IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING

CONTACT    SIGN IN    SIGN UP
    

EMA™ IT Management Research Library ADVANCED SEARCH


 Click here for New Advanced Search »  

Title Report Type Release Date  Author Abstract
Network Management Megatrends 2018: Exploring NetSecOps Convergence, Network Automation, and Cloud Networking Research Report - End-User 04/24/2018 Shamus McGillicuddy Based on a survey of 250 North American and European IT decision-makers, the Enterprise Management Associates® (EMA™) Network Management Megatrends 2018 research examines evolving network management tool requirements, new network operations...
Report Summary - Unifying IT Decision-Making for Digital War Rooms: A Deep Dive Into How to Succeed in the Age of Cloud and Agile Research Report - End-User 04/11/2018 Dennis Drogseth This is a summary of the EMA research report, "Unifying IT Decision-Making for Digital War Rooms: A Deep Dive Into How to Succeed in the Age of Cloud and Agile."Full Report AbstractAs EMA examined them, war rooms could be physical, vir...
Unifying IT Decision-Making for Digital War Rooms: A Deep Dive Into How to Succeed in the Age of Cloud and Agile Research Report - End-User 04/02/2018 Dennis Drogseth As EMA examined them, war rooms could be physical, virtual, or hybrid--which turned out to be the predominant case. They could be highly automated or not, or made up of consistent, well-defined teams or not. What made them war rooms in all cases was ...
EMA Innovator Awards: Networking: Second Half 2017 Research Report - End-User 03/08/2018 Shamus McGillicuddy This report recognizes three EMA Innovator Award winners that advanced the networking industry during the second half of 2017. EMA bases its award selection upon its original research on enterprise networking trends, interaction with the industry, an...
Pragmatic Identity and Access Management Research Report - End-User 03/01/2018 Steve Brasen Today's business success is dependent on the secure availability of software resources, including applications, data, and other services. Identity and access management (IAM) processes and solutions are the first line of defense for ensuring secure a...
Report Summary - Pragmatic Identity and Access Management Research Report - End-User 02/27/2018 Steve Brasen This is a summary of the EMA research report, "Pragmatic Identity and Access Management."Full Report AbstractToday's business success is dependent on the secure availability of software resources, including applications, data, and othe...
Ten Priorities for Container Management and DevOps in Production and at Scale in 2018 - EMA Top 3 Report and Decision Guide for Enterprise Research Report - End-User 02/26/2018 Torsten Volk DevOps and containers enable enterprises to deliver better customer value in a more cost-effective manner by institutionalizing an automated, continuous, and rapid development, build, test, release, and deployment process.Based on primary research da...
Advanced Network Analytics: Applying Machine Learning and More to Network Engineering and Operations Research Report - End-User 01/16/2018 Shamus McGillicuddy This EMA end-user research study examines how enterprises extract more value and insights from network data through the use of advanced analytics technology, including predictive analysis, machine learning, and more. Based on a survey of 200 IT profe...
Data-Driven Security Tools: The Value of Network Security Policy Management Tools Research Report - End-User 12/11/2017 David Monahan This report queried companies that use Network Security Policy Management (NSPM) tools and companies that do not in order to compare and contrast their security change management process, timeliness and efficacy. The evaluation considered whether the...
Research Summary: Network Security Policy Management Tools - Tying Policies to Process, Visibility, Connectivity, and Migration Research Report - End-User 12/11/2017 David Monahan This is a summary of the EMA research report, "Data-Driven Security Tools: The Value of Network Security Policy Management Tools", sponsored by AlgoSec.Full Report AbstractThis report queried companies that use Network Security Policy ...
Page shows 10 rows of 216 total. Page accessed at 2018-05-26 05:17:04
 
FirstPrevious  Page of 22 with NextLast 


EMA on Facebook   EMA on LinkedIn   EMA on Twitter   EMA RSS   EMA on YouTube

EMA Services

IT Professionals

EMA can help you:

  • Support your decisions
  • Succeed with key projects
  • Align IT with the business

Learn More!

IT Vendors

EMA can help you:

  • Build the right product
  • Reach the right prospects
  • Establish market credibility

Learn More!

EMA Advisory Notes Service

An Affordable Way to Stay on Top of Key Trends & Industry Events

Subscribe now

EMA Premium Research Service

In-Depth Insight into IT Management Benefits, Challenges & Best Practices in the Enterprise

Subscribe now




©1996-2018 Enterprise Management Associates, Inc. All rights reserved.
EMA™, ENTERPRISE MANAGEMENT ASSOCIATES®, and the mobius symbol are registered trademarks or common-law trademarks of Enterprise Management Associates, Inc.
Site Terms & Conditions | Integrity Policy | Site Map | My Account
Hide
Subscribe to EMA RSS Feed
Email
Show