IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING

CONTACT    SIGN IN    SIGN UP
    

Free RSS Feeds from Enterprise Management Associates (EMA)

Stay up to date on the latest IT and data management information from EMA, including Webinars, Radar Reports, white papers, impact briefs, advisory notes and more!

Select your preferred reader by selecting an icon on the right.



Current Feed Content:




Seven Rules for Big Data Analytics Deployment

PUBLISHED: Tue, 23 May 2017 00:00:00 +0000
AUTHOR: John Myers

The future of business intelligence (BI) for data-driven organizations will revolve around analytics using big data. Organizations that can use fine-grained information that either was not previously available or was not properly used will be prepared for new business models and the changing economy that data-driven strategies and culture empower. In contrast, organizations that only rely on "traditional" data sources such as the enterprise data warehouse or data marts will soon find themselves at a disadvantage to those that put insights based on big data into the hands of their business stakeholders. 

To successfully implement analytics and BI on big data, organizations need to understand the seven rules for big data analytics deployment.  Using these business and architectural guidelines, organizations can expand their big data environments from simply being "storage options" and avoid the risk of a "data swamp." EMA considers these seven rules essential to successful and effective projects using analytics on big data. 



DevOps/Continuous Delivery Tooling: Launchpad for the Digital Enterprise

PUBLISHED: Mon, 22 May 2017 00:00:00 +0000
AUTHOR: Julie Craig

Throughout the past decade, Enterprise Management Associates (EMA) researchers have continued to track the growth of Agile practices, the rise of cross-functional DevOps collaborations, and the impact of Continuous Delivery on business and IT. In most modern organizations, these three areas are inextricably intertwined.

This paper presents EMA's latest findings on these topics from a research survey conducted during the spring of 2017. The intent of the survey was to highlight the current state of software delivery and related tooling in today's companies. This paper summarizes the results, tracing the DevOps and Continuous Delivery practices and tools most relevant to managing the delivery of business services in 2017. 

Research on these topics is particularly critical at this point in time. EMA is actively tracking what has amounted to a revolution in business--and an accompanying revolution in software delivery--that has occurred over the past five years. Today's rapidly changing and fast-moving business climate is the prime mover for a vastly changed IT landscape. IT has evolved from being a cost center to a cost generator, as software has become the core around which modern businesses operate. 

Massive changes in the way revenue is generated, combined with increasingly direct and customer-centric service delivery, have created an environment of "institutionalized change." To be successful, business must be able to implement new ideas very quickly, and IT organizations bear the brunt of the work necessary to make this happen. This ìneed for speedî has driven a revolution in software delivery. Agile practices enable software to be delivered more frequently, in smaller increments, and at a faster pace. Developments in technology have enabled a new generation of componentized, massively distributed applications running on technologies that are radically different from those of the past. Container-based microservices, orchestration engines, and the most powerful and sophisticated software deployment engines in history--modern Release Automation products--have all contributed to the rise of Continuous Delivery. 

The cumulative result of these factors contributes to growing complexity and a pressing need to automate resource-intensive tasks. Yesterday's toolsets and support practices--in which tools relied heavily on human expertise and manual processes--are no longer viable. At the same time, designing, developing, deploying, and supporting complex modern application environments requires collaborative decision-making supported by a new level of cross-functional skills, knowledge, and judgment.

Surmounting these challenges to embrace the requirements of a new era requires changes to mindsets, skill sets, and tooling. This white paper encapsulates EMA's latest take on how this can best be done.



Report Summary - DevOps/Continuous Delivery Tooling: Launchpad for the Digital Enterprise

PUBLISHED: Mon, 22 May 2017 00:00:00 +0000
AUTHOR: Julie Craig


Full Report Abstract
Throughout the past decade, Enterprise Management Associates (EMA) researchers have continued to track the growth of Agile practices, the rise of cross-functional DevOps collaborations, and the impact of Continuous Delivery on business and IT. In most modern organizations, these three areas are inextricably intertwined.

This paper presents EMA's latest findings on these topics from a research survey conducted during the spring of 2017. The intent of the survey was to highlight the current state of software delivery and related tooling in today's companies. This paper summarizes the results, tracing the DevOps and Continuous Delivery practices and tools most relevant to managing the delivery of business services in 2017. 

Research on these topics is particularly critical at this point in time. EMA is actively tracking what has amounted to a revolution in business--and an accompanying revolution in software delivery--that has occurred over the past five years. Today's rapidly changing and fast-moving business climate is the prime mover for a vastly changed IT landscape. IT has evolved from being a cost center to a cost generator, as software has become the core around which modern businesses operate. 

Massive changes in the way revenue is generated, combined with increasingly direct and customer-centric service delivery, have created an environment of "institutionalized change." To be successful, business must be able to implement new ideas very quickly, and IT organizations bear the brunt of the work necessary to make this happen. This ìneed for speedî has driven a revolution in software delivery. Agile practices enable software to be delivered more frequently, in smaller increments, and at a faster pace. Developments in technology have enabled a new generation of componentized, massively distributed applications running on technologies that are radically different from those of the past. Container-based microservices, orchestration engines, and the most powerful and sophisticated software deployment engines in history--modern Release Automation products--have all contributed to the rise of Continuous Delivery. 

The cumulative result of these factors contributes to growing complexity and a pressing need to automate resource-intensive tasks. Yesterday's toolsets and support practices--in which tools relied heavily on human expertise and manual processes--are no longer viable. At the same time, designing, developing, deploying, and supporting complex modern application environments requires collaborative decision-making supported by a new level of cross-functional skills, knowledge, and judgment.

Surmounting these challenges to embrace the requirements of a new era requires changes to mindsets, skill sets, and tooling. This white paper encapsulates EMA's latest take on how this can best be done.



InfoBrief: A Day in the Life of a Cyber Security Pro

PUBLISHED: Wed, 17 May 2017 00:00:00 +0000
AUTHOR: David Monahan

The data indicates that alerting systems are not operating in a generally efficient manner. Many incidents are automatically misclassified as critical alerts. By itself this problem is unacceptable, but added to the fact that a large number of alerted incidents are actually false positives that should not have been generated in the first place, it is becoming easier to see why security teams feel stressed and overwhelmed. Because of the time needed to manually investigate each alert to determine whether it is really critical or a false positive, teams are falling behind on alerts--creating a huge backlog of unworked tickets. This is a strong reason why dwell time for breaches is over six months. Many organizations turn to ìtuningî systems to reduce generated alerts, leading to the scenario where real alerts are never generated due to improper tuning.

While larger teams could solve the problem, trained personnel are not available and this particular solution does not scale. It also does not address the root of the problem. Ultimately, this is a tools issue. The systems are not given enough context at alert creation to properly classify the incoming alerts and identify vulnerabilities.

Read more to understand the issues surrounding these problems. 



Cloud Analytics: Dispelling the Myths of Cloud Security

PUBLISHED: Wed, 10 May 2017 00:00:00 +0000
AUTHOR: Lyndsay Wise

A huge obstacle for organizations is the lack of outlets that break down the drivers and challenges for security requirements in cloud deployments. Recent EMA research highlights the struggle organizations face related to security considerations. That research can be leveraged to break down security challenges and overall perceptions related to cloud adoption and security needs. At the same time, many of the challenges faced are based on the fact that organizations rely solely on their data providers or internal IT infrastructures without developing a strong security strategy to ensure that data is secure whether at rest, in storage, or in transition. 



Report Summary - The Internet of Things and Enterprise Networks: Planning, Engineering, and Operational Strategies

PUBLISHED: Wed, 10 May 2017 00:00:00 +0000
AUTHOR: Shamus McGillicuddy


Full Report Abstract
This end-user research study examines how enterprise network infrastructure teams contribute to the Internet of Things (IoT) strategies at their organizations. It reveals the planning and engineering challenges they encounter and the architectural choices they make to deliver connectivity to IoT devices. The research also examines how network infrastructure teams manage, monitor, and troubleshoot IoT networks and, in some cases, the IoT devices themselves. Finally, the research examines some of the organizational impacts experienced by network teams when they implement IoT projects.



Embedded Analytics

PUBLISHED: Tue, 02 May 2017 00:00:00 +0000
AUTHOR: Lyndsay Wise

Organizations are constantly looking for better ways to gain value from their data assets. They adopt BI and analytics in hopes of understanding operations, increasing supply chain efficiencies, creating better sales processes, and enhancing customer experience. Unfortunately, many of these organizations fall short because they look at business intelligence and analytics access as a separate application from operations, creating silos and gaps into the performance of their business. Business users go about their daily tasks, have a question, and open up a different application to look at a premade dashboard (or create their own) through self-service access. Toggling between applications and not having an integrated way of accessing operational and analytical data creates time delays and overall inefficiencies. People may not get the answers they need or might spend more time looking for information instead of being able to act on it. This creates a disjointed approach to information visibility and business value.

What organizations need is a way to link analytical insights with operational processes to ensure that both are integrated. This level of tight integration creates a seamless view of what is happening within the company and takes advantage of opportunities in a proactive way. When analytics are embedded within operational and transactional applications, businesses no longer have to play guessing games and can gain visibility into what is happening within the organization on a regular basis. Managers and business users no longer have to search for the answers they need since those answers are provided as part of their daily tasks.



EMA Research Report: Data-Driven Security Unleashed: A Look Into the Tools That Drive Security

PUBLISHED: Tue, 02 May 2017 00:00:00 +0000
AUTHOR: David Monahan

The "Data-Driven Security Unleashed" report is the fourth iteration in the Data-Driven Security series. Each report uses core questions for trending demographics and technology uses, but each also has its own unique focus. "Data-Driven Security," the first report (released in 2012), asked about the tools and data collection preferences for improving security. EMA released "The Evolution of Data-Driven Security" in 2014 as the second iteration. Beginning in 2015, the report began asking more questions about key drivers and value. "Data-Driven Security Unleashed" also adapted to the marketspace by replacing some of the previous technologies with emerging or impactful solutions.

EMA used the collected data to paint the picture of perceived most valuable tools and their use cases, as well as key drivers to adoption and the frustrations users experience. During the course of the research, EMA substantiated that insufficient staff is a problem that is only getting worse. This is not due to budget pressures as often as it is the lack of skilled or qualified personnel available in the market. In 2015, 68 percent of respondents indicated their organizations were experiencing impacts from staffing shortages. That number rose to 76 percent in 2016. While 35 percent of organizations are hiring less skilled/qualified personnel and training them to meet their needs (up five points from the previous report), 21 percent say they just cannot find personnel at all (up seven points from 2015). However, though staffing issues were the primary frustration within IT security, respondents reinforced the idea that meeting compliance requirements was detracting from making real security improvement was introduced, along with the recognition that organizations' lack of repeatable, saleable processes is also a major hindrance. Lastly, though organizations did not complain about false positives to the same level as they did 2015 and early 2016, they indicated that it is difficult to prioritize remediation of threats and exposures. These changes in focus help vendors understand where improvements were made and where they need to continue.

Some of the top use cases for security technology were enhancing breach/compromise prevention; detection and/or response; malware prevention, detection, and/or removal; identifying malicious threat actor activities and data exfiltration; and providing highly actionable intelligence/context for incident prioritization. It is clear from the research that teams are looking for improvements at the beginning of the cyber kill chain. Reducing dwell time for attackers has become paramount. 

2014 and 2015 battered confidence in security's ability to detect incidents before becoming a significant impact. Confidence dropped from 31 to 21 percent of respondents being only "somewhat confident" into "highly doubtful" of detecting a security issue before it made a significant impact. However, advances in technology changed the previous four-year trends in these areas. As of 2016, 48 percent of respondents were confident that they could detect an incident prior to it becoming a significant impact. This is at least partly due to the fact that more companies are creating security baselines for their environments. As a result, companies feel more confident about their ability to monitor and prioritize threats to their high-priority assets and detect breaches before they create a significant impact.

The largest change in the report for 2016 was the inclusion of network security policy management as a technology. Though vendors in this space have existed for as many as 12 years, the growing complexity and span of networks (combined with the need for centralized security policy implementation and visibility) gave this category a huge introduction to the report. 53 percent of organizations said they were using a tool of this type, making it the most widely used solution in the report. It also scored at second place for value based on total cost of ownership.

The "Data-Driven Security Unleashed" report is a guide to market perceptions about the strengths of various tools and weaknesses from security and IT personnel, as well as individual contributors through the management ranks.



