CONTACT    SIGN IN    SIGN UP
    

Free RSS Feeds from Enterprise Management Associates (EMA)

Stay up to date on the latest IT and data management information from EMA, including Webinars, Radar Reports, white papers, impact briefs, advisory notes and more!

Select your preferred reader by selecting an icon on the right.



Current Feed Content:




Report Summary: Network Visibility Architecture for the Hybrid, Multi-Cloud Enterprise

PUBLISHED: Thu, 30 Jun 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This is the report summary for EMA's research, "Network Visibility Architecture for the Hybrid, Multi-Cloud Enterprise." 



Network Visibility Architecture for the Hybrid, Multi-Cloud Enterprise

PUBLISHED: Thu, 30 Jun 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This Enterprise Management Associates (EMA) research explores how IT and security organizations use network visibility architectures to deliver network packets to critical performance and security analysis tools. It especially examines how organizations need to evolve their network visibility architectures as they adopt hybrid, multi-cloud architectures.



PUBLISHED: Tue, 28 Jun 2022 00:00:00 +0000
AUTHOR: Chris Steffen

In 1971, the first self-replicating virus (called Creeper) was unleashed across the ARPANET as a proof of concept. The virus itself was not designed to do any harm, but instead simply highlighted potential vulnerabilities in mainframe computers across the network. More humorous than destructive, this malware was mostly an annoyance, displaying the message “I’M THE CREEPER, CATCH ME IF YOU CAN” on infected systems. However, it did showcase the serious destructive potential for self-replicating malware in the future.
 
Unfortunately, long gone are the days of “joke” malware, since modern malware is no laughing matter. Today, ransomware is one of the fastest-growing threats in the cybersecurity industry, designed to not only self-propagate, but encrypt all files or entire systems across a network.



Using Compliance Budget to Advance Security Priorities

PUBLISHED: Tue, 21 Jun 2022 00:00:00 +0000
AUTHOR: Chris Steffen

Organizations continue to prioritize security and security spending, but that spending is often at odds with a more pressing business priority: regulatory compliance. Regardless of the industry vertical, all businesses are required to deal with a certain amount of regulatory compliance or vendor due diligence. For technology leaders, the best solution is to partner with compliance/risk/governance teams to address compliance control gaps while advancing the company’s security priorities. One of the best approaches to this solution is to implement security resolutions that directly address remediation items from a control gap list, or by finding dual-purpose security solutions that solve a compliance-related challenge while augmenting security capabilities.



Beyond ITAM: Enterprise(wide) technology management

PUBLISHED: Wed, 15 Jun 2022 00:00:00 +0000
AUTHOR: Valerie O'Connell

From multi-cloud infrastructure and SaaS to work-from-anywhere devices and across data centers, IT technology is widely distributed at unprecedented levels of diversity, sheer numbers, and business criticality. Yet, ITAM tools often lag behind enterprise needs for enterprise-wide visibility, availability, and accuracy of information, locked in silos of specialized function.



2022 State of API Security

PUBLISHED: Mon, 06 Jun 2022 00:00:00 +0000
AUTHOR: Chris Steffen

For years, security vendors have discussed DevSecOps solutions and the benefits they bring to the mature enterprise, but forecasted attacks on APIs and infrastructure as code (IaC) have put application security in the spotlight. Organizations of every size will invest in application security tools and tools that address every market of every size will have a decisive advantage to exploit this emerging trend. Modern applications, composed of functions and services, require developers to rely on APIs to communicate between applications and their components to share data and drive functionality. These applications are mobile, distributed, and have instances in cloud and on-premises.



Hybrid Work Requires Network Transformation

PUBLISHED: Thu, 02 Jun 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Hybrid work, or working from anywhere, is the future, and the future has arrived. The pandemic mainstreamed it, but the benefits of hybrid work will ensure it sticks around. According to Enterprise Management Associates (EMA) research, 85% of companies have experienced a permanent increase in the number of employees who work from home at least part time. Note the word “permanent.” Companies have clearly recognized that hybrid work has business benefits that deliver value indefinitely.



$11B European Retailer Reduces OpEx by $478,000 Moving to SolarWinds Full-Stack Observability Solutions

PUBLISHED: Mon, 23 May 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

An $11B European retail enterprise with more than 1,600 stores and warehouses across the world upgraded its IT operations toolset with a full-stack Observability suite from SolarWinds®. Over three years, the company has earned nearly $478,000 in operational expense savings against a total SolarWinds investment of $397,000. The SolarWinds investment paid for itself in two and a half years.



Communications Service Provider Saves Millions by Expanding to SolarWinds Full-Stack Observability

PUBLISHED: Mon, 23 May 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

After replacing several open-source monitoring tools with the components that make up the foundation of the full-stack SolarWinds® Hybrid Cloud Observability solution, a national communications service provider has saved more than $2 million in recurring annual costs. The service provider also leveraged the SolarWinds solution to avoid paying more than $2.6 million in fees for service-level agreement (SLA) violations by minimizing the impact of an infrastructure problem capable of affecting its customers.



Enterprise Cloud Operations Team Saves Millions With SolarWinds Full-Stack Observability

PUBLISHED: Mon, 23 May 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This return on investment (ROI) case study examines how a global software provider’s cloud operations organization earned a $5.4 million ROI by adopting a full-stack observability solution from SolarWinds. The observability solution streamlined performance management, capacity planning, and operational reporting, conservatively earning more than a 5x ROI over three years and breaking even in less than two years.



Responsible CIAM: Architecting High Security and Flexibility in Consumer Engagements

PUBLISHED: Thu, 19 May 2022 00:00:00 +0000
AUTHOR: Steve Brasen

For any modern business, the most essential outcomes derive from online interactions with consumer audiences. Web traffic and other online digital engagements are now the primary method organizations rely on for direct retail sales, account management, and to deliver ad-based services. Additionally, online resources have introduced whole new revenue streams with their ability to collect consumer information for resale on open markets. Regardless of an organization’s unique business model, consumer digital engagements are instrumental to achieving profitability and meeting organizational goals.



The Mainframe as the Foundation of the Modern Enterprise

PUBLISHED: Thu, 19 May 2022 00:00:00 +0000
AUTHOR: Chris Steffen

Technology continues to be at the center of the modern enterprise. More often than not, the success of the enterprise is directly related to the maturity of the information technology processes and solutions they have adopted. Companies that embrace and utilize technical advances can move from a small corner store to the names and logos people immediately recognize as part of everyday life. Nothing can be more critical to the continuing success of the enterprise than the computing power that has become the nerve center of the modern enterprise.



