CONTACT    SIGN IN    SIGN UP
    

Free RSS Feeds from Enterprise Management Associates (EMA)

Stay up to date on the latest IT and data management information from EMA, including Webinars, Radar Reports, white papers, impact briefs, advisory notes and more!

Select your preferred reader by selecting an icon on the right.



Current Feed Content:




PUBLISHED: Fri, 29 Sep 2023 00:00:00 +0000
AUTHOR: Dan Twing

This is the EMA Radar Report for Workload Automation and Orchestration 2023 summary featuring BMC.



PUBLISHED: Thu, 28 Sep 2023 00:00:00 +0000
AUTHOR: Dan Twing

The EMA Radar Report delivers an in-depth analysis of industry-leading vendors and vendor products, including their overall market position in comparison with other vendors. This information is laid out in an easy-to-decipher, detailed market map and Radar Chart – which includes a composite score for each vendor – making it simple to see how vendors measure up in the market, as well as against other vendors. The EMA Radar Report also provides a detailed discussion of methodology and criteria, a high-level market segment overview, a comprehensive analyst writeup on each vendor, and more.
 
This Radar Report covers workload automation. 2023 marks a transformative era for workload automation with significant advances by leading products to expand orchestration capabilities.



PUBLISHED: Thu, 28 Sep 2023 00:00:00 +0000
AUTHOR: Dan Twing

This is the EMA Radar Report for Workload Automation and Orchestration 2023 summary featuring AutomateNOW! by InfiniteDATA. 



PUBLISHED: Thu, 28 Sep 2023 00:00:00 +0000
AUTHOR: Dan Twing

This is the EMA Radar Report for Workload Automation and Orchestration 2023 summary featuring Stonebranch.



PUBLISHED: Thu, 28 Sep 2023 00:00:00 +0000
AUTHOR: Dan Twing

This is the EMA Radar Report for Workload Automation and Orchestration 2023 summary featuring ActiveBatch, RunMyJobs, and Tidal by Redwood.



PUBLISHED: Thu, 28 Sep 2023 00:00:00 +0000
AUTHOR: Dan Twing

This is the EMA Radar Report for Workload Automation and Orchestration 2023 summary featuring Broadcom.



The Transformation of Cybersecurity from Cost Center to Business Enabler

PUBLISHED: Mon, 25 Sep 2023 00:00:00 +0000
AUTHOR: Chris Steffen

Businesses increasingly rely on technology to streamline operations, enhance customer experiences, and gain a competitive edge. Digital transformation has brought unprecedented opportunities for growth and innovation. However, it has also exposed organizations to many cybersecurity risks that threaten the foundation of their existence.



A business view of IT asset management: Current state and near-term outlook

PUBLISHED: Fri, 22 Sep 2023 00:00:00 +0000
AUTHOR: Valerie O'Connell

The third in a series of annual research initiatives on the state of IT asset management (ITAM), this report represents the collective findings of 450 global IT leaders in 2023. Their observations and opinions benefit from context that was set in earlier efforts.



Edge-Aware AIOps Drives SASE Success

PUBLISHED: Wed, 20 Sep 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This white paper explores how AIOps solutions can leverage network intelligence to streamline, optimize, and automate network operations, particularly for software-defined WAN (SD-WAN) and secure access service edge (SASE) technology. The paper also highlights the capabilities and value of VMware Edge Network Intelligence, an AIOps solution of VMware SASE.



DDI Directions: DNS, DHCP, and IP Address Management Strategies for the Multi-Cloud Era

PUBLISHED: Tue, 12 Sep 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

DNS, DHCP, and IP address management (DDI) are a suite of core services essential to network connectivity and communications. DDI suites manage the assignment of IP addresses and the mapping of those addresses to DNS domains for both internal and external communications. People who lack networking expertise may think DDI is trivial, but an ineffective approach to these core services can lead to sluggish network operations, chronic downtime, security breaches, and worse.



IT Organizations in a Quandary Over Visibility Into Cloud Traffic

PUBLISHED: Tue, 12 Sep 2023 00:00:00 +0000
AUTHOR: Chris Steffen

The push for the finalized IETF Transport Layer Security (TLS) 1.3 standard for network encryption started in 2018 and the major web server and browser vendors backed it with heavy promotion. Back then, the 10-year-in-the-making standard promised better privacy, but it also threatened to break how IT networking and security professionals troubleshoot networking problems and monitor the presence of malware and malicious actors operating within those networks.



EMA Radar for Privileged Access Management (PAM)

PUBLISHED: Thu, 24 Aug 2023 00:00:00 +0000
AUTHOR: Steve Brasen

The EMA Radar Report delivers an in-depth analysis of industry-leading vendors and vendor products, including their overall market position in comparison with other vendors. This information is laid out in an easy-to decipher, detailed Radar Chart, making it simple to see how vendors measure up in the market, as well as against other vendors. The EMA Radar Report also provides a detailed discussion of methodology and criteria, a high-level market segment overview, and a comprehensive analyst write-up on each vendor.



Case Study: Global 500 Media Company Sees 8x Boost to Remote Worker Experience with Cloudbrink

PUBLISHED: Tue, 22 Aug 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

With nearly all its 15,000 employees permanently working from home on at least a part-time basis post-pandemic, a major division of a multi-billion-dollar global media company transformed its approach to secure remote access with Cloudbrink, a provider of hybrid access as a service (HAaaS).



CMDB today: myths, mistakes, and mastery

PUBLISHED: Mon, 14 Aug 2023 00:00:00 +0000
AUTHOR: Valerie O'Connell

Despite periodic but persistent press assertions that the rise of cloud cuts
the relevance of CMDB, EMA experience and field research consistently find
the opposite to be true. In a recent EMA research engagement, 400 global
IT leaders stated that CMDB use was central to major functions. For many
of those respondents, CMDB use was viewed as increasing in importance for
automation of complex processes.