How IBM Control Desk Delivers Next-Generation ITSM for Strategic IT Transformation: A Close Look at a Financial Services Deployment in the Pacific Rim

PUBLISHED: Wed, 26 Apr 2017 00:00:00 +0000
AUTHOR: Dennis Drogseth

Enterprise Management Associates (EMA) is witnessing a growing need for IT service management (ITSM) teams and capabilities to take a more central position in helping IT organizations perform more consistently and effectively. This is what EMA calls "next-generation ITSM."

This report shines a spotlight on just such a deployment with IBM Control Desk at a mid-tier financial services company in the Pacific Rim. The unique environment, its extreme requirements for automation and shared cross-silo insights, is a noteworthy example of just how next-generation ITSM can take wings.



The Internet of Things and Enterprise Networks: Planning, Engineering, and Operational Strategies

PUBLISHED: Wed, 26 Apr 2017 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This end-user research study examines how enterprise network infrastructure teams contribute to the Internet of Things (IoT) strategies at their organizations. It reveals the planning and engineering challenges they encounter and the architectural choices they make to deliver connectivity to IoT devices. The research also examines how network infrastructure teams manage, monitor, and troubleshoot IoT networks and, in some cases, the IoT devices themselves. Finally, the research examines some of the organizational impacts experienced by network teams when they implement IoT projects.



Empowering a Productive Workforce with Secure Digital Workspaces

PUBLISHED: Mon, 17 Apr 2017 00:00:00 +0000
AUTHOR: Steve Brasen

IT managers are increasingly challenged to enable productive workforces due to evolving requirements for security, mobility, multi-device support, and distributed software ecosystems. By focusing on the delivery of digital workspaces, rather than end-to-end device management, organizations reduce management efforts, enable granular control over access to business resources, and empower end users with the flexibility to customize their digital experiences in the way best suited for their unique work styles. In the white paper, EMA identifies the key elements of a digital workspace environment, and provides guidance on how to empower a more productive IT-dependent workforce.



Data-Driven Distribution: Lean Warehouse Operations at Candy.com with iCharts

PUBLISHED: Mon, 17 Apr 2017 00:00:00 +0000
AUTHOR: John Myers

This ENTERPRISE MANAGEMENT ASSOCIATES (EMA) case study profiles the implementation of iCharts for NetSuite by Candy.com. The iCharts for NetSuite implementation brings significant operational and analytical improvements for the Candy.com IT and operational staff.
iCharts provides a cloud-based business intelligence and analytics solution, which enables organizations with NetSuite as their operational platform (ERP, SCM, etc.) to drive improved operational and financial outcomes. Developed with nimble, data-driven organizations in mind, the iCharts for NetSuite solution leverages cloud implementation strengths and self-service configuration properties to speed time to implementation for organizations across a spectrum of industries.

With over 150 brands available, Candy.com sells every type of candy and is increasing its business-to-business fulfillment and distribution offerings.

Approximately 70% of Candy.com’s business model is based on direct-to-consumer sales. The remaining revenue comes from business-to-business and whole suppliers.



The Evolution of NCCM Platforms in the Era of SDN and Network Virtualization

PUBLISHED: Mon, 17 Apr 2017 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Software-defined networking (SDN) is not hype. Enterprises are testing, evaluating, and deploying the technology today. SDN adds new network elements, new abstractions, new protocols, and new device relationships to data center networks. To ensure that enterprises succeed with SDN, network management tools must evolve to support these new architectures.  
Network configuration and change management (NCCM) tools have an important role to play in future SDN operations. Many of the network management and operations challenges that SDN presents to enterprises are addressable by NCCM platforms, as long as those platforms evolve to work with SDN. SDN makes networks much more dynamic and automated. As enterprises use SDN programmability to rapidly provision and deprovision network services for applications, their networks will be constantly changing. While SDN automates many aspects of networking, enterprises will still need a tool to manage and audit the configurations of SDN architecture. A traditional NCCM tool is best positioned to meet this requirement, but NCCM must evolve to support these new architectures. This white paper explores how NCCM tools should adapt to SDN. It also explores how HP Software’s NCCM solution, HP Network Automation (NA), is adapting to SDN and leveraging integrations with other HP management tools to offer enterprises state-of-the-art network operations options for their SDN endeavors. 



Network Performance and Fault Management Challenges in an SDN and Network Virtualization World

PUBLISHED: Mon, 17 Apr 2017 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

While software-defined networking (SDN) has emerged to solve many of the network operations challenges faced in enterprise data centers today, the technology is itself disruptive to the network management tool industry. SDN introduces new levels of abstraction and dynamic change not seen before in enterprise networks. Network performance and fault management platforms in particular must evolve to understand these new network abstractions and to both react to and implement rapid and automated change. These platforms must shift from a device-centric view of network health to a more holistic view that better understands application flows and dependencies. This white paper explores these issues in depth and illustrates how HP Software's Network Node Manager i (NNMi) is evolving to address them. 



Prescriptive Guide to Achieving Extreme Data Durability

PUBLISHED: Fri, 14 Apr 2017 00:00:00 +0000
AUTHOR: Steve Brasen

Today's businesses increasingly seek to retain larger data sets for longer-term retention periods to support active archive requirements, meet regulatory compliance commitments, and consolidate large record sets to perform analytical reporting and historical trending. Ensuring the integrity of dat in long-term storage is the primary focus of solutions architected to support data durability. In the white paper, EMA identifies the most effective practices and solutions for achieving extreme, multi-site data durability to support eminent high-availability and IT resilience.



Build or Buy? Security Operations Center Strategies for Midmarket Companies

PUBLISHED: Thu, 13 Apr 2017 00:00:00 +0000
AUTHOR: David Monahan

Midmarket companies are aware of the increasing threat --investments in strengthening cyber security posture rank amongst their top priorities in 2017.  Yet there is dissonance in this segment on exactly what makes a security program "strong." Even those with resources to hire dedicated security staff are facing intense competition to find, afford, and retain individuals with specialized skills. In 2016, EMA research identified that 76% of organizations are impacted by security staffing shortages, which is an increase of eight percentage points over 2015. It's why forward-thinking midmarket companies, cognizant of their budgetary constraints, security vulnerabilities, and the difficulties of finding and retaining people to fix them, are maximizing ROI and effectiveness from security spend by turning to managed security services providers (MSSPs). In 2016, 54% of organizations EMA surveyed identified that they were using an MSSP for more than 50% of their security operations and 55% indicated they would increase spending in this area. 

One MSSP service that is gaining popularity is the managed security operations center (SOC), such as those provided by Arctic Wolf Networks (AWN). The managed SOC is a premium service and more than managed security incident and event monitoring (SIEM). Managed SOC ensures organizations that face the dilemma of a lack of qualified staff have 24/7 monitoring, investigation, and remediation of threats, freeing the company to focus on their core competencies. 



A Roadmap to Successful Network Operations With SolarWinds

PUBLISHED: Mon, 10 Apr 2017 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Enterprise network infrastructure requirements are evolving rapidly, with organizations embracing transformational technologies like mobility, the Internet of Things, and the cloud. In the face of this change, network infrastructure teams need to maximize the time they spend on planning, designing, implementing, and optimizing new network connectivity and services. To accomplish this, network managers must modernize the tools they use for monitoring and troubleshooting their networks. This paper offers a roadmap for network tool modernization and reviews a leading network management solution, SolarWinds Network Performance Monitor and the SolarWinds Orion platform. 



Accelerate Cloud Transformation, Lower Cloud OPEX, and Increase Business Agility Through Blueprint-driven Cloud Automation

PUBLISHED: Wed, 05 Apr 2017 00:00:00 +0000
AUTHOR: Torsten Volk

Business today depends on the agility and speed of IT. Once it became clear that the corporate IT department was not able to accommodate the hunger for rapidly-provisioned application environments, business developers and managers looked for a pragmatic solution to "resolve just this one more bottleneck." Public cloud providers like Amazon Web Services and Microsoft Azure were quick to jump in and provide the infrastructure, services, and application templates needed for the business to quench its thirst for the swift provisioning and teardown of applications even as hybrid IT architectures started to see increased demand. Due to the convenience factor, more and more applications gradually moved into a de-facto production state. As developers created many of these environments, release cycles were quick and informal. Shadow IT was born.



Accelerate Cloud Transformation, Optimize Cloud Costs Through Governance and Collaboration

PUBLISHED: Wed, 05 Apr 2017 00:00:00 +0000
AUTHOR: Torsten Volk

Enterprise Management Associates (EMA) research shows significant growth in both private and public cloud in 2017, with enterprises planning to move an additional 19 percent of their applications to public clouds and another 10 percent to private cloud platforms. To accommodate technical workload requirements, as well as for security, compliance, and nancial considerations, enterprises are increasingly adopting multiple cloud platforms. An approximate 35 percent of enterprise customers harness four or more public cloud o erings to complement their existing private clouds (see Chart 1). 



2017 EMA Vendors to Watch: Security & Risk Management

PUBLISHED: Tue, 28 Mar 2017 00:00:00 +0000
AUTHOR: David Monahan

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2017 EMA Vendors to Watch in the Security & Risk Management field, including CyberGRX.

Additional vendors will be added to this document throughout the year.



Workload Automation:The Business Process Integration Hub Supporting Digital Transformation

PUBLISHED: Mon, 27 Mar 2017 00:00:00 +0000
AUTHOR: Dan Twing

Information technology (IT) and business have a long and interesting relationship. IT impacted science and business differently in its early years. While science accelerated with growing compute power; in business, IT initially automated existing manual business processes but did not really change the way work was done. As IT advanced, its impact on improving business outcomes increased, which created entirely new ways for business to get things done. The advent of the Internet created a big leap forward in changing business operations and how businesses interact with customers. Recent emerging IT capabilities are creating even greater changes; a digital transformation of business. Entire industries were disrupted and IT is now a significant business differentiator.
 
Even more significant than the changes in business processes enabled by IT is how consumers adopt technology in their daily lives. WiFi connectivity is like oxygen to modern consumers, and personal and business interactions with companies changed radically. Customers have high expectations of digital service and convenience. They want to be surprised and delighted by new digital ways to interact. 

WLA is todayís business process integration hub and a central key for ultimate IT efficiency and effectiveness. This white paper is based on the Enterprise Management Associates (EMA) WLA research conducted in December of 2016, "Issues and Priorities in Modern Workload Automation: Supporting Analytics, Continuous Delivery, and Digital Transformation," and will explore how organizations of any size and vertical can benefit from recognizing the importance of WLA software in supporting digital transformation. 



User, Customer, and Digital Experience: Where Service and Business Performance Come Together

PUBLISHED: Tue, 14 Mar 2017 00:00:00 +0000
AUTHOR: Dennis Drogseth

This is the third report in EMA's unique exploration of end-user experience management spanning eight years, from 2008 to 2017. While many trends remain consistent, there are also many differences in 2017 that reflect a growing interest in cloud and cloud-related technologies, APIs, microservices, and an increasingly complex and dynamic infrastructure environment. Trends such as agile and DevOps have also affected the landscape with some similar requirements for dynamic currency and shared digital, end-user, and customer experience management insights between development and operations teams, including IT service management (ITSM) teams. And finally, the move to digital transformation is escalating the need for more effective, diverse, and well-metricized capabilities for assessing application performance, end-user productivity, business process impacts, and customer and partner interactions across the extended enterprise.



Report Summary - User, Customer, and Digital Experience: Where Service and Business Performance Come Together

PUBLISHED: Tue, 14 Mar 2017 00:00:00 +0000
AUTHOR: Dennis Drogseth


Full Report Abstract
This is the third report in EMA's unique exploration of end-user experience management spanning eight years, from 2008 to 2017. While many trends remain consistent, there are also many differences in 2017 that reflect a growing interest in cloud and cloud-related technologies, APIs, microservices, and an increasingly complex and dynamic infrastructure environment. Trends such as agile and DevOps have also affected the landscape with some similar requirements for dynamic currency and shared digital, end-user, and customer experience management insights between development and operations teams, including IT service management (ITSM) teams. And finally, the move to digital transformation is escalating the need for more effective, diverse, and well-metricized capabilities for assessing application performance, end-user productivity, business process impacts, and customer and partner interactions across the extended enterprise.



