Free RSS Feeds from Enterprise Management Associates (EMA)
Stay up to date on the latest IT and data management information from EMA, including Webinars, Radar Reports, white papers, impact briefs, advisory notes and more! Select your preferred reader by selecting an icon on the right. Current Feed Content:PUBLISHED: Tue, 03 Sep 2024 00:00:00 +0000AUTHOR: Ken Buckler This Radar report combines public user sentiment and analyst analysis with vendors’ forward-looking vision to develop a comprehensive, 360-degree profile of a vendor and its product strengths privileged access management (PAM), which is a critical pillar of cybersecurity. The information gathered in this report will enable you to tailor your vendor selection to best align with your specific requirements. OpenTelemetry: Challenges, Priorities, Adoption Patterns, and SolutionsPUBLISHED: Fri, 30 Aug 2024 00:00:00 +0000AUTHOR: Torsten Volk - Former EMA Analyst OpenTelemetry emerged as a key player in the cloud native arena, aiming to streamline the increasingly complex field of cloud native observability. The significant challenges enterprises face led to a broad consensus among software vendors to adopt a unified standard and framework for telemetry data management. This widespread enterprise enthusiasm is evidenced by a rapid increase in metrics that show the interest and adoption on the side of app developers, DevOps engineers, platform engineers, and general technologists. Addressing the Key OpenTelemetry ChallengesPUBLISHED: Fri, 30 Aug 2024 00:00:00 +0000AUTHOR: Torsten Volk - Former EMA Analyst OpenTelemetry (OTel) is a critical component for observability in modern cloud native applications. It enables developers to collect, process, and export telemetry data (traces, metrics, logs, and profiles) to help understand application behavior and performance. Grafana, a powerful observability tool, addresses key developer challenges associated with implementing and using OpenTelemetry. The Evolving Threat of Phishing and Social EngineeringPUBLISHED: Thu, 29 Aug 2024 00:00:00 +0000AUTHOR: Chris Steffen Despite ongoing advancements in security technologies and processes, it continues to be fairly simple to compromise user credentials through phishing and social engineering attacks, and we are seeing this become even easier with the advancements of AI, deepfakes and voice cloning. Plenty of examples exist and are exploited daily: social media is a literal warehouse of personal information that bad actors can use to target help desks, answer security questions, and ultimately resetting passwords. This allows them to enroll new devices to which multifactor authentication (MFA) codes are sent. From there, they can easily bypass MFA and gain access to any/all resources in an environment. Applying Generative AI to IT OperationsPUBLISHED: Tue, 20 Aug 2024 00:00:00 +0000AUTHOR: Shamus McGillicuddy Artificial intelligence (AI) has been a hot IT industry buzzword for many years, particularly in the context of AIOps (AI for IT operations). AIOps is primarily the application of machine learning and other advanced algorithms to IT telemetry data for event correlation, anomaly detection, problem isolation, root-cause analysis, and other operational use cases. AIOps promised to streamline and automate various aspects of IT management and it continues to gain momentum in the industry. Network as a Service: Understanding the Cloud Consumption Model in NetworkingPUBLISHED: Tue, 09 Jul 2024 00:00:00 +0000AUTHOR: Shamus McGillicuddy Network as a service (NaaS) is a loosely defined term that describes networking solutions delivered via a cloud-like service model, through which enterprises can shift networking from CapEx to OpEx spending and outsource aspects of network operations to an external provider. Based on a survey of 250 enterprise stakeholders, this research defines NaaS from the buyer’s point of view, identifies what they should expect from a NaaS solution, and explores how they can best to engage with providers. Network as a Service: Understanding the Cloud Consumption Model in Networking: SummaryPUBLISHED: Tue, 09 Jul 2024 00:00:00 +0000AUTHOR: Shamus McGillicuddy This is the research summary for EMA's recent report, "Network as a Service: Understanding the Cloud Consumption Model in Networking." Protecting Industry 4.0 from Advanced Cyber-Attacks Using MicrosegmentationPUBLISHED: Mon, 01 Jul 2024 00:00:00 +0000AUTHOR: Chris Steffen Continuous technological changes impact all businesses both positively and negatively. Industry 4.0, characterized by the junction of information technology (IT) and operational technology (OT) solutions, transformed industrial operational efficiencies. While the convergence increased significant business value through efficiency and data-driven visibility, it also introduced new cybersecurity challenges. ServiceOps 2024: automation and (gen)AI-powered IT service and operationsPUBLISHED: Tue, 11 Jun 2024 00:00:00 +0000AUTHOR: Valerie O'Connell ServiceOps’ has quickly moved from grassroots to mainstream because it is practical and delivers high-value results. It advances top IT priorities and makes sense to the people who do the work. Running on technology tracks already laid down, it leverages investments in workflow automation, AIOps, and evolving combinations of automation, AI, and GenAI to return high-impact benefits that map to C-level objectives. This third annual research examines the state of ServiceOps as practiced by 75% of the organizations represented in a global panel of IT leaders. PUBLISHED: Tue, 11 Jun 2024 00:00:00 +0000AUTHOR: Ken Buckler When email over the Simple Mail Transfer Protocol (SMTP) was first introduced in 2001, it was never meant to be a secure protocol. “Real mail security lies only in end-to-end methods involving the message bodies, such as those which use digital signatures,” states RFC2821, the original design document for SMTP. SMTP’s inherent security weaknesses stem from its reliance on transport-level security, limited authentication mechanisms, and susceptibility to vulnerabilities in the trust environment and transport system. It lacks the robustness of end-to-end security mechanisms using digitally signed messages to ensure message integrity and authenticity. Data in Motion: Orchestrating File Transfers and Data Pipelines in the Cloud EraPUBLISHED: Wed, 05 Jun 2024 00:00:00 +0000AUTHOR: Dan Twing This report offers a detailed analysis of the current trends, challenges, and advancements in enterprise data movement, with a particular focus on the integration of multi-cloud environments and the ongoing impact of digital transformation. The study provides insights into how modern enterprises manage the complex landscape of data transfer, emphasizing the evolving role of workload automation (WLA) and managed file transfer (MFT) technologies. The objective is to equip IT executives, data architects, and cloud strategists with the knowledge and tools required to enhance their data movement strategies, ensuring robustness, compliance, and efficiency in response to evolving technological landscapes and business needs. 2024 EMA Vendors to Watch: Network ManagementPUBLISHED: Wed, 22 May 2024 00:00:00 +0000AUTHOR: Shamus McGillicuddy EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that previously went unaddressed, or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.
