CONTACT    SIGN IN    SIGN UP
    

Free RSS Feeds from Enterprise Management Associates (EMA)

Stay up to date on the latest IT and data management information from EMA, including Webinars, Radar Reports, white papers, impact briefs, advisory notes and more!

Select your preferred reader by selecting an icon on the right.



Current Feed Content:




Network Management Megatrends 2024: Skills Gaps, Hybrid and Multi-Cloud, SASE, and AI-Driven Operations

PUBLISHED: Tue, 07 May 2024 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Enterprise Management Associates’ (EMA) Network Management Megatrends research has been the industry benchmark of enterprise network operations tools and practices since it was first published in 2008. This biennial research surveys hundreds of IT professionals about their approach to managing, monitoring, and troubleshooting their networks. It also examines the business and technology trends that are shaping network operations strategy.



Fortune 500 Bank Unifies Network Operations and Cybersecurity in the Cloud with Aviatrix Distributed Cloud Firewall

PUBLISHED: Tue, 30 Apr 2024 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

When the IT organization for a Fortune 500 bank adopted the Cloud Networking Platform from Aviatrix®, its initial aim was to solve networking complexity in its Azure environment. When Aviatrix introduced its Distributed Cloud Firewall solution, the bank expanded its engagement with the vendor to deploy security capabilities in all its cloud landing zones.



The Evolution of Work: Enhancing Productivity and Collaboration through Digital Employee Experience (DEX)

PUBLISHED: Mon, 29 Apr 2024 00:00:00 +0000
AUTHOR: Will Schoeppner - Former EMA Analyst

This new Enterprise Management Associates (EMA) research, sponsored by Broadcom and Martello, presents a comprehensive examination of enterprise digital experience (DEX) and its impact on organizational dynamics, productivity, and collaboration. This research adopts a dual perspective, analyzing insights from both IT managers implementing DEX solutions and employees utilizing them. EMA’s research explores various aspects of DEX implementation and its ramifications, including business and employee impacts, along with challenges faced during integration. Additionally, workforce productivity is evaluated in the context of current inhibitors, with emphasis on the significance of user experience and intelligent technologies. The role of DEX in driving collaboration, particularly through platforms like MS Teams, is explored, highlighting challenges, benefits, and user experiences. Challenges companies face in productivity and efficiency are dissected, including siloed IT systems and the impact of remote work environments. EMA’s research then identifies strategies for implementing an enterprise DEX solution, stressing the importance of coordination, change management, and augmenting DEX with unified endpoint management. The research concludes by envisioning the future state of DEX, considering its evolution with business needs, onsite versus remote work dynamics, and the growth of collaboration tools.



IT outages: 2024 costs and containment

PUBLISHED: Thu, 25 Apr 2024 00:00:00 +0000
AUTHOR: Valerie O'Connell

For more than a decade, industry pundits and press pegged the cost of an IT outage at $5,600 per minute. It turns out that this figure is an urban legend. It sprang from a casual remark made in a 2014 analyst blog that never claimed the number to be either research or fact. In 2022 and again in 2024, BigPanda commissioned EMA to undertake independent field research into the cost of an IT outage. The objective: to develop a research-based average cost/minute – an average that is defensible, not definitive. This research explores the current state of  IT outage costs, causes, and containment.



Transforming MSPs/MSSPs: Methods to Improve Operational Efficiencies, Reduce Risk, and Increase Profitability with AI/ML

PUBLISHED: Thu, 04 Apr 2024 00:00:00 +0000
AUTHOR: Chris Steffen

Cybersecurity is in a constant state of evolution and threats are becoming more sophisticated and pervasive for organizations of every size. More organizations are turning to managed security service providers (MSSPs) and managed service providers (MSPs) to address these emerging threats. MSSPs and MSPs are being tasked not only with safeguarding their clients’ digital assets, but company leadership also has the goals of managing scale and profitability. Most of these service providers face some of the same issues facing the organizations they service: a convergence of threats is battering digital perimeters and raining IT/security resources. Attack surfaces continue to expand, encompassing not just traditional IT infrastructure, but also the increasing Internet of Things (IoT) and operational technology (OT) domains. Threat actors are utilizing more sophisticated and nimble tools, often powered by artificial intelligence (AI), that exploit vulnerabilities faster than ever before. These attacks inflict crippling damage, causing data breaches, operational disruptions, and reputational nightmares.



Securing Tomorrow: The Role of AI in Transforming Cybersecurity

PUBLISHED: Thu, 04 Apr 2024 00:00:00 +0000
AUTHOR: Ken Buckler

The roots of human/machine collaboration trace back to the 18th century with the advent of the “Mechanical Turk.” This ingenious automaton, constructed by Wolfgang von Kempelen in 1770, captured the imagination of audiences by simulating the performance of tasks that seemed beyond the capability of machinery at the time, such as playing chess. Early attempts like the Mechanical Turk symbolize humanity’s enduring fascination with automata and the intersection of human and machine capabilities.



Nine Cost Considerations for Observability Platforms

PUBLISHED: Thu, 04 Apr 2024 00:00:00 +0000
AUTHOR: Torsten Volk

This white paper by Enterprise Management Associates (EMA) delves into the financial implications of implementing observability platforms in organizations. Observability is pivotal for stakeholders such as developers, DevOps engineers, platform engineers, and SREs to ensure real-time performance, system reliability, and rapid market response. The paper highlights the collaboration between these roles to maximize business impact through effective decision-making and infrastructure optimization. However, it emphasizes that without a clear understanding of the cost structure, observability expenses can become prohibitive, hindering business success.
 
EMA's research identifies nine critical cost challenges that organizations face when implementing observability platforms: lack of granularity and control, unpredictability, vendor lock-in, freemium plans, premium features, compliance and data security, geographical data storage, real-time monitoring and alerting, and the skill gap and training costs. The paper provides recommendations for each challenge to help organizations make informed decisions and avoid unexpected costs.
 
The conclusion underscores the importance of addressing these cost considerations during the selection process to ensure that the observability platform chosen provides a viable cost-benefit ratio, managing costs effectively while enhancing system performance and the developer experience.



PUBLISHED: Thu, 04 Apr 2024 00:00:00 +0000
AUTHOR: Dennis Drogseth

This is the EMA Radar Report for AIOps: A Guide to Investing in Innovation summary featuring Aisera.



