Landing Page

  • Data Point of the Week

    Not yet receiving Enterprise Strategy Group research in your inbox? Find out why the vendor community is buzzing about the Data Point of the Week by signing up to receive this consumable weekly dose of industry insight!

    Source: Enterprise Strategy Group Research Report, Cloud Data Protection Strategies at a Crossroads, August 2023.

    The broad adoption of public cloud services and containers as sources and repositories of business-critical data puts the onus on data owners to deliver on data protection SLAs for cloud-resident and container-based applications and data. Users are confused about the data protection levels that public cloud and Kubernetes environments deliver and about the changing protection options (DIY in the cloud, cloud-native third-party solutions, hyperscalers’ built-in features, as-a-service, etc.). As vendors and the cloud ecosystem evolve and add as-a-service consumption options, end-users are making incorrect comparisons and assumptions as well as failing to select the key data protection capabilities they need to maximize their cloud technology investments. This confusion leads to lasting challenges, and the market is now at a crossroads.

  • Executive Summary

    Organizations want to get as much done as quickly and cheaply as possible, but rushing initiatives like digital transformation projects may have a hidden cost. Sometimes technology decisions are accelerated, and short-term savings on the cloud, infrastructure, software, and services are leveraged to get the project launched quickly. But this often means that a tradeoff occurs between the long-term alignment to organizational goals and short-term reaction to current pressures.

    Changes made in the name of expediency often result in business requirement oversights, software development shortcuts, and customer experience shortfalls. This leads to Technical Debt, creating longer-term technical challenges as an unintended consequence of short-term thinking. Similar to financial debt, we often borrow to accelerate what we can’t afford and leverage financing to acquire assets sooner versus later. But borrowed money comes at a cost, requiring you to pay interest on the borrowed funds. Over time, unpaid interest can accrue, compounding to a rather large sum if you are not careful, and eventually you must repay the principal. This same concept impacts the effectiveness of technology when decisions are made with a rush to market and short-term considerations, taking priority over long-term alignment between technology and business goals.

    ESG analysts analyzed the impact of technical debt and quantified the impact of making decisions that can accrue technical debt. ESG believes that organizations that choose to prioritize “Rush over Rightness” in technology investments realize higher costs for refactoring, higher total cost of ownership (TCO), an impact on productivity and especially innovation, as well as incurring significant limitations in agility, security, maximized revenue, and customer satisfaction.

  • Data Point of the Week

    Not yet receiving Enterprise Strategy Group research in your inbox? Find out why the vendor community is buzzing about the Data Point of the Week by signing up to receive this consumable weekly dose of industry insight!

    88% of organizations have implemented or plan to use SD-WAN technology as part of their SASE strategy.

    Source: Enterprise Strategy Group Research Report, A Network Perspective on SASE and SD-WAN, November 2023.

    The level of interest in secure access service edge (SASE) architectures has exploded recently as organizations struggle to use traditional, on-premises-based network and security solutions to support distributed, cloud-centric enterprise environments. While this has been an increasing challenge over the last few years, the pandemic and resulting spike in newly remote workers pushed many organizations to a tipping point when it comes to both security and network traffic. Additionally, the broad applicability of SASE leads to some confusion on where to begin and which technologies are required, exacerbated by legacy organizational dynamics. While Enterprise Strategy Group has seen SASE elevated to a CIO/CISO-led initiative in some cases, inconsistencies remain for many organizations in day-to-day collaboration across network and security teams.

  • Data Point of the Week

    Not yet receiving Enterprise Strategy Group research in your inbox? Find out why the vendor community is buzzing about the Data Point of the Week by signing up to receive this consumable weekly dose of industry insight!

    Source: Enterprise Strategy Group Research Report, Customer Experience Strategies and Technology Frameworks, June 2023.

    Customer experience is the sum of a customer’s digital interactions with a company throughout the customer lifecycle, from early online research of a product or service to active use and repeat business such as subscriptions. Most customer experience programs include the measurement of customer satisfaction and sentiment analysis. These processes aggregate and analyze customers’ perceptions and feelings resulting from interactions with a brand’s products and services, most often through short surveys collected throughout an engagement. Customer loyalty and retention are the desired results from the thoughtful execution and continuous improvement of CX.

  • Data Point of the Week

    Not yet receiving Enterprise Strategy Group research in your inbox? Find out why the vendor community is buzzing about the Data Point of the Week by signing up to receive this consumable weekly dose of industry insight!

    36% of organizations have a policy that prevents or limits the use of GenAI.

    Source: Enterprise Strategy Group Research Report, Beyond the GenAI Hype: Real-world Investments, Use Cases, and Concerns, August 2023.

    While AI in general was already assimilating into the everyday business and IT lexicon thanks to ongoing AI and analytics strategies and initiatives, GenAI recently stormed the market and mindshare of decision makers across industries and major geographic markets. Business leaders see a massive opportunity to positively impact operations and customer strategies with GenAI, but its adoption and use across all business units carry a fair share of trepidation.

  • Data Point of the Week

    Not yet receiving Enterprise Strategy Group research in your inbox? Find out why the vendor community is buzzing about the Data Point of the Week by signing up to receive this consumable weekly dose of industry insight!

    83% of organizations say securing their communication and collaboration channels is a top priority.

    Source: Enterprise Strategy Group Research Report, Challenges in Securing an Overabundance of Communication and Collaboration Tools, July 2023.

    As more workers collaborate virtually, many organizations now depend on additional digital communication tools beyond email. New collaboration tools provide attackers the opportunity to engage with humans to evade automated controls, extending phishing, BEC, credential theft, and other socially engineered attacks beyond email. Advanced attacks leverage multiple attack vectors, requiring individual, core security controls to work together to detect and prevent advanced attacks. This extends beyond traditional security operations tools (e.g., SIEM, SOAR, EDR, and XDR) to core network, cloud, endpoint, and identity controls.

