Insights
Analysts
Coverage Areas
Rick Sturm
Founder and CEO
Rick Sturm
Chris Steffen
Vice President of Research – Information Security
Chris Steffen
Shamus McGillicuddy
Vice President of Research
Shamus McGillicuddy
Dennis Drogseth
Vice President of Research (Emeritus)
Dennis Drogseth
Dan Twing
President and COO
Dan Twing
Ken Buckler
Research Director
Ken Buckler
Valerie O’Connell
Research Director
Valerie O’Connell
Cloud Development
Methodologies to create, deploy, and manage apps in the cloud
Cloud Development
Cloud Management
Strategies to manage cloud computing resources and services
Cloud Management
IT Service / Operations
Tech-driven unification of IT service and ops management
IT Service / Operations
Information Security, Risk, Compliance Management
Managing risk within business-defined boundaries
Information Security, Risk, Compliance Management
Intelligent Automation
A holistic solution for digital transformation
Intelligent Automation
Network Infrastructure/Operations
The process by which orgs design, build, and manage networks
Network Infrastructure/Operations
Services
IT Vendors Services
IT Buyers Services
Blog
Insights and trends across IT and security
Blog
Case Studies
Elevate case studies with expert research insights
Case Studies
Custom Research
Expert-led custom research projects
Custom Research
E-books
Engage buyers with research-backed eBook content
E-books
Infographics
Visualize IT insights with research-backed infographics
EMA Infographics
Podcasts
Engage audiences with expert-led podcasts
EMA Podcasts
Products to Watch
Helps IT pros identify the most valuable tools in their respective fields
EMA Products to Watch
Speaking Engagements
Enhance events with expert industry analysts
Speaking Engagement
Sponsored Research
Sponsor research to gain insights and drive ROI
Sponsored Research
Vendors to Watch
Discover innovative vendors with Vendors to Watch
EMA Vendors to Watch
Videos
Create impactful, research-backed videos
EMA Videos
Webinars
Expert-led, turnkey events with lead generation
EMA Webinars
White Papers
Boost white paper credibility with trusted insights
EMA White Papers
Advisory Services
Resource library access with customizable analyst hours
Advisory Services
Consulting
Proven research methodologies plus industry expertise
EMA Consulting Services
Premium Research Subscription
Full access to all end-user content in the resource library
Premium Research Subscription
Newsroom
Press Release
Articles
EMA in the News
Newsletters
Resource Library
About EMA
Contact Us
Shopping Cart
No products in the cart.
Log in
Register
Shopping Cart
No products in the cart.
Search for:
Insights
Analysts
Dan Twing
Shamus McGillicuddy
Ken Buckler
Valerie O’Connell
Chris Steffen
Coverage Areas
Cloud Development
Cloud Management
IT Service / Operations
Information Security, Risk, and Compliance Management
Intelligent Automation
Network Infrastructure and Operations
Services
IT Vendors Services
Blogs
Case Studies
Custom Research
E-books
Infographics
Speaking Engagement
Sponsored Research
Podcasts
Videos
Vendors to Watch
Webinars
White Papers
Advisory & Research Subscription Packages
Products to Watch
Market Acceleration Bundles
IT Buyers Services
Advisory Services
Consulting
Premium Research Subscription
Newsroom
Articles
Press Release
EMA in the News
Newsletters
Resource Library
About EMA
Contact Us
Search for:
Discover our expertise areas
At Enterprise Management Associates (EMA), we specialize in providing cutting edge research and expert insights across a wide range of critical areas.
Filters
Search by keyword
Asset Type
Coverage Area
Analyst
Access Level
Date Range
More Filters
Filters
{content}
Research Report
11/15/2023
Transcending Passwords: The Next Generation of Authentication
Emerging requirements for achieving security assurance in the face of accelerating threats, enhancin...
By
Steve Brasen
Research Report
04/17/2023
Identity Management Buyer’s Guide for the SME: Comparing Okta Workforce Identity Against the JumpCloud Platform
Modern business success and growth are dependent on the effectiveness of identity management technol...
By
Steve Brasen
Research Report
11/08/2022
The Rise of Low-Friction Access: Emerging Requirements and Solutions for Boosting Workforce Productivity and Security Assurance
Driven by accelerating IT security threats, increased requirements to support remote workforces, the...
By
Steve Brasen
Research Report
10/12/2021
Identifying Effective Digital Employee Experience (DEX) Management Solutions: A Quantitative Analysis
In recognition of the importance of improving workforce productivity, businesses have increasingly i...
By
Steve Brasen
Research Report
07/07/2021
Consumer Identity and Access Management (CIAM): Responsible Solutions for Creating Positive Consumer Experiences
Modern business success, by any measure, is reliant on the positive experiences of consumers during ...
By
Steve Brasen
Research Report
12/08/2020
Advancing Privileged Access Management (PAM) to Address Modern Business Requirements: Summary
This is the report summary for "Advancing Privileged Access Management (PAM) to Address Modern ...
By
Steve Brasen
Research Report
12/08/2020
Advancing Privileged Access Management (PAM) to Address Modern Business Requirements
Security breaches of privileged accounts can be catastrophic to any business by allowing bad actors ...
By
Steve Brasen
Research Report
07/07/2020
EMA Top 3 Report: Ten Priorities for Enabling Secure Access to Enterprise IT Services
Enterprise productivity, profitability, and success in meeting business objectives are dependent on ...
By
Steve Brasen
Research Report
03/03/2020
Contextual Awareness: Advancing Identity and Access Management to the Next Level of Security Effectiveness
The primary focus of modern identity and access management (IAM) practices is to responsibly enable ...
By
Steve Brasen
Research Report
03/03/2020
Contextual Awareness: Advancing Identity and Access Management to the Next Level of Security Effectiveness Summary
Summary for the Contextual Awareness research report.
By
Steve Brasen
Research Report
11/06/2019
Ten Priorities for Endpoint Management in 2019: An EMA Top 3 Report and Decision Guide
Business performance and success are dependent on the ability of a company’s workforce to effe...
By
Steve Brasen
Research Report
10/30/2019
Achieving Effective Identity and Access Governance
To address increased requirements for security assurance and IT service availability, identity and a...
By
Steve Brasen
Research Report
07/01/2019
Passwordless Authentication: Bridging the Gap Between High-Security and Low-Friction Identity Management
Today’s enterprise IT services continue to be broadly reliant on antiquated, ineffective, and ...
By
Steve Brasen
Research Report
03/29/2019
Ten Priorities for Identity Management in 2019: An EMA Top 3 Report and Decision Guide
Identity management is the first line of defense for protecting sensitive business resources from in...
By
Steve Brasen
Research Report
09/05/2018
Responsible User Empowerment: Enabling Privileged Access Management (PAM)
Today's tech-oriented workforces are more knowledgeable and capable with utilizing enterprise IT dev...
By
Steve Brasen
Research Report
09/05/2018
Report Summary – Responsible User Empowerment: Enabling Privileged Access Management (PAM)
Summary document of the EMA research report, "Responsible User Empowerment: Enabling Privi...
By
Steve Brasen
Research Report
07/24/2018
EMA Top 3 Report: Ten Priorities for Enabling Secure Access to Enterprise IT Services
Enterprise productivity, profitability, and success in meeting business objectives are dependent on ...
By
Steve Brasen
Research Report
03/01/2018
Pragmatic Identity and Access Management
Today's business success is dependent on the secure availability of software resources, including ap...
By
Steve Brasen