Powering SQL on Hadoop: Evaluation of TPC-DS Query Benchmark Using Hadoop

PUBLISHED: Tue, 14 Mar 2017 00:00:00 +0000
AUTHOR: John Myers

EMA big data research conducted regularly from 2012-2016 shows that organizations implementing Hadoop as part of their data management environments are moving from simple exploratory use cases to complex workload-driven analytics use cases. These organizations are working for the implementation of mission-critical business goals and workloads in environments that utilize Hadoop. According to EMA panel respondents, the most commonly implemented use cases are market basket analysis, social brand management analysis, fraud analysis and risk assessment, geospatial grouping, and relationship analysis. All of these projects require access to speed of response and many different groups across the organization.

These advanced workloads are SQL-intensive, requiring a full range of current ANSI SQL query support--not just a subset. In addition, many workloads must support the type of low-latency response business stakeholders require. Finally, these platforms need to support a level of concurrent users who will use these environments. When analytical applications gain adoption, their use becomes widespread and the underlying data management platform needs to support users while providing an acceptable level of performance.

An effective SQL on Hadoop environment must support advanced ANSI SQL versions such as SQL99 and SQL2003 to effectively maintain analytical and business intelligence query workloads. This is essential for business users who are loath to make adjustments from the queries used currently. Full SQL support is also critical when an enterprise plans to utilize data analysis and data visualization tools which generate their own SQL in ways that the data consumer and IT technologies do not fully control.



The Internet of Things: How to get There from Here

PUBLISHED: Wed, 08 Mar 2017 00:00:00 +0000
AUTHOR: John Myers

Organizations around the globe are taking advantage of the opportunities afforded by the Internet of Things (IoT). These organizations see the possibilities of tackling the next opportunity to fuel their company's competitive advantage with IoT sensor data. Organizations can utilize sensor data, process information, and historical patterns to enhance their current operations and processes. However, the information from device sensors also holds the promise for future business models and new product decisions.   

There are some estimates that say IoT represents a nearly 15 trillion-dollar opportunity around the globe. This opportunity starts with the chance to continue the streamlining of organization operations and processes using quality programs such as Lean Manufacturing, Six Sigma, and even Total Quality Management (TQM). In each of these practices, IoT offers the chance to inject information from devices that are part of the operational process of an organization. Whether this is a traditional assembly line organization such as manufacturing or supply chain, or a customer-focused care organization in the fields of healthcare or consumer retail sales, organizations can use IoT to streamline their operations with real-time information. This information comes from delivery trucks, pallets, and boxes that fulfill the supply chain; and from the devices that move, assemble, and monitor critical steps in operational production processes.

For organizations deciding whether to engage or not engage in the world of IoT, it is recommended to start a program and commit to that endeavor. By making a commitment to a long-term IoT strategy, organizations will be better equipped for the still-evolving future of IoT device sensor data and have a significant leg up on their competitors, who may consider a wait-and-see approach for their IoT strategy. These organizations will have not only the value in the short-term to harness their costs and improve operations and process, but these committed organizations will also be positioned to have the most impact in the future.



Application Performance Management (APM) in the Digital Enterprise

PUBLISHED: Tue, 28 Feb 2017 00:00:00 +0000
AUTHOR: Rick Sturm

"Application Performance Management (APM) in the Digital Enterprise" enables IT professionals to be more successful in managing their company's applications. It explores the fundamentals of application management, examines how the latest technological trends impact application management, and provides best practices for responding to these changes. 

The recent surge in the use of containers as a way to simplify management and deploy applications has created new challenges, and the convergence of containerization, cloud, mobile, virtualization, analytics, and automation is reshaping the requirements for application management.

This book serves as a guide for understanding these dramatic changes and how they impact the management of applications, showing how to create a management strategy, define the underlying processes and standards, and how to select the appropriate tools to enable management processes.

• Offers a complete framework for implementing effective application management using clear tips and solutions for those responsible for application management
• Draws upon primary research to give technologists a current understanding of the latest technologies and processes needed to more effectively manage large-scale applications
• Includes real-world case studies and business justifications that support application management investments

Purchase the book now: http://amzn.to/2lJG73a



The End of Point Solutions: Modern NetOps Requires Pervasive and Integrated Network Monitoring

PUBLISHED: Fri, 10 Feb 2017 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Network operations teams typically rely on a fragmented set of monitoring and troubleshooting tools, a situation that leads to ineffective management and network instability. IT organizations must adopt a new tool strategy that emphasizes integration, consolidation, and advanced analytics including big data. This strategy should not only focus on improved network operations. Given that network data can provide insight into security operations and business operations as well, network managers should explore how a new tool strategy can contribute to their IT organization as a whole and the business it serves. 



Making Sense of Big Data: A Day in the Life of an Enterprise Architect

PUBLISHED: Thu, 02 Feb 2017 00:00:00 +0000
AUTHOR: John Myers

Enterprise architects use a combination of experience, expertise, and vision to provide guidance and facilities to their organizationís technical infrastructure. Enterprise architects take into account business requirements and technical capabilities to provide the vision for an organization's future. These future strategies need to mesh with existing technical infrastructure for future development to be attainable.

The life of an enterprise architect is becoming busy and difficult. Before the era of big data, the enterprise architect "only" had to worry about the data and systems within their own data center. However, over the past decade there were revolutionary changes to the way information is used by businesses and how data management platforms support the information available from modern data sources.   

Cloud broke down the boundaries of enterprise data centers, with applications housed and data created outside the "four walls" of an organization. This introduced a host of complexities for enterprise architects focused on security, privacy, and control. Mobile influences continued to push data outside the data center. Maintaining data flows to each of those data access points, often as tablets or mobile phones, introduced additional troubles. Incoming data from mobile devices brought new data formats and a flood of information to the enterprise architect. 

These alterations in the formats and locations of systems and data created massive change for data-driven organizations who want to develop competitive advantage. That advantage may come in the form of new data sources such as device sensor logs, social media streams, and mobile device geolocation information; create new projects to take advantage of these new data sources; and establish environments with diverse data management platforms to support these efforts.



The Promise and Risk of the Industrial Internet of Things

PUBLISHED: Wed, 01 Feb 2017 00:00:00 +0000
AUTHOR: David Monahan

Speaking in front of an audience of 300 security specialists at a conference last year, the head of the Department of Homeland Securityís Industrial Control Systems Cyber Response team (ICS-CERT) made a dire pronouncement: the department saw an increase in attacks on industrial control systems in 2015, and he was "dismayed" by the accessibility of some of the networks. To say that many people in that audience (and those who would follow the coverage) were equally dismayed at how to handle the paradox that gave birth to this problem would be an understatement. 

The convergence of information technology and industrial technology supplies analytic applications with massive amounts of industrial data, resulting in streamlined operations, improved safety, predictive maintenance, and optimized processes. However, this convergence is occurring in an environment that was never designed to be accessible from the outside world. Security strategy for operational technology (OT) was developed decades ago, under the assumption that restricting physical access to industrial control systems and networks was enough to protect them. The simple truth is that OT grew independent of IT, with no intention to integrate the two. Over time, the reliance on physical protection approaches proved to be short-sighted and insufficient due to the integration of business and industrial systems, and the expansion of remote management. For manufacturing, transportation, and critical infrastructure, this reliance is creating enormous risks with potentially catastrophic outcomes. 



The Business Benefits of Aviatrix Hybrid Cloud Networking

PUBLISHED: Thu, 19 Jan 2017 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This paper explores the challenges that enterprise organizations face when building networks to support hybrid cloud and multi-cloud architectures. It also reviews an enterprise cloud-defined networking solution from Aviatrix that helps solves these challenges.
Leveraging in-depth interviews with Aviatrix customers, this paper identifies the use cases enterprises can pursue with this networking solution, and it quantifies the cost savings and business benefits that can be realized with the cloud-defined networking solution. IT organizations that are considering Aviatrix's cloud-defined networking solution can use this paper as a reference guide for estimating the potential business value of a successful implementation of the Aviatrix network solution.



Report Summary Prepared for HPE - Charting the Expanding Horizons of Big Data

PUBLISHED: Thu, 19 Jan 2017 00:00:00 +0000
AUTHOR: John Myers

This is a summary of the EMA/9sight research report, "Charting the Expanding Horizons of Big Data" prepared for HPE.

Full Report Abstract
Since its inception, the concept of "big data" has meant many things to many people. If you are a fan of the Apache Hadoop ecosystem, big data is the raison d'etre for your Hadoop environment and the sprawling zoological lexicon upon which that ecosystem is built and continues to evolve. If you are a devotee of multi-structured data such as JSON, XML, etc, your definition of big data revolves around how relational data management is not well-suited for the modern data architecture of event-based processing and the Internet of Things. And so on and so forth…

As it was explored since the inaugural EMA/9sight survey in 2012, big data is both a way to look at new sources of data and how organizations place that information under "new management." Big data attracted a wide range of application innovators, as well as many protesters against the dominance of relational databases and data warehouses. The EMA/9sight surveys use a deliberately broad definition of big data to inspire end users to think beyond the box of limiting definitions. This will let them see how a larger world of traditional data sources, data management, and processing can be interwoven with the new era. As was established in three (3) previous studies in 2012, 2013, and 2014/2015, big data offers a wide range of possibilities. The 2016 EMA/9sight Big Data End-user Survey continues to look at that range of possibilities for big data definitions, implementations, and technologies. 



Report Summary Prepared for Statistica - Charting the Expanding Horizons of Big Data

PUBLISHED: Wed, 18 Jan 2017 00:00:00 +0000
AUTHOR: John Myers

This is a summary of the EMA/9sight research report, "Charting the Expanding Horizons of Big Data" prepared for Statistica.

Full Report Abstract
Since its inception, the concept of "big data" has meant many things to many people. If you are a fan of the Apache Hadoop ecosystem, big data is the raison d'etre for your Hadoop environment and the sprawling zoological lexicon upon which that ecosystem is built and continues to evolve. If you are a devotee of multi-structured data such as JSON, XML, etc, your definition of big data revolves around how relational data management is not well-suited for the modern data architecture of event-based processing and the Internet of Things. And so on and so forth…

As it was explored since the inaugural EMA/9sight survey in 2012, big data is both a way to look at new sources of data and how organizations place that information under "new management." Big data attracted a wide range of application innovators, as well as many protesters against the dominance of relational databases and data warehouses. The EMA/9sight surveys use a deliberately broad definition of big data to inspire end users to think beyond the box of limiting definitions. This will let them see how a larger world of traditional data sources, data management, and processing can be interwoven with the new era. As was established in three (3) previous studies in 2012, 2013, and 2014/2015, big data offers a wide range of possibilities. The 2016 EMA/9sight Big Data End-user Survey continues to look at that range of possibilities for big data definitions, implementations, and technologies. 



Nuix Insight Adaptive Security Brings Context Visibility and Deception to Protect Endpoints

PUBLISHED: Tue, 17 Jan 2017 00:00:00 +0000
AUTHOR: David Monahan

When hackers disabled systems and dumped unreleased films, unfinished movie scripts, private emails, salary figures, and tens of thousands of employee social security numbers onto public file sharing sites in December 2014, Sony Pictures became an embodiment of a situation that seemed straight out of one of its movies. While other major corporations faced high-profile attacks, the depth and breadth of the Sony hack, commentators said, would finally force corporations to take a hard look at their own security protocols and layers of protection (or lack thereof). 

Still, daily, there’s another story about attackers stealing credentials and gaining access to everything from sensitive customer data to corporate documents, even to the email accounts of public figures, as we saw with the 2016 U.S. presidential campaign.

What these attacks unequivocally demonstrated is just how exposed our networked society is. They are forcing organizations to confront the reality that we are now in a state of continuous compromise when it comes to cyberattacks. 

Every piece of equipment in the enterprise seems to be vulnerable to cyberattack. The commercialization of the Dark Web provides hackers with a diverse toolkit and evolving tactics, allowing them to gain access to everything from critical systems to BYOD devices and IoT-enabled office equipment. To address this, security architectures can no longer rely on predefined rules and parameters; they must be redesigned to read and react to contextual signals. Robust endpoint security should aim not only to physically protect devices, but act as a digital sleuth and lend clear, actionable data to detect intrusions and insight to prevent similar types of attacks. Organizations that take an adaptive approach to designing security architectures will be equipped to deal with evolving cyber threats.



