CONTACT    SIGN IN    SIGN UP
    

Free RSS Feeds from Enterprise Management Associates (EMA)

Stay up to date on the latest IT and data management information from EMA, including Webinars, Radar Reports, white papers, impact briefs, advisory notes and more!

Select your preferred reader by selecting an icon on the right.



Current Feed Content:




EMA Radar Report for Workload Automation: Q4 2021 October

PUBLISHED: Thu, 14 Oct 2021 00:00:00 +0000
AUTHOR: Dan Twing

Workload automation in 2021 reflects an even greater push to expand the category beyond traditional scheduling, toward full automation orchestration. The consolidation that occurred over the past four years slowed a bit, but is warming up again because Turn River Capital has invested in both Advanced Systems Concepts, Inc. and Redwood Software, with possibly more to come. This class of software is becoming more important to the future of digital transformation and automation. These trends have been developing over the last five or six years, but are now becoming more broadly accepted as a key part of the future of IT management. While most of the products reviewed for this report have seen many feature enhancements over the past two years, the category as a whole saw fewer new features across the category than the period from 2017 to 2019. Rather, the bulk of the changes from 2019 to 2021 were more about strengthening the features required to address the four biggest trends affecting this segment than net new capabilities.



EMA 2021 Workload Automation Radar Report Summary

PUBLISHED: Thu, 14 Oct 2021 00:00:00 +0000
AUTHOR: Dan Twing

This is the summary for the 2021 Workload Automation Radar Report.



Identifying Effective Digital Employee Experience (DEX) Management Solutions: A Quantitative Analysis

PUBLISHED: Tue, 12 Oct 2021 00:00:00 +0000
AUTHOR: Steve Brasen

In recognition of the importance of improving workforce productivity, businesses have increasingly introduced solutions specifically designed to improve employee digital experiences. However, evolving requirements and challenges have obfuscated the types of technologies, solutions, and best practices that will most effectively drive increased end-user efficiencies and performance in the usage of digital resources. To help provide guidance on which approaches organizations should adopt, Enterprise Management Associates (EMA) conducted primary, survey-based research into the requirements, challenges, solutions, and outcomes employed in real business conditions today.



IT Asset Management: Current State and Near-Term Outlook

PUBLISHED: Mon, 04 Oct 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

IT complexity and change, sworn enemies of IT service quality and security, are on the rise. Crossing clouds and data centers, IT services, processes, and risks encompass users, devices, and non-IT technologies at the edge of enterprise business. Automation, analytics, and cross-domain workflows rightly receive attention as IT’s primary weapons against these escalating challenges. However, the fight is most often acted on the battleground of IT assets—physical, digital, on-premises, in clouds—throughout the enterprise.



IT Service Cost Tracking Impact: Research Findings

PUBLISHED: Mon, 04 Oct 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

EMA’s field experience frequently shows a management blind spot when it comes to IT service cost tracking. Although most organizations track service quality in terms of SLAs or periodic user satisfaction, they are more likely to know the cost of individual assets than the true cost of each individual service that IT delivers to the business.



The Rise of Active Directory Exploits: ls it Time to Sound the Alarm?

PUBLISHED: Thu, 30 Sep 2021 00:00:00 +0000
AUTHOR: Paula Musich

For years, Active Directory has been a prime target for attackers looking to get a leg up into high-value enterprise resources, but it has not been front and center in most enterprise security teams’ list of priorities. While gaining access to Active Directory elements, such as access control lists and privileged accounts, is not the end attackers are seeking. It most often delivers the means to get to those valuable assets, whether those include customer information, intellectual property, or operating data that can be held for ransom.



Disrupting the Economics of Software Testing Through AI

PUBLISHED: Tue, 21 Sep 2021 00:00:00 +0000
AUTHOR: Torsten Volk

As the ability to accelerate the delivery of customer value through innovation, and at lower cost, has become today’s critical source for achieving competitive advantages, traditional software testing practices can no longer scale to meet business demands. Test automation frameworks typically rely on a jungle of test scripts written in different languages, using different sets of runtime parameters, and lacking consistent compliance testing capabilities. This forces the organization into the unfortunate choice of adding cost or risk to their agile development processes. They can either hire additional staff and increase test infrastructure to cope with the increasing test overhead, or they can accept the added risk that originates from incomplete testing practices.



The State of Modern Application Development: A Journey from Speed to Awareness

PUBLISHED: Fri, 17 Sep 2021 00:00:00 +0000
AUTHOR: Dennis Drogseth

Nothing could be more critical in the current world of IT than fast and reliable application development and delivery in support of business performance. This report, based on Q3 2021 research, shines a spotlight on accelerating trends such as platform teams, integrated security, site reliability engineers (SREs), and decentralization. The report also exposes areas of breakage and disruption as many IT organizations continue to struggle in their search for more cohesive approaches to application optimization.



EMA Top 3 Enterprise Decision Guide 2021

PUBLISHED: Wed, 15 Sep 2021 00:00:00 +0000
AUTHOR: Torsten Volk

Enterprise Management Associates (EMA) presents its EMA Top 3 Awards to software products that help enterprises reach their digital transformation goals by optimizing product quality, time to market, cost, and ability to innovate.



End-to-End Kubernetes Acceleration and Management Efficiency

PUBLISHED: Thu, 09 Sep 2021 00:00:00 +0000
AUTHOR: Torsten Volk

Adoption of microservices-based application architecture and the Kubernetes container scheduling and orchestration platform continues to increase at an annual pace of approximately 50%. Over the past six months, the number of software engineers using Kubernetes (Python) software libraries grew by 110%, while the number of DevOps teams making the Kubernetes plugin part of their release pipeline increased by 27% over the same timeframe. The fact that 98% of site reliability engineers require Kubernetes expertise in 2021 further underlines the status of Kubernetes as the standard platform for application transformation.



2021 EMA Vendors to Watch: Network Management

PUBLISHED: Thu, 02 Sep 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that previously went unaddressed, or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2021 EMA Vendors to Watch in the network management field, including AirEye.



EMA Radar Report: Network Performance Management

PUBLISHED: Tue, 24 Aug 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This Radar Report is aimed at assisting IT organizations that are procuring network performance management solutions for operational monitoring, troubleshooting, and capacity planning. This report should help buyers assemble a shortlist of vendors and guide their selection of a solution. Any of the 15 vendors represented in the report might be the best choice for an organization depending on the tools and solutions they currently have, their level of organizational maturity, their budget, their direction and vision, and their current mix of network technologies. 



