CONTACT    SIGN IN    SIGN UP
    

Free RSS Feeds from Enterprise Management Associates (EMA)

Stay up to date on the latest IT and data management information from EMA, including Webinars, Radar Reports, white papers, impact briefs, advisory notes and more!

Select your preferred reader by selecting an icon on the right.



Current Feed Content:




Modern ITAM in the digitally transformed enterprise

PUBLISHED: Mon, 28 Nov 2022 00:00:00 +0000
AUTHOR: Valerie O'Connell

IT asset data and information accuracy is foundational to excellence in the delivery of business-driven IT service. That fact is magnified in environments that are pervasively hybrid, increasingly complex, and in a constant state of change.



PUBLISHED: Wed, 16 Nov 2022 00:00:00 +0000
AUTHOR: Chris Steffen

Organizations continue to prioritize security and security spending, but that spending is often at odds with a more pressing business priority: regulatory compliance. Regardless of the industry vertical, all businesses are required to deal with a certain amount of regulatory compliance or vendor due diligence. For technology leaders, the best solution is to partner with compliance/risk/governance teams to address compliance control gaps while advancing the company’s security priorities.



PUBLISHED: Wed, 16 Nov 2022 00:00:00 +0000
AUTHOR: Valerie O'Connell

Google “cost of an IT outage” or any of its variants. The result will be a cascade of links proclaiming some version of, “According to Gartner, the average cost of IT downtime is $5,600 per minute.” Like an old family legend passed from generation to generation by word of mouth, industry pundits have been using the figure of $5,600/minute for the average cost of an IT outage since 2014. Cited as gospel, the figure has gone largely unchallenged—though Ponemon Institute is sometimes credited with raising Gartner’s ante to $9,000/minute. Upon closer inspection, it appears that the iconic $5,600/minute figure is an urban legend.



Global Workload Automation Market Size and Forecast: 2022 to 2027

PUBLISHED: Tue, 15 Nov 2022 00:00:00 +0000
AUTHOR: Dan Twing

EMA has been covering the workload automation market since 2009. The “EMA WLA Radar Report” is published every two years, and this analysis is rooted in the products, support, and services of the vendors in the workload automation market, with only minor attention to the vendor’s size or market share. As attention in WLA has risen, so have the requests for EMA to do a market sizing report. The increasing attention in the WLA market is a result of innovation and growth as WLA has been key to supporting several IT trends, including big data, digital transformation, and the migration of legacy production workloads to the cloud. Also raising interest in WLA is the drive to apply automation across the enterprise—a trend that increased with the COVID-19 pandemic and the Great Resignation.



The Rise of Low-Friction Access: Emerging Requirements and Solutions for Boosting Workforce Productivity and Security Assurance

PUBLISHED: Tue, 08 Nov 2022 00:00:00 +0000
AUTHOR: Steve Brasen

Driven by accelerating IT security threats, increased requirements to support remote workforces, the introduction of zero trust initiatives, and evolving user expectations on technology performance, organizations are broadly introducing new requirements for identity security. To provide businesses with actionable guidance on identifying the optimal path to streamlining authentication processes, Enterprise Management Associates (EMA) conducted primary research with the goal of identifying current requirements, challenges, and adopted solutions in relation to mitigating access friction.



PUBLISHED: Thu, 03 Nov 2022 00:00:00 +0000
AUTHOR: Steve Brasen

This is the summary report for EMA's Radar for Digital Employee Experience Management. 



PUBLISHED: Thu, 03 Nov 2022 00:00:00 +0000
AUTHOR: Steve Brasen

This is Applixure's vendor profile summary from the EMA Digital Employee Experience Management Radar Report.



PUBLISHED: Thu, 03 Nov 2022 00:00:00 +0000
AUTHOR: Steve Brasen

This is Alluvio Aternity's vendor profile summary from the EMA Digital Employee Experience Management Radar Report.



PUBLISHED: Thu, 03 Nov 2022 00:00:00 +0000
AUTHOR: Steve Brasen

All modern businesses are dependent on digital technologies to drive workforce productivity to achieve company performance and financial success. The principles of digital transformation and modern management postulate that digital technologies should principally support user-centric requirements and preferences to maximize business productivity. However, traditional IT management tools are not designed to fully gauge and respond to user experiences issues. Digital experience management (DEX) solutions emerged in recent years to directly address this service delivery gap. Related solutions collect comprehensive contextual information on user interactions with digital technologies, analyze the data to quantify user experiences, and provide support for remediating any deficiencies. This Enterprise Management Associates® (EMA™) Radar Report identifies the 12 leading DEX solution providers—including 1E, Applixure, Catchpoint, Cisco, ControlUp, Datadog, Dynatrace, Lakeside, Martello, Nexthink, Qualtrics, Alluvio Aternity, and VMware—and empirically compares and grades their offered solutions against a broad range of measurements to determine overall product strengths and cost-efficiencies.



Driving Observability Through Machine Learning and Predictive Analytics

PUBLISHED: Tue, 01 Nov 2022 00:00:00 +0000
AUTHOR: Will Schoeppner

Analytics used in business decisions is nothing new. However, the need for real-time, reliable data is increasing and is a necessity to remain competitive in today’s business landscape. In addition, observability has been around for some time. However, observability has become even more critical with the complexity of a hybrid, multi-cloud environment. To add to the challenges and complexity, the term “observability” has not been clearly defined and can be broad in context.



The State of Data Center Networking: 2022 Annual Report

PUBLISHED: Tue, 01 Nov 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This second annual edition of “The State of Data Center Networking” reveals that on-premises data centers and private cloud remain essential core components of a hybrid, multi-cloud strategy with high-availability applications. To ensure that private infrastructure serves the needs of a digital enterprise, network teams must modernize their data center networks. This research shows how companies are achieving this goal with network overlay fabrics and network automation. It also explores the challenges they encounter on their journey to a hybrid, multi-cloud future.



ITAM accuracy: a foundation for business effectiveness

PUBLISHED: Tue, 01 Nov 2022 00:00:00 +0000
AUTHOR: Valerie O'Connell

Device42 recently co-sponsored independent field research on the changing shape of modern ITAM in the days of digital transformation in a work-from-anywhere world. Research analyst firm Enterprise Management Associates (EMA) conducted in-depth analysis of insights from 300 IT leaders in North America, EMEA, and APAC. The participants represented companies across industries, 70% of which were in the 1,000-10,000 employee range.



