CONTACT    SIGN IN    SIGN UP
    

Free RSS Feeds from Enterprise Management Associates (EMA)

Stay up to date on the latest IT and data management information from EMA, including Webinars, Radar Reports, white papers, impact briefs, advisory notes and more!

Select your preferred reader by selecting an icon on the right.



Current Feed Content:




Combine Metadata with Packets for High-Fidelity SecOps and NetOps

PUBLISHED: Wed, 11 Dec 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Network metadata generated by network packet brokers and packet capture appliances can make security monitoring and performance management tools more efficient and effective. This white paper examines how the combination of full packet data and enriched metadata can deliver value to network and security operations teams. It also reviews some technical requirements of such metadata solutions and identifies some key use cases that enterprises should consider.



The CloudFabrix Incident Room: Unifying IT (ITOM + ITSM) for the Digital Age

PUBLISHED: Fri, 15 Nov 2019 00:00:00 +0000
AUTHOR: Dennis Drogseth

EMA research consistently underscores the need for dynamic and predictive technologies that can help unify IT across often fractured silos. The right technology investment would ideally coordinate insight and actions across operations, IT service management (ITSM) teams, DevOps and SecOps initiatives, and business stakeholders, while also providing a critical bridge between IT planners and real-time operations. However, this is a tall order, and while many vendors may claim checkboxes in all these areas, very few can truly deliver.



Ten Priorities for Endpoint Management in 2019: An EMA Top 3 Report and Decision Guide

PUBLISHED: Wed, 06 Nov 2019 00:00:00 +0000
AUTHOR: Steve Brasen

Business performance and success are dependent on the ability of a company’s workforce to effectively and efficiently perform job tasks. Workforce agility and productivity accelerate when the endpoint devices they rely on—including desktops, laptops, smartphones, and tablets—operate reliably and intuitively. Endpoint management practices and solutions are designed to ensure user devices operate optimally and provide users with seamless access to enterprise applications, data, and IT servers from any device at any location at any time. This Enterprise Management Associates (EMA) decision guide is intended to provide actional advice on the best practices and solutions organizations should adopt for addressing today’s most pressing challenges to enabling effective endpoint management.



A Guide to Improving Compliance with Network Automation Technology

PUBLISHED: Thu, 31 Oct 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Enterprise Management Associates (EMA) research has established that compliance is a major business objective of network automation initiatives. This white paper examines how enterprises can build a network automation initiative that improves compliance and reduces risk. It makes the business case for network automation, examines the roadblocks that an organization might encounter, and offers guidance on how to implement an effective compliance strategy with network automation. This paper is based on newly published EMA research.



Achieving Effective Identity and Access Governance

PUBLISHED: Wed, 30 Oct 2019 00:00:00 +0000
AUTHOR: Steve Brasen

To address increased requirements for security assurance and IT service availability, identity and access governance practices and solutions are being broadly introduced to facilitate the orchestration of policy-based access controls and compliance attainment. To help bring clarity on which specific practices and tools should be adopted in support of identity and access governance, Enterprise Management Associates (EMA) conducted primary, survey-based research identifying key use cases and outcomes for related practices.



EMA Research Report Summary: IT Service Modeling (CMDB/CMS & DDM) in the Age of Cloud and Containers

PUBLISHED: Mon, 28 Oct 2019 00:00:00 +0000
AUTHOR: Dennis Drogseth

This is the summary for the EMA research report "IT Service Modeling (CMDB/CMS & DDM) in the Age of Cloud and Containers." 



PUBLISHED: Thu, 24 Oct 2019 00:00:00 +0000
AUTHOR: John Santaferraro

The digital revolution has spawned a rapid expansion of cloud data warehousing. In the cloud, there are two viable options for organizations moving toward analytic dominance: data warehouse as a service (DWaaS) and bring your own license (BYOL) to the cloud. Hyper- marketing around DWaaS has swayed opinions, but wise leaders are carefully considering both viable options before making a decision. This paper explores cloud data warehouse options to assist leaders in their selection of the right technology.



Virtual Instruments is Now Virtana and Has Set Out to Optimize Operational Cost and Risk in the Data Center and Public Cloud

PUBLISHED: Wed, 23 Oct 2019 00:00:00 +0000
AUTHOR: Torsten Volk

While users enjoy talking about multi-cloud, microservices, and Kubernetes, they often forget that approximately 80% of enterprise applications and an even larger share of mission-critical application workloads are still on-premises. These workloads are often tied to a specific set of host machines, typically requiring specialized staff and tools for silo-specific infrastructure management. Many of these traditional enterprise apps are not part of the corporate continuous delivery pipeline, living in a “parallel universe” that requires dedicated management tools and specialized operations staff. At the same time, cloud-native development and DevOps teams have created their own rapidly expanding universe, coming ever closer to automated release processes, near-instant rollback, and full observability of end-user interactions with individual microservices to inform the next incremental feature release.



2019 EMA Radar Report for Workload Automation Summary

PUBLISHED: Tue, 22 Oct 2019 00:00:00 +0000
AUTHOR: Dan Twing

This is the summary of the 2019 EMA Radar for Workload Automation.



PUBLISHED: Tue, 22 Oct 2019 00:00:00 +0000
AUTHOR: Dan Twing

If there is one theme that comes out loud and clear from this research, it is that application modernization and digital transformation are driving forces in many organizations, and those activities are stressing scheduling and automation tools to the point at which many are looking for better answers. This is true for many organizations using only environment-specific schedulers, such as Windows Task Scheduler, Cron, AWS Batch, and Azure Scheduler. It is true for those using open-source schedulers, such as Apache Airflow, Apache Ozie for Hadoop, and Azkaban. It is also true for those using an enterprise-class workload automation (WLA) product. The top two reasons for discontinuing a product or the criteria for selecting a new one are consistently application modernization and digital transformation.



2019 EMA Radar Report for Workload Automation

PUBLISHED: Tue, 22 Oct 2019 00:00:00 +0000
AUTHOR: Dan Twing

Workload automation in 2019 is in a phase of consolidation of vendors and expansion of capabilities. It is a very mature market, one that has been around for more than 40 years. It is also a very saturated market, one that has seen adoption by a significant majority of potential users. As a result, there has been consolidation in this market. Most recently, HelpSystems acquired MVP. CA acquired Automic in 2016, and in 2018 CA was acquired by Broadcom. The expansion is coming in the form of broadening the span of influence of workload automation since many organizations are automating more types of IT operations activities and some are reaching across their organization to empower business users and automate business processes.



IT Service Modeling (CMDB/CMS & DDM) in the Age of Cloud and Containers

PUBLISHED: Sun, 20 Oct 2019 00:00:00 +0000
AUTHOR: Dennis Drogseth

While configuration management databases (CMDBs) and configuration management systems (CMSs) are often examined separately from discovery and dependency mapping (DDM), this research explored the three practices together. The goal was to establish a more holistic context for synergies and differences. 



Ten Priorities for Better Endpoint Defense in 2019: An EMA Top 3 Report and Decision Guide

PUBLISHED: Mon, 07 Oct 2019 00:00:00 +0000
AUTHOR: David Monahan, Former EMA Analyst

This report is a time-saving guide for those looking to invest in endpoint defense for the first time and for those who have identified new use cases that their current endpoint protection is not satisfactorily addressing. It is designed to aid decision-makers in narrowing selection choices for proof of concept testing or other interviews based on their specific use case needs for endpoint defense.
 
IT managers, security officers, and line of business managers will gain key insights into the following areas:
• Understanding the end-user computing forces that are shaping today’s workforce performance
• Identifying the most important considerations for adopting best practices and solutions for endpoint defense
• Determining the Top 3 platforms available today for each recommendation



Data Automation in Action

PUBLISHED: Mon, 07 Oct 2019 00:00:00 +0000
AUTHOR: John Santaferraro

Part of modernization is the expansion of Hybrid Data Ecosystems (HDEs), the full set of various platforms managed by an entity. HDEs come with challenges and benefits of their own. Most organizations operate two to eight different platforms. For large organizations, critical platforms like analytical databases can have more than 700 instances.