SASE Transitions are Hard, but There are Ways to Make Them Less Painful

PUBLISHED: Mon, 23 Aug 2021 00:00:00 +0000
AUTHOR: Paula Musich

In early 2020 many organizations were already well along in their digital transformation initiatives, but the rush to support users now working from home put those projects into overdrive. It also spurred greater interest in the emerging set of solutions described as Secure Access Service Edge, or SASE (pronounced sassy). When it comes to SASE adoption, the most difficult part of the journey in moving from separate, on-premises-based networking and security stacks to a largely cloud-based service is in the transition. The convergence of networking and security that forms the centerpiece of a SASE service has a number of implications that, when planned well, can make that transition significantly less painful.



How Ransomware Attacks Impact the Trustworthiness of IT Management Tools

PUBLISHED: Tue, 17 Aug 2021 00:00:00 +0000
AUTHOR: Chris Steffen

Ransomware attacks continue to escalate in 2021, and IT management tool vendors are scrambling to understand how to address these attacks while providing reasonable assurances that their solutions are secure.
 
Recently, the REvil ransomware affiliate began exploiting a zero-day vulnerability in Kaseya VSA at several managed service providers, ultimately encrypting thousands of downstream accounts. Kaseya provides IT management software tools to managed service providers (MSPs) or IT outsourcing shops to handle IT-related management solutions for organizations with little to no dedicated IT resources.



Data Security in a Multi-Cloud World

PUBLISHED: Wed, 11 Aug 2021 00:00:00 +0000
AUTHOR: Chris Steffen

Securing and protecting enterprise data is at the center of the modern security plan. In this research study conducted for IBM Security, Enterprise Management Associates polled over 200 technical leaders and practitioners from organizations of every size and vertical on their data security and privacy plans, as well as their perspectives on zero trust.
This eBook will highlight those findings, including the benefits of a zero trust approach and views on data privacy and security.



Post-Pandemic Networking: Enabling the Work-From-Anywhere Enterprise

PUBLISHED: Tue, 20 Jul 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

The COVID-19 pandemic forced hundreds of thousands of companies to send their employees home indefinitely. As the world starts inching toward a post-pandemic future, it’s clear that most companies will allow many employees to work from home forever. This research, based on a survey of 312 IT professionals, explores how enterprise IT organizations are adjusting their network infrastructure and operations to the massive and permanent increase in people who are working from home. It also explores the ripple effects this paradigm shift is having on on-premises network infrastructure.



Prepare for a Work-From-Anywhere Future with AIOps-Driven SASE

PUBLISHED: Thu, 15 Jul 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Secure access service edge (SASE) technology can deliver secure connectivity to enterprises that have embraced a work-from-anywhere future. However, user experience will remain a challenge because network operations teams are still using yesterday’s tools for tomorrow’s networks. A SASE solution that offers AIOps-driven management can solve this challenge. AIOps (artificial intelligence of IT operations) is a new class of solution that combines machine learning, AI, big data, and other advanced analytics technologies to enhance IT management. This white paper explores why enterprises should look for SASE solutions with AIOps smarts.



Consumer Identity and Access Management (CIAM): Responsible Solutions for Creating Positive Consumer Experiences

PUBLISHED: Wed, 07 Jul 2021 00:00:00 +0000
AUTHOR: Steve Brasen

Modern business success, by any measure, is reliant on the positive experiences of consumers during digital engagements. Consumer identity and access management (CIAM) processes and solutions govern the execution of processes for enabling consumer access to digital resources while ensuring security and compliance requirements are responsibly met. To help identify optimal solutions and best practices in support of CIAM objectives, EMA conducted survey-based research of organizations actively employing CIAM solutions. Among respondents, 65% reported their organization was impacted by a significant security breach in the last year, including malware infections, unauthorized uses of IT services, and the exposure of consumer data and credentials.



IT service cost tracking in ITSM: the missing link between IT service quality and business value

PUBLISHED: Tue, 06 Jul 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

In a great act of corporate irony, IT services that are SLA-ed with great precision are almost always mysteries when it comes to understanding their cost. Most IT organizations can report the quality of a service against a multitude of metrics, and they can detail IT budgets along departmental or asset lines. However, the cost of providing a service as it is actually consumed by the organization is largely an unknown. This operational blind spot is the missing link in any reasonable discussion of IT service business value. After all, how can the business value of a service be determined without knowing what it costs to deliver that service?



Unified Analytics in the Age of Cloud Supremacy: Creating Value From New Data, Old Data, and Fast Data

PUBLISHED: Mon, 21 Jun 2021 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - John Santaferraro

Recent EMA research shows that 53% of all data is now in the cloud. This massive movement of data to the cloud shifts the focus from migrations to cloud supremacy. It is no longer enough to be in the cloud; competition is pushing organizations to utilize cloud technology to create barriers to entry and unfair advantage.



Leveraging Workload Automation to Expand Enterprise Automation

PUBLISHED: Wed, 16 Jun 2021 00:00:00 +0000
AUTHOR: Dan Twing

Enterprises are relying on information technology (IT) more than ever before. It is commonly said that today, every company is an IT company. Customers, trading partners, and employees all expect to interact with the enterprise and each other digitally. Digital transformation brings IT closer to end customers and creates a greater need and more opportunities to automate. Automation done right frees employees from repetitive tasks, allowing more time for higher-value work. Automation brings consistency, which results in fewer errors and improved compliance with business processes. Automation also provides self-service opportunities and better information and interaction with the enterprise. All the new digital services and digital forms of interaction are contributing to the ongoing data revolution.



EMA Technical Case Study: Uber

PUBLISHED: Mon, 14 Jun 2021 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - John Santaferraro

Everyone knows Uber, but not everyone knows the clockwork that makes Uber tick. Everyone knows Uber as a shared service for point-to-point transportation, but not everyone knows Uber as a data and analytics company.
 
Every day, more than 18,000,000 riders key their location and destination into the Uber mobile app to request a ride or a meal. Unbeknownst to them, each transaction is plugged into complex algorithms built on insight gleaned from petabytes of data. The results come back in seconds with the most optimal recommendations for nearby drivers and pricing based on supply and demand economics.



The Business Value of AIOps-Driven Network Management

PUBLISHED: Tue, 08 Jun 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

The vast majority of network managers who have experience with AIOps solutions believe this emerging technology can improve network operations. They also believe that applying AIOps to network management will lead to better overall business outcomes for their companies. This white paper, based on new research by Enterprise Management Associates, reveals how AIOps can improve network management. More importantly, it offers proven advice on how to evaluate this technology and how you can build trust in the technology within your networking team.