The Evolving Dynamics of Insider Risk, Privacy, and Compliance

PUBLISHED: Wed, 11 May 2022 00:00:00 +0000
AUTHOR: EMA Staff

With a global shift toward work from home and work from anywhere, organizations are struggling to find the right balance of protecting against insider threats and protecting employee privacy. With many employee devices now outside the network, traditional insider threat technologies are losing visibility. New privacy regulations present additional challenges to organizations. However, new approaches to insider threat detection may provide a better way forward.



AIOps automation: real-world challenges and rewards

PUBLISHED: Tue, 10 May 2022 00:00:00 +0000
AUTHOR: Valerie O'Connell

Game-changing digital transformation initiatives and disciplines, such as DevOps and SRE, require new levels and types of interaction and automation for cross-domain workflows, efficiencies, and business outcomes. Enter the AIOps platform. Capable of powering staggering gains in efficiency and effectiveness, the one-two punch of AI/ML and automation blurs the lines between functional domains. EMA recently surveyed 406 IT professionals in North America, EMEA, and APAC to look at AI-enabled, cross-functional automation and processes as practiced today and as planned for the near future.



EMA Products to Watch in 2022/2023: Data-Driven Guidance for Product Evaluation

PUBLISHED: Tue, 03 May 2022 00:00:00 +0000
AUTHOR: Torsten Volk

EMA created the “EMA Products to Watch in 2022/2023 Guide” for anyone looking for data-driven and transparent market research and product recommendations. Our guide includes many charts and data points interesting for C-levels skimming through while providing the depth needed for more technical roles aiming to dive into detailed market metrics and product characteristics. Note that this guide is a living project, with ”EMA Products to Watch” published on an ongoing basis.



Network Management Megatrends 2022: Navigating Multi-Cloud, IoT, and NetDevOps During a Labor Shortage

PUBLISHED: Fri, 29 Apr 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

The 2022 edition of Enterprise Management Associates’ biennial “Network Management Megatrends” is the definitive benchmark of the state of enterprise network operations. Based on a survey of more than 400 IT organizations and one-on-one interviews with senior networking experts in Fortune 500 companies, this report should help network managers optimize operations while planning for future initiatives.



PUBLISHED: Sat, 16 Apr 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

It is often said that packets are the best source of truth about what is happening on a network. With encryption, this axiom remains valid, but the means of revealing that truth are shifting. As encryption rises in popularity, traditional packet analytics are no longer as feasible as they once were. 



Chart a Path to Digital Transformation with Application-Aware, AIOps-Driven Network Performance Management

PUBLISHED: Mon, 11 Apr 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Prepared for IBM, this white paper draws on years of industry research by Enterprise Management Associates to explain why network operations teams must modernize their network performance management tools to support digital transformation. It explores the new requirements that IT organizations have for their tools and provides a step-by-step guide for choosing a new solution. 



IT ServiceOps: innovation at business speed and scale

PUBLISHED: Thu, 07 Apr 2022 00:00:00 +0000
AUTHOR: Valerie O'Connell

ServiceOps is not a product you can buy. It’s not even a methodology you can promote. It is a concept that captures the practical result of technology applied to the delivery and governance of IT services at the speed, scale, and volume of business innovation. It is AI-assisted automation for collaboration of IT service and IT operations.



EMA Research Report: A Data-Driven Enterprise

PUBLISHED: Thu, 31 Mar 2022 00:00:00 +0000
AUTHOR: Will Schoeppner

Today’s business relies on data analytics more than ever to remain ahead of the competition. To have a cutting edge, data analytics for informed business decisions and workflow automation at all levels of the organization is critical to achieve overall success. Due to the challenges over the last two years, organizations must respond to greater demand for data access and a shift to supporting AI/ML in a complex, hybrid multi-cloud environment. Organizations need to become nimble in providing fast, reliable access to data anytime, anywhere, throughout their increasingly complex, integrated enterprise. Research proves that demands on customer experience, the ever-growing challenge of staying ahead of risk and market swings, and employee engagement are the driving factors for these shifts.



AIOps means business: IT innovation for business advantage

PUBLISHED: Tue, 29 Mar 2022 00:00:00 +0000
AUTHOR: Valerie O'Connell

AIOps’ roots run deep in the IT tradition of constantly doing more with less—and doing it better. For IT, that means automation. The catch with traditional IT automation is that there’s nothing automatic about it. It requires intelligence to construct and instruct the actions. When complexity and change reach a scale and velocity that far outstrip human capacity to comprehend, automation slams into a wall.



2022 EMA Vendors to Watch: Security and Risk Management

PUBLISHED: Mon, 28 Mar 2022 00:00:00 +0000
AUTHOR: EMA Staff

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that previously went unaddressed, or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2022 EMA Vendors to Watch in the security and risk management field, including ARMO, DuploCloud, and Telos.



PUBLISHED: Wed, 23 Mar 2022 00:00:00 +0000
AUTHOR: Will Schoeppner

Today’s business relies on access to critical data more than ever to remain ahead of the competition. Due to the challenges over the last two years, organizations must respond to greater demand for data access and a shift to supporting AI/ML in a complex, hybrid multi-cloud environment. Organizations need to become nimble in providing fast, reliable access to data anytime, anywhere, throughout their increasingly complex, integrated enterprise.



AI service automation: ITSM and ITOps convergence

PUBLISHED: Thu, 10 Mar 2022 00:00:00 +0000
AUTHOR: Valerie O'Connell

Digital transformation—the use of digital technologies to create or modify business processes, applications, and customer experiences to meet changing business and market requirements—has been well underway for years. It simply got turbocharged with the dramatic and sudden events that rocked the globe. Five-year plans were compressed into months where possible as organizations fast-tracked strategic initiatives heavy on automation combined with artificial intelligence (AI), machine learning (ML), and analytics.



The Threat From Within: Strategies to Defend Against a Growing Threat Vector

PUBLISHED: Thu, 24 Feb 2022 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - Paula Musich

Threat researchers continue to document a disturbing shift in the source of big, expensive data breaches from external attackers to insiders, and multiple studies have documented an increase in the percentage of data breaches attributed to insiders.



