Enterprise Strategy Group https://www.techtarget.com/esg-global/ Tue, 22 Oct 2024 18:44:34 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.2 https://www.techtarget.com/esg-global/wp-content/uploads/2023/10/cropped-favicon-1-32x32.png Enterprise Strategy Group https://www.techtarget.com/esg-global/ 32 32 Modernizing Application Security to Scale for Cloud-native Development https://www.techtarget.com/esg-global/survey-results/modernizing-application-security-to-scale-for-cloud-native-development/ Tue, 22 Oct 2024 18:44:29 +0000 https://www.techtarget.com/esg-global/?p=4399 This Complete Survey Results presentation focuses on application development trends driving the need to modernize associated cybersecurity programs, including the top challenges and incidents that application security teams have experienced with their current tools and processes. Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client […]

The post Modernizing Application Security to Scale for Cloud-native Development appeared first on Enterprise Strategy Group.

]]>
This Complete Survey Results presentation focuses on application development trends driving the need to modernize associated cybersecurity programs, including the top challenges and incidents that application security teams have experienced with their current tools and processes.

Already an Enterprise Strategy Group client? Log in to read the full report.

If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

The post Modernizing Application Security to Scale for Cloud-native Development appeared first on Enterprise Strategy Group.

]]>
Pure Aims to Reinvent File Storage for the Modern Era With Real-time Enterprise File https://www.techtarget.com/esg-global/research-brief/pure-aims-to-reinvent-file-storage-for-the-modern-era-with-real-time-enterprise-file/ Thu, 17 Oct 2024 16:38:58 +0000 https://www.techtarget.com/esg-global/?p=4393 Pure Storage has unveiled Real-time Enterprise File, a wide-ranging software update to its storage platform that enables IT organizations to better respond to the realities of managing modern file storage supporting demanding workloads such as AI, analytics, and VDI. The update is designed to enable customers to more quickly respond to changing application demands in […]

The post Pure Aims to Reinvent File Storage for the Modern Era With Real-time Enterprise File appeared first on Enterprise Strategy Group.

]]>
Pure Storage has unveiled Real-time Enterprise File, a wide-ranging software update to its storage platform that enables IT organizations to better respond to the realities of managing modern file storage supporting demanding workloads such as AI, analytics, and VDI. The update is designed to enable customers to more quickly respond to changing application demands in real time, while reducing total cost of ownership.

The post Pure Aims to Reinvent File Storage for the Modern Era With Real-time Enterprise File appeared first on Enterprise Strategy Group.

]]>
FIDO unveils new specifications to transfer passkeys https://www.techtarget.com/searchsecurity/news/366613642/FIDO-unveils-new-specifications-to-transfer-passkeys Thu, 17 Oct 2024 12:40:23 +0000 https://www.techtarget.com/esg-global/?p=4391 The post FIDO unveils new specifications to transfer passkeys appeared first on Enterprise Strategy Group.

]]>
The post FIDO unveils new specifications to transfer passkeys appeared first on Enterprise Strategy Group.

]]>
Simplifying Security Operations via Tool Consolidation https://www.techtarget.com/esg-global/research-brief/simplifying-security-operations-via-tool-consolidation/ Tue, 15 Oct 2024 16:26:40 +0000 https://www.techtarget.com/esg-global/?p=4377 It is a messy state of affairs when the tools purchased in support of security operations add excessive management overhead, stealing precious time away from the limited skilled security personnel that are so important to the overall security agenda. Recent research by TechTarget’s Enterprise Strategy Group found that security operations are continuing to become more […]

The post Simplifying Security Operations via Tool Consolidation appeared first on Enterprise Strategy Group.

]]>
It is a messy state of affairs when the tools purchased in support of security operations add excessive management overhead, stealing precious time away from the limited skilled security personnel that are so important to the overall security agenda. Recent research by TechTarget’s Enterprise Strategy Group found that security operations are continuing to become more difficult and are often made more so by an overabundance of point tools that burden cybersecurity staff with complexity. Consolidation initiatives are underway for most, but as IT innovations spur the need for new security tools, security leaders face a conundrum about how to get out of this cycle of complexity.

Already an Enterprise Strategy Group client? Log in to read the full report.

If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

The post Simplifying Security Operations via Tool Consolidation appeared first on Enterprise Strategy Group.

]]>
Streamlining Security Operations With Generative AI https://www.techtarget.com/esg-global/research-brief/streamlining-security-operations-with-generative-ai/ Tue, 15 Oct 2024 16:14:14 +0000 https://www.techtarget.com/esg-global/?p=4373 Virtually every business line is exploring and investing in generative AI (GenAI) to gain operational and competitive advantage. The realm of cybersecurity is no different, where security leaders are investing in GenAI to gain efficiencies in security operations (SecOps) in hopes of outmaneuvering their criminal adversaries—who are also likely pushing the limits of what GenAI […]

The post Streamlining Security Operations With Generative AI appeared first on Enterprise Strategy Group.