This document contains the 2024 EMA Vendors to Watch in the network management field, including TelcoBrain Technologies. Compelling Reasons for a Pre-Integrated Internal Development Platform: Faster Application Delivery, Less Complexity, and Enhanced ProductivityPUBLISHED: Mon, 20 May 2024 00:00:00 +0000AUTHOR: Torsten Volk - Former EMA Analyst This white paper, titled "Compelling Reasons for a Pre-Integrated Internal Development Platform: Faster Application Delivery, Less Complexity, and Enhanced Productivity," authored by Torsten Volk, Managing Research Director at EMA, delves into the strategic benefits of pre-integrated Internal Developer Platforms (IDPs). In a rapidly evolving digital marketplace, swift software development and deployment are crucial for competitiveness. IDPs provide self-service access to essential tools, reducing developers' time spent on non-coding tasks. The API-centric model of IDPs simplifies access to resources, enhances productivity, and ensures compliance with security standards. The paper highlights how pre-integrated IDPs streamline development, promote consistency, and reduce complexity, leading to faster, more secure, and cost-effective application delivery. Additionally, it explores the role of key IT personas in establishing IDPs and the advantages of adopting pre-integrated solutions over DIY approaches. The VMware Tanzu Platform is presented as a prime example of how pre-integrated IDPs can support hybrid cloud consistency and simplify microservices management, ultimately enabling organizations to innovate efficiently and maintain a competitive edge. Network Management Megatrends 2024: Skills Gaps, Hybrid and Multi-Cloud, SASE, and AI-Driven OperationsPUBLISHED: Tue, 07 May 2024 00:00:00 +0000AUTHOR: Shamus McGillicuddy Enterprise Management Associates’ (EMA) Network Management Megatrends research has been the industry benchmark of enterprise network operations tools and practices since it was first published in 2008. This biennial research surveys hundreds of IT professionals about their approach to managing, monitoring, and troubleshooting their networks. It also examines the business and technology trends that are shaping network operations strategy. Fortune 500 Bank Unifies Network Operations and Cybersecurity in the Cloud with Aviatrix Distributed Cloud FirewallPUBLISHED: Tue, 30 Apr 2024 00:00:00 +0000AUTHOR: Shamus McGillicuddy When the IT organization for a Fortune 500 bank adopted the Cloud Networking Platform from Aviatrix®, its initial aim was to solve networking complexity in its Azure environment. When Aviatrix introduced its Distributed Cloud Firewall solution, the bank expanded its engagement with the vendor to deploy security capabilities in all its cloud landing zones. The Evolution of Work: Enhancing Productivity and Collaboration through Digital Employee Experience (DEX)PUBLISHED: Mon, 29 Apr 2024 00:00:00 +0000AUTHOR: Dan Twing This new Enterprise Management Associates (EMA) research, sponsored by Broadcom and Martello, presents a comprehensive examination of enterprise digital experience (DEX) and its impact on organizational dynamics, productivity, and collaboration. This research adopts a dual perspective, analyzing insights from both IT managers implementing DEX solutions and employees utilizing them. EMA’s research explores various aspects of DEX implementation and its ramifications, including business and employee impacts, along with challenges faced during integration. Additionally, workforce productivity is evaluated in the context of current inhibitors, with emphasis on the significance of user experience and intelligent technologies. The role of DEX in driving collaboration, particularly through platforms like MS Teams, is explored, highlighting challenges, benefits, and user experiences. Challenges companies face in productivity and efficiency are dissected, including siloed IT systems and the impact of remote work environments. EMA’s research then identifies strategies for implementing an enterprise DEX solution, stressing the importance of coordination, change management, and augmenting DEX with unified endpoint management. The research concludes by envisioning the future state of DEX, considering its evolution with business needs, onsite versus remote work dynamics, and the growth of collaboration tools. IT outages: 2024 costs and containmentPUBLISHED: Thu, 25 Apr 2024 00:00:00 +0000AUTHOR: Valerie O'Connell For more than a decade, industry pundits and press pegged the cost of an IT outage at $5,600 per minute. It turns out that this figure is an urban legend. It sprang from a casual remark made in a 2014 analyst blog that never claimed the number to be either research or fact. In 2022 and again in 2024, BigPanda commissioned EMA to undertake independent field research into the cost of an IT outage. The objective: to develop a research-based average cost/minute – an average that is defensible, not definitive. This research explores the current state of IT outage costs, causes, and containment. Transforming MSPs/MSSPs: Methods to Improve Operational Efficiencies, Reduce Risk, and Increase Profitability with AI/MLPUBLISHED: Thu, 04 Apr 2024 00:00:00 +0000AUTHOR: Chris Steffen Cybersecurity is in a constant state of evolution and threats are becoming more sophisticated and pervasive for organizations of every size. More organizations are turning to managed security service providers (MSSPs) and managed service providers (MSPs) to address these emerging threats. MSSPs and MSPs are being tasked not only with safeguarding their clients’ digital assets, but company leadership also has the goals of managing scale and profitability. Most of these service providers face some of the same issues facing the organizations they service: a convergence of threats is battering digital perimeters and raining IT/security resources. Attack surfaces continue to expand, encompassing not just traditional IT infrastructure, but also the increasing Internet of Things (IoT) and operational technology (OT) domains. Threat actors are utilizing more sophisticated and nimble tools, often powered by artificial intelligence (AI), that exploit vulnerabilities faster than ever before. These attacks inflict crippling damage, causing data breaches, operational disruptions, and reputational nightmares. Securing Tomorrow: The Role of AI in Transforming CybersecurityPUBLISHED: Thu, 04 Apr 2024 00:00:00 +0000AUTHOR: Ken Buckler The roots of human/machine collaboration trace back to the 18th century with the advent of the “Mechanical Turk.” This ingenious automaton, constructed by Wolfgang von Kempelen in 1770, captured the imagination of audiences by simulating the performance of tasks that seemed beyond the capability of machinery at the time, such as playing chess. Early attempts like the Mechanical Turk symbolize humanity’s enduring fascination with automata and the intersection of human and machine capabilities. Nine Cost Considerations for Observability PlatformsPUBLISHED: Thu, 04 Apr 2024 00:00:00 +0000AUTHOR: Torsten Volk - Former EMA Analyst This white paper by Enterprise Management Associates (EMA) delves into the financial implications of implementing observability platforms in organizations. Observability is pivotal for stakeholders such as developers, DevOps engineers, platform engineers, and SREs to ensure real-time performance, system reliability, and rapid market response. The paper highlights the collaboration between these roles to maximize business impact through effective decision-making and infrastructure optimization. However, it emphasizes that without a clear understanding of the cost structure, observability expenses can become prohibitive, hindering business success. PUBLISHED: Thu, 