CONTACT    SIGN IN    SIGN UP
    

Free RSS Feeds from Enterprise Management Associates (EMA)

Stay up to date on the latest IT and data management information from EMA, including Webinars, Radar Reports, white papers, impact briefs, advisory notes and more!

Select your preferred reader by selecting an icon on the right.



Current Feed Content:




Modern Data Integration: Managing a Complex Portfolio of Data Pipelines

PUBLISHED: Tue, 02 Jun 2020 00:00:00 +0000
AUTHOR: John Santaferraro

Digital transformation is producing massive new data and pushing data consumption requirements to real time. Mobile, SaaS, and IoT expansion are testing the boundaries of legacy technology. The increase in the speed of insight-driven business requires data feeds from transactions, applications, APIs, service providers, data providers, and devices of every kind. Complex ecosystems like supply chains, social networks, and healthcare take integration push requirements even further.



PUBLISHED: Tue, 02 Jun 2020 00:00:00 +0000
AUTHOR: John Santaferraro

In the post-COVID business environment, digital capabilities will define the future. Global lockdowns and stay-at-home orders put every organization to the test. Many leaders tired of the term “digital transformation” and claimed it was old news. However, within a week of the shutdown, every digital business model either failed or proved its resiliency in the new marketplace. As a result, organizations are looking for ways to put intelligent automation in the hands of more of their workforces and continually improve business outcomes.



PUBLISHED: Tue, 02 Jun 2020 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Network packet brokers are essential to network visibility in today’s data center. EMA research has found a strong correlation between packet broker adoption and network operations success. This white paper draws on cutting-edge industry research to explain why these devices are so important to the modern network operations team.



Tomorrow-Ready ITSM

PUBLISHED: Fri, 22 May 2020 00:00:00 +0000
AUTHOR: Valerie O'Connell

Overnight, ITSM organizations aimed existing platforms, people, and processes at the moving target of unprecedented and unpredictable change. Their aim has been surprisingly good. Although there have been some public glitches, the move from fire drill to productivity has largely avoided chaos as an interim step—but success has been neither universal nor smooth.



A Network Source of Truth Promotes Trust in Network Automation

PUBLISHED: Wed, 20 May 2020 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Many network engineers distrust network automation. One reason for this distrust is a lack of insight into network intent and network state. An authoritative source of truth about the network, with intent and state data, can reverse this lack of trust and lead to network automation success. This white paper draws on market-defining research by Enterprise Management Associates to explore how IT organizations can establish a source of network truth to drive a successful network automation pipeline.



From Good to Great: How Expanded Capabilities in Modern Automation Tools Keep Operations Strong

PUBLISHED: Mon, 18 May 2020 00:00:00 +0000
AUTHOR: Dan Twing

Automation is critical to modern information technology (IT) operations. Workload automation (WLA) software is essential to daily processing of core business activities. However, organizations often keep the use of these tools confined to specific use cases or silos. Radical changes to IT infrastructure and operations (I&O), including cloud computing and increased emphasis on digital transformation, have increased the risk of these kinds of status quo operations. This paper explores these challenges and the options to modernize and expand crucial IT management using modern WLA solutions for enterprise-wide process automation.



EMA Vendor to Watch: Lumu Technologies

PUBLISHED: Mon, 18 May 2020 00:00:00 +0000
AUTHOR: Chris Steffen

Lumu Technologies has been recognized as an EMA Vendor to Watch. 



Trusting Passwords: Best Practices for Threat-Proofing Credentials

PUBLISHED: Fri, 15 May 2020 00:00:00 +0000
AUTHOR: Steve Brasen

According to EMA primary research, passwords continue to be employed as the dominant method of authentication for accessing business IT resources, including applications, data, and other IT services. Building on a legacy that dates back to the early days of computing, passwords are ubiquitous across all types and sizes of organizations and are a key instrument for empowering workforces with responsible access to the information and resources they need to drive business success.



Upgrading Your Network Operations Platform for the Digital Future

PUBLISHED: Wed, 13 May 2020 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

As enterprises move toward a digital future, business leaders recognize quickly that the network is critical to success. The network operations team must optimize tools and processes to ensure the network can successfully deliver digital services.



Managed Detection and Response: Selective Outsourcing for Understaffed SOCs and the Platforms That Enable MDR Services

PUBLISHED: Mon, 11 May 2020 00:00:00 +0000
AUTHOR: Paula Musich

Although small now, the market for managed threat detection and response services commands great interest. Organizations of different sizes actively investigate adding such services to either offload that function from overburdened in-house staff or fill in gaps that exist in their current information security operations.



2020 EMA Vendors to Watch: Network Management

PUBLISHED: Mon, 11 May 2020 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that previously went unaddressed, or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2020 EMA Vendors to Watch in the network management field, including Telia.

Additional vendors will be added to this document throughout the year.



A Four-Stage Maturity Model for IT Automation

PUBLISHED: Thu, 07 May 2020 00:00:00 +0000
AUTHOR: Dennis Drogseth

This maturity model for IT automation evolved from EMA’s research, “Data-Driven IT Automation: A Guide for the Modern CIO,” completed in April 2020, as well as EMA’s history of consulting initiatives in support of strategic IT initiatives.



Creating Business Value with Modernization: Strategies for Gleaning Insight from Data Chaos

PUBLISHED: Wed, 06 May 2020 00:00:00 +0000
AUTHOR: John Santaferraro

Act quickly, change course, bounce back. The need for business speed, agility, and resiliency is suddenly paramount for everyone in today’s uncertain financial climate. Digital transformation was supposed to deliver these capabilities, but early in 2020, when the global lockdown began, every supposed digital transformation initiative was put to the test.



ESM: The (R)evolution of ITSM

PUBLISHED: Mon, 04 May 2020 00:00:00 +0000
AUTHOR: Valerie O'Connell

Potentially game-changing, ESM is not free of challenge. The technological complexity of advances in AI and automation, functional capabilities, budget prioritization, siloed projects, and organizational considerations all play a role in adoption. This research focuses on practical aspects of ESM from initial drivers through implementation best practices and benefits realized. As the title word "(r)evolution" indicates, the goal of this project is to study ESM as both a logical, evolutionary extension of ITSM and as a revolutionary outgrowth of the digital transformation culture.



ESM: The (R)evolution of ITSM with Cherwell Case Study

PUBLISHED: Mon, 04 May 2020 00:00:00 +0000
AUTHOR: Valerie O'Connell

EMA's "ESM: The (R)evolution of ITSM" research report with a case study for Cherwell. 



DevOps 2021: Evaluating High Growth Markets in the DevOps Pipeline

PUBLISHED: Wed, 29 Apr 2020 00:00:00 +0000
AUTHOR: Steve Hendrick

DevOps 2021 research shows a rapid maturing of DevOps as enterprises recognize the importance of software solutions in driving most aspects of their business. As custom application development explodes in growth and complexity, DevOps is perceived to be a way to manage this growth and complexity at speed and scale.



