizations that only rely on "traditional" data sources such as the enterprise data warehouse or data marts will soon find themselves at a disadvantage to those that put insights based on big data into the hands of their business stakeholders. 

To successfully implement analytics and BI on big data, organizations need to understand the seven rules for big data analytics deployment.  Using these business and architectural guidelines, organizations can expand their big data environments from simply being "storage options" and avoid the risk of a "data swamp." EMA considers these seven rules essential to successful and effective projects using analytics on big data. 



DevOps/Continuous Delivery Tooling: Launchpad for the Digital Enterprise

PUBLISHED: Mon, 22 May 2017 00:00:00 +0000
AUTHOR: Julie Craig

Throughout the past decade, Enterprise Management Associates (EMA) researchers have continued to track the growth of Agile practices, the rise of cross-functional DevOps collaborations, and the impact of Continuous Delivery on business and IT. In most modern organizations, these three areas are inextricably intertwined.

This paper presents EMA's latest findings on these topics from a research survey conducted during the spring of 2017. The intent of the survey was to highlight the current state of software delivery and related tooling in today's companies. This paper summarizes the results, tracing the DevOps and Continuous Delivery practices and tools most relevant to managing the delivery of business services in 2017. 

Research on these topics is particularly critical at this point in time. EMA is actively tracking what has amounted to a revolution in business--and an accompanying revolution in software delivery--that has occurred over the past five years. Today's rapidly changing and fast-moving business climate is the prime mover for a vastly changed IT landscape. IT has evolved from being a cost center to a cost generator, as software has become the core around which modern businesses operate. 

Massive changes in the way revenue is generated, combined with increasingly direct and customer-centric service delivery, have created an environment of "institutionalized change." To be successful, business must be able to implement new ideas very quickly, and IT organizations bear the brunt of the work necessary to make this happen. This ìneed for speedî has driven a revolution in software delivery. Agile practices enable software to be delivered more frequently, in smaller increments, and at a faster pace. Developments in technology have enabled a new generation of componentized, massively distributed applications running on technologies that are radically different from those of the past. Container-based microservices, orchestration engines, and the most powerful and sophisticated software deployment engines in history--modern Release Automation products--have all contributed to the rise of Continuous Delivery. 

The cumulative result of these factors contributes to growing complexity and a pressing need to automate resource-intensive tasks. Yesterday's toolsets and support practices--in which tools relied heavily on human expertise and manual processes--are no longer viable. At the same time, designing, developing, deploying, and supporting complex modern application environments requires collaborative decision-making supported by a new level of cross-functional skills, knowledge, and judgment.

Surmounting these challenges to embrace the requirements of a new era requires changes to mindsets, skill sets, and tooling. This white paper encapsulates EMA's latest take on how this can best be done.



Report Summary - DevOps/Continuous Delivery Tooling: Launchpad for the Digital Enterprise

PUBLISHED: Mon, 22 May 2017 00:00:00 +0000
AUTHOR: Julie Craig


Full Report Abstract
Throughout the past decade, Enterprise Management Associates (EMA) researchers have continued to track the growth of Agile practices, the rise of cross-functional DevOps collaborations, and the impact of Continuous Delivery on business and IT. In most modern organizations, these three areas are inextricably intertwined.

This paper presents EMA's latest findings on these topics from a research survey conducted during the spring of 2017. The intent of the survey was to highlight the current state of software delivery and related tooling in today's companies. This paper summarizes the results, tracing the DevOps and Continuous Delivery practices and tools most relevant to managing the delivery of business services in 2017. 

Research on these topics is particularly critical at this point in time. EMA is actively tracking what has amounted to a revolution in business--and an accompanying revolution in software delivery--that has occurred over the past five years. Today's rapidly changing and fast-moving business climate is the prime mover for a vastly changed IT landscape. IT has evolved from being a cost center to a cost generator, as software has become the core around which modern businesses operate. 

Massive changes in the way revenue is generated, combined with increasingly direct and customer-centric service delivery, have created an environment of "institutionalized change." To be successful, business must be able to implement new ideas very quickly, and IT organizations bear the brunt of the work necessary to make this happen. This ìneed for speedî has driven a revolution in software delivery. Agile practices enable software to be delivered more frequently, in smaller increments, and at a faster pace. Developments in technology have enabled a new generation of componentized, massively distributed applications running on technologies that are radically different from those of the past. Container-based microservices, orchestration engines, and the most powerful and sophisticated software deployment engines in history--modern Release Automation products--have all contributed to the rise of Continuous Delivery. 

The cumulative result of these factors contributes to growing complexity and a pressing need to automate resource-intensive tasks. Yesterday's toolsets and support practices--in which tools relied heavily on human expertise and manual processes--are no longer viable. At the same time, designing, developing, deploying, and supporting complex modern application environments requires collaborative decision-making supported by a new level of cross-functional skills, knowledge, and judgment.

Surmounting these challenges to embrace the requirements of a new era requires changes to mindsets, skill sets, and tooling. This white paper encapsulates EMA's latest take on how this can best be done.



