Securing Cloud Assets: How IT Security Pros Grade Their Own Progress
02/03/2021
Category: Research ReportTrying to gauge where organizations are in their journey to secure cloud-based assets is akin to answering the basic questions necessary in a news story: the who, what, when, where, how, and why of cloud security.
Analyst

EMA
Other Resources:
See All Resources
Research Report 02/02/2026
Navigating the Identity Crisis: A Data-Driven Analysis of IGA Maturity, Risks, and Future Roadmaps
This research report from Enterprise Management Associates (EMA) provides a comprehensive analysis o...By Ken Buckler

Research Report 01/21/2026
AI-Driven NetOps: How Enterprises are Embracing Intelligent Network Management Solutions: Summary
This is the research summary for EMA’s recent report, “AI-Driven NetOps: How Enterprises are Embraci...
Research Report 01/16/2026
AI-Driven NetOps: How Enterprises are Embracing Intelligent Network Management Solutions
This market research explores how IT organizations plan to use artificial intelligence to optimize, ...
Research Report 12/08/2025
The Network Source of Truth: How Engineering Teams Establish and Use These Critical Tools
Over the last decade, a new class of management tool, the network source of truth (NSoT), slowly eme...
Featured 11/24/2025
Redefining Modern Service Management: ServiceOps, ESM, and the Rise of AI-Powered Services
Discover how IT service delivery is shifting from reactive support to a predictive, intelligence-dri...
Research Report 11/05/2025
AI in DevOps: Adoption Outpaces Governance as Developer Role Evolves
AI is transforming software development from the inside out. Developers are using AI-powered assista...By Dan Twing

Research Report 10/02/2025
Enterprises Embrace AI-Driven Wi-Fi to Meet Today’s Network Demands
Enterprises are changing the way they use Wi-Fi networks, and that change is kicking off a wave of i...
Research Report 09/08/2025
Modernizing Mainframe Applications: Strategies, Tools, and Insights for a Digital Future
Mainframe modernization has become a critical priority for organizations navigating the challenges o...By Dan Twing

Research Report 09/05/2025
The Network Observability Maturity Model: How to Plan for NetOps Excellence
Given the critical role that network observability tools play, network team must strive for best-in-...
Research Report 08/11/2025
Cloud Network Traffic Data: Empowering Network and Security Operations in the Hybrid, Multi-Cloud Era
This research, based on a survey of 250 enterprise IT and cybersecurity personnel, explores how ente...Other by this analyst:

Research Report 02/24/2022
The Threat From Within: Strategies to Defend Against a Growing Threat Vector
Threat researchers continue to document a disturbing shift in the source of big, expensive data brea...By EMA

Research Report 09/30/2021
The Rise of Active Directory Exploits: ls it Time to Sound the Alarm?
For years, Active Directory has been a prime target for attackers looking to get a leg up into high-...By EMA

Research Report 04/27/2021
Navigating the Complexity of Hybrid Data Ecosystems: A Look at How to Modernize with Connected, Real-Time Intelligence
The 2020 global pandemic created a digital reset, causing leaders to make digital superiority a real...By EMA

Research Report 02/16/2021
Availability and Buying Options in the Emerging SASE Market
The opportunity described by Gartner analysts as secure access service edge, or SASE, is at this poi...By EMA