  • Data Point of the Week

    Not yet receiving Enterprise Strategy Group research in your inbox? Find out why the vendor community is buzzing about the Data Point of the Week by signing up to receive this consumable weekly dose of industry insight!

    83% of organizations say securing their communication and collaboration channels is a top priority.

    Source: Enterprise Strategy Group Research Report, Challenges in Securing an Overabundance of Communication and Collaboration Tools, July 2023.

    As more workers collaborate virtually, many organizations now depend on additional digital communication tools beyond email. New collaboration tools provide attackers the opportunity to engage with humans to evade automated controls, extending phishing, BEC, credential theft, and other socially engineered attacks beyond email. Advanced attacks leverage multiple attack vectors, requiring individual, core security controls to work together to detect and prevent advanced attacks. This extends beyond traditional security operations tools (e.g., SIEM, SOAR, EDR, and XDR) to core network, cloud, endpoint, and identity controls.

  • Data Point of the Week

    Not yet receiving Enterprise Strategy Group research in your inbox? Find out why the vendor community is buzzing about the Data Point of the Week by signing up to receive this consumable weekly dose of industry insight!

    83% of organizations say securing their communication and collaboration channels is a top priority.

    Source: Enterprise Strategy Group Research Report, Challenges in Securing an Overabundance of Communication and Collaboration Tools, July 2023.

    As more workers collaborate virtually, many organizations now depend on additional digital communication tools beyond email. New collaboration tools provide attackers the opportunity to engage with humans to evade automated controls, extending phishing, BEC, credential theft, and other socially engineered attacks beyond email. Advanced attacks leverage multiple attack vectors, requiring individual, core security controls to work together to detect and prevent advanced attacks. This extends beyond traditional security operations tools (e.g., SIEM, SOAR, EDR, and XDR) to core network, cloud, endpoint, and identity controls.

  • Data Point of the Week

    Not yet receiving Enterprise Strategy Group research in your inbox? Find out why the vendor community is buzzing about the Data Point of the Week by signing up to receive this consumable weekly dose of industry insight!

    83% of organizations say securing their communication and collaboration channels is a top priority.

    Source: Enterprise Strategy Group Research Report, Challenges in Securing an Overabundance of Communication and Collaboration Tools, July 2023.

    As more workers collaborate virtually, many organizations now depend on additional digital communication tools beyond email. New collaboration tools provide attackers the opportunity to engage with humans to evade automated controls, extending phishing, BEC, credential theft, and other socially engineered attacks beyond email. Advanced attacks leverage multiple attack vectors, requiring individual, core security controls to work together to detect and prevent advanced attacks. This extends beyond traditional security operations tools (e.g., SIEM, SOAR, EDR, and XDR) to core network, cloud, endpoint, and identity controls.

  • Data Point of the Week

    Not yet receiving Enterprise Strategy Group research in your inbox? Find out why the vendor community is buzzing about the Data Point of the Week by signing up to receive this consumable weekly dose of industry insight!

    83% of organizations say securing their communication and collaboration channels is a top priority.

    Source: Enterprise Strategy Group Research Report, Challenges in Securing an Overabundance of Communication and Collaboration Tools, July 2023.

    As more workers collaborate virtually, many organizations now depend on additional digital communication tools beyond email. New collaboration tools provide attackers the opportunity to engage with humans to evade automated controls, extending phishing, BEC, credential theft, and other socially engineered attacks beyond email. Advanced attacks leverage multiple attack vectors, requiring individual, core security controls to work together to detect and prevent advanced attacks. This extends beyond traditional security operations tools (e.g., SIEM, SOAR, EDR, and XDR) to core network, cloud, endpoint, and identity controls.

  • Data Point of the Week

    Not yet receiving Enterprise Strategy Group research in your inbox? Find out why the vendor community is buzzing about the Data Point of the Week by signing up to receive this consumable weekly dose of industry insight!

    83% of organizations say securing their communication and collaboration channels is a top priority.

    Source: Enterprise Strategy Group Research Report, Challenges in Securing an Overabundance of Communication and Collaboration Tools, July 2023.

    As more workers collaborate virtually, many organizations now depend on additional digital communication tools beyond email. New collaboration tools provide attackers the opportunity to engage with humans to evade automated controls, extending phishing, BEC, credential theft, and other socially engineered attacks beyond email. Advanced attacks leverage multiple attack vectors, requiring individual, core security controls to work together to detect and prevent advanced attacks. This extends beyond traditional security operations tools (e.g., SIEM, SOAR, EDR, and XDR) to core network, cloud, endpoint, and identity controls.

  • Data Point of the Week

    Not yet receiving Enterprise Strategy Group research in your inbox? Find out why the vendor community is buzzing about the Data Point of the Week by signing up to receive this consumable weekly dose of industry insight!

    83% of organizations say securing their communication and collaboration channels is a top priority.

    Source: Enterprise Strategy Group Research Report, Challenges in Securing an Overabundance of Communication and Collaboration Tools, July 2023.

    As more workers collaborate virtually, many organizations now depend on additional digital communication tools beyond email. New collaboration tools provide attackers the opportunity to engage with humans to evade automated controls, extending phishing, BEC, credential theft, and other socially engineered attacks beyond email. Advanced attacks leverage multiple attack vectors, requiring individual, core security controls to work together to detect and prevent advanced attacks. This extends beyond traditional security operations tools (e.g., SIEM, SOAR, EDR, and XDR) to core network, cloud, endpoint, and identity controls.