Report Summary - Orchestrating Digital Workspaces

PUBLISHED: Mon, 16 Jan 2017 00:00:00 +0000
AUTHOR: Steve Brasen

This is the summary of the EMA research report, "Orchestrating Digital Workspaces."


Full Report Abstract
Expanding requirements for workforce mobility, heterogeneous device support, and distributed software ecosystems have challenged organizations to provide secure and reliable IT resources using traditional endpoint management processes. To empower more technology-reliant workforces, organizations must transition distributed desktop and mobile devices user environments to cloud-hosted software aggregation services. These "digital workspaces" enable standardized business work environments that are fully customizable, easy to maintain, secure, and accessible from any device at any location at any time. While many IT managers recognize the value of a digital workspace approach to endpoint management, most are unaware of the critical solutions and implementation tasks that must be performed to enable such a platform. Leveraging results from survey based primary research along with industry established best practices , EMA has developed a five-step maturity model providing prescriptive guidance on the most pragmatic method for transitioning from a traditional distributed desktop environment to user-focused digital workspaces.



EMA Research Report: Orchestrating Digital Workspaces

PUBLISHED: Tue, 10 Jan 2017 00:00:00 +0000
AUTHOR: Steve Brasen

Expanding requirements for workforce mobility, heterogeneous device support, and distributed software ecosystems have challenged organizations to provide secure and reliable IT resources using traditional endpoint management processes. To empower more technology-reliant workforces, organizations must transition distributed desktop and mobile devices user environments to cloud-hosted software aggregation services. These “digital workspaces” enable standardized business work environments that are fully customizable, easy to maintain, secure, and accessible from any device at any location at any time. While many IT managers recognize the value of a digital workspace approach to endpoint management, most are unaware of the critical solutions and implementation tasks that must be performed to enable such a platform. Leveraging results from survey based primary research along with industry established best practices , EMA has developed a five-step maturity model providing prescriptive guidance on the most pragmatic method for transitioning from a traditional distributed desktop environment to user-focused digital workspaces.



Report Summary Prepared for IBM - Charting the Expanding Horizons of Big Data

PUBLISHED: Thu, 05 Jan 2017 00:00:00 +0000
AUTHOR: John Myers

This is a summary of the EMA/9sight research report, "Charting the Expanding Horizons of Big Data" prepared for IBM.

Full Report Abstract
Since its inception, the concept of "big data" has meant many things to many people. If you are a fan of the Apache Hadoop ecosystem, big data is the raison d'etre for your Hadoop environment and the sprawling zoological lexicon upon which that ecosystem is built and continues to evolve. If you are a devotee of multi-structured data such as JSON, XML, etc, your definition of big data revolves around how relational data management is not well-suited for the modern data architecture of event-based processing and the Internet of Things. And so on and so forth…

As it was explored since the inaugural EMA/9sight survey in 2012, big data is both a way to look at new sources of data and how organizations place that information under "new management." Big data attracted a wide range of application innovators, as well as many protesters against the dominance of relational databases and data warehouses. The EMA/9sight surveys use a deliberately broad definition of big data to inspire end users to think beyond the box of limiting definitions. This will let them see how a larger world of traditional data sources, data management, and processing can be interwoven with the new era. As was established in three (3) previous studies in 2012, 2013, and 2014/2015, big data offers a wide range of possibilities. The 2016 EMA/9sight Big Data End-user Survey continues to look at that range of possibilities for big data definitions, implementations, and technologies. 



Report Summary - Issues and Priorities in Modern Workload: Automation Supporting Analytics, Continuous Delivery, and Digital Transformation

PUBLISHED: Wed, 21 Dec 2016 00:00:00 +0000
AUTHOR: Dan Twing


Full Report Summary
Modern IT means multiple cloud environments, big data, advanced analytics, and an increased rate of change to existing and new applications. More workloads are focused on collecting a variety of data types. All that data must be moved, stored in big data environments, and processed through analytics tools. The digital transformation that is overtaking enterprises in all industries is further complicating the task of managing the changing workload landscape. While workload automation is a mature space, it underwent significant enhancements since this study was done in 2013. WLA vendors and users had to address all of the changes imposed on IT operations. Workload automation may not have the cache of virtualization, software-defined networking, or containers, but it remains a foundational element to well-controlled IT operations. 

This research updates many of the data points collected in the 2013 "Workload Automation in an Era of Cloud, Analytics, Enterprise Mobility, DevOps, and Big Data" research, and adds new measures for recent innovations. The 2013 study was conducted with 176 workload professionals and IT leaders in North America. This year's study was expanded to 228 respondents, including 132 North American and 96 European workload professionals, IT leaders, and some business users involved in using dashboards to monitor their workloads. With a substantial number of questions asked in both studies, trends are examined from 2013 to 2016.



Issues and Priorities in Modern Workload Automation Supporting Analytics, Continuous Delivery, and Digital Transformation

PUBLISHED: Wed, 21 Dec 2016 00:00:00 +0000
AUTHOR: Dan Twing

Modern IT means multiple cloud environments, big data, advanced analytics, and an increased rate of change to existing and new applications. More workloads are focused on collecting a variety of data types. All that data must be moved, stored in big data environments, and processed through analytics tools. The digital transformation that is overtaking enterprises in all industries is further complicating the task of managing the changing workload landscape. While workload automation is a mature space, it underwent significant enhancements since this study was done in 2013. WLA vendors and users had to address all of the changes imposed on IT operations. Workload automation may not have the cache of virtualization, software-defined networking, or containers, but it remains a foundational element to well-controlled IT operations. 

This research updates many of the data points collected in the 2013 "Workload Automation in an Era of Cloud, Analytics, Enterprise Mobility, DevOps, and Big Data" research, and adds new measures for recent innovations. The 2013 study was conducted with 176 workload professionals and IT leaders in North America. This year's study was expanded to 228 respondents, including 132 North American and 96 European workload professionals, IT leaders, and some business users involved in using dashboards to monitor their workloads. With a substantial number of questions asked in both studies, trends are examined from 2013 to 2016.



EMA Innovators of Amazon Re:Invent 2016

PUBLISHED: Thu, 08 Dec 2016 00:00:00 +0000
AUTHOR: Torsten Volk

Enterprise Management Associates (EMA) is awarding the "EMA Innovators of Amazon Re:Invent" trophies to vendors of any age and size that slay one or more of the "Four Horsemen of the Hybrid Cloud Apocalypse." These horsemen are responsible for the typical enterprise wasting over 50% of its IT resources -- hardware, software, cloud services and human resources -- and they are described in detail in our EMA essay "From the Software-Defined Data Center to the Business-Defined Intelligent Hybrid Cloud."



Report Summary - Charting the Expanding Horizons of Big Data

PUBLISHED: Tue, 29 Nov 2016 00:00:00 +0000
AUTHOR: John Myers

This is a summary of the EMA/9sight research report, "Charting the Expanding Horizons of Big Data."

Full Report Abstract
Since its inception, the concept of "big data" has meant many things to many people. If you are a fan of the Apache Hadoop ecosystem, big data is the raison d'etre for your Hadoop environment and the sprawling zoological lexicon upon which that ecosystem is built and continues to evolve. If you are a devotee of multi-structured data such as JSON, XML, etc, your definition of big data revolves around how relational data management is not well-suited for the modern data architecture of event-based processing and the Internet of Things. And so on and so forth…

As it was explored since the inaugural EMA/9sight survey in 2012, big data is both a way to look at new sources of data and how organizations place that information under "new management." Big data attracted a wide range of application innovators, as well as many protesters against the dominance of relational databases and data warehouses. The EMA/9sight surveys use a deliberately broad definition of big data to inspire end users to think beyond the box of limiting definitions. This will let them see how a larger world of traditional data sources, data management, and processing can be interwoven with the new era. As was established in three (3) previous studies in 2012, 2013, and 2014/2015, big data offers a wide range of possibilities. The 2016 EMA/9sight Big Data End-user Survey continues to look at that range of possibilities for big data definitions, implementations, and technologies. 



Report Summary Prepared for Teradata - Charting the Expanding Horizons of Big Data

PUBLISHED: Tue, 29 Nov 2016 00:00:00 +0000
AUTHOR: John Myers

This is a summary of the EMA/9sight research report, "Charting the Expanding Horizons of Big Data" prepared for Teradata.

Full Report Abstract
Since its inception, the concept of "big data" has meant many things to many people. If you are a fan of the Apache Hadoop ecosystem, big data is the raison d'etre for your Hadoop environment and the sprawling zoological lexicon upon which that ecosystem is built and continues to evolve. If you are a devotee of multi-structured data such as JSON, XML, etc, your definition of big data revolves around how relational data management is not well-suited for the modern data architecture of event-based processing and the Internet of Things. And so on and so forth…

As it was explored since the inaugural EMA/9sight survey in 2012, big data is both a way to look at new sources of data and how organizations place that information under "new management." Big data attracted a wide range of application innovators, as well as many protesters against the dominance of relational databases and data warehouses. The EMA/9sight surveys use a deliberately broad definition of big data to inspire end users to think beyond the box of limiting definitions. This will let them see how a larger world of traditional data sources, data management, and processing can be interwoven with the new era. As was established in three (3) previous studies in 2012, 2013, and 2014/2015, big data offers a wide range of possibilities. The 2016 EMA/9sight Big Data End-user Survey continues to look at that range of possibilities for big data definitions, implementations, and technologies. 



Riverbed SteelCentral AppResponse 11 Enables Converged Network and Application Operations

PUBLISHED: Tue, 29 Nov 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

IT organizations have ceased treating network infrastructure as utilitarian plumbing. In this digital age, network and application managers know that as the foundational element of application delivery, the network must be monitored and optimized for application performance. The network is also an invaluable source of data for insight into application and service performance. These new realities are prompting application and network teams to collaborate. They need network and application performance management tools that can provide them with insight into how network health and performance affects application performance and end-user experience. This white paper explores these issues in depth and highlights Riverbed SteelCentral AppResponse 11, a new network and application performance management solution that leverages network packet data and encourages collaboration between application and network management teams. 



Crossing the Legacy ITSM Chasm: A Risk/Benefits Assessment

PUBLISHED: Mon, 28 Nov 2016 00:00:00 +0000
AUTHOR: Dennis Drogseth

IT Service Management (ITSM) is changing dramatically in scope and value in many IT environments, according to EMA industry research. And yet in some IT organizations, ITSM remains a reactive holdover with declining relevance to both the business and to IT as a whole. This can result in severe impacts on IT performance, business value, and business relevance, as well as escalating costs from administrative overhead and declining IT efficiencies due to lack of cohesive processes, automation, governance, and IT service insights. Legacy ITSM platforms can also impact ITSM efficiencies through rigidity, administrative overhead, and unnecessary consulting expense.

Informed by extensive EMA research and two compelling deployment narratives, this report examines what EMA calls "next-generation ITSM" and its contributions toward optimizing changing IT and business requirements. We will also contrast these advances with the risks of staying with legacy ITSM models and then evaluate and itemize the risks of "doing nothing" and allowing legacy ITSM to persist.



Charting the Expanding Horizons of Big Data

PUBLISHED: Mon, 21 Nov 2016 00:00:00 +0000
AUTHOR: John Myers

Since its inception, the concept of "big data" has meant many things to many people. If you are a fan of the Apache Hadoop ecosystem, big data is the raison d'etre for your Hadoop environment and the sprawling zoological lexicon upon which that ecosystem is built and continues to evolve. If you are a devotee of multi-structured data such as JSON, XML, etc, your definition of big data revolves around how relational data management is not well-suited for the modern data architecture of event-based processing and the Internet of Things. And so on and so forth…

As it was explored since the inaugural EMA/9sight survey in 2012, big data is both a way to look at new sources of data and how organizations place that information under "new management." Big data attracted a wide range of application innovators, as well as many protesters against the dominance of relational databases and data warehouses. The EMA/9sight surveys use a deliberately broad definition of big data to inspire end users to think beyond the box of limiting definitions. This will let them see how a larger world of traditional data sources, data management, and processing can be interwoven with the new era. As was established in three (3) previous studies in 2012, 2013, and 2014/2015, big data offers a wide range of possibilities. The 2016 EMA/9sight Big Data End-user Survey continues to look at that range of possibilities for big data definitions, implementations, and technologies. 