Beyond Passwords: Advancing Identity Management with Device Authentication

PUBLISHED: Tue, 28 Apr 2020 00:00:00 +0000
AUTHOR: Steve Brasen

Since the early days of computing, the use of passwords has been relied on as the primary method for authenticating users. Even today, 80% of businesses continue to trust passwords as a principle component of their enterprise security strategy. Broad evidence, however, suggests that overreliance on passwords is the weakest link in security effectiveness.



Network Management Megatrends 2020

PUBLISHED: Mon, 27 Apr 2020 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Enterprise Management Associates’ “Network Management Megatrends 2020” report is part of an ongoing biennial study that tracks the evolution of enterprise network engineering and operations. Based on a survey of 350 North American and European IT professionals, the 2020 research reveals that collaboration between network and security teams is essential, the Internet of Things is impacting the majority of networks today, software-defined networking is driving change in the data center, and network managers are turning to streaming network telemetry and cloud provider flow logs to enhance operations.



Data-Driven IT Automation: A Vision for the Modern CIO

PUBLISHED: Mon, 27 Apr 2020 00:00:00 +0000
AUTHOR: Dennis Drogseth

Based on more than a decade of research, EMA has seen that IT’s adoption of automation in the past was largely ad hoc, an attempt to address specific issues and tasks one at a time. However, more recent research is indicating that this is beginning to change—that it’s finally time to engage IT organizations in a discussion about how to make their automation investments more unified, more integrated, and more strategic.



Data-Driven IT Automation: A Vision for the Modern CIO Report Summary

PUBLISHED: Mon, 27 Apr 2020 00:00:00 +0000
AUTHOR: Dennis Drogseth

This is the summary for EMA's "Data-Driven IT Automation: A Vision for the Modern CIO" research report. 



2020 EMA Vendors to Watch: Analytics and Data Management

PUBLISHED: Fri, 03 Apr 2020 00:00:00 +0000
AUTHOR: John Santaferraro

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that previously went unaddressed, or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2020 EMA Vendors to Watch in the Business Intelligence field, including Zegami and Butterfly.

Additional vendors will be added to this document throughout the year.



Selecting a Threat and Vulnerability Management Solution

PUBLISHED: Fri, 13 Mar 2020 00:00:00 +0000
AUTHOR: Chris Steffen

Risk is managed through the evaluation and reduction of its primary components, threats, and vulnerabilities. Probabilities of likelihood and occurrence are applied, along with understanding both hard and soft values of assets and the costs of prevention investments in people, processes, and tools versus the cost of post-breach remediation, mitigation, and cleanup activities.



AIOps-Driven Network Performance Management: The First Step Toward Self-Healing Networks

PUBLISHED: Wed, 11 Mar 2020 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

AIOps technology offers enterprises realistic hope that they can achieve self-healing networks. When applied to network performance management and network automation tools, this analytics technology can streamline network operations and drive automated change to digital infrastructure. Enterprises can use this technology to transform operations, boost IT productivity, improve network and application performance, and reduce security risk.



PUBLISHED: Tue, 10 Mar 2020 00:00:00 +0000
AUTHOR: Dan Twing

As enterprise IT works to deliver digital transformation initiatives, it is consuming more cloud services. This can result in a proliferation of point solutions that lack integration and DevOps support, and do not provide a holistic view of automation including processing dependencies and outcomes. This paper explores the challenges to automation created by cloud computing and digital transformation projects.



2020 EMA Vendors to Watch: Security and Risk Management

PUBLISHED: Tue, 10 Mar 2020 00:00:00 +0000
AUTHOR: Paula Musich

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that previously went unaddressed, or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2020 EMA Vendors to Watch in the Security and Risk Management field, including ALTR, Nubeva, Accurics, Lumu, and Motimatic.

Additional vendors will be added to this document throughout the year.



Managing Data in a World of Cyber Risk: The State of Data Protection

PUBLISHED: Tue, 10 Mar 2020 00:00:00 +0000
AUTHOR: Paula Musich

While government agencies share data from military intelligence to citizen data for public programs, private sector businesses are exchanging information on customers, business deals, and other operational information on a daily basis. The inherent extension of trust to accomplish business objectives through data sharing puts the data-owning organization at risk. In most cases, the data is shared despite being unencrypted.



Contextual Awareness: Advancing Identity and Access Management to the Next Level of Security Effectiveness

PUBLISHED: Tue, 03 Mar 2020 00:00:00 +0000
AUTHOR: Steve Brasen

The primary focus of modern identity and access management (IAM) practices is to responsibly enable user authorizations for utilizing enterprise applications, data, and IT services in a manner that meets enterprise security requirements while minimizing impacts on end-user productivity. However, carefully maintaining a balance between high-security and low-friction access controls requires solutions that conditionally apply authentication processes that are appropriate to each access event.



Contextual Awareness: Advancing Identity and Access Management to the Next Level of Security Effectiveness Summary

PUBLISHED: Tue, 03 Mar 2020 00:00:00 +0000
AUTHOR: Steve Brasen

Summary for the Contextual Awareness research report. 



Best Practices for Applying Visibility Technology to Inline and Out-of-Band Security

PUBLISHED: Fri, 21 Feb 2020 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Network visibility solutions are essential to security technologies that analyze network traffic. These solutions, including terminal access points (TAPs), bypass switches, and network packet brokers (NPBs), are foundational to ensuring that security solutions can reliably protect the enterprise without impacting service availability and performance. Typically, enterprises require two kinds of visibility technologies for security: one for inline appliance connectivity and another for mirroring traffic data to passive analysis tools. This paper explores how enterprises use network visibility technologies for both inline and out-of-band security use cases to support security solutions.



Protecting the Modern Enterprise with Identity Governance

PUBLISHED: Tue, 18 Feb 2020 00:00:00 +0000
AUTHOR: Steve Brasen

The greatest inhibitor to achieving enterprise security assurance is the sheer complexity of modern IT ecosystems. IT administrators and security professionals must protect a wide variety of business IT assets (including applications, data, email, and other IT services) distributed across diverse cloud and on-premises network topologies. Depending on business requirements, these resources may be utilized by employees, contract workers, outsources, partners, managed service providers, or even customers, and each user may access the resources from a number of different types of devices, including smartphones, tablets, laptops, and desktops. Preventing security violations across all of these disparate IT resources and service-hosting environments is a daunting prospect, even for organizations with the most advanced automation and monitoring tools.



2020 EMA Vendors to Watch: Application and Business Services

PUBLISHED: Mon, 17 Feb 2020 00:00:00 +0000
AUTHOR: Dennis Drogseth

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or providing value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2020 EMA Vendors to Watch in the Application and Business Services field, including Dynatrace, Numerify, and 4me.

Additional vendors will be added to this document throughout the year.