PUBLISHED: Tue, 26 Mar 2024 00:00:00 +0000
AUTHOR: Dennis Drogseth

This is the EMA Radar Report for AIOps: A Guide to Investing in Innovation summary featuring Interlink Software.



Modern Enterprises Must Boost Observability with Internet Performance Monitoring

PUBLISHED: Mon, 25 Mar 2024 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This white paper explores how digital operations have become more challenging as IT infrastructure has hybridized with adoption of cloud services and internet connectivity. Internet performance monitoring tools have become just as important as application performance management, if not more so.



A Guide to Automating Network Operations

PUBLISHED: Mon, 25 Mar 2024 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

The typical network infrastructure professional’s workday is fundamentally focused on assessing the network. Network teams continuously compare observed states to business requirements for critical applications and IT services during fault investigation, change validation, and security audits. Assessment is the initial step in network engineering and operations, ensuring alignment with business needs.



PUBLISHED: Thu, 21 Mar 2024 00:00:00 +0000
AUTHOR: Dennis Drogseth

This is the EMA Radar Report for AIOps: A Guide to Investing in Innovation summary featuring CloudFabrix.



PUBLISHED: Thu, 21 Mar 2024 00:00:00 +0000
AUTHOR: Dennis Drogseth

This is the EMA Radar Report for AIOps: A Guide to Investing in Innovation summary featurig Broadcom.



PUBLISHED: Wed, 20 Mar 2024 00:00:00 +0000
AUTHOR: Dennis Drogseth

The AIOps marketplace is both dynamic and transformative. As exhibited within this report by 13 of the industry’s leading innovators, AIOps is a landscape with creative solutions that vary in breadth and focus. For this Radar, EMA posed a series of questions to produce a charted use case summary of where each vendor is positioned. The questions also delivered a fresh look at how the industry has evolved, with detailed insights into design, deployment, cost, and overall effectiveness. 



Securing Tomorrow: The Role of AI in Transforming Cybersecurity

PUBLISHED: Fri, 15 Mar 2024 00:00:00 +0000
AUTHOR: Ken Buckler

In a recent research survey Enterprise Management Associates conducted, professionals from various industries provided insights into the current trends of artificial intelligence adoption, focusing on securing the usage of AI and the use of AI for cybersecurity. The research, which covered organizations of all sizes across 19 industry verticals, shed light on the challenges businesses face in embracing AI technologies. Survey respondents from organizations spanning finance, insurance, health care, retail, manufacturing, and other sectors revealed diverse perspectives on AI adoption. Despite their differences, the commonality of challenges and successes organizations experience underscores the universal impact of AI, its benefits, and potential security concerns. In this paper, EMA will examine how solutions such as OpenText Cybersecurity leverage AI to mitigate the risk of breaches and improve productivity in organizations.



Top 5 Critical Pain Points in Observability and How AI can Help

PUBLISHED: Fri, 15 Mar 2024 00:00:00 +0000
AUTHOR: Torsten Volk

This white paper discusses the critical challenges in observability within cloud native applications and microservices, emphasizing the need for AI in addressing these complexities. It identifies five key pain points: inefficiencies and risk, root cause analysis, issue prioritization, eliminating blind spots, and balancing productivity with performance and cost. AI solutions are proposed for each, highlighting their role in enhancing system health, performance, and alignment with business goals. The paper underscores AI’s necessity in modern observability strategies for effective management and futureproofing operations.



Enterprise Network Automation: Emerging From the Dark Ages and Reaching Toward NetDevOps

PUBLISHED: Mon, 11 Mar 2024 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This independent, multi-sponsor market research report explores the state of network automation initiatives in enterprise IT organizations. Based on a survey of 354 network automation stakeholders and in-depth one-on-one interviews with ten network automaton professionals, the report explores the entire lifecycle of network automation strategies, including both homegrown and commercial solutions.



2024 EMA Vendors to Watch: Network Management

PUBLISHED: Wed, 28 Feb 2024 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that previously went unaddressed, or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches. 

This document contains the 2024 EMA Vendors to Watch in the network management field, including Coevolve. 



The Future of Your NetOps Toolset: Planning for Cisco Prime Infrastructure End of Life

PUBLISHED: Mon, 26 Feb 2024 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This advises IT organizations on how to plan for the retirement of Cisco Prime Infrastructure, the network infrastructure vendor’s longtime network management tool suite. It identifies key trends that are guiding IT tool strategy today and provides an overview of what decision-makers should look for in their next network management solution.



Real-world incident response, management, and prevention

PUBLISHED: Wed, 31 Jan 2024 00:00:00 +0000
AUTHOR: Valerie O'Connell

Incidents and outages happen. Decreasing their frequency, duration/MTTR, and impact collectively form a never-ending objective – one that is a top goal for IT organizations globally. It turns out that some organizations seem to be fighting a losing battle while others are successfully taming the beast. This research explores the ways that automation, AI, and cross-functional collaboration impact incident response, management, and prevention today and in GenAI’s near future.



Observability: Challenges, Priorities, Adoption Patterns, and Solutions

PUBLISHED: Wed, 31 Jan 2024 00:00:00 +0000
AUTHOR: Torsten Volk

Observability has become one of the most prominent topics in technology because it is the key discipline that enables organizations to directly tie technology investments to business success. This research report identifies real-life challenges that can prevent organizations from achieving the level of observability required to squeeze the most business value out of their technology resources. Based on these challenges and current technology adoption patterns, we present enterprise priorities and make recommendations for organizations seeking to implement business-centric full-stack observability across the enterprise. 



EMA AllStars 2024

PUBLISHED: Wed, 10 Jan 2024 00:00:00 +0000
AUTHOR: Torsten Volk

The “EMA AllStars 2024” report identifies the key trends and enterprise customer requirements in 2024 and crowns products and vendors that address them convincingly. EMA AllStars are products that deliver customer value in a strongly differentiated manner. Startups and established businesses are both eligible to receive the EMA AllStars award for their unique approach toward solving critical customer challenges.

Visit the EMA AllStars website to learn about our AllStar products and explore the latest market data.