How Using Security Orchestration, Automation, and Response Tools Makes Life Easier...and More Difficult

PUBLISHED: Fri, 04 Oct 2019 00:00:00 +0000
AUTHOR: David Monahan, Former EMA Analyst

The need for automation in security operations is widely apparent. In EMA’s security orchestration, automation, and response (SOAR) research, 52% of participants reported that improving operational efficiency was their top goal for purchase, which was almost 1.5 times higher than the second-highest choice (addressing a personnel shortage). To fill that need, vendors supplying SOAR solutions and platforms have been emerging and expanding. While each vendor has something of a specialty or focal area, all are delivering significant value to their customers.



Responsible Password Protection: Securing Credentials Hosted in Active Directory

PUBLISHED: Thu, 26 Sep 2019 00:00:00 +0000
AUTHOR: Steve Brasen

There is a certain irony in the fact that passwords are commonly relied on as the first line of defense for protecting enterprise applications, data, and IT services, yet they are also broadly recognized as the weakest link in enterprise security. Concerns about the effectiveness of password-based controls are not unwarranted. Hackers are increasingly inventing new and nefarious methods of breaking passwords, such as by employing brute-force attacks, keystroke logging, and phishing schemes. Once acquired, passwords are sold or distributed across the dark web to bad actors who are prepared to use them to perform criminal and vandalistic activities.



Unlock the Value of SD-WAN: ROI and Beyond

PUBLISHED: Tue, 24 Sep 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Software-defined wide-area networking (SD-WAN) is a transformational technology, but some SD-WAN vendors often pitch their solutions as a way to save money. Cost reduction is important to earning a return on investment (ROI), but it is not the biggest opportunity with this technology. Instead, enterprises should use SD-WAN to turn the network into a platform for business transformation. This white paper explores how users can plan for ROI and network transformation with SD-WAN.



How AIOps from Broadcom Addresses Top NPM Usability Complaints

PUBLISHED: Wed, 18 Sep 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This white paper examines how enterprises are applying AIOps technology to network performance management (NPM) tools to make their networks more reliable and secure. Based on Enterprise Management Associates (EMA) research, this paper explores how enterprises should leverage emerging AIOps technologies to enhance their NPM toolsets. The paper also looks at how the combined AIOps and NPM solution, Broadcom’s AIOps for Networks, meets the present and future requirements enterprises have or will have for their AIOps-driven NPM tools.



2019 EMA Vendors to Watch: Application and Business Services

PUBLISHED: Fri, 13 Sep 2019 00:00:00 +0000
AUTHOR: Valerie O'Connell

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or providing value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2019 EMA Vendors to Watch in the Application and Business Services field, including CatchPoint, Nexthink, and Aternity.

Additional vendors will be added to this document throughout the year.



Maintaining Your Data Privacy Lifecycle with IBM Data Privacy Passports

PUBLISHED: Thu, 12 Sep 2019 00:00:00 +0000
AUTHOR: David Monahan, Former EMA Analyst

This paper will discuss the current inadequacies of maintaining data privacy with traditional encryption and how the introduction of IBM’s Data Privacy Passports technology can meet the ever-burgeoning data privacy legislation demands. Data Privacy Passports can even exceed the current data protection best practices in most organizations.



Innovation in the Use of Artificial Intelligence and Machine Learning for Metadata Services

PUBLISHED: Wed, 11 Sep 2019 00:00:00 +0000
AUTHOR: John Santaferraro

CIOs, CDOs, CAOs, metadata leaders, data governance leaders, analytics leaders, business analysts, and line of business leaders should read this research report to gain key insights into the following areas:
• Understand the importance of using AI and ML in all aspects of metadata services
• Identify the priority and potential value created using AI and ML in metadata services
• Characterize the Top 3 vendors and additional leaders in the use of AI and ML for metadata services



Innovation in the Use of Artificial Intelligence and Machine Learning for Data Integration and Preparation

PUBLISHED: Wed, 11 Sep 2019 00:00:00 +0000
AUTHOR: John Santaferraro

CIOs, CDOs, CAOs, data integration and preparation leaders, analytics leaders, business analysts, and line of business leaders should read this research report to gain key insights into the following areas:
• Understand the importance of using AI and ML in data integration and preparation
• Identify the priority and potential value created by AI and ML in data integration and preparation tools
• Characterize the Top 3 vendors in the use of AI and ML for data integration and preparation



EMA Research Report Summary: Enterprise Network Automation for 2020 and Beyond

PUBLISHED: Tue, 10 Sep 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

A research summary for EMA's research report, "Enterprise Network Automation for 2020 and Beyond." 



Security and Performance Drive Demand for Visibility: Build the Network Visibility Architecture of the Future with Ixia, a Keysight Business

PUBLISHED: Wed, 04 Sep 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This white paper explores why a network visibility architecture is essential for delivering network traffic data for performance and security. It also reviews the industry-leading network visibility solutions offered by Ixia, a Keysight business. Ixia solutions provide visibility for enterprise networks and public, private, and hybrid clouds.



Optimizing DevOps Initiatives: The View From Both Sides of the DevOps Divide

PUBLISHED: Tue, 03 Sep 2019 00:00:00 +0000
AUTHOR: Dennis Drogseth

A great deal has been written and debated about the trend toward DevOps and agile methodologies, with reflections on not just development, but how IT is changing. Much of the industry opinions have taken on something of a mythological character, extolling development and evolving new roles like site reliability engineers (SREs) as the future, while relegating operations and IT service management (ITSM) as reactive expressions of the past. This research examined the broader development and operations transformation in a more balanced manner, unearthing trends that reflect clear values and requirements on both sides of the equation.



Enterprise Network Automation for 2020 and Beyond

PUBLISHED: Wed, 28 Aug 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Network automation used to be about writing fragile, one-off scripts that could eliminate simple, manual tasks. Today, enterprises are pushing the envelope by using advanced analytics, off-the-shelf and internally-developed software, and other techniques to automate network management processes, both the simple and the complex. This EMA end-user research examines how enterprises are formalizing their approach to network automation. Based on a survey of 250 subject matter experts and one-on-one interviews with six network automation practitioners, this report identifies the tools enterprises are using, the processes they are automating, the infrastructure involved, and the challenges they encounter.



PUBLISHED: Wed, 28 Aug 2019 00:00:00 +0000
AUTHOR: Valerie O'Connell

All aspects of ITSM—platforms, policies, people, and procedures—are in a state of change driven by the complexity and criticality of all things digital in an increasingly customer-first world. Gone are the days of throwing bodies at problems. That time-honored tradition is not only financially unsustainable—it simply doesn’t work. Operational demands now outstrip human capacity to comprehend and control the environment. It follows that automation is ITSM’s new normal. In this paper, EMA research underscores automation as the antidote to the perilous myth of “good enough” in incident response management.



Connecting Things to the Cloud: Practical Advice for Your Internet of Things

PUBLISHED: Wed, 28 Aug 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Network infrastructure teams are critical enablers of enterprise Internet of Things (IoT) initiatives. Distributed enterprises in particular are finding that their remote sites and branch offices are hotbeds of IoT activity. This white paper draws on Enterprise Management Associates (EMA) research to offer advice to network infrastructure professionals on how to enable IoT across the wide-area network.



Modernizing Workload Automation: Increasing Business Resiliency and Empowering DevOps With Workload Analytics

PUBLISHED: Wed, 28 Aug 2019 00:00:00 +0000
AUTHOR: Dan Twing

Workload automation (WLA) software is involved in a majority of the applications and processes overseen by IT, and includes detailed documentation and results of the intended and actual outcomes. While WLA software has matured well past the initial job scheduling functions to become a key component of IT operations automation, WLA tools are more focused on the task of executing, monitoring, and alerting on workloads. They are not highly focused on analyzing the trends and outcomes over time. Analytics tools, particularly those specifically designed to analyze workload data, allow for the optimization of WLA. 



2019 EMA Vendors to Watch: Network Management

PUBLISHED: Mon, 26 Aug 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or providing value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2019 EMA Vendors to Watch in the Network Management field, including flexiWAN.

Additional vendors will be added to this document throughout the year.



Developing Applications for the Data-Driven Digital World

PUBLISHED: Mon, 19 Aug 2019 00:00:00 +0000
AUTHOR: Steve Hendrick

The digital world is now data-driven, and success and survival will come to enterprises that are best able to intelligently leverage data in a timely way to address individual customer needs. Uber and Amazon are companies that have succeeded because they cater to individual customer needs with a high degree of immediacy. The always-on and frictionless nature of these services means that Uber and Amazon are engineered to operate at scale.
 