The 2021 State of Software Quality: A View From the Enterprise

PUBLISHED: Fri, 04 Jun 2021 00:00:00 +0000
AUTHOR: Steve Hendrick

It’s easy to answer the question, “Is software quality important to the enterprise?” since nearly all enterprises are already in the midst of a digital transformation. Answering the question, “What is software quality?” is more complicated. This is because software quality is often a goal, and there are many ways to achieve this goal.



2021 EMA Vendors to Watch: Security and Risk Management

PUBLISHED: Wed, 02 Jun 2021 00:00:00 +0000
AUTHOR: Paula Musich

EMA "Vendors to Watch" are companies that deliver unique customer value by solving problems that previously went unaddressed, or provide value in innovative ways. The designation rewards vendors that dare to go off the beaten path and have defined their own market niches.

This document contains the 2020 EMA Vendors to Watch in the security and risk management field, including Lucidum, Huntress, and Horizon3.ai.

Additional vendors will be added to this document throughout the year.



AI(work)Ops 2021: The State of AIOps

PUBLISHED: Tue, 01 Jun 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

Today, vendor AIOps capabilities exceed common enterprise demands. Actual deployments and overall use currently lag well behind the potential of existing platforms. However, new use case adoption is accelerating rapidly for a panenterprise impact that already reaches far past ITOps.



Enterprise SRE: service reliability

PUBLISHED: Tue, 01 Jun 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

Powered by enterprise-spanning platform technology and practices, enterprise SRE exerts a multiplier effect on individual team productivity. Decentralized IT teams are transformed into efficient parts of a unified organizational whole, with no disruption to their autonomy, speed, and effectiveness.



Kanverse AI-powered accounts payable (AP) document automation: how one skeptical IT leader became a convinced customer + convincing advocate

PUBLISHED: Tue, 01 Jun 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

At first, Kanverse’s Intelligent Document Processing (IDP) concept sounds familiar. Of course companies want to digitize invoices (and other documents, such as POs and quotes) for fast, accurate processing automation. It’s the 21st century, so automation and digital transformation go hand in hand. However, Kanverse brings something new and powerful to the AP document processing challenge—and that something is AI. EMA recently had an in-depth conversation with the global head of IT for a large, privately owned manufacturing company that is headquartered in the US with subsidiaries around the world. In his words, what follows is the zigzag path to Kanverse’s IDP solution for accounts payable and its wildly successful implementation that left the C-suite “shell-shocked” and delighted.



The State of Data Center Networking: 2021 Annual Report

PUBLISHED: Tue, 01 Jun 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

In this first annual research report on The State of Data Center Networking, commissioned by Pluribus Networks, Enterprise Management Associates found that IT organizations are aggressively pursuing high-availability application architectures across geographically separated data centers.



PUBLISHED: Wed, 26 May 2021 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - John Santaferraro

Vertica vendor profile and report summary from the EMA Radar: Unified Analytics Warehouse – A Guide for Investing in Unified Analytics

Full Report Abstract
To assist analytics buyers looking to reduce cost and complexity, EMA evaluated 12 vendors providing UAW solutions. Any of the 12 vendors represented in the report might be the best choice for an organization depending on the tools and solutions they currently have, their level of analytical and organizational maturity, their direction and vision, and their current mix of technologies.



PUBLISHED: Wed, 26 May 2021 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - John Santaferraro

To assist analytics buyers looking to reduce cost and complexity, EMA evaluated 12 vendors providing UAW solutions. Any of the 12 vendors represented in the report might be the best choice for an organization depending on the tools and solutions they currently have, their level of analytical and organizational maturity, their direction and vision, and their current mix of technologies.



A House Divided: Dysfunctional Relationships Between Network and Cloud Teams Put Cloud Strategies at Risk

PUBLISHED: Wed, 19 May 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

As companies accelerate cloud adoption, only 28% consider themselves fully successful with realizing the benefits of their cloud investments. Why? As this research shows, networking is a sticking point. Specifically, success hinges on a company’s ability to integrate its cloud team and traditional network infrastructure team at all levels (design, implementation, and operation). The impacts of not doing so are striking.



Resolve Systems: Automation + AIOps = Platform Power

PUBLISHED: Wed, 19 May 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

AIOps is real. More than a marketing mantra, AIOps applies advances in AI and ML to the unending demands of complex IT operations. Comprehending massive amounts of data across the multi-layered hybrid infrastructure that underpins IT performance, AIOps holds the key to IT service reliability and excellence. Automation unlocks the door.



A Guide to NetOps and SecOps Collaboration

PUBLISHED: Tue, 11 May 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This white paper draws on EMA research to offer a step-by-step guide for building partnerships and collaboration between enterprise network and security teams. It explores why this collaboration is essential, and how enterprises can reap rewards from NetOps and SecOps partnerships. In particular, it reviews how tools, data, and processes are essential to success.



PUBLISHED: Tue, 27 Apr 2021 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - John Santaferraro

The COVID-19 pandemic, along with universal global shutdowns, changed the way people live and do business. Organizations with strong digital heritage or successful digital transformation fared well in the downturn. As a result, competitors have been forced to quickly move to modern architectures that enable intelligent digital decisions for all.



Navigating the Complexity of Hybrid Data Ecosystems: A Look at How to Modernize with Connected, Real-Time Intelligence

PUBLISHED: Tue, 27 Apr 2021 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - John Santaferraro

The 2020 global pandemic created a digital reset, causing leaders to make digital superiority a reality. At the core of every digital strategy is analytics fueled by the need for immediate, intelligent responses to business events. The greatest challenge to immediacy comes from the fact that the average organization stores data in more than five different platforms. The addition of new platforms adds cost, complexity, and debilitating excess time to the digital response equation.
 
This research from EMA unearths trends in modernization, business and technical drivers for modernization initiatives, best practices for the operation of hybrid data ecosystems, cultural and organizational shifts that drive innovation cycles, and top requirements for interoperability and innovation.



The Role of the Mainframe in a Hybrid-Cloud World

PUBLISHED: Thu, 22 Apr 2021 00:00:00 +0000
AUTHOR: Chris Steffen

Technology has been at the center of the enterprise for decades. Companies that embrace and utilize technical advances can move from the small corner store to the names and logos people immediately recognize as part of everyday life. Nothing can be more critical to success than the computing power and capabilities.

