CONTACT    SIGN IN    SIGN UP
    

Free RSS Feeds from Enterprise Management Associates (EMA)

Stay up to date on the latest IT and data management information from EMA, including Webinars, Radar Reports, white papers, impact briefs, advisory notes and more!

Select your preferred reader by selecting an icon on the right.



Current Feed Content:




Unknown Vulnerabilities Become the Top Active Directory Security Posture Concerns

PUBLISHED: Thu, 20 Jan 2022 00:00:00 +0000
AUTHOR: Paula Musich

As any security practitioner will tell you, trying to close exposures in Microsoft’s Active Directory (AD) is like trying to fill in the holes of a constantly morphing block of Swiss cheese. Because Active Directory’s configuration is in a continual state of flux, bad actors perpetually find new ways to exploit vulnerabilities to achieve their illicit aims. It’s no wonder that the top Active Directory security posture concern for most IT security practitioners is unknown AD vulnerabilities, followed closely by known but unaddressed AD vulnerabilities, according to new research conducted by Enterprise Management Associates on behalf of Semperis.



EMA Top 3 Enterprise Decision Guide 2022

PUBLISHED: Tue, 18 Jan 2022 00:00:00 +0000
AUTHOR: Torsten Volk

Enterprise Management Associates (EMA) presents its EMA Top 3 Awards to software products that help enterprises reach their digital transformation goals by optimizing product quality, time to market, cost, and ability to innovate.



Debunking Eight Myths About Securing Active Directory Against Malicious Attackers

PUBLISHED: Tue, 18 Jan 2022 00:00:00 +0000
AUTHOR: Paula Musich

Securing Active Directory against exploitation by bad actors trying to leverage its privileges is a complex endeavor, made more difficult by the need to balance competing goals between endpoint administration and IT security teams. The complexity and depth of the directory system itself make it hard to find and fix the exposures and vulnerabilities that attackers seek to exploit. Clever attackers familiar with the directory system’s details can take any of the unique vulnerabilities or exposures and uncover an exponentially larger number of attack paths they can follow to get to their ultimate goal.



2022 EMA Vendors to Watch: Application and Performance Management

PUBLISHED: Fri, 07 Jan 2022 00:00:00 +0000
AUTHOR: EMA Staff

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that previously went unaddressed, or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.



AIOps: the difference between cloud survival and excellence

PUBLISHED: Fri, 31 Dec 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

New is always more interesting than what is already known. In that spirit, tech press coverage sometimes paints an apocalyptic picture of dust-covered data centers abandoned in wholesale migrations to the cloud. Although cloud adoption is certainly on the rise, it is erasing neither data centers nor IT complexity.



The Self-Driving Data Center in 2021

PUBLISHED: Fri, 31 Dec 2021 00:00:00 +0000
AUTHOR: Torsten Volk

The continuous automatic optimization of end-to-end application stacks can free up 50% of operator time by shattering the proportional relationship between adding more application capabilities and requiring additional human operators. If the required data streams are available, the self-driving data center (SDC) can free up the approximately 50% of data center and cloud infrastructure resources that are currently wasted through overprovisioning.



The Self-Driving Data Center in 2022: Start Small, but Start Now

PUBLISHED: Wed, 22 Dec 2021 00:00:00 +0000
AUTHOR: Torsten Volk

The continuous automatic optimization of end-to-end application stacks can free up 50% of operator time by shattering the proportional relationship between adding more application capabilities and requiring additional human operators. If the required data streams are available, the self-driving data center (SDC) can free up the approximately 50% of data center and cloud infrastructure resources that are currently wasted through overprovisioning.



The State of Microsoft 365 Performance Management

PUBLISHED: Mon, 13 Dec 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

Instinct and enterprise experience position Microsoft 365 as a suite of mission-critical capabilities that quietly power enterprise productivity on a daily basis. To be more specific, Martello commissioned EMA to conduct an entirely independent exploration of the state of Microsoft 365 as used in enterprises today. EMA fielded a research pool of 1,500 potential respondents in North America and Europe to vet 128 IT leaders to participate in this initiative.



ML-Driven Deep Packet Dynamics can Solve Encryption Visibility Challenges

PUBLISHED: Mon, 06 Dec 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Encryption may provide data security and privacy, but it also reduces visibility into network traffic. Both security teams and network teams are finding that their deep packet inspection technology cannot provide enough insight into encrypted traffic. This white paper explores an emerging class of technology called deep packet dynamics, which combines metadata generation and traffic behavior with machine learning and advanced analytics to restore this lost visibility and enable improved collaboration between security and network teams.



Balancing the Scale Between Profitable Relationships and Security

PUBLISHED: Tue, 30 Nov 2021 00:00:00 +0000
AUTHOR: Steve Brasen

EMA primary research identifies secure methods for reducing consumer
identity and access management (CIAM) administration friction



The State of Network Automation: Configuration Management Obstacles are Universal

PUBLISHED: Thu, 18 Nov 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This report details the findings of a market research study on network automation conducted by Enterprise Management Associates and Itential. It reveals that most IT organizations are struggling with network configuration management and are worried that their end-to-end networks will fail configuration compliance audits. Network automation can ease these concerns, as long as the network automation project starts with a strong focus on end-to-end configuration compliance. This report offers IT leaders a guide for how establish a strong foundation for network automation success.



Balancing the Scale Between Profitable Relationships and Security

PUBLISHED: Fri, 12 Nov 2021 00:00:00 +0000
AUTHOR: Steve Brasen

Most modern businesses are dependent on consumer digital engagements to drive profitability and achieve organizational goals. Online resources—including web-based retail stores, ad-based entertainment, and consumer accounts—are the cornerstone of commercial service delivery. Unfortunately, public-facing IT services are supremely vulnerable to attack, and particular efforts must be made to protect consumer data and interactions to meet requirements for security and compliance.



PUBLISHED: Tue, 19 Oct 2021 00:00:00 +0000
AUTHOR: Steve Brasen

In the world of IT management, it is easy to forget that the primary focus should be on supporting people, not machines. This should be obvious, but the core precepts of endpoint management principally address ensuring system performance, rather than focusing on meeting end-user preferences. Client lifecycle management best practices target the standardization of endpoint and application configuration to simplify administration efforts. However, there is no universal configuration option that is equally optimal for all users. For instance, an environment that is too complex for one user may be too simplistic for another.