Modernizing Active Directory: A Prescriptive Guide to Eliminating IT Complexity While Extending Services to Support Non-Microsoft Resources

PUBLISHED: Mon, 08 Jan 2024 00:00:00 +0000
AUTHOR: Steve Brasen - Former EMA Analyst

Celebrated programming legend Admiral Grace Hopper famously noted, “The most dangerous phrase in the English language is, ‘We’ve always done it this way.’” Truer words were never spoken then in regard to Microsoft Active Directory (AD), which persists to propagate the myth that AD is the only service that can support access control functionality, especially for custom-tailored applications. In particular, there are misconceptions that AD exclusively supports functionality for group management and access security, and that purchasing Microsoft products is required to maintain enterprise authentication and authorization compatibility. However, administrators should pause when considering the number of additional tools required to integrate with Active Directory to allow proper management of single sign-on (SSO), multi factor authentication (MFA), mobile device management (MDM), and privileged access management (PAM). At the end of the day, the integration looks like a complex jigsaw puzzle built from different puzzle vendors. The pieces fit, but it’s still difficult to manage and doesn’t look like the painted picture you originally imagined. Perhaps it’s time to find a better approach that doesn’t require so many puzzle pieces.



PUBLISHED: Mon, 08 Jan 2024 00:00:00 +0000
AUTHOR: Ken Buckler

Digital certificates serve as the cornerstone of secure online communications and transactions, enabling encryption, user authentication, and defense against cyber threats. However, their expiring nature poses significant security challenges, especially in the context of the widespread use of Transport Layer Security (TLS) certificates in modern internet infrastructure. The ramifications of expired or compromised certificates extend beyond mere inconvenience, potentially leading to service disruptions, vulnerabilities, and data breaches. To address these issues, the EMA research findings emphasize the pressing need for automated certificate management and shed light on existing security concerns within the realm of certificates. EMA’s 2023 research, “SSL/TLS Certificate Security – Management and Expiration Challenges” highlights these management and security challenges and the necessity for automated certificate management.



PUBLISHED: Mon, 08 Jan 2024 00:00:00 +0000
AUTHOR: Valerie O'Connell

When it comes to delivering great IT service experiences, midsized organizations are held to the same standards and expectations as their larger competitors.Too big for vanilla, easy solutions, but too resource-stretched to throw money and bodies at innovation, they are challenged to achieve supersized goals with midsized budgets.

 

Research demonstrates that modernizing IT service management (ITSM) is one solid way to achieve operational excellence today and position for growth and innovation. It’s an investment that returns generous results – both qualitative and measurable. This ebook makes a strong argument for prioritizing ITSM as a way to maximize existing investments, promote human/machine advances across the enterprise, save costs, stay competitive, and be positioned for innovation and growth.



NetSecOps: Examining How Network and Security Teams Collaborate for a Better Digital Future

PUBLISHED: Wed, 03 Jan 2024 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This independent market research explores the nature of collaboration between network operations teams and cybersecurity teams. It identifies why network and security teams need to work together and explores the challenges enterprises encounter when they try to build partnerships between these groups. The report also identifies best practices for ensuring that this collaboration is successful.



Summary: NetSecOps: Examining How Network and Security Teams Collaborate for a Better Digital Future

PUBLISHED: Wed, 03 Jan 2024 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This independent market research explores the nature of collaboration between network operations teams and cybersecurity teams. It identifies why network and security teams need to work together and explores the challenges enterprises encounter when they try to build partnerships between these groups. The report also identifies best practices for ensuring that this collaboration is successful.



Observability: Your Key to Continued Success in the Ever-changing World of Technology

PUBLISHED: Tue, 12 Dec 2023 00:00:00 +0000
AUTHOR: Ken Buckler

In the rapidly evolving landscape of technology and business operations, the concept of observability emerged as a critical aspect for organizations striving to maintain their competitive edge. Observability encompasses the capacity to gain valuable insights into complex systems by collecting, analyzing, and interpreting data from various sources. It allows organizations to proactively detect, diagnose, and resolve issues, ensuring optimal performance, security, and overall efficiency. However, achieving the right balance between obtaining essential data and managing the associated costs has proven to be a formidable challenge for many organizations.

 

This research report delves into the world of observability and aims to explore the questions and dilemmas organizations face in their pursuit of this essential capability. The report focuses on three main areas: Observability Methods and Tools, Leveraging Observability Data, and the Impact and Results of implementing observability practices. 

 

Overall, this research report sheds light on the intricate landscape of observability, its methodologies, and the varied approaches different organizations adopt. As we explore the data and findings, we aim to provide a comprehensive understanding of the challenges and opportunities that arise in the pursuit of observability. By doing so, we hope to guide organizations toward making informed decisions, effectively implementing observability practices, and harnessing observability’s potential for continued success in the dynamic digital era.




Transcending Passwords: The Next Generation of Authentication

PUBLISHED: Wed, 15 Nov 2023 00:00:00 +0000
AUTHOR: Steve Brasen - Former EMA Analyst

Emerging requirements for achieving security assurance in the face of accelerating threats, enhancing workforce productivity, and improving user satisfaction with IT services are driving businesses to advance access policies beyond relying on traditional passwords as the principal form of authentication. To help organizations make informed decisions on the types of authenticators to adopt, EMA conducted primary research involving surveys of end users and business IT professionals to gauge the effectiveness of adopted solutions.



Hybrid Workers Need Remote Connectivity That Balances Security and User Experience

PUBLISHED: Tue, 07 Nov 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

While many high-profile employers have issued return-to-office mandates, remote work still dominates the economy. According to Enterprise Management Associates (EMA) research, 94% of companies have seen a permanent increase in remote workers since the COVID-19 pandemic.



Multi-Cloud Architecture Requires Application- Aligned Networks

PUBLISHED: Wed, 25 Oct 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Using two or three IaaS providers is standard. Enterprises are rapidly embracing multi-cloud architectures. EMA expects multi-cloud complexity to increase quickly.



From DIY DDI to BlueCat: Customers Earn ROI Within Three Months

PUBLISHED: Tue, 24 Oct 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This return on investment analysis examines the transition from a do-it-yourself approach to DNS, DHCP, and IP address management to an enterprise solution from BlueCat Networks. Based on interviews with two large enterprise customers, the analysis found that this transition could pay for itself within three months and ultimately earn customers $1.5 million in additional financial benefits within the first year.



