IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING

CONTACT    SIGN IN    SIGN UP
    

Free RSS Feeds from Enterprise Management Associates (EMA)

Stay up to date on the latest IT and data management information from EMA, including Webinars, Radar Reports, white papers, impact briefs, advisory notes and more!

Select your preferred reader by selecting an icon on the right.



Current Feed Content:




Report Summary - Managing Tomorrow's Networks: The Impacts of SDN and Network Virtualization on Network Management

PUBLISHED: Thu, 28 Jan 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This is a summary of the Enterprise Management Associates (EMA) research report, "Managing Tomorrow's Networks: The Impacts of SDN and Network Virtualization on Network Management."

Full Report Abstract
Software-defined networking (SDN) has the potential to be the most disruptive technology the networking industry has seen in a generation. While SDN and related technologies, such as network virtualization and network functions virtualization (NFV), offer both enterprises and network service providers the opportunity to make their networks more agile, automated, and transformative for the business, there are many unanswered questions. For instance, we don't fully understand how networking organizations will engineer and operationalize SDN. Furthermore, it is becoming quite clear that existing network management tools and practices are not fully prepared to support these new architectures.

This research study explores these issues in detail. EMA has surveyed early SDN adopters among enterprises and network service providers to understand how organizations are using SDN, network virtualization, and NFV. More importantly, this study reveals just how prepared these early adopters are to manage these technologies. It assesses the readiness of enterprises to manage data-center SDN underlays and overlays, software-defined WAN, campus SDN, and enterprise NFV. The research also reveals the abilities of network service providers to manage SDN and NFV in their telco networks.

As this report will demonstrate, the majority of enterprises and service providers have discovered that their existing network engineering, monitoring, and troubleshooting tools do not fully support SDN, NFV, and network virtualization. This EMA research report identifies the functional requirements that SDN adopters want added to their management systems. It also explores the use cases, benefits, and organizational impacts of SDN adoption. 



Omnichannel, Microservices, and "Modern" Applications: How are YOU Managing User Perceptions and the Customer Experience?

PUBLISHED: Thu, 28 Jan 2016 00:00:00 +0000
AUTHOR: Julie Craig

This Enterprise Management Associates white paper explores the challenges and benefits of delivering complex applications in an omnichannel landscape. It explores application delivery from the customer, corporate, and Line of Business (LOB) perspectives, with a focus on tools-driven automation supporting the delivery of complex applications at the high levels of quality that businesses demand and customers expect. Finally, it highlights the ways in which CA Technologies is building support for modern application delivery patterns into its product line, addressing the needs of modern IT organizations in a complex, customer-driven business climate.



Real-Time Network Telemetry Is Essential to SDN Management and Orchestration

PUBLISHED: Fri, 22 Jan 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Software-defined networking (SDN) introduces unprecedented dynamism and virtualization to the core networks of communications service providers (CSPs) and very large enterprises. Given that CSPs use management systems that were designed to operate and maintain static, hardware-centric network infrastructure, network operators are discovering that their existing toolsets aren't ready to support SDN. They need new tools with real-time visibility and analytics that can help them validate that the highly programmable SDN technologies they are implementing are actually helping them achieve their network transformation objectives. Packet Design is leveraging its heritage as a route analytics innovator to deliver an SDN management and orchestration solution to CSPs and large enterprises.



Insights Across the Hybrid Enterprise: Big Data 2015 Research Summary for Teradata

PUBLISHED: Wed, 13 Jan 2016 00:00:00 +0000
AUTHOR: John Myers

Since its inception, the concept of "big data" has been widely associated with a single data management platform: Hadoop. This connection may be due to the popularity of the use of the Hadoop platform to store and process large amounts of multistructured data. However, Hadoop is not the only answer to the question of "what is big data?"

As was explored in the inaugural EMA/9sight survey in 2012, big data is both a way to look at new sources of data and how organizations place that information under management. Big data has attracted a wide range of application innovators as well as many protesters against the dominance of relational databases and data warehouses. The EMA/9sight surveys use a deliberately broad definition of big data to inspire end users to think beyond the box of Hadoop. The survey explores the wide range of ways in which nontraditional data, often in combination with more traditional types, has enabled new or improved business processes. As was established in previous studies in 2012 and 2013 and again in 2014, big data offers a wide range of possibilities, but the name "big data" itself keeps media and industry eyes focused on size as the defining feature.



Managing Tomorrow's Networks: The Impacts of SDN and Network Virtualization on Network Management

PUBLISHED: Mon, 11 Jan 2016 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Software-defined networking (SDN) has the potential to be the most disruptive technology the networking industry has seen in a generation. While SDN and related technologies, such as network virtualization and network functions virtualization (NFV), offer both enterprises and network service providers the opportunity to make their networks more agile, automated, and transformative for the business, there are many unanswered questions. For instance, we don't fully understand how networking organizations will engineer and operationalize SDN. Furthermore, it is becoming quite clear that existing network management tools and practices are not fully prepared to support these new architectures.

This research study explores these issues in detail. EMA has surveyed early SDN adopters among enterprises and network service providers to understand how organizations are using SDN, network virtualization, and NFV. More importantly, this study reveals just how prepared these early adopters are to manage these technologies. It assesses the readiness of enterprises to manage data-center SDN underlays and overlays, software-defined WAN, campus SDN, and enterprise NFV. The research also reveals the abilities of network service providers to manage SDN and NFV in their telco networks.

As this report will demonstrate, the majority of enterprises and service providers have discovered that their existing network engineering, monitoring, and troubleshooting tools do not fully support SDN, NFV, and network virtualization. This EMA research report identifies the functional requirements that SDN adopters want added to their management systems. It also explores the use cases, benefits, and organizational impacts of SDN adoption. 



EMA Radar for Mobile Device Management (MDM): Q1 2016

PUBLISHED: Mon, 28 Dec 2015 00:00:00 +0000
AUTHOR: Steve Brasen

Productivity with an increasingly mobile workforce is dependent on the reliability and performance of portable devices -- including smartphones and tablets -- to access and run business applications while still meeting business requirements for security and compliance. Mobile device management (MDM) provides the endpoint-focused processes and solutions for accelerating user productivity and device reliability. This Enterprise Management Associates (EMA) RADAR report identifies the sixteen leading MDM platforms and empirically compares and grades them against a broad range of measurements to determine overall product strengths and cost efficiencies.



Report Summary - EMA Radar for Mobile Device Management (MDM): Q1 2016

PUBLISHED: Mon, 28 Dec 2015 00:00:00 +0000
AUTHOR: Steve Brasen

This is a summary of the EMA Radar for Mobile Device Management (MDM): Q1 2016.


Full Report Abstract
Productivity with an increasingly mobile workforce is dependent on the reliability and performance of portable devices -- including smartphones and tablets -- to access and run business applications while still meeting business requirements for security and compliance. Mobile device management (MDM) provides the endpoint-focused processes and solutions for accelerating user productivity and device reliability. This Enterprise Management Associates (EMA) RADAR report identifies the sixteen leading MDM platforms and empirically compares and grades them against a broad range of measurements to determine overall product strengths and cost efficiencies.



Automating for Digital Transformation: Tools-Driven DevOps and Continuous Software Delivery in the Enterprise

PUBLISHED: Tue, 15 Dec 2015 00:00:00 +0000
AUTHOR: Julie Craig

This Enterprise Management Associates (EMA) research report builds on EMA's earlier research on these same topics. It reflects the findings of survey data gathered during the month of October, 2015 from technology professionals "on the front lines" of application delivery. It assesses the degree of alignment between IT and business, uncovers best practices for DevOps and Continuous Delivery in high performing companies, and evaluates the role of tools in promoting a growing Digital Economy. Finally, it identifies the links between both DevOps and Continuous Delivery and revenue growth and reveals the top "wish list" tools in these spaces for 2016.



Report Summary - Automating for Digital Transformation: Tools-Driven DevOps and Continuous Software Delivery in the Enterprise

PUBLISHED: Tue, 15 Dec 2015 00:00:00 +0000
AUTHOR: Julie Craig

This is a summary of the EMA research report, "Automating for Digital Transformation: Tools-Driven DevOps and Continuous Software Delivery in the Enterprise."


Full Report Abstract
This Enterprise Management Associates (EMA) research report builds on EMA's earlier research on these same topics. It reflects the findings of survey data gathered during the month of October, 2015 from technology professionals ìon the front linesî of application delivery. It assesses the degree of alignment between IT and business, uncovers best practices for DevOps and Continuous Delivery in high performing companies, and evaluates the role of tools in promoting a growing Digital Economy. Finally, it identifies the links between both DevOps and Continuous Delivery and revenue growth and reveals the top "wish list" tools in these spaces for 2016.



Hyperglance: Streamlined Operations via Management System Abstraction

PUBLISHED: Fri, 04 Dec 2015 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

As enterprises adopt hybrid software-defined infrastructure, IT organizations need management tools that provide visibility and control over the entire infrastructure domain. With increased virtualization, new software-defined technologies, and multiple public and private clouds, the levels of abstraction in these enterprises are simply too complex for the sprawling management toolsets that many IT organizations have in place. Organizations need to find ways to consolidate visibility and management wherever they can. Hybrid infrastructure management vendor Hyperglance offers enterprises a visibility and control layer inspired by video game graphics. It can collect data from multiple technologies and domains and present it in one interactive view with live fault and performance information that IT teams can immediately take action on from within the tool.



IBM Rolls Out Smart IT Solutions with Runbook Automation and Alert Notification Services

PUBLISHED: Fri, 04 Dec 2015 00:00:00 +0000
AUTHOR: Dennis Drogseth

The notion that IT organizations are at a pivotal point in their evolution has almost become a cliché.  Terms like "cloud," "mobile," "agile," and "digital transformation" are among the phrases that often herald how and why IT must change. 

However, what's too often neglected in all the glitz and hype is the need to combine accessible, enabling technological advances with a well-thought-out human interface, along with process values and a clear understanding of role-related and organizational needs. Indeed, in EMA's recent research on digital and IT transformation, issues in organization, process, and dialog trumped technology-specific roadblocks for both business and IT stakeholders. And when it came to metrics, availability and performance stood out as the top concerns for all roles. After all, it’s hard for a service to be transformative when it’s not there!

It's therefore with delight that EMA has had the privilege of reviewing IBM's new offerings for runbook automation and alert notification. The two solutions are meaningfully intertwined with an eye to clear benefit-driven parameters, and both offer what might be called an "IT-smart" approach to building new levels of effectiveness in IT operations, as well as improved efficiencies between operations and the service desk.



Informatica Cloud Security Architecture Overview

PUBLISHED: Thu, 03 Dec 2015 00:00:00 +0000
AUTHOR: David Monahan

Today's cloud market is often a fragmented place, where applications and data may each exist in multiple platforms anywhere in the world, and where security is often perceived as works in progress. IT teams are frequently supporting a mix of on-premises and cloud applications, along with cloud integration services. Petabytes of confidential information are moving among these cloud applications, and the security practices and safeguards for data is often suspect. Without the proper security program in place by both the data owner and the cloud service provider it is possible for data to be leaked or compromised at multiple points in the data lifecycle from users and their endpoints to the servers in a hosted data center, across communication lines out to the cloud, within the cloud environment or in return transmission to users.  

As organizations adopt and internally implement an ever increasing number of cloud applications, Informatica has stepped up to provide cohesive security and protection required by CSOs to protect business critical data. Informatica Cloud brings cloud, on-premises, relational, and big data together for better value and easier management. Informatica provides thorough cloud security throughout the data lifecycle with its web-based application. Informatica has created a layered, holistic security structure that is resistant against attack and resilient against failure. These possible security challenges found throughout the infrastructure include data transmission, data standards and connectivity, data governance and audit compliance.