The Imitation Game: Detecting and Thwarting Automated Bot Attacks

PUBLISHED: Mon, 03 Feb 2020 00:00:00 +0000
AUTHOR: Paula Musich

IT executives, contributors, and IT security teams in a range of industries understand that their growing arrays of public-facing applications, whether those are web, mobile, or API-based, are the targets of automated bot attack campaigns. Inexpensive and easy-to-launch automated malicious bot attacks exploit vulnerabilities in the business logic of these applications to hijack user accounts, create fake accounts, scrape content, carry out application distributed denial of service attacks, and carry out other types of attacks. 



Visibility Infrastructure Strategies for Inline and Out-of-Band Security

PUBLISHED: Mon, 03 Feb 2020 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This Enterprise Management Associates research examines how IT organizations connect inline security appliances to the network and deliver packet data to out-of-band security analysis tools. These topics require scrutiny because they represent the intersection of two distinct domains of an IT organization.



The ROI of Sauce Labs

PUBLISHED: Wed, 29 Jan 2020 00:00:00 +0000
AUTHOR: Steve Hendrick

Sauce Labs is known for its abilities in continuous testing, automated testing, and live testing. As enterprises shift left, there is a greater emphasis on faster development, delivery, and deployment. Sauce Labs supports this model by providing OS, browser, and physical/virtual mobile device test environments on demand.



How to Accelerate Business Value with a Cloud Data Warehouse

PUBLISHED: Wed, 29 Jan 2020 00:00:00 +0000
AUTHOR: John Santaferraro

This white paper is designed to help executives and business professionals understand what to look for and expect in the intersection of cloud and data warehousing. It also provides initial guidance on how SAP Data Warehouse Cloud aligns with market and customer expectations.



Improving Operational Efficiency for Kubernetes Applications

PUBLISHED: Mon, 20 Jan 2020 00:00:00 +0000
AUTHOR: Torsten Volk

The Kubernetes container orchestration platform provides developers with the APIs for simple code deployment while offering corporate IT a coherent, policy-driven operations framework. 



A Guide to SD-WAN ROI with Riverbed SteelConnect EX

PUBLISHED: Tue, 14 Jan 2020 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This paper reviews the potential return on investment (ROI) that an enterprise can earn when it implements Riverbed’s software-defined WAN (SD-WAN) solution, SteelConnect EX. This ROI analysis examines the financial return on such an investment for 100- and 1,000-branch enterprises. The key benefits of this ROI analysis include the reduced WAN circuit costs associated with the implementation of hybrid and internet-only WAN topologies, the replacement of legacy routers with SD-WAN gateways, improved uptime, and productivity gains within the IT organization. This paper also highlights potential qualitative benefits associated with a migration to Riverbed SteelConnect EX, such as increased bandwidth, enhanced security, and user productivity.



Combine Metadata with Packets for High-Fidelity SecOps and NetOps

PUBLISHED: Wed, 11 Dec 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Network metadata generated by network packet brokers and packet capture appliances can make security monitoring and performance management tools more efficient and effective. This white paper examines how the combination of full packet data and enriched metadata can deliver value to network and security operations teams. It also reviews some technical requirements of such metadata solutions and identifies some key use cases that enterprises should consider.



The CloudFabrix Incident Room: Unifying IT (ITOM + ITSM) for the Digital Age

PUBLISHED: Fri, 15 Nov 2019 00:00:00 +0000
AUTHOR: Dennis Drogseth

EMA research consistently underscores the need for dynamic and predictive technologies that can help unify IT across often fractured silos. The right technology investment would ideally coordinate insight and actions across operations, IT service management (ITSM) teams, DevOps and SecOps initiatives, and business stakeholders, while also providing a critical bridge between IT planners and real-time operations. However, this is a tall order, and while many vendors may claim checkboxes in all these areas, very few can truly deliver.



Ten Priorities for Endpoint Management in 2019: An EMA Top 3 Report and Decision Guide

PUBLISHED: Wed, 06 Nov 2019 00:00:00 +0000
AUTHOR: Steve Brasen

Business performance and success are dependent on the ability of a company’s workforce to effectively and efficiently perform job tasks. Workforce agility and productivity accelerate when the endpoint devices they rely on—including desktops, laptops, smartphones, and tablets—operate reliably and intuitively. Endpoint management practices and solutions are designed to ensure user devices operate optimally and provide users with seamless access to enterprise applications, data, and IT servers from any device at any location at any time. This Enterprise Management Associates (EMA) decision guide is intended to provide actional advice on the best practices and solutions organizations should adopt for addressing today’s most pressing challenges to enabling effective endpoint management.



A Guide to Improving Compliance with Network Automation Technology

PUBLISHED: Thu, 31 Oct 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Enterprise Management Associates (EMA) research has established that compliance is a major business objective of network automation initiatives. This white paper examines how enterprises can build a network automation initiative that improves compliance and reduces risk. It makes the business case for network automation, examines the roadblocks that an organization might encounter, and offers guidance on how to implement an effective compliance strategy with network automation. This paper is based on newly published EMA research.



Achieving Effective Identity and Access Governance

PUBLISHED: Wed, 30 Oct 2019 00:00:00 +0000
AUTHOR: Steve Brasen

To address increased requirements for security assurance and IT service availability, identity and access governance practices and solutions are being broadly introduced to facilitate the orchestration of policy-based access controls and compliance attainment. To help bring clarity on which specific practices and tools should be adopted in support of identity and access governance, Enterprise Management Associates (EMA) conducted primary, survey-based research identifying key use cases and outcomes for related practices.



EMA Research Report Summary: IT Service Modeling (CMDB/CMS & DDM) in the Age of Cloud and Containers

PUBLISHED: Mon, 28 Oct 2019 00:00:00 +0000
AUTHOR: Dennis Drogseth

This is the summary for the EMA research report "IT Service Modeling (CMDB/CMS & DDM) in the Age of Cloud and Containers." 



PUBLISHED: Thu, 24 Oct 2019 00:00:00 +0000
AUTHOR: John Santaferraro

The digital revolution has spawned a rapid expansion of cloud data warehousing. In the cloud, there are two viable options for organizations moving toward analytic dominance: data warehouse as a service (DWaaS) and bring your own license (BYOL) to the cloud. Hyper- marketing around DWaaS has swayed opinions, but wise leaders are carefully considering both viable options before making a decision. This paper explores cloud data warehouse options to assist leaders in their selection of the right technology.



Virtual Instruments is Now Virtana and Has Set Out to Optimize Operational Cost and Risk in the Data Center and Public Cloud

PUBLISHED: Wed, 23 Oct 2019 00:00:00 +0000
AUTHOR: Torsten Volk

While users enjoy talking about multi-cloud, microservices, and Kubernetes, they often forget that approximately 80% of enterprise applications and an even larger share of mission-critical application workloads are still on-premises. These workloads are often tied to a specific set of host machines, typically requiring specialized staff and tools for silo-specific infrastructure management. Many of these traditional enterprise apps are not part of the corporate continuous delivery pipeline, living in a “parallel universe” that requires dedicated management tools and specialized operations staff. At the same time, cloud-native development and DevOps teams have created their own rapidly expanding universe, coming ever closer to automated release processes, near-instant rollback, and full observability of end-user interactions with individual microservices to inform the next incremental feature release.