Network Observability: Delivering Actionable Insights to Network Operations

PUBLISHED: Tue, 25 Oct 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

The tools that enterprises use to monitor and manage their networks are under a harsh spotlight today. Network operations teams are struggling to maintain visibility in a rapidly changing digital world. In fact, the number of network operations teams that are successful with their overall missions has declined from 47% in 2018 to 27% in 2022, according to EMA’s Network Management Megatrends research.



An Open Look at the Top Seven Criterion for Evaluating a Cloud Security Solution

PUBLISHED: Wed, 05 Oct 2022 00:00:00 +0000
AUTHOR: Chris Steffen

Whether an attacker’s end goal is data exfiltration or holding your data hostage through ransomware, ultimately, the target is your data. Attackers will do whatever it takes to gain access to your data, stealing user credentials through phishing attacks, installing malware to silently open back doors, and traversing whichever parts of your network they need to make access happen. As the information technology landscape evolves and becomes increasingly complex, the complexities open new doors and attack vectors for attackers to leverage. Unfortunately, as the industry continues to shift toward more data stored in the cloud, traditional security approaches are losing their effectiveness.



Any Company can Transform Security with Cloud-Based Zero Trust Network Access

PUBLISHED: Fri, 30 Sep 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

With 85% of companies reporting a permanent increase in employees who work from anywhere due to the COVID-19 pandemic, secure remote access to corporate applications and data is more important than ever.
 
A network team typically has no control over the local home office network or public Wi-Fi to which remote employees are connecting. These remote networks rely on unsecured internet connections to reach corporate resources. Moreover, remote employees are accessing applications and data that they previously accessed only within a corporate network perimeter. These resources must be protected.



2022 EMA Vendors to Watch: Network Management

PUBLISHED: Mon, 26 Sep 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that previously went unaddressed, or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2022 EMA Vendors to Watch in the network management field, including MantisNet and Graphiant.



DDI Maturity Drives Multi-Cloud Automation and Security

PUBLISHED: Mon, 26 Sep 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This research report explores the state of DDI (DNS, DHCP, and IP address management) maturity in enterprises. It examines the drivers of DDI maturity, and the best practices and challenges associated with the technology. Based on a survey of 227 IT professionals, EMA prepared this research for BlueCat, a provider of DDI solutions.



PUBLISHED: Thu, 22 Sep 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Enterprise Management Associates (EMA) research determined that investment in full-stack observability with SolarWinds can deliver millions in return on investment (ROI). These returns are earned through improved efficiency of IT operations, avoidance of capital expenditures, and improved business outcomes.



Asset Management (IT and Beyond): Current State and Near-Term Outlook

PUBLISHED: Tue, 20 Sep 2022 00:00:00 +0000
AUTHOR: Valerie O'Connell

Now in its sophomore year, this research initiative provides practical field insight for IT practitioners involved in the day-to-day management of assets and IT service delivery. It offers the collective perspective of 300 global IT leaders, both today and in comparison to last year’s views. In 2021, ServiceNow commissioned Enterprise Management Associates (EMA) to conduct independent research that would establish a baseline for ongoing trend analysis.



Harnessing Kubernetes for Maximum Developer Productivity, Operations Efficiency, and Continuous Security

PUBLISHED: Thu, 08 Sep 2022 00:00:00 +0000
AUTHOR: Torsten Volk

Digital transformation focuses on establishing corporate cultures, processes, and technologies that enable an organization to deliver more valuable products faster and more frequently, sustainably, and efficiently than the competition. This allows organizations to attract and retain valuable talent, since the most impactful people gravitate toward an environment where they can be productive and successful.



Accelerators of Digital Transformation Maximizing the Business Impact of People

PUBLISHED: Tue, 23 Aug 2022 00:00:00 +0000
AUTHOR: Torsten Volk

Digital transformation is about people first. Hence, the success of digital transformation directly depends on an organization’s ability to provide staff with the skills, information, motivation, and autonomy needed for optimal decision-making, effectiveness, and efficiency.
 
This Enterprise Management Associates (EMA) research provides a data-driven analysis of strategic goals, priorities, success factors, and accelerators of digital transformation. The report ties each argument to its ability to maximize the impact of “people” as the foundation for business success.



How a Network Observability Platform can Prepare Your NetOps Team for the Future

PUBLISHED: Mon, 22 Aug 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Hybrid, multi-cloud architectures are shaping the future of enterprise network operations (NetOps) teams. EMA research found that the top four strategic drivers of NetOps teams are public cloud, cloud-native applications, SaaS applications, and data center modernization.



Network Automation Provides a Foundation for NetSecOps Convergence

PUBLISHED: Tue, 16 Aug 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This white paper explores the growing importance of establishing an effective partnership between network operations and security operations teams. The paper also explains how a network automation solution can facilitate an effective partnership between these groups. This report was prepared for Blue Planet, a division of Ciena that delivers intelligent automation software solutions.



Network Visibility Architecture Will Make or Break Cloud Transformation

PUBLISHED: Thu, 04 Aug 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This white paper, based on new research by EMA, provides insight and guidance to IT and cybersecurity leaders who are adapting their network visibility solutions to a hybrid, multi-cloud future. It identifies best practices for ensuring the delivery of network traffic data to performance and security analysis tools. EMA created this paper for Gigamon, a leading vendor in the network visibility industry.



Top 10 Points to Consider When Selecting a Zero Trust Network Access Solution

PUBLISHED: Thu, 04 Aug 2022 00:00:00 +0000
AUTHOR: Chris Steffen

Zero trust is a set of principles designed to reduce or remove implicit trust in networked systems by addressing network identity, endpoint health, and data flows, to shift security focus from the network to users and devices. Going beyond the hype and technical jargon, zero trust is a safety net. It augments and reinforces the security measures of existing controls while allowing IT administrators to simplify and flatten their network.



Evolving Requirements for Digital Experience Management (DEX)

PUBLISHED: Wed, 03 Aug 2022 00:00:00 +0000
AUTHOR: Steve Brasen

Over the past few years, businesses have reassessed embracing user-centric approaches to IT. In particular, the “modern management theory” postulates that job satisfaction predicates workforce productivity, rather than financial compensation. Applying this principle to the present day, use of IT requires digital technology to serve the workers, rather than the other way around.