One may believe that the days of the mainframe are part of this bygone era of computing: supplanted by cloud, Internet of Things (IoT), and mobile devices. However, just as these technologies have been born, created, and evolved to become important to business operations, so has the mainframe evolved to become an indispensable part of enterprise technology strategy, from almost every important and relevant technology facet.



Revolutionizing Network Management with AIOps

PUBLISHED: Tue, 20 Apr 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This Enterprise Management Associates (EMA) research report explores how IT organizations are planning to use AIOps technology to enhance network infrastructure management. Based on a survey of IT professionals with extensive knowledge of using AIOps for network management, this report identifies top use cases, product requirements, barriers to success, and best practices.



DevOps: A View From the Enterprise

PUBLISHED: Tue, 13 Apr 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

DevOps is the real-life art and science of bringing together all the resources and requirements of development and IT operations to work for the business they serve. There is no one, universally accepted definition, partly because there are so many ways to look at the different aspects, attributes, and interested stakeholders involved in any DevOps
initiative.



A Unified Architecture for Achieving Zero Trust Across all Network Domains

PUBLISHED: Wed, 31 Mar 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Network access and control is extremely siloed today. IT organizations use multiple technologies to manage and enforce policies. As enterprises pivot toward a zero trust security model, they will need to unify policy and enforcement across multiple technology domains. This white paper offers high-level guidance on how to get started.



Martello powers Microsoft 365 service excellence for end users: The business case for IT end-to-end observability and control

PUBLISHED: Tue, 30 Mar 2021 00:00:00 +0000
AUTHOR: Valerie O'Connell

In a world of competing demands and limited resources, it’s not always easy to cut through the clutter of good investment options. This issue is particularly challenging when it comes to technologies that promise transformation of services and processes that are already underway, even if they are under-powered.



Five Things to Consider Before Embarking on a SASE Project

PUBLISHED: Tue, 30 Mar 2021 00:00:00 +0000
AUTHOR: Paula Musich

The convergence of networking and security in the cloud, described as secure access service edge (SASE), is a nascent market that already has the attention of IT operations teams looking to adapt their networking and security architectures to better serve the needs of digitally transformed enterprises. Such digital transformation initiatives were put into hyperdrive in 2020 thanks to the global pandemic and sudden need to enable information workers to do their jobs from home, using their own Wi-Fi and broadband networks.



The Convergence of Network and Security Operations

PUBLISHED: Tue, 30 Mar 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

When network operations and security operations teams collaborate, good things happen to the business. EMA research found that many enterprises are pursuing this collaboration, even going as far as fully converging the two groups. Such collaboration can reduce risk, cut costs, boost productivity, and make the IT organization more responsive to the business. This white paper offers guidance on how to pursue this collaboration and identifies some pitfalls to avoid.



Democratizing IT Automation in a Multi-Cloud World: Tools, Teams, Culture, and Best Practices for Automation Success

PUBLISHED: Wed, 17 Feb 2021 00:00:00 +0000
AUTHOR: Dan Twing

Increasing automation for both IT and business processes continues to be a priority for organizations big and small. Organizations are encouraging automation, with 96% working toward more business process automation and 93% working toward more IT automation. However, less than 20% are assigning evangelists and creating Automation Centers of Excellence (ACoE). Automation is important to management and a goal for next year for 89% of respondents; however, only 31% are including increased automation as part of performance reviews. WLA is becoming a utility to facilitate automation orchestration for a variety of use cases and supporting a broad range of stakeholders across multi-cloud environments. EMA believes WLA is a key component in achieving broader automation success.



Availability and Buying Options in the Emerging SASE Market

PUBLISHED: Tue, 16 Feb 2021 00:00:00 +0000
AUTHOR: Paula Musich

The opportunity described by Gartner analysts as secure access service edge, or SASE, is at this point not so much a market as an aspirational description of where the now-separate networking and security markets need to come together to better serve the needs of the digitally transformed enterprise. The enterprise architectures of the past, based on separate networking and security infrastructures, no longer fit the needs of most enterprises. They were designed to backhaul traffic from remote branch offices and mobile VPN clients to a central location where network traffic is monitored for performance issues, malicious activity, and malware before sending the traffic to its destination, which was often in the same data center. However, the once-centralized applications that end users seek to access no longer universally reside in those concentrated data centers as enterprises more fully embrace cloud services of all kinds. Thanks to the global COVID-19 pandemic and its resulting and rapid shift to work from home operations, digital transformation initiatives have advanced at a much more rapid pace than the industry anticipated.



EMA Case Study: Financial Services Company Manages Work-From-Home User Experience with NetBeez

PUBLISHED: Fri, 12 Feb 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Marlette Funding, owner and operator of the Best Egg online lending platform, used NetBeez to monitor and troubleshoot user experience when 100% of its 250 employees were forced to work from home during the COVID-19 pandemic.



Securing Cloud Assets: How IT Security Pros Grade Their Own Progress

PUBLISHED: Wed, 03 Feb 2021 00:00:00 +0000
AUTHOR: Paula Musich

Trying to gauge where organizations are in their journey to secure cloud-based assets is akin to answering the basic questions necessary in a news story: the who, what, when, where, how, and why of cloud security.



Best Practices for the Enterprise: Information Security and Technology Trends Responding to the Pandemic

PUBLISHED: Fri, 22 Jan 2021 00:00:00 +0000
AUTHOR: Chris Steffen

The COVID-19 pandemic has transformed nearly every aspect of life: the ways people shop, eat, and conduct business. Those with technology-related jobs have shifted from a 9-5 office environment to working remotely. The changes may very well be permanent. With these changes come new challenges for business leaders trying to keep their businesses afloat.
 
With medical advances and loosening restrictions in the new year, business leaders and the vendors that support them are trying to understand how the changes will impact their enterprises. The answers will impact every facet of their business, from security and cloud computing to commercial real estate and regulatory compliance. The answers will be different for every business in every vertical.



Modern IT Operations Teams Require a Unified Network Monitoring Platform

PUBLISHED: Tue, 12 Jan 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This white paper, prepared for Progress, explores why IT organizations should adopt unified, multifunction network monitoring solutions to improve overall effectiveness of the network management team. It also offers a guide to defining requirements for such a monitoring solution.



AI & ML: Driving the Next Generation of Innovation in DevOps, Event & Incident Management, and Workload Automation

PUBLISHED: Wed, 06 Jan 2021 00:00:00 +0000
AUTHOR: Steve Hendrick

The reality of artificial intelligence and machine learning (AI/ML) is being made possible by the evolution of technologies associated with big data, analytics, advanced analytics, operations research, data science, cloud computing, microservices, and decision science. AI and ML are just the most recent chapters in the amalgamation of computer science, mathematics, data management, and decision science.



Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic Report Summary

PUBLISHED: Tue, 05 Jan 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This is the report summary for EMA's report, "Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic." 



Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic

PUBLISHED: Tue, 05 Jan 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Software-defined wide-area networking (SD-WAN) technology has revolutionized digital enterprises. Now, the industry stands poised to offer a secure Zero Trust networking future with secure access service edge (SASE), which unifies SD-WAN, secure remote access, and cloud-based security. At this inflection point, Enterprise Management Associates is publishing its third installment in its ongoing biennial research into WAN transformation. This research, based on a survey of 303 enterprise IT professionals, explores the state of WAN transformation amidst an unprecedented business environment introduced by the COVID-19 pandemic. It takes a comprehensive approach at reviewing how enterprises evaluate, implement, and operationalize SD-WAN. It looks at early engagement with SASE and it examines how the pandemic has affected WAN transformation.



A Guide to Extending Network Performance Management Into the Cloud

PUBLISHED: Mon, 04 Jan 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This white paper reveals how a network manager can modernize his or her network performance management tools to operationalize the cloud. Legacy network monitoring tools are generally unprepared to support the hybrid and multi-cloud architectures that enterprises are building today. Network managers will need performance management platforms that are adaptable, efficient, and scalable enough for the public cloud. This white paper offers a guide for cloud-enabling the network operations team.



AI-Driven SD-WAN Will Optimize User Experiences Across a Distributed Enterprise

PUBLISHED: Mon, 04 Jan 2021 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Software-defined WAN is a powerful platform for network transformation, but it also introduces tremendous complexity. To ensure that SD-WAN can optimize user experiences, IT organizations must implement a solution that provides AI-driven operations with end-to-end visibility from the client to the cloud. This white paper explores the roots of SD-WAN complexity and how one should counter it with AI-driven operations.



AI & ML: Driving the Next Generation of Innovation in DevOps and Event & Incident Management

PUBLISHED: Wed, 30 Dec 2020 00:00:00 +0000
AUTHOR: Steve Hendrick

The reality of artificial intelligence and machine learning (AI/ML) is being made possible by the evolution of technologies associated with big data, analytics, advanced analytics, operations research, data science, cloud computing, microservices, and decision science. AI and ML are just the most recent chapters in the amalgamation of computer science, mathematics, data management, and decision science.



Centerity at Work in Quick Service, Fine Dine, and Fast Casual Restaurants

PUBLISHED: Tue, 08 Dec 2020 00:00:00 +0000
AUTHOR: Valerie O'Connell

EMA recently had a spirited discussion with the head of WW Service Solutions for the hospitality business unit of a multi-billion-dollar managed service provider (MSP). This company specializes its outsourced services and support by verticals to provide end-to-end secure monitoring and managed service that is in-depth and business-aligned.



Advancing Privileged Access Management (PAM) to Address Modern Business Requirements: Summary

PUBLISHED: Tue, 08 Dec 2020 00:00:00 +0000
AUTHOR: Steve Brasen

This is the report summary for "Advancing Privileged Access Management (PAM) to Address Modern Business Requirements." 



Advancing Privileged Access Management (PAM) to Address Modern Business Requirements

PUBLISHED: Tue, 08 Dec 2020 00:00:00 +0000
AUTHOR: Steve Brasen

Security breaches of privileged accounts can be catastrophic to any business by allowing bad actors unfettered access to the company’s most sensitive data and IT systems. Related vulnerabilities have accelerated in recent years due to increased IT infrastructure complexities and broad distribution of business-critical services. To assist organizations with identifying the most effective methods for managing privileged access, EMA conducted primary, survey-based research into the real-world requirements, challenges, and management techniques employed for securing privileged access.



Distributed and Digitized Enterprises Require Edge Network Intelligence

PUBLISHED: Fri, 13 Nov 2020 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Technology innovations and business trends have made networks more complex and distributed than ever, and edge performance is essential to success. This Enterprise Management Associates (EMA) white paper explores why today’s network managers need visibility into the edge of their networks. It reviews the trends that drive this need and the requirements that network managers should consider when evaluating edge network intelligence solutions. Finally, it introduces VMware’s new Edge Network Intelligence solution.



AI & ML: Driving the Next Generation of Innovation in DevOps and Workload Automation

PUBLISHED: Thu, 12 Nov 2020 00:00:00 +0000
AUTHOR: Steve Hendrick

The reality of artificial intelligence and machine learning (AI/ML) is being made possible by the evolution of technologies associated with big data, analytics, advanced analytics, operations research, data science, cloud computing, microservices, and decision science. AI and ML are just the most recent chapters in the amalgamation of computer science, mathematics, data management, and decision science.



PUBLISHED: Fri, 06 Nov 2020 00:00:00 +0000
AUTHOR: Steve Brasen

End-user digital experience is at the cornerstone of every modern-day business. Every measure of business success (including profitability, performance, and productivity) is dependent on the effectiveness of the supporting workforce, and modern worker proficiency is derived from the efficient use of information technology (IT) tools and services. This EMA product comparison report provides a side-by-side comparison of leading DEM solutions, including 1E Tachyon, Aternity Digital Experience Management, Lakeside Software's SysTrack, and Nexthink Enterprise. 



The Value Stream Management Market: A Customer-Driven Evaluation of Products

PUBLISHED: Thu, 29 Oct 2020 00:00:00 +0000
AUTHOR: Steve Hendrick

This competitive analysis of the value stream management (VSM) market is unique in that it is 100% customer-driven. As part of EMA’s DevOps 2021 research study, respondents were asked a series of questions about the VSM market to help EMA understand what products were in use and how the enterprises that use them rated their enterprise value, product capabilities, and product satisfaction.



Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network Segmentation

PUBLISHED: Wed, 28 Oct 2020 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This Enterprise Management Associates (EMA) research report explores how IT organizations are using network technologies to support a Zero Trust security model. The report is based on a survey of 252 enterprise technology professionals with direct and relevant experience with these efforts. EMA focused its investigation primarily on secure remote access, network segmentation, and microsegmentation technologies. The research explores technology requirements, organizational strategies, and best practices. It also examines how the COVID-19 pandemic has impacted these Zero Trust initiatives.