2023 EMA Vendors to Watch: Network Management

PUBLISHED: Mon, 09 Oct 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that previously went unaddressed, or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2023 EMA Vendors to Watch in the network management field, including Zero Networks, Augtera, and Lytn.



Service-Centric NetOps: Embracing the Future

PUBLISHED: Thu, 05 Oct 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Networks are complex systems, with countless devices receiving traffic and making forwarding decisions independently of one another. Traditional network management tools are rooted in managing these devices. In theory, providing a deep understanding of the state of individual devices allows network managers to troubleshoot problems quickly.



PUBLISHED: Fri, 29 Sep 2023 00:00:00 +0000
AUTHOR: Dan Twing

This is the EMA Radar Report for Workload Automation and Orchestration 2023 summary featuring BMC.



PUBLISHED: Thu, 28 Sep 2023 00:00:00 +0000
AUTHOR: Dan Twing

The EMA Radar Report delivers an in-depth analysis of industry-leading vendors and vendor products, including their overall market position in comparison with other vendors. This information is laid out in an easy-to-decipher, detailed market map and Radar Chart – which includes a composite score for each vendor – making it simple to see how vendors measure up in the market, as well as against other vendors. The EMA Radar Report also provides a detailed discussion of methodology and criteria, a high-level market segment overview, a comprehensive analyst writeup on each vendor, and more.
 
This Radar Report covers workload automation. 2023 marks a transformative era for workload automation with significant advances by leading products to expand orchestration capabilities.



PUBLISHED: Thu, 28 Sep 2023 00:00:00 +0000
AUTHOR: Dan Twing

This is the EMA Radar Report for Workload Automation and Orchestration 2023 summary featuring AutomateNOW! by InfiniteDATA. 



PUBLISHED: Thu, 28 Sep 2023 00:00:00 +0000
AUTHOR: Dan Twing

This is the EMA Radar Report for Workload Automation and Orchestration 2023 summary featuring Stonebranch.



PUBLISHED: Thu, 28 Sep 2023 00:00:00 +0000
AUTHOR: Dan Twing

This is the EMA Radar Report for Workload Automation and Orchestration 2023 summary featuring ActiveBatch, RunMyJobs, and Tidal by Redwood.



PUBLISHED: Thu, 28 Sep 2023 00:00:00 +0000
AUTHOR: Dan Twing

This is the EMA Radar Report for Workload Automation and Orchestration 2023 summary featuring Broadcom.



The Transformation of Cybersecurity from Cost Center to Business Enabler

PUBLISHED: Mon, 25 Sep 2023 00:00:00 +0000
AUTHOR: Chris Steffen

Businesses increasingly rely on technology to streamline operations, enhance customer experiences, and gain a competitive edge. Digital transformation has brought unprecedented opportunities for growth and innovation. However, it has also exposed organizations to many cybersecurity risks that threaten the foundation of their existence.



A business view of IT asset management: Current state and near-term outlook

PUBLISHED: Fri, 22 Sep 2023 00:00:00 +0000
AUTHOR: Valerie O'Connell

The third in a series of annual research initiatives on the state of IT asset management (ITAM), this report represents the collective findings of 450 global IT leaders in 2023. Their observations and opinions benefit from context that was set in earlier efforts.



Edge-Aware AIOps Drives SASE Success

PUBLISHED: Wed, 20 Sep 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This white paper explores how AIOps solutions can leverage network intelligence to streamline, optimize, and automate network operations, particularly for software-defined WAN (SD-WAN) and secure access service edge (SASE) technology. The paper also highlights the capabilities and value of VMware Edge Network Intelligence, an AIOps solution of VMware SASE.



DDI Directions: DNS, DHCP, and IP Address Management Strategies for the Multi-Cloud Era

PUBLISHED: Tue, 12 Sep 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

DNS, DHCP, and IP address management (DDI) are a suite of core services essential to network connectivity and communications. DDI suites manage the assignment of IP addresses and the mapping of those addresses to DNS domains for both internal and external communications. People who lack networking expertise may think DDI is trivial, but an ineffective approach to these core services can lead to sluggish network operations, chronic downtime, security breaches, and worse.



IT Organizations in a Quandary Over Visibility Into Cloud Traffic

PUBLISHED: Tue, 12 Sep 2023 00:00:00 +0000
AUTHOR: Chris Steffen

The push for the finalized IETF Transport Layer Security (TLS) 1.3 standard for network encryption started in 2018 and the major web server and browser vendors backed it with heavy promotion. Back then, the 10-year-in-the-making standard promised better privacy, but it also threatened to break how IT networking and security professionals troubleshoot networking problems and monitor the presence of malware and malicious actors operating within those networks.



EMA Radar for Privileged Access Management (PAM)

PUBLISHED: Thu, 24 Aug 2023 00:00:00 +0000
AUTHOR: Steve Brasen - Former EMA Analyst

The EMA Radar Report delivers an in-depth analysis of industry-leading vendors and vendor products, including their overall market position in comparison with other vendors. This information is laid out in an easy-to decipher, detailed Radar Chart, making it simple to see how vendors measure up in the market, as well as against other vendors. The EMA Radar Report also provides a detailed discussion of methodology and criteria, a high-level market segment overview, and a comprehensive analyst write-up on each vendor.



Case Study: Global 500 Media Company Sees 8x Boost to Remote Worker Experience with Cloudbrink

PUBLISHED: Tue, 22 Aug 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

With nearly all its 15,000 employees permanently working from home on at least a part-time basis post-pandemic, a major division of a multi-billion-dollar global media company transformed its approach to secure remote access with Cloudbrink, a provider of hybrid access as a service (HAaaS).



CMDB today: myths, mistakes, and mastery

PUBLISHED: Mon, 14 Aug 2023 00:00:00 +0000
AUTHOR: Valerie O'Connell

Despite periodic but persistent press assertions that the rise of cloud cuts
the relevance of CMDB, EMA experience and field research consistently find
the opposite to be true. In a recent EMA research engagement, 400 global
IT leaders stated that CMDB use was central to major functions. For many
of those respondents, CMDB use was viewed as increasing in importance for
automation of complex processes.