Kubernetes at Scale: Challenges, Priorities, Adoption Patterns, and Solutions

PUBLISHED: Fri, 11 Aug 2023 00:00:00 +0000
AUTHOR: Torsten Volk

The equation is simple: to maximize the productivity of application developers, we need to minimize the time they have to spend on overhead tasks. These are tasks that go beyond writing, maintaining, and testing new application code. They include infrastructure provisioning and configuration, deployment, management, upgrades of Kubernetes clusters, application deployment and management, ensuring security and compliance of the overall application stack, configuring backup and disaster recovery, configuring observability and visibility, and optimizing cost.



Kubernetes at Scale: 10 Reasons to Use Multiple Kubernetes Distributions

PUBLISHED: Fri, 11 Aug 2023 00:00:00 +0000
AUTHOR: Torsten Volk

This report goes over ten reasons to use multiple Kubernetes distributions.



Kubernetes at Scale: Challenges, Priorities, Adoption Patterns, and Solutions

PUBLISHED: Fri, 11 Aug 2023 00:00:00 +0000
AUTHOR: Torsten Volk

There is no shortage of metrics that illustrate the rapid rise of Kubernetes as the application platform of choice for many enterprises. The number of monthly Google searches doubled between 2021 and 2023. Meanwhile, the number of downloads of the Kubernetes client library for Python increased by 1,714% between 2019 and 2023. The number of operator questions on the Stack Exchange Server Fault support forum increased by 40% year over year, and the number of publicly accessible Kubernetes clusters also increased by 40% over the same timeframe.



Kubernetes at Scale: Public Cloud-Managed Kubernetes Alone is Not the Answer

PUBLISHED: Fri, 11 Aug 2023 00:00:00 +0000
AUTHOR: Torsten Volk

From a business perspective, public cloud-managed Kubernetes alone is not the answer. Cloud-managed platforms such as EKS, AKS, and GKE are always embedded within the much larger context of the respective cloud vendor. While these offerings take care of managing the Kubernetes control plane, they still require enterprises to address many Kubernetes-related topics, such as cost control, security and data protection, scalability and performance, service reliability and availability, integration and interoperability, control and flexibility, technology lock-in, monitoring and analytics, and support and training.



Kubernetes at Scale: Three Perspectives

PUBLISHED: Fri, 11 Aug 2023 00:00:00 +0000
AUTHOR: Torsten Volk

In a world of complex cloud systems, developers, operators, and DevOps professionals grapple with a variety of challenges while navigating Kubernetes, a potent container orchestration platform. This narrative captures the essence of three distinct perspectives and their experiences with Kubernetes issues.



Kubernetes at Scale: Security Challenges

PUBLISHED: Fri, 11 Aug 2023 00:00:00 +0000
AUTHOR: Torsten Volk

The fact that the number of Kubernetes-related CVEs doubled over the past
year indicates the need to take Kubernetes security seriously. This increase
is a direct result of broader and deeper adoption of the Kubernetes platform
in combination with the rapidly increasing complexity of the Kubernetes
ecosystem.



Kubernetes at Scale: Top 10 Critical Kubernetes Challenges for Developers

PUBLISHED: Fri, 11 Aug 2023 00:00:00 +0000
AUTHOR: Torsten Volk

This report discusses ten critical Kubernetes-related challenges for application developers. 



The Five Pillars of the Ideal Kubernetes Management Platform

PUBLISHED: Fri, 11 Aug 2023 00:00:00 +0000
AUTHOR: Torsten Volk

The equation is simple: to maximize the productivity of application developers, we need to minimize the time they have to spend on overhead tasks. These are tasks that go beyond writing, maintaining, and testing new application code. They include infrastructure provisioning and configuration, deployment, management, upgrades of Kubernetes clusters, application deployment and management, ensuring security and compliance of the overall application stack, configuring backup and disaster recovery, configuring observability and visibility, and optimizing cost.



Modernizing Network Engineering and Operations in the Era of Hybrid and Remote Work

PUBLISHED: Tue, 08 Aug 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Since the advent of ubiquitous broadband internet service in the developed world, enterprises have offered employees the opportunity to work from home. With an internet connection, any information worker can be reasonably productive from home. However, until recently, the work-from-home option was primarily a perk rather than a strategic imperative. That paradigm shifted in 2020 with the COVID-19 pandemic. Suddenly, remote work was a business continuity strategy at a time when governments were urging everyone to limit their exposure to potential infection by staying home.



Modernizing Network Engineering and Operations in the Era of Hybrid and Remote Work: Summary

PUBLISHED: Tue, 08 Aug 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This is the research summary for EMA's recent report, "Modernizing Network Engineering and Operations in the Era of Hybrid and Remote Work." 



Charting a Course to 5G-Optimized SASE

PUBLISHED: Fri, 28 Jul 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Hybrid multi-cloud architectures, hybrid work, the Internet of Things (IoT), and other digital disruptors introduced complexity to networks that created the need for a converged approach to networking and security. Secure access service edge (SASE) is a class of solutions that unifies software-defined WAN, cloud-delivered network security (e.g., cloud access security broker, secure web gateway, firewall as a service), and secure remote access (e.g., zero trust network access) onto one platform.



PUBLISHED: Wed, 26 Jul 2023 00:00:00 +0000
AUTHOR: Ken Buckler

Digital certificates play a vital role in securing online communications and transactions. They are used to encrypt sensitive data, authenticate users, and protect against various types of cyber threats. However, digital certificates have an expiration date, which requires regular renewals to ensure their continued effectiveness. This process can be challenging and time-consuming, especially for large organizations with many certificates. Furthermore, expired or compromised certificates can lead to damaging service outages, security vulnerabilities, and data breaches. To address these security challenges, Google proposed reducing the maximum validity of public Transport Layer Security (TLS) certificates (also known as SSL certificates) from 13 months to just 90 days. This proposed change could have a significant impact on the industry, affecting certificate authorities, browser makers, and organizations that rely on digital certificates for security.