InfoBrief: A Day in the Life of a Cyber Security Pro

PUBLISHED: Wed, 17 May 2017 00:00:00 +0000
AUTHOR: David Monahan

The data indicates that alerting systems are not operating in a generally efficient manner. Many incidents are automatically misclassified as critical alerts. By itself this problem is unacceptable, but added to the fact that a large number of alerted incidents are actually false positives that should not have been generated in the first place, it is becoming easier to see why security teams feel stressed and overwhelmed. Because of the time needed to manually investigate each alert to determine whether it is really critical or a false positive, teams are falling behind on alerts--creating a huge backlog of unworked tickets. This is a strong reason why dwell time for breaches is over six months. Many organizations turn to ìtuningî systems to reduce generated alerts, leading to the scenario where real alerts are never generated due to improper tuning.

While larger teams could solve the problem, trained personnel are not available and this particular solution does not scale. It also does not address the root of the problem. Ultimately, this is a tools issue. The systems are not given enough context at alert creation to properly classify the incoming alerts and identify vulnerabilities.

Read more to understand the issues surrounding these problems. 



Cloud Analytics: Dispelling the Myths of Cloud Security

PUBLISHED: Wed, 10 May 2017 00:00:00 +0000
AUTHOR: Lyndsay Wise, Former EMA Analyst

A huge obstacle for organizations is the lack of outlets that break down the drivers and challenges for security requirements in cloud deployments. Recent EMA research highlights the struggle organizations face related to security considerations. That research can be leveraged to break down security challenges and overall perceptions related to cloud adoption and security needs. At the same time, many of the challenges faced are based on the fact that organizations rely solely on their data providers or internal IT infrastructures without developing a strong security strategy to ensure that data is secure whether at rest, in storage, or in transition. 



Report Summary - The Internet of Things and Enterprise Networks: Planning, Engineering, and Operational Strategies

PUBLISHED: Wed, 10 May 2017 00:00:00 +0000
AUTHOR: Shamus McGillicuddy


Full Report Abstract
This end-user research study examines how enterprise network infrastructure teams contribute to the Internet of Things (IoT) strategies at their organizations. It reveals the planning and engineering challenges they encounter and the architectural choices they make to deliver connectivity to IoT devices. The research also examines how network infrastructure teams manage, monitor, and troubleshoot IoT networks and, in some cases, the IoT devices themselves. Finally, the research examines some of the organizational impacts experienced by network teams when they implement IoT projects.



Embedded Analytics

PUBLISHED: Tue, 02 May 2017 00:00:00 +0000
AUTHOR: Lyndsay Wise, Former EMA Analyst

Organizations are constantly looking for better ways to gain value from their data assets. They adopt BI and analytics in hopes of understanding operations, increasing supply chain efficiencies, creating better sales processes, and enhancing customer experience. Unfortunately, many of these organizations fall short because they look at business intelligence and analytics access as a separate application from operations, creating silos and gaps into the performance of their business. Business users go about their daily tasks, have a question, and open up a different application to look at a premade dashboard (or create their own) through self-service access. Toggling between applications and not having an integrated way of accessing operational and analytical data creates time delays and overall inefficiencies. People may not get the answers they need or might spend more time looking for information instead of being able to act on it. This creates a disjointed approach to information visibility and business value.

What organizations need is a way to link analytical insights with operational processes to ensure that both are integrated. This level of tight integration creates a seamless view of what is happening within the company and takes advantage of opportunities in a proactive way. When analytics are embedded within operational and transactional applications, businesses no longer have to play guessing games and can gain visibility into what is happening within the organization on a regular basis. Managers and business users no longer have to search for the answers they need since those answers are provided as part of their daily tasks.



EMA Research Report: Data-Driven Security Unleashed: A Look Into the Tools That Drive Security

PUBLISHED: Tue, 02 May 2017 00:00:00 +0000
AUTHOR: David Monahan

The "Data-Driven Security Unleashed" report is the fourth iteration in the Data-Driven Security series. Each report uses core questions for trending demographics and technology uses, but each also has its own unique focus. "Data-Driven Security," the first report (released in 2012), asked about the tools and data collection preferences for improving security. EMA released "The Evolution of Data-Driven Security" in 2014 as the second iteration. Beginning in 2015, the report began asking more questions about key drivers and value. "Data-Driven Security Unleashed" also adapted to the marketspace by replacing some of the previous technologies with emerging or impactful solutions.

EMA used the collected data to paint the picture of perceived most valuable tools and their use cases, as well as key drivers to adoption and the frustrations users experience. During the course of the research, EMA substantiated that insufficient staff is a problem that is only getting worse. This is not due to budget pressures as often as it is the lack of skilled or qualified personnel available in the market. In 2015, 68 percent of respondents indicated their organizations were experiencing impacts from staffing shortages. That number rose to 76 percent in 2016. While 35 percent of organizations are hiring less skilled/qualified personnel and training them to meet their needs (up five points from the previous report), 21 percent say they just cannot find personnel at all (up seven points from 2015). However, though staffing issues were the primary frustration within IT security, respondents reinforced the idea that meeting compliance requirements was detracting from making real security improvement was introduced, along with the recognition that organizations' lack of repeatable, saleable processes is also a major hindrance. Lastly, though organizations did not complain about false positives to the same level as they did 2015 and early 2016, they indicated that it is difficult to prioritize remediation of threats and exposures. These changes in focus help vendors understand where improvements were made and where they need to continue.