2019 EMA Radar Report for Workload Automation Summary

PUBLISHED: Tue, 22 Oct 2019 00:00:00 +0000
AUTHOR: Dan Twing

This is the summary of the 2019 EMA Radar for Workload Automation.



PUBLISHED: Tue, 22 Oct 2019 00:00:00 +0000
AUTHOR: Dan Twing

If there is one theme that comes out loud and clear from this research, it is that application modernization and digital transformation are driving forces in many organizations, and those activities are stressing scheduling and automation tools to the point at which many are looking for better answers. This is true for many organizations using only environment-specific schedulers, such as Windows Task Scheduler, Cron, AWS Batch, and Azure Scheduler. It is true for those using open-source schedulers, such as Apache Airflow, Apache Ozie for Hadoop, and Azkaban. It is also true for those using an enterprise-class workload automation (WLA) product. The top two reasons for discontinuing a product or the criteria for selecting a new one are consistently application modernization and digital transformation.



2019 EMA Radar Report for Workload Automation

PUBLISHED: Tue, 22 Oct 2019 00:00:00 +0000
AUTHOR: Dan Twing

Workload automation in 2019 is in a phase of consolidation of vendors and expansion of capabilities. It is a very mature market, one that has been around for more than 40 years. It is also a very saturated market, one that has seen adoption by a significant majority of potential users. As a result, there has been consolidation in this market. Most recently, HelpSystems acquired MVP. CA acquired Automic in 2016, and in 2018 CA was acquired by Broadcom. The expansion is coming in the form of broadening the span of influence of workload automation since many organizations are automating more types of IT operations activities and some are reaching across their organization to empower business users and automate business processes.



IT Service Modeling (CMDB/CMS & DDM) in the Age of Cloud and Containers

PUBLISHED: Sun, 20 Oct 2019 00:00:00 +0000
AUTHOR: Dennis Drogseth

While configuration management databases (CMDBs) and configuration management systems (CMSs) are often examined separately from discovery and dependency mapping (DDM), this research explored the three practices together. The goal was to establish a more holistic context for synergies and differences. 



Ten Priorities for Better Endpoint Defense in 2019: An EMA Top 3 Report and Decision Guide

PUBLISHED: Mon, 07 Oct 2019 00:00:00 +0000
AUTHOR: David Monahan, Former EMA Analyst

This report is a time-saving guide for those looking to invest in endpoint defense for the first time and for those who have identified new use cases that their current endpoint protection is not satisfactorily addressing. It is designed to aid decision-makers in narrowing selection choices for proof of concept testing or other interviews based on their specific use case needs for endpoint defense.
 
IT managers, security officers, and line of business managers will gain key insights into the following areas:
• Understanding the end-user computing forces that are shaping today’s workforce performance
• Identifying the most important considerations for adopting best practices and solutions for endpoint defense
• Determining the Top 3 platforms available today for each recommendation



Data Automation in Action

PUBLISHED: Mon, 07 Oct 2019 00:00:00 +0000
AUTHOR: John Santaferraro

Part of modernization is the expansion of Hybrid Data Ecosystems (HDEs), the full set of various platforms managed by an entity. HDEs come with challenges and benefits of their own. Most organizations operate two to eight different platforms. For large organizations, critical platforms like analytical databases can have more than 700 instances.



How Using Security Orchestration, Automation, and Response Tools Makes Life Easier...and More Difficult

PUBLISHED: Fri, 04 Oct 2019 00:00:00 +0000
AUTHOR: David Monahan, Former EMA Analyst

The need for automation in security operations is widely apparent. In EMA’s security orchestration, automation, and response (SOAR) research, 52% of participants reported that improving operational efficiency was their top goal for purchase, which was almost 1.5 times higher than the second-highest choice (addressing a personnel shortage). To fill that need, vendors supplying SOAR solutions and platforms have been emerging and expanding. While each vendor has something of a specialty or focal area, all are delivering significant value to their customers.



Responsible Password Protection: Securing Credentials Hosted in Active Directory

PUBLISHED: Thu, 26 Sep 2019 00:00:00 +0000
AUTHOR: Steve Brasen

There is a certain irony in the fact that passwords are commonly relied on as the first line of defense for protecting enterprise applications, data, and IT services, yet they are also broadly recognized as the weakest link in enterprise security. Concerns about the effectiveness of password-based controls are not unwarranted. Hackers are increasingly inventing new and nefarious methods of breaking passwords, such as by employing brute-force attacks, keystroke logging, and phishing schemes. Once acquired, passwords are sold or distributed across the dark web to bad actors who are prepared to use them to perform criminal and vandalistic activities.



Unlock the Value of SD-WAN: ROI and Beyond

PUBLISHED: Tue, 24 Sep 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Software-defined wide-area networking (SD-WAN) is a transformational technology, but some SD-WAN vendors often pitch their solutions as a way to save money. Cost reduction is important to earning a return on investment (ROI), but it is not the biggest opportunity with this technology. Instead, enterprises should use SD-WAN to turn the network into a platform for business transformation. This white paper explores how users can plan for ROI and network transformation with SD-WAN.



How AIOps from Broadcom Addresses Top NPM Usability Complaints

PUBLISHED: Wed, 18 Sep 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This white paper examines how enterprises are applying AIOps technology to network performance management (NPM) tools to make their networks more reliable and secure. Based on Enterprise Management Associates (EMA) research, this paper explores how enterprises should leverage emerging AIOps technologies to enhance their NPM toolsets. The paper also looks at how the combined AIOps and NPM solution, Broadcom’s AIOps for Networks, meets the present and future requirements enterprises have or will have for their AIOps-driven NPM tools.



2019 EMA Vendors to Watch: Application and Business Services

PUBLISHED: Fri, 13 Sep 2019 00:00:00 +0000
AUTHOR: Valerie O'Connell

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or providing value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2019 EMA Vendors to Watch in the Application and Business Services field, including CatchPoint, Nexthink, and Aternity.

Additional vendors will be added to this document throughout the year.



Maintaining Your Data Privacy Lifecycle with IBM Data Privacy Passports

PUBLISHED: Thu, 12 Sep 2019 00:00:00 +0000
AUTHOR: David Monahan, Former EMA Analyst

This paper will discuss the current inadequacies of maintaining data privacy with traditional encryption and how the introduction of IBM’s Data Privacy Passports technology can meet the ever-burgeoning data privacy legislation demands. Data Privacy Passports can even exceed the current data protection best practices in most organizations.