Kubernetes at Scale: Challenges, Priorities, Adoption Patterns, and Solutions

PUBLISHED: Fri, 11 Aug 2023 00:00:00 +0000
AUTHOR: Torsten Volk

The equation is simple: to maximize the productivity of application developers, we need to minimize the time they have to spend on overhead tasks. These are tasks that go beyond writing, maintaining, and testing new application code. They include infrastructure provisioning and configuration, deployment, management, upgrades of Kubernetes clusters, application deployment and management, ensuring security and compliance of the overall application stack, configuring backup and disaster recovery, configuring observability and visibility, and optimizing cost.



Kubernetes at Scale: 10 Reasons to Use Multiple Kubernetes Distributions

PUBLISHED: Fri, 11 Aug 2023 00:00:00 +0000
AUTHOR: Torsten Volk

This report goes over ten reasons to use multiple Kubernetes distributions.



Kubernetes at Scale: Challenges, Priorities, Adoption Patterns, and Solutions

PUBLISHED: Fri, 11 Aug 2023 00:00:00 +0000
AUTHOR: Torsten Volk

There is no shortage of metrics that illustrate the rapid rise of Kubernetes as the application platform of choice for many enterprises. The number of monthly Google searches doubled between 2021 and 2023. Meanwhile, the number of downloads of the Kubernetes client library for Python increased by 1,714% between 2019 and 2023. The number of operator questions on the Stack Exchange Server Fault support forum increased by 40% year over year, and the number of publicly accessible Kubernetes clusters also increased by 40% over the same timeframe.



Kubernetes at Scale: Public Cloud-Managed Kubernetes Alone is Not the Answer

PUBLISHED: Fri, 11 Aug 2023 00:00:00 +0000
AUTHOR: Torsten Volk

From a business perspective, public cloud-managed Kubernetes alone is not the answer. Cloud-managed platforms such as EKS, AKS, and GKE are always embedded within the much larger context of the respective cloud vendor. While these offerings take care of managing the Kubernetes control plane, they still require enterprises to address many Kubernetes-related topics, such as cost control, security and data protection, scalability and performance, service reliability and availability, integration and interoperability, control and flexibility, technology lock-in, monitoring and analytics, and support and training.



Kubernetes at Scale: Three Perspectives

PUBLISHED: Fri, 11 Aug 2023 00:00:00 +0000
AUTHOR: Torsten Volk

In a world of complex cloud systems, developers, operators, and DevOps professionals grapple with a variety of challenges while navigating Kubernetes, a potent container orchestration platform. This narrative captures the essence of three distinct perspectives and their experiences with Kubernetes issues.



Kubernetes at Scale: Security Challenges

PUBLISHED: Fri, 11 Aug 2023 00:00:00 +0000
AUTHOR: Torsten Volk

The fact that the number of Kubernetes-related CVEs doubled over the past
year indicates the need to take Kubernetes security seriously. This increase
is a direct result of broader and deeper adoption of the Kubernetes platform
in combination with the rapidly increasing complexity of the Kubernetes
ecosystem.



Kubernetes at Scale: Top 10 Critical Kubernetes Challenges for Developers

PUBLISHED: Fri, 11 Aug 2023 00:00:00 +0000
AUTHOR: Torsten Volk

This report discusses ten critical Kubernetes-related challenges for application developers. 



The Five Pillars of the Ideal Kubernetes Management Platform

PUBLISHED: Fri, 11 Aug 2023 00:00:00 +0000
AUTHOR: Torsten Volk

The equation is simple: to maximize the productivity of application developers, we need to minimize the time they have to spend on overhead tasks. These are tasks that go beyond writing, maintaining, and testing new application code. They include infrastructure provisioning and configuration, deployment, management, upgrades of Kubernetes clusters, application deployment and management, ensuring security and compliance of the overall application stack, configuring backup and disaster recovery, configuring observability and visibility, and optimizing cost.



Modernizing Network Engineering and Operations in the Era of Hybrid and Remote Work

PUBLISHED: Tue, 08 Aug 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Since the advent of ubiquitous broadband internet service in the developed world, enterprises have offered employees the opportunity to work from home. With an internet connection, any information worker can be reasonably productive from home. However, until recently, the work-from-home option was primarily a perk rather than a strategic imperative. That paradigm shifted in 2020 with the COVID-19 pandemic. Suddenly, remote work was a business continuity strategy at a time when governments were urging everyone to limit their exposure to potential infection by staying home.



Modernizing Network Engineering and Operations in the Era of Hybrid and Remote Work: Summary

PUBLISHED: Tue, 08 Aug 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This is the research summary for EMA's recent report, "Modernizing Network Engineering and Operations in the Era of Hybrid and Remote Work." 



Charting a Course to 5G-Optimized SASE

PUBLISHED: Fri, 28 Jul 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Hybrid multi-cloud architectures, hybrid work, the Internet of Things (IoT), and other digital disruptors introduced complexity to networks that created the need for a converged approach to networking and security. Secure access service edge (SASE) is a class of solutions that unifies software-defined WAN, cloud-delivered network security (e.g., cloud access security broker, secure web gateway, firewall as a service), and secure remote access (e.g., zero trust network access) onto one platform.



PUBLISHED: Wed, 26 Jul 2023 00:00:00 +0000
AUTHOR: Ken Buckler

Digital certificates play a vital role in securing online communications and transactions. They are used to encrypt sensitive data, authenticate users, and protect against various types of cyber threats. However, digital certificates have an expiration date, which requires regular renewals to ensure their continued effectiveness. This process can be challenging and time-consuming, especially for large organizations with many certificates. Furthermore, expired or compromised certificates can lead to damaging service outages, security vulnerabilities, and data breaches. To address these security challenges, Google proposed reducing the maximum validity of public Transport Layer Security (TLS) certificates (also known as SSL certificates) from 13 months to just 90 days. This proposed change could have a significant impact on the industry, affecting certificate authorities, browser makers, and organizations that rely on digital certificates for security.



Target-Centric Intelligence: Unlocking the Secrets of OSINT for Effective Cyber Defense

PUBLISHED: Fri, 21 Jul 2023 00:00:00 +0000
AUTHOR: Ken Buckler

In the realm of cybersecurity, it is highly likely that you are already harnessing the power of open-source intelligence (OSINT) without even realizing it. Many teams are actively monitoring and tracking threat indicators and threat actors through publicly available intelligence. However, it is important to note that traditional cyber threat intelligence (CTI) platforms do not necessarily equate to comprehensive OSINT platforms.