NetSecOps: Aligning Networking and Security Teams to Ensure Digital Transformation

PUBLISHED: Mon, 18 Oct 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

For many years, EMA has observed signs that enterprises are trying to improve alignment between their network infrastructure and operations teams and their information security and cybersecurity teams. EMA market research has revealed increased collaboration between these groups. Also, vendors introduced solutions that facilitate this collaboration. For instance, network performance management vendors have started offering security solutions based on their existing intellectual property. In conversations with IT leaders, the importance of this collaboration comes up again and again. EMA refers to this expanding focus on network and security collaboration as NetSecOps.



EMA Radar Report for Workload Automation: Q4 2021 October

PUBLISHED: Thu, 14 Oct 2021 00:00:00 +0000
AUTHOR: Dan Twing

Workload automation in 2021 reflects an even greater push to expand the category beyond traditional scheduling, toward full automation orchestration. The consolidation that occurred over the past four years slowed a bit, but is warming up again because Turn River Capital has invested in both Advanced Systems Concepts, Inc. and Redwood Software, with possibly more to come. This class of software is becoming more important to the future of digital transformation and automation. These trends have been developing over the last five or six years, but are now becoming more broadly accepted as a key part of the future of IT management. While most of the products reviewed for this report have seen many feature enhancements over the past two years, the category as a whole saw fewer new features across the category than the period from 2017 to 2019. Rather, the bulk of the changes from 2019 to 2021 were more about strengthening the features required to address the four biggest trends affecting this segment than net new capabilities.



EMA 2021 Workload Automation Radar Report Summary

PUBLISHED: Thu, 14 Oct 2021 00:00:00 +0000
AUTHOR: Dan Twing

This is the summary for the 2021 Workload Automation Radar Report.



Identifying Effective Digital Employee Experience (DEX) Management Solutions: A Quantitative Analysis

PUBLISHED: Tue, 12 Oct 2021 00:00:00 +0000
AUTHOR: Steve Brasen

In recognition of the importance of improving workforce productivity, businesses have increasingly introduced solutions specifically designed to improve employee digital experiences. However, evolving requirements and challenges have obfuscated the types of technologies, solutions, and best practices that will most effectively drive increased end-user efficiencies and performance in the usage of digital resources. To help provide guidance on which approaches organizations should adopt, Enterprise Management Associates (EMA) conducted primary, survey-based research into the requirements, challenges, solutions, and outcomes employed in real business conditions today.



IT Asset Management: Current State and Near-Term Outlook

PUBLISHED: Mon, 04 Oct 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

IT complexity and change, sworn enemies of IT service quality and security, are on the rise. Crossing clouds and data centers, IT services, processes, and risks encompass users, devices, and non-IT technologies at the edge of enterprise business. Automation, analytics, and cross-domain workflows rightly receive attention as IT’s primary weapons against these escalating challenges. However, the fight is most often acted on the battleground of IT assets—physical, digital, on-premises, in clouds—throughout the enterprise.



IT Service Cost Tracking Impact: Research Findings

PUBLISHED: Mon, 04 Oct 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

EMA’s field experience frequently shows a management blind spot when it comes to IT service cost tracking. Although most organizations track service quality in terms of SLAs or periodic user satisfaction, they are more likely to know the cost of individual assets than the true cost of each individual service that IT delivers to the business.



The Rise of Active Directory Exploits: ls it Time to Sound the Alarm?

PUBLISHED: Thu, 30 Sep 2021 00:00:00 +0000
AUTHOR: Paula Musich

For years, Active Directory has been a prime target for attackers looking to get a leg up into high-value enterprise resources, but it has not been front and center in most enterprise security teams’ list of priorities. While gaining access to Active Directory elements, such as access control lists and privileged accounts, is not the end attackers are seeking. It most often delivers the means to get to those valuable assets, whether those include customer information, intellectual property, or operating data that can be held for ransom.



Disrupting the Economics of Software Testing Through AI

PUBLISHED: Tue, 21 Sep 2021 00:00:00 +0000
AUTHOR: Torsten Volk

As the ability to accelerate the delivery of customer value through innovation, and at lower cost, has become today’s critical source for achieving competitive advantages, traditional software testing practices can no longer scale to meet business demands. Test automation frameworks typically rely on a jungle of test scripts written in different languages, using different sets of runtime parameters, and lacking consistent compliance testing capabilities. This forces the organization into the unfortunate choice of adding cost or risk to their agile development processes. They can either hire additional staff and increase test infrastructure to cope with the increasing test overhead, or they can accept the added risk that originates from incomplete testing practices.



The State of Modern Application Development: A Journey from Speed to Awareness

PUBLISHED: Fri, 17 Sep 2021 00:00:00 +0000
AUTHOR: Dennis Drogseth

Nothing could be more critical in the current world of IT than fast and reliable application development and delivery in support of business performance. This report, based on Q3 2021 research, shines a spotlight on accelerating trends such as platform teams, integrated security, site reliability engineers (SREs), and decentralization. The report also exposes areas of breakage and disruption as many IT organizations continue to struggle in their search for more cohesive approaches to application optimization.



EMA Top 3 Enterprise Decision Guide 2021

PUBLISHED: Wed, 15 Sep 2021 00:00:00 +0000
AUTHOR: Torsten Volk

Enterprise Management Associates (EMA) presents its EMA Top 3 Awarsd to software products that help enterprises reach their digital transformation goals by optimizing product quality, time to market, cost, and ability to innovate.



End-to-End Kubernetes Acceleration and Management Efficiency

PUBLISHED: Thu, 09 Sep 2021 00:00:00 +0000
AUTHOR: Torsten Volk

Adoption of microservices-based application architecture and the Kubernetes container scheduling and orchestration platform continues to increase at an annual pace of approximately 50%. Over the past six months, the number of software engineers using Kubernetes (Python) software libraries grew by 110%, while the number of DevOps teams making the Kubernetes plugin part of their release pipeline increased by 27% over the same timeframe. The fact that 98% of site reliability engineers require Kubernetes expertise in 2021 further underlines the status of Kubernetes as the standard platform for application transformation.



2021 EMA Vendors to Watch: Network Management

PUBLISHED: Thu, 02 Sep 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that previously went unaddressed, or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2021 EMA Vendors to Watch in the network management field, including AirEye.



EMA Radar Report: Network Performance Management

PUBLISHED: Tue, 24 Aug 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This Radar Report is aimed at assisting IT organizations that are procuring network performance management solutions for operational monitoring, troubleshooting, and capacity planning. This report should help buyers assemble a shortlist of vendors and guide their selection of a solution. Any of the 15 vendors represented in the report might be the best choice for an organization depending on the tools and solutions they currently have, their level of organizational maturity, their budget, their direction and vision, and their current mix of network technologies. 