Effective Solutions for Digital Experience Management (DEX) July

PUBLISHED: Wed, 03 Aug 2022 00:00:00 +0000
AUTHOR: Steve Brasen

Traditional IT management practices are primarily business-centric. That is, they prioritize meeting business and IT efficiency requirements over that of user experiences. As such, traditional IT management toolsets natively include few features specifically targeted at improving employee satisfaction and productivity. To achieve modern management goals, IT solutions must address both business and user experience requirements simultaneously.



The Key to Creating Successful DevSecOps Teams

PUBLISHED: Thu, 28 Jul 2022 00:00:00 +0000
AUTHOR: Will Schoeppner

Today’s business relies on faster, more dependable delivery from internal technical teams. This reliance led to an increase in collaboration between information technology teams over the past few years, with DevOps teams and then with the addition of security to create a DevSecOps practice.



PUBLISHED: Thu, 28 Jul 2022 00:00:00 +0000
AUTHOR: Will Schoeppner

Today’s business relies on faster, more reliable delivery from internal technical teams. This has led to an increase in collaboration between information technology teams over the past few years with DevOps teams, then with the addition of security teams to create a DevSecOps practice. This coordination focused on eliminating silos that are known to plague technical teams for years. However, for companies to realize the successes of these cross-functional teams, there must be a focus on three key pillars.



How Federal Departments and Agencies can Address the Packet Capture Requirements of White House Executive Order 14028

PUBLISHED: Thu, 07 Jul 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

All United States federal departments and agencies are facing significant packet capture requirements that may force IT organizations to modernize infrastructure and operations.
 
On May 12, 2021, the White House issued Executive Order 14028, which details policies and requirements for improving the federal government’s response to cybersecurity incidents. Among the several phased requirements for data retention related to digital infrastructure, the executive order includes a February 27, 2023 deadline for compliance with a new packet capture requirement. By that date, according to an Office of Management and Budget (OMB) memo, all federal agencies and departments must start capturing and retaining 72 hours’ worth of all packet data that traverses their networks, both on-premises and in the cloud.



Beyond Theory: Orchestrating Unified Identity Security

PUBLISHED: Wed, 06 Jul 2022 00:00:00 +0000
AUTHOR: Steve Brasen

Modern businesses must deliver IT services to achieve organizational goals, enable workforce productivity, and drive profits. Unfortunately, the accessibility of digital resources also establishes significant vulnerabilities. Today, virtually all users—and all bots—have been granted some level of privileged access. Even mundane business apps, if compromised, can enable attackers to access the most sensitive business data.



Accelerating secure application development

PUBLISHED: Wed, 06 Jul 2022 00:00:00 +0000
AUTHOR: Will Schoeppner

In response to customer expectations for secure, always-on app experiences, digital transformations across development, operations, and delivery are on the rise. Alongside the need to push code faster, high-profile breaches and newly discovered vulnerabilities are reaching mainstream audiences more often, which also positions security as a top priority.



Report Summary: Network Visibility Architecture for the Hybrid, Multi-Cloud Enterprise

PUBLISHED: Thu, 30 Jun 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This is the report summary for EMA's research, "Network Visibility Architecture for the Hybrid, Multi-Cloud Enterprise." 



Network Visibility Architecture for the Hybrid, Multi-Cloud Enterprise

PUBLISHED: Thu, 30 Jun 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This Enterprise Management Associates (EMA) research explores how IT and security organizations use network visibility architectures to deliver network packets to critical performance and security analysis tools. It especially examines how organizations need to evolve their network visibility architectures as they adopt hybrid, multi-cloud architectures.



PUBLISHED: Tue, 28 Jun 2022 00:00:00 +0000
AUTHOR: Chris Steffen

In 1971, the first self-replicating virus (called Creeper) was unleashed across the ARPANET as a proof of concept. The virus itself was not designed to do any harm, but instead simply highlighted potential vulnerabilities in mainframe computers across the network. More humorous than destructive, this malware was mostly an annoyance, displaying the message “I’M THE CREEPER, CATCH ME IF YOU CAN” on infected systems. However, it did showcase the serious destructive potential for self-replicating malware in the future.
 
Unfortunately, long gone are the days of “joke” malware, since modern malware is no laughing matter. Today, ransomware is one of the fastest-growing threats in the cybersecurity industry, designed to not only self-propagate, but encrypt all files or entire systems across a network.



Using Compliance Budget to Advance Security Priorities

PUBLISHED: Tue, 21 Jun 2022 00:00:00 +0000
AUTHOR: Chris Steffen

Organizations continue to prioritize security and security spending, but that spending is often at odds with a more pressing business priority: regulatory compliance. Regardless of the industry vertical, all businesses are required to deal with a certain amount of regulatory compliance or vendor due diligence. For technology leaders, the best solution is to partner with compliance/risk/governance teams to address compliance control gaps while advancing the company’s security priorities. One of the best approaches to this solution is to implement security resolutions that directly address remediation items from a control gap list, or by finding dual-purpose security solutions that solve a compliance-related challenge while augmenting security capabilities.



Beyond ITAM: Enterprise(wide) technology management

PUBLISHED: Wed, 15 Jun 2022 00:00:00 +0000
AUTHOR: Valerie O'Connell

From multi-cloud infrastructure and SaaS to work-from-anywhere devices and across data centers, IT technology is widely distributed at unprecedented levels of diversity, sheer numbers, and business criticality. Yet, ITAM tools often lag behind enterprise needs for enterprise-wide visibility, availability, and accuracy of information, locked in silos of specialized function.



2022 State of API Security

PUBLISHED: Mon, 06 Jun 2022 00:00:00 +0000
AUTHOR: Chris Steffen

For years, security vendors have discussed DevSecOps solutions and the benefits they bring to the mature enterprise, but forecasted attacks on APIs and infrastructure as code (IaC) have put application security in the spotlight. Organizations of every size will invest in application security tools and tools that address every market of every size will have a decisive advantage to exploit this emerging trend. Modern applications, composed of functions and services, require developers to rely on APIs to communicate between applications and their components to share data and drive functionality. These applications are mobile, distributed, and have instances in cloud and on-premises.



Hybrid Work Requires Network Transformation

PUBLISHED: Thu, 02 Jun 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Hybrid work, or working from anywhere, is the future, and the future has arrived. The pandemic mainstreamed it, but the benefits of hybrid work will ensure it sticks around. According to Enterprise Management Associates (EMA) research, 85% of companies have experienced a permanent increase in the number of employees who work from home at least part time. Note the word “permanent.” Companies have clearly recognized that hybrid work has business benefits that deliver value indefinitely.