Event management done right cuts incidents as well as MTTR

PUBLISHED: Fri, 18 Feb 2022 00:00:00 +0000
AUTHOR: Valerie O'Connell

Events—in IT as well as in life—are too numerous to count. Most often, an event’s true impact only becomes apparent in retrospect. In IT, that usually means a major incident or outage. When IT services degrade to the point of impacting business, it is all-hands-on-deck to find and fix the problem as fast as possible. Speed counts when mean time to resolve (MTTR) is measured in both revenue and pain.



The Future of Data Center Network Automation

PUBLISHED: Mon, 14 Feb 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Despite years of predictions about applications and data migrating to the public cloud, data centers remain the indispensable core of any digital infrastructure. Enterprise Management Associates (EMA) defines a data center as a site where a technology organization owns and operates the compute, storage, and network infrastructure necessary for hosting digital applications and services. A technology organization might have direct control of the data center site (e.g., on-premises data center, server rooms, a telco central office), or it might pay for rack space in a hosted environment (e.g., a colocation data center).



The Future of Data Center Network Automation: Summary Report

PUBLISHED: Mon, 14 Feb 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This is the summary for the EMA research report "The Future of Data Center Network Automation." 



Taking a Situational Awareness Approach to Proactive, Risk-Aligned Security

PUBLISHED: Thu, 27 Jan 2022 00:00:00 +0000
AUTHOR: Chris Steffen

Every situation is different, and (in the case of information security) combating or defending the enterprise will likely depend on the parts most exposed to risk from an attack. You have to be aware of what parts of the enterprise are most at risk before you can ever know how to defend and protect it. Situational awareness is the cornerstone of a risk-based cybersecurity approach and critical for proactive security operations.



PUBLISHED: Thu, 27 Jan 2022 00:00:00 +0000
AUTHOR: Chris Steffen

Hardly a month goes by without a news cycle of the latest cyber-attacks: from a software supply chain attack, to ransomware, to some kind of personal data exposure. They are so numerous that most people only pay attention when it is a “major” breach or happens to a company they have a relationship with. But more often than not, people are never told what really happened for a number of reasons: the companies involved do not want the negative publicity (they want the whole thing to “just go away”), there is an active criminal investigation, or the problem wasn’t really resolved completely. It is the last reason that may be the biggest source of concern: why would you not try to eliminate a known—and previously exploited—vulnerability from your environment?



Taking a Strategic Approach to Network Operations

PUBLISHED: Thu, 27 Jan 2022 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Many of today’s IT organizations are still taking a labor-intensive, manually executed, tactical approach to network operations, even as their infrastructures have grown dramatically in scope, scale, and complexity over time. They may be hindered by a lack of end-to-end visibility across their platform domains or the perception that newer and more scalable approaches, such as automation, may not be applicable to NetOps due to the uniqueness of network problem-solving technologies. In some cases, they simply lack a broader vision about how to scale operations because they don’t have the experience needed to think differently about the challenge.



Unknown Vulnerabilities Become the Top Active Directory Security Posture Concerns

PUBLISHED: Thu, 20 Jan 2022 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - Paula Musich

As any security practitioner will tell you, trying to close exposures in Microsoft’s Active Directory (AD) is like trying to fill in the holes of a constantly morphing block of Swiss cheese. Because Active Directory’s configuration is in a continual state of flux, bad actors perpetually find new ways to exploit vulnerabilities to achieve their illicit aims. It’s no wonder that the top Active Directory security posture concern for most IT security practitioners is unknown AD vulnerabilities, followed closely by known but unaddressed AD vulnerabilities, according to new research conducted by Enterprise Management Associates on behalf of Semperis.



EMA Top 3 Enterprise Decision Guide 2022

PUBLISHED: Tue, 18 Jan 2022 00:00:00 +0000
AUTHOR: Torsten Volk

Enterprise Management Associates (EMA) presents its EMA Top 3 Awards to software products that help enterprises reach their digital transformation goals by optimizing product quality, time to market, cost, and ability to innovate.



Debunking Eight Myths About Securing Active Directory Against Malicious Attackers

PUBLISHED: Tue, 18 Jan 2022 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - Paula Musich

Securing Active Directory against exploitation by bad actors trying to leverage its privileges is a complex endeavor, made more difficult by the need to balance competing goals between endpoint administration and IT security teams. The complexity and depth of the directory system itself make it hard to find and fix the exposures and vulnerabilities that attackers seek to exploit. Clever attackers familiar with the directory system’s details can take any of the unique vulnerabilities or exposures and uncover an exponentially larger number of attack paths they can follow to get to their ultimate goal.



2022 EMA Vendors to Watch: Application and Performance Management

PUBLISHED: Fri, 07 Jan 2022 00:00:00 +0000
AUTHOR: Will Schoeppner

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that previously went unaddressed, or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.
 
This document contains the 2022 EMA Vendors to Watch in the application management field, including Aiven and Nastel.
 



AIOps: the difference between cloud survival and excellence

PUBLISHED: Fri, 31 Dec 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

New is always more interesting than what is already known. In that spirit, tech press coverage sometimes paints an apocalyptic picture of dust-covered data centers abandoned in wholesale migrations to the cloud. Although cloud adoption is certainly on the rise, it is erasing neither data centers nor IT complexity.



The Self-Driving Data Center in 2021

PUBLISHED: Fri, 31 Dec 2021 00:00:00 +0000
AUTHOR: Torsten Volk

The continuous automatic optimization of end-to-end application stacks can free up 50% of operator time by shattering the proportional relationship between adding more application capabilities and requiring additional human operators. If the required data streams are available, the self-driving data center (SDC) can free up the approximately 50% of data center and cloud infrastructure resources that are currently wasted through overprovisioning.



The Self-Driving Data Center in 2022: Start Small, but Start Now

PUBLISHED: Wed, 22 Dec 2021 00:00:00 +0000
AUTHOR: Torsten Volk

The continuous automatic optimization of end-to-end application stacks can free up 50% of operator time by shattering the proportional relationship between adding more application capabilities and requiring additional human operators. If the required data streams are available, the self-driving data center (SDC) can free up the approximately 50% of data center and cloud infrastructure resources that are currently wasted through overprovisioning.