SASE Transitions are Hard, but There are Ways to Make Them Less Painful

PUBLISHED: Mon, 23 Aug 2021 00:00:00 +0000
AUTHOR: Paula Musich

In early 2020 many organizations were already well along in their digital transformation initiatives, but the rush to support users now working from home put those projects into overdrive. It also spurred greater interest in the emerging set of solutions described as Secure Access Service Edge, or SASE (pronounced sassy). When it comes to SASE adoption, the most difficult part of the journey in moving from separate, on-premises-based networking and security stacks to a largely cloud-based service is in the transition. The convergence of networking and security that forms the centerpiece of a SASE service has a number of implications that, when planned well, can make that transition significantly less painful.



How Ransomware Attacks Impact the Trustworthiness of IT Management Tools

PUBLISHED: Tue, 17 Aug 2021 00:00:00 +0000
AUTHOR: Chris Steffen

Ransomware attacks continue to escalate in 2021, and IT management tool vendors are scrambling to understand how to address these attacks while providing reasonable assurances that their solutions are secure.
 
Recently, the REvil ransomware affiliate began exploiting a zero-day vulnerability in Kaseya VSA at several managed service providers, ultimately encrypting thousands of downstream accounts. Kaseya provides IT management software tools to managed service providers (MSPs) or IT outsourcing shops to handle IT-related management solutions for organizations with little to no dedicated IT resources.



Data Security in a Multi-Cloud World

PUBLISHED: Wed, 11 Aug 2021 00:00:00 +0000
AUTHOR: Chris Steffen

Securing and protecting enterprise data is at the center of the modern security plan. In this research study conducted for IBM Security, Enterprise Management Associates polled over 200 technical leaders and practitioners from organizations of every size and vertical on their data security and privacy plans, as well as their perspectives on zero trust.
This eBook will highlight those findings, including the benefits of a zero trust approach and views on data privacy and security.



Post-Pandemic Networking: Enabling the Work-From-Anywhere Enterprise

PUBLISHED: Tue, 20 Jul 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

The COVID-19 pandemic forced hundreds of thousands of companies to send their employees home indefinitely. As the world starts inching toward a post-pandemic future, it’s clear that most companies will allow many employees to work from home forever. This research, based on a survey of 312 IT professionals, explores how enterprise IT organizations are adjusting their network infrastructure and operations to the massive and permanent increase in people who are working from home. It also explores the ripple effects this paradigm shift is having on on-premises network infrastructure.



Prepare for a Work-From-Anywhere Future with AIOps-Driven SASE

PUBLISHED: Thu, 15 Jul 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Secure access service edge (SASE) technology can deliver secure connectivity to enterprises that have embraced a work-from-anywhere future. However, user experience will remain a challenge because network operations teams are still using yesterday’s tools for tomorrow’s networks. A SASE solution that offers AIOps-driven management can solve this challenge. AIOps (artificial intelligence of IT operations) is a new class of solution that combines machine learning, AI, big data, and other advanced analytics technologies to enhance IT management. This white paper explores why enterprises should look for SASE solutions with AIOps smarts.



Consumer Identity and Access Management (CIAM): Responsible Solutions for Creating Positive Consumer Experiences

PUBLISHED: Wed, 07 Jul 2021 00:00:00 +0000
AUTHOR: Steve Brasen

Modern business success, by any measure, is reliant on the positive experiences of consumers during digital engagements. Consumer identity and access management (CIAM) processes and solutions govern the execution of processes for enabling consumer access to digital resources while ensuring security and compliance requirements are responsibly met. To help identify optimal solutions and best practices in support of CIAM objectives, EMA conducted survey-based research of organizations actively employing CIAM solutions. Among respondents, 65% reported their organization was impacted by a significant security breach in the last year, including malware infections, unauthorized uses of IT services, and the exposure of consumer data and credentials.



IT service cost tracking in ITSM: the missing link between IT service quality and business value

PUBLISHED: Tue, 06 Jul 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

In a great act of corporate irony, IT services that are SLA-ed with great precision are almost always mysteries when it comes to understanding their cost. Most IT organizations can report the quality of a service against a multitude of metrics, and they can detail IT budgets along departmental or asset lines. However, the cost of providing a service as it is actually consumed by the organization is largely an unknown. This operational blind spot is the missing link in any reasonable discussion of IT service business value. After all, how can the business value of a service be determined without knowing what it costs to deliver that service?



Unified Analytics in the Age of Cloud Supremacy: Creating Value From New Data, Old Data, and Fast Data

PUBLISHED: Mon, 21 Jun 2021 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - John Santaferraro

Recent EMA research shows that 53% of all data is now in the cloud. This massive movement of data to the cloud shifts the focus from migrations to cloud supremacy. It is no longer enough to be in the cloud; competition is pushing organizations to utilize cloud technology to create barriers to entry and unfair advantage.



Leveraging Workload Automation to Expand Enterprise Automation

PUBLISHED: Wed, 16 Jun 2021 00:00:00 +0000
AUTHOR: Dan Twing

Enterprises are relying on information technology (IT) more than ever before. It is commonly said that today, every company is an IT company. Customers, trading partners, and employees all expect to interact with the enterprise and each other digitally. Digital transformation brings IT closer to end customers and creates a greater need and more opportunities to automate. Automation done right frees employees from repetitive tasks, allowing more time for higher-value work. Automation brings consistency, which results in fewer errors and improved compliance with business processes. Automation also provides self-service opportunities and better information and interaction with the enterprise. All the new digital services and digital forms of interaction are contributing to the ongoing data revolution.



EMA Technical Case Study: Uber

PUBLISHED: Mon, 14 Jun 2021 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - John Santaferraro

Everyone knows Uber, but not everyone knows the clockwork that makes Uber tick. Everyone knows Uber as a shared service for point-to-point transportation, but not everyone knows Uber as a data and analytics company.
 
Every day, more than 18,000,000 riders key their location and destination into the Uber mobile app to request a ride or a meal. Unbeknownst to them, each transaction is plugged into complex algorithms built on insight gleaned from petabytes of data. The results come back in seconds with the most optimal recommendations for nearby drivers and pricing based on supply and demand economics.