Unified Performance Management: Moving Beyond the Silos

PUBLISHED: Mon, 23 Nov 2015 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Enterprises are adopting hybrid clouds and software-defined infrastructure to accelerate their ability to deliver scalable applications in a very competitive business environment. These new architectures are extremely complex, which is forcing IT organizations to establish multidisciplinary cross-domain operations teams to support them. These teams need unified performance management and service assurance platforms that encourage collaboration and provide cross-domain operational visibility. Riverbed SteelCentral Platform is an example of a management system that combines application performance management (APM), network performance management (NPM) and network configuration management into a unified solution that helps IT operations support application delivery more effectively and efficiently.



Analytics in the Cloud Research Summary for SAP

PUBLISHED: Mon, 16 Nov 2015 00:00:00 +0000
AUTHOR: John Myers

Cloud-based applications have been mainstream since Salesforce.com brought customer relationship management to the masses in the 2000s. Cloud implementations had the advantage of providing faster time to provisioning and a significantly different cost structure from traditional software implementations based on on-premises installations. However, analytics and business intelligence in the cloud were slower to reach widespread acceptance. First, analytical and business intelligence applications have different data schema implementations from traditional operational applications. These applications can be uniquely configured for individual organizations and are often more difficult to implement on a mass basis than they might be for an operational system.

To determine the status of Analytics and Business Intelligence in the Cloud, Enterprise Management Associates (EMA) embarked on an end-user research study to look at the current state of cloud-based analytics. For this research, EMA invited pre-qualified business stakeholders and information technology professionals to complete an extensive web-based survey. As part of the survey, 257 panelists responded to an invitation to provide their insights on cloud-based analytics and business intelligence strategies and implementation practices. To offer a neutral enterprise view, the respondent pool was also balanced. Business stakeholders represented 44% of respondents. Technologists were 56% of the panel. The survey was executed in November 2014 with respondents from around the world including North America and Europe.



2015 EMA Vendors to Watch: Network Management

PUBLISHED: Fri, 13 Nov 2015 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2015 EMA Vendors to Watch in the Network Management field including:

Arkin
Avi Networks
Dispersive Technologies
Kentik
Real Status
Teridion
VeloCloud
YOTTAA 



Advanced Security Analytics in Achieving Continuous Security Intelligence

PUBLISHED: Tue, 03 Nov 2015 00:00:00 +0000
AUTHOR: David Monahan

Information Security has always been a large producer and consumer of data. More sophisticated best practices and expanding compliance and regulatory requirements have almost exponentially accelerated the production and consumption of data. Event and activity logs have grown to Big Data proportions and the diversity of data being consumed has become significantly more varied. As the need for continuous security intelligence and accelerated incident response increases, traditional log and event management tools and monitoring practices are becoming increasingly insufficient.

IT and Security are deluged with thousands of alerts daily, a majority of which appear to be critical, making response an insurmountable task with affordable staff levels and traditional tools. With so many critical alerts, they have moved from the analogy of finding the needle in the haystack to identifying and prioritizing THE needle in the stack of needles.

The era of Big Data has begun demonstrating to information security that there is more that can, and must, be done to identify threats, reduce risk, address fraud and improve compliance monitoring activities by bringing better context to data creating information for actionable intelligence. 

This research studies how both management and operations level IT and information security practitioners perceive the change in the volume and types of data available and the tools needed to provide analysis to generate actionable threat intelligence. 

Advanced security analytics provide new adaptive algorithms called Machine Learning and Big Data analysis techniques that can be utilized to identify abstract data relationships, anomalies, trends, fraudulent and other behavioral patterns, creating information where only data existed. The era of Big Data is driving the next technology evolution. 

Security analytics, though a relatively new field of technology, is the next step in detection and response technology, with possible impacts on prevention as well. Machine-learning algorithms and analysis techniques have advanced far beyond the capabilities of what was available in the commercial markets only 2-3 years ago. They also address the issue dubbed "We don’t know what we don't know." Security analytics' core function is to monitor and collect vast amounts of information from the environment to identify threats that indicate elevated risk and ultimately prevent lateral spread of those threats and data exfiltration. To succeed in this endeavor, the analytics platform performs the identification of threats and prioritization of threats without the requirement for the administrators and analysts to create policies or rules.

Security analytics tools provide practitioners a means to meet their needs for continuous actionable security intelligence to provide timely response to attacks to prevent attacks from becoming breaches.



Overcoming the Top 5 Challenges to Windows 10 Adoption

PUBLISHED: Mon, 02 Nov 2015 00:00:00 +0000
AUTHOR: Steve Brasen

The introduction of Windows 10 promises a wealth of advantages for enhancing user experiences. Most notably, it unifies the operating environment across mobile and PC endpoints. However, organizations faced with performing mass migrations to the new platforms face a number of significant challenges. Revealed in this EMA white paper are the top 5 challenges to the enterprise adoption of Windows 10 and the prescriptive identification of solutions that will ensure simplified, reliable, and cost-effective migration processes.



2015 EMA Vendors to Watch: Storage Management

PUBLISHED: Fri, 16 Oct 2015 00:00:00 +0000
AUTHOR: Jim Miller

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2015 EMA Vendors to Watch in the Storage Management field including:

A3CUBE
Catalogic
ioFABRIC
Unitrends
XOcur



Automic Continuous Delivery for Siebel: Pain Relief for Siebel Agility Headaches

PUBLISHED: Tue, 13 Oct 2015 00:00:00 +0000
AUTHOR: Julie Craig

Recently, Automic has augmented its flagship Automic Release Automation product (ARA) with a new set of capabilities and templates supporting the unique architectural, operational, and administrative aspects of Oracle's Siebel Customer Relationship Management (CRM) solution. Automic Continuous Delivery for Siebel enables development teams to deliver Siebel-specific upgrades and modifications at a level of agility commensurate with that of the web applications and mobile ìappsî that interoperate with Siebel code and data.

This Enterprise Management Associates (EMA) white paper details the capabilities of this new solution and its value proposition for companies seeking to accelerate Continuous Delivery in Siebel environments.



Report Summary - Security Awareness Training: Are We Getting Any Better at Organizational and Internet Security?

PUBLISHED: Tue, 06 Oct 2015 00:00:00 +0000
AUTHOR: David Monahan


Full Report Abstract
2014 was dubbed "the year of the breach" as over a billion consumer records across nearly every industry vertical worldwide were exposed, costing billions of dollars in recovery costs and lost revenue for the affected organizations. Though this was a tough wake-up call, many organizations have seen that technology, though a necessary part of a security strategy, is not able to fully prevent breaches. They see that people are now most often the weakest link in security defense. At the same time, the old strategies of locking down everything so people cannot possibly cause a problem increases worker and business friction to a point that is unacceptable to both, putting security programs, and the security personnel, at-risk. To achieve both security and usability, security teams must create a change in the mentality and even business culture that by making personnel more aware of and vigilant against the various attacks they face on a near daily basis.

For the 2015 Security Awareness Training: Are We Getting Any Better at Organizational and Internet Security? report, EMA surveyed nearly 600 people in North America across the small-to-medium businesses (SMB), midmarket, and enterprise spaces. Respondents represented line of business, IT, and security/fraud/risk across major verticals including education, finance/banking/insurance, government/nonprofit, health care/medical/pharma, retail, and utilities/infrastructure. 

The research revealed that a tremendous shift in awareness training programs has taken place, especially across the previously underserved SMB space. While in 2014 56% of individuals reported they had not received any training from their organizations, in 2015, 59% indicated they had now received some level of training. Many positive trends continued in the research showing the following.

** Training content is becoming more accessible to organizations of all sizes from both a delivery and cost perspective.
** Programs are becoming more effective and have better measurement and management capabilities.
** Due to training, employees are better at recognizing various forms of social engineering.
** Trained personnel recognize that they make better security choices at home as well as at work, further increasing the value of training.

Through awareness, as a collective corporate and Internet populace we are becoming more diligent in detecting and avoiding compromise by social engineering methods, especially phishing attacks. However, attackers are constantly honing their skills and adapting their attack methods. Only through continued diligence and expansion can we be successful in the long run. Program content and delivery must change to include new attack methods and programs must continue to expand to train the other 41% that have not received training as of yet.



Digital and IT Transformation: A Global View of Trends and Requirements

PUBLISHED: Wed, 30 Sep 2015 00:00:00 +0000
AUTHOR: Dennis Drogseth

The world of IT services and the world of business or organizational services are coming together as never before. This is true both in terms of the magnitude of the impacts on IT culture and organization, and in terms of the variety of ways that IT services, digital services, and business services are becoming a single interconnected continuum. The two key drivers for this transformation are actually intertwined--the fact that digital services are impacting, and in many cases recreating, entire business models is not at all unrelated to the emergence of a new population of consumers that are far more inclined to view digital services as a part of their everyday lives. 

The term most often applied to this transition as viewed from a business perspective is "digital transformation." When an organization is focused on IT becoming more effective in and of itself in support of the business, the term most typically used has been "IT transformation."  

In order to provide a data-driven foundation for addressing the many challenges described above, Enterprise Management Associates (EMA) undertook research targeting digital and IT transformation. Our goal was to discover what the truth really is surrounding these critical (and sometimes overused) terms. To optimize the depth and value of this unique research, EMA partnered with the IT Transformation Institute.



Report Summary - Digital and IT Transformation: A Global View of Trends and Requirements

PUBLISHED: Wed, 30 Sep 2015 00:00:00 +0000
AUTHOR: Dennis Drogseth

This is a summary of the EMA research report, Digital and IT Transformation: A Global View of Trends and Requirements.

Full Report Abstract
The world of IT services and the world of business or organizational services are coming together as never before. This is true both in terms of the magnitude of the impacts on IT culture and organization, and in terms of the variety of ways that IT services, digital services, and business services are becoming a single interconnected continuum. The two key drivers for this transformation are actually intertwined--the fact that digital services are impacting, and in many cases recreating, entire business models is not at all unrelated to the emergence of a new population of consumers that are far more inclined to view digital services as a part of their everyday lives. 

The term most often applied to this transition as viewed from a business perspective is "digital transformation." When an organization is focused on IT becoming more effective in and of itself in support of the business, the term most typically used has been "IT transformation."  

In order to provide a data-driven foundation for addressing the many challenges described above, Enterprise Management Associates (EMA) undertook research targeting digital and IT transformation. Our goal was to discover what the truth really is surrounding these critical (and sometimes overused) terms. To optimize the depth and value of this unique research, EMA partnered with the IT Transformation Institute.