While being data-driven is a critical prerequisite to developing applications for the digital world, the next-most important construct is decisioning. The ability to make decisions in real time and at scale is not an activity that most enterprises have experience doing. Decision technology has been around for decades, but languished in the shadow of process automation. However, as the world now pivots to being data-driven (with precision in addressing customer needs becoming paramount), decisioning is seeing a renaissance. 



Enhancing Security with Passwordless Authentication

PUBLISHED: Mon, 19 Aug 2019 00:00:00 +0000
AUTHOR: Steve Brasen

Today’s enterprise IT services continue to be broadly reliant on antiquated, ineffective, and unsecure password-based authentication controls. High-friction authentication processes reduce workforce productivity, create negative user experiences, damage business reputations, and are time-consuming and costly to manage. While
passwordless approaches to authentication are increasingly recognized as powerful alternatives to traditional passwords, many organizations are unsure of the level of security passwordless solutions offer, what types of solutions will optimally address their organization’s needs, and how to responsibly transition to low-friction identity management solutions. To assist organizations with making actional decisions, Enterprise Management Associates (EMA) conducted primary, survey-based research with the goal of identifying the requirements, challenges, value, and optimal approaches to introducing passwordless authentication solutions.



A Definitive Market Guide to Deception Technology

PUBLISHED: Thu, 15 Aug 2019 00:00:00 +0000
AUTHOR: Paula Musich

The use of deception technology designed to throw off stealthy attackers from real assets and gather intelligence about how they operate is gaining ground in the enterprise. Although still not considered a mainstream defense, deception technology continues to gain acceptance among more forward-leaning security operations groups trying to get out ahead of attackers and keep them from doing serious damage.
 
The research sought to assess attitudes and views of deception technology across three categories of respondents: those whose organizations were using the technology, those whose organizations were considering or planning to evaluate the technology, and those not interested in deception. It uncovered an interesting contrast between users and nonusers when it comes to their organizations’ fundamental approach to cybersecurity. When asked which of the following statements best described their organization’s approach to cybersecurity, a full 70% of deception users indicated their approach to cybersecurity is to strive to be at the forefront of cybersecurity innovation, while only 28% of all respondents indicated that approach.



PUBLISHED: Mon, 12 Aug 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This white paper examines current and emerging enterprise requirements for network performance management tools. Based on new research from Enterprise Management Associates, this paper will guide readers through the platform and functionally capabilities they should look for when selecting a solution. It also reviews the capabilities of OpManager, a leading network performance management product from ManageEngine.



Top 3: Innovation in the Use of Artificial Intelligence and Machine Learning for Business Intelligence

PUBLISHED: Tue, 30 Jul 2019 00:00:00 +0000
AUTHOR: John Santaferraro

Leaders who are guiding their organizations on a journey toward the insight-driven enterprise struggle to keep up with the speed of technology innovation. The success of analytics in the last decade has fueled a hunger for more. The use of artificial intelligence (AI) and machine learning (ML) in data and analytics platforms is a gamechanger.
 
Organizations constrained by limitations of time, cost, and resources will see a breakthrough with new capabilities across the entire information supply chain.



Modernization and the Operation of Hybrid Data Ecosystems

PUBLISHED: Tue, 30 Jul 2019 00:00:00 +0000
AUTHOR: John Santaferraro

Digital leaders guide their organizations on a journey toward the insight-driven enterprise, but struggle to keep up with the speed of innovation. The success of analytics in the last decade has fueled a hunger for more different kinds of data at a faster pace. Because of this hunger for insight, innovation cycles that used to be measured by decades are now measured by years or months. Business requirements continue to drive the need for new data platforms.
 
This research from EMA unearths trends in modernization, business and technical drivers for modernization initiatives, best practices for the operation of hybrid data ecosystems, cultural and organizational shifts that drive innovation cycles, and top requirements for interoperability and innovation.



Accelerating the Journey to Passwordless Authentication

PUBLISHED: Mon, 29 Jul 2019 00:00:00 +0000
AUTHOR: Steve Brasen

This white paper leverages results from the EMA research report "Passwordless Authentication—Bridging the Gap Between Low-Friction and High-Security Identity Management” to show the clear indications of methods for simplifying the onboarding of passwordless authentication technologies. 



Network Detection and Response in the Cloud Comes of Age

PUBLISHED: Mon, 22 Jul 2019 00:00:00 +0000
AUTHOR: Paula Musich

IT security practitioners are learning the hard way that taking legacy network security tools and applying them to cloud-based workloads doesn’t really work all that well, but few cloud-native options exist to provide the visibility and control needed to secure traffic traversing between those workloads. 



Bridging the Gap Between NetOps and SecOps: NetSecOps

PUBLISHED: Wed, 17 Jul 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Today’s enterprises have recognized that network operations and security operations teams must be partners, not adversaries. IT organizations need a strategy for forging such partnerships. This Enterprise Management Associates white paper draws on multiple industry research studies to offer advice on how these two teams can successfully collaborate to provide a high-performing and highly secure network. 



Modernize to Digitize: Mitigate Risk and Future-Proof Operations

PUBLISHED: Fri, 12 Jul 2019 00:00:00 +0000
AUTHOR: Dan Twing

This white paper draws on new Enterprise Management Associates® (EMA™) research on workload automation software. Digitization of business processes is table stakes in the modern economy. IT infrastructure must be modernized to support agile development and the transparency and speed that digitized organizations demand. Workload automation (WLA) is a key IT operations tool. Modern WLA software can do wonders for the development process, speeding digitization efforts and supporting digitized processes. While some businesses may dread migrating to new WLA software, those migrating within the past four years found the process easier than expected when assisted by good conversion tools included in modern solutions. Given how essential good WLA software can be to the digitization process, EMA believes the risk of staying on the wrong WLA product may outweigh the risks of migrating.



PUBLISHED: Wed, 03 Jul 2019 00:00:00 +0000
AUTHOR: Dennis Drogseth

iET Solutions, a division of UNICOM Global, stands out as being compelling for a true CMDB solution from cost, administrative, and functionality perspectives, especially when integration into other product environments is key. The company’s CMDB can also be incorporated into a non-iET Solutions service desk with ease and success, so that it may well be one of the most versatile single CMDB investments in the industry. iET is also one of the industry’s more cost-effective solutions in terms of both price and deployment requirements.



Unlocking High Fidelity Security 2019

PUBLISHED: Tue, 02 Jul 2019 00:00:00 +0000
AUTHOR: David Monahan, Former EMA Analyst

Change is happening at a rapid pace in cyber security. The technology landscape is especially volatile, with new solutions and capabilities being delivered daily. Especially intriguing is the evolution of breach simulation technology using vulnerability, assets, and patch information to find gaps in controls and accelerate risk reduction. This is both a standalone technology and one being created and acquired by vulnerability management vendors. Another area that is gaining ground quickly is packet capture. Respondents identified network data as the best means of early breach detection, and also identified the value of packet capture as the primary source. 



Passwordless Authentication: Bridging the Gap Between High-Security and Low-Friction Identity Management

PUBLISHED: Mon, 01 Jul 2019 00:00:00 +0000
AUTHOR: Steve Brasen

Today’s enterprise IT services continue to be broadly reliant on antiquated, ineffective, and unsecure password-based authentication controls. High-friction authentication processes reduce workforce productivity, create negative user experiences, damage business reputations, and are time-consuming and costly to manage. While passwordless approaches to authentication (such as biometrics and security keys) are increasingly recognized as powerful alternatives to traditional passwords, many organizations are unsure of the level of security passwordless solutions offer, which types of solutions will optimally address their organization’s needs, and how to responsibly transition to low-friction identity management solutions. Revealed in this research report are results from an in-depth, survey-based evaluation of the requirements, challenges, value, and optimal approaches to adopting passwordless authentication solutions.



Report Summary: Passwordless Authentication: Bridging the Gap Between High-Security and Low-Friction Identity Management

PUBLISHED: Mon, 01 Jul 2019 00:00:00 +0000
AUTHOR: Steve Brasen

Summary for the 2019 Passwordless Authentication report.