The State of Microsoft 365 Performance Management

PUBLISHED: Mon, 13 Dec 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

Instinct and enterprise experience position Microsoft 365 as a suite of mission-critical capabilities that quietly power enterprise productivity on a daily basis. To be more specific, Martello commissioned EMA to conduct an entirely independent exploration of the state of Microsoft 365 as used in enterprises today. EMA fielded a research pool of 1,500 potential respondents in North America and Europe to vet 128 IT leaders to participate in this initiative.



ML-Driven Deep Packet Dynamics can Solve Encryption Visibility Challenges

PUBLISHED: Mon, 06 Dec 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Encryption may provide data security and privacy, but it also reduces visibility into network traffic. Both security teams and network teams are finding that their deep packet inspection technology cannot provide enough insight into encrypted traffic. This white paper explores an emerging class of technology called deep packet dynamics, which combines metadata generation and traffic behavior with machine learning and advanced analytics to restore this lost visibility and enable improved collaboration between security and network teams.



Balancing the Scale Between Profitable Relationships and Security

PUBLISHED: Tue, 30 Nov 2021 00:00:00 +0000
AUTHOR: Steve Brasen

EMA primary research identifies secure methods for reducing consumer
identity and access management (CIAM) administration friction



The State of Network Automation: Configuration Management Obstacles are Universal

PUBLISHED: Thu, 18 Nov 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This report details the findings of a market research study on network automation conducted by Enterprise Management Associates and Itential. It reveals that most IT organizations are struggling with network configuration management and are worried that their end-to-end networks will fail configuration compliance audits. Network automation can ease these concerns, as long as the network automation project starts with a strong focus on end-to-end configuration compliance. This report offers IT leaders a guide for how establish a strong foundation for network automation success.



Balancing the Scale Between Profitable Relationships and Security

PUBLISHED: Fri, 12 Nov 2021 00:00:00 +0000
AUTHOR: Steve Brasen

Most modern businesses are dependent on consumer digital engagements to drive profitability and achieve organizational goals. Online resources—including web-based retail stores, ad-based entertainment, and consumer accounts—are the cornerstone of commercial service delivery. Unfortunately, public-facing IT services are supremely vulnerable to attack, and particular efforts must be made to protect consumer data and interactions to meet requirements for security and compliance.



PUBLISHED: Tue, 19 Oct 2021 00:00:00 +0000
AUTHOR: Steve Brasen

In the world of IT management, it is easy to forget that the primary focus should be on supporting people, not machines. This should be obvious, but the core precepts of endpoint management principally address ensuring system performance, rather than focusing on meeting end-user preferences. Client lifecycle management best practices target the standardization of endpoint and application configuration to simplify administration efforts. However, there is no universal configuration option that is equally optimal for all users. For instance, an environment that is too complex for one user may be too simplistic for another.



NetSecOps: Aligning Networking and Security Teams to Ensure Digital Transformation

PUBLISHED: Mon, 18 Oct 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

For many years, EMA has observed signs that enterprises are trying to improve alignment between their network infrastructure and operations teams and their information security and cybersecurity teams. EMA market research has revealed increased collaboration between these groups. Also, vendors introduced solutions that facilitate this collaboration. For instance, network performance management vendors have started offering security solutions based on their existing intellectual property. In conversations with IT leaders, the importance of this collaboration comes up again and again. EMA refers to this expanding focus on network and security collaboration as NetSecOps.



EMA Radar Report for Workload Automation: Q4 2021

PUBLISHED: Thu, 14 Oct 2021 00:00:00 +0000
AUTHOR: Dan Twing

Workload automation in 2021 reflects an even greater push to expand the category beyond traditional scheduling, toward full automation orchestration. The consolidation that occurred over the past four years slowed a bit, but is warming up again because Turn River Capital has invested in both Advanced Systems Concepts, Inc. and Redwood Software, with possibly more to come. This class of software is becoming more important to the future of digital transformation and automation. These trends have been developing over the last five or six years, but are now becoming more broadly accepted as a key part of the future of IT management. While most of the products reviewed for this report have seen many feature enhancements over the past two years, the category as a whole saw fewer new features across the category than the period from 2017 to 2019. Rather, the bulk of the changes from 2019 to 2021 were more about strengthening the features required to address the four biggest trends affecting this segment than net new capabilities.



EMA 2021 Workload Automation Radar Report Summary

PUBLISHED: Thu, 14 Oct 2021 00:00:00 +0000
AUTHOR: Dan Twing

This is the summary for the 2021 Workload Automation Radar Report.



Identifying Effective Digital Employee Experience (DEX) Management Solutions: A Quantitative Analysis

PUBLISHED: Tue, 12 Oct 2021 00:00:00 +0000
AUTHOR: Steve Brasen

In recognition of the importance of improving workforce productivity, businesses have increasingly introduced solutions specifically designed to improve employee digital experiences. However, evolving requirements and challenges have obfuscated the types of technologies, solutions, and best practices that will most effectively drive increased end-user efficiencies and performance in the usage of digital resources. To help provide guidance on which approaches organizations should adopt, Enterprise Management Associates (EMA) conducted primary, survey-based research into the requirements, challenges, solutions, and outcomes employed in real business conditions today.



IT Asset Management: Current State and Near-Term Outlook

PUBLISHED: Mon, 04 Oct 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

IT complexity and change, sworn enemies of IT service quality and security, are on the rise. Crossing clouds and data centers, IT services, processes, and risks encompass users, devices, and non-IT technologies at the edge of enterprise business. Automation, analytics, and cross-domain workflows rightly receive attention as IT’s primary weapons against these escalating challenges. However, the fight is most often acted on the battleground of IT assets—physical, digital, on-premises, in clouds—throughout the enterprise.



IT Service Cost Tracking Impact: Research Findings

PUBLISHED: Mon, 04 Oct 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

EMA’s field experience frequently shows a management blind spot when it comes to IT service cost tracking. Although most organizations track service quality in terms of SLAs or periodic user satisfaction, they are more likely to know the cost of individual assets than the true cost of each individual service that IT delivers to the business.



The Rise of Active Directory Exploits: ls it Time to Sound the Alarm?