Target-Centric Intelligence: Unlocking the Secrets of OSINT for Effective Cyber Defense

PUBLISHED: Fri, 21 Jul 2023 00:00:00 +0000
AUTHOR: Ken Buckler

In the realm of cybersecurity, it is highly likely that you are already harnessing the power of open-source intelligence (OSINT) without even realizing it. Many teams are actively monitoring and tracking threat indicators and threat actors through publicly available intelligence. However, it is important to note that traditional cyber threat intelligence (CTI) platforms do not necessarily equate to comprehensive OSINT platforms.



Automation Intelligence Reduces Job Failure Incidents for a Top 10 Global Financial Institution

PUBLISHED: Tue, 18 Jul 2023 00:00:00 +0000
AUTHOR: Dan Twing

Daily liquidity reporting is crucial for commercial banks to manage cash flows, comply with regulations, mitigate risks, make informed decisions, and maintain investor confidence. When overnight processing problems caused frequent delays in delivering these critical reports to management, something had to change.



Why Should Organizations Consider Extended Detection and Response?

PUBLISHED: Tue, 11 Jul 2023 00:00:00 +0000
AUTHOR: Chris Steffen

Plenty of companies have delivered on the promise of extended detection and response (XDR). The security market is flooded with security vendors coming out with their spin on detection and response capabilities, all of which are the “best” or “leading” solutions for stopping bad actors from damaging enterprise networks and systems.
 
Despite the plethora of available tools, security incidents continue to increase, and high-profile attacks have enterprise leaders asking how they can prevent their companies from appearing on the 9:00 o’clock news. As security leaders evaluate the vast array of tools available to combat ransomware attacks, endpoint and extended detection and response solutions still stand out as the best defense against emerging threats—but how can an enterprise know which of these tools is the best? 



IT Executive Survey 2023: Global Banking, Finance, and Insurance Technology Insights

PUBLISHED: Fri, 23 Jun 2023 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - Will Schoeppner

Digital transformation describes a “digital first” vision of customer experiences across all areas of a business, fundamentally changing how it operates and maximizes value to customers. The overarching goal of digital transformation is to unify massive amounts of heterogeneous customer data nestled in silos across the company and tailor it into individualized, personalized customer treatments. Such treatments increase customer satisfaction, loyalty, and retention to ultimately maximize lifetime customer value.



EMA ROI Study: Impact of Docker Desktop on the Application Delivery Lifecycle

PUBLISHED: Tue, 06 Jun 2023 00:00:00 +0000
AUTHOR: Torsten Volk

In this ROI study, we will look at how a cybersecurity company with over $600M in annual revenue, more than 2,000 employees, eight global offices, and approximately 20 product teams optimized all four target variables of their software supply chain through the use of Docker Desktop.



Code Once, Deploy Anywhere: Accelerating App Developer Productivity Through Simplified Service Mesh

PUBLISHED: Tue, 06 Jun 2023 00:00:00 +0000
AUTHOR: Torsten Volk

What is preventing app developers from achieving optimal productivity? Optimal productivity is a state in which developers simply write business code during 100% of their work hours. Thinking this further, if your developers spend 100% of their time on writing business code for your customers while your competitors’ developers only spend 75% on productively coding, you could theoretically deliver 25% more features and capabilities to the marketplace.



From Complexity to Clarity: Resolving Challenges in Cybersecurity Observability

PUBLISHED: Wed, 31 May 2023 00:00:00 +0000
AUTHOR: Chris Steffen

Network complexity presents significant challenges for observability in cybersecurity. With the increasing number of devices, endpoints, and applications connected to networks, it becomes difficult to gain comprehensive visibility into network activities. Complex networks often lack standardized monitoring practices, making it challenging to observe and detect security threats consistently. Additionally, the dynamic nature of modern networks—with devices joining and leaving the network frequently—as well as remote devices and multiple distributed sites further complicate the observability process. Network administrators and security teams face the daunting task of managing and correlating vast amounts of data these networks generate to identify potential threats accurately.



Digital Transformation, Microservices, and Cybersecurity: 8 Critical Challenges

PUBLISHED: Wed, 31 May 2023 00:00:00 +0000
AUTHOR: Torsten Volk

Software developers need to deliver relevant product features in a rapid, cost-effective, easy-to-use, and high-quality manner. Microservices are the delivery vehicle of choice, enabling the continuous creation, release, and validation of new code in order to achieve this key business goal. Instead of betting on the success of large but infrequent product releases, developers deliver small sets of capabilities that address immediate and specific customer needs. This granular approach of creating customer value by solving concrete business problems on a daily basis shortens feedback loops, brings software developers closer to end users, and enables developers to more accurately identify new product capabilities that customers are willing to pay for.



From Scheduler to Automation Fabric for the Enterprise: Workload Automation Transformation in 2023

PUBLISHED: Tue, 16 May 2023 00:00:00 +0000
AUTHOR: Dan Twing

Enterprise IT organizations are living with more change now than ever before. The pace of technological change and innovation is accelerating, and businesses are under constant pressure to adapt to new trends, technologies, and customer demands. Technological advancements, such as artificial intelligence (AI), machine learning (ML), blockchain, and cloud computing, are disrupting traditional industries and creating new business opportunities. Consumers are more tech-savvy and demanding personalized and seamless experiences across all channels. This is forcing companies to invest in IT infrastructure and develop new technologies to meet these expectations. Companies across all industries are undergoing digital transformation, using technology to optimize processes, improve customer experiences, and drive business growth.



AI-Driven Networks: Leveling Up Network Management

PUBLISHED: Thu, 04 May 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This new market research explores how IT organizations are improving network management with intelligent systems based on artificial intelligence (AI) and machine learning (ML). Sometimes known as AIOps solutions, these AI/ML technologies are helping organizations optimize their networks, streamline operations, and reduce security risk. Based on a survey of 250 IT professionals, this report identifies how organizations are evaluating, implementing, using, and succeeding with AI/ML-driven network management. 