]]>
Virtually every business line is exploring and investing in generative AI (GenAI) to gain operational and competitive advantage. The realm of cybersecurity is no different, where security leaders are investing in GenAI to gain efficiencies in security operations (SecOps) in hopes of outmaneuvering their criminal adversaries—who are also likely pushing the limits of what GenAI can do to help achieve their means. Recent research by TechTarget’s Enterprise Strategy Group revealed that SecOps is ripe with opportunity for the use of GenAI, especially for organizations with certain characteristics.

Already an Enterprise Strategy Group client? Log in to read the full report.

If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

The post Streamlining Security Operations With Generative AI appeared first on Enterprise Strategy Group.

]]>
The Evolution of Network Security https://www.techtarget.com/esg-global/infographic/the-evolution-of-network-security-2/ Tue, 15 Oct 2024 16:00:11 +0000 https://www.techtarget.com/esg-global/?p=4367 As IT environments have grown more distributed and diverse, network security tools generally and firewalls specifically have become fragmented. Historically, the choice between CSP firewalls, cloud-native firewalls, and firewall capabilities from networking tools boiled down to ease of use and efficiency versus functionality and efficacy. However, organizations can no longer make tradeoffs. TechTarget’s Enterprise Strategy […]

The post The Evolution of Network Security appeared first on Enterprise Strategy Group.

]]>
As IT environments have grown more distributed and diverse, network security tools generally and firewalls specifically have become fragmented. Historically, the choice between CSP firewalls, cloud-native firewalls, and firewall capabilities from networking tools boiled down to ease of use and efficiency versus functionality and efficacy. However, organizations can no longer make tradeoffs. TechTarget’s Enterprise Strategy Group recently surveyed IT and cybersecurity professionals involved with network security technology and processes to gain insights into these trends.

To learn more about these trends, download the free infographic, The Evolution of Network Security.

The post The Evolution of Network Security appeared first on Enterprise Strategy Group.

]]>
HPE Private Cloud AI Available for Virtual Assistants https://www.techtarget.com/esg-global/research-brief/hpe-private-cloud-ai-available-for-virtual-assistants/ Fri, 11 Oct 2024 13:24:24 +0000 https://www.techtarget.com/esg-global/?p=4361 This month, HPE announced that its HPE Private Cloud AI is available to order. This new integrated and pre-validated solution combines hardware and software from both HPE and NVIDIA and it is designed to accelerate deployment of infrastructure for AI and shorten time to value for AI initiatives. The new solution accelerators give enterprises the […]

The post HPE Private Cloud AI Available for Virtual Assistants appeared first on Enterprise Strategy Group.

]]>
This month, HPE announced that its HPE Private Cloud AI is available to order. This new integrated and pre-validated solution combines hardware and software from both HPE and NVIDIA and it is designed to accelerate deployment of infrastructure for AI and shorten time to value for AI initiatives. The new solution accelerators give enterprises the ability to deploy virtual assistants with one click and operationalize them in seconds, simplifying the process from end to end.

To learn more, download the free brief, HPE Private Cloud AI Available for Virtual Assistants.

The post HPE Private Cloud AI Available for Virtual Assistants appeared first on Enterprise Strategy Group.

]]>
The Evolution of Network Security: What Security Teams Require From Firewalls in a Cloud-centric World https://www.techtarget.com/esg-global/research-report/the-evolution-of-network-security-what-security-teams-require-from-firewalls-in-a-cloud-centric-world/ Fri, 11 Oct 2024 13:08:48 +0000 https://www.techtarget.com/esg-global/?p=4358 As IT environments have grown more distributed and diverse, network security tools, generally, and firewalls, specifically, have become fragmented. The availability of CSP firewalls, cloud-native firewalls, and firewall capabilities from networking tools has created confusion in the market. Historically, the choice between many of these options boiled down to ease of use and efficiency versus […]

The post The Evolution of Network Security: What Security Teams Require From Firewalls in a Cloud-centric World appeared first on Enterprise Strategy Group.

]]>
As IT environments have grown more distributed and diverse, network security tools, generally, and firewalls, specifically, have become fragmented. The availability of CSP firewalls, cloud-native firewalls, and firewall capabilities from networking tools has created confusion in the market. Historically, the choice between many of these options boiled down to ease of use and efficiency versus functionality and efficacy. However, organizations can no longer make tradeoffs. They require the best of both worlds and need help understanding their options for network security and the best fit for the use cases they need to support.

To gain insights into these trends, TechTarget’s Enterprise Strategy Group surveyed 358 IT and cybersecurity professionals in North America (US and Canada) involved with network security technology and processes at their organization.

Already an Enterprise Strategy Group client? Log in to read the full report.

If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

The post The Evolution of Network Security: What Security Teams Require From Firewalls in a Cloud-centric World appeared first on Enterprise Strategy Group.