Wi-Fi Hardware and Management Trends, and Their impacts on Total Cost of Ownership

PUBLISHED: Fri, 18 Nov 2016 00:00:00 +0000
AUTHOR: David Monahan

It can be argued that the largest impact to workforce productivity in the last 20 years was the introduction of Wi-Fi networks. In today's workforce, moving from meeting to meeting or place to place is a job requirement; being tethered to a LAN port seems almost unfathomable. There are many factors driving the growth of Wi-Fi, including new standards with increased bandwidth, expanding use cases for mobile and Internet of Things devices, maturation of cloud-based management infrastructure, and the rise of virtualization and open source hardware for Wi-Fi. Given its importance and impact on productivity, choosing a solution to provide that connectivity is a critical business choice. Throughput, scalability, reliability and resiliency, simplicity, and ultimately cost all play a part in the vendor selection process and achieving a desired level of return on investment (ROI). This EMA paper discusses these factors in relation to total cost of ownership (TCO).



Ixia Security Fabric: Security Through Visibility, Context, and Simplicity

PUBLISHED: Tue, 15 Nov 2016 00:00:00 +0000
AUTHOR: David Monahan

Security professionals are overwhelmed by data. There is an overload of information presented to people with limited time and bandwidth. Without context, this information can also overwhelm tools, making security analysts' lives more difficult rather than hastening a path to incident response and resolution. When early detection and discovery fails, advanced persistent threats remain.

With dozens of disparate and often overlapping data sources, early warnings are frequently missed. Security monitoring solutions trigger alerts without adequate context for identification and categorization. In order to be most effective, security intelligence must be coupled with automation and orchestration tools designed specifically for enhanced protection, using information across multiple silos.

This is where Ixia Security Fabric comes in. It facilitates security operations and analysis, acting as an intelligent traffic manager with the ability to direct packets based on numerous administrator-defined criteria and augmenting that traffic with additional data and metadata through network and application protocol analysis. All of this is done to deliver greater context around incidents in a shorter period of time so analysts can achieve results faster. This allows them higher efficiency in operations and gives them time to address other operational issues in a proactive manner.

While this concept originated in network operations, its benefits have much further-reaching effects in the security world. The top four value drivers for Security Fabric include:
  • Visibility - Illuminating and overseeing network traffic originating from various input sources, including contextual intelligence using both data and metadata 
  • Context - Understanding the information provided by various sources through situational, protocol, behavioral, and time awareness
  • Performance - Maximizing resources by intelligently routing packets to the tool most appropriate to analyze them, thus protecting tools from unnecessary processing burdens
  • Resilience - Ensuring continuous function when a link or tool within the chain is overwhelmed or broken
Many point solutions have attempted to solve the context and automation problem using log file aggregation and flow analysis. Unfortunately, these disparate parts do not overcome the most critical shortcomings, notably intelligent traffic management and contextual analysis coupled with a smart console.

The Ixia Security Fabric offers simplicity and performance -- a recipe for success!



SaaS, On-Prem, or Hybrid: Which Application Performance Management (APM) Solution Is Best for Your Business?

PUBLISHED: Thu, 10 Nov 2016 00:00:00 +0000
AUTHOR: Julie Craig

In the midst of this massively changing IT landscape, IBM is addressing hybrid deployments head on with a new set of Application Performance Management (APM) solutions which are, themselves, built using a hybrid design. Intended to provide customers with a wide range of options for funding, hosting, deployment, and services, the IBM Application Performance Management Portfolio can assist businesses in making the transition to hybrid service delivery. Targeted specifically at IT Operations teams, application developers, and Line of Business (LOB) application owners, IBM APM delivers the automated core supporting modern hybrid deployments.

This Enterprise Management Associates (EMA) white paper profiles IBM's hybrid APM offerings and their value proposition to business and IT. It discusses the benefits and challenges of utilizing leading-edge APM tooling in SaaS and/or on-premises form factors to manage hybrid and non-hybrid applications. 

It also provides guidelines to help IT and LOB determine which APM form factor--on-premises hosted, cloud hosted, or a mix of both--best fits their specific development, testing, and monitoring requirements. Finally, it profiles the key differentiators that make IBM a compelling product choice for companies developing and delivering complex enterprise applications via cloud-based, on-premises, or hybrid deployment models.



Packet-Based Security Forensics: A Next-Generation Approach to Attack Remediation

PUBLISHED: Thu, 10 Nov 2016 00:00:00 +0000
AUTHOR: David Monahan

Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success.

This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.



Blind Trust Is Not A Security Strategy: Lessons From Cloud Adopters

PUBLISHED: Wed, 09 Nov 2016 00:00:00 +0000
AUTHOR: David Monahan

Enterprise Management Associates recently conducted a research project that investigated multiple aspects of cloud service providers and the adoption of their services. The research looked to identify major motivators and inhibitors of adopting cloud services for both compliance and non-compliance constrained workloads. Security emerged as the top adoption concern.  

The research showed that though they have differing responsibilities, both IT and security agreed that implementing proper security in their cloud environments is better than accelerating deployment speed but achieving a less secure environment. IT respondents admitted that they would rather suffer a delay for a new cloud application deployment than rapidly deploy an application into a potentially insecure environment and, even better, if they help the business people understand the issues, the business people agreed in nearly a 3 to 1 margin. IT sided with security to delay a product launch due to security concerns rather than suffer a significant security breach by a margin greater than 2 to 1.

Cloud adoption is a long-term partnership between the business and the provider. It provides a new toolset to address both traditional and new IT service delivery challenges. Within that toolset security, elasticity, and agility are all available to accelerate business service delivery, but the organization must evaluate its needs to determine not only current requirements but also expected future needs to ensure how each provider under consideration can or will meet those needs.



The Value of OpEx-based, Storage-as-a-Service (STaaS)

PUBLISHED: Wed, 09 Nov 2016 00:00:00 +0000
AUTHOR: Jim Miller, Former EMA Analyst

Overall, data growth within the typical data center is at 42% per year. New applications driven by big data, video, social media, and mobile devices are fueling this unparalleled growth in storage. Data is also kept active longer in the lifecycle as corporations use analytics to look for trends, opportunities, and competitive advantage. Budgets are not growing at the same rate as data. Both the growth in the volumes of the data, and the growth in the value of the data are driving an exponential cost curve that cannot be sustained by the traditional CapEx model. Cloud compute and storage use is growing exponentially as companies of all sizes look for ways to accelerate application rollouts, reduce capital costs, and lower operational overhead.This paper examines this storage situation and explores Zadara Storage's solution that provides high performance and highly available enterprise-class STaaS that reduces the burden of procuring and managing storage. How Zadara reduces the risks 
of traditional storage planning by migrating to an operational model that quickly adjusts to the dynamics of the enterprise without having to overprovision or risk not having sufficient resources is explored. 



Wi-Fi Hardware and Management Trends, and Their impacts on Total Cost of Ownership

PUBLISHED: Tue, 08 Nov 2016 00:00:00 +0000
AUTHOR: David Monahan

It can be argued that the largest impact to workforce productivity in the last 20 years was the introduction of Wi-Fi networks. In today's workforce, moving from meeting to meeting or place to place is a job requirement; being tethered to a LAN port seems almost unfathomable. There are many factors driving the growth of Wi-Fi, including new standards with increased bandwidth, expanding use cases for mobile and Internet of Things devices, maturation of cloud-based management infrastructure, and the rise of virtualization and open source hardware for Wi-Fi. Given its importance and impact on productivity, choosing a solution to provide that connectivity is a critical business choice. Throughput, scalability, reliability and resiliency, simplicity, and ultimately cost all play a part in the vendor selection process and achieving a desired level of return on investment (ROI). This EMA paper discusses these factors in relation to total cost of ownership (TCO).



The Industrialization of Fraud Demands a Dynamic Intelligence-driven Response

PUBLISHED: Fri, 21 Oct 2016 00:00:00 +0000
AUTHOR: David Monahan

As criminals discover the profitability of attacks against information systems, fraud has increased significantly with no end in sight. Adversaries learned the lucrative nature of harnessing cyber threats. Innovations now make it easier to steal from a wider range of victims, spurring the commercialization of multiple forms of crimeware and an entire Internet subculture known as the "Dark Web" or the "Dark Net," where both software and services can be rented or purchased. The Dark Net services gave rise to specialization, competitive pressures, and other factors that illustrate how fraud, abetted by cybercrime, grew from the unrelated activities of a few into an industry in its own right.

This industry produced a level of automation and sophistication in fraud techniques rivaling those of the legitimate business world. The commercial-grade packaging of complex threats makes it possible to readily convert personal systems into pawns that facilitate fraud, often unbeknownst to their rightful owners. Large-scale systems management capitalizes on the ability to harness entire networks of compromised hosts whose masters often avoid detection and eradication through highly nimble evasive tactics. The net result: an industrialized threat that costs businesses billions to trillions of dollars worldwide.

In this paper, Enterprise Management Associates (EMA) explores the response organizations must marshal to stand up to the threat of industrialized cybercrime. If attackers are well organized and well informed, take advantage of the latest innovations in the shadow market of crimeware and automation, and capitalize on intelligence to maintain their advantage, organizations must respond accordingly.
Coordinated strategies embracing multiple tactics to limit exposure and improve effectiveness are now mandated by guidance such as that of the PCI Council, the US Federal Financial Institutions Examinations Council (FFIEC), and other regulations worldwide, affecting businesses targeted by fraud. The RSA Fraud and Risk Intelligence services portfolio offers an example of just such a coordinated approach. With its early leadership in technologies and services that integrate intelligence with anti-fraud tactics in real-time, the RSA Fraud and Risk Intelligence portfolio provides organizations with the tools to enable strategies for confronting an industrialized threat with an industry-wide response.



Bot Defense: Insights Into Basic and Advanced Techniques for Thwarting Automated Threats

PUBLISHED: Fri, 21 Oct 2016 00:00:00 +0000
AUTHOR: David Monahan

This EMA white paper lays the foundation for what bots are, why they are a threat, how they are adapting to bypass traditional defense technology, and how to overcome those shortcomings. Most current solutions were designed to combat programming deficiencies and errors, such as those addressed in the Open Web Application Security Project (OWASP) Top 10 and SANS/Mitre Top 20, but are not sufficient to protect them from exploits in business logic.

Organizations hoping to gain the best defense from these newly-defined OWASP Automated Threats to Web Applications must understand and then adopt an adaptive defense that uses both older and new defense capabilities.



APM in the Digital Economy: What's Hot, What's Not, and What's on the Horizon

PUBLISHED: Thu, 20 Oct 2016 00:00:00 +0000
AUTHOR: Julie Craig

This research report details the results of survey-based research conducted during the spring of 2016. It assessed the top challenges encountered by IT organizations as they adapt to the collective impacts of the consumer economy, the growth of the public cloud, the rise of abstraction in the form of "software-defined everything," and the growing importance of software as an agent of change. Survey topics covered technology usage, current management practices supporting production applications running on- and off- premises, software development/delivery practices, tooling requirements, and API usage. 

The survey also assessed APM requirements for companies of every size running a wide variety of application and transaction types. Questions covered virtually every "flavor" of Application Management and User Experience solutions, including synthetics, application-aware networking, Real User Monitoring (RUM), browser/code injection, endpoint monitoring, Application Discovery and Dependency Mapping (ADDM), APM platforms and suites, and on- and off-premises hosted solutions. The result is a comprehensive perspective on APM usage, requirements, gaps, and near-term APM-related purchasing plans.



Taming IT Complexity With User Experience Monitoring

PUBLISHED: Thu, 20 Oct 2016 00:00:00 +0000
AUTHOR: Julie Craig

With multiple studies over the past 10 years, Enterprise Management Associates (EMA) has conducted extensive research on the value proposition of "UEM technologies," a term that encompasses multiple product categories, including synthetic monitoring and real user monitoring (RUM). Nearly all of these surveys reinforce the benefits of this class of tools. In support of cloud computing initiatives, for example, UEM technologies were shown to accelerate service deployments, reduce operational costs, and improve overall manageability. 

However, regardless of whether a digital service is hosted in the cloud or on premises, the user has become the center of the digital universe. And as service delivery becomes increasingly business-critical, UEM solutions become one of the few ways that the user experience can be accurately quantified, prioritized, and optimized. 
 
This EMA white paper highlights the growing importance of the digital user experience in maintaining customer satisfaction, whether these "customers" are internal or external to the business. A survey conducted by EMA in July 2016 shows the value proposition of UEM solutions in ensuring high-quality delivery of complex digital services.