Reinventing ITSM: ScienceLogic Summary with Case Study

PUBLISHED: Fri, 28 Jun 2019 00:00:00 +0000
AUTHOR: Valerie O'Connell

ScienceLogic teams up with ServiceNow for integrated service management across a large, complex IT infrastructure.



The State of IT Automation: EMA Research Findings

PUBLISHED: Mon, 24 Jun 2019 00:00:00 +0000
AUTHOR: Valerie O'Connell

EMA surveyed 400 IT professionals globally to understand the role that advanced technologies, such as automation and AI, play in the quality of services IT delivers to the enterprise. Not surprisingly, IT automation has a far-reaching impact across functions, offering benefits that are highly valued up and down the chain of command. In fact, EMA research shows that IT automation, done right, has the realized potential of being transformational to the relationship of IT and its business stakeholders, as well as to the business itself. Although potentially game-changing, these advances are not challenge-free. Technological complexity, functional understanding, resource allocation, and simple resistance to
change all exert drag on adoption. This paper takes a research-based look at the adoption, maturity, challenges, and near-term plans for IT automation.



Reinventing ITSM: Digitate Summary with Case Study

PUBLISHED: Mon, 24 Jun 2019 00:00:00 +0000
AUTHOR: Valerie O'Connell

Digitate’s ignio integrates with ServiceNow and other solutions to bring
cohesion, machine learning, and automa tion in support o f IT transformation.



Enterprise Service Management (ESM) - It's Closer Than You Think

PUBLISHED: Thu, 20 Jun 2019 00:00:00 +0000
AUTHOR: Valerie O'Connell

IT serving the enterprise is not news, nor is IT’s drive to align with the business a recent thought. What is new are the ways organizations are combining cutting-edge technologies with existing platforms, processes, people, and policies to drive innovative services into the enterprise. Enterprise Service Management (ESM) is the product of common sense and technological advances in automation, AI, and analytics served from established ITSM competencies to non-IT functions across organizations from all industries, in all geographies. EMA recently conducted in-depth research with 400 global IT executives and practitioners in order to develop a clear view of ESM as it stands today and in the very near future. The result is a ground-level view of what drives, enables, and results from ESM implementations, with practical recommendations for teams in the process of deployment.



Best Practices for Delivering Packets to Network Performance Management Tools

PUBLISHED: Tue, 18 Jun 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This white paper draws on new Enterprise Management Associates (EMA) research on enterprise network performance management strategies. It explores how packets are an essential source of data for NPM tools, and it offers a guide to collecting and delivering packet data to NPM tools efficiently and effectively with network TAPs and network packet brokers. 



Automation, AI, and Analytics: Reinventing ITSM

PUBLISHED: Tue, 18 Jun 2019 00:00:00 +0000
AUTHOR: Valerie O'Connell

EMA research consistently tracks IT service management (ITSM) as a hub of digital transformation and change. What’s new are the ways artificial intelligence (AI), automation, and analytics are redefining ITSM’s role in business innovation, services, and organizational reinvention. Although potentially game-changing, these advances are not challenge-free. Technological complexity, functional understanding, resource allocation, and simple resistance to change all exert drag on adoption.

EMA designed this research, “Automation, AI, and Analytics: Reinventing ITSM,” to investigate the relationships between the near-universal business demands of digital transformation and the wealth of enabling technologies as they converge on the widening discipline of ITSM. Starting with the service desk as a central point of departure, the research took a use-case look at the state of AI and predictive analytics advances applied to incident and request service, problem resolution, support automation, and broader levels of enterprise service management (ESM).



Understanding the Value of Application-Aware Network Operations

PUBLISHED: Mon, 17 Jun 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Network operations teams can no longer ignore the application layer. Application experience can make or break a digital enterprise, and today most enterprises are digital. To deliver optimal performance, network operations tools must be application-aware. However, application-awareness in the network and security tool layers is expensive and difficult to scale. Enterprises can mitigate these challenges with a network visibility architecture that includes application-aware network packet brokers (NPBs).



The ROI of Plutora Environment Management: Why you need to intelligently manage your environments

PUBLISHED: Mon, 10 Jun 2019 00:00:00 +0000
AUTHOR: Steve Hendrick

Managing preproduction environments is the key to ensuring efficient application development and effective management of an application’s SDLC. Plutora’s environment management (Plutora) is the leading environment management tool in the industry. Empirical research and advanced analytics were used to develop a multidimensional ROI model for Plutora. This ROI model showed how ROI varied by the number of annual production releases that large enterprises performed over a four-year time horizon. EMA’s random survey of environment managers at 159 large North American enterprises included 52 who used Plutora as their primary environment management tool, and was the basis for developing a predictive model of the Plutora environment management’s ROI.



2019 EMA Vendors to Watch: Business Intelligence & Data Warehousing

PUBLISHED: Mon, 10 Jun 2019 00:00:00 +0000
AUTHOR: John Santaferraro

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2019 EMA Vendors to Watch in the Business Intelligence and Data Warehousing field, including ZenOptics, Concentric, Ascend, FaunaDB, and Fluree.

Additional vendors will be added to this document throughout the year.



EMA Vendor to Watch: Concentric

PUBLISHED: Mon, 10 Jun 2019 00:00:00 +0000
AUTHOR: John Santaferraro

While data and analytics are booming, the analytics market remains fragmented with regard to enterprise analytics. Only the most mature organizations have seen success consolidating large data sets with data warehouses and data lakes. Even where there is success in data consolidation, analytics remain in silos.

Concentric is a market simulation software company that built Concentric Market®, a market simulation platform that enables data scientists and business users to harness the full power of multi-model intelligence for complex ecosystems with one model, instead of several interconnected models. EMA believes that this kind of innovation will pave the way for the next generation of data science and machine learning breakthroughs for decisions that are influenced by internal, market, and external forces.



Selecting Next-Generation Network Packet Brokers for Your Digital Transformation Journey

PUBLISHED: Fri, 07 Jun 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This white paper offers a guide to using next-generation network packet brokers to address the network and security operations requirements of tomorrow’s digital enterprises. Based on cutting-edge research from Enterprise Management Associates (EMA), the paper explores emerging technology requirements, organizational strategies, and potential implementation pitfalls. Enterprises should use this paper as a starting point when they evaluate how to build a network visibility fabric for tomorrow’s networks. 



PUBLISHED: Mon, 03 Jun 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Research summary for EMA's report, "Network Performance Management for Today's Digital Enterprise." 



ParkMyCloud Delivers Dramatic and Immediate Values at Foster Moore

PUBLISHED: Wed, 29 May 2019 00:00:00 +0000
AUTHOR: Dennis Drogseth

Since 2015, ParkMyCloud’s customer base has grown more than forty-six times, expanding beyond smaller and mid-tier environments to include large enterprises, government, and MSPs. It also evolved to support Azure, Google Cloud, and Alibaba Cloud, as well as AWS. It also includes advances in integrations such as ChatOps, and yet more automated approaches to governance and policy oversight, as well as defining logical groupings based on service or other requirements.

In the spring of 2019 Turbonomic acquired ParkMyCloud, with a parallel but complementary focus on cloud automation. The two companies will continue to function autonomously, while leveraging their combined strengths to further accelerate their benefits to customers.

The following interview underscores why ParkMyCloud has been so successful, and why it should continue to be a top-priority resource for any business or organization seeking proactive cost control over their cloud environments.



PUBLISHED: Fri, 24 May 2019 00:00:00 +0000
AUTHOR: John Santaferraro

Digital transformation and the cloud have accelerated the maturity of the cloud data warehouse market. In May 2019, SAP released SAP Data Warehouse Cloud, a cloud data warehouse platform combined with built-in business logic and a full set of capabilities to collect, analyze, share, and act on insight. EMA believes that the concept of a business-focused, unified data platform signals the move of the market away from cloud data warehousing to the data warehouse cloud. This market shift puts data and insight into the hands of business professionals without assistance from IT organizations, makes IT organizations more
efficient, and accelerates time to value. This white paper is designed to help executives and business professionals understand what to look for and expect in this intersection of cloud and data warehousing. It also provides initial guidance on how SAP Data Warehouse Cloud aligns with market and customer expectations.