Automation Intelligence Reduces Job Failure Incidents for a Top 10 Global Financial Institution

PUBLISHED: Tue, 18 Jul 2023 00:00:00 +0000
AUTHOR: Dan Twing

Daily liquidity reporting is crucial for commercial banks to manage cash flows, comply with regulations, mitigate risks, make informed decisions, and maintain investor confidence. When overnight processing problems caused frequent delays in delivering these critical reports to management, something had to change.



Why Should Organizations Consider Extended Detection and Response?

PUBLISHED: Tue, 11 Jul 2023 00:00:00 +0000
AUTHOR: Chris Steffen

Plenty of companies have delivered on the promise of extended detection and response (XDR). The security market is flooded with security vendors coming out with their spin on detection and response capabilities, all of which are the “best” or “leading” solutions for stopping bad actors from damaging enterprise networks and systems.
 
Despite the plethora of available tools, security incidents continue to increase, and high-profile attacks have enterprise leaders asking how they can prevent their companies from appearing on the 9:00 o’clock news. As security leaders evaluate the vast array of tools available to combat ransomware attacks, endpoint and extended detection and response solutions still stand out as the best defense against emerging threats—but how can an enterprise know which of these tools is the best? 



IT Executive Survey 2023: Global Banking, Finance, and Insurance Technology Insights

PUBLISHED: Fri, 23 Jun 2023 00:00:00 +0000
AUTHOR: Dan Twing

Digital transformation describes a “digital first” vision of customer experiences across all areas of a business, fundamentally changing how it operates and maximizes value to customers. The overarching goal of digital transformation is to unify massive amounts of heterogeneous customer data nestled in silos across the company and tailor it into individualized, personalized customer treatments. Such treatments increase customer satisfaction, loyalty, and retention to ultimately maximize lifetime customer value.



EMA ROI Study: Impact of Docker Desktop on the Application Delivery Lifecycle

PUBLISHED: Tue, 06 Jun 2023 00:00:00 +0000
AUTHOR: Torsten Volk

In this ROI study, we will look at how a cybersecurity company with over $600M in annual revenue, more than 2,000 employees, eight global offices, and approximately 20 product teams optimized all four target variables of their software supply chain through the use of Docker Desktop.



Code Once, Deploy Anywhere: Accelerating App Developer Productivity Through Simplified Service Mesh

PUBLISHED: Tue, 06 Jun 2023 00:00:00 +0000
AUTHOR: Torsten Volk

What is preventing app developers from achieving optimal productivity? Optimal productivity is a state in which developers simply write business code during 100% of their work hours. Thinking this further, if your developers spend 100% of their time on writing business code for your customers while your competitors’ developers only spend 75% on productively coding, you could theoretically deliver 25% more features and capabilities to the marketplace.



From Complexity to Clarity: Resolving Challenges in Cybersecurity Observability

PUBLISHED: Wed, 31 May 2023 00:00:00 +0000
AUTHOR: Chris Steffen

Network complexity presents significant challenges for observability in cybersecurity. With the increasing number of devices, endpoints, and applications connected to networks, it becomes difficult to gain comprehensive visibility into network activities. Complex networks often lack standardized monitoring practices, making it challenging to observe and detect security threats consistently. Additionally, the dynamic nature of modern networks—with devices joining and leaving the network frequently—as well as remote devices and multiple distributed sites further complicate the observability process. Network administrators and security teams face the daunting task of managing and correlating vast amounts of data these networks generate to identify potential threats accurately.



Digital Transformation, Microservices, and Cybersecurity: 8 Critical Challenges

PUBLISHED: Wed, 31 May 2023 00:00:00 +0000
AUTHOR: Torsten Volk

Software developers need to deliver relevant product features in a rapid, cost-effective, easy-to-use, and high-quality manner. Microservices are the delivery vehicle of choice, enabling the continuous creation, release, and validation of new code in order to achieve this key business goal. Instead of betting on the success of large but infrequent product releases, developers deliver small sets of capabilities that address immediate and specific customer needs. This granular approach of creating customer value by solving concrete business problems on a daily basis shortens feedback loops, brings software developers closer to end users, and enables developers to more accurately identify new product capabilities that customers are willing to pay for.



From Scheduler to Automation Fabric for the Enterprise: Workload Automation Transformation in 2023

PUBLISHED: Tue, 16 May 2023 00:00:00 +0000
AUTHOR: Dan Twing

Enterprise IT organizations are living with more change now than ever before. The pace of technological change and innovation is accelerating, and businesses are under constant pressure to adapt to new trends, technologies, and customer demands. Technological advancements, such as artificial intelligence (AI), machine learning (ML), blockchain, and cloud computing, are disrupting traditional industries and creating new business opportunities. Consumers are more tech-savvy and demanding personalized and seamless experiences across all channels. This is forcing companies to invest in IT infrastructure and develop new technologies to meet these expectations. Companies across all industries are undergoing digital transformation, using technology to optimize processes, improve customer experiences, and drive business growth.



AI-Driven Networks: Leveling Up Network Management

PUBLISHED: Thu, 04 May 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This new market research explores how IT organizations are improving network management with intelligent systems based on artificial intelligence (AI) and machine learning (ML). Sometimes known as AIOps solutions, these AI/ML technologies are helping organizations optimize their networks, streamline operations, and reduce security risk. Based on a survey of 250 IT professionals, this report identifies how organizations are evaluating, implementing, using, and succeeding with AI/ML-driven network management. 



AI-Driven Networks: Leveling Up Network Management Report Summary

PUBLISHED: Thu, 04 May 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This is the research summary from the report "AI-Driven Networks: Leveling Up Network Management." 



Automation Intelligence: The Path to Transformative Automation

PUBLISHED: Wed, 03 May 2023 00:00:00 +0000
AUTHOR: Dan Twing

Enterprises are striving to modernize applications and embed digital technologies across their businesses to improve business processes, services, and products. Digital transformation relies on IT and encompasses a range of technologies and strategies, including cloud computing, artificial intelligence, the Internet of Things (IoT), big data analytics, mobile computing, social media, and more. Digital transformation also involves cultural and organizational changes. Organizations must embrace new ways of working and adopt a digital-first mindset. Automation supports the digital transformation journey and automation intelligence operationalizes automation for insight and predictability.