$11B European Retailer Reduces OpEx by $478,000 Moving to SolarWinds Full-Stack Observability Solutions

PUBLISHED: Mon, 23 May 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

An $11B European retail enterprise with more than 1,600 stores and warehouses across the world upgraded its IT operations toolset with a full-stack Observability suite from SolarWinds®. Over three years, the company has earned nearly $478,000 in operational expense savings against a total SolarWinds investment of $397,000. The SolarWinds investment paid for itself in two and a half years.



Communications Service Provider Saves Millions by Expanding to SolarWinds Full-Stack Observability

PUBLISHED: Mon, 23 May 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

After replacing several open-source monitoring tools with the components that make up the foundation of the full-stack SolarWinds® Hybrid Cloud Observability solution, a national communications service provider has saved more than $2 million in recurring annual costs. The service provider also leveraged the SolarWinds solution to avoid paying more than $2.6 million in fees for service-level agreement (SLA) violations by minimizing the impact of an infrastructure problem capable of affecting its customers.



Enterprise Cloud Operations Team Saves Millions With SolarWinds Full-Stack Observability

PUBLISHED: Mon, 23 May 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This return on investment (ROI) case study examines how a global software provider’s cloud operations organization earned a $5.4 million ROI by adopting a full-stack observability solution from SolarWinds. The observability solution streamlined performance management, capacity planning, and operational reporting, conservatively earning more than a 5x ROI over three years and breaking even in less than two years.



Responsible CIAM: Architecting High Security and Flexibility in Consumer Engagements

PUBLISHED: Thu, 19 May 2022 00:00:00 +0000
AUTHOR: Steve Brasen

For any modern business, the most essential outcomes derive from online interactions with consumer audiences. Web traffic and other online digital engagements are now the primary method organizations rely on for direct retail sales, account management, and to deliver ad-based services. Additionally, online resources have introduced whole new revenue streams with their ability to collect consumer information for resale on open markets. Regardless of an organization’s unique business model, consumer digital engagements are instrumental to achieving profitability and meeting organizational goals.



The Mainframe as the Foundation of the Modern Enterprise

PUBLISHED: Thu, 19 May 2022 00:00:00 +0000
AUTHOR: Chris Steffen

Technology continues to be at the center of the modern enterprise. More often than not, the success of the enterprise is directly related to the maturity of the information technology processes and solutions they have adopted. Companies that embrace and utilize technical advances can move from a small corner store to the names and logos people immediately recognize as part of everyday life. Nothing can be more critical to the continuing success of the enterprise than the computing power that has become the nerve center of the modern enterprise.



The Evolving Dynamics of Insider Risk, Privacy, and Compliance

PUBLISHED: Wed, 11 May 2022 00:00:00 +0000
AUTHOR: EMA Staff

With a global shift toward work from home and work from anywhere, organizations are struggling to find the right balance of protecting against insider threats and protecting employee privacy. With many employee devices now outside the network, traditional insider threat technologies are losing visibility. New privacy regulations present additional challenges to organizations. However, new approaches to insider threat detection may provide a better way forward.



AIOps automation: real-world challenges and rewards

PUBLISHED: Tue, 10 May 2022 00:00:00 +0000
AUTHOR: Valerie O'Connell

Game-changing digital transformation initiatives and disciplines, such as DevOps and SRE, require new levels and types of interaction and automation for cross-domain workflows, efficiencies, and business outcomes. Enter the AIOps platform. Capable of powering staggering gains in efficiency and effectiveness, the one-two punch of AI/ML and automation blurs the lines between functional domains. EMA recently surveyed 406 IT professionals in North America, EMEA, and APAC to look at AI-enabled, cross-functional automation and processes as practiced today and as planned for the near future.



EMA Products to Watch in 2022/2023: Data-Driven Guidance for Product Evaluation

PUBLISHED: Tue, 03 May 2022 00:00:00 +0000
AUTHOR: Torsten Volk

EMA created the “EMA Products to Watch in 2022/2023 Guide” for anyone looking for data-driven and transparent market research and product recommendations. Our guide includes many charts and data points interesting for C-levels skimming through while providing the depth needed for more technical roles aiming to dive into detailed market metrics and product characteristics. Note that this guide is a living project, with ”EMA Products to Watch” published on an ongoing basis.



Network Management Megatrends 2022: Navigating Multi-Cloud, IoT, and NetDevOps During a Labor Shortage

PUBLISHED: Fri, 29 Apr 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

The 2022 edition of Enterprise Management Associates’ biennial “Network Management Megatrends” is the definitive benchmark of the state of enterprise network operations. Based on a survey of more than 400 IT organizations and one-on-one interviews with senior networking experts in Fortune 500 companies, this report should help network managers optimize operations while planning for future initiatives.



PUBLISHED: Sat, 16 Apr 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

It is often said that packets are the best source of truth about what is happening on a network. With encryption, this axiom remains valid, but the means of revealing that truth are shifting. As encryption rises in popularity, traditional packet analytics are no longer as feasible as they once were. 



Chart a Path to Digital Transformation with Application-Aware, AIOps-Driven Network Performance Management

PUBLISHED: Mon, 11 Apr 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Prepared for IBM, this white paper draws on years of industry research by Enterprise Management Associates to explain why network operations teams must modernize their network performance management tools to support digital transformation. It explores the new requirements that IT organizations have for their tools and provides a step-by-step guide for choosing a new solution. 



IT ServiceOps: innovation at business speed and scale

PUBLISHED: Thu, 07 Apr 2022 00:00:00 +0000
AUTHOR: Valerie O'Connell

ServiceOps is not a product you can buy. It’s not even a methodology you can promote. It is a concept that captures the practical result of technology applied to the delivery and governance of IT services at the speed, scale, and volume of business innovation. It is AI-assisted automation for collaboration of IT service and IT operations.