Report Summary - APM in the Digital Economy: What's Hot, What's Not, and What's on the Horizon

PUBLISHED: Wed, 19 Oct 2016 00:00:00 +0000
AUTHOR: Julie Craig

 
Full Report Abstract
This research report details the results of survey-based research conducted during the spring of 2016. It assessed the top challenges encountered by IT organizations as they adapt to the collective impacts of the consumer economy, the growth of the public cloud, the rise of abstraction in the form of "software-defined everything," and the growing importance of software as an agent of change. Survey topics covered technology usage, current management practices supporting production applications running on- and off- premises, software development/delivery practices, tooling requirements, and API usage. 

The survey also assessed APM requirements for companies of every size running a wide variety of application and transaction types. Questions covered virtually every "flavor" of Application Management and User Experience solutions, including synthetics, application-aware networking, Real User Monitoring (RUM), browser/code injection, endpoint monitoring, Application Discovery and Dependency Mapping (ADDM), APM platforms and suites, and on- and off-premises hosted solutions. The result is a comprehensive perspective on APM usage, requirements, gaps, and near-term APM-related purchasing plans.



Report Summary - Optimizing IT for Financial Performance

PUBLISHED: Wed, 19 Oct 2016 00:00:00 +0000
AUTHOR: Dennis Drogseth

This is a summary of the Optimizing IT for Financial Performance research report.

Full Report Abstract
This research targets a critical sector in the story of IT cost/value optimization: optimizing IT for financial performance. To investigate this issue, EMA brought together multiple areas that are not always linked. These include IT service management (ITSM), IT asset management (ITAM), and software asset management (SAM), as well as analytics, automation, service modeling, discovery investments, and IT-to-business data sharing and visualization. The impacts of cloud, agile, and digital transformation were also considered. The goal therefore was not to do an in-depth but isolated view of a single traditional market, but rather to understand broader priorities of what IT stakeholders, executives, and business leaders are looking for as they seek to understand OpEx and CapEx IT costs more dynamically and relate them to business outcomes and business values.



Optimizing IT for Financial Performance

PUBLISHED: Wed, 19 Oct 2016 00:00:00 +0000
AUTHOR: Dennis Drogseth

This research targets a critical sector in the story of IT cost/value optimization: optimizing IT for financial performance. To investigate this issue, EMA brought together multiple areas that are not always linked. These include IT service management (ITSM), IT asset management (ITAM), and software asset management (SAM), as well as analytics, automation, service modeling, discovery investments, and IT-to-business data sharing and visualization. The impacts of cloud, agile, and digital transformation were also considered. The goal therefore was not to do an in-depth but isolated view of a single traditional market, but rather to understand broader priorities of what IT stakeholders, executives, and business leaders are looking for as they seek to understand OpEx and CapEx IT costs more dynamically and relate them to business outcomes and business values.



Managing Apple Devices in a Windows World

PUBLISHED: Mon, 03 Oct 2016 00:00:00 +0000
AUTHOR: Steve Brasen

While Windows PCs continue to comprise the core of business end user computing solutions, Apple macOS computers and iOS mobile devices are increasingly being adopted to satisfy evolving workforce requirements and preferences. This accelerating environment heterogeneity has exponentially amplified administration challenges for device provisioning, maintenance, and problem management. In this white paper, EMA identifies the unique requirements essential to supporting Apple device users as well as the best practices and solutions that should be adopted to support macOS and iOS endpoints side-by-side with Windows-based devices.



Unify Your Infrastructure Management Systems for the Internet of Things

PUBLISHED: Thu, 29 Sep 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Most enterprise network infrastructure teams already provide connectivity to at least one Internet of Things (IoT) initiative, and many of them play a leading role in planning, implementing, and managing IoT projects. To succeed with these projects, networking teams will need management tools that give them visibility and control over IoT devices and applications. Some networking professionals may be tempted to buy new management tools to address IoT, but this approach may lead to more complexity. Instead, enterprises should consider extending their existing network management systems to support IoT. This paper explores these issues in detail and identifies one example of a network management product whose users are currently extending to IoT, Infosim StableNet.



Everything Crosses the Wire: How ExtraHop Unlocks the Strategic Value of Your Network

PUBLISHED: Mon, 19 Sep 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Too many enterprises have failed to recognize the network as a strategic asset that can provide unique insight into not just IT operations, but business operations, too. In a digital business, every transaction and every business process crosses the network as data in motion. IT operations has an opportunity to leverage this data flowing across the network to gain insight into business and IT operations in a way that hasn’t been possible before. The ExtraHop stream analytics platform unlocks the power of the network, transforming data in motion into rich wire data to deliver real-time visibility, insight, and control for the real-time enterprise.



Ensuring Application Performance Across Hybrid Environments

PUBLISHED: Mon, 19 Sep 2016 00:00:00 +0000
AUTHOR: Julie Craig

IT organizations are facing a "brave new world" of performance monitoring in which visibility to execution is dramatically reduced and performance characteristics which have traditionally been accessible and visible are no longer available. Tasked to be responsible for service quality in a world over which they have little visibility or control, IT organizations are increasingly being challenged to manage systems which their tools donít fully support. In short, incumbent toolsets simply lack the capacity to monitor beyond borders and "into the cloud."

This Enterprise Management Associates (EMA) white paper discusses APM in the context of hybrid cloud monitoring. It touches on ways to develop better visibility into the actual execution of cloud applications for the purposes of performance/availability management and to support root cause analysis. Finally, it introduces Riverbed's SteelCentral APM solution suite as a potential answer to the inherent challenges of efficiently managing hybrid cloud services.



2016 EMA Vendors to Watch: Network Management

PUBLISHED: Thu, 15 Sep 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2016 EMA Vendors to Watch in the Network Management field including:

Aviatrix
Mist Systems 



Report Summary - Next-Generation Wide-Area Networking

PUBLISHED: Tue, 16 Aug 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This is a summary of the EMA research report, "Next-Generation Wide-Area Networking."

Full Report Abstract 
Current technology and business trends are transforming how distributed enterprises build and manage their wide-area networks (WANs) and deliver applications and services to remote users. Big data, the cloud, and the Internet of Things are just a few of the technologies that are forcing these changes. Meanwhile, enterprises are growing their WANs. They are adding more remote sites to their networks and connecting more endpoint devices to those remote sites.

This research report examines how enterprise network infrastructure teams responsible for planning, building, and managing the WAN are responding to all of these pressures. This report examines how networking professionals are using software-defined WAN (SD-WAN) and network functions virtualization. It also examines in detail the enterprise migration from WAN connectivity via private managed services to public internet and wireless WAN technologies. Finally, it identifies which tools enterprises are using to monitor and manage their evolving WANs.



Why Unified Management Is Central to Operational Transformation

PUBLISHED: Mon, 08 Aug 2016 00:00:00 +0000
AUTHOR: Dennis Drogseth

With all the attention being given to digital transformation, too few in the industry seem to realize that digital, IT, and operational transformation must go hand in hand. This has become all the more apparent given the complexities and challenges of hybrid cloud and the need for more agile ways of supporting the deployment and delivery of IT services. This report leverages EMA's consulting and research on operational transformation, as well as trends in analytics and service management, to show why a unified approach to monitoring and management across domains is central to all transformational initiatives. It will also introduce ManageEngine's unique capabilities for unified management delivered by OpManager and its native add-ons and integrations. 



Digital Transformation: Will Your Legacy Network Management Tools Fail You?

PUBLISHED: Thu, 04 Aug 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Many enterprises are embarking on a digital transformation journey that will drive growth and complexity in their networks. They are adopting new technologies like software-defined data centers, software-defined wide-area networks, hybrid clouds, and the Internet of Things. Legacy network management tools will often struggle with these changes. IT organizations will need tools that can scale and adapt to evolving digital infrastructures. This white paper explores these issues in detail and examines how SevOne's Digital Infrastructure Management Platform addresses them.



The Rise of the Internet of Things: Connecting Our World One Device at a Time

PUBLISHED: Wed, 03 Aug 2016 00:00:00 +0000
AUTHOR: John Myers

The Internet of Things (IoT) is a growing concept in terms of exposure. There are new estimates as to the number of linked devices almost every quarter. Some of these estimates go as far to say that in within five years, we will see nearly 40 billion connected devices around the globe. That would mean over five connected devices for every man, woman, and child on the planet. IoT is growing in terms of implementation. With this growth in the number of connected devices, there is a wave of adoption to take advantage of these devices. If we can enable our vehicles via connect car initiatives, if we can enable our offices and homes as part of smart building strategies, if we can learn more about our health and medical treatments with bio-medical sensors, we can improve not just our businesses, the environment, and our lives. We can also develop disruptive new ways of looking at business models, energy production, distribution, and how to treat disease and improve quality of life. 

This research will discuss the recent Enterprise Management Associates (EMA) global end user study, looking at different aspects of Internet of Things -- especially strategies, implementations, and projects. The EMA research panel is a well-balanced group of IT and business professionals from around the world. This research is based on 250 panelists who have visibility into strategy, budget, and implementation associated with their IoT initiatives. As part of this research, EMA delved into some key industry segments: healthcare, manufacturing, retail, and transportation. Each of these groups provides a unique opportunity to utilize IoT architectures and IoT devices to add value into their organizations.



EMA Radar for All-Flash Storage: Q3 2016

PUBLISHED: Wed, 03 Aug 2016 00:00:00 +0000
AUTHOR: Jim Miller, Former EMA Analyst

Flash technology proves to be one of the most disruptive forces in the marketplace since virtualization. The technology resulted in a major shift of storage capacity from performance hard disk drives (HDD) to flash-based solutions. 

Flash storage evolved in three unique stages: application-specific performance, virtualization, and primary storage. Initially, flash was used specifically for business critical applications and use cases such as VDI. These initial systems were all provided by start-ups and were very expensive relative to traditional storage arrays. As virtualization expanded, flash use increased as a way to solve the bottleneck of consolidated servers utilizing oversubscribed storage systems. Now, as the price of flash declines, it is being used for tier 1 primary storage. There are multiple deployment options for flash, including server and network-based flash. All-flash systems are network-based, large capacity solutions that can be shared across multiple servers. Today, all primary storage vendors have all-flash storage offerings. This radar report explores the all-flash systems. 



Report Summary - EMA Radar for All-Flash Storage: Q3 2016

PUBLISHED: Tue, 02 Aug 2016 00:00:00 +0000
AUTHOR: Jim Miller, Former EMA Analyst


Full Report Abstract
Flash technology proves to be one of the most disruptive forces in the marketplace since virtualization. The technology resulted in a major shift of storage capacity from performance hard disk drives (HDD) to flash-based solutions. 

Flash storage evolved in three unique stages: application-specific performance, virtualization, and primary storage. Initially, flash was used specifically for business critical applications and use cases such as VDI. These initial systems were all provided by start-ups and were very expensive relative to traditional storage arrays. As virtualization expanded, flash use increased as a way to solve the bottleneck of consolidated servers utilizing oversubscribed storage systems. Now, as the price of flash declines, it is being used for tier 1 primary storage. There are multiple deployment options for flash, including server and network-based flash. All-flash systems are network-based, large capacity solutions that can be shared across multiple servers. Today, all primary storage vendors have all-flash storage offerings. This radar report explores the all-flash systems. 



Next-Generation Wide-Area Networking

PUBLISHED: Fri, 29 Jul 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Current technology and business trends are transforming how distributed enterprises build and manage their wide-area networks (WANs) and deliver applications and services to remote users. Big data, the cloud, and the Internet of Things are just a few of the technologies that are forcing these changes. Meanwhile, enterprises are growing their WANs. They are adding more remote sites to their networks and connecting more endpoint devices to those remote sites.

This research report examines how enterprise network infrastructure teams responsible for planning, building, and managing the WAN are responding to all of these pressures. This report examines how networking professionals are using software-defined WAN (SD-WAN) and network functions virtualization. It also examines in detail the enterprise migration from WAN connectivity via private managed services to public internet and wireless WAN technologies. Finally, it identifies which tools enterprises are using to monitor and manage their evolving WANs.