PUBLISHED: Tue, 20 Oct 2020 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Wide-area network (WAN) transformation is forcing network architects to rethink the edge of their networks. Today’s enterprises need a WAN edge platform that is multi-cloud ready, resilient, open, and programmable. This white paper looks at the trends driving change at the WAN edge, and the requirements enterprises should set for their WAN edge platforms. Finally, it introduces the Cisco Catalyst 8000 Edge Platforms, a new family of solutions for tomorrow’s digital enterprise.



Automation and Orchestration to Help Bridge the IT Security Skills Gap: Seven Key Takeaways for Security Practitioners

PUBLISHED: Tue, 13 Oct 2020 00:00:00 +0000
AUTHOR: Paula Musich

In June 2020, Enterprise Management Associates surveyed 200 IT security executives and contributors on the impact of the vast and growing IT security skills gap on their organizations’ ability to protect their digital assets from bad actors. Respondents represent organizations with at least 500 employees across a range of industries, with a primary focus on North American markets. They were queried about how automation and orchestration, in various forms, are helping alleviate issues caused directly or indirectly by that gap.



The State of Multi-Cloud, Hybrid Cloud, and the Data Center in 2020

PUBLISHED: Tue, 29 Sep 2020 00:00:00 +0000
AUTHOR: Torsten Volk

Hybrid multi-cloud describes today’s reality of enterprises leveraging infrastructure and platform services from their traditional corporate data center, colocation hosting providers, and public clouds to deploy, run, and continuously enhance their individual mix of traditional and modern applications. All of these enterprises aim to achieve one central goal: eliminating the “vicious rectangle” that describes the tradeoff between software cost, quality, speed, and innovation. Hybrid multi-cloud provides the “toolbox” for developers, DevOps teams, and site reliability engineers (SRE) to achieve all four of these goals at the same time.



PUBLISHED: Mon, 14 Sep 2020 00:00:00 +0000
AUTHOR: Torsten Volk

Business success directly depends on an organization’s ability to identify and respond to customer needs earlier and more cost-efficiently than the competition. Busting the traditional vicious rectangle that forces enterprises into a tradeoff between speed, quality, cost, and innovation is critical. Typically, enterprises follow the standard playbook for digital transformation, adopting a similar set of modern technologies, tools, and metrics, all focused on developing and operating better software at a lower cost. However, after a seemingly successful implementation effort of these measures, many organizations have experienced a lack of correlation between these success metrics and increased business success.



Streamlining IT Operations: Bridging the Gap Between IT Effectiveness and Cost-Efficiencies

PUBLISHED: Mon, 14 Sep 2020 00:00:00 +0000
AUTHOR: Steve Brasen

The backbone of any modern-day enterprise is the successful delivery of IT services that empower workforces and drive business performance. Unfortunately, the implementation, maintenance, and end-user support requirements for delivering IT services that are essential for driving business performance typically come with a hefty price tag. Significant changes in business requirements and service delivery models introduced over the last decade or so have only served to accelerate demands on IT budgets.



EMA Radar Report: AIOps - A Guide for Investing in Innovation

PUBLISHED: Thu, 10 Sep 2020 00:00:00 +0000
AUTHOR: Dennis Drogseth

The EMA Radar Report delivers an in-depth analysis of industry leading vendors and vendor products, including their overall market position in comparison with other vendors. This information is laid out in an easy-to-decipher, detailed market map and Radar Chart – which includes a composite score for each vendor – making it simple to see how vendors measure up in the market, as well as against other vendors. The EMA Radar Report also provides a detailed discussion of methodology and criteria, a high-level market segment overview, a comprehensive analyst write-up on each vendor, and more.



EMA Radar Report Summary: AIOps - A Guide for Investing in Innovation

PUBLISHED: Thu, 10 Sep 2020 00:00:00 +0000
AUTHOR: Dennis Drogseth

This is the summary for the EMA 2020 Radar Report "AIOps: A Guide for Investing in Innovation" 



Extend Network Performance Monitoring to the Home Office with NetBeez Work-From-Home Agent

PUBLISHED: Tue, 01 Sep 2020 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Enterprises have experienced a massive surge in employees who are working from home due to the COVID-19 pandemic. Enterprise Management Associates (EMA) has observed enterprises realigning their network architecture by scaling up VPN capacity and expanding their use of the cloud for application delivery. EMA has also observed a commensurate realignment of operational monitoring tools to support this new architecture. More importantly, EMA projects that this surge of remote workers is somewhat permanent.



The Test Environment Management Market: A Customer-Driven Evaluation of Products

PUBLISHED: Fri, 28 Aug 2020 00:00:00 +0000
AUTHOR: Steve Hendrick

This competitive analysis of the test environment management (TEM) market is unique in that it is 100% customer-driven. In EMA’s DevOps 2021 research study, there was a series of questions about the TEM market to reveal what products were in use and how the enterprises that use them rate their enterprise value, product capabilities, and product satisfaction.



How Automation and Orchestration can Help Bridge the IT Security Skills Gap

PUBLISHED: Wed, 26 Aug 2020 00:00:00 +0000
AUTHOR: Paula Musich

The shortage of skilled information security practitioners continues to grow around the globe. In the US, for organizations with at least 500 employees, Enterprise Management Associates found in a June 2020 survey that the average number of open positions enterprises are trying to fill is 1,324. For the largest percentage of respondents in this EMA survey, that number increased between 1% and 25% over the last year, although that increase is higher for large enterprises.



Using Compliance Budgets to Build a Red Team Capability

PUBLISHED: Fri, 21 Aug 2020 00:00:00 +0000
AUTHOR: Chris Steffen

Regardless of the industry vertical, all businesses are required to deal with a certain amount of regulatory compliance. For information security leaders, the best solution is to partner with compliance/risk/governance teams to address compliance control gaps while increasing the company’s overall security. One of the best approaches to this solution is to implement security solutions that directly address remediation items from a control gap list or by finding dual-purpose security solutions that solve a compliance-related challenge while augmenting security capabilities. Red team solutions address these concerns: improving security by continuously attacking a company’s infrastructure, while also providing continuous compliance assessments and due diligence to the company’s auditors and risk managers.



A Strategic Guide for Transitioning to Adaptive Access Management

PUBLISHED: Wed, 19 Aug 2020 00:00:00 +0000
AUTHOR: Steve Brasen

There can be no doubt that enterprise access requirements have radically changed in recent years. Workforces are more mobile than ever before, and the COVID-19 pandemic has irrevocably accelerated remote work requirements and related challenges. The IT resources users access are no longer sequestered on secure business networks, but instead are distributed across a wide variety of public and private cloud and web services. Enterprise requirements to move to cloud infrastructures have broken down traditional security approaches. Additionally, digital transformation is driving increased user expectations for higher fidelity and lower-friction experiences.