Change Risk Mitigation Best Practices

PUBLISHED: Fri, 24 May 2019 00:00:00 +0000
AUTHOR: Steve Hendrick

Organizations struggle with IT production change risk management. This paper presents a generalized model for risk management and identifies best practices for leveraging this model to address production change risk. Also discussed in this paper is Numerify, a leading IT business analytics vendor, who provides sophisticated IT operations with a system of intelligence to mitigate production change risk with a solution that is data-driven. The solution is based around a canonical model that supports first-order and high-order KPIs (as well as machine learning) to identify and evaluate how to best mitigate production change risk.



Taking Threat Detection to the Next Level

PUBLISHED: Tue, 21 May 2019 00:00:00 +0000
AUTHOR: David Monahan, Former EMA Analyst

In EMA’s “Data-Driven Security Unleashed” report, less than half of the organizations surveyed had deployed either homegrown or commercial off-the-shelf (COTS) security analytics. Within the respondents that had a solution in place, 90% of respondents indicated their security analytics solution delivered greater value than expected. Yet, security teams know that no one solution does everything, and 65% of research respondents indicated they are actively looking to reduce those interfaces and consolidate. An additional 34% are consolidating tools as contracts expire. Defending the modern enterprise requires more coordination between SecOps and NetOps than ever before. The union of these teams and their datasets bring vision and understanding of necessary outcomes, making the path to those outcomes more efficient. 



PUBLISHED: Tue, 21 May 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

IT operations teams often struggle to assemble an effective network performance management (NPM) toolkit because the market is increasingly complex. There are at least half a dozen classes of technologies that claim to manage network performance, yet they all offer very different views of the network. Moreover, the number of NPM use cases is expanding. Network operations monitoring, network troubleshooting, and network capacity planning remain core use cases. However, enterprises also use NPM tools for security monitoring and cloud application migration assessments. 

This market research offers a guide to evaluating NPM technologies and establishing a tool strategy that meets every use case an enterprise might have for such solutions. However, it is not a vendor comparison study. In fact, the reader will find almost no mention of specific vendors. The research draws on survey data and one-on-one interviews with IT professionals to understand how IT organizations are selecting, implementing, and using NPM tools. It identifies key technology requirements, industry challenges, and potential best practices. The key finding is this: There is no such thing as the ideal NPM platform. Every enterprise has its own unique needs that defy the possibility of a silver bullet for all. Instead, this research shows how enterprises assemble their own ideal NPM platforms based on partnerships with key vendors and some good old-fashioned hard work. 



Automation, AI, and Analytics: Reinventing ITSM

PUBLISHED: Thu, 02 May 2019 00:00:00 +0000
AUTHOR: Valerie O'Connell

EMA research consistently identifies ITSM as a hub of digital transformation and change. What’s new are the ways AI, automation, and predictive analytics are redefining ITSM’s role in business innovation, enterprise services, and organizational reinvention. Although game-changing, these advances are not free of challenge. Technological complexity, functional understanding, budget prioritization, and organizational resistance all exert a drag on adoption. 

Part of the challenge comes from confusion around the technologies themselves, since vendors and practitioners use terminology interchangeably for very different functions. EMA conducted global research with 400 executives and ITSM shareholders to provide actionable understanding of the appetite, adoption, maturity, and near-term plans for these technologies and their transformational impact on ITSM.

Providing research findings to benefit organizations of all sizes, this report offers mile markers across a range of topics, including:

  • Current adoption patterns of automation, AI, and analytics: Buying processes, ownership, best practices, and success rates/factors are presented and correlated where applicable.  
  • Use cases: What use cases are most compelling now and in the near future? Who currently owns the budget, headcount, and buying processes – and how is that changing?
  • ESM (Enterprise Service Management): What role does ESM play in adoption for both automation and AI/analytics? How extensive is ESM deployment today, and how does it impact the broader organization as well as ITSM?
  • Drivers and benefits achieved: Who and what forces are driving adoption and innovation? What are the obstacles and recommendations for moving forward? Is there a difference between anticipated and actual results?



Resolve Systems: IT Automation at the Speed of Humanity

PUBLISHED: Wed, 01 May 2019 00:00:00 +0000
AUTHOR: Valerie O'Connell

Automation is the “it technology” of business and IT. Common sense dictates that manual processes simply can’t keep up with the pace, depth, and sheer volume of changes, data, events, incidents, opportunities, and items of interest that shape growing businesses. Throwing people at the problem turns out to be just another problem—one that is particularly expensive, as well as monumentally ineffective. Nonetheless, “automation” is not a straightforward proposition. EMA research consistently demonstrates that automation as a concept ranges from simple bots through complex endeavors of processes, workflows, technologies, and results. Automation as an implemented reality spans toe-in-the-water pilots and planning to wholehearted bet-the-business adoption. Resolve Systems offers an automation and orchestration platform that scales up or down across the enterprise, leveraging existing solutions, erasing silos, and maximizing the human element as it goes. The solution set encourages organizations to optimize processes in a way that matches the human and organizational appetite for automation, and continually evolves to keep pace as acceptance, adoption, and application cases grow.



PUBLISHED: Tue, 30 Apr 2019 00:00:00 +0000
AUTHOR: Dennis Drogseth

IT organizations often struggle to make critical technology investments given the ongoing influx of marketing hype and industry confusion over terms. “AIOps” is a case in point, especially when it’s viewed as a technology in isolation without a clear map to use cases and value. 

This paper will delineate critical requirements for AIOps in the context of both IT and business performance, with a focus on how AIOps can deliver true business value. It will then introduce Centerity as a unique AIOps platform designed with the proven breadth of functionality required to optimize business value across the complex and changing interdependencies of the full IT application infrastructure.



EMA Vendor to Watch: SlashNext

PUBLISHED: Tue, 30 Apr 2019 00:00:00 +0000
AUTHOR: David Monahan, Former EMA Analyst



Modern Managed File Transfer: Enjoy Immediate Benefits While Laying a Foundation for Digital Transformation

PUBLISHED: Tue, 30 Apr 2019 00:00:00 +0000
AUTHOR: Dan Twing

As enterprises strive to digitally transform business processes and develop new capabilities and business models, increased pressure is put on already-stressed operations, development teams, and legacy infrastructure. Drawing on new Enterprise Management Associates research, this white paper explores the increasing importance of file transfers and how enterprises can invest in improving infrastructure for immediate benefit while creating a foundation to support digital transformation.



Developing a Threat Hunting Program Checklist: A 5-Step Guide

PUBLISHED: Mon, 29 Apr 2019 00:00:00 +0000
AUTHOR: David Monahan, Former EMA Analyst

Threat hunting is one of several approaches to proactively reduce risk. Internal threat hunting attempts to create early identification of activities and artifacts inside the perimeter defenses to reduce dwell time and the associated impact of allowing threats to operate within the environment. Less practiced but equally problematic is external threat hunting. External threat hunting attempts to identify artifacts outside the perimeter that indicate another entity is targeting an organization and could affect the organization’s customer loyalty, brand equity, or compliance. Diligence in external threat hunting allows the defending organization to identify an attack or a campaign early in its lifecycle, thus stopping it in the preparation phase or early in the deployment phase, both of which reduce impact.
Because organizations are now being affected by threat actors both within and without the perimeter, understanding how to conduct internal and external threat hunting activities in a programmatic manner is a growing imperative. This checklist will help organizations new to threat hunting create the foundations for conducting threat hunts.



High Performance Cloud Data Warehousing: The Maturing of the CDW Market

PUBLISHED: Fri, 19 Apr 2019 00:00:00 +0000
AUTHOR: John Santaferraro

Insight-driven companies are quickly emerging as leaders in their industries. Technology that was formerly only available to technology giants like Google and Facebook is now available in the cloud to both medium and large companies.

In early 2018, Actian released Actian Avalanche, a high-performance cloud data warehousing (CDW) service. EMA believes this release signals the maturing of the CDW market and a shift toward high-performance CDW. As data volumes, users, and complexity of use cases expand, the limitations of early market offerings will continue to be overcome. This white paper provides an EMA update on the state of the CDW market and provides insight into how Actian Avalanche meets new challenges.



Athenahealth Streamlines Network Management with Infosim StableNet

PUBLISHED: Mon, 08 Apr 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Athenahealth, a provider of cloud-based healthcare software, will replace more than a half-dozen standalone network management tools with Infosim StableNet. StableNet, an enterprise network availability and performance management system, will help unify operations by providing customizable dashboards and network transparency to all key stakeholders in Athenahealth’s IT organization.