]]>
AI Maturity: A Definitive Factor in Network Automation https://www.techtarget.com/esg-global/research-brief/ai-maturity-a-definitive-factor-in-network-automation/ Mon, 07 Oct 2024 17:15:47 +0000 https://www.techtarget.com/esg-global/?p=4344 AI is slightly older and more established than the fever-pitch hype in the past few years around the technology’s new possibilities may suggest. In the realm of networking, AI has been put to use rather extensively already. In fact, research by TechTarget’s Enterprise Strategy Group recently found compelling connections between organizations’ network automation proficiency and […]

The post AI Maturity: A Definitive Factor in Network Automation appeared first on Enterprise Strategy Group.

]]>
AI is slightly older and more established than the fever-pitch hype in the past few years around the technology’s new possibilities may suggest. In the realm of networking, AI has been put to use rather extensively already. In fact, research by TechTarget’s Enterprise Strategy Group recently found compelling connections between organizations’ network automation proficiency and their AI maturity level.

Already an Enterprise Strategy Group client? Log in to read the full report.

If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

The post AI Maturity: A Definitive Factor in Network Automation appeared first on Enterprise Strategy Group.

]]>
Network Teams Seize Upon Generative AI Transformation https://www.techtarget.com/esg-global/research-brief/network-teams-seize-upon-generative-ai-transformation/ Mon, 07 Oct 2024 17:05:26 +0000 https://www.techtarget.com/esg-global/?p=4337 Investigating the use of generative AI (GenAI) to make processes more efficient and increase output is now all but mandated to every technology team across industries. For proof that GenAI is catching on within IT, look no further than the network. Recent research by TechTarget’s Enterprise Strategy Group revealed that network teams are full steam […]

The post Network Teams Seize Upon Generative AI Transformation appeared first on Enterprise Strategy Group.

]]>
Investigating the use of generative AI (GenAI) to make processes more efficient and increase output is now all but mandated to every technology team across industries. For proof that GenAI is catching on within IT, look no further than the network. Recent research by TechTarget’s Enterprise Strategy Group revealed that network teams are full steam ahead in applying GenAI to their practices, though with some precautions.

Already an Enterprise Strategy Group client? Log in to read the full report.

If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

The post Network Teams Seize Upon Generative AI Transformation appeared first on Enterprise Strategy Group.

]]>
Insufficiently Secured Identities Come With Consequences https://www.techtarget.com/esg-global/research-brief/insufficiently-secured-identities-come-with-consequences/ Mon, 07 Oct 2024 16:50:11 +0000 https://www.techtarget.com/esg-global/?p=4334 Securing the identities of both the humans and non-humans (also referred to as machines) that access systems to keep the business operating is a mission-critical task for cybersecurity teams. However, the constantly expanding nature of these identity estates make this job harder to do every day. Recent research by TechTarget’s Enterprise Strategy Group revealed that […]

The post Insufficiently Secured Identities Come With Consequences appeared first on Enterprise Strategy Group.

]]>
Securing the identities of both the humans and non-humans (also referred to as machines) that access systems to keep the business operating is a mission-critical task for cybersecurity teams. However, the constantly expanding nature of these identity estates make this job harder to do every day. Recent research by TechTarget’s Enterprise Strategy Group revealed that when identities are insufficiently secured, organizations become vulnerable to compromise and even successful cyberattacks.

Already an Enterprise Strategy Group client? Log in to read the full report.

If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

The post Insufficiently Secured Identities Come With Consequences appeared first on Enterprise Strategy Group.

]]>
Multifactor Authentication Becomes Mandatory When Workforce Identities Are Endangered or Expand https://www.techtarget.com/esg-global/research-brief/multifactor-authentication-becomes-mandatory-when-workforce-identities-are-endangered-or-expand/ Mon, 07 Oct 2024 16:36:32 +0000 https://www.techtarget.com/esg-global/?p=4332 Multifactor authentication (MFA) is a robust tool that teams tasked with securing a workforce’s credentials and identities frequently employ to ensure only the right people access critical systems and data. Recent research by TechTarget’s Enterprise Strategy Group shows that when it comes to making MFA a mandatory part of identity security for workforces, some firms […]

The post Multifactor Authentication Becomes Mandatory When Workforce Identities Are Endangered or Expand appeared first on Enterprise Strategy Group.

]]>
Multifactor authentication (MFA) is a robust tool that teams tasked with securing a workforce’s credentials and identities frequently employ to ensure only the right people access critical systems and data. Recent research by TechTarget’s Enterprise Strategy Group shows that when it comes to making MFA a mandatory part of identity security for workforces, some firms are more apt to do so than others.

Already an Enterprise Strategy Group client? Log in to read the full report.

If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

The post Multifactor Authentication Becomes Mandatory When Workforce Identities Are Endangered or Expand appeared first on Enterprise Strategy Group.

]]>