EMA Radar for Mobile Security Management (MSM)

PUBLISHED: Wed, 27 Jul 2016 00:00:00 +0000
AUTHOR: Steve Brasen

Mobile workers are demanding unprecedented access to enterprise applications, data, and IT services from their smartphones and tablets. Enabling increased accessibility to these resources, however, can place a business at risk if proper security protocols are not enforced. This requires advanced capabilities in identity management, threat detection, and data loss prevention. Mobile security management (MSM) provides the processes and solutions necessary for security business resources at their source, when in transit, and on remote devices. This Enterprise Management Associates (EMA) RADAR report identifies the twelve leading MSM platforms and empirically compares and grades them against a broad range of measurements to determine overall product strengths and cost efficiencies.



Report Summary - EMA Radar for Mobile Security Management (MSM)

PUBLISHED: Wed, 27 Jul 2016 00:00:00 +0000
AUTHOR: Steve Brasen


Full Report Abstract
Mobile workers are demanding unprecedented access to enterprise applications, data, and IT services from their smartphones and tablets. Enabling increased accessibility to these resources, however, can place a business at risk if proper security protocols are not enforced. This requires advanced capabilities in identity management, threat detection, and data loss prevention. Mobile security management (MSM) provides the processes and solutions necessary for security business resources at their source, when in transit, and on remote devices. This Enterprise Management Associates (EMA) RADAR report identifies the twelve leading MSM platforms and empirically compares and grades them against a broad range of measurements to determine overall product strengths and cost efficiencies.



Report Summary - The Rise of the Internet of Things: Connecting Our World One Device at a Time

PUBLISHED: Tue, 26 Jul 2016 00:00:00 +0000
AUTHOR: John Myers

The Internet of Things (IoT) is a growing concept in terms of exposure. There are new estimates as to the number of linked devices almost every quarter. Some of these estimates go as far to say that in within five years, we will see nearly 40 billion connected devices around the globe. That would mean over five connected devices for every man, woman, and child on the planet. IoT is growing in terms of implementation. With this growth in the number of connected devices, there is a wave of adoption to take advantage of these devices. If we can enable our vehicles via connect car initiatives, if we can enable our offices and homes as part of smart building strategies, if we can learn more about our health and medical treatments with bio-medical sensors, we can improve not just our businesses, the environment, and our lives. We can also develop disruptive new ways of looking at business models, energy production, distribution, and how to treat disease and improve quality of life. 

This research will discuss the recent Enterprise Management Associates (EMA) global end user study, looking at different aspects of Internet of Things -- especially strategies, implementations, and projects. The EMA research panel is a well-balanced group of IT and business professionals from around the world. This research is based on 250 panelists who have visibility into strategy, budget, and implementation associated with their IoT initiatives. As part of this research, EMA delved into some key industry segments: healthcare, manufacturing, retail, and transportation. Each of these groups provides a unique opportunity to utilize IoT architectures and IoT devices to add value into their organizations.



Digital Transformation: Why It's Here Now, and How to Make the Most of It

PUBLISHED: Mon, 18 Jul 2016 00:00:00 +0000
AUTHOR: Dennis Drogseth

In this report we examine the highlights of some unique research done for HP Enterprise in January 2016, as well as supplemental research done by EMA in August 2015 on digital and IT transformation. This report also introduces some of the highlights of HP Enterprise's IT Operations Management portfolio in context with the requirements of successful transformational initiatives. 



Cisco Report Summary - The Rise of the Internet of Things: Connecting Our World One Device at a Time

PUBLISHED: Mon, 18 Jul 2016 00:00:00 +0000
AUTHOR: John Myers

The Internet of Things (IoT) is a growing concept in terms of exposure. There are new estimates as to the number of linked devices almost every quarter. Some of these estimates go as far to say that in within five years, we will see nearly 40 billion connected devices around the globe. That would mean over five connected devices for every man, woman, and child on the planet. IoT is growing in terms of implementation. With this growth in the number of connected devices, there is a wave of adoption to take advantage of these devices. If we can enable our vehicles via connect car initiatives, if we can enable our offices and homes as part of smart building strategies, if we can learn more about our health and medical treatments with bio-medical sensors, we can improve not just our businesses, the environment, and our lives. We can also develop disruptive new ways of looking at business models, energy production, distribution, and how to treat disease and improve quality of life. 

This research will discuss the recent Enterprise Management Associates (EMA) global end user study, looking at different aspects of Internet of Things -- especially strategies, implementations, and projects. The EMA research panel is a well-balanced group of IT and business professionals from around the world. This research is based on 250 panelists who have visibility into strategy, budget, and implementation associated with their IoT initiatives. As part of this research, EMA delved into some key industry segments: healthcare, manufacturing, retail, and transportation. Each of these groups provides a unique opportunity to utilize IoT architectures and IoT devices to add value into their organizations.



2016 EMA Vendors to Watch: Security & Risk Management

PUBLISHED: Thu, 14 Jul 2016 00:00:00 +0000
AUTHOR: David Monahan

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2016 EMA Vendors to Watch in the Security & Risk Management field, including Tender Armor and Verodin.

Additional vendors will be added to this document throughout the year.



Speeding Analytics Success with Data Warehouse Automation Infobrief

PUBLISHED: Fri, 01 Jul 2016 00:00:00 +0000
AUTHOR: John Myers

Data warehouse automation is an approach that utilizes automation technology and reusable tools to lower costs, improve quality, and better manage complex data management environments. Data warehouse automation technology enhances the planning, analysis, design, implementation, maintenance, and change management of analytical environments such as data warehouses, data marts, and data vaults. Unfortunately, many analytical environment implementers consider the concept of data warehouse automation as a non-option when it comes to the implementation of analytical environments. With these fears in mind, Enterprise Management Associates (EMA) implemented an end-user research study to investigate the adoption of DWA strategies within the community of organizations implementing analytical environments such as data warehouses, the implementation of those practices in projects, and how successful projects are within the context of those higher-level strategies.



Hyperglance: Streamlined Operations via Management System Abstraction

PUBLISHED: Thu, 30 Jun 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

As enterprises adopt hybrid software-defined infrastructure, IT organizations need management tools that provide visibility and control over the entire infrastructure domain. With increased virtualization, new software-defined technologies, and multiple public and private clouds, the levels of abstraction in these enterprises are simply too complex for the sprawling management toolsets that many IT organizations have in place. Organizations need to find ways to consolidate visibility and management wherever they can. Hybrid infrastructure management vendor Hyperglance offers enterprises a visibility and control layer inspired by video game graphics. It can collect data from multiple technologies and domains and present it in one interactive view with live fault and performance information that IT teams can immediately take action on from within the tool.



Digital Transformation: Unified Infrastructure Management is Critical

PUBLISHED: Fri, 24 Jun 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

To support digital transformation IT organizations will be asked to adopt new technologies and architectures, including software-defined networking, hybrid clouds, and the Internet of Things. Many IT organizations are finding that their existing infrastructure monitoring tools do not fully support these technologies. While many IT professionals will be tempted to buy new tools to operationalize these technologies, they may benefit from adopting unified infrastructure monitoring tools that can be extended to support new digital infrastructure. This white paper explores these issues in detail and reviews the suitability of ScienceLogic, a leading provider of hybrid infrastructure monitoring, for addressing these management gaps.



CA Unified Infrastructure Management Deepens its Visibility Into Cloud and Hybrid IT With Comprehensive New Capabilities

PUBLISHED: Wed, 22 Jun 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Hybrid IT and cloud architectures are key enablers of digital transformation, but IT operation will need the right tools to assure applications and service performance in these new environments. Hybrid IT combines a variety of legacy and next-generation technologies, which presents a conundrum for the IT organization. Do they combine their existing management and monitoring tools with new tools that address new technologies like containers, cloud, and software-defined infrastructure? Or should they take a more unified approach to IT operations but extend their existing monitoring tools?

For the sake of efficiency and operational effectiveness, Enterprise Management Associates (EMA) recommends that IT organizations extend the visibility of their existing tools whenever possible. This paper explores a leading option for that approach. With its Unified Infrastructure Monitoring (CA UIM) solution, CA offers a hybrid IT monitoring platform with visibility into traditional  and next-generation technologies. CA UIM's modular architecture allows CA to extend visibility into new technologies on a continuous basis without reboots or software upgrades.



How Freshservice is Helping to Transform IT Service Management

PUBLISHED: Tue, 21 Jun 2016 00:00:00 +0000
AUTHOR: Dennis Drogseth

Unifying IT through a cost-effective, versatile approach to service management may sound like one of those stories that's too good to be true. But this report highlights just such an example--a Freshservice adoption that has energized a global transportation services company where IT services and business services 100% coincide. This report also looks at how Freshservice functionality fits in with IT service management (ITSM) market requirements, as a way of positioning both our case study and Freshservice itself in a broader industry context.



Transforming SME Network Operations With Paessler PRTG Network Monitor

PUBLISHED: Fri, 20 May 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Network managers at small and medium enterprises face many of the same challenges that their counterparts at large enterprises face, plus a few of their own. For instance, networking professionals at smaller companies often operate enterprise-grade technologies with fewer resources and smaller budgets. Therefore, these individuals need network availability and performance monitoring systems that are tailored to the technical requirements and business needs of small and medium enterprises. Enterprise Management Associates research has identified the key challenges that smaller companies face with network operations and identified the management tool capabilities that deliver the most value to these organizations. This white paper explores these findings and examines how Paessler PRTG Network Monitor, a leading network monitoring tool, addresses the unique needs of small and medium companies.



Report Summary - Effective BYOD Management: Empowering a Mobile Workforce

PUBLISHED: Thu, 05 May 2016 00:00:00 +0000
AUTHOR: Steve Brasen

This is a summary of the EMA research report, "Effective BYOD Management: Empowering a Mobile Workforce."

Full Report Abstract
Enterprise professionals are increasingly employing personally-owned smartphones, tablets, and laptops to perform business tasks. Even business-owned devices are commonly employed by users to perform personal tasks. Bring-your-own-device (BYOD) processes are increasingly being adopted to isolate, provision, secure, and support business applications, data, and services without limiting any employee's personal use of the devices. Common technologies employed to accomplish this include containerization, app wrapping, virtualization, and the deployment of dedicated secure applications. This EMA primary research report identifies emerging BYOD requirements and correlates the value of enterprise-class BYOD solutions to help organizations determine the best approaches for empowering end users, reducing costs, and meeting enterprise security requirements.



2016 EMA Vendors to Watch: Application Management

PUBLISHED: Thu, 05 May 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2016 EMA Vendors to Watch in the Application Management field including:

NS1



Effective BYOD Management: Empowering a Mobile Workforce

PUBLISHED: Wed, 04 May 2016 00:00:00 +0000
AUTHOR: Steve Brasen

Enterprise professionals are increasingly employing personally-owned smartphones, tablets, and laptops to perform business tasks. Even business-owned devices are commonly employed by users to perform personal tasks. Bring-your-own-device (BYOD) processes are increasingly being adopted to isolate, provision, secure, and support business applications, data, and services without limiting any employee's personal use of the devices. Common technologies employed to accomplish this include containerization, app wrapping, virtualization, and the deployment of dedicated secure applications. This EMA primary research report identifies emerging BYOD requirements and correlates the value of enterprise-class BYOD solutions to help organizations determine the best approaches for empowering end users, reducing costs, and meeting enterprise security requirements.



Report Summary - Network Management Megatrends 2016: Managing Networks in the Era of the Internet of Things, Hybrid Cloud, and Advanced Network Analytics

PUBLISHED: Tue, 26 Apr 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy


Full Report Abstract
Networks have always been essential to the success of IT as they serve as the connective tissue for all other elements of IT infrastructure and services. However, in recent years, enterprises have begun leveraging networks as competitive assets. Given this reality, the network is now held to a higher standard of availability and performance than ever before. The tools and practices that network management teams use to deliver quality network services are more important than ever. 

This ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) research report takes a detailed look at the current state of networks and network management. It examines several major areas of change and evolution affecting network management, or what EMA calls "megatrends." These megatrends include hybrid cloud networking, the Internet of Things, advanced network analytics, network management outsourcing, and network management tool consolidation.



Network Management Megatrends 2016: Managing Networks in the Era of the Internet of Things, Hybrid Cloud, and Advanced Network Analytics

PUBLISHED: Thu, 14 Apr 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Networks have always been essential to the success of IT as they serve as the connective tissue for all other elements of IT infrastructure and services. However, in recent years, enterprises have begun leveraging networks as competitive assets. Given this reality, the network is now held to a higher standard of availability and performance than ever before. The tools and practices that network management teams use to deliver quality network services are more important than ever. 

This ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) research report takes a detailed look at the current state of networks and network management. It examines several major areas of change and evolution affecting network management, or what EMA calls "megatrends." These megatrends include hybrid cloud networking, the Internet of Things, advanced network analytics, network management outsourcing, and network management tool consolidation. 



LightCyber Report Summary - Achieving High-Fidelity Security

PUBLISHED: Fri, 08 Apr 2016 00:00:00 +0000
AUTHOR: David Monahan

This is a summary document, prepared for LightCyber, of the EMA research report, "Achieving High-Fidelity Security."


Full Report Abstract
The "High-Fidelity" research project was created to understand more about organizations' data collection and use habits with regard to security. Specifically, the research focused on the collection and use of network and endpoint data and examined how these data types are used individually and in tandem to create an information stream that provides high-value telemetry to its users about their environments.

Both network and endpoint data can be highly valuable in identifying threats from breaches (incursions into a secured environment) and compromises (the extraction of private/sensitive data or information) as well as malicious and negligent insider activities. However, these two data sources have their own strengths and weaknesses. Endpoints may suffer from inoperative/inoperable agents or a lack of deployment. Network segments may not have monitoring systems turned on or even installed, or their log detail and collection settings may not be high enough to provide sufficient detail.

Even in the cases where both network and endpoint data sources are active and operating as designed, neither data type is perfect for all use cases. But together network and endpoint data create a greater visibility than either can individually. Here the whole is truly greater than the sum of its parts.

This report outlines issues with data collection and use and shows how these gaps can impact an organization's ability to maintain high-fidelity security.



Advanced IT Analytics: A Look at Real Adoptions in the Real World

PUBLISHED: Thu, 07 Apr 2016 00:00:00 +0000
AUTHOR: Dennis Drogseth

The industry is abuzz with a mix of enthusiasm and confusion as advanced analytics are becoming assimilated by IT organizations for a wide variety of use cases, from performance to change and capacity planning, financial optimization, security, and support for cloud and agile. Part of the confusion stems from industry attempts to define advanced analytics for IT -- what EMA calls "advanced IT analytics" (AIA) -- far too narrowly, either purely in terms of discrete technologies or else as simply "big data." Another reason for the confusion is that the more prevalent nomenclature tends to direct advanced analytics for IT purely as an enabler for operations, whereas the data in this report shows just the opposite is true. AIA, as EMA understands it, provides a unifying layer that may support many IT as well as business roles.

Rather than forcing a template of technologies or data sources on our respondents, this exploratory research let the "real world" of active AIA deployments define itself. Our primary requirements included the following:

• AIA should be cross-domain and not restricted to just network, systems, application, database, or even business outcomes.
• AIA should require assimilating many different sources, whether third-party monitoring tools, different data sources, or ideally both. 
• Over and above this data, AIA requires the application of advanced heuristics, such as machine learning, advanced correlation, anomaly detection, or predictive trending.

We also required that all our respondents be actively engaged in their AIA initiative, either as managers or hands-on contributors. 



Viavi Observer SightOps: Infrastructure Monitoring for the Cloud Era

PUBLISHED: Tue, 22 Mar 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Enterprises are migrating applications and services to the cloud, but they are not completely abandoning their internal IT infrastructure. Network operations will be tasked with monitoring and troubleshooting both internal infrastructure and external public cloud infrastructure. Given this reality, network operations must adjust their management tools and practices for a hybrid world where applications and services span private infrastructure and public clouds. 

Viavi Solutions has introduced Observer SightOps, a cross-domain infrastructure monitoring system with visibility into private cloud, their associated components like virtualized servers, and leading public cloud environments. SightOps offers network operations an option for unified monitoring and troubleshooting of hybrid infrastructure.



Analytics in the Cloud

PUBLISHED: Wed, 09 Mar 2016 00:00:00 +0000
AUTHOR: Lyndsay Wise

Cloud adoption has increased over the past several years. Starting with the use of Salesforce.com for customer relationship management, organizations have leveraged the cloud to provide platform, operational, and analytical support. These organizations have experienced the benefits of quicker time to implement, while analytics and business intelligence in the cloud have been slower to reach widespread acceptance. Now, organizations are taking advantage of platforms, data integration, and analytics offerings to address their analytics and business intelligence requirements.

To determine the status of Analytics and Business Intelligence in the Cloud, Enterprise Management Associates (EMA) embarked on an end-user research study to examine the current state of cloud-based analytics. For this research, EMA invited pre-qualified business stakeholders and information technology professionals to complete an extensive web-based survey. As part of the survey, 208 panelists responded to an invitation to provide their insights on cloud-based analytics and business intelligence strategies and implementation practices. To offer a neutral enterprise view, the respondent pool was also balanced. Business stakeholders represented 53% of respondents. Technologists accounted for 47% of the panel. The survey was executed in September 2015 with respondents from around the world including North America and Europe.



2016 EMA Vendors to Watch: Systems Management

PUBLISHED: Wed, 09 Mar 2016 00:00:00 +0000
AUTHOR: Steve Brasen

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2016 EMA Vendors to Watch in the Systems Management field including: 

Smith Micro



2016 EMA Vendors to Watch: Storage Management

PUBLISHED: Wed, 09 Mar 2016 00:00:00 +0000
AUTHOR: Jim Miller, Former EMA Analyst

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2016 EMA Vendors to Watch in the Storage Management field including:

Cohesity
Datera



Report Summary - Analytics in the Cloud

PUBLISHED: Wed, 09 Mar 2016 00:00:00 +0000
AUTHOR: Lyndsay Wise

This is a summary document of the EMA "Analytics in the Cloud"research report.

Full Report Abstract
Cloud adoption has increased over the past several years. Starting with the use of Salesforce.com for customer relationship management, organizations have leveraged the cloud to provide platform, operational, and analytical support. These organizations have experienced the benefits of quicker time to implement, while analytics and business intelligence in the cloud have been slower to reach widespread acceptance. Now, organizations are taking advantage of platforms, data integration, and analytics offerings to address their analytics and business intelligence requirements.

To determine the status of Analytics and Business Intelligence in the Cloud, Enterprise Management Associates (EMA) embarked on an end-user research study to examine the current state of cloud-based analytics. For this research, EMA invited pre-qualified business stakeholders and information technology professionals to complete an extensive web-based survey. As part of the survey, 208 panelists responded to an invitation to provide their insights on cloud-based analytics and business intelligence strategies and implementation practices. To offer a neutral enterprise view, the respondent pool was also balanced. Business stakeholders represented 53% of respondents. Technologists accounted for 47% of the panel. The survey was executed in September 2015 with respondents from around the world including North America and Europe.



EMA Radar for Workload Automation (WLA): Q1 2016

PUBLISHED: Tue, 08 Mar 2016 00:00:00 +0000
AUTHOR: Dan Twing

Hybrid cloud, DevOps, big data and digitalization are driving a need for more sophisticated workload automation, which underpins the consistent delivery of traditional and cutting edge workloads. Modern workloads require more sophistication; data is collected from a greater variety of sources, and the success or failure of job streams can be directly exposed to both business users and customers. Significant enhancements in workload automation (WLA) tools have been added in recent years to address these trends. This Enterprise Management Associates (EMA) RADAR report identifies the thirteen leading WLA platforms and empirically compares and grades them against a broad range of measurements to determine overall product strengths and cost efficiencies.

Evaluated solutions include:

1. Arcana
2. ASCI
3. Automic
4. BMC
5. CA Technologies
6. Cisco Systems
7. Flux
8. HelpSystems
9. IBM
10. MVP Software
11. SMA Solutions
12. Stonebranch
13. Vinzant



Report Summary - EMA Radar for Workload Automation (WLA): Q1 2016

PUBLISHED: Tue, 08 Mar 2016 00:00:00 +0000
AUTHOR: Dan Twing

 
Full Report Abstract
Hybrid cloud, DevOps, big data and digitalization are driving a need for more sophisticated workload automation, which underpins the consistent delivery of traditional and cutting edge workloads. Modern workloads require more sophistication; data is collected from a greater variety of sources, and the success or failure of job streams can be directly exposed to both business users and customers. Significant enhancements in workload automation (WLA) tools have been added in recent years to address these trends. This Enterprise Management Associates (EMA) RADAR report identifies the thirteen leading WLA platforms and empirically compares and grades them against a broad range of measurements to determine overall product strengths and cost efficiencies.

Evaluated solutions include:

1. Arcana
2. ASCI
3. Automic
4. BMC
5. CA Technologies
6. Cisco Systems
7. Flux
8. HelpSystems
9. IBM
10. MVP Software
11. SMA Solutions
12. Stonebranch
13. Vinzant



Master Data Management for Data-driven Organizations Key Findings - Prepared for Talend

PUBLISHED: Tue, 01 Mar 2016 00:00:00 +0000
AUTHOR: John Myers

Data-driven organizations are breaking down barriers to new and innovative markets via access to a higher level of information and leveraging that information at speeds that previous organizations could only dream of. At the core of this disruption is the ability to provide context to viewing habits, passenger and driver quality, and purchase history. All of these concepts require disruptive, data-driven organizations to have access to the most up-to-date metadata on customers, products, and locations, as well as a robust master data management (MDM) practice to leverage that information in the right places and at the right times.



Master Data Management for Data-driven Organizations Report Summary - Prepared for Talend

PUBLISHED: Tue, 01 Mar 2016 00:00:00 +0000
AUTHOR: John Myers

Data-driven organizations are breaking down barriers to new and innovative markets via access to a higher level of information and leveraging that information at speeds that previous organizations could only dream of. At the core of this disruption is the ability to provide context to viewing habits, passenger and driver quality, and purchase history. All of these concepts require disruptive, data-driven organizations to have access to the most up-to-date metadata on customers, products, and locations, as well as a robust master data management (MDM) practice to leverage that information in the right places and at the right times.



Achieving High-Fidelity Security

PUBLISHED: Wed, 17 Feb 2016 00:00:00 +0000
AUTHOR: David Monahan

The "High-Fidelity" research project was created to understand more about organizations' data collection and use habits with regard to security. Specifically, the research focused on the collection and use of network and endpoint data and examined how these data types are used individually and in tandem to create an information stream that provides high-value telemetry to its users about their environments.

Both network and endpoint data can be highly valuable in identifying threats from breaches (incursions into a secured environment) and compromises (the extraction of private/sensitive data or information) as well as malicious and negligent insider activities. However, these two data sources have their own strengths and weaknesses. Endpoints may suffer from inoperative/inoperable agents or a lack of deployment. Network segments may not have monitoring systems turned on or even installed, or their log detail and collection settings may not be high enough to provide sufficient detail.

Even in the cases where both network and endpoint data sources are active and operating as designed, neither data type is perfect for all use cases. But together network and endpoint data create a greater visibility than either can individually. Here the whole is truly greater than the sum of its parts.

This report outlines issues with data collection and use and shows how these gaps can impact an organization's ability to maintain high-fidelity security.



Closing SDN and NFV Management Gaps for Communication Service Providers with CA Virtual Network Assurance

PUBLISHED: Wed, 17 Feb 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Enterprise Management Associates (EMA) research has revealed that communications service providers that have adopted software-defined networking (SDN) and network functions virtualization (NFV) lack the tools they need to manage these new networks. Unless they modify or replace their operations support and readiness tools and service assurance systems, these communications service providers will fail to gain a return on investment with SDN and NFV. CA Technologies has introduced Virtual Network Assurance, a software gateway that SDN- and NFV-enables its leading network management products. 


     

Subscribe Now!


Subscribe with My Yahoo!

Subscribe with NewsGator

Subscribe with My AOL

Subscribe with Bloglines

Subscribe with Netvibes

Subscribe with Google

EMA on Facebook   EMA on LinkedIn   EMA on Twitter   EMA RSS   EMA on YouTube

©1996-2017 Enterprise Management Associates, Inc. All rights reserved.
EMA™, ENTERPRISE MANAGEMENT ASSOCIATES®, and the mobius symbol are registered trademarks or common-law trademarks of Enterprise Management Associates, Inc.
Site Terms & Conditions | Integrity Policy | Site Map | My Account
Hide
Subscribe to EMA RSS Feed
Email
Show