PUBLISHED: Mon, 08 Apr 2019 00:00:00 +0000
AUTHOR: Valerie O'Connell

Everbridge’s IT Alerting is an enterprise-scale incident response management platform that automates communication, collaboration, and orchestration for fast response and resolution. Clients use it to execute consistent, predictable, repeatable processes for fast action with communications that are context-meaningful to responders and stakeholders alike. Engaging IT response in five minutes or less and drawing on a foundation of easy-to-use factors, it cuts MTTR by finding and engaging the right response team…quickly. This paper takes a practical approach to determining the point at which it makes more business sense to invest in this enterprise innovation than to continue funding the status quo. 



Managing Networks in a Multi-Cloud Era: Are Your Tools Ready?

PUBLISHED: Wed, 03 Apr 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Hybrid and multi-cloud architectures are the future of enterprise IT. Network infrastructure teams must be prepared to manage and monitor networks across the private cloud and multiple public cloud providers. This white paper draws on recent EMA research to explore the challenges network managers face when adapting their network management toolset to private and public cloud environments, and it will establish a roadmap for success.



Symphony SummitAI Case Study: A Revolution in AI-Powered ITSM

PUBLISHED: Tue, 02 Apr 2019 00:00:00 +0000
AUTHOR: Valerie O'Connell

EMA recently spoke with the VP Digital Enterprise-as-a-Service at a multibillion dollar global leader in its field. As our conversation illustrated, this company is also an innovator in the radical transformation that an enterprise can make when it activates the right combination of vision, leadership backing, technology, process, and sheer will to succeed. The occasion of our meeting was the company’s selection of the SummitAI Suite as its platform for global service/asset management and IT operations. The substance of our conversation was an inside look at a bold one-year journey to one single, global process for service management.



Managing Service Quality at the Network Edge

PUBLISHED: Tue, 02 Apr 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

As enterprises shift more of their operations to branches or remote locations, network teams must ensure performance monitoring is extended to the network edge. With cloud computing, the Internet of Things, and other digital initiatives, data is frequently collected and used directly at the edge, never flowing through the network core. Too frequently, traffic at the edge goes unmonitored until a problem is reported. At that point the operations team must deal with the complexity and cost of isolating an issue about which they have little information. This white paper explores how comprehensive and cost-effective monitoring at the network edge is needed to reduce the risk of performance delays and outages at the edge of hybrid IT environments.



Ten Priorities for Identity Management in 2019: An EMA Top 3 Report and Decision Guide

PUBLISHED: Fri, 29 Mar 2019 00:00:00 +0000
AUTHOR: Steve Brasen

Identity management is the first line of defense for protecting sensitive business resources from inappropriate use, distribution, loss, and damage. IT operations and security managers are continuously pressured to achieve high levels of security without introducing complex authentication processes that may reduce workforce productivity and/or user experiences. This Enterprise Management Associates (EMA) decision guide provides actionable guidance on the best practices and solutions organizations should adopt for addressing today’s most pressing challenges to enabling effective identity management. The ten most critical business priorities for adopting identity management solutions are reported and, for each, EMA recommends the top three leading platforms that most effectively address related requirements.



Automating Customer Analytics with Artificial Intelligence

PUBLISHED: Fri, 29 Mar 2019 00:00:00 +0000
AUTHOR: John Santaferraro

The volume and speed of customer data has exceeded our ability to capture and analyze with traditional technology. Modern AI platforms like Stratifyd, use machine learning algorithms to analyze data at speeds beyond human means and beyond the use of traditional business intelligence platforms. This whitepaper is an overview of how Stratifyd is automating customer analytics with artificial intelligence.



Summary: Network Engineering and Operations in the Multi-Cloud Era

PUBLISHED: Fri, 08 Mar 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Enterprises today are leveraging the cloud more than ever before, building hybrid and multi-cloud architectures and adopting dozens, if not hundreds, of software as a service applications. Legacy networks are not designed to support the migration of so many applications to external cloud environments. Neither do network infrastructure teams have proven processes and tools to support a new cloud-enabling network. This market research draws on survey data and one-on-one interviews with IT professionals to understand how network engineering and operations teams are transforming themselves to support enterprise cloud strategies. It identifies key technology requirements for hybrid and multi-cloud networking, emerging tool strategies, and industry challenges.



2019 EMA Vendors to Watch: Security and Risk Management

PUBLISHED: Wed, 06 Mar 2019 00:00:00 +0000
AUTHOR: Paula Musich

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that previously went unaddressed, or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2019 EMA Vendors to Watch in the Security and Risk Management field, including Duality, PreVeil, SlashNext, SecurityFirst, Karamba, LMNTRIX, and Centripetal.

Additional vendors will be added to this document throughout the year.



A Guide to NetOps and SecOps Collaboration

PUBLISHED: Wed, 27 Feb 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This white paper draws on EMA research to offer a step-by-step guide for building partnerships and collaboration between enterprise network and security teams. It explores why this collaboration is essential, and how enterprises can reap rewards from NetOps and SecOps partnerships. In particular, it reviews how tools, data, and processes are essential to success.



Network Engineering and Operations in the Multi-Cloud Era

PUBLISHED: Tue, 26 Feb 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Enterprises today are leveraging the cloud more than ever before, building hybrid and multi-cloud architectures and adopting dozens, if not hundreds, of software as a service applications. Legacy networks are not designed to support the migration of so many applications to external cloud environments. Neither do network infrastructure teams have proven processes and tools to support a new cloud-enabling network. This market research draws on survey data and one-on-one interviews with IT professionals to understand how network engineering and operations teams are transforming themselves to support enterprise cloud strategies. It identifies key technology requirements for hybrid and multi-cloud networking, emerging tool strategies, and industry challenges.



The Need for Automation in Managing Enterprise-Grade Public Cloud Security

PUBLISHED: Wed, 20 Feb 2019 00:00:00 +0000
AUTHOR: David Monahan, Former EMA Analyst

Ninety-eight percent of organizations are using cloud to perform ITOps and/or SecOps functions. Cloud is a fantastic resource for IT and business. Compute, storage, and even application delivery capabilities are activated on-demand to meet the business's needs. While cloud delivers on most of its promises, the one aspect of cloud that seems to be regularly in question is data security. This is not generally due to a technical failing on the part of any of the cloud services providers, so much as a failing in the education of their customers, creating a misunderstanding of whose responsibility it is to manage data security in the cloud. Fifty-three percent of cloud customers errantly believe that the responsibility for their cloud data security falls wholly or mostly on the shoulders of their cloud provider. Twenty-one percent also incorrectly believe the burden is equally shared, while only 15 percent understand that the owning organization is responsible for data security. Some reports have as many as seven percent of AWS S3 buckets exposed to the Internet. Companies experiencing security problems are not just a bunch of inexperienced startups or security amateurs. They include companies like Accenture, Booz Allen, Dow Jones & Co., Time Warner Cable, and Verizon Wireless, among many other notable names who have experienced cloud data leaks. To overcome these shortfalls, cloud data owners need to better investigate and understand their role in protecting their cloud, to address these four key factors:
1. Who owns cloud security?
2. How can security teams address the lack of visibility into cloud?
3. How can data sharing be manged to reduce the associated data leakage?
4. Not all on-premises security tools fit the unique needs of cloud, so how can IT and security choose the best tools?



Serverless Computing for DevOps and Business: EMA Top 3 Report and Decision Guide for Serverless Technologies

PUBLISHED: Tue, 05 Feb 2019 00:00:00 +0000
AUTHOR: Torsten Volk

Serverless technologies enable developers to rapidly create and validate new applications without incurring significant CAPEX and OPEX requirements. This is due to serverless technologies providing developers with API access to all the resources they require to successfully run their code. These resources include basic CPU, memory, and storage APIs, but developers can also access higher-level capabilities, such as database services, machine learning, artificial intelligence, analytics services, or test automation.

WHAT IS AN EMA TOP 3 PRODUCT?
Enterprise Management Associates (EMA)
has awarded its EMA Top 3 trophy to products
that help enterprises achieve a state where 90
percent of development and operations resources go toward creating business value. Please note that the EMA Top 3 awards highlight products that address a set of empirically determined customer pain points in a clear and convincing manner. While some of these products “go where nobody has gone before,” others merely show a clear end-to-end solution, concept, and vision that makes them prime candidates to evaluate when looking to better optimize serverless functions.