Innovation in the Use of Artificial Intelligence and Machine Learning for Metadata Services

PUBLISHED: Wed, 11 Sep 2019 00:00:00 +0000
AUTHOR: John Santaferraro

CIOs, CDOs, CAOs, metadata leaders, data governance leaders, analytics leaders, business analysts, and line of business leaders should read this research report to gain key insights into the following areas:
• Understand the importance of using AI and ML in all aspects of metadata services
• Identify the priority and potential value created using AI and ML in metadata services
• Characterize the Top 3 vendors and additional leaders in the use of AI and ML for metadata services



Innovation in the Use of Artificial Intelligence and Machine Learning for Data Integration and Preparation

PUBLISHED: Wed, 11 Sep 2019 00:00:00 +0000
AUTHOR: John Santaferraro

CIOs, CDOs, CAOs, data integration and preparation leaders, analytics leaders, business analysts, and line of business leaders should read this research report to gain key insights into the following areas:
• Understand the importance of using AI and ML in data integration and preparation
• Identify the priority and potential value created by AI and ML in data integration and preparation tools
• Characterize the Top 3 vendors in the use of AI and ML for data integration and preparation



EMA Research Report Summary: Enterprise Network Automation for 2020 and Beyond

PUBLISHED: Tue, 10 Sep 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

A research summary for EMA's research report, "Enterprise Network Automation for 2020 and Beyond." 



Security and Performance Drive Demand for Visibility: Build the Network Visibility Architecture of the Future with Ixia, a Keysight Business

PUBLISHED: Wed, 04 Sep 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This white paper explores why a network visibility architecture is essential for delivering network traffic data for performance and security. It also reviews the industry-leading network visibility solutions offered by Ixia, a Keysight business. Ixia solutions provide visibility for enterprise networks and public, private, and hybrid clouds.



Optimizing DevOps Initiatives: The View From Both Sides of the DevOps Divide

PUBLISHED: Tue, 03 Sep 2019 00:00:00 +0000
AUTHOR: Dennis Drogseth

A great deal has been written and debated about the trend toward DevOps and agile methodologies, with reflections on not just development, but how IT is changing. Much of the industry opinions have taken on something of a mythological character, extolling development and evolving new roles like site reliability engineers (SREs) as the future, while relegating operations and IT service management (ITSM) as reactive expressions of the past. This research examined the broader development and operations transformation in a more balanced manner, unearthing trends that reflect clear values and requirements on both sides of the equation.



Enterprise Network Automation for 2020 and Beyond

PUBLISHED: Wed, 28 Aug 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Network automation used to be about writing fragile, one-off scripts that could eliminate simple, manual tasks. Today, enterprises are pushing the envelope by using advanced analytics, off-the-shelf and internally-developed software, and other techniques to automate network management processes, both the simple and the complex. This EMA end-user research examines how enterprises are formalizing their approach to network automation. Based on a survey of 250 subject matter experts and one-on-one interviews with six network automation practitioners, this report identifies the tools enterprises are using, the processes they are automating, the infrastructure involved, and the challenges they encounter.



PUBLISHED: Wed, 28 Aug 2019 00:00:00 +0000
AUTHOR: Valerie O'Connell

All aspects of ITSM—platforms, policies, people, and procedures—are in a state of change driven by the complexity and criticality of all things digital in an increasingly customer-first world. Gone are the days of throwing bodies at problems. That time-honored tradition is not only financially unsustainable—it simply doesn’t work. Operational demands now outstrip human capacity to comprehend and control the environment. It follows that automation is ITSM’s new normal. In this paper, EMA research underscores automation as the antidote to the perilous myth of “good enough” in incident response management.



Connecting Things to the Cloud: Practical Advice for Your Internet of Things

PUBLISHED: Wed, 28 Aug 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Network infrastructure teams are critical enablers of enterprise Internet of Things (IoT) initiatives. Distributed enterprises in particular are finding that their remote sites and branch offices are hotbeds of IoT activity. This white paper draws on Enterprise Management Associates (EMA) research to offer advice to network infrastructure professionals on how to enable IoT across the wide-area network.



Modernizing Workload Automation: Increasing Business Resiliency and Empowering DevOps With Workload Analytics

PUBLISHED: Wed, 28 Aug 2019 00:00:00 +0000
AUTHOR: Dan Twing

Workload automation (WLA) software is involved in a majority of the applications and processes overseen by IT, and includes detailed documentation and results of the intended and actual outcomes. While WLA software has matured well past the initial job scheduling functions to become a key component of IT operations automation, WLA tools are more focused on the task of executing, monitoring, and alerting on workloads. They are not highly focused on analyzing the trends and outcomes over time. Analytics tools, particularly those specifically designed to analyze workload data, allow for the optimization of WLA. 



2019 EMA Vendors to Watch: Network Management

PUBLISHED: Mon, 26 Aug 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or providing value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2019 EMA Vendors to Watch in the Network Management field, including flexiWAN.

Additional vendors will be added to this document throughout the year.



Developing Applications for the Data-Driven Digital World

PUBLISHED: Mon, 19 Aug 2019 00:00:00 +0000
AUTHOR: Steve Hendrick

The digital world is now data-driven, and success and survival will come to enterprises that are best able to intelligently leverage data in a timely way to address individual customer needs. Uber and Amazon are companies that have succeeded because they cater to individual customer needs with a high degree of immediacy. The always-on and frictionless nature of these services means that Uber and Amazon are engineered to operate at scale.
 
While being data-driven is a critical prerequisite to developing applications for the digital world, the next-most important construct is decisioning. The ability to make decisions in real time and at scale is not an activity that most enterprises have experience doing. Decision technology has been around for decades, but languished in the shadow of process automation. However, as the world now pivots to being data-driven (with precision in addressing customer needs becoming paramount), decisioning is seeing a renaissance. 



Enhancing Security with Passwordless Authentication

PUBLISHED: Mon, 19 Aug 2019 00:00:00 +0000
AUTHOR: Steve Brasen

Today’s enterprise IT services continue to be broadly reliant on antiquated, ineffective, and unsecure password-based authentication controls. High-friction authentication processes reduce workforce productivity, create negative user experiences, damage business reputations, and are time-consuming and costly to manage. While
passwordless approaches to authentication are increasingly recognized as powerful alternatives to traditional passwords, many organizations are unsure of the level of security passwordless solutions offer, what types of solutions will optimally address their organization’s needs, and how to responsibly transition to low-friction identity management solutions. To assist organizations with making actional decisions, Enterprise Management Associates (EMA) conducted primary, survey-based research with the goal of identifying the requirements, challenges, value, and optimal approaches to introducing passwordless authentication solutions.