Some of the top use cases for security technology were enhancing breach/compromise prevention; detection and/or response; malware prevention, detection, and/or removal; identifying malicious threat actor activities and data exfiltration; and providing highly actionable intelligence/context for incident prioritization. It is clear from the research that teams are looking for improvements at the beginning of the cyber kill chain. Reducing dwell time for attackers has become paramount. 

2014 and 2015 battered confidence in security's ability to detect incidents before becoming a significant impact. Confidence dropped from 31 to 21 percent of respondents being only "somewhat confident" into "highly doubtful" of detecting a security issue before it made a significant impact. However, advances in technology changed the previous four-year trends in these areas. As of 2016, 48 percent of respondents were confident that they could detect an incident prior to it becoming a significant impact. This is at least partly due to the fact that more companies are creating security baselines for their environments. As a result, companies feel more confident about their ability to monitor and prioritize threats to their high-priority assets and detect breaches before they create a significant impact.

The largest change in the report for 2016 was the inclusion of network security policy management as a technology. Though vendors in this space have existed for as many as 12 years, the growing complexity and span of networks (combined with the need for centralized security policy implementation and visibility) gave this category a huge introduction to the report. 53 percent of organizations said they were using a tool of this type, making it the most widely used solution in the report. It also scored at second place for value based on total cost of ownership.

The "Data-Driven Security Unleashed" report is a guide to market perceptions about the strengths of various tools and weaknesses from security and IT personnel, as well as individual contributors through the management ranks.



The Internet of Things and Enterprise Networks: Planning, Engineering, and Operational Strategies

PUBLISHED: Wed, 26 Apr 2017 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This end-user research study examines how enterprise network infrastructure teams contribute to the Internet of Things (IoT) strategies at their organizations. It reveals the planning and engineering challenges they encounter and the architectural choices they make to deliver connectivity to IoT devices. The research also examines how network infrastructure teams manage, monitor, and troubleshoot IoT networks and, in some cases, the IoT devices themselves. Finally, the research examines some of the organizational impacts experienced by network teams when they implement IoT projects.



Data-Driven Distribution: Lean Warehouse Operations at Candy.com with iCharts

PUBLISHED: Mon, 17 Apr 2017 00:00:00 +0000
AUTHOR: John Myers, Former EMA Analyst

This ENTERPRISE MANAGEMENT ASSOCIATES (EMA) case study profiles the implementation of iCharts for NetSuite by Candy.com. The iCharts for NetSuite implementation brings significant operational and analytical improvements for the Candy.com IT and operational staff.
iCharts provides a cloud-based business intelligence and analytics solution, which enables organizations with NetSuite as their operational platform (ERP, SCM, etc.) to drive improved operational and financial outcomes. Developed with nimble, data-driven organizations in mind, the iCharts for NetSuite solution leverages cloud implementation strengths and self-service configuration properties to speed time to implementation for organizations across a spectrum of industries.

With over 150 brands available, Candy.com sells every type of candy and is increasing its business-to-business fulfillment and distribution offerings.

Approximately 70% of Candy.com’s business model is based on direct-to-consumer sales. The remaining revenue comes from business-to-business and whole suppliers.



The Evolution of NCCM Platforms in the Era of SDN and Network Virtualization

PUBLISHED: Mon, 17 Apr 2017 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Software-defined networking (SDN) is not hype. Enterprises are testing, evaluating, and deploying the technology today. SDN adds new network elements, new abstractions, new protocols, and new device relationships to data center networks. To ensure that enterprises succeed with SDN, network management tools must evolve to support these new architectures.  
Network configuration and change management (NCCM) tools have an important role to play in future SDN operations. Many of the network management and operations challenges that SDN presents to enterprises are addressable by NCCM platforms, as long as those platforms evolve to work with SDN. SDN makes networks much more dynamic and automated. As enterprises use SDN programmability to rapidly provision and deprovision network services for applications, their networks will be constantly changing. While SDN automates many aspects of networking, enterprises will still need a tool to manage and audit the configurations of SDN architecture. A traditional NCCM tool is best positioned to meet this requirement, but NCCM must evolve to support these new architectures. This white paper explores how NCCM tools should adapt to SDN. It also explores how HP Software’s NCCM solution, HP Network Automation (NA), is adapting to SDN and leveraging integrations with other HP management tools to offer enterprises state-of-the-art network operations options for their SDN endeavors. 



Accelerate Cloud Transformation, Lower Cloud OPEX, and Increase Business Agility Through Blueprint-driven Cloud Automation

PUBLISHED: Wed, 05 Apr 2017 00:00:00 +0000
AUTHOR: Torsten Volk

Business today depends on the agility and speed of IT. Once it became clear that the corporate IT department was not able to accommodate the hunger for rapidly-provisioned application environments, business developers and managers looked for a pragmatic solution to "resolve just this one more bottleneck." Public cloud providers like Amazon Web Services and Microsoft Azure were quick to jump in and provide the infrastructure, services, and application templates needed for the business to quench its thirst for the swift provisioning and teardown of applications even as hybrid IT architectures started to see increased demand. Due to the convenience factor, more and more applications gradually moved into a de-facto production state. As developers created many of these environments, release cycles were quick and informal. Shadow IT was born.