2015 EMA Vendors to Watch: Hybrid Cloud & Infrastructure Management Research (HCIM)

PUBLISHED: Fri, 25 Sep 2015 00:00:00 +0000
AUTHOR: Dan Twing

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2015 EMA Vendors to Watch in the Hybrid Cloud & Infrastructure Management Research (HCIM) field including: 

Sysdig
ZeroStack



Copy Data Management, An Economic Impact Analysis

PUBLISHED: Tue, 22 Sep 2015 00:00:00 +0000
AUTHOR: Jim Miller

Storage is now the leading consumer of the IT budget in most enterprises. A large contributor to storage costs is the number of data copies needed for the many mission-critical functions that IT handles such as data protection, business analytics and test development. A copy data management solution can bring efficiencies to the copy data management function, while improving IT's ability to meet its service level agreements (SLAs) and other commitments to the business. Catalogic's ECX extends beyond traditional copy data management solutions, allowing the IT team to manage the process of copy creation, and to orchestrate the use of copy data in support of the various functions that require it. ECX is unique in that it is designed to plug into the existing virtualization and storage technologies that are already deployed in the data center, rather than requiring the deployment of net new infrastructure. This has the potential to yield significant ROI to the IT organization and can deliver costs savings measured in millions of dollars over brief time horizons. This paper identifies and quantifies the cost savings realized from ECX, using a hypothetical IT environment for a medium-to-large business.  While the paper quantifies the costs for a specific environment, the results can be extrapolated up or down to predict cost savings for other organizations



Report Summary - EMA Research Report: Data-Driven Security Reloaded: A Look into Data and Tools Used for Prevention Detection and Response

PUBLISHED: Mon, 21 Sep 2015 00:00:00 +0000
AUTHOR: David Monahan


Full Report Abstract
Security professionals often wrestle with the unknown, struggling with a daunting array of exposures and threats. They are not trying to identify the needle in the haystack but the needle in the stack of needles. Each activity within a network, system, or application may be "the one" that indicates an Advanced Persistent Threat (APT) has taken hold or an insider has gone rogue and requires a response. But how do they know which one is the one?

In most cases, the key to success is not just more data but better data -- data that provides context to improve incident analysis and, therefore, appropriate and timely response. Better data can also help security teams to be more proactive. Accurate and timely information in the volumes collected today, however, is not manageable by human hands and eyes alone. Security professionals need the tools that allow them to identify the how and where attacks succeed in overcoming defenses.

In the update to the 2014 Evolution of Data-Driven Security study, Enterprise Management Associates (EMA) returns with updated research that encompasses the insight of over 200 IT and security practitioners and management worldwide, ranging from the SMBs to the enterprise markets across key industry verticals including financial, retail, federal government & aerospace, local government, technology, manufacturing, and utilities & infrastructure. EMA explores how data-driven security continues to evolve security tactics looking at 18 different categories of security tools to understand security management and strategy, and the data sources fueling those efforts.

Some of the questions this new research will answer include:
  • How is the data explosion affecting security prevention, detection, and response?
  • What are the best tools of gaining context for security alerts?
  • Which is more important for gaining context, endpoint data or
  • network data?
  • Which types of data and tools are most useful for improving prevention?
  • Which types of data and tools are most useful for improving detection?
  • Which types of data and tools are most useful for improving response?
  • What are the preferred tools and data for data analysis?



Security Awareness Training: Are We Getting Any Better at Organizational and Internet Security?

PUBLISHED: Tue, 15 Sep 2015 00:00:00 +0000
AUTHOR: David Monahan

2014 was dubbed "the year of the breach" as over a billion consumer records across nearly every industry vertical worldwide were exposed, costing billions of dollars in recovery costs and lost revenue for the affected organizations. Though this was a tough wake-up call, many organizations have seen that technology, though a necessary part of a security strategy, is not able to fully prevent breaches. They see that people are now most often the weakest link in security defense. At the same time, the old strategies of locking down everything so people cannot possibly cause a problem increases worker and business friction to a point that is unacceptable to both, putting security programs, and the security personnel, at-risk. To achieve both security and usability, security teams must create a change in the mentality and even business culture that by making personnel more aware of and vigilant against the various attacks they face on a near daily basis.

For the 2015 Security Awareness Training: Are We Getting Any Better at Organizational and Internet Security? report, EMA surveyed nearly 600 people in North America across the small-to-medium businesses (SMB), midmarket, and enterprise spaces. Respondents represented line of business, IT, and security/fraud/risk across major verticals including education, finance/banking/insurance, government/nonprofit, health care/medical/pharma, retail, and utilities/infrastructure. 

The research revealed that a tremendous shift in awareness training programs has taken place, especially across the previously underserved SMB space. While in 2014 56% of individuals reported they had not received any training from their organizations, in 2015, 59% indicated they had now received some level of training. Many positive trends continued in the research showing the following.

** Training content is becoming more accessible to organizations of all sizes from both a delivery and cost perspective.
** Programs are becoming more effective and have better measurement and management capabilities.
** Due to training, employees are better at recognizing various forms of social engineering.
** Trained personnel recognize that they make better security choices at home as well as at work, further increasing the value of training.

Through awareness, as a collective corporate and Internet populace we are becoming more diligent in detecting and avoiding compromise by social engineering methods, especially phishing attacks. However, attackers are constantly honing their skills and adapting their attack methods. Only through continued diligence and expansion can we be successful in the long run. Program content and delivery must change to include new attack methods and programs must continue to expand to train the other 41% that have not received training as of yet.



OpenStack Demands New Approach to Application Delivery: Self-Service, Multitenancy, Elastic Scale, and Guaranteed Application Performance

PUBLISHED: Mon, 14 Sep 2015 00:00:00 +0000
AUTHOR: Tracy Corbo, Former EMA Analyst

For any organization that wishes to control its cloud infrastructure without getting locked into a vendor-specific cloud universe, OpenStack offers an ideal foundation for building a flexible cloud ecosystem. At its heart, OpenStack provides a set of open cloud computing services that can run on standard commodity hardware. In building out that cloud infrastructure, however, it is critical to work both visibility and application delivery into the design. Traditional methods for handling application delivery, such as load balancers (LBs) and application delivery controllers (ADCs), were designed for on-premise data centers and fell into the domain of the network administrators. Cloud computing represents a fundamental shift in both operational and administrative models. Cloud computing has moved the compute component from a dedicated application-to-fixed infrastructure model to one that is based on a detached set of pooled resources shared across multiple applications requiring minimal hands-on intervention from networking experts. Consequently, traditional methods for monitoring, troubleshooting, and optimizing application delivery are not effective in this new cloud paradigm. This white paper examines the challenges of guaranteeing application performance in OpenStack-based cloud environments and looks at new alternatives to traditional application delivery solutions.



LiveAction: The Visibility Assurance Solution for Cisco Intelligent WAN

PUBLISHED: Fri, 11 Sep 2015 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

With its support of advanced Cisco technologies like Performance Routing and Application Visibility and Control, network performance management vendor LiveAction provides critical visibility and service assurance capabilities to Intelligent WAN (IWAN), Cisco's software-defined WAN (SD-WAN) solution. In general, SD-WAN solutions like IWAN introduce new and powerful technologies that help enterprises reduce costs and improve network performance and reliability. However, to fully take advantage of these technologies in IWAN, enterprises need a visibility and assurance platform that fully exposes IWAN's underlying technologies to the network management team. LiveAction provides that management and visibility layer. It empowers users to provision, monitor, and troubleshoot IWAN and adopt an application-centric, policy-based approach to wide-area networking. 



EMA Radar for Business Intelligence Platforms for Midsized Organizations: Q4 2015

PUBLISHED: Wed, 09 Sep 2015 00:00:00 +0000
AUTHOR: Lyndsay Wise

This EMA RADAR report focuses on how business intelligence platforms meet the unique needs of the midsized market place and which influences have the most impact on the operation of those smaller businesses. Looking at nine vendors in the business intelligence platform marketplace, EMA found that midsize organizations can expect to derive robust benefit from the participating vendors in this EMA RADAR report. Four (4) were rated as Value Leaders--the highest ranking category--in the RADAR evaluation. Another five (5) of the nine (9) vendors were scored in Strong Value--the second highest ranking category. This scoring shows that midsized organizations that are considering any of the solutions included in the EMA RADAR report will find significant value.



Report Summary - EMA Radar for Business Intelligence Platforms for Midsized Organizations: Q4 2015

PUBLISHED: Wed, 09 Sep 2015 00:00:00 +0000
AUTHOR: Lyndsay Wise

This is a summary of the EMA Radar for Business Intelligence Platforms for Midsized Organizations: Q4 2015.


Report Abstract
This EMA RADAR report focuses on how business intelligence platforms meet the unique needs of the midsized market place and which influences have the most impact on the operation of those smaller businesses. Looking at nine vendors in the business intelligence platform marketplace, EMA found that midsize organizations can expect to derive robust benefit from the participating vendors in this EMA RADAR report. Four (4) were rated as Value Leaders--the highest ranking category--in the RADAR evaluation. Another five (5) of the nine (9) vendors were scored in Strong Value--the second highest ranking category. This scoring shows that midsized organizations that are considering any of the solutions included in the EMA RADAR report will find significant value.



Moving to the Cloud: The Emerging Paradigm for Analytical Environment

PUBLISHED: Wed, 05 Aug 2015 00:00:00 +0000
AUTHOR: John Myers

Although viewed as a fairly recent phenomenon, the emergence of the cloud computing paradigm has been decades in the making. With this cloud infrastructure in place, software vendors began introducing the multitenant software as a service (SaaS) solutions, enabling the enterprise to outsource the management of critical enterprise applications. These applications not only provided significant business value in their own right, they served as a vital proof-of-concept for secure and high-performance delivery to the enterprise via the cloud. The evolution of the cloud continued with the introduction of infrastructure as a service (IaaS) offerings, providing computing and storage resources for companies who wanted to deploy noncloud-native applications and processes via the cloud. This was followed by the introduction of platform as a service (PaaS) offerings, which provide a cloud-based framework by which the enterprise can develop and manage its own applications.

The movement of data, resources, and processes to the cloud represents one of the most significant shifts in the history of enterprise computing, bringing about the same kinds of widespread transformation as such previous game changing developments as the introduction of personal computers and the advent of the Worldwide Web. And the trend is far from over. If anything, movement to the cloud is accelerating as the reliability of the platform becomes apparent to organizations that have implemented it, as services offered via the cloud continue to grow and mature, and as rapidly changing business requirements propel businesses to adopt new practices, processes, and methodologies favoring decentralized, non-localized, and/or virtualized deployment.



Combining Log, Metric, and Flow-Based Analytics: A Solution for Integrated, Real-Time Network Operations

PUBLISHED: Tue, 28 Jul 2015 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Log data analysis has traditionally been a forensic tool. The vast amount of machine data contained in log records has always been too unwieldy for real-time analysis and, therefore, has been difficult to integrate into infrastructure performance monitoring workflows. Instead, network engineers have relied on data sources that enable near-real-time analysis, such as Simple Network Management Protocol (SNMP) polling, flow analysis, and packet analysis. If and when network managers did turn to log analysis, it was only to understand an event long after it happened. But the log analytics status quo is changing. Increasingly, network managers are looking for ways to integrate log data into their overall performance management toolsets. This paper examines how log analytics can enhance network performance management. It also looks at how one solution from SevOne combines device metric analysis and network flow analysis with real-time log analytics to enhance network visibility and streamline triage and diagnostics workflows.



Back to the Future with the "API Economy": Management Strategies for a New Wave of Integrated Applications

PUBLISHED: Mon, 27 Jul 2015 00:00:00 +0000
AUTHOR: Julie Craig

APIs provide a way for one software application or system to interact with another. Some enterprise IT organizations are acting as API providers--creating APIs to provide access to their own internal systems. Others are acting as API consumers--connecting their own applications to those of other entities by using APIs provided by those entities. And a hefty percentage of companies are doing both.
However, with all the hype around the so-called "API economy," APIs aren't a shiny new technology--they've been around a long time. And in the final analysis, APIs are simply codeóproprietary code--allowing disparate systems to interoperate. 

In a world accustomed to the ease of use and high performance of commercial products supporting Enterprise Application Integration (EAI) and Enterprise Service Bus (ESB) connections, APIs are a clunky, inelegant solution. Each is custom written and must be manually maintained to keep pace with business and industry changes. Performance is variable and unpredictable, based on the connection method, the availability/capacity of back-end systems, and the efficiency of the code itself. As API usage escalates, capacity demands on back-end systems can grow exponentially. And to top it all off, many traditional Application Performance Management (APM) solutions lack support for API connections, making troubleshooting and root-cause analysis difficult.