The Business Value of AIOps-Driven Network Management

PUBLISHED: Tue, 08 Jun 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

The vast majority of network managers who have experience with AIOps solutions believe this emerging technology can improve network operations. They also believe that applying AIOps to network management will lead to better overall business outcomes for their companies. This white paper, based on new research by Enterprise Management Associates, reveals how AIOps can improve network management. More importantly, it offers proven advice on how to evaluate this technology and how you can build trust in the technology within your networking team.



The 2021 State of Software Quality: A View From the Enterprise

PUBLISHED: Fri, 04 Jun 2021 00:00:00 +0000
AUTHOR: Steve Hendrick

It’s easy to answer the question, “Is software quality important to the enterprise?” since nearly all enterprises are already in the midst of a digital transformation. Answering the question, “What is software quality?” is more complicated. This is because software quality is often a goal, and there are many ways to achieve this goal.



2021 EMA Vendors to Watch: Security and Risk Management

PUBLISHED: Wed, 02 Jun 2021 00:00:00 +0000
AUTHOR: Paula Musich

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that previously went unaddressed, or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2020 EMA Vendors to Watch in the security and risk management field, including Lucidum, Huntress, and Horizon3.ai.

Additional vendors will be added to this document throughout the year.



AI(work)Ops 2021: The State of AIOps

PUBLISHED: Tue, 01 Jun 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

Today, vendor AIOps capabilities exceed common enterprise demands. Actual deployments and overall use currently lag well behind the potential of existing platforms. However, new use case adoption is accelerating rapidly for a panenterprise impact that already reaches far past ITOps.



Enterprise SRE: service reliability

PUBLISHED: Tue, 01 Jun 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

Powered by enterprise-spanning platform technology and practices, enterprise SRE exerts a multiplier effect on individual team productivity. Decentralized IT teams are transformed into efficient parts of a unified organizational whole, with no disruption to their autonomy, speed, and effectiveness.



Kanverse AI-powered accounts payable (AP) document automation: how one skeptical IT leader became a convinced customer + convincing advocate

PUBLISHED: Tue, 01 Jun 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

At first, Kanverse’s Intelligent Document Processing (IDP) concept sounds familiar. Of course companies want to digitize invoices (and other documents, such as POs and quotes) for fast, accurate processing automation. It’s the 21st century, so automation and digital transformation go hand in hand. However, Kanverse brings something new and powerful to the AP document processing challenge—and that something is AI. EMA recently had an in-depth conversation with the global head of IT for a large, privately owned manufacturing company that is headquartered in the US with subsidiaries around the world. In his words, what follows is the zigzag path to Kanverse’s IDP solution for accounts payable and its wildly successful implementation that left the C-suite “shell-shocked” and delighted.



The State of Data Center Networking: 2021 Annual Report

PUBLISHED: Tue, 01 Jun 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

In this first annual research report on The State of Data Center Networking, commissioned by Pluribus Networks, Enterprise Management Associates found that IT organizations are aggressively pursuing high-availability application architectures across geographically separated data centers.



PUBLISHED: Wed, 26 May 2021 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - John Santaferraro

Vertica vendor profile and report summary from the EMA Radar: Unified Analytics Warehouse – A Guide for Investing in Unified Analytics

Full Report Abstract
To assist analytics buyers looking to reduce cost and complexity, EMA evaluated 12 vendors providing UAW solutions. Any of the 12 vendors represented in the report might be the best choice for an organization depending on the tools and solutions they currently have, their level of analytical and organizational maturity, their direction and vision, and their current mix of technologies.



PUBLISHED: Wed, 26 May 2021 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - John Santaferraro

To assist analytics buyers looking to reduce cost and complexity, EMA evaluated 12 vendors providing UAW solutions. Any of the 12 vendors represented in the report might be the best choice for an organization depending on the tools and solutions they currently have, their level of analytical and organizational maturity, their direction and vision, and their current mix of technologies.



A House Divided: Dysfunctional Relationships Between Network and Cloud Teams Put Cloud Strategies at Risk

PUBLISHED: Wed, 19 May 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

As companies accelerate cloud adoption, only 28% consider themselves fully successful with realizing the benefits of their cloud investments. Why? As this research shows, networking is a sticking point. Specifically, success hinges on a company’s ability to integrate its cloud team and traditional network infrastructure team at all levels (design, implementation, and operation). The impacts of not doing so are striking.



Resolve Systems: Automation + AIOps = Platform Power

PUBLISHED: Wed, 19 May 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

AIOps is real. More than a marketing mantra, AIOps applies advances in AI and ML to the unending demands of complex IT operations. Comprehending massive amounts of data across the multi-layered hybrid infrastructure that underpins IT performance, AIOps holds the key to IT service reliability and excellence. Automation unlocks the door.



A Guide to NetOps and SecOps Collaboration

PUBLISHED: Tue, 11 May 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This white paper draws on EMA research to offer a step-by-step guide for building partnerships and collaboration between enterprise network and security teams. It explores why this collaboration is essential, and how enterprises can reap rewards from NetOps and SecOps partnerships. In particular, it reviews how tools, data, and processes are essential to success.



PUBLISHED: Tue, 27 Apr 2021 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - John Santaferraro

The COVID-19 pandemic, along with universal global shutdowns, changed the way people live and do business. Organizations with strong digital heritage or successful digital transformation fared well in the downturn. As a result, competitors have been forced to quickly move to modern architectures that enable intelligent digital decisions for all.



Navigating the Complexity of Hybrid Data Ecosystems: A Look at How to Modernize with Connected, Real-Time Intelligence

PUBLISHED: Tue, 27 Apr 2021 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - John Santaferraro

The 2020 global pandemic created a digital reset, causing leaders to make digital superiority a reality. At the core of every digital strategy is analytics fueled by the need for immediate, intelligent responses to business events. The greatest challenge to immediacy comes from the fact that the average organization stores data in more than five different platforms. The addition of new platforms adds cost, complexity, and debilitating excess time to the digital response equation.
 
This research from EMA unearths trends in modernization, business and technical drivers for modernization initiatives, best practices for the operation of hybrid data ecosystems, cultural and organizational shifts that drive innovation cycles, and top requirements for interoperability and innovation.



The Role of the Mainframe in a Hybrid-Cloud World

PUBLISHED: Thu, 22 Apr 2021 00:00:00 +0000
AUTHOR: Chris Steffen

Technology has been at the center of the enterprise for decades. Companies that embrace and utilize technical advances can move from the small corner store to the names and logos people immediately recognize as part of everyday life. Nothing can be more critical to success than the computing power and capabilities.