A Definitive Market Guide to Deception Technology

PUBLISHED: Thu, 15 Aug 2019 00:00:00 +0000
AUTHOR: Paula Musich

The use of deception technology designed to throw off stealthy attackers from real assets and gather intelligence about how they operate is gaining ground in the enterprise. Although still not considered a mainstream defense, deception technology continues to gain acceptance among more forward-leaning security operations groups trying to get out ahead of attackers and keep them from doing serious damage.
 
The research sought to assess attitudes and views of deception technology across three categories of respondents: those whose organizations were using the technology, those whose organizations were considering or planning to evaluate the technology, and those not interested in deception. It uncovered an interesting contrast between users and nonusers when it comes to their organizations’ fundamental approach to cybersecurity. When asked which of the following statements best described their organization’s approach to cybersecurity, a full 70% of deception users indicated their approach to cybersecurity is to strive to be at the forefront of cybersecurity innovation, while only 28% of all respondents indicated that approach.



PUBLISHED: Mon, 12 Aug 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This white paper examines current and emerging enterprise requirements for network performance management tools. Based on new research from Enterprise Management Associates, this paper will guide readers through the platform and functionally capabilities they should look for when selecting a solution. It also reviews the capabilities of OpManager, a leading network performance management product from ManageEngine.



Top 3: Innovation in the Use of Artificial Intelligence and Machine Learning for Business Intelligence

PUBLISHED: Tue, 30 Jul 2019 00:00:00 +0000
AUTHOR: John Santaferraro

Leaders who are guiding their organizations on a journey toward the insight-driven enterprise struggle to keep up with the speed of technology innovation. The success of analytics in the last decade has fueled a hunger for more. The use of artificial intelligence (AI) and machine learning (ML) in data and analytics platforms is a gamechanger.
 
Organizations constrained by limitations of time, cost, and resources will see a breakthrough with new capabilities across the entire information supply chain.



Modernization and the Operation of Hybrid Data Ecosystems

PUBLISHED: Tue, 30 Jul 2019 00:00:00 +0000
AUTHOR: John Santaferraro

Digital leaders guide their organizations on a journey toward the insight-driven enterprise, but struggle to keep up with the speed of innovation. The success of analytics in the last decade has fueled a hunger for more different kinds of data at a faster pace. Because of this hunger for insight, innovation cycles that used to be measured by decades are now measured by years or months. Business requirements continue to drive the need for new data platforms.
 
This research from EMA unearths trends in modernization, business and technical drivers for modernization initiatives, best practices for the operation of hybrid data ecosystems, cultural and organizational shifts that drive innovation cycles, and top requirements for interoperability and innovation.



Accelerating the Journey to Passwordless Authentication

PUBLISHED: Mon, 29 Jul 2019 00:00:00 +0000
AUTHOR: Steve Brasen

This white paper leverages results from the EMA research report "Passwordless Authentication—Bridging the Gap Between Low-Friction and High-Security Identity Management” to show the clear indications of methods for simplifying the onboarding of passwordless authentication technologies. 



Network Detection and Response in the Cloud Comes of Age

PUBLISHED: Mon, 22 Jul 2019 00:00:00 +0000
AUTHOR: Paula Musich

IT security practitioners are learning the hard way that taking legacy network security tools and applying them to cloud-based workloads doesn’t really work all that well, but few cloud-native options exist to provide the visibility and control needed to secure traffic traversing between those workloads. 



Bridging the Gap Between NetOps and SecOps: NetSecOps

PUBLISHED: Wed, 17 Jul 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Today’s enterprises have recognized that network operations and security operations teams must be partners, not adversaries. IT organizations need a strategy for forging such partnerships. This Enterprise Management Associates white paper draws on multiple industry research studies to offer advice on how these two teams can successfully collaborate to provide a high-performing and highly secure network. 



Modernize to Digitize: Mitigate Risk and Future-Proof Operations

PUBLISHED: Fri, 12 Jul 2019 00:00:00 +0000
AUTHOR: Dan Twing

This white paper draws on new Enterprise Management Associates® (EMA™) research on workload automation software. Digitization of business processes is table stakes in the modern economy. IT infrastructure must be modernized to support agile development and the transparency and speed that digitized organizations demand. Workload automation (WLA) is a key IT operations tool. Modern WLA software can do wonders for the development process, speeding digitization efforts and supporting digitized processes. While some businesses may dread migrating to new WLA software, those migrating within the past four years found the process easier than expected when assisted by good conversion tools included in modern solutions. Given how essential good WLA software can be to the digitization process, EMA believes the risk of staying on the wrong WLA product may outweigh the risks of migrating.



PUBLISHED: Wed, 03 Jul 2019 00:00:00 +0000
AUTHOR: Dennis Drogseth

iET Solutions, a division of UNICOM Global, stands out as being compelling for a true CMDB solution from cost, administrative, and functionality perspectives, especially when integration into other product environments is key. The company’s CMDB can also be incorporated into a non-iET Solutions service desk with ease and success, so that it may well be one of the most versatile single CMDB investments in the industry. iET is also one of the industry’s more cost-effective solutions in terms of both price and deployment requirements.



Unlocking High Fidelity Security 2019

PUBLISHED: Tue, 02 Jul 2019 00:00:00 +0000
AUTHOR: David Monahan, Former EMA Analyst

Change is happening at a rapid pace in cyber security. The technology landscape is especially volatile, with new solutions and capabilities being delivered daily. Especially intriguing is the evolution of breach simulation technology using vulnerability, assets, and patch information to find gaps in controls and accelerate risk reduction. This is both a standalone technology and one being created and acquired by vulnerability management vendors. Another area that is gaining ground quickly is packet capture. Respondents identified network data as the best means of early breach detection, and also identified the value of packet capture as the primary source. 



Passwordless Authentication: Bridging the Gap Between High-Security and Low-Friction Identity Management

PUBLISHED: Mon, 01 Jul 2019 00:00:00 +0000
AUTHOR: Steve Brasen

Today’s enterprise IT services continue to be broadly reliant on antiquated, ineffective, and unsecure password-based authentication controls. High-friction authentication processes reduce workforce productivity, create negative user experiences, damage business reputations, and are time-consuming and costly to manage. While passwordless approaches to authentication (such as biometrics and security keys) are increasingly recognized as powerful alternatives to traditional passwords, many organizations are unsure of the level of security passwordless solutions offer, which types of solutions will optimally address their organization’s needs, and how to responsibly transition to low-friction identity management solutions. Revealed in this research report are results from an in-depth, survey-based evaluation of the requirements, challenges, value, and optimal approaches to adopting passwordless authentication solutions.



Report Summary: Passwordless Authentication: Bridging the Gap Between High-Security and Low-Friction Identity Management

PUBLISHED: Mon, 01 Jul 2019 00:00:00 +0000
AUTHOR: Steve Brasen

Summary for the 2019 Passwordless Authentication report.



Reinventing ITSM: ScienceLogic Summary with Case Study

PUBLISHED: Fri, 28 Jun 2019 00:00:00 +0000
AUTHOR: Valerie O'Connell

ScienceLogic teams up with ServiceNow for integrated service management across a large, complex IT infrastructure.