With this survey-based research, Enterprise Management Associates (EMA) analysts set out to assess the API economy from multiple dimensions. Examining both the "consumer" and "provider" sides of the equation, the study explores the challenges of API usage in todayís production environments. This white paper summarizes the survey findings on the deployment, management, and governance-related challenges of delivering API-driven services. 



Report Summary - Back to the Future with the API Economy: Management Strategies for a New Wave of Integrated Applications

PUBLISHED: Mon, 27 Jul 2015 00:00:00 +0000
AUTHOR: Julie Craig


Full Report Abstract 
APIs provide a way for one software application or system to interact with another. Some enterprise IT organizations are acting as API providers--creating APIs to provide access to their own internal systems. Others are acting as API consumers--connecting their own applications to those of other entities by using APIs provided by those entities. And a hefty percentage of companies are doing both.
However, with all the hype around the so-called "API economy," APIs aren't a shiny new technology--they've been around a long time. And in the final analysis, APIs are simply codeóproprietary code--allowing disparate systems to interoperate. 

In a world accustomed to the ease of use and high performance of commercial products supporting Enterprise Application Integration (EAI) and Enterprise Service Bus (ESB) connections, APIs are a clunky, inelegant solution. Each is custom written and must be manually maintained to keep pace with business and industry changes. Performance is variable and unpredictable, based on the connection method, the availability/capacity of back-end systems, and the efficiency of the code itself. As API usage escalates, capacity demands on back-end systems can grow exponentially. And to top it all off, many traditional Application Performance Management (APM) solutions lack support for API connections, making troubleshooting and root-cause analysis difficult.

With this survey-based research, Enterprise Management Associates (EMA) analysts set out to assess the API economy from multiple dimensions. Examining both the "consumer" and "provider" sides of the equation, the study explores the challenges of API usage in today's production environments. This white paper summarizes the survey findings on the deployment, management, and governance-related challenges of delivering API-driven services. 



Analytics in the Cloud: Five Components for Success

PUBLISHED: Thu, 23 Jul 2015 00:00:00 +0000
AUTHOR: Lyndsay Wise

Cloud solutions have arrived and are here to stay. Innovative companies are reviewing their data management strategies to identify where and how cloud implementations should play a role. These new programs are driven by an array of cloud-based value propositions and technology advancements that enable companies to disrupt traditional data management paradigms in favor of new ways to create value. Analytics has followed this trend and is providing new opportunities to serve enterprise end users and projects.

Cloud-based analytics are becoming commonplace as most industry sectors identify opportunities to augment or replace existing infrastructure with this cutting edge technology in the goal of providing a scalable and effective cloud-based analytical environment, there are several critical and integrated considerations for successful cloud implementations.

* Analytic Performance
* Flexibility
* Advanced Technologies
* Expert Support
* Enterprise Ecosystem

Each of these are required for an organization to make the most of their cloud analytics projects and should be fully evaluated and considered when making a choice regarding a cloud data management platform provider.



2015 EMA Vendors to Watch: Systems Management

PUBLISHED: Wed, 22 Jul 2015 00:00:00 +0000
AUTHOR: Steve Brasen

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2015 EMA Vendors to Watch in the Systems Management field including: 

IndependenceIT
SIOS Technology



EMA Research Report: Big Data Impacts on IT Infrastructure and Management

PUBLISHED: Wed, 22 Jul 2015 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Big data analytics enjoys a great deal of well-earned hype today. The application of advanced analytics to structured, partially structured, and unstructured data can unearth important insights that were previously impossible to find. If used correctly, big data can transform a business in countless ways. This research study by Enterprise Management Associates seeks to understand how big data impacts and transforms IT infrastructure. Not only does this report examine how the collection and analysis of vast amounts of data affects IT infrastructure and IT management practices. It also reveals how IT organizations transform themselves when they start to export IT infrastructure monitoring data to big data environments for advanced analytics. This report shows how big data analytics for IT enhances IT planning, monitoring, and troubleshooting practices and also reveals the types of IT monitoring data that organizations leverage for those purposes. Serving as a guide to enterprises that want to apply big data technology to their IT organizations, this report offers a roadmap not just for the optimization of IT infrastructure and operations, but also for the improved alignment of IT and business.



Understanding the Role Data Discovery Plays to Support Business Intelligence Strategy

PUBLISHED: Mon, 20 Jul 2015 00:00:00 +0000
AUTHOR: Lyndsay Wise

To meet modern business challenges -- including increases in competition, globalization, customer feedback through social media, and expanding supply chains and partnerships—organizations need to gain actionable insights from increasingly large and complex data sources. "Actionable" is key, because insights without impact mean little to the business. In essence, the challenge for most organizations is monetizing data: making money or saving money with data.  

To understand the role of data discovery in a business intelligence (BI) strategy, we should review the three ways organizations can apply BI based on different types of use. A successful information strategy employs all three to support better technology use and to make better decisions. These are Strategic, Analytical, and Operational.

The value of applying these three areas of BI should be obvious, but sometimes organizations get stuck applying one level without developing a comprehensive approach to analytics. This can limit the value of business intelligence because businesses look at their high-level goals or identify trends, but do not proactively monitor operational performance to identify how to meet targets and address challenges as they occur. Luckily, current technology can support these three areas without having to invest in separate initiatives. 



Impact of Purpose-Built Big Data Applications: Keeping Pace with the Speed of Business

PUBLISHED: Thu, 16 Jul 2015 00:00:00 +0000
AUTHOR: John Myers

Total cost of ownership (TCO) is a critical concern of organizations implementing big data initiatives. To that end, the acceleration of time to value is of great interest to sponsors of big data projects. Another reality of big data initiatives is that line of business executives and business-oriented analysts are important big data consumers. Application flexibility and ease of use can improve both technical and business-oriented staff productivity, also contributing to reductions in overall TCO.

As part of the need to shrink TCO, the concept of the purpose-built big data application (BDA) has arisen. BDAs provide organizations with a standardized framework that improves time to value. They also provide the flexibility to meet changing business requirements by bridging investment, time, and skills gaps. BDAs provide the pace of time to value that the speed of business requires.



EMA Research Report: Data-Driven Security Reloaded: A Look into Data and Tools Used for Prevention Detection and Response

PUBLISHED: Wed, 15 Jul 2015 00:00:00 +0000
AUTHOR: David Monahan

Security professionals often wrestle with the unknown, struggling with a daunting array of exposures and threats. They are not trying to identify the needle in the haystack but the needle in the stack of needles. Each activity within a network, system, or application may be "the one" that indicates an Advanced Persistent Threat (APT) has taken hold or an insider has gone rogue and requires a response. But how do they know which one is the one?

In most cases, the key to success is not just more data but better data -- data that provides context to improve incident analysis and, therefore, appropriate and timely response. Better data can also help security teams to be more proactive. Accurate and timely information in the volumes collected today, however, is not manageable by human hands and eyes alone. Security professionals need the tools that allow them to identify the how and where attacks succeed in overcoming defenses.

In the update to the 2014 Evolution of Data-Driven Security study, Enterprise Management Associates (EMA) returns with updated research that encompasses the insight of over 200 IT and security practitioners and management worldwide, ranging from the SMBs to the enterprise markets across key industry verticals including financial, retail, federal government & aerospace, local government, technology, manufacturing, and utilities & infrastructure. EMA explores how data-driven security continues to evolve security tactics looking at 18 different categories of security tools to understand security management and strategy, and the data sources fueling those efforts.

Some of the questions this new research will answer include:
  • How is the data explosion affecting security prevention, detection, and response?
  • What are the best tools of gaining context for security alerts?
  • Which is more important for gaining context, endpoint data or
  • network data?
  • Which types of data and tools are most useful for improving prevention?
  • Which types of data and tools are most useful for improving detection?
  • Which types of data and tools are most useful for improving response?
  • What are the preferred tools and data for data analysis?



Optimizing the Network for Reliable Application Delivery Across the Cloud

PUBLISHED: Tue, 14 Jul 2015 00:00:00 +0000
AUTHOR: Tracy Corbo, Former EMA Analyst

Cloud represents a new infrastructure paradigm, rendering traditional monitoring, control, and optimization methods less effective, or even completely ineffective. EMA seeks to better understand what steps are being taking to improve visibility and performance of cloud deployments. This study looks at what types of workloads are being placed in the various cloud deployment models, examines how performance issues are being dealt with, and considers whether cloud benefits are being fully realized.



Insights Across the Hybrid Enterprise: Big Data 2015 Research Summary for Platfora

PUBLISHED: Tue, 14 Jul 2015 00:00:00 +0000
AUTHOR: John Myers

Since its inception, the concept of "big data" has been widely associated with a single data management platform: Hadoop. This connection may be due to the popularity of the use of the Hadoop platform to store and process large amounts of multistructured data. However, Hadoop is not the only answer to the question of "what is big data?"

As was explored in the inaugural EMA/9sight survey in 2012, big data is both a way to look at new sources of data and how organizations place that information under management. Big data has attracted a wide range of application innovators as well as many protesters against the dominance of relational databases and data warehouses. The EMA/9sight surveys use a deliberately broad definition of big data to inspire end users to think beyond the box of Hadoop. The survey explores the wide range of ways in which nontraditional data, often in combination with more traditional types, has enabled new or improved business processes. As was established in previous studies in 2012 and 2013 and again in 2014, big data offers a wide range of possibilities, but the name "big data" itself keeps media and industry eyes focused on size as the defining feature.



Insights Across the Hybrid Enterprise: Big Data 2015 Research Summary for Dell

PUBLISHED: Mon, 13 Jul 2015 00:00:00 +0000
AUTHOR: John Myers

The 2014 EMA/9sight Big Data research surveyed 351 business and technology stakeholders around the world. The survey instrument was designed to identify key trends surrounding the adoption, expectations, and challenges associated with strategies, technologies, and implementations of big data initiatives. The research identified highlights in the 2014 Big Data research with comparisons to past EMA/9sight studies in 2012 and 2013. This research summary was created for Dell.



Desktop Virtualization: Emerging Requirements and Optimal Configurations

PUBLISHED: Fri, 10 Jul 2015 00:00:00 +0000
AUTHOR: Steve Brasen

The adoption of desktop virtualization technologies (including VDI, client-hosted, stateless, and application virtualization) has doubled in the past four years, with the largest increase occurring over the past two years. To understand what is behind this trend and to identify the impacts of rapidly evolving technologies (such as workforce mobility and cloud computing)  Enterprise Management Associates (EMA) conducted primary, survey-based research across a broad range of industry verticals and horizontals.

Included in this research report are key findings from the survey results, including: adoption and usage trends; the impact of enterprise mobility; deployment and administration support trends; server architectures and efficiency technology adoptions; critical barriers to success; optimal management practices and solutions; and overall outcomes achieved from desktop virtualization adoption. Go beyond the market hype and find out the real-world experiences organizations are having with desktop virtualization technologies.



Report Summary - Desktop Virtualization: Emerging Requirements and Optimal Configurations

PUBLISHED: Thu, 09 Jul 2015 00:00:00 +0000
AUTHOR: Steve Brasen


Full Report Abstract
The adoption of desktop virtualization technologies (including VDI, client-hosted, stateless, and application virtualization) has doubled in the past four years, with the largest increase occurring over the past two years. To understand what is behind this trend and to identify the impacts of rapidly evolving technologies (such as workforce mobility and cloud computing)  Enterprise Management Associates (EMA) conducted primary, survey-based research across a broad range of industry verticals and horizontals.