Taking a Holistic Approach to Securing Cloud-Native Application Development

PUBLISHED: Tue, 25 Apr 2023 00:00:00 +0000
AUTHOR: Torsten Volk

Cloud-native application security has become the primary challenge in app modernization, hindering developer productivity, efficient operations, and optimal risk management. This prevents organizations from delivering better products faster, cheaper, and more often than the competition. Developers spend much of their time implementing and following corporate security policies while introducing more tools, open source libraries, container images, and data sources into the application stack.



Less Complexity, More Return on Cybersecurity Investments

PUBLISHED: Wed, 19 Apr 2023 00:00:00 +0000
AUTHOR: Ken Buckler

Depending on the type of attack, target organization, and effectiveness of an organization’s security defenses, attackers are typically inside a network for one to two months before being detected. The signals of the attacker’s presence are present from the start, but without comprehensive monitoring, these signals and associated alerts become lost within the noise generated by everyday operations.



PUBLISHED: Tue, 18 Apr 2023 00:00:00 +0000
AUTHOR: Chris Steffen

Many organizations have leveraged cyber threat intelligence (CTI), a powerful tool, for over two decades. Until recent years, threat intelligence was extremely expensive and only the largest organizations with budgets that allowed for such investment adopted it. However, in recent years, CTI has become much more affordable and accessible, with tools dedicated to processing and distributing CTI. Combined with CTI sharing partnerships and information sharing and analysis centers (ISACs), CTI is now more accessible than ever, even for small businesses that were previously financially restricted from accessing this important cybersecurity tool.



PUBLISHED: Mon, 17 Apr 2023 00:00:00 +0000
AUTHOR: Steve Brasen - Former EMA Analyst

Modern business success and growth are dependent on the effectiveness of identity management technologies. The ability of workforces to rapidly access and utilize IT resources determines an organization’s agility in responding to customer requests, competitive engagements, and changing market conditions. However, this access must be granted responsibly to ensure the business meets requirements for security and regulatory compliance.



WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Success

PUBLISHED: Thu, 13 Apr 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Nearly one decade has passed since the phrase “software-defined wide-area networking” entered IT industry vernacular. Vendors and industry analysts coined the term to describe a class of technologies that enable an enterprise to build a wide-area network (WAN) where sites can connect via multiple redundant paths (including private and managed WAN services and public internet connections) securely and with centralized management and control.



WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Success

PUBLISHED: Thu, 13 Apr 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This is the research summary for EMA's report, "WAN Transformation with SD-WAN." 



2023 EMA Vendors to Watch: Information Security, Risk, and Compliance Management

PUBLISHED: Wed, 05 Apr 2023 00:00:00 +0000
AUTHOR: Chris Steffen

EMA Vendors to Watch are companies that deliver unique customer value by solving problems that previously went unaddressed, or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2023 EMA Vendors to Watch in the Information Security, Risk, and Compliance Management field, including NETSCOUT.
 
Additional vendors will be added to this document throughout the year.



The Rise of AI-Powered SASE and Digital Experience Monitoring

PUBLISHED: Tue, 04 Apr 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This white paper explores how AIOps can optimize the digital experience management capabilities of a secure access service edge (SASE) solution by breaking down data silos and automating critical workflows for IT, network, and security teams. The paper also reviews Palo Alto Networks’ AIOps-powered solution, Autonomous Digital Experience Management (ADEM), and examines how it meets the requirements for a modern SASE solution.



Operational Efficiency at Scale with Intent-Based, No-Code Network Automation

PUBLISHED: Sat, 01 Apr 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This paper explains why network teams can no longer rely on tactical, developer-dependent, script-heavy approaches to network operations. Instead, they should adopt simpler and more scalable no-code network automation that aligns with business outcomes. This paper also looks at the benefits such a solution can offer and reviews the capabilities of NetBrain, a pioneer in no-code, intent-driven network automation.



DDI Maturity Drives Multi-Cloud Success: Exploring small and medium enterprises in Europe, the Middle East, Asia-Pacific, and Latin America

PUBLISHED: Fri, 31 Mar 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This research report explores the state of DDI (DNS, DHCP, and IP address management) maturity in small and medium enterprises (500 to 2,500 employees) across Europe, the Middle East, the Asia-Pacific region, and Latin America. It was prepared in collaboration with BlueCat Networks and is based on a survey of 451 IT professionals involved in DDI solutions in their organizations.



Automation, AI, and the Rise of ServiceOps

PUBLISHED: Tue, 28 Mar 2023 00:00:00 +0000
AUTHOR: Valerie O'Connell

ServiceOps is a smart way for IT service and IT operations teams to work together to deliver and maintain excellence in IT service. Enabled by technologies such as automation and AI, ServiceOps is a vendor-neutral approach to IT management that cuts waste and cost, increases IT personnel productivity and efficiency, and improves IT service quality, as well as the experience of its users.



AIOps now: doing more with less and doing it better

PUBLISHED: Fri, 24 Mar 2023 00:00:00 +0000
AUTHOR: Valerie O'Connell

IT organizations are not strangers to change. It raged fast and furious over the past few years. Acceleration of planned digital transformation initiatives executed alongside unplanned adaptations to global realities that almost no one saw coming.
 
Thanks largely to swift—and even heroic—actions by IT, most organizations not only survived, but improved. That collective breath of relief was short-lived. Today, geopolitical forces of war and the economic ambiguity of uncertain times combine to drive many enterprises into tried-and-true belt-tightening measures.



Multi-Cloud Networking: Connecting and Securing the Future Aviatrix Summary

PUBLISHED: Wed, 22 Mar 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This is the summary report for EMA's "Multi-Cloud Networking: Connecting and Securing the Future" research report, sponsored by Aviatrix. 



Observability 2.0: Smart Observability to Connect Business and DevOps

PUBLISHED: Wed, 15 Mar 2023 00:00:00 +0000
AUTHOR: Torsten Volk

New code releases, new database queries, infrastructure upgrades, and configuration changes need to be evaluated by their business impact. There is no value in the most elegant code functions or the most streamlined and automated CI/CD pipelines if the resulting new capabilities do not “move the needle” for the business.