2017 EMA Vendors to Watch: Security & Risk Management

PUBLISHED: Tue, 28 Mar 2017 00:00:00 +0000
AUTHOR: David Monahan

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2017 EMA Vendors to Watch in the Security & Risk Management field, including CyberGRX.

Additional vendors will be added to this document throughout the year.



Workload Automation:The Business Process Integration Hub Supporting Digital Transformation

PUBLISHED: Mon, 27 Mar 2017 00:00:00 +0000
AUTHOR: Dan Twing

Information technology (IT) and business have a long and interesting relationship. IT impacted science and business differently in its early years. While science accelerated with growing compute power; in business, IT initially automated existing manual business processes but did not really change the way work was done. As IT advanced, its impact on improving business outcomes increased, which created entirely new ways for business to get things done. The advent of the Internet created a big leap forward in changing business operations and how businesses interact with customers. Recent emerging IT capabilities are creating even greater changes; a digital transformation of business. Entire industries were disrupted and IT is now a significant business differentiator.
 
Even more significant than the changes in business processes enabled by IT is how consumers adopt technology in their daily lives. WiFi connectivity is like oxygen to modern consumers, and personal and business interactions with companies changed radically. Customers have high expectations of digital service and convenience. They want to be surprised and delighted by new digital ways to interact. 

WLA is todayís business process integration hub and a central key for ultimate IT efficiency and effectiveness. This white paper is based on the Enterprise Management Associates (EMA) WLA research conducted in December of 2016, "Issues and Priorities in Modern Workload Automation: Supporting Analytics, Continuous Delivery, and Digital Transformation," and will explore how organizations of any size and vertical can benefit from recognizing the importance of WLA software in supporting digital transformation. 



User, Customer, and Digital Experience: Where Service and Business Performance Come Together

PUBLISHED: Tue, 14 Mar 2017 00:00:00 +0000
AUTHOR: Dennis Drogseth

This is the third report in EMA's unique exploration of end-user experience management spanning eight years, from 2008 to 2017. While many trends remain consistent, there are also many differences in 2017 that reflect a growing interest in cloud and cloud-related technologies, APIs, microservices, and an increasingly complex and dynamic infrastructure environment. Trends such as agile and DevOps have also affected the landscape with some similar requirements for dynamic currency and shared digital, end-user, and customer experience management insights between development and operations teams, including IT service management (ITSM) teams. And finally, the move to digital transformation is escalating the need for more effective, diverse, and well-metricized capabilities for assessing application performance, end-user productivity, business process impacts, and customer and partner interactions across the extended enterprise.



Report Summary - User, Customer, and Digital Experience: Where Service and Business Performance Come Together

PUBLISHED: Tue, 14 Mar 2017 00:00:00 +0000
AUTHOR: Dennis Drogseth


Full Report Abstract
This is the third report in EMA's unique exploration of end-user experience management spanning eight years, from 2008 to 2017. While many trends remain consistent, there are also many differences in 2017 that reflect a growing interest in cloud and cloud-related technologies, APIs, microservices, and an increasingly complex and dynamic infrastructure environment. Trends such as agile and DevOps have also affected the landscape with some similar requirements for dynamic currency and shared digital, end-user, and customer experience management insights between development and operations teams, including IT service management (ITSM) teams. And finally, the move to digital transformation is escalating the need for more effective, diverse, and well-metricized capabilities for assessing application performance, end-user productivity, business process impacts, and customer and partner interactions across the extended enterprise.



Powering SQL on Hadoop: Evaluation of TPC-DS Query Benchmark Using Hadoop

PUBLISHED: Tue, 14 Mar 2017 00:00:00 +0000
AUTHOR: John Myers, Former EMA Analyst

EMA big data research conducted regularly from 2012-2016 shows that organizations implementing Hadoop as part of their data management environments are moving from simple exploratory use cases to complex workload-driven analytics use cases. These organizations are working for the implementation of mission-critical business goals and workloads in environments that utilize Hadoop. According to EMA panel respondents, the most commonly implemented use cases are market basket analysis, social brand management analysis, fraud analysis and risk assessment, geospatial grouping, and relationship analysis. All of these projects require access to speed of response and many different groups across the organization.

These advanced workloads are SQL-intensive, requiring a full range of current ANSI SQL query support--not just a subset. In addition, many workloads must support the type of low-latency response business stakeholders require. Finally, these platforms need to support a level of concurrent users who will use these environments. When analytical applications gain adoption, their use becomes widespread and the underlying data management platform needs to support users while providing an acceptable level of performance.

An effective SQL on Hadoop environment must support advanced ANSI SQL versions such as SQL99 and SQL2003 to effectively maintain analytical and business intelligence query workloads. This is essential for business users who are loath to make adjustments from the queries used currently. Full SQL support is also critical when an enterprise plans to utilize data analysis and data visualization tools which generate their own SQL in ways that the data consumer and IT technologies do not fully control.