TLS 1.3 Adoption in the Enterprise: Growing Encryption Use Extends to New Standard

PUBLISHED: Wed, 30 Jan 2019 00:00:00 +0000
AUTHOR: Paula Musich

In August 2018, the IETF published its TLS 1.3 transport encryption standard, 10 years after the previous TLS 1.2 version came out. The new version is not without controversy, given the mandate to use the Diffie Helman Ephemeral perfect forward secrecy key exchange and the encryption of the certificate itself. This mandate makes it much harder for enterprises to passively monitor traffic to inspect for malware, data breaches and malicious activity as well as troubleshoot performance problems. Given these implications, this research project sought to gauge awareness of and adoption plans for the new TLS 1.3 specification among IT and more specifically security professionals. Although it's no surprise that a majority of respondents expressed serious reservations about the new standard, it is surprising that many enterprises are either already in the process of enabling TLS 1.3 within their infrastructure, or are planning to do so within the next 6 months. The research also delves into what's driving the fast adoption, strategies for enabling TLS 1.3, and overall encryption practices and trends. 



Security Analytics for Threat Detection and Breach Resolution in 2019: EMA Top 3 Report and Decision Guide

PUBLISHED: Tue, 22 Jan 2019 00:00:00 +0000
AUTHOR: David Monahan, Former EMA Analyst

This report is a time-saving guide. It is designed to help decision-makers who have identified problematic security use cases to select analytics tools that best address those use cases to aid in narrowing selection choices for proof of concept testing or other interviews.
 
If the security team has invested in the proper tools and still is not able to render a solid defense, and reaches a point where they have been able to break down data silos and address the political silos that impede information flow and cooperation, then this report can aid in choosing a vendor to take the security practice to the next level.

How to use this document:

It is important to recognize that every organization is different, with a unique set of IT and business requirements. As such, EMA strongly recommends that when using this guide to create a shortlist, each organization conduct its own evaluation to confirm that other aspects of the solutions will best match its business needs or that the disclosed use cases also meet other requirements, like business workflows and full reporting necessities. This guide will assist with the process by providing information on key use cases common to many prospective buyers to review during the selection process, and an associated shortlist of vendors with solutions that meet them.
For each use case, EMA provides the following sections offering insights for use in the platform selection process:

• Quick Take - This is an overview of the use case, why it is important, and how the solutions address it.
 
• Buyer's Note - Key considerations prospective buyers should be aware of, and questions they should ask during the evaluation process.
 
• Top 3 Solution Providers - By identifying and recognizing the most innovative vendor solutions that address the greatest business priorities for secure access enablement, the table in this section provides a brief overview of each platform and the respective capabilities. Within the Top 3, the solutions are listed alphabetically by vendor, so the order in which they appear is not an indication of EMA's preference. It is highly recommended that organizations seeking to adopt solutions addressing a particular priority investigate each of the corresponding Top 3 vendors to determine which best meet their full and unique requirements. 



Security Megatrends 2019

PUBLISHED: Tue, 22 Jan 2019 00:00:00 +0000
AUTHOR: David Monahan, Former EMA Analyst

Threats abound, but people are out there trying to deal with them. This report delves into several areas of concern today including cloud security issues, SecOps frustrations and tools, the Internet of Things, data sharing and leakage, DDoS, endpoint security, and artificial intelligence. The report identifies challenges and perceptions that enterprises, midmarket companies, and SMBs face across seven industry verticals including manufacturing, financial, and healthcare. The goal is to help readers to understand the common issues and where they are doing a better or worse job than others. Ultimately, the report will help readers understand how to handle threats better, no matter where they stand now.



Report Summary - EMA Radar for Unified Endpoint Management: Q1 2019

PUBLISHED: Mon, 21 Jan 2019 00:00:00 +0000
AUTHOR: Steve Brasen

This is a summary document of the EMA Radar for Unified Endpoint Management: Q1 2019.

Full Report Abstract

 Today's workforces rely on a variety of disparate endpoint devices (including desktops, laptops, tablets, smartphones, and Internet of Things [IOT] devices) to perform essential business tasks. This has challenged organizations to meet increasing requirements for service-level agreements, security assurance, and operational support. Maintaining separate management environments for each endpoint architecture is no longer sustainable. Unified endpoint management solutions consolidate administration processes for all endpoint hardware and operating system configurations onto a single automation and reporting interface. This Enterprise Management Associates (EMA) RADAR report identifies the nine leading unified endpoint management platforms--including solutions offered by Citrix, IBM, Ivanti, Matrix42, Microsoft, Quest Software, Sophos, and VMware--and empirically compares and grades them against a broad range of measurements to determine overall product strengths and cost efficiencies.  



EMA Radar for Unified Endpoint Management: Q1 2019

PUBLISHED: Mon, 14 Jan 2019 00:00:00 +0000
AUTHOR: Steve Brasen

Today's workforces rely on a variety of disparate endpoint devices (including desktops, laptops, tablets, smartphones, and Internet of Things [IOT] devices) to perform essential business tasks. This has challenged organizations to meet increasing requirements for service-level agreements, security assurance, and operational support. Maintaining separate management environments for each endpoint architecture is no longer sustainable. Unified endpoint management solutions consolidate administration processes for all endpoint hardware and operating system configurations onto a single automation and reporting interface. This Enterprise Management Associates (EMA) RADAR report identifies the nine leading unified endpoint management platforms--including solutions offered by Citrix, IBM, Ivanti, Matrix42, Microsoft, Quest Software, Sophos, and VMware--and empirically compares and grades them against a broad range of measurements to determine overall product strengths and cost efficiencies.



EMA Radar for Digital Threat Intelligence Management

PUBLISHED: Tue, 01 Jan 2019 00:00:00 +0000
AUTHOR: David Monahan, Former EMA Analyst

Threat intelligence has been around in one form or another for many years. Only in the last few years did the information really become digestible for any but the largest organizations. Its most recent form evolved into platforms that collect and analyze information through various automated and manual means. The information is focused on delivering indicators of a valid threat against the company. Rather than terabytes of superfluous data, organizations that invest in the toolset can specify what types of information they are most interested in and begin collection.

 



The Shifting Role of Workload Automation: WLA Expansion Creates a Foundation for Broader Business Process Automation and Digital Transformation

PUBLISHED: Fri, 21 Dec 2018 00:00:00 +0000
AUTHOR: Dan Twing

The role of WLA is expanding as organizations increase use of all forms of automation to become more efficient and competitive. Digital transformation, DevOps, and microservices architectures are increasing the pressure on workload automation systems. Building on EMA's 2016 "Issues and Priorities in Modern Workload Automation" and 2013 "Workload Automation in an Era of Cloud, Analytics, Enterprise Mobility, DevOps, and Big Data" research, the 2018 study revisits many important questions to monitor trends while exploring this expanding role and the convergence of workload automation with other automation disciplines.
 
This study was conducted as an email invite web-based survey in July 2018 and includes 427 respondents from North America and Europe. To be included in the study, respondents had to work for companies with 500 or more employees and those with IT job titles (80%) had to be involved in leading or using WLA tools, while those with business job titles (20%) had to use WLA dashboards. The study includes roughly one-third each of individual performers, managers and directors, and senior executives.



Wide-Area Network Transformation: How Enterprises Succeed with Software-Defined WAN

PUBLISHED: Wed, 12 Dec 2018 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This research report on WAN transformation looks beyond the hype of SD-WAN to understand exactly how enterprises should be tackling change in their networks. Based on a survey of 305 enterprise WAN decision-makers and subject matter experts, this report examines all aspects of WAN transformation, from cloud enablement to internet migration, and then looks at how SD-WAN fits into the picture. The research identifies best practices, and it offers some warnings on what enterprises should definitely not do with their networks. 



2018 EMA Vendors to Watch: Business Intelligence & Data Warehousing

PUBLISHED: Wed, 12 Dec 2018 00:00:00 +0000
AUTHOR: John Santaferraro

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2018 EMA Vendors to Watch in the Business Intelligence and Data Warehousing field, including Celonis.

Additional vendors will be added to this document throughout the year.