AI-Driven Networks: Leveling Up Network Management Report Summary

PUBLISHED: Thu, 04 May 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This is the research summary from the report "AI-Driven Networks: Leveling Up Network Management." 



Automation Intelligence: The Path to Transformative Automation

PUBLISHED: Wed, 03 May 2023 00:00:00 +0000
AUTHOR: Dan Twing

Enterprises are striving to modernize applications and embed digital technologies across their businesses to improve business processes, services, and products. Digital transformation relies on IT and encompasses a range of technologies and strategies, including cloud computing, artificial intelligence, the Internet of Things (IoT), big data analytics, mobile computing, social media, and more. Digital transformation also involves cultural and organizational changes. Organizations must embrace new ways of working and adopt a digital-first mindset. Automation supports the digital transformation journey and automation intelligence operationalizes automation for insight and predictability.



Taking a Holistic Approach to Securing Cloud-Native Application Development

PUBLISHED: Tue, 25 Apr 2023 00:00:00 +0000
AUTHOR: Torsten Volk

Cloud-native application security has become the primary challenge in app modernization, hindering developer productivity, efficient operations, and optimal risk management. This prevents organizations from delivering better products faster, cheaper, and more often than the competition. Developers spend much of their time implementing and following corporate security policies while introducing more tools, open source libraries, container images, and data sources into the application stack.



Less Complexity, More Return on Cybersecurity Investments

PUBLISHED: Wed, 19 Apr 2023 00:00:00 +0000
AUTHOR: Ken Buckler

Depending on the type of attack, target organization, and effectiveness of an organization’s security defenses, attackers are typically inside a network for one to two months before being detected. The signals of the attacker’s presence are present from the start, but without comprehensive monitoring, these signals and associated alerts become lost within the noise generated by everyday operations.



PUBLISHED: Tue, 18 Apr 2023 00:00:00 +0000
AUTHOR: Chris Steffen

Many organizations have leveraged cyber threat intelligence (CTI), a powerful tool, for over two decades. Until recent years, threat intelligence was extremely expensive and only the largest organizations with budgets that allowed for such investment adopted it. However, in recent years, CTI has become much more affordable and accessible, with tools dedicated to processing and distributing CTI. Combined with CTI sharing partnerships and information sharing and analysis centers (ISACs), CTI is now more accessible than ever, even for small businesses that were previously financially restricted from accessing this important cybersecurity tool.



PUBLISHED: Mon, 17 Apr 2023 00:00:00 +0000
AUTHOR: Steve Brasen

Modern business success and growth are dependent on the effectiveness of identity management technologies. The ability of workforces to rapidly access and utilize IT resources determines an organization’s agility in responding to customer requests, competitive engagements, and changing market conditions. However, this access must be granted responsibly to ensure the business meets requirements for security and regulatory compliance.



WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Success

PUBLISHED: Thu, 13 Apr 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Nearly one decade has passed since the phrase “software-defined wide-area networking” entered IT industry vernacular. Vendors and industry analysts coined the term to describe a class of technologies that enable an enterprise to build a wide-area network (WAN) where sites can connect via multiple redundant paths (including private and managed WAN services and public internet connections) securely and with centralized management and control.



WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Success

PUBLISHED: Thu, 13 Apr 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This is the research summary for EMA's report, "WAN Transformation with SD-WAN." 



2023 EMA Vendors to Watch: Information Security, Risk, and Compliance Management

PUBLISHED: Wed, 05 Apr 2023 00:00:00 +0000
AUTHOR: Chris Steffen

EMA Vendors to Watch are companies that deliver unique customer value by solving problems that previously went unaddressed, or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2023 EMA Vendors to Watch in the Information Security, Risk, and Compliance Management field, including NETSCOUT.
 
Additional vendors will be added to this document throughout the year.



The Rise of AI-Powered SASE and Digital Experience Monitoring

PUBLISHED: Tue, 04 Apr 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This white paper explores how AIOps can optimize the digital experience management capabilities of a secure access service edge (SASE) solution by breaking down data silos and automating critical workflows for IT, network, and security teams. The paper also reviews Palo Alto Networks’ AIOps-powered solution, Autonomous Digital Experience Management (ADEM), and examines how it meets the requirements for a modern SASE solution.



Operational Efficiency at Scale with Intent-Based, No-Code Network Automation

PUBLISHED: Sat, 01 Apr 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This paper explains why network teams can no longer rely on tactical, developer-dependent, script-heavy approaches to network operations. Instead, they should adopt simpler and more scalable no-code network automation that aligns with business outcomes. This paper also looks at the benefits such a solution can offer and reviews the capabilities of NetBrain, a pioneer in no-code, intent-driven network automation.



DDI Maturity Drives Multi-Cloud Success: Exploring small and medium enterprises in Europe, the Middle East, Asia-Pacific, and Latin America

PUBLISHED: Fri, 31 Mar 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This research report explores the state of DDI (DNS, DHCP, and IP address management) maturity in small and medium enterprises (500 to 2,500 employees) across Europe, the Middle East, the Asia-Pacific region, and Latin America. It was prepared in collaboration with BlueCat Networks and is based on a survey of 451 IT professionals involved in DDI solutions in their organizations.



Automation, AI, and the Rise of ServiceOps

PUBLISHED: Tue, 28 Mar 2023 00:00:00 +0000
AUTHOR: Valerie O'Connell

ServiceOps is a smart way for IT service and IT operations teams to work together to deliver and maintain excellence in IT service. Enabled by technologies such as automation and AI, ServiceOps is a vendor-neutral approach to IT management that cuts waste and cost, increases IT personnel productivity and efficiency, and improves IT service quality, as well as the experience of its users.