EMA Evaluation Guide to Privileged Access Management (PAM)

PUBLISHED: Fri, 14 Aug 2020 00:00:00 +0000
AUTHOR: Steve Brasen

Enterprise IT and security management are broadly dependent on the availability of privileged accounts that enable administrators and authorized users to install, configure, monitor, secure, and repair the IT systems that are the lifeblood of business operations. Anyone able to attain privileged access is granted unfettered access to view and change the company’s most sensitive and valuable systems, data, and applications, and governing this access is relegated to the practice of privileged access management (PAM). According to EMA primary research, 79% of organizations consider PAM to be very important or critical to their business operations, and the discipline is an essential component of any enterprise security strategy.



Paessler PRTG Enterprise Monitor Solves the NetOps Requirements of Large Networks

PUBLISHED: Wed, 12 Aug 2020 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This white paper reviews many of the critical requirements that large enterprises have for their network operations tools, as identified by years of research by Enterprise Management Associates. This paper examines how Paessler’s new solution, PRTG Enterprise Monitor, is a proven network monitoring platform that has been enhanced to address the network management tool requirements of larger enterprises.



Overcoming the Challenges of Modern, Multi-Modal CDC

PUBLISHED: Tue, 11 Aug 2020 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - John Santaferraro

This modern digital world changes the requirements for platforms that interconnect complex data ecosystems for the purpose of interoperability. The need for immediate, intelligent responses to business events is now paramount. Leading organizations are already utilizing streaming change data capture technology to capture, transform, and ingest data into both data lakes and analytic warehouses.



Digital Transformation, Analytics, and the Modern C-Suite: Research Report Summary

PUBLISHED: Tue, 04 Aug 2020 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - John Santaferraro

The purpose of this research is to identify the characteristics, priorities, and best practices of senior executive teams that are ahead of the digital transformation game and already using analytics as a strategic weapon to disrupt their industries and gain an unfair advantage. To better understand what is happening with digital transformation, analytics, and the modern C-suite, EMA restricted this research to C-level executives only.



Driving Cost Savings with Event Streaming: A Look at Business and Digital Strategies Impacted by COVID-19

PUBLISHED: Tue, 04 Aug 2020 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - John Santaferraro

The moment governments instituted COVID-19 lockdowns, every digital business model created before the pandemic was put to the test. Within days, they were either proven or found wanting. EMA research conducted with IT and business leaders reveals a shift in priorities that creates the perfect opportunity to reignite digital strategies with intelligent responses to real-time business events.



Outpace the Competition: Optimize Cost, Speed, and Quality Through Hybrid Cloud Automation and Self-Service

PUBLISHED: Tue, 04 Aug 2020 00:00:00 +0000
AUTHOR: Torsten Volk

Relying on developers and corporate IT to complete a vast range of manual tasks for application deployment and day 2 operations limits the organization’s ability to release new software features at the required pace and forces executives into tradeoffs between speed, quality, cost, and innovation.



Automation Intelligence: A Holistic View to Improve Business Outcomes

PUBLISHED: Tue, 21 Jul 2020 00:00:00 +0000
AUTHOR: Dan Twing

Automation is critical to modern IT operations. Workload automation (WLA) software is one of the critical tools required to run an effective IT operation. Large enterprises often have multiple WLA solutions, which makes it difficult to create a holistic, end-to-end view of workload health and outcomes, and to see and resolve problems as they develop. This paper discusses automation intelligence solutions that can collect data from disparate WLA tools, combine the data, and analyze this data to predict outcomes, identify problems as they develop, and provide prescriptive suggestions to resolve developing problems quickly. Changes to the operating model for IT and benefits of automation intelligence are reviewed.



The Race for a Unified Analytics Warehouse

PUBLISHED: Tue, 21 Jul 2020 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - John Santaferraro

The race for a unified analytics warehouse is on. The data warehouse has been around for almost three decades. Shortly after big data platforms were introduced in the late 2000s, there was talk that the data warehouse was dead—but it never went away. When big data platform vendors realized that the data warehouse was here to stay, they started building databases on top of their file system and conceptualizing a data lake that would replace the data warehouse. It never did.



Selecting a Network Performance Management Platform for Your Digital Future

PUBLISHED: Thu, 09 Jul 2020 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Enterprises need to expand and modernize their network performance management tools. Many IT operations teams have tools that can monitor infrastructure, but they don’t have a good view of network traffic. This lack of traffic insight constrains their ability to understand network performance. These enterprises also use tools that lack well-defined workflows and support for cross-IT collaboration. All of these tool gaps limit the ability of an IT operations team to monitor and troubleshoot application performance and end-user experience.



EMA Top 3 Report: Ten Priorities for Enabling Secure Access to Enterprise IT Services

PUBLISHED: Tue, 07 Jul 2020 00:00:00 +0000
AUTHOR: Steve Brasen

Enterprise productivity, profitability, and success in meeting business objectives are dependent on the ability of workforces to access and utilize the applications, data, email, and other IT services necessary to complete job tasks. However, pressures to give an increasingly mobile workforce access to IT services distributed across a variety of public and private hosting environments have significantly challenged organizations. This Enterprise Management Associates (EMA) decision guide is intended to provide actionable advice on the best practices and solutions organizations should adopt to empower end-user productivity while minimizing risk profiles when enabling secure access to business IT resources.



Selecting a Managed Detection and Response Service: What Clients Think and Prospects Want

PUBLISHED: Tue, 30 Jun 2020 00:00:00 +0000
AUTHOR: Paula Musich

Organizations large and not so large are waking up to the need to find expert help in managing the process of hunting down and remediating threats within their IT infrastructure. As threats continue to evolve, IT security practitioners accept that their networks and infrastructure have already been compromised. It is critical now to find those threats and shut them down before they do serious damage. The IT security skills gap has contributed to the need for more threat hunting expertise than many organizations can muster.



PUBLISHED: Tue, 30 Jun 2020 00:00:00 +0000
AUTHOR: Paula Musich

Visions of a largescale SOC—fully staffed with dozens of threat hunters quietly and efficiently investigating a well-organized and correlated set of events—dance in the heads of many CISOs. The reality for most IT and IT security executives is far from that vision, however. For most, it looks a lot more like a war zone: chaotic, disorganized, and staffed by a less than optimal number of security professionals tasked not only with threat hunting, but a variety of other security-related functions. 