Application Performance Management (APM) in the Digital Enterprise

PUBLISHED: Tue, 28 Feb 2017 00:00:00 +0000
AUTHOR: Rick Sturm

"Application Performance Management (APM) in the Digital Enterprise" enables IT professionals to be more successful in managing their company's applications. It explores the fundamentals of application management, examines how the latest technological trends impact application management, and provides best practices for responding to these changes. 

The recent surge in the use of containers as a way to simplify management and deploy applications has created new challenges, and the convergence of containerization, cloud, mobile, virtualization, analytics, and automation is reshaping the requirements for application management.

This book serves as a guide for understanding these dramatic changes and how they impact the management of applications, showing how to create a management strategy, define the underlying processes and standards, and how to select the appropriate tools to enable management processes.

• Offers a complete framework for implementing effective application management using clear tips and solutions for those responsible for application management
• Draws upon primary research to give technologists a current understanding of the latest technologies and processes needed to more effectively manage large-scale applications
• Includes real-world case studies and business justifications that support application management investments

Purchase the book now: http://amzn.to/2lJG73a



The End of Point Solutions: Modern NetOps Requires Pervasive and Integrated Network Monitoring

PUBLISHED: Fri, 10 Feb 2017 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Network operations teams typically rely on a fragmented set of monitoring and troubleshooting tools, a situation that leads to ineffective management and network instability. IT organizations must adopt a new tool strategy that emphasizes integration, consolidation, and advanced analytics including big data. This strategy should not only focus on improved network operations. Given that network data can provide insight into security operations and business operations as well, network managers should explore how a new tool strategy can contribute to their IT organization as a whole and the business it serves. 



Making Sense of Big Data: A Day in the Life of an Enterprise Architect

PUBLISHED: Thu, 02 Feb 2017 00:00:00 +0000
AUTHOR: John Myers, Former EMA Analyst

Enterprise architects use a combination of experience, expertise, and vision to provide guidance and facilities to their organizationís technical infrastructure. Enterprise architects take into account business requirements and technical capabilities to provide the vision for an organization's future. These future strategies need to mesh with existing technical infrastructure for future development to be attainable.

The life of an enterprise architect is becoming busy and difficult. Before the era of big data, the enterprise architect "only" had to worry about the data and systems within their own data center. However, over the past decade there were revolutionary changes to the way information is used by businesses and how data management platforms support the information available from modern data sources.   

Cloud broke down the boundaries of enterprise data centers, with applications housed and data created outside the "four walls" of an organization. This introduced a host of complexities for enterprise architects focused on security, privacy, and control. Mobile influences continued to push data outside the data center. Maintaining data flows to each of those data access points, often as tablets or mobile phones, introduced additional troubles. Incoming data from mobile devices brought new data formats and a flood of information to the enterprise architect. 

These alterations in the formats and locations of systems and data created massive change for data-driven organizations who want to develop competitive advantage. That advantage may come in the form of new data sources such as device sensor logs, social media streams, and mobile device geolocation information; create new projects to take advantage of these new data sources; and establish environments with diverse data management platforms to support these efforts.



The Promise and Risk of the Industrial Internet of Things

PUBLISHED: Wed, 01 Feb 2017 00:00:00 +0000
AUTHOR: David Monahan

Speaking in front of an audience of 300 security specialists at a conference last year, the head of the Department of Homeland Securityís Industrial Control Systems Cyber Response team (ICS-CERT) made a dire pronouncement: the department saw an increase in attacks on industrial control systems in 2015, and he was "dismayed" by the accessibility of some of the networks. To say that many people in that audience (and those who would follow the coverage) were equally dismayed at how to handle the paradox that gave birth to this problem would be an understatement. 

The convergence of information technology and industrial technology supplies analytic applications with massive amounts of industrial data, resulting in streamlined operations, improved safety, predictive maintenance, and optimized processes. However, this convergence is occurring in an environment that was never designed to be accessible from the outside world. Security strategy for operational technology (OT) was developed decades ago, under the assumption that restricting physical access to industrial control systems and networks was enough to protect them. The simple truth is that OT grew independent of IT, with no intention to integrate the two. Over time, the reliance on physical protection approaches proved to be short-sighted and insufficient due to the integration of business and industrial systems, and the expansion of remote management. For manufacturing, transportation, and critical infrastructure, this reliance is creating enormous risks with potentially catastrophic outcomes. 



The Business Benefits of Aviatrix Hybrid Cloud Networking

PUBLISHED: Thu, 19 Jan 2017 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This paper explores the challenges that enterprise organizations face when building networks to support hybrid cloud and multi-cloud architectures. It also reviews an enterprise cloud-defined networking solution from Aviatrix that helps solves these challenges.
Leveraging in-depth interviews with Aviatrix customers, this paper identifies the use cases enterprises can pursue with this networking solution, and it quantifies the cost savings and business benefits that can be realized with the cloud-defined networking solution. IT organizations that are considering Aviatrix's cloud-defined networking solution can use this paper as a reference guide for estimating the potential business value of a successful implementation of the Aviatrix network solution.



Report Summary Prepared for HPE - Charting the Expanding Horizons of Big Data

PUBLISHED: Thu, 19 Jan 2017 00:00:00 +0000
AUTHOR: John Myers, Former EMA Analyst

This is a summary of the EMA/9sight research report, "Charting the Expanding Horizons of Big Data" prepared for HPE.