AIOps now: doing more with less and doing it better

PUBLISHED: Fri, 24 Mar 2023 00:00:00 +0000
AUTHOR: Valerie O'Connell

IT organizations are not strangers to change. It raged fast and furious over the past few years. Acceleration of planned digital transformation initiatives executed alongside unplanned adaptations to global realities that almost no one saw coming.
 
Thanks largely to swift—and even heroic—actions by IT, most organizations not only survived, but improved. That collective breath of relief was short-lived. Today, geopolitical forces of war and the economic ambiguity of uncertain times combine to drive many enterprises into tried-and-true belt-tightening measures.



Multi-Cloud Networking: Connecting and Securing the Future Aviatrix Summary

PUBLISHED: Wed, 22 Mar 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This is the summary report for EMA's "Multi-Cloud Networking: Connecting and Securing the Future" research report, sponsored by Aviatrix. 



Observability 2.0: Smart Observability to Connect Business and DevOps

PUBLISHED: Wed, 15 Mar 2023 00:00:00 +0000
AUTHOR: Torsten Volk

New code releases, new database queries, infrastructure upgrades, and configuration changes need to be evaluated by their business impact. There is no value in the most elegant code functions or the most streamlined and automated CI/CD pipelines if the resulting new capabilities do not “move the needle” for the business.



API Security: Debunking the Myths

PUBLISHED: Mon, 13 Mar 2023 00:00:00 +0000
AUTHOR: Chris Steffen

Enterprises are finally starting to pay attention to application security as theoretical threats to their application infrastructure become reality. For years, security vendors have discussed DevSecOps solutions and the benefits they bring to the mature enterprise, but forecasted attacks on APIs and infrastructure as code (IaC) have put application security in the spotlight.



PUBLISHED: Thu, 23 Feb 2023 00:00:00 +0000
AUTHOR: Chris Steffen

The Internet Engineering Task Force (IETF) finalized its TLS 1.3 standard for network encryption in 2018, backed by heavy promotion of the new standard from the major web server and browser vendors. Back then, the new 10-year-in-the-making standard promised better privacy. However, it also threatened to break how IT networking and security professionals troubleshoot networking problems and monitor the presence of malware and malicious actors operating within those networks.



Network Observability: Delivering Actionable Insights to Network Operations Summary

PUBLISHED: Mon, 13 Feb 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This is the summary for EMA's Network Observability report, sponsored by Broadcom.



2023 EMA Vendors to Watch: Network Management

PUBLISHED: Wed, 08 Feb 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that previously went unaddressed, or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2023 EMA Vendors to Watch in the network management field, including Augtera and Lytn.



Build or Buy? Self-Service DevOps Platform Engineering

PUBLISHED: Fri, 03 Feb 2023 00:00:00 +0000
AUTHOR: Chris Steffen

Traditional information security practices used to be relatively easy to perform compared to those needed in today’s world of microservices and the public cloud. Security professionals mitigated most attacks traditionally at the centralized network firewall level. If that failed, the end host firewall could act as a safety net for attacks that slipped through. On-premises applications ran on local dedicated servers or in virtual machines hosted in corporate data centers—you didn’t need to worry about configuring distributed access rules because the entire local network could be trusted.



Multi-Cloud Networking: Connecting and Securing the Future Nefeli Networks Summary

PUBLISHED: Fri, 27 Jan 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This is the summary report for EMA's "Multi-Cloud Networking: Connecting and Securing the Future" research report, sponsored by Nefeli Networks. 



Multi-Cloud Networking: Connecting and Securing the Future

PUBLISHED: Wed, 25 Jan 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Today’s enterprises are increasingly using multiple cloud providers for a variety of reasons. This market research from Enterprise Management Associates explores how enterprises are addressing the networking requirements of their multi-cloud architectures. It explores pain points, technology requirements, and operational strategies for multi-cloud networks.



Multi-Cloud Networking: Connecting and Securing the Future Research Summary

PUBLISHED: Wed, 25 Jan 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This is the summary for EMA's research report, "Multi-Cloud Networking: Connecting and Securing the Future." 



The business view of cross-functional workflow and IT automation

PUBLISHED: Tue, 24 Jan 2023 00:00:00 +0000
AUTHOR: Valerie O'Connell

IT automation is either a competitive advantage or a competitive gap. The difference is in adoption and execution. After all, if one company can operate faster and more efficiently than another, they have an advantage in execution and margin over their less automated peers. That gap is clearly visible in the response of 400+ global IT leaders EMA asked to estimate the percentage of IT tasks that use automation.



PUBLISHED: Thu, 19 Jan 2023 00:00:00 +0000
AUTHOR: Chris Steffen

From 2015 to 2021, the number of new vulnerabilities per year in the National Vulnerability Database grew from 6,487 to 20,139. This increase in vulnerabilities may be due to a significant skills gap when it comes to secure software development. In 2019, a review of the top 20 computer science schools found that of the schools listed, only one had security as an undergraduate degree requirement for Computer Science. Simply put, software developers are not being taught secure coding practices at colleges and universities, and with a significant number of organizations failing to invest in any secure coding training whatsoever, even some of the most seasoned developers in the industry may have little to no awareness of secure coding concepts.



How to Succeed with Load Balancing in a Hybrid Multi-Cloud World

PUBLISHED: Fri, 06 Jan 2023 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This report, prepared for Progress Software, explores how IT organizations are evolving their approach to load balancing and application delivery controllers to support hybrid cloud and multi-cloud. The research findings are based on a July 2022 survey of 152 North American IT professionals involved in their organization’s data center and cloud load balancing strategies.



IT process automation: where business and technology meet

PUBLISHED: Thu, 05 Jan 2023 00:00:00 +0000
AUTHOR: Valerie O'Connell

Today’s IT environments are pervasively hybrid, increasingly complex, and in a constant state of change. As new technologies take hold, IT responds with new tools. The resultant islands of specialized management and automation add another layer of complexity to the everexpanding IT estate. IT operations teams need to automate cross-domain workflows and processes to avoid drowning in a sea of mundane tasks and increased costs.