04 Apr 2024 00:00:00 +0000AUTHOR: Dennis Drogseth This is the EMA Radar Report for AIOps: A Guide to Investing in Innovation summary featuring Aisera. PUBLISHED: Tue, 26 Mar 2024 00:00:00 +0000AUTHOR: Dennis Drogseth This is the EMA Radar Report for AIOps: A Guide to Investing in Innovation summary featuring Interlink Software. Modern Enterprises Must Boost Observability with Internet Performance MonitoringPUBLISHED: Mon, 25 Mar 2024 00:00:00 +0000AUTHOR: Shamus McGillicuddy This white paper explores how digital operations have become more challenging as IT infrastructure has hybridized with adoption of cloud services and internet connectivity. Internet performance monitoring tools have become just as important as application performance management, if not more so. A Guide to Automating Network OperationsPUBLISHED: Mon, 25 Mar 2024 00:00:00 +0000AUTHOR: Shamus McGillicuddy The typical network infrastructure professional’s workday is fundamentally focused on assessing the network. Network teams continuously compare observed states to business requirements for critical applications and IT services during fault investigation, change validation, and security audits. Assessment is the initial step in network engineering and operations, ensuring alignment with business needs. PUBLISHED: Thu, 21 Mar 2024 00:00:00 +0000AUTHOR: Dennis Drogseth This is the EMA Radar Report for AIOps: A Guide to Investing in Innovation summary featuring CloudFabrix. PUBLISHED: Thu, 21 Mar 2024 00:00:00 +0000AUTHOR: Dennis Drogseth This is the EMA Radar Report for AIOps: A Guide to Investing in Innovation summary featurig Broadcom. PUBLISHED: Wed, 20 Mar 2024 00:00:00 +0000AUTHOR: Dennis Drogseth The AIOps marketplace is both dynamic and transformative. As exhibited within this report by 13 of the industry’s leading innovators, AIOps is a landscape with creative solutions that vary in breadth and focus. For this Radar, EMA posed a series of questions to produce a charted use case summary of where each vendor is positioned. The questions also delivered a fresh look at how the industry has evolved, with detailed insights into design, deployment, cost, and overall effectiveness. Securing Tomorrow: The Role of AI in Transforming CybersecurityPUBLISHED: Fri, 15 Mar 2024 00:00:00 +0000AUTHOR: Ken Buckler In a recent research survey Enterprise Management Associates conducted, professionals from various industries provided insights into the current trends of artificial intelligence adoption, focusing on securing the usage of AI and the use of AI for cybersecurity. The research, which covered organizations of all sizes across 19 industry verticals, shed light on the challenges businesses face in embracing AI technologies. Survey respondents from organizations spanning finance, insurance, health care, retail, manufacturing, and other sectors revealed diverse perspectives on AI adoption. Despite their differences, the commonality of challenges and successes organizations experience underscores the universal impact of AI, its benefits, and potential security concerns. In this paper, EMA will examine how solutions such as OpenText Cybersecurity leverage AI to mitigate the risk of breaches and improve productivity in organizations. Top 5 Critical Pain Points in Observability and How AI can HelpPUBLISHED: Fri, 15 Mar 2024 00:00:00 +0000AUTHOR: Torsten Volk - Former EMA Analyst This white paper discusses the critical challenges in observability within cloud native applications and microservices, emphasizing the need for AI in addressing these complexities. It identifies five key pain points: inefficiencies and risk, root cause analysis, issue prioritization, eliminating blind spots, and balancing productivity with performance and cost. AI solutions are proposed for each, highlighting their role in enhancing system health, performance, and alignment with business goals. The paper underscores AI’s necessity in modern observability strategies for effective management and futureproofing operations. Enterprise Network Automation: Emerging From the Dark Ages and Reaching Toward NetDevOpsPUBLISHED: Mon, 11 Mar 2024 00:00:00 +0000AUTHOR: Shamus McGillicuddy This independent, multi-sponsor market research report explores the state of network automation initiatives in enterprise IT organizations. Based on a survey of 354 network automation stakeholders and in-depth one-on-one interviews with ten network automaton professionals, the report explores the entire lifecycle of network automation strategies, including both homegrown and commercial solutions. 2024 EMA Vendors to Watch: Network ManagementPUBLISHED: Wed, 28 Feb 2024 00:00:00 +0000AUTHOR: Shamus McGillicuddy EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that previously went unaddressed, or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches. This document contains the 2024 EMA Vendors to Watch in the network management field, including Coevolve.
The Future of Your NetOps Toolset: Planning for Cisco Prime Infrastructure End of LifePUBLISHED: Mon, 26 Feb 2024 00:00:00 +0000AUTHOR: Shamus McGillicuddy This advises IT organizations on how to plan for the retirement of Cisco Prime Infrastructure, the network infrastructure vendor’s longtime network management tool suite. It identifies key trends that are guiding IT tool strategy today and provides an overview of what decision-makers should look for in their next network management solution. Real-world incident response, management, and preventionPUBLISHED: Wed, 31 Jan 2024 00:00:00 +0000AUTHOR: Valerie O'Connell Incidents and outages happen. Decreasing their frequency, duration/MTTR, and impact collectively form a never-ending objective – one that is a top goal for IT organizations globally. It turns out that some organizations seem to be fighting a losing battle while others are successfully taming the beast. This research explores the ways that automation, AI, and cross-functional collaboration impact incident response, management, and prevention today and in GenAI’s near future. Observability: Challenges, Priorities, Adoption Patterns, and SolutionsPUBLISHED: Wed, 31 Jan 2024 00:00:00 +0000AUTHOR: Torsten Volk - Former EMA Analyst Observability has become one of the most prominent topics in technology because it is the key discipline that enables organizations to directly tie technology investments to business success. This research report identifies real-life challenges that can prevent organizations from achieving the level of observability required to squeeze the most business value out of their technology resources. Based on these challenges and current technology adoption patterns, we present enterprise priorities and make recommendations for organizations seeking to implement business-centric full-stack observability across the enterprise. EMA AllStars 2024PUBLISHED: Wed, 10 Jan 2024 00:00:00 +0000AUTHOR: Torsten Volk - Former EMA Analyst The “EMA AllStars 2024” report identifies the key trends and enterprise customer requirements in 2024 and crowns products and vendors that address them convincingly. EMA AllStars are products that deliver customer value in a strongly differentiated manner. Startups and established businesses are both eligible to receive the EMA AllStars award for their unique approach toward solving critical customer challenges. Visit the EMA AllStars website to learn about our AllStar products and explore the latest market data. Modernizing Active Directory: A Prescriptive Guide to Eliminating IT Complexity While Extending Services to Support Non-Microsoft ResourcesPUBLISHED: Mon, 08 Jan 2024 00:00:00 +0000AUTHOR: Steve Brasen - Former EMA Analyst Celebrated programming legend Admiral Grace Hopper famously noted, “The most dangerous phrase in the English