Building Self-Driven Modern Infrastructure Operations with CA Infrastructure Management Solutions

PUBLISHED: Mon, 10 Dec 2018 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This white paper explores the modern infrastructure operations requirements of enterprises that are embracing digital transformation and hybrid IT infrastructures. It highlights the challenges and requirements that IT organizations face when going on this transformational journey. Finally, it reviews the value of CA's infrastructure management solutions with respect to helping digital businesses meet these challenges and requirements. The solutions include CA Network Operations Analytics, CA Unified Infrastructure Management, and CA Digital Operational Intelligence. 



Enterprise Service Management: Building High-Value Services on Existing Investments in CA Service Management and CA IT Asset Manager

PUBLISHED: Thu, 29 Nov 2018 00:00:00 +0000
AUTHOR: Valerie O'Connell

EMA research consistently identifies ITSM as a hub of innovation
and change. Situated at the crossroads of IT and functions as
diverse as DevOps and HR, ITSM has increasingly become
Command Central for customer service and experience. By 2017,
all but four percent of EMA’s research base had implemented (83%)
or planned (13%) to have IT-to-enterprise teams and functionality,
most built on existing ITSM platforms and processes. Today, this
business-savvy, customer-centric momentum is simply called
Enterprise Service Management (ESM). Unlike so many shiny
“new” technologies or movements, ESM has high value and is
largely hype-free. Where CA Service Management and CA IT Asset
Manager are already installed, ESM is a logical, low/no cost step
toward vital IT business partnerships, a first-rate service culture,
and explosive ROI.



Build a Foundation for Business Growth and Digital Transformation with Secure Software-Defined WAN

PUBLISHED: Tue, 20 Nov 2018 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

As enterprises reinvent their wide area networks to support business growth and digital transformation, secure software-defined wide area network (SD-WAN) will become essential. Drawing upon new Enterprise Management Associates research, this white paper explores why enterprises are transforming their networks today, and how software-defined WAN with integrated security can guarantee success. 



Best Practices for Building a Network Visibility Fabric

PUBLISHED: Mon, 12 Nov 2018 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This white paper provides a step-by-step guide to planning and implementing a network visibility fabric. Comprised of TAPs, bypass devices, aggregation devices, and network packet brokers, network visibility fabrics specialize in delivering right-sized packet flows to network and security analysis tools. They are essential for network performance management and security operations. This white paper also offers insight from the latest Enterprise Management Associates research into network visibility fabrics. 



Stream to the Cloud: Best Practices for Leveraging Streaming Data Integration to Enable a Hybrid Cloud Architecture

PUBLISHED: Wed, 24 Oct 2018 00:00:00 +0000
AUTHOR: John Myers, Former EMA Analyst

When data-driven organizations strive to add real-time streaming data to their data integration initiatives, they need to move beyond traditional techniques to the world of real-time streaming integration. With an effective streaming integration facility or platform, organizations can link their real-time business events with flexible and easily provisioned hybrid architectures that empower the use cases that data-driven organizations are implementing. Data-driven organizations with designs on developing and maintaining competitive advantage are focused on several important attributes for a streaming data solution. The first is the ability to leverage all of their required real-time data sources, such as business transactions and operational events. The second is to deploy nimble infrastructures that allow for the utilization of those real-time events. The third is for streaming facilities to enable multiple levels and skills within an organization to participate in the development of streaming initiatives, as opposed to simply moving the configuration and deployment of streaming initiatives to senior technical resources.



AI/ML-Powered Data Management Enables Digital Transformation

PUBLISHED: Wed, 10 Oct 2018 00:00:00 +0000
AUTHOR: John Myers, Former EMA Analyst

In the current era of data-driven organizations, the impact of digital transformation initiatives grows each year. Companies seek to add new data sources from leading-edge initiatives, such as IoT, real-time applications, and mobile apps, and to bring existing processes and information into the 21st century by removing the paper and pen activities of the past. As these firms seek ways to differentiate their offerings for new revenues, target their consumers to improve customer experience, and lower their operational costs to improve margins, they need to adopt new techniques of managing and governing their new, digitally-transformed data assets.

New types of data-driven exploration and data science initiatives are quickly outpacing the capacity of traditional analytical environments, such as the enterprise data warehouse and the data mart. These traditional analytical environment architectures still have value to companies, but data-driven organizations are pushing the limits of those architectures. Companies search for more flexible and nimble methodologies and best practices upon which to base innovative, information-fueled initiatives.

Data-driven organizations must enable employees across the organizational structure to have access to the correct data required to make decisions. This facility is often an enterprise data catalog that contains a comprehensive and curated inventory of the metadata--technical, business, and operational--of the information within their data landscape. Yet, the growth and breadth of the data landscape require that modern data catalogs have the power of AI/ML to scale across multiple platforms and perform not just on samples of changing data, but complete discovery and inventory of the landscape on a regular basis.

With all of this information, AI/ML capabilities can catalog and categorize, identify, and match data in disparate locations and securely locate information for each member of the organization. Secure access to the data should be given to everyone--not just a chosen few.



AIOps and IT Analytics at the Crossroads: What's Real Today, and What's Most Needed for Tomorrow?

PUBLISHED: Wed, 10 Oct 2018 00:00:00 +0000
AUTHOR: Dennis Drogseth

The goal of this research was to create a roadmap of what technologies are really in use and and most importantly, to examine the dynamics that separate the most effective AIA deployments from those that struggle due to a variety of reasons, ranging from technology priorities to organizational and process issues. This included evaluating use cases ranging from performance and availability management to change management, to capacity planning and cost management, to end-user experience management, to security and compliance, to support for cloud and DevOps.



How to Enable IT to be a Change Agent. Adopt an Automated, Service-Centric Approach

PUBLISHED: Tue, 09 Oct 2018 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

The CEO or CIO of a company often drives digital transformation, which leads to investments in software-defined architectures, cloud, the Internet of Things, and other major disruptors. IT operations teams are not designed to manage disruptive technology, especially not at the rate of change that many CEOs and CIOs demand. What should they do? This white paper discusses how IT operations should respond to digital transformation and be a change agent.



Report Summary - AIOps and IT Analytics at the Crossroads: What's Real Today, and What's Most Needed for Tomorrow?

PUBLISHED: Tue, 09 Oct 2018 00:00:00 +0000
AUTHOR: Dennis Drogseth


Full Report Abstract
The goal of this research was to create a roadmap of what technologies are really in use and and most importantly, to examine the dynamics that separate the most effective AIA deployments from those that struggle due to a variety of reasons, ranging from technology priorities to organizational and process issues. This included evaluating use cases ranging from performance and availability management to change management, to capacity planning and cost management, to end-user experience management, to security and compliance, to support for cloud and DevOps.



Artificial Intelligence and Machine Learning for Optimizing DevOps, IT Operations, and Business: EMA Top 3 Report and Decision Guide for Enterprise

PUBLISHED: Tue, 02 Oct 2018 00:00:00 +0000
AUTHOR: Torsten Volk

Enterprise Management Associates (EMA) research shows that leveraging artificial intelligence and machine learning (AI/ML) for DevOps, IT operations management, and business management is the top priority for enterprises in 2018 and beyond. AI/ML brings data-driven intelligence to DevOps, IT operations, and the enterprise to optimize processes, recognize relevant trends, proactively prevent issues, rapidly detect and resolve problems, and enable human staff to make optimal and fact-driven decisions.

Guidance for AI/ML Product Decisions in DevOps, IT Ops, and Business
This EMA "Top 3 Decision Guide for Artificial Intelligence and Machine Learning in DevOps, IT Operations, and Business" provides guidance for enterprises seeking to optimally leverage today’s AI/ML capabilities, depending on their individual situation and priorities.


     

Subscribe Now!

Subscribe with Netvibes

follow us in feedly

EMA on Facebook   EMA on LinkedIn   EMA on Twitter   EMA RSS   EMA on YouTube

©1996-2019 Enterprise Management Associates, Inc. All rights reserved.
EMA™, ENTERPRISE MANAGEMENT ASSOCIATES®, and the mobius symbol are registered trademarks or common-law trademarks of Enterprise Management Associates, Inc.
Site Terms & Conditions | Integrity Policy | Site Map | My Account
Hide
Subscribe to EMA RSS Feed
Email
Show