Driving Operational Efficiencies Through Network Performance and Security Collaboration

PUBLISHED: Mon, 19 Dec 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Multi-cloud architecture, hybrid work, the Internet of Things, and other technology initiatives are adding complexity to the enterprise network. This complexity challenges the network team’s ability to manage performance and the security team’s ability to protect the business. Network and security teams are responding to these challenges by collaborating and converging.



Modern ITAM in the digitally transformed enterprise

PUBLISHED: Mon, 28 Nov 2022 00:00:00 +0000
AUTHOR: Valerie O'Connell

IT asset data and information accuracy is foundational to excellence in the delivery of business-driven IT service. That fact is magnified in environments that are pervasively hybrid, increasingly complex, and in a constant state of change.



PUBLISHED: Wed, 16 Nov 2022 00:00:00 +0000
AUTHOR: Chris Steffen

Organizations continue to prioritize security and security spending, but that spending is often at odds with a more pressing business priority: regulatory compliance. Regardless of the industry vertical, all businesses are required to deal with a certain amount of regulatory compliance or vendor due diligence. For technology leaders, the best solution is to partner with compliance/risk/governance teams to address compliance control gaps while advancing the company’s security priorities.



PUBLISHED: Wed, 16 Nov 2022 00:00:00 +0000
AUTHOR: Valerie O'Connell

Google “cost of an IT outage” or any of its variants. The result will be a cascade of links proclaiming some version of, “According to Gartner, the average cost of IT downtime is $5,600 per minute.” Like an old family legend passed from generation to generation by word of mouth, industry pundits have been using the figure of $5,600/minute for the average cost of an IT outage since 2014. Cited as gospel, the figure has gone largely unchallenged—though Ponemon Institute is sometimes credited with raising Gartner’s ante to $9,000/minute. Upon closer inspection, it appears that the iconic $5,600/minute figure is an urban legend.



Global Workload Automation Market Size and Forecast: 2022 to 2027

PUBLISHED: Tue, 15 Nov 2022 00:00:00 +0000
AUTHOR: Dan Twing

EMA has been covering the workload automation market since 2009. The “EMA WLA Radar Report” is published every two years, and this analysis is rooted in the products, support, and services of the vendors in the workload automation market, with only minor attention to the vendor’s size or market share. As attention in WLA has risen, so have the requests for EMA to do a market sizing report. The increasing attention in the WLA market is a result of innovation and growth as WLA has been key to supporting several IT trends, including big data, digital transformation, and the migration of legacy production workloads to the cloud. Also raising interest in WLA is the drive to apply automation across the enterprise—a trend that increased with the COVID-19 pandemic and the Great Resignation.



The Rise of Low-Friction Access: Emerging Requirements and Solutions for Boosting Workforce Productivity and Security Assurance

PUBLISHED: Tue, 08 Nov 2022 00:00:00 +0000
AUTHOR: Steve Brasen

Driven by accelerating IT security threats, increased requirements to support remote workforces, the introduction of zero trust initiatives, and evolving user expectations on technology performance, organizations are broadly introducing new requirements for identity security. To provide businesses with actionable guidance on identifying the optimal path to streamlining authentication processes, Enterprise Management Associates (EMA) conducted primary research with the goal of identifying current requirements, challenges, and adopted solutions in relation to mitigating access friction.



PUBLISHED: Thu, 03 Nov 2022 00:00:00 +0000
AUTHOR: Steve Brasen

This is the summary report for EMA's Radar for Digital Employee Experience Management. 



PUBLISHED: Thu, 03 Nov 2022 00:00:00 +0000
AUTHOR: Steve Brasen

This is Applixure's vendor profile summary from the EMA Digital Employee Experience Management Radar Report.



PUBLISHED: Thu, 03 Nov 2022 00:00:00 +0000
AUTHOR: Steve Brasen

This is Alluvio Aternity's vendor profile summary from the EMA Digital Employee Experience Management Radar Report.



PUBLISHED: Thu, 03 Nov 2022 00:00:00 +0000
AUTHOR: Steve Brasen

All modern businesses are dependent on digital technologies to drive workforce productivity to achieve company performance and financial success. The principles of digital transformation and modern management postulate that digital technologies should principally support user-centric requirements and preferences to maximize business productivity. However, traditional IT management tools are not designed to fully gauge and respond to user experiences issues. Digital experience management (DEX) solutions emerged in recent years to directly address this service delivery gap. Related solutions collect comprehensive contextual information on user interactions with digital technologies, analyze the data to quantify user experiences, and provide support for remediating any deficiencies. This Enterprise Management Associates® (EMA™) Radar Report identifies the 12 leading DEX solution providers—including 1E, Applixure, Catchpoint, Cisco, ControlUp, Datadog, Dynatrace, Lakeside, Martello, Nexthink, Qualtrics, Alluvio Aternity, and VMware—and empirically compares and grades their offered solutions against a broad range of measurements to determine overall product strengths and cost-efficiencies.



Driving Observability Through Machine Learning and Predictive Analytics

PUBLISHED: Tue, 01 Nov 2022 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - Will Schoeppner

Analytics used in business decisions is nothing new. However, the need for real-time, reliable data is increasing and is a necessity to remain competitive in today’s business landscape. In addition, observability has been around for some time. However, observability has become even more critical with the complexity of a hybrid, multi-cloud environment. To add to the challenges and complexity, the term “observability” has not been clearly defined and can be broad in context.



The State of Data Center Networking: 2022 Annual Report

PUBLISHED: Tue, 01 Nov 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This second annual edition of “The State of Data Center Networking” reveals that on-premises data centers and private cloud remain essential core components of a hybrid, multi-cloud strategy with high-availability applications. To ensure that private infrastructure serves the needs of a digital enterprise, network teams must modernize their data center networks. This research shows how companies are achieving this goal with network overlay fabrics and network automation. It also explores the challenges they encounter on their journey to a hybrid, multi-cloud future.