language is, ‘We’ve always done it this way.’” Truer words were never spoken then in regard to Microsoft Active Directory (AD), which persists to propagate the myth that AD is the only service that can support access control functionality, especially for custom-tailored applications. In particular, there are misconceptions that AD exclusively supports functionality for group management and access security, and that purchasing Microsoft products is required to maintain enterprise authentication and authorization compatibility. However, administrators should pause when considering the number of additional tools required to integrate with Active Directory to allow proper management of single sign-on (SSO), multi factor authentication (MFA), mobile device management (MDM), and privileged access management (PAM). At the end of the day, the integration looks like a complex jigsaw puzzle built from different puzzle vendors. The pieces fit, but it’s still difficult to manage and doesn’t look like the painted picture you originally imagined. Perhaps it’s time to find a better approach that doesn’t require so many puzzle pieces. PUBLISHED: Mon, 08 Jan 2024 00:00:00 +0000AUTHOR: Ken Buckler Digital certificates serve as the cornerstone of secure online communications and transactions, enabling encryption, user authentication, and defense against cyber threats. However, their expiring nature poses significant security challenges, especially in the context of the widespread use of Transport Layer Security (TLS) certificates in modern internet infrastructure. The ramifications of expired or compromised certificates extend beyond mere inconvenience, potentially leading to service disruptions, vulnerabilities, and data breaches. To address these issues, the EMA research findings emphasize the pressing need for automated certificate management and shed light on existing security concerns within the realm of certificates. EMA’s 2023 research, “SSL/TLS Certificate Security – Management and Expiration Challenges” highlights these management and security challenges and the necessity for automated certificate management. PUBLISHED: Mon, 08 Jan 2024 00:00:00 +0000AUTHOR: Valerie O'Connell When it comes to delivering great IT service experiences, midsized organizations are held to the same standards and expectations as their larger competitors.Too big for vanilla, easy solutions, but too resource-stretched to throw money and bodies at innovation, they are challenged to achieve supersized goals with midsized budgets. Research demonstrates that modernizing IT service management (ITSM) is one solid way to achieve operational excellence today and position for growth and innovation. It’s an investment that returns generous results – both qualitative and measurable. This ebook makes a strong argument for prioritizing ITSM as a way to maximize existing investments, promote human/machine advances across the enterprise, save costs, stay competitive, and be positioned for innovation and growth. NetSecOps: Examining How Network and Security Teams Collaborate for a Better Digital FuturePUBLISHED: Wed, 03 Jan 2024 00:00:00 +0000AUTHOR: Shamus McGillicuddy This independent market research explores the nature of collaboration between network operations teams and cybersecurity teams. It identifies why network and security teams need to work together and explores the challenges enterprises encounter when they try to build partnerships between these groups. The report also identifies best practices for ensuring that this collaboration is successful. Summary: NetSecOps: Examining How Network and Security Teams Collaborate for a Better Digital FuturePUBLISHED: Wed, 03 Jan 2024 00:00:00 +0000AUTHOR: Shamus McGillicuddy This independent market research explores the nature of collaboration between network operations teams and cybersecurity teams. It identifies why network and security teams need to work together and explores the challenges enterprises encounter when they try to build partnerships between these groups. The report also identifies best practices for ensuring that this collaboration is successful. Observability: Your Key to Continued Success in the Ever-changing World of TechnologyPUBLISHED: Tue, 12 Dec 2023 00:00:00 +0000AUTHOR: Ken Buckler In the rapidly evolving landscape of technology and business operations, the concept of observability emerged as a critical aspect for organizations striving to maintain their competitive edge. Observability encompasses the capacity to gain valuable insights into complex systems by collecting, analyzing, and interpreting data from various sources. It allows organizations to proactively detect, diagnose, and resolve issues, ensuring optimal performance, security, and overall efficiency. However, achieving the right balance between obtaining essential data and managing the associated costs has proven to be a formidable challenge for many organizations.
This research report delves into the world of observability and aims to explore the questions and dilemmas organizations face in their pursuit of this essential capability. The report focuses on three main areas: Observability Methods and Tools, Leveraging Observability Data, and the Impact and Results of implementing observability practices.
Overall, this research report sheds light on the intricate landscape of observability, its methodologies, and the varied approaches different organizations adopt. As we explore the data and findings, we aim to provide a comprehensive understanding of the challenges and opportunities that arise in the pursuit of observability. By doing so, we hope to guide organizations toward making informed decisions, effectively implementing observability practices, and harnessing observability’s potential for continued success in the dynamic digital era. Transcending Passwords: The Next Generation of AuthenticationPUBLISHED: Wed, 15 Nov 2023 00:00:00 +0000AUTHOR: Steve Brasen - Former EMA Analyst Emerging requirements for achieving security assurance in the face of accelerating threats, enhancing workforce productivity, and improving user satisfaction with IT services are driving businesses to advance access policies beyond relying on traditional passwords as the principal form of authentication. To help organizations make informed decisions on the types of authenticators to adopt, EMA conducted primary research involving surveys of end users and business IT professionals to gauge the effectiveness of adopted solutions. Hybrid Workers Need Remote Connectivity That Balances Security and User ExperiencePUBLISHED: Tue, 07 Nov 2023 00:00:00 +0000AUTHOR: Shamus McGillicuddy While many high-profile employers have issued return-to-office mandates, remote work still dominates the economy. According to Enterprise Management Associates (EMA) research, 94% of companies have seen a permanent increase in remote workers since the COVID-19 pandemic.
Multi-Cloud Architecture Requires Application- Aligned NetworksPUBLISHED: Wed, 25 Oct 2023 00:00:00 +0000AUTHOR: Shamus McGillicuddy Using two or three IaaS providers is standard. Enterprises are rapidly embracing multi-cloud architectures. EMA expects multi-cloud complexity to increase quickly.
From DIY DDI to BlueCat: Customers Earn ROI Within Three MonthsPUBLISHED: Tue, 24 Oct 2023 00:00:00 +0000AUTHOR: Shamus McGillicuddy This return on investment analysis examines the transition from a do-it-yourself approach to DNS, DHCP, and IP address management to an enterprise solution from BlueCat Networks. Based on interviews with two large enterprise customers, the analysis found that this transition could pay for itself within three months and ultimately earn customers $1.5 million in additional financial benefits within the first year.