One may believe that the days of the mainframe are part of this bygone era of computing: supplanted by cloud, Internet of Things (IoT), and mobile devices. However, just as these technologies have been born, created, and evolved to become important to business operations, so has the mainframe evolved to become an indispensable part of enterprise technology strategy, from almost every important and relevant technology facet.



Revolutionizing Network Management with AIOps

PUBLISHED: Tue, 20 Apr 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This Enterprise Management Associates (EMA) research report explores how IT organizations are planning to use AIOps technology to enhance network infrastructure management. Based on a survey of IT professionals with extensive knowledge of using AIOps for network management, this report identifies top use cases, product requirements, barriers to success, and best practices.



DevOps: A View From the Enterprise

PUBLISHED: Tue, 13 Apr 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

DevOps is the real-life art and science of bringing together all the resources and requirements of development and IT operations to work for the business they serve. There is no one, universally accepted definition, partly because there are so many ways to look at the different aspects, attributes, and interested stakeholders involved in any DevOps
initiative.



A Unified Architecture for Achieving Zero Trust Across all Network Domains

PUBLISHED: Wed, 31 Mar 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Network access and control is extremely siloed today. IT organizations use multiple technologies to manage and enforce policies. As enterprises pivot toward a zero trust security model, they will need to unify policy and enforcement across multiple technology domains. This white paper offers high-level guidance on how to get started.



Martello powers Microsoft 365 service excellence for end users: The business case for IT end-to-end observability and control

PUBLISHED: Tue, 30 Mar 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

In a world of competing demands and limited resources, it’s not always easy to cut through the clutter of good investment options. This issue is particularly challenging when it comes to technologies that promise transformation of services and processes that are already underway, even if they are under-powered.



Five Things to Consider Before Embarking on a SASE Project

PUBLISHED: Tue, 30 Mar 2021 00:00:00 +0000
AUTHOR: Paula Musich

The convergence of networking and security in the cloud, described as secure access service edge (SASE), is a nascent market that already has the attention of IT operations teams looking to adapt their networking and security architectures to better serve the needs of digitally transformed enterprises. Such digital transformation initiatives were put into hyperdrive in 2020 thanks to the global pandemic and sudden need to enable information workers to do their jobs from home, using their own Wi-Fi and broadband networks.



The Convergence of Network and Security Operations

PUBLISHED: Tue, 30 Mar 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

When network operations and security operations teams collaborate, good things happen to the business. EMA research found that many enterprises are pursuing this collaboration, even going as far as fully converging the two groups. Such collaboration can reduce risk, cut costs, boost productivity, and make the IT organization more responsive to the business. This white paper offers guidance on how to pursue this collaboration and identifies some pitfalls to avoid.



Democratizing IT Automation in a Multi-Cloud World: Tools, Teams, Culture, and Best Practices for Automation Success

PUBLISHED: Wed, 17 Feb 2021 00:00:00 +0000
AUTHOR: Dan Twing

Increasing automation for both IT and business processes continues to be a priority for organizations big and small. Organizations are encouraging automation, with 96% working toward more business process automation and 93% working toward more IT automation. However, less than 20% are assigning evangelists and creating Automation Centers of Excellence (ACoE). Automation is important to management and a goal for next year for 89% of respondents; however, only 31% are including increased automation as part of performance reviews. WLA is becoming a utility to facilitate automation orchestration for a variety of use cases and supporting a broad range of stakeholders across multi-cloud environments. EMA believes WLA is a key component in achieving broader automation success.



Availability and Buying Options in the Emerging SASE Market

PUBLISHED: Tue, 16 Feb 2021 00:00:00 +0000
AUTHOR: Paula Musich

The opportunity described by Gartner analysts as secure access service edge, or SASE, is at this point not so much a market as an aspirational description of where the now-separate networking and security markets need to come together to better serve the needs of the digitally transformed enterprise. The enterprise architectures of the past, based on separate networking and security infrastructures, no longer fit the needs of most enterprises. They were designed to backhaul traffic from remote branch offices and mobile VPN clients to a central location where network traffic is monitored for performance issues, malicious activity, and malware before sending the traffic to its destination, which was often in the same data center. However, the once-centralized applications that end users seek to access no longer universally reside in those concentrated data centers as enterprises more fully embrace cloud services of all kinds. Thanks to the global COVID-19 pandemic and its resulting and rapid shift to work from home operations, digital transformation initiatives have advanced at a much more rapid pace than the industry anticipated.



EMA Case Study: Financial Services Company Manages Work-From-Home User Experience with NetBeez

PUBLISHED: Fri, 12 Feb 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Marlette Funding, owner and operator of the Best Egg online lending platform, used NetBeez to monitor and troubleshoot user experience when 100% of its 250 employees were forced to work from home during the COVID-19 pandemic.



Securing Cloud Assets: How IT Security Pros Grade Their Own Progress

PUBLISHED: Wed, 03 Feb 2021 00:00:00 +0000
AUTHOR: Paula Musich

Trying to gauge where organizations are in their journey to secure cloud-based assets is akin to answering the basic questions necessary in a news story: the who, what, when, where, how, and why of cloud security.



Best Practices for the Enterprise: Information Security and Technology Trends Responding to the Pandemic

PUBLISHED: Fri, 22 Jan 2021 00:00:00 +0000
AUTHOR: Chris Steffen

The COVID-19 pandemic has transformed nearly every aspect of life: the ways people shop, eat, and conduct business. Those with technology-related jobs have shifted from a 9-5 office environment to working remotely. The changes may very well be permanent. With these changes come new challenges for business leaders trying to keep their businesses afloat.
 
With medical advances and loosening restrictions in the new year, business leaders and the vendors that support them are trying to understand how the changes will impact their enterprises. The answers will impact every facet of their business, from security and cloud computing to commercial real estate and regulatory compliance. The answers will be different for every business in every vertical.



Modern IT Operations Teams Require a Unified Network Monitoring Platform

PUBLISHED: Tue, 12 Jan 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This white paper, prepared for Progress, explores why IT organizations should adopt unified, multifunction network monitoring solutions to improve overall effectiveness of the network management team. It also offers a guide to defining requirements for such a monitoring solution.



AI & ML: Driving the Next Generation of Innovation in DevOps, Event & Incident Management, and Workload Automation

PUBLISHED: Wed, 06 Jan 2021 00:00:00 +0000
AUTHOR: Steve Hendrick

The reality of artificial intelligence and machine learning (AI/ML) is being made possible by the evolution of technologies associated with big data, analytics, advanced analytics, operations research, data science, cloud computing, microservices, and decision science. AI and ML are just the most recent chapters in the amalgamation of computer science, mathematics, data management, and decision science.



Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic Report Summary

PUBLISHED: Tue, 05 Jan 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This is the report summary for EMA's report, "Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic." 



Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic

PUBLISHED: Tue, 05 Jan 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Software-defined wide-area networking (SD-WAN) technology has revolutionized digital enterprises. Now, the industry stands poised to offer a secure Zero Trust networking future with secure access service edge (SASE), which unifies SD-WAN, secure remote access, and cloud-based security. At this inflection point, Enterprise Management Associates is publishing its third installment in its ongoing biennial research into WAN transformation. This research, based on a survey of 303 enterprise IT professionals, explores the state of WAN transformation amidst an unprecedented business environment introduced by the COVID-19 pandemic. It takes a comprehensive approach at reviewing how enterprises evaluate, implement, and operationalize SD-WAN. It looks at early engagement with SASE and it examines how the pandemic has affected WAN transformation.



A Guide to Extending Network Performance Management Into the Cloud

PUBLISHED: Mon, 04 Jan 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This white paper reveals how a network manager can modernize his or her network performance management tools to operationalize the cloud. Legacy network monitoring tools are generally unprepared to support the hybrid and multi-cloud architectures that enterprises are building today. Network managers will need performance management platforms that are adaptable, efficient, and scalable enough for the public cloud. This white paper offers a guide for cloud-enabling the network operations team.



AI-Driven SD-WAN Will Optimize User Experiences Across a Distributed Enterprise

PUBLISHED: Mon, 04 Jan 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Software-defined WAN is a powerful platform for network transformation, but it also introduces tremendous complexity. To ensure that SD-WAN can optimize user experiences, IT organizations must implement a solution that provides AI-driven operations with end-to-end visibility from the client to the cloud. This white paper explores the roots of SD-WAN complexity and how one should counter it with AI-driven operations.



AI & ML: Driving the Next Generation of Innovation in DevOps and Event & Incident Management

PUBLISHED: Wed, 30 Dec 2020 00:00:00 +0000
AUTHOR: Steve Hendrick

The reality of artificial intelligence and machine learning (AI/ML) is being made possible by the evolution of technologies associated with big data, analytics, advanced analytics, operations research, data science, cloud computing, microservices, and decision science. AI and ML are just the most recent chapters in the amalgamation of computer science, mathematics, data management, and decision science.



Centerity at Work in Quick Service, Fine Dine, and Fast Casual Restaurants

PUBLISHED: Tue, 08 Dec 2020 00:00:00 +0000
AUTHOR: Valerie O'Connell

EMA recently had a spirited discussion with the head of WW Service Solutions for the hospitality business unit of a multi-billion-dollar managed service provider (MSP). This company specializes its outsourced services and support by verticals to provide end-to-end secure monitoring and managed service that is in-depth and business-aligned.



Advancing Privileged Access Management (PAM) to Address Modern Business Requirements: Summary

PUBLISHED: Tue, 08 Dec 2020 00:00:00 +0000
AUTHOR: Steve Brasen

This is the report summary for "Advancing Privileged Access Management (PAM) to Address Modern Business Requirements." 



Advancing Privileged Access Management (PAM) to Address Modern Business Requirements

PUBLISHED: Tue, 08 Dec 2020 00:00:00 +0000
AUTHOR: Steve Brasen

Security breaches of privileged accounts can be catastrophic to any business by allowing bad actors unfettered access to the company’s most sensitive data and IT systems. Related vulnerabilities have accelerated in recent years due to increased IT infrastructure complexities and broad distribution of business-critical services. To assist organizations with identifying the most effective methods for managing privileged access, EMA conducted primary, survey-based research into the real-world requirements, challenges, and management techniques employed for securing privileged access.



Distributed and Digitized Enterprises Require Edge Network Intelligence

PUBLISHED: Fri, 13 Nov 2020 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Technology innovations and business trends have made networks more complex and distributed than ever, and edge performance is essential to success. This Enterprise Management Associates (EMA) white paper explores why today’s network managers need visibility into the edge of their networks. It reviews the trends that drive this need and the requirements that network managers should consider when evaluating edge network intelligence solutions. Finally, it introduces VMware’s new Edge Network Intelligence solution.



AI & ML: Driving the Next Generation of Innovation in DevOps and Workload Automation

PUBLISHED: Thu, 12 Nov 2020 00:00:00 +0000
AUTHOR: Steve Hendrick

The reality of artificial intelligence and machine learning (AI/ML) is being made possible by the evolution of technologies associated with big data, analytics, advanced analytics, operations research, data science, cloud computing, microservices, and decision science. AI and ML are just the most recent chapters in the amalgamation of computer science, mathematics, data management, and decision science.



PUBLISHED: Fri, 06 Nov 2020 00:00:00 +0000
AUTHOR: Steve Brasen

End-user digital experience is at the cornerstone of every modern-day business. Every measure of business success (including profitability, performance, and productivity) is dependent on the effectiveness of the supporting workforce, and modern worker proficiency is derived from the efficient use of information technology (IT) tools and services. This EMA product comparison report provides a side-by-side comparison of leading DEM solutions, including 1E Tachyon, Aternity Digital Experience Management, Lakeside Software's SysTrack, and Nexthink Enterprise. 



The Value Stream Management Market: A Customer-Driven Evaluation of Products

PUBLISHED: Thu, 29 Oct 2020 00:00:00 +0000
AUTHOR: Steve Hendrick

This competitive analysis of the value stream management (VSM) market is unique in that it is 100% customer-driven. As part of EMA’s DevOps 2021 research study, respondents were asked a series of questions about the VSM market to help EMA understand what products were in use and how the enterprises that use them rated their enterprise value, product capabilities, and product satisfaction.



Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network Segmentation

PUBLISHED: Wed, 28 Oct 2020 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This Enterprise Management Associates (EMA) research report explores how IT organizations are using network technologies to support a Zero Trust security model. The report is based on a survey of 252 enterprise technology professionals with direct and relevant experience with these efforts. EMA focused its investigation primarily on secure remote access, network segmentation, and microsegmentation technologies. The research explores technology requirements, organizational strategies, and best practices. It also examines how the COVID-19 pandemic has impacted these Zero Trust initiatives.



PUBLISHED: Tue, 20 Oct 2020 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Wide-area network (WAN) transformation is forcing network architects to rethink the edge of their networks. Today’s enterprises need a WAN edge platform that is multi-cloud ready, resilient, open, and programmable. This white paper looks at the trends driving change at the WAN edge, and the requirements enterprises should set for their WAN edge platforms. Finally, it introduces the Cisco Catalyst 8000 Edge Platforms, a new family of solutions for tomorrow’s digital enterprise.