ITAM accuracy: a foundation for business effectiveness

PUBLISHED: Tue, 01 Nov 2022 00:00:00 +0000
AUTHOR: Valerie O'Connell

Device42 recently co-sponsored independent field research on the changing shape of modern ITAM in the days of digital transformation in a work-from-anywhere world. Research analyst firm Enterprise Management Associates (EMA) conducted in-depth analysis of insights from 300 IT leaders in North America, EMEA, and APAC. The participants represented companies across industries, 70% of which were in the 1,000-10,000 employee range.



Network Observability: Delivering Actionable Insights to Network Operations

PUBLISHED: Tue, 25 Oct 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

The tools that enterprises use to monitor and manage their networks are under a harsh spotlight today. Network operations teams are struggling to maintain visibility in a rapidly changing digital world. In fact, the number of network operations teams that are successful with their overall missions has declined from 47% in 2018 to 27% in 2022, according to EMA’s Network Management Megatrends research.



An Open Look at the Top Seven Criterion for Evaluating a Cloud Security Solution

PUBLISHED: Wed, 05 Oct 2022 00:00:00 +0000
AUTHOR: Chris Steffen

Whether an attacker’s end goal is data exfiltration or holding your data hostage through ransomware, ultimately, the target is your data. Attackers will do whatever it takes to gain access to your data, stealing user credentials through phishing attacks, installing malware to silently open back doors, and traversing whichever parts of your network they need to make access happen. As the information technology landscape evolves and becomes increasingly complex, the complexities open new doors and attack vectors for attackers to leverage. Unfortunately, as the industry continues to shift toward more data stored in the cloud, traditional security approaches are losing their effectiveness.



Any Company can Transform Security with Cloud-Based Zero Trust Network Access

PUBLISHED: Fri, 30 Sep 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

With 85% of companies reporting a permanent increase in employees who work from anywhere due to the COVID-19 pandemic, secure remote access to corporate applications and data is more important than ever.
 
A network team typically has no control over the local home office network or public Wi-Fi to which remote employees are connecting. These remote networks rely on unsecured internet connections to reach corporate resources. Moreover, remote employees are accessing applications and data that they previously accessed only within a corporate network perimeter. These resources must be protected.



2022 EMA Vendors to Watch: Network Management

PUBLISHED: Mon, 26 Sep 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that previously went unaddressed, or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2022 EMA Vendors to Watch in the network management field, including MantisNet and Graphiant.



DDI Maturity Drives Multi-Cloud Automation and Security

PUBLISHED: Mon, 26 Sep 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This research report explores the state of DDI (DNS, DHCP, and IP address management) maturity in enterprises. It examines the drivers of DDI maturity, and the best practices and challenges associated with the technology. Based on a survey of 227 IT professionals, EMA prepared this research for BlueCat, a provider of DDI solutions.



PUBLISHED: Thu, 22 Sep 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Enterprise Management Associates (EMA) research determined that investment in full-stack observability with SolarWinds can deliver millions in return on investment (ROI). These returns are earned through improved efficiency of IT operations, avoidance of capital expenditures, and improved business outcomes.



Asset Management (IT and Beyond): Current State and Near-Term Outlook

PUBLISHED: Tue, 20 Sep 2022 00:00:00 +0000
AUTHOR: Valerie O'Connell

Now in its sophomore year, this research initiative provides practical field insight for IT practitioners involved in the day-to-day management of assets and IT service delivery. It offers the collective perspective of 300 global IT leaders, both today and in comparison to last year’s views. In 2021, ServiceNow commissioned Enterprise Management Associates (EMA) to conduct independent research that would establish a baseline for ongoing trend analysis.



Harnessing Kubernetes for Maximum Developer Productivity, Operations Efficiency, and Continuous Security

PUBLISHED: Thu, 08 Sep 2022 00:00:00 +0000
AUTHOR: Torsten Volk

Digital transformation focuses on establishing corporate cultures, processes, and technologies that enable an organization to deliver more valuable products faster and more frequently, sustainably, and efficiently than the competition. This allows organizations to attract and retain valuable talent, since the most impactful people gravitate toward an environment where they can be productive and successful.



Accelerators of Digital Transformation Maximizing the Business Impact of People

PUBLISHED: Tue, 23 Aug 2022 00:00:00 +0000
AUTHOR: Torsten Volk

Digital transformation is about people first. Hence, the success of digital transformation directly depends on an organization’s ability to provide staff with the skills, information, motivation, and autonomy needed for optimal decision-making, effectiveness, and efficiency.
 
This Enterprise Management Associates (EMA) research provides a data-driven analysis of strategic goals, priorities, success factors, and accelerators of digital transformation. The report ties each argument to its ability to maximize the impact of “people” as the foundation for business success.



How a Network Observability Platform can Prepare Your NetOps Team for the Future

PUBLISHED: Mon, 22 Aug 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Hybrid, multi-cloud architectures are shaping the future of enterprise network operations (NetOps) teams. EMA research found that the top four strategic drivers of NetOps teams are public cloud, cloud-native applications, SaaS applications, and data center modernization.



Network Automation Provides a Foundation for NetSecOps Convergence

PUBLISHED: Tue, 16 Aug 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This white paper explores the growing importance of establishing an effective partnership between network operations and security operations teams. The paper also explains how a network automation solution can facilitate an effective partnership between these groups. This report was prepared for Blue Planet, a division of Ciena that delivers intelligent automation software solutions.



Network Visibility Architecture Will Make or Break Cloud Transformation

PUBLISHED: Thu, 04 Aug 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This white paper, based on new research by EMA, provides insight and guidance to IT and cybersecurity leaders who are adapting their network visibility solutions to a hybrid, multi-cloud future. It identifies best practices for ensuring the delivery of network traffic data to performance and security analysis tools. EMA created this paper for Gigamon, a leading vendor in the network visibility industry.