2023 EMA Vendors to Watch: Network ManagementPUBLISHED: Mon, 09 Oct 2023 00:00:00 +0000AUTHOR: Shamus McGillicuddy EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that previously went unaddressed, or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches. This document contains the 2023 EMA Vendors to Watch in the network management field, including Zero Networks, Augtera, and Lytn. Service-Centric NetOps: Embracing the FuturePUBLISHED: Thu, 05 Oct 2023 00:00:00 +0000AUTHOR: Shamus McGillicuddy Networks are complex systems, with countless devices receiving traffic and making forwarding decisions independently of one another. Traditional network management tools are rooted in managing these devices. In theory, providing a deep understanding of the state of individual devices allows network managers to troubleshoot problems quickly.
PUBLISHED: Fri, 29 Sep 2023 00:00:00 +0000AUTHOR: Dan Twing This is the EMA Radar Report for Workload Automation and Orchestration 2023 summary featuring BMC. PUBLISHED: Thu, 28 Sep 2023 00:00:00 +0000AUTHOR: Dan Twing The EMA Radar Report delivers an in-depth analysis of industry-leading vendors and vendor products, including their overall market position in comparison with other vendors. This information is laid out in an easy-to-decipher, detailed market map and Radar Chart – which includes a composite score for each vendor – making it simple to see how vendors measure up in the market, as well as against other vendors. The EMA Radar Report also provides a detailed discussion of methodology and criteria, a high-level market segment overview, a comprehensive analyst writeup on each vendor, and more. This Radar Report covers workload automation. 2023 marks a transformative era for workload automation with significant advances by leading products to expand orchestration capabilities.
PUBLISHED: Thu, 28 Sep 2023 00:00:00 +0000AUTHOR: Dan Twing This is the EMA Radar Report for Workload Automation and Orchestration 2023 summary featuring AutomateNOW! by InfiniteDATA. PUBLISHED: Thu, 28 Sep 2023 00:00:00 +0000AUTHOR: Dan Twing This is the EMA Radar Report for Workload Automation and Orchestration 2023 summary featuring Stonebranch. PUBLISHED: Thu, 28 Sep 2023 00:00:00 +0000AUTHOR: Dan Twing This is the EMA Radar Report for Workload Automation and Orchestration 2023 summary featuring ActiveBatch, RunMyJobs, and Tidal by Redwood. PUBLISHED: Thu, 28 Sep 2023 00:00:00 +0000AUTHOR: Dan Twing This is the EMA Radar Report for Workload Automation and Orchestration 2023 summary featuring Broadcom. The Transformation of Cybersecurity from Cost Center to Business EnablerPUBLISHED: Mon, 25 Sep 2023 00:00:00 +0000AUTHOR: Chris Steffen Businesses increasingly rely on technology to streamline operations, enhance customer experiences, and gain a competitive edge. Digital transformation has brought unprecedented opportunities for growth and innovation. However, it has also exposed organizations to many cybersecurity risks that threaten the foundation of their existence.
A business view of IT asset management: Current state and near-term outlookPUBLISHED: Fri, 22 Sep 2023 00:00:00 +0000AUTHOR: Valerie O'Connell The third in a series of annual research initiatives on the state of IT asset management (ITAM), this report represents the collective findings of 450 global IT leaders in 2023. Their observations and opinions benefit from context that was set in earlier efforts.
Edge-Aware AIOps Drives SASE SuccessPUBLISHED: Wed, 20 Sep 2023 00:00:00 +0000AUTHOR: Shamus McGillicuddy This white paper explores how AIOps solutions can leverage network intelligence to streamline, optimize, and automate network operations, particularly for software-defined WAN (SD-WAN) and secure access service edge (SASE) technology. The paper also highlights the capabilities and value of VMware Edge Network Intelligence, an AIOps solution of VMware SASE.
DDI Directions: DNS, DHCP, and IP Address Management Strategies for the Multi-Cloud EraPUBLISHED: Tue, 12 Sep 2023 00:00:00 +0000AUTHOR: Shamus McGillicuddy DNS, DHCP, and IP address management (DDI) are a suite of core services essential to network connectivity and communications. DDI suites manage the assignment of IP addresses and the mapping of those addresses to DNS domains for both internal and external communications. People who lack networking expertise may think DDI is trivial, but an ineffective approach to these core services can lead to sluggish network operations, chronic downtime, security breaches, and worse.
IT Organizations in a Quandary Over Visibility Into Cloud TrafficPUBLISHED: Tue, 12 Sep 2023 00:00:00 +0000AUTHOR: Chris Steffen The push for the finalized IETF Transport Layer Security (TLS) 1.3 standard for network encryption started in 2018 and the major web server and browser vendors backed it with heavy promotion. Back then, the 10-year-in-the-making standard promised better privacy, but it also threatened to break how IT networking and security professionals troubleshoot networking problems and monitor the presence of malware and malicious actors operating within those networks.
EMA Radar for Privileged Access Management (PAM)PUBLISHED: Thu, 24 Aug 2023 00:00:00 +0000AUTHOR: Steve Brasen - Former EMA Analyst The EMA Radar Report delivers an in-depth analysis of industry-leading vendors and vendor products, including their overall market position in comparison with other vendors. This information is laid out in an easy-to decipher, detailed Radar Chart, making it simple to see how vendors measure up in the market, as well as against other vendors. The EMA Radar Report also provides a detailed discussion of methodology and criteria, a high-level market segment overview, and a comprehensive analyst write-up on each vendor. Case Study: Global 500 Media Company Sees 8x Boost to Remote Worker Experience with CloudbrinkPUBLISHED: Tue, 22 Aug 2023 00:00:00 +0000AUTHOR: Shamus McGillicuddy With nearly all its 15,000 employees permanently working from home on at least a part-time basis post-pandemic, a major division of a multi-billion-dollar global media company transformed its approach to secure remote access with Cloudbrink, a provider of hybrid access as a service (HAaaS).
CMDB today: myths, mistakes, and masteryPUBLISHED: Mon, 14 Aug 2023 00:00:00 +0000AUTHOR: Valerie O'Connell Despite periodic but persistent press assertions that the rise of cloud cuts the relevance of CMDB, EMA experience and field research consistently find the opposite to be true. In a recent EMA research engagement, 400 global IT leaders stated that CMDB use was central to major functions. For many of those respondents, CMDB use was viewed as increasing in importance for automation of complex processes.
Kubernetes at Scale: Challenges, Priorities, Adoption Patterns, and SolutionsPUBLISHED: Fri, 11 Aug 2023 00:00:00 +0000AUTHOR: Torsten Volk - Former EMA Analyst The equation is simple: to maximize the productivity of application developers, we need to minimize the time they have to spend on overhead tasks. These are tasks that go beyond writing, maintaining, and testing new application code. They include infrastructure provisioning and configuration, deployment, management, upgrades of Kubernetes clusters, application deployment and management, ensuring security and compliance of the overall application stack, configuring backup and disaster recovery, configuring observability and visibility, and optimizing cost.