Automation and Orchestration to Help Bridge the IT Security Skills Gap: Seven Key Takeaways for Security Practitioners

PUBLISHED: Tue, 13 Oct 2020 00:00:00 +0000
AUTHOR: Paula Musich

In June 2020, Enterprise Management Associates surveyed 200 IT security executives and contributors on the impact of the vast and growing IT security skills gap on their organizations’ ability to protect their digital assets from bad actors. Respondents represent organizations with at least 500 employees across a range of industries, with a primary focus on North American markets. They were queried about how automation and orchestration, in various forms, are helping alleviate issues caused directly or indirectly by that gap.



The State of Multi-Cloud, Hybrid Cloud, and the Data Center in 2020

PUBLISHED: Tue, 29 Sep 2020 00:00:00 +0000
AUTHOR: Torsten Volk

Hybrid multi-cloud describes today’s reality of enterprises leveraging infrastructure and platform services from their traditional corporate data center, colocation hosting providers, and public clouds to deploy, run, and continuously enhance their individual mix of traditional and modern applications. All of these enterprises aim to achieve one central goal: eliminating the “vicious rectangle” that describes the tradeoff between software cost, quality, speed, and innovation. Hybrid multi-cloud provides the “toolbox” for developers, DevOps teams, and site reliability engineers (SRE) to achieve all four of these goals at the same time.



PUBLISHED: Mon, 14 Sep 2020 00:00:00 +0000
AUTHOR: Torsten Volk

Business success directly depends on an organization’s ability to identify and respond to customer needs earlier and more cost-efficiently than the competition. Busting the traditional vicious rectangle that forces enterprises into a tradeoff between speed, quality, cost, and innovation is critical. Typically, enterprises follow the standard playbook for digital transformation, adopting a similar set of modern technologies, tools, and metrics, all focused on developing and operating better software at a lower cost. However, after a seemingly successful implementation effort of these measures, many organizations have experienced a lack of correlation between these success metrics and increased business success.



Streamlining IT Operations: Bridging the Gap Between IT Effectiveness and Cost-Efficiencies

PUBLISHED: Mon, 14 Sep 2020 00:00:00 +0000
AUTHOR: Steve Brasen

The backbone of any modern-day enterprise is the successful delivery of IT services that empower workforces and drive business performance. Unfortunately, the implementation, maintenance, and end-user support requirements for delivering IT services that are essential for driving business performance typically come with a hefty price tag. Significant changes in business requirements and service delivery models introduced over the last decade or so have only served to accelerate demands on IT budgets.



EMA Radar Report: AIOps - A Guide for Investing in Innovation

PUBLISHED: Thu, 10 Sep 2020 00:00:00 +0000
AUTHOR: Dennis Drogseth

The EMA Radar Report delivers an in-depth analysis of industry leading vendors and vendor products, including their overall market position in comparison with other vendors. This information is laid out in an easy-to-decipher, detailed market map and Radar Chart – which includes a composite score for each vendor – making it simple to see how vendors measure up in the market, as well as against other vendors. The EMA Radar Report also provides a detailed discussion of methodology and criteria, a high-level market segment overview, a comprehensive analyst write-up on each vendor, and more.



EMA Radar Report Summary: AIOps - A Guide for Investing in Innovation

PUBLISHED: Thu, 10 Sep 2020 00:00:00 +0000
AUTHOR: Dennis Drogseth

This is the summary for the EMA 2020 Radar Report "AIOps: A Guide for Investing in Innovation" 



Extend Network Performance Monitoring to the Home Office with NetBeez Work-From-Home Agent

PUBLISHED: Tue, 01 Sep 2020 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Enterprises have experienced a massive surge in employees who are working from home due to the COVID-19 pandemic. Enterprise Management Associates (EMA) has observed enterprises realigning their network architecture by scaling up VPN capacity and expanding their use of the cloud for application delivery. EMA has also observed a commensurate realignment of operational monitoring tools to support this new architecture. More importantly, EMA projects that this surge of remote workers is somewhat permanent.



The Test Environment Management Market: A Customer-Driven Evaluation of Products

PUBLISHED: Fri, 28 Aug 2020 00:00:00 +0000
AUTHOR: Steve Hendrick

This competitive analysis of the test environment management (TEM) market is unique in that it is 100% customer-driven. In EMA’s DevOps 2021 research study, there was a series of questions about the TEM market to reveal what products were in use and how the enterprises that use them rate their enterprise value, product capabilities, and product satisfaction.



How Automation and Orchestration can Help Bridge the IT Security Skills Gap

PUBLISHED: Wed, 26 Aug 2020 00:00:00 +0000
AUTHOR: Paula Musich

The shortage of skilled information security practitioners continues to grow around the globe. In the US, for organizations with at least 500 employees, Enterprise Management Associates found in a June 2020 survey that the average number of open positions enterprises are trying to fill is 1,324. For the largest percentage of respondents in this EMA survey, that number increased between 1% and 25% over the last year, although that increase is higher for large enterprises.



Using Compliance Budgets to Build a Red Team Capability

PUBLISHED: Fri, 21 Aug 2020 00:00:00 +0000
AUTHOR: Chris Steffen

Regardless of the industry vertical, all businesses are required to deal with a certain amount of regulatory compliance. For information security leaders, the best solution is to partner with compliance/risk/governance teams to address compliance control gaps while increasing the company’s overall security. One of the best approaches to this solution is to implement security solutions that directly address remediation items from a control gap list or by finding dual-purpose security solutions that solve a compliance-related challenge while augmenting security capabilities. Red team solutions address these concerns: improving security by continuously attacking a company’s infrastructure, while also providing continuous compliance assessments and due diligence to the company’s auditors and risk managers.



A Strategic Guide for Transitioning to Adaptive Access Management

PUBLISHED: Wed, 19 Aug 2020 00:00:00 +0000
AUTHOR: Steve Brasen

There can be no doubt that enterprise access requirements have radically changed in recent years. Workforces are more mobile than ever before, and the COVID-19 pandemic has irrevocably accelerated remote work requirements and related challenges. The IT resources users access are no longer sequestered on secure business networks, but instead are distributed across a wide variety of public and private cloud and web services. Enterprise requirements to move to cloud infrastructures have broken down traditional security approaches. Additionally, digital transformation is driving increased user expectations for higher fidelity and lower-friction experiences.