EMA Research Report: A Data-Driven Enterprise

PUBLISHED: Thu, 31 Mar 2022 00:00:00 +0000
AUTHOR: Will Schoeppner

Today’s business relies on data analytics more than ever to remain ahead of the competition. To have a cutting edge, data analytics for informed business decisions and workflow automation at all levels of the organization is critical to achieve overall success. Due to the challenges over the last two years, organizations must respond to greater demand for data access and a shift to supporting AI/ML in a complex, hybrid multi-cloud environment. Organizations need to become nimble in providing fast, reliable access to data anytime, anywhere, throughout their increasingly complex, integrated enterprise. Research proves that demands on customer experience, the ever-growing challenge of staying ahead of risk and market swings, and employee engagement are the driving factors for these shifts.



AIOps means business: IT innovation for business advantage

PUBLISHED: Tue, 29 Mar 2022 00:00:00 +0000
AUTHOR: Valerie O'Connell

AIOps’ roots run deep in the IT tradition of constantly doing more with less—and doing it better. For IT, that means automation. The catch with traditional IT automation is that there’s nothing automatic about it. It requires intelligence to construct and instruct the actions. When complexity and change reach a scale and velocity that far outstrip human capacity to comprehend, automation slams into a wall.



2022 EMA Vendors to Watch: Security and Risk Management

PUBLISHED: Mon, 28 Mar 2022 00:00:00 +0000
AUTHOR: EMA Staff

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that previously went unaddressed, or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2022 EMA Vendors to Watch in the security and risk management field, including ARMO, DuploCloud, and Telos.



PUBLISHED: Wed, 23 Mar 2022 00:00:00 +0000
AUTHOR: Will Schoeppner

Today’s business relies on access to critical data more than ever to remain ahead of the competition. Due to the challenges over the last two years, organizations must respond to greater demand for data access and a shift to supporting AI/ML in a complex, hybrid multi-cloud environment. Organizations need to become nimble in providing fast, reliable access to data anytime, anywhere, throughout their increasingly complex, integrated enterprise.



AI service automation: ITSM and ITOps convergence

PUBLISHED: Thu, 10 Mar 2022 00:00:00 +0000
AUTHOR: Valerie O'Connell

Digital transformation—the use of digital technologies to create or modify business processes, applications, and customer experiences to meet changing business and market requirements—has been well underway for years. It simply got turbocharged with the dramatic and sudden events that rocked the globe. Five-year plans were compressed into months where possible as organizations fast-tracked strategic initiatives heavy on automation combined with artificial intelligence (AI), machine learning (ML), and analytics.



The Threat From Within: Strategies to Defend Against a Growing Threat Vector

PUBLISHED: Thu, 24 Feb 2022 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - Paula Musich

Threat researchers continue to document a disturbing shift in the source of big, expensive data breaches from external attackers to insiders, and multiple studies have documented an increase in the percentage of data breaches attributed to insiders.



Event management done right cuts incidents as well as MTTR

PUBLISHED: Fri, 18 Feb 2022 00:00:00 +0000
AUTHOR: Valerie O'Connell

Events—in IT as well as in life—are too numerous to count. Most often, an event’s true impact only becomes apparent in retrospect. In IT, that usually means a major incident or outage. When IT services degrade to the point of impacting business, it is all-hands-on-deck to find and fix the problem as fast as possible. Speed counts when mean time to resolve (MTTR) is measured in both revenue and pain.



The Future of Data Center Network Automation

PUBLISHED: Mon, 14 Feb 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Despite years of predictions about applications and data migrating to the public cloud, data centers remain the indispensable core of any digital infrastructure. Enterprise Management Associates (EMA) defines a data center as a site where a technology organization owns and operates the compute, storage, and network infrastructure necessary for hosting digital applications and services. A technology organization might have direct control of the data center site (e.g., on-premises data center, server rooms, a telco central office), or it might pay for rack space in a hosted environment (e.g., a colocation data center).



The Future of Data Center Network Automation: Summary Report

PUBLISHED: Mon, 14 Feb 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This is the summary for the EMA research report "The Future of Data Center Network Automation." 



Taking a Situational Awareness Approach to Proactive, Risk-Aligned Security

PUBLISHED: Thu, 27 Jan 2022 00:00:00 +0000
AUTHOR: Chris Steffen

Every situation is different, and (in the case of information security) combating or defending the enterprise will likely depend on the parts most exposed to risk from an attack. You have to be aware of what parts of the enterprise are most at risk before you can ever know how to defend and protect it. Situational awareness is the cornerstone of a risk-based cybersecurity approach and critical for proactive security operations.



PUBLISHED: Thu, 27 Jan 2022 00:00:00 +0000
AUTHOR: Chris Steffen

Hardly a month goes by without a news cycle of the latest cyber-attacks: from a software supply chain attack, to ransomware, to some kind of personal data exposure. They are so numerous that most people only pay attention when it is a “major” breach or happens to a company they have a relationship with. But more often than not, people are never told what really happened for a number of reasons: the companies involved do not want the negative publicity (they want the whole thing to “just go away”), there is an active criminal investigation, or the problem wasn’t really resolved completely. It is the last reason that may be the biggest source of concern: why would you not try to eliminate a known—and previously exploited—vulnerability from your environment?



Taking a Strategic Approach to Network Operations

PUBLISHED: Thu, 27 Jan 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Many of today’s IT organizations are still taking a labor-intensive, manually executed, tactical approach to network operations, even as their infrastructures have grown dramatically in scope, scale, and complexity over time. They may be hindered by a lack of end-to-end visibility across their platform domains or the perception that newer and more scalable approaches, such as automation, may not be applicable to NetOps due to the uniqueness of network problem-solving technologies. In some cases, they simply lack a broader vision about how to scale operations because they don’t have the experience needed to think differently about the challenge.



Unknown Vulnerabilities Become the Top Active Directory Security Posture Concerns

PUBLISHED: Thu, 20 Jan 2022 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - Paula Musich

As any security practitioner will tell you, trying to close exposures in Microsoft’s Active Directory (AD) is like trying to fill in the holes of a constantly morphing block of Swiss cheese. Because Active Directory’s configuration is in a continual state of flux, bad actors perpetually find new ways to exploit vulnerabilities to achieve their illicit aims. It’s no wonder that the top Active Directory security posture concern for most IT security practitioners is unknown AD vulnerabilities, followed closely by known but unaddressed AD vulnerabilities, according to new research conducted by Enterprise Management Associates on behalf of Semperis.