Kubernetes at Scale: 10 Reasons to Use Multiple Kubernetes DistributionsPUBLISHED: Fri, 11 Aug 2023 00:00:00 +0000AUTHOR: Torsten Volk - Former EMA Analyst This report goes over ten reasons to use multiple Kubernetes distributions. Kubernetes at Scale: Challenges, Priorities, Adoption Patterns, and SolutionsPUBLISHED: Fri, 11 Aug 2023 00:00:00 +0000AUTHOR: Torsten Volk - Former EMA Analyst There is no shortage of metrics that illustrate the rapid rise of Kubernetes as the application platform of choice for many enterprises. The number of monthly Google searches doubled between 2021 and 2023. Meanwhile, the number of downloads of the Kubernetes client library for Python increased by 1,714% between 2019 and 2023. The number of operator questions on the Stack Exchange Server Fault support forum increased by 40% year over year, and the number of publicly accessible Kubernetes clusters also increased by 40% over the same timeframe.
Kubernetes at Scale: Public Cloud-Managed Kubernetes Alone is Not the AnswerPUBLISHED: Fri, 11 Aug 2023 00:00:00 +0000AUTHOR: Torsten Volk - Former EMA Analyst From a business perspective, public cloud-managed Kubernetes alone is not the answer. Cloud-managed platforms such as EKS, AKS, and GKE are always embedded within the much larger context of the respective cloud vendor. While these offerings take care of managing the Kubernetes control plane, they still require enterprises to address many Kubernetes-related topics, such as cost control, security and data protection, scalability and performance, service reliability and availability, integration and interoperability, control and flexibility, technology lock-in, monitoring and analytics, and support and training.
Kubernetes at Scale: Three PerspectivesPUBLISHED: Fri, 11 Aug 2023 00:00:00 +0000AUTHOR: Torsten Volk - Former EMA Analyst In a world of complex cloud systems, developers, operators, and DevOps professionals grapple with a variety of challenges while navigating Kubernetes, a potent container orchestration platform. This narrative captures the essence of three distinct perspectives and their experiences with Kubernetes issues.
Kubernetes at Scale: Security ChallengesPUBLISHED: Fri, 11 Aug 2023 00:00:00 +0000AUTHOR: Torsten Volk - Former EMA Analyst The fact that the number of Kubernetes-related CVEs doubled over the past year indicates the need to take Kubernetes security seriously. This increase is a direct result of broader and deeper adoption of the Kubernetes platform in combination with the rapidly increasing complexity of the Kubernetes ecosystem.
Kubernetes at Scale: Top 10 Critical Kubernetes Challenges for DevelopersPUBLISHED: Fri, 11 Aug 2023 00:00:00 +0000AUTHOR: Torsten Volk - Former EMA Analyst This report discusses ten critical Kubernetes-related challenges for application developers. The Five Pillars of the Ideal Kubernetes Management PlatformPUBLISHED: Fri, 11 Aug 2023 00:00:00 +0000AUTHOR: Torsten Volk - Former EMA Analyst The equation is simple: to maximize the productivity of application developers, we need to minimize the time they have to spend on overhead tasks. These are tasks that go beyond writing, maintaining, and testing new application code. They include infrastructure provisioning and configuration, deployment, management, upgrades of Kubernetes clusters, application deployment and management, ensuring security and compliance of the overall application stack, configuring backup and disaster recovery, configuring observability and visibility, and optimizing cost.
Modernizing Network Engineering and Operations in the Era of Hybrid and Remote WorkPUBLISHED: Tue, 08 Aug 2023 00:00:00 +0000AUTHOR: Shamus McGillicuddy Since the advent of ubiquitous broadband internet service in the developed world, enterprises have offered employees the opportunity to work from home. With an internet connection, any information worker can be reasonably productive from home. However, until recently, the work-from-home option was primarily a perk rather than a strategic imperative. That paradigm shifted in 2020 with the COVID-19 pandemic. Suddenly, remote work was a business continuity strategy at a time when governments were urging everyone to limit their exposure to potential infection by staying home.
Modernizing Network Engineering and Operations in the Era of Hybrid and Remote Work: SummaryPUBLISHED: Tue, 08 Aug 2023 00:00:00 +0000AUTHOR: Shamus McGillicuddy This is the research summary for EMA's recent report, "Modernizing Network Engineering and Operations in the Era of Hybrid and Remote Work."
Charting a Course to 5G-Optimized SASEPUBLISHED: Fri, 28 Jul 2023 00:00:00 +0000AUTHOR: Shamus McGillicuddy Hybrid multi-cloud architectures, hybrid work, the Internet of Things (IoT), and other digital disruptors introduced complexity to networks that created the need for a converged approach to networking and security. Secure access service edge (SASE) is a class of solutions that unifies software-defined WAN, cloud-delivered network security (e.g., cloud access security broker, secure web gateway, firewall as a service), and secure remote access (e.g., zero trust network access) onto one platform.
PUBLISHED: Wed, 26 Jul 2023 00:00:00 +0000AUTHOR: Ken Buckler Digital certificates play a vital role in securing online communications and transactions. They are used to encrypt sensitive data, authenticate users, and protect against various types of cyber threats. However, digital certificates have an expiration date, which requires regular renewals to ensure their continued effectiveness. This process can be challenging and time-consuming, especially for large organizations with many certificates. Furthermore, expired or compromised certificates can lead to damaging service outages, security vulnerabilities, and data breaches. To address these security challenges, Google proposed reducing the maximum validity of public Transport Layer Security (TLS) certificates (also known as SSL certificates) from 13 months to just 90 days. This proposed change could have a significant impact on the industry, affecting certificate authorities, browser makers, and organizations that rely on digital certificates for security.
Target-Centric Intelligence: Unlocking the Secrets of OSINT for Effective Cyber DefensePUBLISHED: Fri, 21 Jul 2023 00:00:00 +0000AUTHOR: Ken Buckler In the realm of cybersecurity, it is highly likely that you are already harnessing the power of open-source intelligence (OSINT) without even realizing it. Many teams are actively monitoring and tracking threat indicators and threat actors through publicly available intelligence. However, it is important to note that traditional cyber threat intelligence (CTI) platforms do not necessarily equate to comprehensive OSINT platforms.