PUBLISHED: Thu, 30 Sep 2021 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - Paula Musich

For years, Active Directory has been a prime target for attackers looking to get a leg up into high-value enterprise resources, but it has not been front and center in most enterprise security teams’ list of priorities. While gaining access to Active Directory elements, such as access control lists and privileged accounts, is not the end attackers are seeking. It most often delivers the means to get to those valuable assets, whether those include customer information, intellectual property, or operating data that can be held for ransom.



Disrupting the Economics of Software Testing Through AI

PUBLISHED: Tue, 21 Sep 2021 00:00:00 +0000
AUTHOR: Torsten Volk

As the ability to accelerate the delivery of customer value through innovation, and at lower cost, has become today’s critical source for achieving competitive advantages, traditional software testing practices can no longer scale to meet business demands. Test automation frameworks typically rely on a jungle of test scripts written in different languages, using different sets of runtime parameters, and lacking consistent compliance testing capabilities. This forces the organization into the unfortunate choice of adding cost or risk to their agile development processes. They can either hire additional staff and increase test infrastructure to cope with the increasing test overhead, or they can accept the added risk that originates from incomplete testing practices.



The State of Modern Application Development: A Journey from Speed to Awareness

PUBLISHED: Fri, 17 Sep 2021 00:00:00 +0000
AUTHOR: Dennis Drogseth

Nothing could be more critical in the current world of IT than fast and reliable application development and delivery in support of business performance. This report, based on Q3 2021 research, shines a spotlight on accelerating trends such as platform teams, integrated security, site reliability engineers (SREs), and decentralization. The report also exposes areas of breakage and disruption as many IT organizations continue to struggle in their search for more cohesive approaches to application optimization.



EMA Top 3 Enterprise Decision Guide 2021

PUBLISHED: Wed, 15 Sep 2021 00:00:00 +0000
AUTHOR: Torsten Volk

Enterprise Management Associates (EMA) presents its EMA Top 3 Awarsd to software products that help enterprises reach their digital transformation goals by optimizing product quality, time to market, cost, and ability to innovate.



End-to-End Kubernetes Acceleration and Management Efficiency

PUBLISHED: Thu, 09 Sep 2021 00:00:00 +0000
AUTHOR: Torsten Volk

Adoption of microservices-based application architecture and the Kubernetes container scheduling and orchestration platform continues to increase at an annual pace of approximately 50%. Over the past six months, the number of software engineers using Kubernetes (Python) software libraries grew by 110%, while the number of DevOps teams making the Kubernetes plugin part of their release pipeline increased by 27% over the same timeframe. The fact that 98% of site reliability engineers require Kubernetes expertise in 2021 further underlines the status of Kubernetes as the standard platform for application transformation.



2021 EMA Vendors to Watch: Network Management

PUBLISHED: Thu, 02 Sep 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that previously went unaddressed, or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2021 EMA Vendors to Watch in the network management field, including AirEye.



EMA Radar Report: Network Performance Management

PUBLISHED: Tue, 24 Aug 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This Radar Report is aimed at assisting IT organizations that are procuring network performance management solutions for operational monitoring, troubleshooting, and capacity planning. This report should help buyers assemble a shortlist of vendors and guide their selection of a solution. Any of the 15 vendors represented in the report might be the best choice for an organization depending on the tools and solutions they currently have, their level of organizational maturity, their budget, their direction and vision, and their current mix of network technologies. 



SASE Transitions are Hard, but There are Ways to Make Them Less Painful

PUBLISHED: Mon, 23 Aug 2021 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - Paula Musich

In early 2020 many organizations were already well along in their digital transformation initiatives, but the rush to support users now working from home put those projects into overdrive. It also spurred greater interest in the emerging set of solutions described as Secure Access Service Edge, or SASE (pronounced sassy). When it comes to SASE adoption, the most difficult part of the journey in moving from separate, on-premises-based networking and security stacks to a largely cloud-based service is in the transition. The convergence of networking and security that forms the centerpiece of a SASE service has a number of implications that, when planned well, can make that transition significantly less painful.



How Ransomware Attacks Impact the Trustworthiness of IT Management Tools

PUBLISHED: Tue, 17 Aug 2021 00:00:00 +0000
AUTHOR: Chris Steffen

Ransomware attacks continue to escalate in 2021, and IT management tool vendors are scrambling to understand how to address these attacks while providing reasonable assurances that their solutions are secure.
 
Recently, the REvil ransomware affiliate began exploiting a zero-day vulnerability in Kaseya VSA at several managed service providers, ultimately encrypting thousands of downstream accounts. Kaseya provides IT management software tools to managed service providers (MSPs) or IT outsourcing shops to handle IT-related management solutions for organizations with little to no dedicated IT resources.



Data Security in a Multi-Cloud World

PUBLISHED: Wed, 11 Aug 2021 00:00:00 +0000
AUTHOR: Chris Steffen

Securing and protecting enterprise data is at the center of the modern security plan. In this research study conducted for IBM Security, Enterprise Management Associates polled over 200 technical leaders and practitioners from organizations of every size and vertical on their data security and privacy plans, as well as their perspectives on zero trust.
This eBook will highlight those findings, including the benefits of a zero trust approach and views on data privacy and security.



Post-Pandemic Networking: Enabling the Work-From-Anywhere Enterprise

PUBLISHED: Tue, 20 Jul 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

The COVID-19 pandemic forced hundreds of thousands of companies to send their employees home indefinitely. As the world starts inching toward a post-pandemic future, it’s clear that most companies will allow many employees to work from home forever. This research, based on a survey of 312 IT professionals, explores how enterprise IT organizations are adjusting their network infrastructure and operations to the massive and permanent increase in people who are working from home. It also explores the ripple effects this paradigm shift is having on on-premises network infrastructure.



Prepare for a Work-From-Anywhere Future with AIOps-Driven SASE

PUBLISHED: Thu, 15 Jul 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Secure access service edge (SASE) technology can deliver secure connectivity to enterprises that have embraced a work-from-anywhere future. However, user experience will remain a challenge because network operations teams are still using yesterday’s tools for tomorrow’s networks. A SASE solution that offers AIOps-driven management can solve this challenge. AIOps (artificial intelligence of IT operations) is a new class of solution that combines machine learning, AI, big data, and other advanced analytics technologies to enhance IT management. This white paper explores why enterprises should look for SASE solutions with AIOps smarts.