Full Report Abstract
Since its inception, the concept of "big data" has meant many things to many people. If you are a fan of the Apache Hadoop ecosystem, big data is the raison d'etre for your Hadoop environment and the sprawling zoological lexicon upon which that ecosystem is built and continues to evolve. If you are a devotee of multi-structured data such as JSON, XML, etc, your definition of big data revolves around how relational data management is not well-suited for the modern data architecture of event-based processing and the Internet of Things. And so on and so forth…

As it was explored since the inaugural EMA/9sight survey in 2012, big data is both a way to look at new sources of data and how organizations place that information under "new management." Big data attracted a wide range of application innovators, as well as many protesters against the dominance of relational databases and data warehouses. The EMA/9sight surveys use a deliberately broad definition of big data to inspire end users to think beyond the box of limiting definitions. This will let them see how a larger world of traditional data sources, data management, and processing can be interwoven with the new era. As was established in three (3) previous studies in 2012, 2013, and 2014/2015, big data offers a wide range of possibilities. The 2016 EMA/9sight Big Data End-user Survey continues to look at that range of possibilities for big data definitions, implementations, and technologies. 



Report Summary Prepared for Statistica - Charting the Expanding Horizons of Big Data

PUBLISHED: Wed, 18 Jan 2017 00:00:00 +0000
AUTHOR: John Myers, Former EMA Analyst

This is a summary of the EMA/9sight research report, "Charting the Expanding Horizons of Big Data" prepared for Statistica.

Full Report Abstract
Since its inception, the concept of "big data" has meant many things to many people. If you are a fan of the Apache Hadoop ecosystem, big data is the raison d'etre for your Hadoop environment and the sprawling zoological lexicon upon which that ecosystem is built and continues to evolve. If you are a devotee of multi-structured data such as JSON, XML, etc, your definition of big data revolves around how relational data management is not well-suited for the modern data architecture of event-based processing and the Internet of Things. And so on and so forth…

As it was explored since the inaugural EMA/9sight survey in 2012, big data is both a way to look at new sources of data and how organizations place that information under "new management." Big data attracted a wide range of application innovators, as well as many protesters against the dominance of relational databases and data warehouses. The EMA/9sight surveys use a deliberately broad definition of big data to inspire end users to think beyond the box of limiting definitions. This will let them see how a larger world of traditional data sources, data management, and processing can be interwoven with the new era. As was established in three (3) previous studies in 2012, 2013, and 2014/2015, big data offers a wide range of possibilities. The 2016 EMA/9sight Big Data End-user Survey continues to look at that range of possibilities for big data definitions, implementations, and technologies. 



Nuix Insight Adaptive Security Brings Context Visibility and Deception to Protect Endpoints

PUBLISHED: Tue, 17 Jan 2017 00:00:00 +0000
AUTHOR: David Monahan

When hackers disabled systems and dumped unreleased films, unfinished movie scripts, private emails, salary figures, and tens of thousands of employee social security numbers onto public file sharing sites in December 2014, Sony Pictures became an embodiment of a situation that seemed straight out of one of its movies. While other major corporations faced high-profile attacks, the depth and breadth of the Sony hack, commentators said, would finally force corporations to take a hard look at their own security protocols and layers of protection (or lack thereof). 

Still, daily, there’s another story about attackers stealing credentials and gaining access to everything from sensitive customer data to corporate documents, even to the email accounts of public figures, as we saw with the 2016 U.S. presidential campaign.

What these attacks unequivocally demonstrated is just how exposed our networked society is. They are forcing organizations to confront the reality that we are now in a state of continuous compromise when it comes to cyberattacks. 

Every piece of equipment in the enterprise seems to be vulnerable to cyberattack. The commercialization of the Dark Web provides hackers with a diverse toolkit and evolving tactics, allowing them to gain access to everything from critical systems to BYOD devices and IoT-enabled office equipment. To address this, security architectures can no longer rely on predefined rules and parameters; they must be redesigned to read and react to contextual signals. Robust endpoint security should aim not only to physically protect devices, but act as a digital sleuth and lend clear, actionable data to detect intrusions and insight to prevent similar types of attacks. Organizations that take an adaptive approach to designing security architectures will be equipped to deal with evolving cyber threats.



Report Summary - Orchestrating Digital Workspaces

PUBLISHED: Mon, 16 Jan 2017 00:00:00 +0000
AUTHOR: Steve Brasen

This is the summary of the EMA research report, "Orchestrating Digital Workspaces."


Full Report Abstract
Expanding requirements for workforce mobility, heterogeneous device support, and distributed software ecosystems have challenged organizations to provide secure and reliable IT resources using traditional endpoint management processes. To empower more technology-reliant workforces, organizations must transition distributed desktop and mobile devices user environments to cloud-hosted software aggregation services. These "digital workspaces" enable standardized business work environments that are fully customizable, easy to maintain, secure, and accessible from any device at any location at any time. While many IT managers recognize the value of a digital workspace approach to endpoint management, most are unaware of the critical solutions and implementation tasks that must be performed to enable such a platform. Leveraging results from survey based primary research along with industry established best practices , EMA has developed a five-step maturity model providing prescriptive guidance on the most pragmatic method for transitioning from a traditional distributed desktop environment to user-focused digital workspaces.