EMA Top 3 Enterprise Decision Guide 2022

PUBLISHED: Tue, 18 Jan 2022 00:00:00 +0000
AUTHOR: Torsten Volk

Enterprise Management Associates (EMA) presents its EMA Top 3 Awards to software products that help enterprises reach their digital transformation goals by optimizing product quality, time to market, cost, and ability to innovate.



Debunking Eight Myths About Securing Active Directory Against Malicious Attackers

PUBLISHED: Tue, 18 Jan 2022 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - Paula Musich

Securing Active Directory against exploitation by bad actors trying to leverage its privileges is a complex endeavor, made more difficult by the need to balance competing goals between endpoint administration and IT security teams. The complexity and depth of the directory system itself make it hard to find and fix the exposures and vulnerabilities that attackers seek to exploit. Clever attackers familiar with the directory system’s details can take any of the unique vulnerabilities or exposures and uncover an exponentially larger number of attack paths they can follow to get to their ultimate goal.



2022 EMA Vendors to Watch: Application and Performance Management

PUBLISHED: Fri, 07 Jan 2022 00:00:00 +0000
AUTHOR: Will Schoeppner

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that previously went unaddressed, or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.
 
This document contains the 2022 EMA Vendors to Watch in the application management field, including Aiven and Nastel.
 



AIOps: the difference between cloud survival and excellence

PUBLISHED: Fri, 31 Dec 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

New is always more interesting than what is already known. In that spirit, tech press coverage sometimes paints an apocalyptic picture of dust-covered data centers abandoned in wholesale migrations to the cloud. Although cloud adoption is certainly on the rise, it is erasing neither data centers nor IT complexity.



The Self-Driving Data Center in 2021

PUBLISHED: Fri, 31 Dec 2021 00:00:00 +0000
AUTHOR: Torsten Volk

The continuous automatic optimization of end-to-end application stacks can free up 50% of operator time by shattering the proportional relationship between adding more application capabilities and requiring additional human operators. If the required data streams are available, the self-driving data center (SDC) can free up the approximately 50% of data center and cloud infrastructure resources that are currently wasted through overprovisioning.



The Self-Driving Data Center in 2022: Start Small, but Start Now

PUBLISHED: Wed, 22 Dec 2021 00:00:00 +0000
AUTHOR: Torsten Volk

The continuous automatic optimization of end-to-end application stacks can free up 50% of operator time by shattering the proportional relationship between adding more application capabilities and requiring additional human operators. If the required data streams are available, the self-driving data center (SDC) can free up the approximately 50% of data center and cloud infrastructure resources that are currently wasted through overprovisioning.



The State of Microsoft 365 Performance Management

PUBLISHED: Mon, 13 Dec 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

Instinct and enterprise experience position Microsoft 365 as a suite of mission-critical capabilities that quietly power enterprise productivity on a daily basis. To be more specific, Martello commissioned EMA to conduct an entirely independent exploration of the state of Microsoft 365 as used in enterprises today. EMA fielded a research pool of 1,500 potential respondents in North America and Europe to vet 128 IT leaders to participate in this initiative.



ML-Driven Deep Packet Dynamics can Solve Encryption Visibility Challenges

PUBLISHED: Mon, 06 Dec 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Encryption may provide data security and privacy, but it also reduces visibility into network traffic. Both security teams and network teams are finding that their deep packet inspection technology cannot provide enough insight into encrypted traffic. This white paper explores an emerging class of technology called deep packet dynamics, which combines metadata generation and traffic behavior with machine learning and advanced analytics to restore this lost visibility and enable improved collaboration between security and network teams.



Balancing the Scale Between Profitable Relationships and Security

PUBLISHED: Tue, 30 Nov 2021 00:00:00 +0000
AUTHOR: Steve Brasen

EMA primary research identifies secure methods for reducing consumer
identity and access management (CIAM) administration friction



The State of Network Automation: Configuration Management Obstacles are Universal

PUBLISHED: Thu, 18 Nov 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This report details the findings of a market research study on network automation conducted by Enterprise Management Associates and Itential. It reveals that most IT organizations are struggling with network configuration management and are worried that their end-to-end networks will fail configuration compliance audits. Network automation can ease these concerns, as long as the network automation project starts with a strong focus on end-to-end configuration compliance. This report offers IT leaders a guide for how establish a strong foundation for network automation success.



Balancing the Scale Between Profitable Relationships and Security

PUBLISHED: Fri, 12 Nov 2021 00:00:00 +0000
AUTHOR: Steve Brasen

Most modern businesses are dependent on consumer digital engagements to drive profitability and achieve organizational goals. Online resources—including web-based retail stores, ad-based entertainment, and consumer accounts—are the cornerstone of commercial service delivery. Unfortunately, public-facing IT services are supremely vulnerable to attack, and particular efforts must be made to protect consumer data and interactions to meet requirements for security and compliance.



PUBLISHED: Tue, 19 Oct 2021 00:00:00 +0000
AUTHOR: Steve Brasen

In the world of IT management, it is easy to forget that the primary focus should be on supporting people, not machines. This should be obvious, but the core precepts of endpoint management principally address ensuring system performance, rather than focusing on meeting end-user preferences. Client lifecycle management best practices target the standardization of endpoint and application configuration to simplify administration efforts. However, there is no universal configuration option that is equally optimal for all users. For instance, an environment that is too complex for one user may be too simplistic for another.



NetSecOps: Aligning Networking and Security Teams to Ensure Digital Transformation

PUBLISHED: Mon, 18 Oct 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

For many years, EMA has observed signs that enterprises are trying to improve alignment between their network infrastructure and operations teams and their information security and cybersecurity teams. EMA market research has revealed increased collaboration between these groups. Also, vendors introduced solutions that facilitate this collaboration. For instance, network performance management vendors have started offering security solutions based on their existing intellectual property. In conversations with IT leaders, the importance of this collaboration comes up again and again. EMA refers to this expanding focus on network and security collaboration as NetSecOps.



EMA Radar Report for Workload Automation: Q4 2021

PUBLISHED: Thu, 14 Oct 2021 00:00:00 +0000
AUTHOR: Dan Twing

Workload automation in 2021 reflects an even greater push to expand the category beyond traditional scheduling, toward full automation orchestration. The consolidation that occurred over the past four years slowed a bit, but is warming up again because Turn River Capital has invested in both Advanced Systems Concepts, Inc. and Redwood Software, with possibly more to come. This class of software is becoming more important to the future of digital transformation and automation. These trends have been developing over the last five or six years, but are now becoming more broadly accepted as a key part of the future of IT management. While most of the products reviewed for this report have seen many feature enhancements over the past two years, the category as a whole saw fewer new features across the category than the period from 2017 to 2019. Rather, the bulk of the changes from 2019 to 2021 were more about strengthening the features required to address the four biggest trends affecting this segment than net new capabilities.