Consumer Identity and Access Management (CIAM): Responsible Solutions for Creating Positive Consumer Experiences

PUBLISHED: Wed, 07 Jul 2021 00:00:00 +0000
AUTHOR: Steve Brasen

Modern business success, by any measure, is reliant on the positive experiences of consumers during digital engagements. Consumer identity and access management (CIAM) processes and solutions govern the execution of processes for enabling consumer access to digital resources while ensuring security and compliance requirements are responsibly met. To help identify optimal solutions and best practices in support of CIAM objectives, EMA conducted survey-based research of organizations actively employing CIAM solutions. Among respondents, 65% reported their organization was impacted by a significant security breach in the last year, including malware infections, unauthorized uses of IT services, and the exposure of consumer data and credentials.



IT service cost tracking in ITSM: the missing link between IT service quality and business value

PUBLISHED: Tue, 06 Jul 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

In a great act of corporate irony, IT services that are SLA-ed with great precision are almost always mysteries when it comes to understanding their cost. Most IT organizations can report the quality of a service against a multitude of metrics, and they can detail IT budgets along departmental or asset lines. However, the cost of providing a service as it is actually consumed by the organization is largely an unknown. This operational blind spot is the missing link in any reasonable discussion of IT service business value. After all, how can the business value of a service be determined without knowing what it costs to deliver that service?



Unified Analytics in the Age of Cloud Supremacy: Creating Value From New Data, Old Data, and Fast Data

PUBLISHED: Mon, 21 Jun 2021 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - John Santaferraro

Recent EMA research shows that 53% of all data is now in the cloud. This massive movement of data to the cloud shifts the focus from migrations to cloud supremacy. It is no longer enough to be in the cloud; competition is pushing organizations to utilize cloud technology to create barriers to entry and unfair advantage.



Leveraging Workload Automation to Expand Enterprise Automation

PUBLISHED: Wed, 16 Jun 2021 00:00:00 +0000
AUTHOR: Dan Twing

Enterprises are relying on information technology (IT) more than ever before. It is commonly said that today, every company is an IT company. Customers, trading partners, and employees all expect to interact with the enterprise and each other digitally. Digital transformation brings IT closer to end customers and creates a greater need and more opportunities to automate. Automation done right frees employees from repetitive tasks, allowing more time for higher-value work. Automation brings consistency, which results in fewer errors and improved compliance with business processes. Automation also provides self-service opportunities and better information and interaction with the enterprise. All the new digital services and digital forms of interaction are contributing to the ongoing data revolution.



EMA Technical Case Study: Uber

PUBLISHED: Mon, 14 Jun 2021 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - John Santaferraro

Everyone knows Uber, but not everyone knows the clockwork that makes Uber tick. Everyone knows Uber as a shared service for point-to-point transportation, but not everyone knows Uber as a data and analytics company.
 
Every day, more than 18,000,000 riders key their location and destination into the Uber mobile app to request a ride or a meal. Unbeknownst to them, each transaction is plugged into complex algorithms built on insight gleaned from petabytes of data. The results come back in seconds with the most optimal recommendations for nearby drivers and pricing based on supply and demand economics.



The Business Value of AIOps-Driven Network Management

PUBLISHED: Tue, 08 Jun 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

The vast majority of network managers who have experience with AIOps solutions believe this emerging technology can improve network operations. They also believe that applying AIOps to network management will lead to better overall business outcomes for their companies. This white paper, based on new research by Enterprise Management Associates, reveals how AIOps can improve network management. More importantly, it offers proven advice on how to evaluate this technology and how you can build trust in the technology within your networking team.



The 2021 State of Software Quality: A View From the Enterprise

PUBLISHED: Fri, 04 Jun 2021 00:00:00 +0000
AUTHOR: Steve Hendrick

It’s easy to answer the question, “Is software quality important to the enterprise?” since nearly all enterprises are already in the midst of a digital transformation. Answering the question, “What is software quality?” is more complicated. This is because software quality is often a goal, and there are many ways to achieve this goal.



2021 EMA Vendors to Watch: Security and Risk Management

PUBLISHED: Wed, 02 Jun 2021 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - Paula Musich

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that previously went unaddressed, or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2020 EMA Vendors to Watch in the security and risk management field, including Lucidum, Huntress, and Horizon3.ai.

Additional vendors will be added to this document throughout the year.



AI(work)Ops 2021: The State of AIOps

PUBLISHED: Tue, 01 Jun 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

Today, vendor AIOps capabilities exceed common enterprise demands. Actual deployments and overall use currently lag well behind the potential of existing platforms. However, new use case adoption is accelerating rapidly for a panenterprise impact that already reaches far past ITOps.



Enterprise SRE: service reliability

PUBLISHED: Tue, 01 Jun 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

Powered by enterprise-spanning platform technology and practices, enterprise SRE exerts a multiplier effect on individual team productivity. Decentralized IT teams are transformed into efficient parts of a unified organizational whole, with no disruption to their autonomy, speed, and effectiveness.



Kanverse AI-powered accounts payable (AP) document automation: how one skeptical IT leader became a convinced customer + convincing advocate

PUBLISHED: Tue, 01 Jun 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

At first, Kanverse’s Intelligent Document Processing (IDP) concept sounds familiar. Of course companies want to digitize invoices (and other documents, such as POs and quotes) for fast, accurate processing automation. It’s the 21st century, so automation and digital transformation go hand in hand. However, Kanverse brings something new and powerful to the AP document processing challenge—and that something is AI. EMA recently had an in-depth conversation with the global head of IT for a large, privately owned manufacturing company that is headquartered in the US with subsidiaries around the world. In his words, what follows is the zigzag path to Kanverse’s IDP solution for accounts payable and its wildly successful implementation that left the C-suite “shell-shocked” and delighted.



The State of Data Center Networking: 2021 Annual Report

PUBLISHED: Tue, 01 Jun 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

In this first annual research report on The State of Data Center Networking, commissioned by Pluribus Networks, Enterprise Management Associates found that IT organizations are aggressively pursuing high-availability application architectures across geographically separated data centers.



PUBLISHED: Wed, 26 May 2021 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - John Santaferraro

Vertica vendor profile and report summary from the EMA Radar: Unified Analytics Warehouse – A Guide for Investing in Unified Analytics

Full Report Abstract
To assist analytics buyers looking to reduce cost and complexity, EMA evaluated 12 vendors providing UAW solutions. Any of the 12 vendors represented in the report might be the best choice for an organization depending on the tools and solutions they currently have, their level of analytical and organizational maturity, their direction and vision, and their current mix of technologies.