Automation Intelligence Reduces Job Failure Incidents for a Top 10 Global Financial InstitutionPUBLISHED: Tue, 18 Jul 2023 00:00:00 +0000AUTHOR: Dan Twing Daily liquidity reporting is crucial for commercial banks to manage cash flows, comply with regulations, mitigate risks, make informed decisions, and maintain investor confidence. When overnight processing problems caused frequent delays in delivering these critical reports to management, something had to change.
Why Should Organizations Consider Extended Detection and Response?PUBLISHED: Tue, 11 Jul 2023 00:00:00 +0000AUTHOR: Chris Steffen Plenty of companies have delivered on the promise of extended detection and response (XDR). The security market is flooded with security vendors coming out with their spin on detection and response capabilities, all of which are the “best” or “leading” solutions for stopping bad actors from damaging enterprise networks and systems. Despite the plethora of available tools, security incidents continue to increase, and high-profile attacks have enterprise leaders asking how they can prevent their companies from appearing on the 9:00 o’clock news. As security leaders evaluate the vast array of tools available to combat ransomware attacks, endpoint and extended detection and response solutions still stand out as the best defense against emerging threats—but how can an enterprise know which of these tools is the best?
IT Executive Survey 2023: Global Banking, Finance, and Insurance Technology InsightsPUBLISHED: Fri, 23 Jun 2023 00:00:00 +0000AUTHOR: Dan Twing Digital transformation describes a “digital first” vision of customer experiences across all areas of a business, fundamentally changing how it operates and maximizes value to customers. The overarching goal of digital transformation is to unify massive amounts of heterogeneous customer data nestled in silos across the company and tailor it into individualized, personalized customer treatments. Such treatments increase customer satisfaction, loyalty, and retention to ultimately maximize lifetime customer value.
EMA ROI Study: Impact of Docker Desktop on the Application Delivery LifecyclePUBLISHED: Tue, 06 Jun 2023 00:00:00 +0000AUTHOR: Torsten Volk - Former EMA Analyst In this ROI study, we will look at how a cybersecurity company with over $600M in annual revenue, more than 2,000 employees, eight global offices, and approximately 20 product teams optimized all four target variables of their software supply chain through the use of Docker Desktop.
Code Once, Deploy Anywhere: Accelerating App Developer Productivity Through Simplified Service MeshPUBLISHED: Tue, 06 Jun 2023 00:00:00 +0000AUTHOR: Torsten Volk - Former EMA Analyst What is preventing app developers from achieving optimal productivity? Optimal productivity is a state in which developers simply write business code during 100% of their work hours. Thinking this further, if your developers spend 100% of their time on writing business code for your customers while your competitors’ developers only spend 75% on productively coding, you could theoretically deliver 25% more features and capabilities to the marketplace.
From Complexity to Clarity: Resolving Challenges in Cybersecurity ObservabilityPUBLISHED: Wed, 31 May 2023 00:00:00 +0000AUTHOR: Chris Steffen Network complexity presents significant challenges for observability in cybersecurity. With the increasing number of devices, endpoints, and applications connected to networks, it becomes difficult to gain comprehensive visibility into network activities. Complex networks often lack standardized monitoring practices, making it challenging to observe and detect security threats consistently. Additionally, the dynamic nature of modern networks—with devices joining and leaving the network frequently—as well as remote devices and multiple distributed sites further complicate the observability process. Network administrators and security teams face the daunting task of managing and correlating vast amounts of data these networks generate to identify potential threats accurately.
Digital Transformation, Microservices, and Cybersecurity: 8 Critical ChallengesPUBLISHED: Wed, 31 May 2023 00:00:00 +0000AUTHOR: Torsten Volk - Former EMA Analyst Software developers need to deliver relevant product features in a rapid, cost-effective, easy-to-use, and high-quality manner. Microservices are the delivery vehicle of choice, enabling the continuous creation, release, and validation of new code in order to achieve this key business goal. Instead of betting on the success of large but infrequent product releases, developers deliver small sets of capabilities that address immediate and specific customer needs. This granular approach of creating customer value by solving concrete business problems on a daily basis shortens feedback loops, brings software developers closer to end users, and enables developers to more accurately identify new product capabilities that customers are willing to pay for.
From Scheduler to Automation Fabric for the Enterprise: Workload Automation Transformation in 2023PUBLISHED: Tue, 16 May 2023 00:00:00 +0000AUTHOR: Dan Twing Enterprise IT organizations are living with more change now than ever before. The pace of technological change and innovation is accelerating, and businesses are under constant pressure to adapt to new trends, technologies, and customer demands. Technological advancements, such as artificial intelligence (AI), machine learning (ML), blockchain, and cloud computing, are disrupting traditional industries and creating new business opportunities. Consumers are more tech-savvy and demanding personalized and seamless experiences across all channels. This is forcing companies to invest in IT infrastructure and develop new technologies to meet these expectations. Companies across all industries are undergoing digital transformation, using technology to optimize processes, improve customer experiences, and drive business growth.
AI-Driven Networks: Leveling Up Network ManagementPUBLISHED: Thu, 04 May 2023 00:00:00 +0000AUTHOR: Shamus McGillicuddy This new market research explores how IT organizations are improving network management with intelligent systems based on artificial intelligence (AI) and machine learning (ML). Sometimes known as AIOps solutions, these AI/ML technologies are helping organizations optimize their networks, streamline operations, and reduce security risk. Based on a survey of 250 IT professionals, this report identifies how organizations are evaluating, implementing, using, and succeeding with AI/ML-driven network management.
AI-Driven Networks: Leveling Up Network Management Report SummaryPUBLISHED: Thu, 04 May 2023 00:00:00 +0000AUTHOR: Shamus McGillicuddy This is the research summary from the report "AI-Driven Networks: Leveling Up Network Management." Automation Intelligence: The Path to Transformative AutomationPUBLISHED: Wed, 03 May 2023 00:00:00 +0000AUTHOR: Dan Twing Enterprises are striving to modernize applications and embed digital technologies across their businesses to improve business processes, services, and products. Digital transformation relies on IT and encompasses a range of technologies and strategies, including cloud computing, artificial intelligence, the Internet of Things (IoT), big data analytics, mobile computing, social media, and more. Digital transformation also involves cultural and organizational changes. Organizations must embrace new ways of working and adopt a digital-first mindset. Automation supports the digital transformation journey and automation intelligence operationalizes automation for insight and predictability.
Taking a Holistic Approach to Securing Cloud-Native Application DevelopmentPUBLISHED: Tue, 25 Apr 2023 00:00:00 +0000AUTHOR: Torsten Volk - Former EMA Analyst Cloud-native application security has become the primary challenge in app modernization, hindering developer productivity, efficient operations, and optimal risk management. This prevents organizations from delivering better products faster, cheaper, and more often than the competition. Developers spend much of their time implementing and following corporate security policies while introducing more tools, open source libraries, container images, and data sources into the application stack.