EMA 2021 Workload Automation Radar Report Summary

PUBLISHED: Thu, 14 Oct 2021 00:00:00 +0000
AUTHOR: Dan Twing

This is the summary for the 2021 Workload Automation Radar Report.



Identifying Effective Digital Employee Experience (DEX) Management Solutions: A Quantitative Analysis

PUBLISHED: Tue, 12 Oct 2021 00:00:00 +0000
AUTHOR: Steve Brasen

In recognition of the importance of improving workforce productivity, businesses have increasingly introduced solutions specifically designed to improve employee digital experiences. However, evolving requirements and challenges have obfuscated the types of technologies, solutions, and best practices that will most effectively drive increased end-user efficiencies and performance in the usage of digital resources. To help provide guidance on which approaches organizations should adopt, Enterprise Management Associates (EMA) conducted primary, survey-based research into the requirements, challenges, solutions, and outcomes employed in real business conditions today.



IT Asset Management: Current State and Near-Term Outlook

PUBLISHED: Mon, 04 Oct 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

IT complexity and change, sworn enemies of IT service quality and security, are on the rise. Crossing clouds and data centers, IT services, processes, and risks encompass users, devices, and non-IT technologies at the edge of enterprise business. Automation, analytics, and cross-domain workflows rightly receive attention as IT’s primary weapons against these escalating challenges. However, the fight is most often acted on the battleground of IT assets—physical, digital, on-premises, in clouds—throughout the enterprise.



IT Service Cost Tracking Impact: Research Findings

PUBLISHED: Mon, 04 Oct 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

EMA’s field experience frequently shows a management blind spot when it comes to IT service cost tracking. Although most organizations track service quality in terms of SLAs or periodic user satisfaction, they are more likely to know the cost of individual assets than the true cost of each individual service that IT delivers to the business.



The Rise of Active Directory Exploits: ls it Time to Sound the Alarm?

PUBLISHED: Thu, 30 Sep 2021 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - Paula Musich

For years, Active Directory has been a prime target for attackers looking to get a leg up into high-value enterprise resources, but it has not been front and center in most enterprise security teams’ list of priorities. While gaining access to Active Directory elements, such as access control lists and privileged accounts, is not the end attackers are seeking. It most often delivers the means to get to those valuable assets, whether those include customer information, intellectual property, or operating data that can be held for ransom.



Disrupting the Economics of Software Testing Through AI

PUBLISHED: Tue, 21 Sep 2021 00:00:00 +0000
AUTHOR: Torsten Volk

As the ability to accelerate the delivery of customer value through innovation, and at lower cost, has become today’s critical source for achieving competitive advantages, traditional software testing practices can no longer scale to meet business demands. Test automation frameworks typically rely on a jungle of test scripts written in different languages, using different sets of runtime parameters, and lacking consistent compliance testing capabilities. This forces the organization into the unfortunate choice of adding cost or risk to their agile development processes. They can either hire additional staff and increase test infrastructure to cope with the increasing test overhead, or they can accept the added risk that originates from incomplete testing practices.



The State of Modern Application Development: A Journey from Speed to Awareness

PUBLISHED: Fri, 17 Sep 2021 00:00:00 +0000
AUTHOR: Dennis Drogseth

Nothing could be more critical in the current world of IT than fast and reliable application development and delivery in support of business performance. This report, based on Q3 2021 research, shines a spotlight on accelerating trends such as platform teams, integrated security, site reliability engineers (SREs), and decentralization. The report also exposes areas of breakage and disruption as many IT organizations continue to struggle in their search for more cohesive approaches to application optimization.



EMA Top 3 Enterprise Decision Guide 2021

PUBLISHED: Wed, 15 Sep 2021 00:00:00 +0000
AUTHOR: Torsten Volk

Enterprise Management Associates (EMA) presents its EMA Top 3 Awarsd to software products that help enterprises reach their digital transformation goals by optimizing product quality, time to market, cost, and ability to innovate.



End-to-End Kubernetes Acceleration and Management Efficiency

PUBLISHED: Thu, 09 Sep 2021 00:00:00 +0000
AUTHOR: Torsten Volk

Adoption of microservices-based application architecture and the Kubernetes container scheduling and orchestration platform continues to increase at an annual pace of approximately 50%. Over the past six months, the number of software engineers using Kubernetes (Python) software libraries grew by 110%, while the number of DevOps teams making the Kubernetes plugin part of their release pipeline increased by 27% over the same timeframe. The fact that 98% of site reliability engineers require Kubernetes expertise in 2021 further underlines the status of Kubernetes as the standard platform for application transformation.



2021 EMA Vendors to Watch: Network Management

PUBLISHED: Thu, 02 Sep 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that previously went unaddressed, or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2021 EMA Vendors to Watch in the network management field, including AirEye.



EMA Radar Report: Network Performance Management

PUBLISHED: Tue, 24 Aug 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This Radar Report is aimed at assisting IT organizations that are procuring network performance management solutions for operational monitoring, troubleshooting, and capacity planning. This report should help buyers assemble a shortlist of vendors and guide their selection of a solution. Any of the 15 vendors represented in the report might be the best choice for an organization depending on the tools and solutions they currently have, their level of organizational maturity, their budget, their direction and vision, and their current mix of network technologies. 



SASE Transitions are Hard, but There are Ways to Make Them Less Painful

PUBLISHED: Mon, 23 Aug 2021 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - Paula Musich

In early 2020 many organizations were already well along in their digital transformation initiatives, but the rush to support users now working from home put those projects into overdrive. It also spurred greater interest in the emerging set of solutions described as Secure Access Service Edge, or SASE (pronounced sassy). When it comes to SASE adoption, the most difficult part of the journey in moving from separate, on-premises-based networking and security stacks to a largely cloud-based service is in the transition. The convergence of networking and security that forms the centerpiece of a SASE service has a number of implications that, when planned well, can make that transition significantly less painful.