PUBLISHED: Wed, 26 May 2021 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - John Santaferraro

To assist analytics buyers looking to reduce cost and complexity, EMA evaluated 12 vendors providing UAW solutions. Any of the 12 vendors represented in the report might be the best choice for an organization depending on the tools and solutions they currently have, their level of analytical and organizational maturity, their direction and vision, and their current mix of technologies.



A House Divided: Dysfunctional Relationships Between Network and Cloud Teams Put Cloud Strategies at Risk

PUBLISHED: Wed, 19 May 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

As companies accelerate cloud adoption, only 28% consider themselves fully successful with realizing the benefits of their cloud investments. Why? As this research shows, networking is a sticking point. Specifically, success hinges on a company’s ability to integrate its cloud team and traditional network infrastructure team at all levels (design, implementation, and operation). The impacts of not doing so are striking.



Resolve Systems: Automation + AIOps = Platform Power

PUBLISHED: Wed, 19 May 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

AIOps is real. More than a marketing mantra, AIOps applies advances in AI and ML to the unending demands of complex IT operations. Comprehending massive amounts of data across the multi-layered hybrid infrastructure that underpins IT performance, AIOps holds the key to IT service reliability and excellence. Automation unlocks the door.



A Guide to NetOps and SecOps Collaboration

PUBLISHED: Tue, 11 May 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This white paper draws on EMA research to offer a step-by-step guide for building partnerships and collaboration between enterprise network and security teams. It explores why this collaboration is essential, and how enterprises can reap rewards from NetOps and SecOps partnerships. In particular, it reviews how tools, data, and processes are essential to success.



PUBLISHED: Tue, 27 Apr 2021 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - John Santaferraro

The COVID-19 pandemic, along with universal global shutdowns, changed the way people live and do business. Organizations with strong digital heritage or successful digital transformation fared well in the downturn. As a result, competitors have been forced to quickly move to modern architectures that enable intelligent digital decisions for all.



Navigating the Complexity of Hybrid Data Ecosystems: A Look at How to Modernize with Connected, Real-Time Intelligence

PUBLISHED: Tue, 27 Apr 2021 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - John Santaferraro

The 2020 global pandemic created a digital reset, causing leaders to make digital superiority a reality. At the core of every digital strategy is analytics fueled by the need for immediate, intelligent responses to business events. The greatest challenge to immediacy comes from the fact that the average organization stores data in more than five different platforms. The addition of new platforms adds cost, complexity, and debilitating excess time to the digital response equation.
 
This research from EMA unearths trends in modernization, business and technical drivers for modernization initiatives, best practices for the operation of hybrid data ecosystems, cultural and organizational shifts that drive innovation cycles, and top requirements for interoperability and innovation.



The Role of the Mainframe in a Hybrid-Cloud World

PUBLISHED: Thu, 22 Apr 2021 00:00:00 +0000
AUTHOR: Chris Steffen

Technology has been at the center of the enterprise for decades. Companies that embrace and utilize technical advances can move from the small corner store to the names and logos people immediately recognize as part of everyday life. Nothing can be more critical to success than the computing power and capabilities.

One may believe that the days of the mainframe are part of this bygone era of computing: supplanted by cloud, Internet of Things (IoT), and mobile devices. However, just as these technologies have been born, created, and evolved to become important to business operations, so has the mainframe evolved to become an indispensable part of enterprise technology strategy, from almost every important and relevant technology facet.



Revolutionizing Network Management with AIOps

PUBLISHED: Tue, 20 Apr 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This Enterprise Management Associates (EMA) research report explores how IT organizations are planning to use AIOps technology to enhance network infrastructure management. Based on a survey of IT professionals with extensive knowledge of using AIOps for network management, this report identifies top use cases, product requirements, barriers to success, and best practices.



DevOps: A View From the Enterprise

PUBLISHED: Tue, 13 Apr 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

DevOps is the real-life art and science of bringing together all the resources and requirements of development and IT operations to work for the business they serve. There is no one, universally accepted definition, partly because there are so many ways to look at the different aspects, attributes, and interested stakeholders involved in any DevOps
initiative.



A Unified Architecture for Achieving Zero Trust Across all Network Domains

PUBLISHED: Wed, 31 Mar 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Network access and control is extremely siloed today. IT organizations use multiple technologies to manage and enforce policies. As enterprises pivot toward a zero trust security model, they will need to unify policy and enforcement across multiple technology domains. This white paper offers high-level guidance on how to get started.



Martello powers Microsoft 365 service excellence for end users: The business case for IT end-to-end observability and control

PUBLISHED: Tue, 30 Mar 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

In a world of competing demands and limited resources, it’s not always easy to cut through the clutter of good investment options. This issue is particularly challenging when it comes to technologies that promise transformation of services and processes that are already underway, even if they are under-powered.



Five Things to Consider Before Embarking on a SASE Project

PUBLISHED: Tue, 30 Mar 2021 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - Paula Musich

The convergence of networking and security in the cloud, described as secure access service edge (SASE), is a nascent market that already has the attention of IT operations teams looking to adapt their networking and security architectures to better serve the needs of digitally transformed enterprises. Such digital transformation initiatives were put into hyperdrive in 2020 thanks to the global pandemic and sudden need to enable information workers to do their jobs from home, using their own Wi-Fi and broadband networks.



The Convergence of Network and Security Operations

PUBLISHED: Tue, 30 Mar 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

When network operations and security operations teams collaborate, good things happen to the business. EMA research found that many enterprises are pursuing this collaboration, even going as far as fully converging the two groups. Such collaboration can reduce risk, cut costs, boost productivity, and make the IT organization more responsive to the business. This white paper offers guidance on how to pursue this collaboration and identifies some pitfalls to avoid.



Democratizing IT Automation in a Multi-Cloud World: Tools, Teams, Culture, and Best Practices for Automation Success

PUBLISHED: Wed, 17 Feb 2021 00:00:00 +0000
AUTHOR: Dan Twing

Increasing automation for both IT and business processes continues to be a priority for organizations big and small. Organizations are encouraging automation, with 96% working toward more business process automation and 93% working toward more IT automation. However, less than 20% are assigning evangelists and creating Automation Centers of Excellence (ACoE). Automation is important to management and a goal for next year for 89% of respondents; however, only 31% are including increased automation as part of performance reviews. WLA is becoming a utility to facilitate automation orchestration for a variety of use cases and supporting a broad range of stakeholders across multi-cloud environments. EMA believes WLA is a key component in achieving broader automation success.