Included in this research report are key findings from the survey results, including: adoption and usage trends; the impact of enterprise mobility; deployment and administration support trends; server architectures and efficiency technology adoptions; critical barriers to success; optimal management practices and solutions; and overall outcomes achieved from desktop virtualization adoption. Go beyond the market hype and find out the real-world experiences organizations are having with desktop virtualization technologies.



Best Practices for Optimizing IT with ITAM Big Data

PUBLISHED: Wed, 01 Jul 2015 00:00:00 +0000
AUTHOR: Dennis Drogseth

In this research report, we document some of the most prevalent obstacles to, and options for, achieving an accurate, current, and meaningful ITAM record across IT silos. We then show how an effective ITAM record can be meaningfully applied to critical business-driven IT strategies. Finally, we conclude by documenting the attributes of the most successful ITAM and financial management teams--who are they, and what makes them shine?



EMA Radar for Software-defined Storage: Q2 2015

PUBLISHED: Tue, 30 Jun 2015 00:00:00 +0000
AUTHOR: Jim Miller

Data creation is growing at unprecedented rates with the amount of information stored doubling every year. Data is now more active throughout the lifecycle, with analytics driving competitive advantage in sales and marketing and compliance requirements needed to be met to satisfy legal obligations as well as governance.The diversity and volume of data are placing extreme operational and capital demands on an already overburdened IT. Software-defined storage (SDS) is a new technology that targets meeting these new requirements while controlling costs. SDS aims at making storage application-aware, enabling server administrators, application managers, and developers to provision storage in a policy-driven, automated self-service manner.


This EMA Radar report focuses on the core capabilities needed to deliver SDS throughout the entire enterprise. There is much more diversity with storage solutions throughout the enterprise. Storage solutions, even those from the same vendor, can have unique hardware, operating systems, connectivity, services, application program interfaces, and data types (block, file, and object). An enterprise-wide approach is preferred because one cannot get the full benefit of software-defined storage unless it is implemented on all storage in the enterprise.



Report Summary - EMA Radar for Software-defined Storage: Q2 2015

PUBLISHED: Tue, 30 Jun 2015 00:00:00 +0000
AUTHOR: Jim Miller


Report Abstract
Data creation is growing at unprecedented rates with the amount of information stored doubling every year. Data is now more active throughout the lifecycle, with analytics driving competitive advantage in sales and marketing and compliance requirements needed to be met to satisfy legal obligations as well as governance.The diversity and volume of data are placing extreme operational and capital demands on an already overburdened IT. Software-defined storage (SDS) is a new technology that targets meeting these new requirements while controlling costs. SDS aims at making storage application-aware, enabling server administrators, application managers, and developers to provision storage in a policy-driven, automated self-service manner.

This EMA Radar report focuses on the core capabilities needed to deliver SDS throughout the entire enterprise. There is much more diversity with storage solutions throughout the enterprise. Storage solutions, even those from the same vendor, can have unique hardware, operating systems, connectivity, services, application program interfaces, and data types (block, file, and object). An enterprise-wide approach is preferred because one cannot get the full benefit of software-defined storage unless it is implemented on all storage in the enterprise.



Open Cloud Management and Orchestration 2015: Adoption and Experiences

PUBLISHED: Tue, 23 Jun 2015 00:00:00 +0000
AUTHOR: Dan Twing

Cloud services and technologies are quickly maturing, and a steadily increasing percentage of workloads are being moved to the cloud. While both public and private workload deployments are expected to rise steadily, the fastest growing category is hybrid cloud, which is growing by more than 40% annually. Hybrid cloud presents unique challenges as it brings significantly higher degrees of complexity and operational risk to deployments than pure cloud does. While most who have deployed cloud environments feel they have been successful, those who feel the most successful with their cloud implementations show higher adoption rates of orchestration and automation technologies such as OpenStack. Open cloud technologies are also viewed as contributing to more cost-effective and automated IT operations, with the significant majority if IT practitioners seeing open cloud technology as a catalyst for innovation.



Open Cloud Management and Orchestration 2015: Research Highlights for IBM

PUBLISHED: Mon, 22 Jun 2015 00:00:00 +0000
AUTHOR: Dan Twing

Cloud services and technologies are quickly maturing, and a steadily increasing percentage of workloads are being moved to the cloud. While both public and private workload deployments are expected to rise steadily, the fastest growing category is hybrid cloud, which is growing by more than 40% annually. Hybrid cloud presents unique challenges as it brings significantly higher degrees of complexity and operational risk to deployments than pure cloud does. While most who have deployed cloud environments feel they have been successful, those who feel the most successful with their cloud implementations show higher adoption rates of orchestration and automation technologies such as OpenStack. Open cloud technologies are also viewed as contributing to more cost-effective and automated IT operations, with the significant majority if IT practitioners seeing open cloud technology as a catalyst for innovation.



Report Summary - Open Cloud Management and Orchestration 2015: Adoption and Experiences

PUBLISHED: Mon, 22 Jun 2015 00:00:00 +0000
AUTHOR: Dan Twing

This is a summary document of the EMA research report "Open Cloud Management and Orchestration 2015: Adoption and Experiences."

 

Report Abstract

Cloud services and technologies are quickly maturing, and a steadily increasing percentage of workloads are being moved to the cloud. While both public and private workload deployments are expected to rise steadily, the fastest growing category is hybrid cloud, which is growing by more than 40% annually. Hybrid cloud presents unique challenges as it brings significantly higher degrees of complexity and operational risk to deployments than pure cloud does. While most who have deployed cloud environments feel they have been successful, those who feel the most successful with their cloud implementations show higher adoption rates of orchestration and automation technologies such as OpenStack. Open cloud technologies are also viewed as contributing to more cost-effective and automated IT operations, with the significant majority if IT practitioners seeing open cloud technology as a catalyst for innovation. 



The Borderless Enterprise: The Importance of Monitoring and Managing Cloud Applications and Shadow IT

PUBLISHED: Tue, 16 Jun 2015 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

On May 11, 2015, The enterprise network used to be a walled garden where the IT organization owned or controlled 100% of the infrastructure. With that control came a degree of predictability for IT operations, which could maintain a fairly static set of tools and processes for managing, optimizing, and securing the infrastructure. Cloud services and mobility have blurred the lines of that walled garden, creating a new borderless world where delivering secure, high-performance applications and services is a much more complex task.



2015 EMA Vendors to Watch: Application Management

PUBLISHED: Thu, 14 May 2015 00:00:00 +0000
AUTHOR: Julie Craig

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2015 EMA Vendors to Watch in the Application Management field including:

Agigee
Real-Time Innovations (RTI)
StackStorm



Data-Driven Security Reloaded: Summary of Research Findings for Endpoint Threat Detection, Prevention, and Response

PUBLISHED: Fri, 08 May 2015 00:00:00 +0000
AUTHOR: David Monahan

Information security has always been a large producer and consumer of data. More sophisticated best practices and expanding compliance and regulatory requirements have almost exponentially accelerated the production and consumption of data. Event and activity logs have grown to big data proportions and the diversity of data being consumed has become significantly more varied. As a result, traditional log and event management tools and monitoring practices are becoming increasingly insufficient.

To add to this, the problem of maintaining security for an environment is at an all-time low. Executives are being dismissed or forced to resign post breach whether they knew about security issues prior to the breach or not. Threats seem to come from every angle. Not only are attackers consistently probing, but the attacks themselves are more persistent; once a foothold is achieved, detection and removal are also more difficult.

This research summary discusses how "the death of antivirus" has not meant the end of protecting the endpoint. Both management- and operations-level IT and information security practitioners are re-embracing the idea that, despite the onslaught of malware and other persistent threats to endpoints, prevention is possible with endpoint threat detection and response (ETDR) technologies.

Over the last year, ETDR solutions have seen a significant surge in adoption, jumping the technology chasm from an emerging technology into a growth technology (see Figure 1 in the Analysis Summary). Through a best of breed approach, administrators and security personnel responsible for protecting information are getting higher fidelity data to provide better context for preventing incidents in a world where traditional prevention methods have often failed. ETDR tools provide practitioners with a means to thwart attacks and verify success via bidirectional information exchange with other systems. Bit9 + Carbon Black and Enterprise Management Associates have partnered to provide this research, which identified that nearly 80% of respondents believed that ìconsistent prevention of stealthy threats, advanced persistent threats, or advanced target attacks are possible with technology solutions existing today."



2015 EMA Vendors to Watch: Service Management

PUBLISHED: Wed, 06 May 2015 00:00:00 +0000
AUTHOR: Dennis Drogseth

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2015 EMA Vendors to Watch in the Service Management field including:

FixStream



Best Practices: Maximizing Efficiency Through Service Automation

PUBLISHED: Fri, 24 Apr 2015 00:00:00 +0000
AUTHOR: Steve Brasen

Survival in today's dynamic marketplaces is dependent on the prompt and reliable delivery of IT services. The demands from both customers and employees for more simplified access to IT services are driving organizations to become more agile in how the services are delivered and to ensure they meet rapidly increasing requirements for security, compliance, and user convenience. Making matters worse, IT organizations are consistently pressured to reduce operational costs while meeting these increased demands. In this white paper, EMA identifies key best practices for delivery IT services through the effective adoption of automation.



Effective Change Management: Maximizing IT Reliability Through Service Automation

PUBLISHED: Fri, 24 Apr 2015 00:00:00 +0000
AUTHOR: Steve Brasen

Survival in today's dynamic marketplaces is dependent on the prompt and reliable delivery of IT services. The demands from both customers and employees for more simplified access to IT services are driving organizations to become more agile in how the services are delivered and to ensure they meet rapidly increasing requirements for security, compliance, and user convenience. Making matters worse, IT organizations are consistently pressured to reduce operational costs while meeting these increased demands. In this white paper, EMA identifies key best practices for delivery IT services through the effective adoption of automation.



Empower Your Mobile Workforce: Adopting Service Automation to Achieve Unified Endpoint Management

PUBLISHED: Mon, 20 Apr 2015 00:00:00 +0000
AUTHOR: Steve Brasen

Empowering a mobile workforce is essential in any modern enterprise to meet business goals and remain competitive in the marketplace. The core goal of mobility is to enable users to access business resources -- including applications, data and other services (such as email, messaging and databases) -- from any device at any location at any time.In the white paper, EMA discusses the changing face of Enterprise Mobility Management and provides guidance on optimal methods for transitioning IT operations to support a mobile workforce.



Data-Driven Security Reloaded: Summary of Research Findings - Damballa

PUBLISHED: Thu, 16 Apr 2015 00:00:00 +0000
AUTHOR: David Monahan

Information security has always been a large producer and consumer of data. More sophisticated best practices and expanding compliance and regulatory requirements have almost exponentially accelerated the production and consumption of data. Event and activity logs have grown to big data proportions and the diversity of data being consumed has become significantly more varied. As a result, traditional log and event management tools and monitoring practices are becoming increasingly insufficient.

To add to this, the success record of maintaining security for an environment is at an all-time low. Executives are being dismissed or forced to resign post breach whether they knew about security issues prior to the breach or not. Threats seems to come from every angle. Not only are attackers consistently probing, but the attacks themselves are more persistent and difficult to block; once a foothold is achieved, detection and removal are also more difficult.

This research summary discusses how both management- and operations-level IT and information security practitioners are impacted by staffing shortages, lack of visibility into their environments, and how they are getting higher fidelity data to provide better context for detection and response to incidents in a world where prevention has often failed. Security analytics tools provide practitioners with a way to meet their actionable threat intelligence needs for an appropriately prioritized, timely response to attacks. Damballa and Enterprise Management Associates have partnered to provide this research, which identified that across the board, 79% of respondents were only "somewhat confident" in to "highly doubtful" of  their ability to detect an important security issue before it had significant impact. In contrast , 95% of the participants using security analytics were between "highly confident" in and "somewhat confident" of their ability to detect similar issues, thus demonstrating that the information security discipline needs next generation analytics capabilities to be successful in the age of advanced and persistent threats.