How Ransomware Attacks Impact the Trustworthiness of IT Management Tools

PUBLISHED: Tue, 17 Aug 2021 00:00:00 +0000
AUTHOR: Chris Steffen

Ransomware attacks continue to escalate in 2021, and IT management tool vendors are scrambling to understand how to address these attacks while providing reasonable assurances that their solutions are secure.
 
Recently, the REvil ransomware affiliate began exploiting a zero-day vulnerability in Kaseya VSA at several managed service providers, ultimately encrypting thousands of downstream accounts. Kaseya provides IT management software tools to managed service providers (MSPs) or IT outsourcing shops to handle IT-related management solutions for organizations with little to no dedicated IT resources.



Data Security in a Multi-Cloud World

PUBLISHED: Wed, 11 Aug 2021 00:00:00 +0000
AUTHOR: Chris Steffen

Securing and protecting enterprise data is at the center of the modern security plan. In this research study conducted for IBM Security, Enterprise Management Associates polled over 200 technical leaders and practitioners from organizations of every size and vertical on their data security and privacy plans, as well as their perspectives on zero trust.
This eBook will highlight those findings, including the benefits of a zero trust approach and views on data privacy and security.



Post-Pandemic Networking: Enabling the Work-From-Anywhere Enterprise

PUBLISHED: Tue, 20 Jul 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

The COVID-19 pandemic forced hundreds of thousands of companies to send their employees home indefinitely. As the world starts inching toward a post-pandemic future, it’s clear that most companies will allow many employees to work from home forever. This research, based on a survey of 312 IT professionals, explores how enterprise IT organizations are adjusting their network infrastructure and operations to the massive and permanent increase in people who are working from home. It also explores the ripple effects this paradigm shift is having on on-premises network infrastructure.



Prepare for a Work-From-Anywhere Future with AIOps-Driven SASE

PUBLISHED: Thu, 15 Jul 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Secure access service edge (SASE) technology can deliver secure connectivity to enterprises that have embraced a work-from-anywhere future. However, user experience will remain a challenge because network operations teams are still using yesterday’s tools for tomorrow’s networks. A SASE solution that offers AIOps-driven management can solve this challenge. AIOps (artificial intelligence of IT operations) is a new class of solution that combines machine learning, AI, big data, and other advanced analytics technologies to enhance IT management. This white paper explores why enterprises should look for SASE solutions with AIOps smarts.



Consumer Identity and Access Management (CIAM): Responsible Solutions for Creating Positive Consumer Experiences

PUBLISHED: Wed, 07 Jul 2021 00:00:00 +0000
AUTHOR: Steve Brasen

Modern business success, by any measure, is reliant on the positive experiences of consumers during digital engagements. Consumer identity and access management (CIAM) processes and solutions govern the execution of processes for enabling consumer access to digital resources while ensuring security and compliance requirements are responsibly met. To help identify optimal solutions and best practices in support of CIAM objectives, EMA conducted survey-based research of organizations actively employing CIAM solutions. Among respondents, 65% reported their organization was impacted by a significant security breach in the last year, including malware infections, unauthorized uses of IT services, and the exposure of consumer data and credentials.



IT service cost tracking in ITSM: the missing link between IT service quality and business value

PUBLISHED: Tue, 06 Jul 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

In a great act of corporate irony, IT services that are SLA-ed with great precision are almost always mysteries when it comes to understanding their cost. Most IT organizations can report the quality of a service against a multitude of metrics, and they can detail IT budgets along departmental or asset lines. However, the cost of providing a service as it is actually consumed by the organization is largely an unknown. This operational blind spot is the missing link in any reasonable discussion of IT service business value. After all, how can the business value of a service be determined without knowing what it costs to deliver that service?



Unified Analytics in the Age of Cloud Supremacy: Creating Value From New Data, Old Data, and Fast Data

PUBLISHED: Mon, 21 Jun 2021 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - John Santaferraro

Recent EMA research shows that 53% of all data is now in the cloud. This massive movement of data to the cloud shifts the focus from migrations to cloud supremacy. It is no longer enough to be in the cloud; competition is pushing organizations to utilize cloud technology to create barriers to entry and unfair advantage.



Leveraging Workload Automation to Expand Enterprise Automation

PUBLISHED: Wed, 16 Jun 2021 00:00:00 +0000
AUTHOR: Dan Twing

Enterprises are relying on information technology (IT) more than ever before. It is commonly said that today, every company is an IT company. Customers, trading partners, and employees all expect to interact with the enterprise and each other digitally. Digital transformation brings IT closer to end customers and creates a greater need and more opportunities to automate. Automation done right frees employees from repetitive tasks, allowing more time for higher-value work. Automation brings consistency, which results in fewer errors and improved compliance with business processes. Automation also provides self-service opportunities and better information and interaction with the enterprise. All the new digital services and digital forms of interaction are contributing to the ongoing data revolution.



EMA Technical Case Study: Uber

PUBLISHED: Mon, 14 Jun 2021 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - John Santaferraro

Everyone knows Uber, but not everyone knows the clockwork that makes Uber tick. Everyone knows Uber as a shared service for point-to-point transportation, but not everyone knows Uber as a data and analytics company.
 
Every day, more than 18,000,000 riders key their location and destination into the Uber mobile app to request a ride or a meal. Unbeknownst to them, each transaction is plugged into complex algorithms built on insight gleaned from petabytes of data. The results come back in seconds with the most optimal recommendations for nearby drivers and pricing based on supply and demand economics.



The Business Value of AIOps-Driven Network Management

PUBLISHED: Tue, 08 Jun 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

The vast majority of network managers who have experience with AIOps solutions believe this emerging technology can improve network operations. They also believe that applying AIOps to network management will lead to better overall business outcomes for their companies. This white paper, based on new research by Enterprise Management Associates, reveals how AIOps can improve network management. More importantly, it offers proven advice on how to evaluate this technology and how you can build trust in the technology within your networking team.


     

Subscribe Now!

Subscribe with Netvibes

follow us in feedly

EMA on Facebook   EMA on LinkedIn   EMA on Twitter   EMA RSS   EMA on YouTube

©1996-2022 Enterprise Management Associates, Inc. All rights reserved.
EMA™, ENTERPRISE MANAGEMENT ASSOCIATES®, and the mobius symbol are registered trademarks or common-law trademarks of Enterprise Management Associates, Inc.
Site Terms & Conditions | Integrity Policy | Site Map | My Account
Hide
Subscribe to EMA RSS Feed
Email
Show