IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING

CONTACT    SIGN IN    SIGN UP
    

EMA™ IT Management Research Library ADVANCED SEARCH


 Click here for New Advanced Search »  

Title Report Type Release Date  Author Abstract
Summary: Network Engineering and Operations in the Multi-Cloud Era Research Report - End-User 03/08/2019 Shamus McGillicuddy Enterprises today are leveraging the cloud more than ever before, building hybrid and multi-cloud architectures and adopting dozens, if not hundreds, of software as a service applications. Legacy networks are not designed to support the migration of ...
Network Engineering and Operations in the Multi-Cloud Era Research Report - End-User 02/26/2019 Shamus McGillicuddy Enterprises today are leveraging the cloud more than ever before, building hybrid and multi-cloud architectures and adopting dozens, if not hundreds, of software as a service applications. Legacy networks are not designed to support the migration of ...
Serverless Computing for DevOps and Business: EMA Top 3 Report and Decision Guide for Serverless Technologies Research Report - End-User 02/05/2019 Torsten Volk Serverless technologies enable developers to rapidly create and validate new applications without incurring significant CAPEX and OPEX requirements. This is due to serverless technologies providing developers with API access to all the resources they...
TLS 1.3 Adoption in the Enterprise: Growing Encryption Use Extends to New Standard Research Report - End-User 01/30/2019 Paula Musich In August 2018, the IETF published its TLS 1.3 transport encryption standard, 10 years after the previous TLS 1.2 version came out. The new version is not without controversy, given the mandate to use the Diffie Helman Ephemeral perfect forward secre...
Security Analytics for Threat Detection and Breach Resolution in 2019: EMA Top 3 Report and Decision Guide Research Report - End-User 01/22/2019 David Monahan This report is a time-saving guide. It is designed to help decision-makers who have identified problematic security use cases to select analytics tools that best address those use cases to aid in narrowing selection choices for proof of concept testi...
Security Megatrends 2019 Research Report - End-User 01/22/2019 David Monahan Threats abound, but people are out there trying to deal with them. This report delves into several areas of concern today including cloud security issues, SecOps frustrations and tools, the Internet of Things, data sharing and leakage, DDoS, endpoint...
The Shifting Role of Workload Automation: WLA Expansion Creates a Foundation for Broader Business Process Automation and Digital Transformation Research Report - End-User 12/21/2018 Dan Twing The role of WLA is expanding as organizations increase use of all forms of automation to become more efficient and competitive. Digital transformation, DevOps, and microservices architectures are increasing the pressure on workload automation systems...
Report Summary - AIOps and IT Analytics at the Crossroads: What's Real Today, and What's Most Needed for Tomorrow? Research Report - End-User 12/18/2018 Dennis Drogseth Discover a roadmap of what technologies are really in use and the dynamics that separate the most effective advanced IT analytic deployments from those that struggle due to a variety of reasons, ranging from technology priorities to organizational an...
Wide-Area Network Transformation: How Enterprises Succeed with Software-Defined WAN Research Report - End-User 12/12/2018 Shamus McGillicuddy This research report on WAN transformation looks beyond the hype of SD-WAN to understand exactly how enterprises should be tackling change in their networks. Based on a survey of 305 enterprise WAN decision-makers and subject matter experts, this rep...
AIOps and IT Analytics at the Crossroads: What's Real Today, and What's Most Needed for Tomorrow? Research Report - End-User 10/10/2018 Dennis Drogseth The goal of this research was to create a roadmap of what technologies are really in use and and most importantly, to examine the dynamics that separate the most effective AIA deployments from those that struggle due to a variety of reasons, ranging ...
Page shows 10 rows of 262 total. Page accessed at 2019-03-25 17:06:44
 
FirstPrevious  Page of 27 with NextLast 


EMA on Facebook   EMA on LinkedIn   EMA on Twitter   EMA RSS   EMA on YouTube

EMA Services

IT Professionals

EMA can help you:

  • Support your decisions
  • Succeed with key projects
  • Align IT with the business

Learn More!

IT Vendors

EMA can help you:

  • Build the right product
  • Reach the right prospects
  • Establish market credibility

Learn More!

EMA Advisory Notes Service

An Affordable Way to Stay on Top of Key Trends & Industry Events

Subscribe now

EMA Premium Research Service

In-Depth Insight into IT Management Benefits, Challenges & Best Practices in the Enterprise

Subscribe now




©1996-2019 Enterprise Management Associates, Inc. All rights reserved.
EMA™, ENTERPRISE MANAGEMENT ASSOCIATES®, and the mobius symbol are registered trademarks or common-law trademarks of Enterprise Management Associates, Inc.
Site Terms & Conditions | Integrity Policy | Site Map | My Account
Hide
Subscribe to EMA RSS Feed
Email
Show