The State of IT Automation: EMA Research Findings

PUBLISHED: Mon, 24 Jun 2019 00:00:00 +0000
AUTHOR: Valerie O'Connell

EMA surveyed 400 IT professionals globally to understand the role that advanced technologies, such as automation and AI, play in the quality of services IT delivers to the enterprise. Not surprisingly, IT automation has a far-reaching impact across functions, offering benefits that are highly valued up and down the chain of command. In fact, EMA research shows that IT automation, done right, has the realized potential of being transformational to the relationship of IT and its business stakeholders, as well as to the business itself. Although potentially game-changing, these advances are not challenge-free. Technological complexity, functional understanding, resource allocation, and simple resistance to
change all exert drag on adoption. This paper takes a research-based look at the adoption, maturity, challenges, and near-term plans for IT automation.



Reinventing ITSM: Digitate Summary with Case Study

PUBLISHED: Mon, 24 Jun 2019 00:00:00 +0000
AUTHOR: Valerie O'Connell

Digitate’s ignio integrates with ServiceNow and other solutions to bring
cohesion, machine learning, and automa tion in support o f IT transformation.



Enterprise Service Management (ESM) - It's Closer Than You Think

PUBLISHED: Thu, 20 Jun 2019 00:00:00 +0000
AUTHOR: Valerie O'Connell

IT serving the enterprise is not news, nor is IT’s drive to align with the business a recent thought. What is new are the ways organizations are combining cutting-edge technologies with existing platforms, processes, people, and policies to drive innovative services into the enterprise. Enterprise Service Management (ESM) is the product of common sense and technological advances in automation, AI, and analytics served from established ITSM competencies to non-IT functions across organizations from all industries, in all geographies. EMA recently conducted in-depth research with 400 global IT executives and practitioners in order to develop a clear view of ESM as it stands today and in the very near future. The result is a ground-level view of what drives, enables, and results from ESM implementations, with practical recommendations for teams in the process of deployment.



Best Practices for Delivering Packets to Network Performance Management Tools

PUBLISHED: Tue, 18 Jun 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This white paper draws on new Enterprise Management Associates (EMA) research on enterprise network performance management strategies. It explores how packets are an essential source of data for NPM tools, and it offers a guide to collecting and delivering packet data to NPM tools efficiently and effectively with network TAPs and network packet brokers. 



Automation, AI, and Analytics: Reinventing ITSM

PUBLISHED: Tue, 18 Jun 2019 00:00:00 +0000
AUTHOR: Valerie O'Connell

EMA research consistently tracks IT service management (ITSM) as a hub of digital transformation and change. What’s new are the ways artificial intelligence (AI), automation, and analytics are redefining ITSM’s role in business innovation, services, and organizational reinvention. Although potentially game-changing, these advances are not challenge-free. Technological complexity, functional understanding, resource allocation, and simple resistance to change all exert drag on adoption.

EMA designed this research, “Automation, AI, and Analytics: Reinventing ITSM,” to investigate the relationships between the near-universal business demands of digital transformation and the wealth of enabling technologies as they converge on the widening discipline of ITSM. Starting with the service desk as a central point of departure, the research took a use-case look at the state of AI and predictive analytics advances applied to incident and request service, problem resolution, support automation, and broader levels of enterprise service management (ESM).



Understanding the Value of Application-Aware Network Operations

PUBLISHED: Mon, 17 Jun 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Network operations teams can no longer ignore the application layer. Application experience can make or break a digital enterprise, and today most enterprises are digital. To deliver optimal performance, network operations tools must be application-aware. However, application-awareness in the network and security tool layers is expensive and difficult to scale. Enterprises can mitigate these challenges with a network visibility architecture that includes application-aware network packet brokers (NPBs).



The ROI of Plutora Environment Management: Why you need to intelligently manage your environments

PUBLISHED: Mon, 10 Jun 2019 00:00:00 +0000
AUTHOR: Steve Hendrick

Managing preproduction environments is the key to ensuring efficient application development and effective management of an application’s SDLC. Plutora’s environment management (Plutora) is the leading environment management tool in the industry. Empirical research and advanced analytics were used to develop a multidimensional ROI model for Plutora. This ROI model showed how ROI varied by the number of annual production releases that large enterprises performed over a four-year time horizon. EMA’s random survey of environment managers at 159 large North American enterprises included 52 who used Plutora as their primary environment management tool, and was the basis for developing a predictive model of the Plutora environment management’s ROI.



2019 EMA Vendors to Watch: Business Intelligence & Data Warehousing

PUBLISHED: Mon, 10 Jun 2019 00:00:00 +0000
AUTHOR: John Santaferraro

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that had previously gone unaddressed or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.


This document contains the 2019 EMA Vendors to Watch in the Business Intelligence and Data Warehousing field, including ZenOptics, Concentric, Ascend, FaunaDB, and Fluree.

Additional vendors will be added to this document throughout the year.



EMA Vendor to Watch: Concentric

PUBLISHED: Mon, 10 Jun 2019 00:00:00 +0000
AUTHOR: John Santaferraro

While data and analytics are booming, the analytics market remains fragmented with regard to enterprise analytics. Only the most mature organizations have seen success consolidating large data sets with data warehouses and data lakes. Even where there is success in data consolidation, analytics remain in silos.

Concentric is a market simulation software company that built Concentric Market®, a market simulation platform that enables data scientists and business users to harness the full power of multi-model intelligence for complex ecosystems with one model, instead of several interconnected models. EMA believes that this kind of innovation will pave the way for the next generation of data science and machine learning breakthroughs for decisions that are influenced by internal, market, and external forces.



Selecting Next-Generation Network Packet Brokers for Your Digital Transformation Journey

PUBLISHED: Fri, 07 Jun 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This white paper offers a guide to using next-generation network packet brokers to address the network and security operations requirements of tomorrow’s digital enterprises. Based on cutting-edge research from Enterprise Management Associates (EMA), the paper explores emerging technology requirements, organizational strategies, and potential implementation pitfalls. Enterprises should use this paper as a starting point when they evaluate how to build a network visibility fabric for tomorrow’s networks. 



PUBLISHED: Mon, 03 Jun 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Research summary for EMA's report, "Network Performance Management for Today's Digital Enterprise." 



ParkMyCloud Delivers Dramatic and Immediate Values at Foster Moore

PUBLISHED: Wed, 29 May 2019 00:00:00 +0000
AUTHOR: Dennis Drogseth

Since 2015, ParkMyCloud’s customer base has grown more than forty-six times, expanding beyond smaller and mid-tier environments to include large enterprises, government, and MSPs. It also evolved to support Azure, Google Cloud, and Alibaba Cloud, as well as AWS. It also includes advances in integrations such as ChatOps, and yet more automated approaches to governance and policy oversight, as well as defining logical groupings based on service or other requirements.