Top 10 Points to Consider When Selecting a Zero Trust Network Access Solution

PUBLISHED: Thu, 04 Aug 2022 00:00:00 +0000
AUTHOR: Chris Steffen

Zero trust is a set of principles designed to reduce or remove implicit trust in networked systems by addressing network identity, endpoint health, and data flows, to shift security focus from the network to users and devices. Going beyond the hype and technical jargon, zero trust is a safety net. It augments and reinforces the security measures of existing controls while allowing IT administrators to simplify and flatten their network.



Evolving Requirements for Digital Experience Management (DEX)

PUBLISHED: Wed, 03 Aug 2022 00:00:00 +0000
AUTHOR: Steve Brasen

Over the past few years, businesses have reassessed embracing user-centric approaches to IT. In particular, the “modern management theory” postulates that job satisfaction predicates workforce productivity, rather than financial compensation. Applying this principle to the present day, use of IT requires digital technology to serve the workers, rather than the other way around.



Effective Solutions for Digital Experience Management (DEX) July

PUBLISHED: Wed, 03 Aug 2022 00:00:00 +0000
AUTHOR: Steve Brasen

Traditional IT management practices are primarily business-centric. That is, they prioritize meeting business and IT efficiency requirements over that of user experiences. As such, traditional IT management toolsets natively include few features specifically targeted at improving employee satisfaction and productivity. To achieve modern management goals, IT solutions must address both business and user experience requirements simultaneously.



The Key to Creating Successful DevSecOps Teams

PUBLISHED: Thu, 28 Jul 2022 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - Will Schoeppner

Today’s business relies on faster, more dependable delivery from internal technical teams. This reliance led to an increase in collaboration between information technology teams over the past few years, with DevOps teams and then with the addition of security to create a DevSecOps practice.



PUBLISHED: Thu, 28 Jul 2022 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - Will Schoeppner

Today’s business relies on faster, more reliable delivery from internal technical teams. This has led to an increase in collaboration between information technology teams over the past few years with DevOps teams, then with the addition of security teams to create a DevSecOps practice. This coordination focused on eliminating silos that are known to plague technical teams for years. However, for companies to realize the successes of these cross-functional teams, there must be a focus on three key pillars.



How Federal Departments and Agencies can Address the Packet Capture Requirements of White House Executive Order 14028

PUBLISHED: Thu, 07 Jul 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

All United States federal departments and agencies are facing significant packet capture requirements that may force IT organizations to modernize infrastructure and operations.
 
On May 12, 2021, the White House issued Executive Order 14028, which details policies and requirements for improving the federal government’s response to cybersecurity incidents. Among the several phased requirements for data retention related to digital infrastructure, the executive order includes a February 27, 2023 deadline for compliance with a new packet capture requirement. By that date, according to an Office of Management and Budget (OMB) memo, all federal agencies and departments must start capturing and retaining 72 hours’ worth of all packet data that traverses their networks, both on-premises and in the cloud.



Beyond Theory: Orchestrating Unified Identity Security

PUBLISHED: Wed, 06 Jul 2022 00:00:00 +0000
AUTHOR: Steve Brasen

Modern businesses must deliver IT services to achieve organizational goals, enable workforce productivity, and drive profits. Unfortunately, the accessibility of digital resources also establishes significant vulnerabilities. Today, virtually all users—and all bots—have been granted some level of privileged access. Even mundane business apps, if compromised, can enable attackers to access the most sensitive business data.



Accelerating secure application development

PUBLISHED: Wed, 06 Jul 2022 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - Will Schoeppner

In response to customer expectations for secure, always-on app experiences, digital transformations across development, operations, and delivery are on the rise. Alongside the need to push code faster, high-profile breaches and newly discovered vulnerabilities are reaching mainstream audiences more often, which also positions security as a top priority.



Report Summary: Network Visibility Architecture for the Hybrid, Multi-Cloud Enterprise

PUBLISHED: Thu, 30 Jun 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This is the report summary for EMA's research, "Network Visibility Architecture for the Hybrid, Multi-Cloud Enterprise." 



Network Visibility Architecture for the Hybrid, Multi-Cloud Enterprise

PUBLISHED: Thu, 30 Jun 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This Enterprise Management Associates (EMA) research explores how IT and security organizations use network visibility architectures to deliver network packets to critical performance and security analysis tools. It especially examines how organizations need to evolve their network visibility architectures as they adopt hybrid, multi-cloud architectures.



PUBLISHED: Tue, 28 Jun 2022 00:00:00 +0000
AUTHOR: Chris Steffen

In 1971, the first self-replicating virus (called Creeper) was unleashed across the ARPANET as a proof of concept. The virus itself was not designed to do any harm, but instead simply highlighted potential vulnerabilities in mainframe computers across the network. More humorous than destructive, this malware was mostly an annoyance, displaying the message “I’M THE CREEPER, CATCH ME IF YOU CAN” on infected systems. However, it did showcase the serious destructive potential for self-replicating malware in the future.
 
Unfortunately, long gone are the days of “joke” malware, since modern malware is no laughing matter. Today, ransomware is one of the fastest-growing threats in the cybersecurity industry, designed to not only self-propagate, but encrypt all files or entire systems across a network.


     

Subscribe Now!

Subscribe with Netvibes

follow us in feedly

EMA on Facebook   EMA on LinkedIn   EMA on Twitter   EMA RSS   EMA on YouTube

©1996-2023 Enterprise Management Associates, Inc. All rights reserved.
EMA™, ENTERPRISE MANAGEMENT ASSOCIATES®, and the mobius symbol are registered trademarks or common-law trademarks of Enterprise Management Associates, Inc.
Site Terms & Conditions | Integrity Policy | Site Map | My Account
Hide
Subscribe to EMA RSS Feed
Email
Show