Insights
Analysts
Coverage Areas
Rick Sturm
Founder and CEO
Rick Sturm
Chris Steffen
Vice President of Research – Information Security
Chris Steffen
Shamus McGillicuddy
Vice President of Research
Shamus McGillicuddy
Dennis Drogseth
Vice President of Research (Emeritus)
Dennis Drogseth
Dan Twing
President and COO
Dan Twing
Ken Buckler
Research Director
Ken Buckler
Valerie O’Connell
Research Director
Valerie O’Connell
Cloud Development
Methodologies to create, deploy, and manage apps in the cloud
Cloud Development
Cloud Management
Strategies to manage cloud computing resources and services
Cloud Management
IT Service / Operations
Tech-driven unification of IT service and ops management
IT Service / Operations
Information Security, Risk, Compliance Management
Managing risk within business-defined boundaries
Information Security, Risk, Compliance Management
Intelligent Automation
A holistic solution for digital transformation
Intelligent Automation
Network Infrastructure/Operations
The process by which orgs design, build, and manage networks
Network Infrastructure/Operations
Services
IT Vendors Services
IT Buyers Services
Blog
Insights and trends across IT and security
Blog
Case Studies
Elevate case studies with expert research insights
Case Studies
Custom Research
Expert-led custom research projects
Custom Research
E-books
Engage buyers with research-backed eBook content
E-books
Infographics
Visualize IT insights with research-backed infographics
EMA Infographics
Podcasts
Engage audiences with expert-led podcasts
EMA Podcasts
Products to Watch
Helps IT pros identify the most valuable tools in their respective fields
EMA Products to Watch
Speaking Engagements
Enhance events with expert industry analysts
Speaking Engagement
Sponsored Research
Sponsor research to gain insights and drive ROI
Sponsored Research
Vendors to Watch
Discover innovative vendors with Vendors to Watch
EMA Vendors to Watch
Videos
Create impactful, research-backed videos
EMA Videos
Webinars
Expert-led, turnkey events with lead generation
EMA Webinars
White Papers
Boost white paper credibility with trusted insights
EMA White Papers
Advisory Services
Resource library access with customizable analyst hours
Advisory Services
Consulting
Proven research methodologies plus industry expertise
EMA Consulting Services
Premium Research Subscription
Full access to all end-user content in the resource library
Premium Research Subscription
Newsroom
Press Release
Articles
EMA in the News
Newsletters
Resource Library
About EMA
Contact Us
Shopping Cart
No products in the cart.
Log in
Register
Shopping Cart
No products in the cart.
Search for:
Insights
Analysts
Dan Twing
Shamus McGillicuddy
Ken Buckler
Valerie O’Connell
Chris Steffen
Coverage Areas
Cloud Development
Cloud Management
IT Service / Operations
Information Security, Risk, and Compliance Management
Intelligent Automation
Network Infrastructure and Operations
Services
IT Vendors Services
Blogs
Case Studies
Custom Research
E-books
Infographics
Speaking Engagement
Sponsored Research
Podcasts
Videos
Vendors to Watch
Webinars
White Papers
Advisory & Research Subscription Packages
Products to Watch
Market Acceleration Bundles
IT Buyers Services
Advisory Services
Consulting
Premium Research Subscription
Newsroom
Articles
Press Release
EMA in the News
Newsletters
Resource Library
About EMA
Contact Us
Search for:
Discover our expertise areas
At Enterprise Management Associates (EMA), we specialize in providing cutting edge research and expert insights across a wide range of critical areas.
Filters
Search by keyword
Asset Type
Coverage Area
Analyst
Access Level
Date Range
More Filters
Filters
{content}
Research Report
10/25/2022
Network Observability: Delivering Actionable Insights to Network Operations
The tools that enterprises use to monitor and manage their networks are under a harsh spotlight toda...
By
Shamus McGillicuddy
Research Report
02/24/2022
The Threat From Within: Strategies to Defend Against a Growing Threat Vector
Threat researchers continue to document a disturbing shift in the source of big, expensive data brea...
By
EMA
Research Report
09/30/2021
The Rise of Active Directory Exploits: ls it Time to Sound the Alarm?
For years, Active Directory has been a prime target for attackers looking to get a leg up into high-...
By
EMA
Research Report
04/27/2021
Navigating the Complexity of Hybrid Data Ecosystems: A Look at How to Modernize with Connected, Real-Time Intelligence
The 2020 global pandemic created a digital reset, causing leaders to make digital superiority a real...
By
EMA
Research Report
02/16/2021
Availability and Buying Options in the Emerging SASE Market
The opportunity described by Gartner analysts as secure access service edge, or SASE, is at this poi...
By
EMA
Research Report
02/03/2021
Securing Cloud Assets: How IT Security Pros Grade Their Own Progress
Trying to gauge where organizations are in their journey to secure cloud-based assets is akin to ans...
By
EMA
Research Report
08/26/2020
How Automation and Orchestration can Help Bridge the IT Security Skills Gap
The shortage of skilled information security practitioners continues to grow around the globe. In th...
By
EMA
Research Report
08/04/2020
Digital Transformation, Analytics, and the Modern C-Suite: Research Report Summary
The purpose of this research is to identify the characteristics, priorities, and best practices of s...
By
EMA
Research Report
06/02/2020
Modern Data Integration: Managing a Complex Portfolio of Data Pipelines
Digital transformation is producing massive new data and pushing data consumption requirements to re...
By
EMA
Research Report
05/11/2020
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs and the Platforms That Enable MDR Services
Although small now, the market for managed threat detection and response services commands great int...
By
EMA
Research Report
02/03/2020
The Imitation Game: Detecting and Thwarting Automated Bot Attacks
IT executives, contributors, and IT security teams in a range of industries understand that their gr...
By
EMA
Research Report
10/07/2019
Ten Priorities for Better Endpoint Defense in 2019: An EMA Top 3 Report and Decision Guide
This report is a time-saving guide for those looking to invest in endpoint defense for the first tim...
By
EMA
Research Report
10/04/2019
How Using Security Orchestration, Automation, and Response Tools Makes Life Easier…and More Difficult
The need for automation in security operations is widely apparent. In EMA’s security orchestra...
By
EMA
Research Report
09/11/2019
Innovation in the Use of Artificial Intelligence and Machine Learning for Data Integration and Preparation
CIOs, CDOs, CAOs, data integration and preparation leaders, analytics leaders, business analysts, an...
By
EMA
Research Report
09/11/2019
Innovation in the Use of Artificial Intelligence and Machine Learning for Metadata Services
CIOs, CDOs, CAOs, metadata leaders, data governance leaders, analytics leaders, business analysts, a...
By
EMA
Research Report
08/15/2019
A Definitive Market Guide to Deception Technology
The use of deception technology designed to throw off stealthy attackers from real assets and gather...
By
EMA
Research Report
07/30/2019
Top 3: Innovation in the Use of Artificial Intelligence and Machine Learning for Business Intelligence
Leaders who are guiding their organizations on a journey toward the insight-driven enterprise strugg...
By
EMA
Research Report
07/30/2019
Modernization and the Operation of Hybrid Data Ecosystems
Digital leaders guide their organizations on a journey toward the insight-driven enterprise, but str...
By
EMA