In the spring of 2019 Turbonomic acquired ParkMyCloud, with a parallel but complementary focus on cloud automation. The two companies will continue to function autonomously, while leveraging their combined strengths to further accelerate their benefits to customers.

The following interview underscores why ParkMyCloud has been so successful, and why it should continue to be a top-priority resource for any business or organization seeking proactive cost control over their cloud environments.



PUBLISHED: Fri, 24 May 2019 00:00:00 +0000
AUTHOR: John Santaferraro

Digital transformation and the cloud have accelerated the maturity of the cloud data warehouse market. In May 2019, SAP released SAP Data Warehouse Cloud, a cloud data warehouse platform combined with built-in business logic and a full set of capabilities to collect, analyze, share, and act on insight. EMA believes that the concept of a business-focused, unified data platform signals the move of the market away from cloud data warehousing to the data warehouse cloud. This market shift puts data and insight into the hands of business professionals without assistance from IT organizations, makes IT organizations more
efficient, and accelerates time to value. This white paper is designed to help executives and business professionals understand what to look for and expect in this intersection of cloud and data warehousing. It also provides initial guidance on how SAP Data Warehouse Cloud aligns with market and customer expectations.



Change Risk Mitigation Best Practices

PUBLISHED: Fri, 24 May 2019 00:00:00 +0000
AUTHOR: Steve Hendrick

Organizations struggle with IT production change risk management. This paper presents a generalized model for risk management and identifies best practices for leveraging this model to address production change risk. Also discussed in this paper is Numerify, a leading IT business analytics vendor, who provides sophisticated IT operations with a system of intelligence to mitigate production change risk with a solution that is data-driven. The solution is based around a canonical model that supports first-order and high-order KPIs (as well as machine learning) to identify and evaluate how to best mitigate production change risk.



Taking Threat Detection to the Next Level

PUBLISHED: Tue, 21 May 2019 00:00:00 +0000
AUTHOR: David Monahan, Former EMA Analyst

In EMA’s “Data-Driven Security Unleashed” report, less than half of the organizations surveyed had deployed either homegrown or commercial off-the-shelf (COTS) security analytics. Within the respondents that had a solution in place, 90% of respondents indicated their security analytics solution delivered greater value than expected. Yet, security teams know that no one solution does everything, and 65% of research respondents indicated they are actively looking to reduce those interfaces and consolidate. An additional 34% are consolidating tools as contracts expire. Defending the modern enterprise requires more coordination between SecOps and NetOps than ever before. The union of these teams and their datasets bring vision and understanding of necessary outcomes, making the path to those outcomes more efficient. 



PUBLISHED: Tue, 21 May 2019 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

IT operations teams often struggle to assemble an effective network performance management (NPM) toolkit because the market is increasingly complex. There are at least half a dozen classes of technologies that claim to manage network performance, yet they all offer very different views of the network. Moreover, the number of NPM use cases is expanding. Network operations monitoring, network troubleshooting, and network capacity planning remain core use cases. However, enterprises also use NPM tools for security monitoring and cloud application migration assessments. 

This market research offers a guide to evaluating NPM technologies and establishing a tool strategy that meets every use case an enterprise might have for such solutions. However, it is not a vendor comparison study. In fact, the reader will find almost no mention of specific vendors. The research draws on survey data and one-on-one interviews with IT professionals to understand how IT organizations are selecting, implementing, and using NPM tools. It identifies key technology requirements, industry challenges, and potential best practices. The key finding is this: There is no such thing as the ideal NPM platform. Every enterprise has its own unique needs that defy the possibility of a silver bullet for all. Instead, this research shows how enterprises assemble their own ideal NPM platforms based on partnerships with key vendors and some good old-fashioned hard work. 



Automation, AI, and Analytics: Reinventing ITSM

PUBLISHED: Thu, 02 May 2019 00:00:00 +0000
AUTHOR: Valerie O'Connell

EMA research consistently identifies ITSM as a hub of digital transformation and change. What’s new are the ways AI, automation, and predictive analytics are redefining ITSM’s role in business innovation, enterprise services, and organizational reinvention. Although game-changing, these advances are not free of challenge. Technological complexity, functional understanding, budget prioritization, and organizational resistance all exert a drag on adoption. 

Part of the challenge comes from confusion around the technologies themselves, since vendors and practitioners use terminology interchangeably for very different functions. EMA conducted global research with 400 executives and ITSM shareholders to provide actionable understanding of the appetite, adoption, maturity, and near-term plans for these technologies and their transformational impact on ITSM.

Providing research findings to benefit organizations of all sizes, this report offers mile markers across a range of topics, including:

  • Current adoption patterns of automation, AI, and analytics: Buying processes, ownership, best practices, and success rates/factors are presented and correlated where applicable.  
  • Use cases: What use cases are most compelling now and in the near future? Who currently owns the budget, headcount, and buying processes – and how is that changing?
  • ESM (Enterprise Service Management): What role does ESM play in adoption for both automation and AI/analytics? How extensive is ESM deployment today, and how does it impact the broader organization as well as ITSM?
  • Drivers and benefits achieved: Who and what forces are driving adoption and innovation? What are the obstacles and recommendations for moving forward? Is there a difference between anticipated and actual results?



Resolve Systems: IT Automation at the Speed of Humanity

PUBLISHED: Wed, 01 May 2019 00:00:00 +0000
AUTHOR: Valerie O'Connell

Automation is the “it technology” of business and IT. Common sense dictates that manual processes simply can’t keep up with the pace, depth, and sheer volume of changes, data, events, incidents, opportunities, and items of interest that shape growing businesses. Throwing people at the problem turns out to be just another problem—one that is particularly expensive, as well as monumentally ineffective. Nonetheless, “automation” is not a straightforward proposition. EMA research consistently demonstrates that automation as a concept ranges from simple bots through complex endeavors of processes, workflows, technologies, and results. Automation as an implemented reality spans toe-in-the-water pilots and planning to wholehearted bet-the-business adoption. Resolve Systems offers an automation and orchestration platform that scales up or down across the enterprise, leveraging existing solutions, erasing silos, and maximizing the human element as it goes. The solution set encourages organizations to optimize processes in a way that matches the human and organizational appetite for automation, and continually evolves to keep pace as acceptance, adoption, and application cases grow.


     

Subscribe Now!

Subscribe with Netvibes

follow us in feedly

EMA on Facebook   EMA on LinkedIn   EMA on Twitter   EMA RSS   EMA on YouTube

©1996-2020 Enterprise Management Associates, Inc. All rights reserved.
EMA™, ENTERPRISE MANAGEMENT ASSOCIATES®, and the mobius symbol are registered trademarks or common-law trademarks of Enterprise Management Associates, Inc.
Site Terms & Conditions | Integrity Policy | Site Map | My Account
Hide
Subscribe to EMA RSS Feed
Email
Show