Data-Driven Security Reloaded: Summary of Research Findings - Prelert

PUBLISHED: Wed, 15 Apr 2015 00:00:00 +0000
AUTHOR: David Monahan

Information security has always been a large producer and consumer of data. More sophisticated best practices and expanding compliance and regulatory requirements have almost exponentially accelerated the production and consumption of data. Event and activity logs have grown to big data proportions and the diversity of data being consumed has become significantly more varied. As a result, traditional log and event management tools and monitoring practices are becoming increasingly insufficient.

To add to this, the success record of maintaining security for an environment is at an all-time low. Executives are being dismissed or forced to resign post breach whether they knew about security issues prior to the breach or not. Threats seems to come from every angle. Not only are attackers consistently probing, but the attacks themselves are more persistent and difficult to block; once a foothold is achieved, detection and removal are also more difficult.

This research summary discusses how both management- and operations-level IT and information security practitioners are impacted by staffing shortages, lack of visibility into their environments, and how they are getting higher fidelity data to provide better context for detection and response to incidents in a world where prevention has often failed. Security analytics tools provide practitioners with a way to meet their actionable threat intelligence needs for an appropriately prioritized, timely response to attacks. Prelert and Enterprise Management Associates have partnered to provide this research, which identified that across the board, 79% of respondents were only "somewhat confident" in to "highly doubtful" of  their ability to detect an important security issue before it had significant impact. In contrast , 95% of the participants using security analytics were between "highly confident" in and "somewhat confident" of their ability to detect similar issues, thus demonstrating that the information security discipline needs next generation analytics capabilities to be successful in the age of advanced and persistent threats.



Unlocking Your IT Data with User-Driven BI: Five Essential Components for Successful Business Discovery

PUBLISHED: Wed, 15 Apr 2015 00:00:00 +0000
AUTHOR: Shawn Rogers, Former EMA Analyst

IT teams spend so much of their time putting together environments for other teams and departments that they rarely have the opportunity to build systems for themselves. However, with the pressures associated with lowering IT budgets and the ability of cloud-based systems to move costs from capital budgets to operational expense budgets, IT teams need to investigate user-driven and discovery platforms to identify cost savings and spur innovation in their own environments. This EMA white paper explores the five essential components required to drive successful business discovery for IT professionals.



Unlocking Your Financial Data with User-Driven BI: Five Essential Components for Successful Business Discovery

PUBLISHED: Tue, 14 Apr 2015 00:00:00 +0000
AUTHOR: Shawn Rogers, Former EMA Analyst

All corporations rely on their finance group to provide insight, accounting services and management of the financial foundation that supports and enables the company's strategic initiatives. Overall corporate health and well-being is supported by the finance function and all other areas of the business are dependent upon it for success and resources. Line of business executives have learned to run their business with data and a critical source of this information is produced and managed by finance. This EMA white paper explores the five essential components required to drive successful business discovery for finance professionals.



Achieving Agile IT Operations with Unified Infrastructure Monitoring

PUBLISHED: Mon, 13 Apr 2015 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Enterprise IT organizations are often organized into subgroups of technology specialists responsible for managing a particular domain in the organization, such as servers, networks, storage, virtualization, or applications. This siloed approach to IT  operations is a natural outgrowth of the specialization of administrators who are equipped with narrowly focused management tools. As long as these administrators continue to live in their management silos, infrastructure operations will be slow to respond to change, and operational workflows will be slow and choppy. This status quo may have been acceptable a decade ago, but many enterprises have found that business conditions can no longer abide. Enterprises need to streamline IT operations to support a more agile approach to delivering new services and revenue-generating applications. The essential ingredient in achieving this aim is an infrastructure management toolset that breaks down silos and unifies monitoring and workflows. The time has come for unified infrastructure monitoring tools.



Empowering Business Professionals with Self-Service BI: Five Essential Components for Successful Business Discovery

PUBLISHED: Mon, 13 Apr 2015 00:00:00 +0000
AUTHOR: Shawn Rogers, Former EMA Analyst

Self-service business intelligence helps line of business professionals to gain access to data and insights without the delays often caused by interacting directly with IT. Empowering these users has a positive effect on the a companies ability to react to competition and market influences. There are multiple components to a successful business discovery culture. Many are covered in this EMA paper.



Unlocking Your Marketing Data with User-Driven BI: Five Essential Components for Successful Business Discovery

PUBLISHED: Mon, 13 Apr 2015 00:00:00 +0000
AUTHOR: Shawn Rogers, Former EMA Analyst

There are 5 essential components for successful business discovery and each plays a critical role in driving the success of marketing professionals. Campaign performance, customer segmentation, web analytics, social media analysis and cost reduction are all important goals supported by user-driven business intelligence.



The Power of Two: Why Network and Application Visibility Are Better Together

PUBLISHED: Thu, 09 Apr 2015 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Enterprises have long considered live visibility into both network and application activity to be "must-haves" for many aspects of IT planning and operations. But the greatest value and impact is achieved when those two viewpoints are brought together so that relationships and dependencies can be revealed and understood by multiple relevant stakeholders. Never has this need for unified visibility been more critical than it is with the move to the hybrid enterprise, through which IT leverages a mix of on-premises and cloud-based resources to meet the needs of the served organization. This report reviews the primary challenges that IT teams face in establishing unified visibility and the key requirements that management solutions must meet to address those challenges, and it examines a Riverbed solution that has been specifically designed to offer a path to success.



Analytics in the Cloud Research Summary for MicroStrategy

PUBLISHED: Thu, 09 Apr 2015 00:00:00 +0000
AUTHOR: John Myers

Cloud-based applications have been mainstream since Salesforce.com brought customer relationship management to the masses in the 2000s. Cloud implementations had the advantage of providing faster time to provisioning and a significantly different cost structure from traditional software implementations based on on-premises installations. However, analytics and business intelligence in the cloud were slower to reach widespread acceptance. First, analytical and business intelligence applications have different data schema implementations from traditional operational applications. These applications can be uniquely configured for individual organizations and are often more difficult to implement on a mass basis than they might be for an operational system.

To determine the status of Analytics and Business Intelligence in the Cloud, Enterprise Management Associates (EMA) embarked on an end-user research study to look at the current state of cloud-based analytics. For this research, EMA invited pre-qualified business stakeholders and information technology professionals to complete an extensive web-based survey. As part of the survey, 257 panelists responded to an invitation to provide their insights on cloud-based analytics and business intelligence strategies and implementation practices. To offer a neutral enterprise view, the respondent pool was also balanced. Business stakeholders represented 44% of respondents. Technologists were 56% of the panel. The survey was executed in November 2014 with respondents from around the world including North America and Europe.



EMA Research Report: What is the Future of IT Service Management?

PUBLISHED: Wed, 08 Apr 2015 00:00:00 +0000
AUTHOR: Dennis Drogseth

This research approached ITSM via a triangle of vectors recognizing the importance of technology and organization, as well as process (including dialog and communication). EMA believes that ITSM has evolved to reflect multiple interdependencies that can only be understood by this multifaceted approach--and that this approach is also the best way to understand future ITSM directions. EMA even went beyond service-desk-specific technologies and looked at trends such as cloud and agile; big data and analytics; automation and mobile--along with examining questions relating to best practices, organizational priorities, and communication issues. 



Insights Across the Hybrid Enterprise: Big Data 2015

PUBLISHED: Tue, 07 Apr 2015 00:00:00 +0000
AUTHOR: John Myers

Since its inception, the concept of "big data" has been widely associated with a single data management platform--Hadoop. This connection may be due to the popularity of the use of the Hadoop platform to store and process large amounts of multi-structured data. However, Hadoop is not the only answer to the question of "what is big data?"

As was explored in the inaugural EMA/9sight survey in 2012, big data is both a way to look at new sources of data and how organizations place that information under management. Big data has attracted a wide range of application innovators as well as many protesters against the dominance of relational databases and data warehouses. The EMA/9sight surveys use a deliberately broad definition of big data to inspire end users to think beyond the box of Hadoop. The survey explores the wide range of ways in which non-traditional data, often in combination with more traditional types, has enabled new or improved business processes. As was established in previous studies in 2012 and 2013 and again in 2014, big data offers a wide range of possibilities, but the name "big data" itself keeps media and industry eyes focused on size as the defining feature.

With the 2014 survey, these previous observations continue to hold true. However, there is an evolving market in which size is not everything, and speed, in all its aspects, has grown in importance for respondents. Furthermore, respondents continue to include a wide range of data structures, from highly irregular to strongly modeled, within the scope of their projects. This refocusing of implementers’ attention on speed and structure reduces overall growth in big data by some measures and requires EMA/9sight to explore how consideration of speed and structure are changing market dynamics. The 2014 survey also included investigations into the highly visible topics of data-driven cultures, the Internet of Things, and data lake architectures.



Demystifying the Internet of Things: Implementing IoT Solutions

PUBLISHED: Fri, 03 Apr 2015 00:00:00 +0000
AUTHOR: John Myers

As data becomes a more pervasive aspect of business and virtually all human activity, a rapidly growing number of physical objects have been modified or augmented to produce data, or to transmit data that previously would have been available only by directly observing the object / device (e.g., home heating and cooling via thermostat). Sensors now send relentless updates on the movement of merchandise into and out of inventory, the location of vehicles within a fleet, or the performance of individual components within a system. The network that connects these various items is the Internet, and the name given to the phenomenon of connecting physical objects in this way is the Internet of Things (IoT).

Over a relatively short period of time, IoT data has become a major contributor to many big data environments. According to the 2014 EMA/9sight End-User Big Data research, 41% of the stakeholders surveyed identified machine-generated data as one of the contributors to their big data environments, making it the most frequently cited source of data.



2015 EMA Vendors to Watch: Business Intelligence and Data Warehousing

PUBLISHED: Tue, 31 Mar 2015 00:00:00 +0000
AUTHOR: John Myers

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2015 EMA Vendors to Watch in the Business Intelligence and Data Warehousing field including:
 
Alation
Veritone



Quick Guide to Packet-Monitoring Infrastructure for Mid-tier Enterprises

PUBLISHED: Wed, 11 Mar 2015 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Packet-monitoring technologies have long served as essential tools for troubleshooting and managing the performance and security of networks. However, these tools are only as effective as the quality of the data fed to them. Large enterprises often deploy their packet-monitoring tools with network visibility infrastructure, including taps and packet-monitoring switches. Typically, packet-monitoring switches, also known as network visibility controllers, offer a rich set of traffic grooming features that help enterprises optimize and load balance the packet streams that are delivered to their monitoring tools. One might be tempted to assume that mid-tier enterprises, whose networks are smaller, would have far fewer requirements for packet-monitoring technologies. That is almost never the case.