EMA Research Report: Orchestrating Digital Workspaces

PUBLISHED: Tue, 10 Jan 2017 00:00:00 +0000
AUTHOR: Steve Brasen

Expanding requirements for workforce mobility, heterogeneous device support, and distributed software ecosystems have challenged organizations to provide secure and reliable IT resources using traditional endpoint management processes. To empower more technology-reliant workforces, organizations must transition distributed desktop and mobile devices user environments to cloud-hosted software aggregation services. These “digital workspaces” enable standardized business work environments that are fully customizable, easy to maintain, secure, and accessible from any device at any location at any time. While many IT managers recognize the value of a digital workspace approach to endpoint management, most are unaware of the critical solutions and implementation tasks that must be performed to enable such a platform. Leveraging results from survey based primary research along with industry established best practices , EMA has developed a five-step maturity model providing prescriptive guidance on the most pragmatic method for transitioning from a traditional distributed desktop environment to user-focused digital workspaces.



Report Summary Prepared for IBM - Charting the Expanding Horizons of Big Data

PUBLISHED: Thu, 05 Jan 2017 00:00:00 +0000
AUTHOR: John Myers, Former EMA Analyst

This is a summary of the EMA/9sight research report, "Charting the Expanding Horizons of Big Data" prepared for IBM.

Full Report Abstract
Since its inception, the concept of "big data" has meant many things to many people. If you are a fan of the Apache Hadoop ecosystem, big data is the raison d'etre for your Hadoop environment and the sprawling zoological lexicon upon which that ecosystem is built and continues to evolve. If you are a devotee of multi-structured data such as JSON, XML, etc, your definition of big data revolves around how relational data management is not well-suited for the modern data architecture of event-based processing and the Internet of Things. And so on and so forth…

As it was explored since the inaugural EMA/9sight survey in 2012, big data is both a way to look at new sources of data and how organizations place that information under "new management." Big data attracted a wide range of application innovators, as well as many protesters against the dominance of relational databases and data warehouses. The EMA/9sight surveys use a deliberately broad definition of big data to inspire end users to think beyond the box of limiting definitions. This will let them see how a larger world of traditional data sources, data management, and processing can be interwoven with the new era. As was established in three (3) previous studies in 2012, 2013, and 2014/2015, big data offers a wide range of possibilities. The 2016 EMA/9sight Big Data End-user Survey continues to look at that range of possibilities for big data definitions, implementations, and technologies. 



Report Summary - Issues and Priorities in Modern Workload: Automation Supporting Analytics, Continuous Delivery, and Digital Transformation

PUBLISHED: Wed, 21 Dec 2016 00:00:00 +0000
AUTHOR: Dan Twing


Full Report Summary
Modern IT means multiple cloud environments, big data, advanced analytics, and an increased rate of change to existing and new applications. More workloads are focused on collecting a variety of data types. All that data must be moved, stored in big data environments, and processed through analytics tools. The digital transformation that is overtaking enterprises in all industries is further complicating the task of managing the changing workload landscape. While workload automation is a mature space, it underwent significant enhancements since this study was done in 2013. WLA vendors and users had to address all of the changes imposed on IT operations. Workload automation may not have the cache of virtualization, software-defined networking, or containers, but it remains a foundational element to well-controlled IT operations. 

This research updates many of the data points collected in the 2013 "Workload Automation in an Era of Cloud, Analytics, Enterprise Mobility, DevOps, and Big Data" research, and adds new measures for recent innovations. The 2013 study was conducted with 176 workload professionals and IT leaders in North America. This year's study was expanded to 228 respondents, including 132 North American and 96 European workload professionals, IT leaders, and some business users involved in using dashboards to monitor their workloads. With a substantial number of questions asked in both studies, trends are examined from 2013 to 2016.



Issues and Priorities in Modern Workload Automation Supporting Analytics, Continuous Delivery, and Digital Transformation

PUBLISHED: Wed, 21 Dec 2016 00:00:00 +0000
AUTHOR: Dan Twing

Modern IT means multiple cloud environments, big data, advanced analytics, and an increased rate of change to existing and new applications. More workloads are focused on collecting a variety of data types. All that data must be moved, stored in big data environments, and processed through analytics tools. The digital transformation that is overtaking enterprises in all industries is further complicating the task of managing the changing workload landscape. While workload automation is a mature space, it underwent significant enhancements since this study was done in 2013. WLA vendors and users had to address all of the changes imposed on IT operations. Workload automation may not have the cache of virtualization, software-defined networking, or containers, but it remains a foundational element to well-controlled IT operations. 

This research updates many of the data points collected in the 2013 "Workload Automation in an Era of Cloud, Analytics, Enterprise Mobility, DevOps, and Big Data" research, and adds new measures for recent innovations. The 2013 study was conducted with 176 workload professionals and IT leaders in North America. This year's study was expanded to 228 respondents, including 132 North American and 96 European workload professionals, IT leaders, and some business users involved in using dashboards to monitor their workloads. With a substantial number of questions asked in both studies, trends are examined from 2013 to 2016.