Availability and Buying Options in the Emerging SASE Market

PUBLISHED: Tue, 16 Feb 2021 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - Paula Musich

The opportunity described by Gartner analysts as secure access service edge, or SASE, is at this point not so much a market as an aspirational description of where the now-separate networking and security markets need to come together to better serve the needs of the digitally transformed enterprise. The enterprise architectures of the past, based on separate networking and security infrastructures, no longer fit the needs of most enterprises. They were designed to backhaul traffic from remote branch offices and mobile VPN clients to a central location where network traffic is monitored for performance issues, malicious activity, and malware before sending the traffic to its destination, which was often in the same data center. However, the once-centralized applications that end users seek to access no longer universally reside in those concentrated data centers as enterprises more fully embrace cloud services of all kinds. Thanks to the global COVID-19 pandemic and its resulting and rapid shift to work from home operations, digital transformation initiatives have advanced at a much more rapid pace than the industry anticipated.



EMA Case Study: Financial Services Company Manages Work-From-Home User Experience with NetBeez

PUBLISHED: Fri, 12 Feb 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Marlette Funding, owner and operator of the Best Egg online lending platform, used NetBeez to monitor and troubleshoot user experience when 100% of its 250 employees were forced to work from home during the COVID-19 pandemic.



Securing Cloud Assets: How IT Security Pros Grade Their Own Progress

PUBLISHED: Wed, 03 Feb 2021 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - Paula Musich

Trying to gauge where organizations are in their journey to secure cloud-based assets is akin to answering the basic questions necessary in a news story: the who, what, when, where, how, and why of cloud security.



Best Practices for the Enterprise: Information Security and Technology Trends Responding to the Pandemic

PUBLISHED: Fri, 22 Jan 2021 00:00:00 +0000
AUTHOR: Chris Steffen

The COVID-19 pandemic has transformed nearly every aspect of life: the ways people shop, eat, and conduct business. Those with technology-related jobs have shifted from a 9-5 office environment to working remotely. The changes may very well be permanent. With these changes come new challenges for business leaders trying to keep their businesses afloat.
 
With medical advances and loosening restrictions in the new year, business leaders and the vendors that support them are trying to understand how the changes will impact their enterprises. The answers will impact every facet of their business, from security and cloud computing to commercial real estate and regulatory compliance. The answers will be different for every business in every vertical.



Modern IT Operations Teams Require a Unified Network Monitoring Platform

PUBLISHED: Tue, 12 Jan 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This white paper, prepared for Progress, explores why IT organizations should adopt unified, multifunction network monitoring solutions to improve overall effectiveness of the network management team. It also offers a guide to defining requirements for such a monitoring solution.



AI & ML: Driving the Next Generation of Innovation in DevOps, Event & Incident Management, and Workload Automation

PUBLISHED: Wed, 06 Jan 2021 00:00:00 +0000
AUTHOR: Steve Hendrick

The reality of artificial intelligence and machine learning (AI/ML) is being made possible by the evolution of technologies associated with big data, analytics, advanced analytics, operations research, data science, cloud computing, microservices, and decision science. AI and ML are just the most recent chapters in the amalgamation of computer science, mathematics, data management, and decision science.



Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic Report Summary

PUBLISHED: Tue, 05 Jan 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This is the report summary for EMA's report, "Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic." 



Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic

PUBLISHED: Tue, 05 Jan 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Software-defined wide-area networking (SD-WAN) technology has revolutionized digital enterprises. Now, the industry stands poised to offer a secure Zero Trust networking future with secure access service edge (SASE), which unifies SD-WAN, secure remote access, and cloud-based security. At this inflection point, Enterprise Management Associates is publishing its third installment in its ongoing biennial research into WAN transformation. This research, based on a survey of 303 enterprise IT professionals, explores the state of WAN transformation amidst an unprecedented business environment introduced by the COVID-19 pandemic. It takes a comprehensive approach at reviewing how enterprises evaluate, implement, and operationalize SD-WAN. It looks at early engagement with SASE and it examines how the pandemic has affected WAN transformation.



A Guide to Extending Network Performance Management Into the Cloud

PUBLISHED: Mon, 04 Jan 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This white paper reveals how a network manager can modernize his or her network performance management tools to operationalize the cloud. Legacy network monitoring tools are generally unprepared to support the hybrid and multi-cloud architectures that enterprises are building today. Network managers will need performance management platforms that are adaptable, efficient, and scalable enough for the public cloud. This white paper offers a guide for cloud-enabling the network operations team.



AI-Driven SD-WAN Will Optimize User Experiences Across a Distributed Enterprise

PUBLISHED: Mon, 04 Jan 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Software-defined WAN is a powerful platform for network transformation, but it also introduces tremendous complexity. To ensure that SD-WAN can optimize user experiences, IT organizations must implement a solution that provides AI-driven operations with end-to-end visibility from the client to the cloud. This white paper explores the roots of SD-WAN complexity and how one should counter it with AI-driven operations.



AI & ML: Driving the Next Generation of Innovation in DevOps and Event & Incident Management

PUBLISHED: Wed, 30 Dec 2020 00:00:00 +0000
AUTHOR: Steve Hendrick

The reality of artificial intelligence and machine learning (AI/ML) is being made possible by the evolution of technologies associated with big data, analytics, advanced analytics, operations research, data science, cloud computing, microservices, and decision science. AI and ML are just the most recent chapters in the amalgamation of computer science, mathematics, data management, and decision science.


     

Subscribe Now!

Subscribe with Netvibes

follow us in feedly

EMA on Facebook   EMA on LinkedIn   EMA on Twitter   EMA RSS   EMA on YouTube

©1996-2022 Enterprise Management Associates, Inc. All rights reserved.
EMA™, ENTERPRISE MANAGEMENT ASSOCIATES®, and the mobius symbol are registered trademarks or common-law trademarks of Enterprise Management Associates, Inc.
Site Terms & Conditions | Integrity Policy | Site Map | My Account
Hide
Subscribe to EMA RSS Feed
Email
Show