API Security: Debunking the Myths

PUBLISHED: Mon, 13 Mar 2023 00:00:00 +0000
AUTHOR: Chris Steffen

Enterprises are finally starting to pay attention to application security as theoretical threats to their application infrastructure become reality. For years, security vendors have discussed DevSecOps solutions and the benefits they bring to the mature enterprise, but forecasted attacks on APIs and infrastructure as code (IaC) have put application security in the spotlight.



PUBLISHED: Thu, 23 Feb 2023 00:00:00 +0000
AUTHOR: Chris Steffen

The Internet Engineering Task Force (IETF) finalized its TLS 1.3 standard for network encryption in 2018, backed by heavy promotion of the new standard from the major web server and browser vendors. Back then, the new 10-year-in-the-making standard promised better privacy. However, it also threatened to break how IT networking and security professionals troubleshoot networking problems and monitor the presence of malware and malicious actors operating within those networks.



Network Observability: Delivering Actionable Insights to Network Operations Summary

PUBLISHED: Mon, 13 Feb 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This is the summary for EMA's Network Observability report, sponsored by Broadcom.



Build or Buy? Self-Service DevOps Platform Engineering

PUBLISHED: Fri, 03 Feb 2023 00:00:00 +0000
AUTHOR: Chris Steffen

Traditional information security practices used to be relatively easy to perform compared to those needed in today’s world of microservices and the public cloud. Security professionals mitigated most attacks traditionally at the centralized network firewall level. If that failed, the end host firewall could act as a safety net for attacks that slipped through. On-premises applications ran on local dedicated servers or in virtual machines hosted in corporate data centers—you didn’t need to worry about configuring distributed access rules because the entire local network could be trusted.



Multi-Cloud Networking: Connecting and Securing the Future Nefeli Networks Summary

PUBLISHED: Fri, 27 Jan 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This is the summary report for EMA's "Multi-Cloud Networking: Connecting and Securing the Future" research report, sponsored by Nefeli Networks. 



Multi-Cloud Networking: Connecting and Securing the Future

PUBLISHED: Wed, 25 Jan 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Today’s enterprises are increasingly using multiple cloud providers for a variety of reasons. This market research from Enterprise Management Associates explores how enterprises are addressing the networking requirements of their multi-cloud architectures. It explores pain points, technology requirements, and operational strategies for multi-cloud networks.



Multi-Cloud Networking: Connecting and Securing the Future Research Summary

PUBLISHED: Wed, 25 Jan 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This is the summary for EMA's research report, "Multi-Cloud Networking: Connecting and Securing the Future." 



The business view of cross-functional workflow and IT automation

PUBLISHED: Tue, 24 Jan 2023 00:00:00 +0000
AUTHOR: Valerie O'Connell

IT automation is either a competitive advantage or a competitive gap. The difference is in adoption and execution. After all, if one company can operate faster and more efficiently than another, they have an advantage in execution and margin over their less automated peers. That gap is clearly visible in the response of 400+ global IT leaders EMA asked to estimate the percentage of IT tasks that use automation.



PUBLISHED: Thu, 19 Jan 2023 00:00:00 +0000
AUTHOR: Chris Steffen

From 2015 to 2021, the number of new vulnerabilities per year in the National Vulnerability Database grew from 6,487 to 20,139. This increase in vulnerabilities may be due to a significant skills gap when it comes to secure software development. In 2019, a review of the top 20 computer science schools found that of the schools listed, only one had security as an undergraduate degree requirement for Computer Science. Simply put, software developers are not being taught secure coding practices at colleges and universities, and with a significant number of organizations failing to invest in any secure coding training whatsoever, even some of the most seasoned developers in the industry may have little to no awareness of secure coding concepts.



How to Succeed with Load Balancing in a Hybrid Multi-Cloud World

PUBLISHED: Fri, 06 Jan 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This report, prepared for Progress Software, explores how IT organizations are evolving their approach to load balancing and application delivery controllers to support hybrid cloud and multi-cloud. The research findings are based on a July 2022 survey of 152 North American IT professionals involved in their organization’s data center and cloud load balancing strategies.



IT process automation: where business and technology meet

PUBLISHED: Thu, 05 Jan 2023 00:00:00 +0000
AUTHOR: Valerie O'Connell

Today’s IT environments are pervasively hybrid, increasingly complex, and in a constant state of change. As new technologies take hold, IT responds with new tools. The resultant islands of specialized management and automation add another layer of complexity to the everexpanding IT estate. IT operations teams need to automate cross-domain workflows and processes to avoid drowning in a sea of mundane tasks and increased costs.



Driving Operational Efficiencies Through Network Performance and Security Collaboration

PUBLISHED: Mon, 19 Dec 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Multi-cloud architecture, hybrid work, the Internet of Things, and other technology initiatives are adding complexity to the enterprise network. This complexity challenges the network team’s ability to manage performance and the security team’s ability to protect the business. Network and security teams are responding to these challenges by collaborating and converging.



Modern ITAM in the digitally transformed enterprise

PUBLISHED: Mon, 28 Nov 2022 00:00:00 +0000
AUTHOR: Valerie O'Connell

IT asset data and information accuracy is foundational to excellence in the delivery of business-driven IT service. That fact is magnified in environments that are pervasively hybrid, increasingly complex, and in a constant state of change.



PUBLISHED: Wed, 16 Nov 2022 00:00:00 +0000
AUTHOR: Chris Steffen

Organizations continue to prioritize security and security spending, but that spending is often at odds with a more pressing business priority: regulatory compliance. Regardless of the industry vertical, all businesses are required to deal with a certain amount of regulatory compliance or vendor due diligence. For technology leaders, the best solution is to partner with compliance/risk/governance teams to address compliance control gaps while advancing the company’s security priorities.


     

Subscribe Now!

Subscribe with Netvibes

follow us in feedly

EMA on LinkedIn   EMA on Twitter   EMA RSS   EMA on YouTube

©1996-2024 Enterprise Management Associates, Inc. All rights reserved.
EMA™, ENTERPRISE MANAGEMENT ASSOCIATES®, and the mobius symbol are registered trademarks or common-law trademarks of Enterprise Management Associates, Inc.
Site Terms & Conditions | Integrity Policy | Site Map | My Account
Hide
Subscribe to EMA RSS Feed
Email
Show