EMA Evaluation Guide to Privileged Access Management (PAM)

PUBLISHED: Fri, 14 Aug 2020 00:00:00 +0000
AUTHOR: Steve Brasen

Enterprise IT and security management are broadly dependent on the availability of privileged accounts that enable administrators and authorized users to install, configure, monitor, secure, and repair the IT systems that are the lifeblood of business operations. Anyone able to attain privileged access is granted unfettered access to view and change the company’s most sensitive and valuable systems, data, and applications, and governing this access is relegated to the practice of privileged access management (PAM). According to EMA primary research, 79% of organizations consider PAM to be very important or critical to their business operations, and the discipline is an essential component of any enterprise security strategy.



Paessler PRTG Enterprise Monitor Solves the NetOps Requirements of Large Networks

PUBLISHED: Wed, 12 Aug 2020 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This white paper reviews many of the critical requirements that large enterprises have for their network operations tools, as identified by years of research by Enterprise Management Associates. This paper examines how Paessler’s new solution, PRTG Enterprise Monitor, is a proven network monitoring platform that has been enhanced to address the network management tool requirements of larger enterprises.



Overcoming the Challenges of Modern, Multi-Modal CDC

PUBLISHED: Tue, 11 Aug 2020 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - John Santaferraro

This modern digital world changes the requirements for platforms that interconnect complex data ecosystems for the purpose of interoperability. The need for immediate, intelligent responses to business events is now paramount. Leading organizations are already utilizing streaming change data capture technology to capture, transform, and ingest data into both data lakes and analytic warehouses.



Digital Transformation, Analytics, and the Modern C-Suite: Research Report Summary

PUBLISHED: Tue, 04 Aug 2020 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - John Santaferraro

The purpose of this research is to identify the characteristics, priorities, and best practices of senior executive teams that are ahead of the digital transformation game and already using analytics as a strategic weapon to disrupt their industries and gain an unfair advantage. To better understand what is happening with digital transformation, analytics, and the modern C-suite, EMA restricted this research to C-level executives only.



Driving Cost Savings with Event Streaming: A Look at Business and Digital Strategies Impacted by COVID-19

PUBLISHED: Tue, 04 Aug 2020 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - John Santaferraro

The moment governments instituted COVID-19 lockdowns, every digital business model created before the pandemic was put to the test. Within days, they were either proven or found wanting. EMA research conducted with IT and business leaders reveals a shift in priorities that creates the perfect opportunity to reignite digital strategies with intelligent responses to real-time business events.



Outpace the Competition: Optimize Cost, Speed, and Quality Through Hybrid Cloud Automation and Self-Service

PUBLISHED: Tue, 04 Aug 2020 00:00:00 +0000
AUTHOR: Torsten Volk

Relying on developers and corporate IT to complete a vast range of manual tasks for application deployment and day 2 operations limits the organization’s ability to release new software features at the required pace and forces executives into tradeoffs between speed, quality, cost, and innovation.



Automation Intelligence: A Holistic View to Improve Business Outcomes

PUBLISHED: Tue, 21 Jul 2020 00:00:00 +0000
AUTHOR: Dan Twing

Automation is critical to modern IT operations. Workload automation (WLA) software is one of the critical tools required to run an effective IT operation. Large enterprises often have multiple WLA solutions, which makes it difficult to create a holistic, end-to-end view of workload health and outcomes, and to see and resolve problems as they develop. This paper discusses automation intelligence solutions that can collect data from disparate WLA tools, combine the data, and analyze this data to predict outcomes, identify problems as they develop, and provide prescriptive suggestions to resolve developing problems quickly. Changes to the operating model for IT and benefits of automation intelligence are reviewed.



The Race for a Unified Analytics Warehouse

PUBLISHED: Tue, 21 Jul 2020 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - John Santaferraro

The race for a unified analytics warehouse is on. The data warehouse has been around for almost three decades. Shortly after big data platforms were introduced in the late 2000s, there was talk that the data warehouse was dead—but it never went away. When big data platform vendors realized that the data warehouse was here to stay, they started building databases on top of their file system and conceptualizing a data lake that would replace the data warehouse. It never did.



Selecting a Network Performance Management Platform for Your Digital Future

PUBLISHED: Thu, 09 Jul 2020 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Enterprises need to expand and modernize their network performance management tools. Many IT operations teams have tools that can monitor infrastructure, but they don’t have a good view of network traffic. This lack of traffic insight constrains their ability to understand network performance. These enterprises also use tools that lack well-defined workflows and support for cross-IT collaboration. All of these tool gaps limit the ability of an IT operations team to monitor and troubleshoot application performance and end-user experience.



EMA Top 3 Report: Ten Priorities for Enabling Secure Access to Enterprise IT Services

PUBLISHED: Tue, 07 Jul 2020 00:00:00 +0000
AUTHOR: Steve Brasen

Enterprise productivity, profitability, and success in meeting business objectives are dependent on the ability of workforces to access and utilize the applications, data, email, and other IT services necessary to complete job tasks. However, pressures to give an increasingly mobile workforce access to IT services distributed across a variety of public and private hosting environments have significantly challenged organizations. This Enterprise Management Associates (EMA) decision guide is intended to provide actionable advice on the best practices and solutions organizations should adopt to empower end-user productivity while minimizing risk profiles when enabling secure access to business IT resources.



Selecting a Managed Detection and Response Service: What Clients Think and Prospects Want

PUBLISHED: Tue, 30 Jun 2020 00:00:00 +0000
AUTHOR: Paula Musich

Organizations large and not so large are waking up to the need to find expert help in managing the process of hunting down and remediating threats within their IT infrastructure. As threats continue to evolve, IT security practitioners accept that their networks and infrastructure have already been compromised. It is critical now to find those threats and shut them down before they do serious damage. The IT security skills gap has contributed to the need for more threat hunting expertise than many organizations can muster.


     

Subscribe Now!

Subscribe with Netvibes

follow us in feedly

EMA on Facebook   EMA on LinkedIn   EMA on Twitter   EMA RSS   EMA on YouTube

©1996-2022 Enterprise Management Associates, Inc. All rights reserved.
EMA™, ENTERPRISE MANAGEMENT ASSOCIATES®, and the mobius symbol are registered trademarks or common-law trademarks of Enterprise Management Associates, Inc.
Site Terms & Conditions | Integrity Policy | Site Map | My Account
Hide
Subscribe to EMA RSS Feed
Email
Show