Less Complexity, More Return on Cybersecurity InvestmentsPUBLISHED: Wed, 19 Apr 2023 00:00:00 +0000AUTHOR: Ken Buckler Depending on the type of attack, target organization, and effectiveness of an organization’s security defenses, attackers are typically inside a network for one to two months before being detected. The signals of the attacker’s presence are present from the start, but without comprehensive monitoring, these signals and associated alerts become lost within the noise generated by everyday operations.
PUBLISHED: Tue, 18 Apr 2023 00:00:00 +0000AUTHOR: Chris Steffen Many organizations have leveraged cyber threat intelligence (CTI), a powerful tool, for over two decades. Until recent years, threat intelligence was extremely expensive and only the largest organizations with budgets that allowed for such investment adopted it. However, in recent years, CTI has become much more affordable and accessible, with tools dedicated to processing and distributing CTI. Combined with CTI sharing partnerships and information sharing and analysis centers (ISACs), CTI is now more accessible than ever, even for small businesses that were previously financially restricted from accessing this important cybersecurity tool.
PUBLISHED: Mon, 17 Apr 2023 00:00:00 +0000AUTHOR: Steve Brasen - Former EMA Analyst Modern business success and growth are dependent on the effectiveness of identity management technologies. The ability of workforces to rapidly access and utilize IT resources determines an organization’s agility in responding to customer requests, competitive engagements, and changing market conditions. However, this access must be granted responsibly to ensure the business meets requirements for security and regulatory compliance.
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE SuccessPUBLISHED: Thu, 13 Apr 2023 00:00:00 +0000AUTHOR: Shamus McGillicuddy Nearly one decade has passed since the phrase “software-defined wide-area networking” entered IT industry vernacular. Vendors and industry analysts coined the term to describe a class of technologies that enable an enterprise to build a wide-area network (WAN) where sites can connect via multiple redundant paths (including private and managed WAN services and public internet connections) securely and with centralized management and control.
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE SuccessPUBLISHED: Thu, 13 Apr 2023 00:00:00 +0000AUTHOR: Shamus McGillicuddy This is the research summary for EMA's report, "WAN Transformation with SD-WAN." 2023 EMA Vendors to Watch: Information Security, Risk, and Compliance ManagementPUBLISHED: Wed, 05 Apr 2023 00:00:00 +0000AUTHOR: Chris Steffen EMA Vendors to Watch are companies that deliver unique customer value by solving problems that previously went unaddressed, or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches. This document contains the 2023 EMA Vendors to Watch in the Information Security, Risk, and Compliance Management field, including NETSCOUT. Additional vendors will be added to this document throughout the year.
The Rise of AI-Powered SASE and Digital Experience MonitoringPUBLISHED: Tue, 04 Apr 2023 00:00:00 +0000AUTHOR: Shamus McGillicuddy This white paper explores how AIOps can optimize the digital experience management capabilities of a secure access service edge (SASE) solution by breaking down data silos and automating critical workflows for IT, network, and security teams. The paper also reviews Palo Alto Networks’ AIOps-powered solution, Autonomous Digital Experience Management (ADEM), and examines how it meets the requirements for a modern SASE solution.
Operational Efficiency at Scale with Intent-Based, No-Code Network AutomationPUBLISHED: Sat, 01 Apr 2023 00:00:00 +0000AUTHOR: Shamus McGillicuddy This paper explains why network teams can no longer rely on tactical, developer-dependent, script-heavy approaches to network operations. Instead, they should adopt simpler and more scalable no-code network automation that aligns with business outcomes. This paper also looks at the benefits such a solution can offer and reviews the capabilities of NetBrain, a pioneer in no-code, intent-driven network automation.
DDI Maturity Drives Multi-Cloud Success: Exploring small and medium enterprises in Europe, the Middle East, Asia-Pacific, and Latin AmericaPUBLISHED: Fri, 31 Mar 2023 00:00:00 +0000AUTHOR: Shamus McGillicuddy This research report explores the state of DDI (DNS, DHCP, and IP address management) maturity in small and medium enterprises (500 to 2,500 employees) across Europe, the Middle East, the Asia-Pacific region, and Latin America. It was prepared in collaboration with BlueCat Networks and is based on a survey of 451 IT professionals involved in DDI solutions in their organizations.
Automation, AI, and the Rise of ServiceOpsPUBLISHED: Tue, 28 Mar 2023 00:00:00 +0000AUTHOR: Valerie O'Connell ServiceOps is a smart way for IT service and IT operations teams to work together to deliver and maintain excellence in IT service. Enabled by technologies such as automation and AI, ServiceOps is a vendor-neutral approach to IT management that cuts waste and cost, increases IT personnel productivity and efficiency, and improves IT service quality, as well as the experience of its users.
AIOps now: doing more with less and doing it betterPUBLISHED: Fri, 24 Mar 2023 00:00:00 +0000AUTHOR: Valerie O'Connell IT organizations are not strangers to change. It raged fast and furious over the past few years. Acceleration of planned digital transformation initiatives executed alongside unplanned adaptations to global realities that almost no one saw coming. Thanks largely to swift—and even heroic—actions by IT, most organizations not only survived, but improved. That collective breath of relief was short-lived. Today, geopolitical forces of war and the economic ambiguity of uncertain times combine to drive many enterprises into tried-and-true belt-tightening measures.
Multi-Cloud Networking: Connecting and Securing the Future Aviatrix SummaryPUBLISHED: Wed, 22 Mar 2023 00:00:00 +0000AUTHOR: Shamus McGillicuddy This is the summary report for EMA's "Multi-Cloud Networking: Connecting and Securing the Future" research report, sponsored by Aviatrix. Observability 2.0: Smart Observability to Connect Business and DevOpsPUBLISHED: Wed, 15 Mar 2023 00:00:00 +0000AUTHOR: Torsten Volk - Former EMA Analyst New code releases, new database queries, infrastructure upgrades, and configuration changes need to be evaluated by their business impact. There is no value in the most elegant code functions or the most streamlined and automated CI/CD pipelines if the resulting new capabilities do not “move the needle” for the business.
API Security: Debunking the MythsPUBLISHED: Mon, 13 Mar 2023 00:00:00 +0000AUTHOR: Chris Steffen Enterprises are finally starting to pay attention to application security as theoretical threats to their application infrastructure become reality. For years, security vendors have discussed DevSecOps solutions and the benefits they bring to the mature enterprise, but forecasted attacks on APIs and infrastructure as code (IaC) have put application security in the spotlight.
|
Subscribe Now! |