Follow a Different Path: Data Discovery and Big Data

PUBLISHED: Wed, 11 Mar 2015 00:00:00 +0000
AUTHOR: John Myers

Big Data and multi-structured data stores are one of the fastest growing areas of data management for organizations implementing Big Data projects. Many of these organizations in the Early and Late Majority Adopters are still looking for the best way to utilize these new data sources. These sources could have the key to breakthrough business cases. Alternatively, these Big Data sources could be the wrong information for an organization. In either of these situations, the subject matter experts will lead the organization to the best use of Big Data sources. Often, these non-technical business analysts from marketing, operations and finance know the detailed data of their businesses better than the CEOs. They are best positioned to evaluate any integration of new Big Data sources into the business. They need to be able to explore the Big Data sources to find the right matches



Best Practices: Maximizing Efficiency Through Service Automation

PUBLISHED: Tue, 10 Mar 2015 00:00:00 +0000
AUTHOR: Steve Brasen

Survival in today's dynamic marketplaces is dependent on the prompt and reliable delivery of IT services. The demands from both customers and employees for more simplified access to IT services are driving organizations to become more agile in how the services are delivered and to ensure they meet rapidly increasing requirements for security, compliance, and user convenience.  Making matters worse, IT organizations are consistently pressured to reduce operational costs while meeting these increased demands. In this white paper, EMA identifies key best practices for delivery IT services through the effective adoption of automation.



Managing Networks Today: Network Management Megatrends 2014 Research Highlights (Sponsored by WildPackets)

PUBLISHED: Tue, 10 Mar 2015 00:00:00 +0000
AUTHOR: Jim Frey, Former EMA Analyst

Network management has always been essential in enterprises large and small, but continual changes in the managed environment and the increasing criticality of IT infrastructure to business success means network managers and operators need to continually ensure they are using the best tools, technologies, and practices at all times. In 2014, Enterprise Management Associates (EMA) published "Managing Networks in the Age of Cloud, SDN, and Big Data: Network Management Megatrends," a landmark study documenting the latest needs and requirements. This paper reviews several key findings and recommendations.



Managing Networks Today: Network Management Megatrends 2014 Research Highlights (Sponsored by Cisco)

PUBLISHED: Mon, 09 Mar 2015 00:00:00 +0000
AUTHOR: Jim Frey, Former EMA Analyst

The increasingly critical role that IT plays in enabling business is driving renewed focus on the network, which provides the essential connectivity between customers and end users and the datacenters hosting applications and services, as well as within those data centers. But establishing and maintaining the upper hand in ensuring highly reliable, high-performing networks means that network managers and operators need to keep up with new technology introductions while ensuring that they are using the best tools, technologies, and practices at all times. Enterprise Management Associates (EMA) published "Managing Networks in the Age of Cloud, SDN, and Big Data: Network Management Megatrends 2014," a landmark study documenting the latest needs and requirements for excellence in network management. This paper reviews several key findings and recommendations.



Delivering Effective Service Automation through Cloud Technologies

PUBLISHED: Mon, 02 Mar 2015 00:00:00 +0000
AUTHOR: Jim Frey, Former EMA Analyst

Capturing the full business value of cloud is one of today's key challenges for enterprise IT. The most important strategic characteristics of cloud -- agility, resiliency and efficiency -- can only be fully harnessed if the IT organization possesses the automation, orchestration and integration capabilities required to tie together hardware and software in a manner similar to those used for any other business processes. This is a non-trivial challenge as there are many different clouds, both private and public, available today, each of which is targeted toward a specific set of use cases. Centrally enforcing compliance, security and cost efficiency to enable the organization to take full advantage of today's world of many clouds requires a service management platform that facilitates policy driven provisioning and management of complete services that consist of application and infrastructure components sourced from multiple clouds.



Optimizing the Unknown: Making IT Data Work for You with Blazent's Integrated Data Analytics

PUBLISHED: Tue, 24 Feb 2015 00:00:00 +0000
AUTHOR: Dennis Drogseth

All IT processes depend on good data. So do effective communication and dialog within IT, as well as action based on shared, current, and relevant insights. Moreover, good IT data can support business alignment and even optimization to business needs and requirements. Only accurate data that spans siloed toolsets can provide a solid foundation for automation and analytics--those technology investments that are making the IT "conversation" more dynamic and empowering.
This report provides an introduction to Blazent's Integrated Data Analytic solutions with their unique and broad-ranging capabilities in a number of key areas.



Closing the Endpoint Security Gap: Bit9 + Carbon Black Partner with Microsoft to Maximize ROI

PUBLISHED: Mon, 23 Feb 2015 00:00:00 +0000
AUTHOR: David Monahan

For endpoint protection, traditional signature-based antivirus protection is insufficient, so organizations must find its successor. However in many industries, organizations continue to rely upon traditional antivirus as a first line defense or to meet out of date language in regulatory compliance requirements. Depending upon the progressiveness or open-mindedness of the organizations auditor and his/her desire to "check the box," organizations responsible to compliance regulations can be handcuffed to solutions that may meet compliance requirements, but do not provide sufficient security.

Bit9 + Carbon Black has partnered with Microsoft to provide enhanced prevention, detection and response capabilities to organizations who are using traditional antivirus but also recognizing it as insufficient for complete endpoint threat detection and response (ETDR). This paper discusses key benefits of the Bit9 + Carbon Black partnership with Microsoft to provide comprehensive endpoint defense and enhanced alerting capabilities. In the course of the discussion, the paper covers both the financial and operational values of using Microsoft System Center Endpoint Protection (SCEP) and the Enhanced Mitigation Experience Toolkit (EMET) in conjunction with Bit9 + Carbon Black to meet regulatory, compliance, or internal requirements and simultaneously improve organizational security posture, business return on investment (ROI), and in some cases, simultaneously reduce IT spend.



Leveraging Log Data: Highlights from "Log Analytics for Network Operations Management 2014" Research

PUBLISHED: Fri, 20 Feb 2015 00:00:00 +0000
AUTHOR: Jim Frey, Former EMA Analyst

It is a well-established practice for network managers to gather Simple Network Management Protocol (SNMP) data and metrics from network devices, complemented by NetFlow and packet inspection, for planning, monitoring, and troubleshooting network health and performance. But network log data is becoming increasingly important for these purposes as well. Research by Enterprise Management Associates (EMA) in early 2014 found that network log data is actually the most common data source in use today for planning, monitoring, and troubleshooting network health and performance. In November 2104, EMA released the findings from "Log Analytics for Network Operations Management," a follow-on study documenting current uses and best practices for using log data as part of network management. In this study, over 60% of research participants indicated that log data was more important than any other network management data type. This paper reviews several key findings and recommendations.



Best Practices in Lifecycle Management: Comparing Suites from Dell, LANDESK, Microsoft, and Symantec

PUBLISHED: Tue, 17 Feb 2015 00:00:00 +0000
AUTHOR: Steve Brasen

Given the complexity of todayís dynamic IT infrastructures and the broad range of management disciplines necessary to support them, choosing a lifecycle management solution can be a difficult and bewildering project.  To assist in the evaluation of automated lifecycle management platforms, Enterprise Management Associates (EMA) has conducted a side-by-side functional and financial comparison of solution suites from four of the leading vendors in this market space: Dell, LANDesk, Microsoft, and Symantec.   Key best practices in lifecycle management are explained and used as a framework for identifying critical points of comparison and a detailed financial evaluation goes beyond just license costs to help determine total cost of ownership of each platform. This EMA analysis includes a comparison of over 50 functional capabilities across seven key areas ñ Asset and Discovery Management; Provisioning; Security and Patch Management; Third-Party Patch Deployment; Configuration Compliance and Remediation; Process Automation and Service Desk; and Interfaces and Reporting - and breaks-out management capailities across a variety of endpoint platforms, including Windows, Mac, Linux, UNIX, and Chromebooks.



Accelerating Analytics Business Value: Leveraging the Modern Analytics Paradigm

PUBLISHED: Mon, 09 Feb 2015 00:00:00 +0000
AUTHOR: John Myers

A fundamental shift is occurring in analytics. Traditional analytics is giving way to a modern approach that will, at last, help businesses realize the full value of their data by infusing analytics into all aspects of the business, not just stand-alone silos. The shift is concurrent with the emergence and maturation of big data technologies, with these driving forces: New data sources and types, consumerization of analytics, and mass personalization of analytic insights and actions. The business drivers behind the modern analytics paradigm emerge from changes brought about by rapidly evolving big data technologies and the methodologies that support them. As they have always done, businesses are looking to maximize the value of their data sets and the processes that support them. 



Three Important Reasons for Privileged Identity Management (and One Surprising Benefit)

PUBLISHED: Thu, 05 Feb 2015 00:00:00 +0000
AUTHOR: Scott Crawford, Former EMA Analyst

High-privilege access is one of the most sensitive aspects of IT. Administrative accounts have the ability to make sweeping and fundamental changes to IT systems on which the business may depend. When used in ways not intended, the impact of this capability can cause a wide spectrum of damage, from security threats and compliance violations, to incidents that tarnish the reputation of the business itself.

For these reasons and more, privileged access visibility and control has been recommended -- and often required:

• By a variety of regulatory mandates
• To assure responsible governance
• To improve security

Privilege management delivers these values -- and more. In this report, Enterprise Management Associates (EMA) examines the ways in which privilege visibility and control not only helps organizations achieve these objectives, but also delivers a benefit that many may not realize: improved IT reliability that can help reduce operational costs. The characteristics of an effective solution are examined, along with evidence from EMA research that supports the values of a more consistent approach to operational IT control.



Log Analytics for Network Operations Management

PUBLISHED: Tue, 03 Feb 2015 00:00:00 +0000
AUTHOR: Jim Frey, Former EMA Analyst

As network managers, engineers, and operators strive to protect the integrity and performance of enterprise networks, they are faced with an onslaught of data and metrics.  They must wade quickly and carefully through this deluge in order to perform monitoring, troubleshooting, and planning. With recent trends moving technology toward software-defined and programmable infrastructure, as well as the parallel convergence of IT operations across multiple technology domains, network log data is being increasingly both used and appreciated. This ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) research report takes a detailed look at the ways in which which network log data is being harvested, analyzed, and used for network operations management. Included are recommendations for best practices based on the experiences and findings of enterprise practitioners. 



2015 EMA Vendors to Watch: Security & Risk Management

PUBLISHED: Tue, 03 Feb 2015 00:00:00 +0000
AUTHOR: David Monahan

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2015 EMA Vendors to Watch in the Security & Risk Management field, including Illumio, PFP Cybersecurity, and Twistlock.

Additional vendors will be added to this document throughout the year.



Unified Network Management: The Key to Operational Efficiency

PUBLISHED: Mon, 26 Jan 2015 00:00:00 +0000
AUTHOR: Jim Frey, Former EMA Analyst

As the world of IT converges, within the data center, within networking technologies, between voice and data, and in more ways to come, it is also appropriate to examine how management tools and technologies can be converged in order to best meet the needs of IT planning and operations. Within the scope of network management, this means adopting products that integrate or unify management capabilities, features, and functions. Though many network management product choices may sound similar on paper, there are distinct differences that should be understood. This white paper examines how a unified approach can both improve operational efficiency and lower total cost of ownership (TCO), the unified solution offered by Entuity as an example, and some real world examples of how the Entuity solution has been deployed within live production environments.



Customer Perspectives on HP Operations Analytics: Optimizing the Value of IT Through Big Data

PUBLISHED: Wed, 21 Jan 2015 00:00:00 +0000
AUTHOR: Dennis Drogseth

HP is unique in the industry in recognizing that AOA is an architectural as well as a "toolset" imperative--and as such becomes a potent layer over and above traditional monitoring tools. AOA can enable nothing less than a new way of working for IT. 

This report looks at HP's Operations Analytics, or "OpsAnalytics," in the context of two customer deployments. These interviews provide insight into what HP Operations Analytics can do, the problems it can address, and just what this new way of working (or as HP calls it the "new style of IT") might look like with an OpsAnalytics investment.



Evolving from Systems Management to Service Management with HP Operations Bridge: A View from Four Real-World Deployments

PUBLISHED: Wed, 21 Jan 2015 00:00:00 +0000
AUTHOR: Dennis Drogseth

This report is designed to provide insights into HP Operations Bridge values, benefits, drivers and use cases through interviews and analysis of four deployments. The goal is to offer up a more tangible context for assessing when and how OpsBridge can support individual IT choices and priorities.