Recognizing the Full Value of Event Streaming: Beyond Messaging to Meaning

PUBLISHED: Mon, 29 Jun 2020 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - John Santaferraro

In the post-pandemic business environment, digital capabilities will define the future. Global lockdowns and stay-at-home orders put every organization to the test. Many leaders grew tired of the term “digital transformation” and claimed it was old news. However, within a week of the shutdown, every digital business model either failed or proved its resiliency in the new marketplace. As a result, organizations are looking for ways to put insight into the hands of more of their workforce and enable immediate responses to business events.



IBM Encryption Everywhere: Maintaining Data Protection in a Hybrid, Multi-Cloud World

PUBLISHED: Thu, 25 Jun 2020 00:00:00 +0000
AUTHOR: Paula Musich

Digital collaboration and its inherent data sharing are a fact of life within the modern, cloud-connected enterprise. The traditional assumption of trust given to appropriately credentialed employees and contractors operating within the enterprise’s hardened perimeter has been extended to modern, cloud-based architectures.



Application Delivery Infrastructure for Multi-Cloud Enterprises

PUBLISHED: Tue, 23 Jun 2020 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

This Enterprise Management Associates research report explores the state of the art of application delivery infrastructure. Based on a survey of 253 subject matter experts who work for enterprises and cloud providers, the report identifies emerging strategies and technology requirements for load balancers, application delivery controllers, and cloud-native software, such as service mesh.



EMA Top 3 Enterprise Decision Guide 2020: Data-Driven Guidance for Product Evaluation in DevOps, SRE, IT Operations, and Business

PUBLISHED: Tue, 23 Jun 2020 00:00:00 +0000
AUTHOR: Torsten Volk

This EMA Top 3 product guide views, identifies, and categorizes the key pain points for today’s essential personas in business, software development, and corporate IT.



Six Principles of Modern, Multi-Modal Change Data Capture

PUBLISHED: Thu, 11 Jun 2020 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - John Santaferraro

Older data ingestion technology originally built for on-premises batch processing cannot keep up with the speed, agility, and reliability required for modern, real-time applications. Additionally, the move to SaaS applications and the cloud requires new approaches to change data capture, data lake ingestion, and data warehouse management.



Modern Data Integration: Managing a Complex Portfolio of Data Pipelines

PUBLISHED: Tue, 02 Jun 2020 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - John Santaferraro

Digital transformation is producing massive new data and pushing data consumption requirements to real time. Mobile, SaaS, and IoT expansion are testing the boundaries of legacy technology. The increase in the speed of insight-driven business requires data feeds from transactions, applications, APIs, service providers, data providers, and devices of every kind. Complex ecosystems like supply chains, social networks, and healthcare take integration push requirements even further.



PUBLISHED: Tue, 02 Jun 2020 00:00:00 +0000
AUTHOR: ~Former EMA Analyst - John Santaferraro

In the post-COVID business environment, digital capabilities will define the future. Global lockdowns and stay-at-home orders put every organization to the test. Many leaders tired of the term “digital transformation” and claimed it was old news. However, within a week of the shutdown, every digital business model either failed or proved its resiliency in the new marketplace. As a result, organizations are looking for ways to put intelligent automation in the hands of more of their workforces and continually improve business outcomes.



PUBLISHED: Tue, 02 Jun 2020 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Network packet brokers are essential to network visibility in today’s data center. EMA research has found a strong correlation between packet broker adoption and network operations success. This white paper draws on cutting-edge industry research to explain why these devices are so important to the modern network operations team.



Tomorrow-Ready ITSM

PUBLISHED: Fri, 22 May 2020 00:00:00 +0000
AUTHOR: Valerie O'Connell

Overnight, ITSM organizations aimed existing platforms, people, and processes at the moving target of unprecedented and unpredictable change. Their aim has been surprisingly good. Although there have been some public glitches, the move from fire drill to productivity has largely avoided chaos as an interim step—but success has been neither universal nor smooth.



A Network Source of Truth Promotes Trust in Network Automation

PUBLISHED: Wed, 20 May 2020 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

Many network engineers distrust network automation. One reason for this distrust is a lack of insight into network intent and network state. An authoritative source of truth about the network, with intent and state data, can reverse this lack of trust and lead to network automation success. This white paper draws on market-defining research by Enterprise Management Associates to explore how IT organizations can establish a source of network truth to drive a successful network automation pipeline.



From Good to Great: How Expanded Capabilities in Modern Automation Tools Keep Operations Strong

PUBLISHED: Mon, 18 May 2020 00:00:00 +0000
AUTHOR: Dan Twing

Automation is critical to modern information technology (IT) operations. Workload automation (WLA) software is essential to daily processing of core business activities. However, organizations often keep the use of these tools confined to specific use cases or silos. Radical changes to IT infrastructure and operations (I&O), including cloud computing and increased emphasis on digital transformation, have increased the risk of these kinds of status quo operations. This paper explores these challenges and the options to modernize and expand crucial IT management using modern WLA solutions for enterprise-wide process automation.



Trusting Passwords: Best Practices for Threat-Proofing Credentials

PUBLISHED: Fri, 15 May 2020 00:00:00 +0000
AUTHOR: Steve Brasen

According to EMA primary research, passwords continue to be employed as the dominant method of authentication for accessing business IT resources, including applications, data, and other IT services. Building on a legacy that dates back to the early days of computing, passwords are ubiquitous across all types and sizes of organizations and are a key instrument for empowering workforces with responsible access to the information and resources they need to drive business success.



Upgrading Your Network Operations Platform for the Digital Future

PUBLISHED: Wed, 13 May 2020 00:00:00 +0000
AUTHOR: Shamus McGillicuddy

As enterprises move toward a digital future, business leaders recognize quickly that the network is critical to success. The network operations team must optimize tools and processes to ensure the network can successfully deliver digital services.


     

Subscribe Now!

Subscribe with Netvibes

follow us in feedly

EMA on Facebook   EMA on LinkedIn   EMA on Twitter   EMA RSS   EMA on YouTube

©1996-2021 Enterprise Management Associates, Inc. All rights reserved.
EMA™, ENTERPRISE MANAGEMENT ASSOCIATES®, and the mobius symbol are registered trademarks or common-law trademarks of Enterprise Management Associates, Inc.
Site Terms & Conditions | Integrity Policy | Site Map | My Account
Hide
Subscribe to EMA RSS Feed
Email
Show