Report Summary - Charting the Expanding Horizons of Big Data

PUBLISHED: Tue, 29 Nov 2016 00:00:00 +0000
AUTHOR: John Myers, Former EMA Analyst

This is a summary of the EMA/9sight research report, "Charting the Expanding Horizons of Big Data."

Full Report Abstract
Since its inception, the concept of "big data" has meant many things to many people. If you are a fan of the Apache Hadoop ecosystem, big data is the raison d'etre for your Hadoop environment and the sprawling zoological lexicon upon which that ecosystem is built and continues to evolve. If you are a devotee of multi-structured data such as JSON, XML, etc, your definition of big data revolves around how relational data management is not well-suited for the modern data architecture of event-based processing and the Internet of Things. And so on and so forth…

As it was explored since the inaugural EMA/9sight survey in 2012, big data is both a way to look at new sources of data and how organizations place that information under "new management." Big data attracted a wide range of application innovators, as well as many protesters against the dominance of relational databases and data warehouses. The EMA/9sight surveys use a deliberately broad definition of big data to inspire end users to think beyond the box of limiting definitions. This will let them see how a larger world of traditional data sources, data management, and processing can be interwoven with the new era. As was established in three (3) previous studies in 2012, 2013, and 2014/2015, big data offers a wide range of possibilities. The 2016 EMA/9sight Big Data End-user Survey continues to look at that range of possibilities for big data definitions, implementations, and technologies. 



Report Summary Prepared for Teradata - Charting the Expanding Horizons of Big Data

PUBLISHED: Tue, 29 Nov 2016 00:00:00 +0000
AUTHOR: John Myers, Former EMA Analyst

This is a summary of the EMA/9sight research report, "Charting the Expanding Horizons of Big Data" prepared for Teradata.

Full Report Abstract
Since its inception, the concept of "big data" has meant many things to many people. If you are a fan of the Apache Hadoop ecosystem, big data is the raison d'etre for your Hadoop environment and the sprawling zoological lexicon upon which that ecosystem is built and continues to evolve. If you are a devotee of multi-structured data such as JSON, XML, etc, your definition of big data revolves around how relational data management is not well-suited for the modern data architecture of event-based processing and the Internet of Things. And so on and so forth…

As it was explored since the inaugural EMA/9sight survey in 2012, big data is both a way to look at new sources of data and how organizations place that information under "new management." Big data attracted a wide range of application innovators, as well as many protesters against the dominance of relational databases and data warehouses. The EMA/9sight surveys use a deliberately broad definition of big data to inspire end users to think beyond the box of limiting definitions. This will let them see how a larger world of traditional data sources, data management, and processing can be interwoven with the new era. As was established in three (3) previous studies in 2012, 2013, and 2014/2015, big data offers a wide range of possibilities. The 2016 EMA/9sight Big Data End-user Survey continues to look at that range of possibilities for big data definitions, implementations, and technologies. 



Riverbed SteelCentral AppResponse 11 Enables Converged Network and Application Operations

PUBLISHED: Tue, 29 Nov 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

IT organizations have ceased treating network infrastructure as utilitarian plumbing. In this digital age, network and application managers know that as the foundational element of application delivery, the network must be monitored and optimized for application performance. The network is also an invaluable source of data for insight into application and service performance. These new realities are prompting application and network teams to collaborate. They need network and application performance management tools that can provide them with insight into how network health and performance affects application performance and end-user experience. This white paper explores these issues in depth and highlights Riverbed SteelCentral AppResponse 11, a new network and application performance management solution that leverages network packet data and encourages collaboration between application and network management teams. 



Crossing the Legacy ITSM Chasm: A Risk/Benefits Assessment

PUBLISHED: Mon, 28 Nov 2016 00:00:00 +0000
AUTHOR: Dennis Drogseth

IT Service Management (ITSM) is changing dramatically in scope and value in many IT environments, according to EMA industry research. And yet in some IT organizations, ITSM remains a reactive holdover with declining relevance to both the business and to IT as a whole. This can result in severe impacts on IT performance, business value, and business relevance, as well as escalating costs from administrative overhead and declining IT efficiencies due to lack of cohesive processes, automation, governance, and IT service insights. Legacy ITSM platforms can also impact ITSM efficiencies through rigidity, administrative overhead, and unnecessary consulting expense.

Informed by extensive EMA research and two compelling deployment narratives, this report examines what EMA calls "next-generation ITSM" and its contributions toward optimizing changing IT and business requirements. We will also contrast these advances with the risks of staying with legacy ITSM models and then evaluate and itemize the risks of "doing nothing" and allowing legacy ITSM to persist.


     

Subscribe Now!

Subscribe with Netvibes

follow us in feedly

EMA on Facebook   EMA on LinkedIn   EMA on Twitter   EMA RSS   EMA on YouTube

©1996-2018 Enterprise Management Associates, Inc. All rights reserved.
EMA™, ENTERPRISE MANAGEMENT ASSOCIATES®, and the mobius symbol are registered trademarks or common-law trademarks of Enterprise Management Associates, Inc.
Site Terms & Conditions | Integrity Policy | Site Map | My Account
Hide
Subscribe to EMA RSS Feed
Email
Show