Ensuring IT Efficiencies Through Enterprise Process Automation

PUBLISHED: Wed, 21 Jan 2015 00:00:00 +0000
AUTHOR: Steve Brasen

Enterprise success in today’s dynamic marketplaces is contingent on the agility of a business to rapidly perform tasks that address key needs and requirements. To maintain a competitive edge, However, to achieve this, organizations must adopt business-focused IT processes that consist of a variety of disparate and complex tasks that can be extremely difficult to orchestrate. In this white paper, EMA identifies how to effectively manage complex task by enabling an integrated approach to process automation and job scheduling.



Analytics in the Cloud

PUBLISHED: Wed, 14 Jan 2015 00:00:00 +0000
AUTHOR: John Myers

Cloud-based applications have been mainstream since Salesforce.com brought customer relationship management to the masses in the 2000s. Cloud implementations had the advantage of providing faster time to provisioning and a significantly different cost structure from traditional software implementations based on on-premises installations. However, analytics and business intelligence in the cloud were slower to reach widespread acceptance. First, analytical and business intelligence applications have different data schema implementations from traditional operational applications. These applications can be uniquely configured for individual organizations and are often more difficult to implement on a mass basis than they might be for an operational system.

To determine the status of Analytics and Business Intelligence in the Cloud, Enterprise Management Associates (EMA) embarked on an end-user research study to look at the current state of cloud-based analytics. For this research, EMA invited pre-qualified business stakeholders and information technology professionals to complete an extensive web-based survey. As part of the survey, 257 panelists responded to an invitation to provide their insights on cloud-based analytics and business intelligence strategies and implementation practices. To offer a neutral enterprise view, the respondent pool was also balanced. Business stakeholders represented 44% of respondents. Technologists were 56% of the panel. The survey was executed in November 2014 with respondents from around the world including North America and Europe.



Achieving Next-Gen NAC Results: Essential Implementation, Process and Control Considerations

PUBLISHED: Fri, 09 Jan 2015 00:00:00 +0000
AUTHOR: Scott Crawford, Former EMA Analyst

Business wants more fluid access to data while IT organizations must maintain security. As the diversity of users and devices, and the variety of access and multitude of threats to network resources and sensitive information have grown, so has the need for more flexible and automated ways to effectuate security policies, controls and enforcement. Rarely is this need more keenly felt than at the network endpoint, where people, technology, information assets and requirements for security and compliance meet most directly. IT consumerization and "bring your own device" (BYOD) trends have brought these issues to a head, forcing IT organizations to rethink how to enable and secure the use of managed and personal mobile devices to further business advantage.

These factors have given rise to Network Access Control (NAC) solutions for enabling a proactive approach to managing network admission and endpoint compliance risks. Today's NAC technologies are delivering that promise for many -- provided that organizations understand the considerations for a successful NAC deployment and how to recognize solutions that can address their requirements, not only to meet the needs of protecting the business, but to enable its people to continue to work efficiently.

In this paper, EMA examines the fundamentals that yield an informed approach to selecting and deploying NAC. Considered will be how today's approaches offer the means to identify and authenticate endpoint devices and offer a wide range of options for pre- and post-admission policy definition, enforcement and remediation that enable organizations to find the right balance of accessibility and security that best fits their needs.

The essentials of NAC functionality are described, along with key considerations for implementation that can produce more effective NAC results. Three enterprises that have adopted the ForeScout CounterACT solution are offered as examples of successful NAC deployments. They illustrate how comprehensive device discovery, real-time endpoint monitoring, flexible policy definition and effective control compatible with existing infrastructure answers many of the most critical requirements for guest management, endpoint compliance, mobile security and protecting sensitive information assets.



Technology Business Management in Two Deployments: Making the "Business of IT" Real

PUBLISHED: Fri, 09 Jan 2015 00:00:00 +0000
AUTHOR: Dennis Drogseth

This report presents two case studies that show how "managing IT as a business" can be both real and successful--while also clarifying how the phrase can become actualized in the real world by introducing the concept of Technology Business Management (TBM). Both case studies are Apptio deployments--as is fitting given Apptio's leadership in creating the market's first true TBM solution. While other vendors may follow--EMA research ("The Many Faces of Advanced Operations Analytics," September, 2014) indicates a strong surge of IT interest in this arena--so far Apptio has taken the lead position in understanding the TBM opportunity and delivering a compelling solution for it. 



Public Cloud Comes of Age: Application Performance Management (APM) Strategies & Products for Production-Ready Cloud Ecosystems

PUBLISHED: Tue, 16 Dec 2014 00:00:00 +0000
AUTHOR: Julie Craig

Today, IT organizations are seeking new ways to manage the fallout that always results from rapid, often unplanned change. Modern applications are part of today’s “Extended Enterprise,” in which applications can traverse multiple locations and spheres of control. Integrated applications are spanning on-premise and cloud, mobile, Internet of Things (IoT), and social media platforms, often connected by a host of custom code dubbed the “API Economy.” From this perspective, modern applications are as much an echo of the past as the wave of the future.

Prior EMA studies have extensively researched cloud, DevOps, and Continuous Delivery. This is the first in a series of studies building on this foundation by focusing on the enterprise management implications of this wave of innovation as engulfs the Extended Enterprise. 

This Enterprise Management Associates (EMA) research study approaches the Extended Enterprise from the manageability perspective. It includes results of a recent survey covering these topics and an Appendix listing enterprise management vendors who have self-identified as supporting performance monitoring and triage of public cloud applications. It is, in essence, an introductory evaluation of the ways in which companies are actively utilizing these technologies in production (or not), how they are managing them (or not), and their key challenges as they break new ground.



The Rise of DevTestOps

PUBLISHED: Mon, 15 Dec 2014 00:00:00 +0000
AUTHOR: Tracy Corbo, Former EMA Analyst

Traditional IT models are rapidly giving way to dynamic, flexible, on-demand designs that incorporate virtualization, cloud, and mobility. These new models shake up the status quo, and applications that worked well in a controlled private network are now subject to the unpredictability of the public Internet, While development teams and operations teams have evolved creating the DevOps movement, testing too often gets overlooked. This white paper examines the concept of DevTestOps as a way to ensure that high levels of functionality and performance are maintained enabling rapid application rollouts and changes with high quality. This provides the actionable insight and automation to drive the modern application lifecycle.



Overcoming Automation Fatigue: Best Practices for Accelerating Incident Resolution

PUBLISHED: Wed, 12 Nov 2014 00:00:00 +0000
AUTHOR: Steve Brasen

While organizations often adopt automation to try to improve incident resolution times, automation alone can actually create more problems than it resolves while  addressing only a limited number of incidents. To compensate, administrators often over-automate processes, making them difficult to manage and eminently error-prone because they are too complicated to modify or diagnose. Described in this EMA white paper are key best practices for accelerating incident resolution while minimizing administrative efforts by empowering support agents with modular process workflows.



ITIL Resources Adoptions and Priorities: A Global View

PUBLISHED: Mon, 10 Nov 2014 00:00:00 +0000
AUTHOR: Dennis Drogseth

With the creation of Axelos in 2013—a joint venture between Capita and the UK Project Office—the chance arose to reinvest in the IT Infrastructure Library (ITIL) as the leading global source of best practices for service management.  ITIL’s quiet rise through the 1990’s led to a substantial and growing awareness in the early years of this millennium, as IT organizations increasingly sought to take charge of their services in a more cohesive, more business-aligned, more measured and more cross-domain manner, than in the past.  

The results of the research below largely reaffirm ITIL’s value, and do so in the face of those very forces, such as cloud and agile, that some industry experts are claiming render ITIL less relevant.  The research also suggests clear priorities for how IT organizations, IT executives and professionals can better optimize their use of ITIL resources, as well as how ITIL might, itself, evolve to support the continued evolution of IT service management in the face of both cultural and technological change.



Solving the Application Performance Dilemma in the Hybrid Enterprise

PUBLISHED: Tue, 04 Nov 2014 00:00:00 +0000
AUTHOR: Jim Frey, Former EMA Analyst

The mainstream adoption of web-based applications, whether internally hosted, cloud-hosted, or SaaS, is transforming the ways in which enterprise-class applications are built, deployed, and consumed. While the evolution brings new levels of cost efficiency and flexibility, it also introduces new and unique visibility and control challenges for IT organizations, which must meet performance and user experience expectations in addition to basic availability. IT teams must adopt a two-pronged approach to meeting this challenge, combining performance visibility with proactive optimization technologies. This EMA white paper examines the scope of challenges for assuring web-based and SaaS application performance, and reviews a solution offered by Riverbed that is designed to meet these new requirements.



Mitigating User-Based Risks: Where Infrastructure Monitoring Falls Short, User-Based Monitoring Excels

PUBLISHED: Wed, 29 Oct 2014 00:00:00 +0000
AUTHOR: David Monahan

Though every organization wants to believe that all of their employees, interns, contractors, consultants, vendors, and partners are above reproach and all threats are external, the truth is somewhere in the middle. Research shows that there is an upward trend of suspicious activities that can be used as breach indicators, including unauthorized accesses that lead to a data breach. Sixty-nine percent of reported security incidents involved an insider.  Of the insiders that were part of a data breach, administrators were only 16%. In cases of administrator-caused data breaches, 62% were determined to be human error. Most interestingly, 10% of the threat actors were unknown. In these cases, the infrastructure logging was so deficient that it was impossible for forensic investigators to use it to determine the attack origin regardless of time or money spent.  This begs the question what else is there?  The answer is user-based monitoring.



Pragmatic Capacity Management: Getting the Most Out of Your Data Center Investments

PUBLISHED: Thu, 23 Oct 2014 00:00:00 +0000
AUTHOR: Steve Brasen

Traditional capacity management practices rely on the intentional overprovisioning of IT infrastructure servers and other resources to ensure performance is maintained even during unexpectedly high peak loads. However, this approach rarely delivers on providing the expected performance and reliability effects -- and almost never justifies the excessive costs involved. Revealed in this white paper are key practices for enabling a business-focused approach to capacity management that maximizes both effectiveness and efficiency in IT investments.



EMA Research Report: Optimizing IT Operations with Automation and Analytics

PUBLISHED: Tue, 14 Oct 2014 00:00:00 +0000
AUTHOR: Steve Brasen

While IT operations managers broadly recognize that automation is the key to improving IT performance while reducing administrative efforts, it is often unclear how to strategically employ automation to meet SLA requirements and business goals. To gauge the state and effectiveness of enterprise IT’s ability to meet expanding requirements, EMA conducted primary, survey-based research evaluating real world conditions and use cases. Included in this EMA Research Report are the key findings from the study, including detailed results identifying critical requirements for enabling proactive IT management, the effectiveness of adopting automation, and how organizations are dealing with siloed organizational structures.


     

Subscribe Now!


Subscribe with My Yahoo!

Subscribe with NewsGator

Subscribe with My AOL

Subscribe with Bloglines

Subscribe with Netvibes

Subscribe with Google

EMA on Facebook   EMA on LinkedIn   EMA on Twitter   EMA RSS   EMA on YouTube

©1996-2016 Enterprise Management Associates, Inc. All rights reserved.
EMA™, ENTERPRISE MANAGEMENT ASSOCIATES®, and the mobius symbol are registered trademarks or common-law trademarks of Enterprise Management Associates, Inc.
Site Terms & Conditions | Integrity Policy | Site Map | My Account
Hide
Subscribe to EMA RSS Feed
Email
Show