Cybersecurity & Networking

  • Cloud Entitlements and Posture Management Trends

    Organizations are moving applications to the cloud and embracing digital transformation strategies to speed development cycles and better serve employees, partners, and customers. However, the subsequent faster release cycles and broad internet exposure increase the number of potential security incidents caused by misconfigurations, so security teams are looking for efficient ways to drive actions that reduce those risks.

    Learn more about these trends with the infographic, Cloud Entitlements and Posture Management Trends.

  • Megatrends in the technology industry—highlighted by the need to address increased complexity vis-à-vis platform convergence and vendor consolidation while investing in digital transformation initiatives—set the stage for integrated partner solutions. While the demand for these solutions is strong, there can be challenges at every stage of the buyer’s journey.

    Learn more about these trends with the infographic, The Buyer’s Journey to Integrated Solutions from Strategic Partners.

  • Managing the Endpoint Vulnerability Gap

    Research Objectives

    Requirements from widespread work-from-anywhere policies have escalated the need for endpoint management and security convergence. IT and security teams need broad management, prevention, detection, and response capabilities that span endpoint devices and operating environments that are often outside of their control, which is driving many to desire convergence between management and security capabilities to simplify implementation, ongoing management, and risk mitigation.

    IT and security teams require new mechanisms capable of providing common visibility, assessment, mitigation of software and configuration vulnerabilities, threat prevention, and support for threat investigation and response activities. These management and security activities are deeply intertwined, requiring integrated workflows between IT and security teams.

    In order to gain further insights into these trends, TechTarget’s Enterprise Strategy Group surveyed 381 IT and cybersecurity decision makers involved with endpoint management and security technologies and processes at midmarket (100 to 999 employees) and enterprise (1,000 or more employees) organizations in North America (US and Canada).

    This study sought to answer the following questions:

    • Approximately what percentage of employees work remotely, in either a remote or home office?
    • On average, approximately how many endpoint devices does each employee in an organization interact with daily?
    • How do organizations characterize the state of endpoint security and management in terms of level of difficulty?
    • Approximately what percentage of organizations’ endpoints are actively monitored?
    • Approximately what percentage of total endpoints do organizations consider to be unmanaged or have only a limited ability to manage/secure?
    • Have organizations experienced some type of cyber-attack in which the attack itself started through an exploit of an unknown, unmanaged, or poorly managed endpoint?
    • How many different tools and technologies do organizations use for endpoint management and security?
    • Have organizations consolidated the teams or individuals responsible for endpoint management and endpoint security?
    • What has driven or is driving the consolidation of endpoint management and security? What are the biggest impediments for greater consolidation of endpoint management and security?
    • Do organizations use desktop or application virtualization? What percentage of total PCs/client access devices has been virtualized via desktop or application virtualization solutions, and how is this expected to change over the next three years?
    • What specific types of employees are the initial and/or primary users of desktop or application virtualization environments?
    • What actions do organizations believe would most improve their endpoint management and security?

    Survey participants represented a wide range of industries including manufacturing, technology, financial services, and retail/wholesale. For more details, please see the Research Methodology and Respondent Demographics sections of this report.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Our personal and professional lives are reliant on technology. But the sensitive data we share and store online is more vulnerable to cyberthreats than ever before. From credit card numbers and medical records to private messages and intellectual property, encrypting data is essential to safeguard our information from prying eyes and unauthorized access. Without encryption, we risk exposing our most valuable assets to malicious actors who seek to exploit our online vulnerabilities.

    Read my blog to learn more about the coming encryption revolution.

  • Since returning from RSA Conference 2023, I’ve collected my thoughts from the massive sensory input that comes from this four-day, 625-vendor, 700-speaker cybersecurity conference. Upwards of 45,000 people attended this year’s RSA Conference—a massive increase over last year’s 26,000 attendees.

    Read my blog for my thoughts on RSAC 2023.

  • Managed Detection and Response Trends

    Research Objectives

    • Determine how, where, and why MDR services are used to support security programs.
    • Isolate specific MDR use cases, and the organizational profiles of those businesses that require them.
    • Understand what technology is expected from MDR and how organizations want to work together with MDR providers.
    • Establish if and what industry megatrends are impacting MDR provider selection.

    (more…)

  • The Cloud Data Security Imperative

    Research Objectives

    Digital transformation initiatives and remote work have further accelerated the migration of data assets to cloud stores. However, organizations are finding that sensitive data is now distributed across multiple public clouds. The use of disparate controls has led to a lack of consistent visibility and control, putting cloud-resident data at risk of compromise and loss.

    What is necessary to secure cloud-resident data? Organizations need solutions that support data loss detection and prevention capabilities across a range of cloud applications and services. These solutions need cloud-native controls that provide a unified approach across disparate cloud data stores via API integration.

    To gain insights into modern processes for securing cloud-resident data, TechTarget’s Enterprise Strategy Group surveyed 387 IT, cybersecurity, and DevOps professionals responsible for evaluating, purchasing, testing, deploying, and operating hybrid cloud data security technology products and services at organizations in North America.

    This study sought to answer the following questions:

    • Are organizations using separate data security controls for on-premises and cloud environments? Do they plan to unify this protection in the future?
    • How much of organizations’ sensitive data is cloud-resident today, and how much will be in 12-24 months?
    • How are organizations identifying and classifying sensitive data? How confident are organizations that they have the necessary tools in place to discover and classify all their public cloud-resident data?
    • Have organizations lost cloud-resident sensitive data and, if so, how and why?
    • What policies do organizations currently employ to protect data assets associated with the use of cloud services?
    • How do organizations compare the security associated with protecting their cloud-resident sensitive data with the security associated with protecting their organization’s on-premises sensitive data?
    • Who are the key stakeholders who influence and make cloud data security purchasing decisions?
    • Do organizations have an individual or group designated as “cloud security architects”? What areas of responsibility are, or will likely be, assigned to cloud security architects?
    • What types of data security controls are currently in use, which are viewed as most important, and which ones are buyers prioritizing?
    • What types of native data security controls provided by CSPs do customers currently and plan to use?
    • From what type of vendor do buyers plan to purchase cloud data security controls?
    • How do organizations view the pros and cons of best-of-breed point tools versus consolidated suites/platforms?
    • What is the role of resellers, integrators, and managed service providers in data security?
    • Relative to other areas of cybersecurity, how do organizations expect their data security spending to change, if at all, over the next 12-24 months? What tasks do organizations consider to be the highest priorities to implement to protect cloud-resident sensitive data?

      Survey participants represented a wide range of industries including manufacturing, technology, financial services, and retail/wholesale. For more details, please see the Research Methodology and Respondent Demographics sections of this report.
    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • End-to-end Networking Visibility and Management

    Organizations are distributing applications across private data centers, public clouds, the edge, and hybrid work locations, creating management complexity and blinds spots for networking teams that are trying to ensure critical connectivity. As a result, organizations are exploring new strategies and technologies that drive visibility, efficiency, and automation.

    Learn more about these trends with the infographic, End-to-end Networking Visibility and Management.

  • The potential for serious business disruptions makes detecting threats quickly and accurately critical to preventing data loss, compliance violations, and lost revenue. Even as resources and users leave the traditional perimeter, the network should play a key role in detecting threats to avoid business disruption.

    Learn more about these trends with the infographic, The Evolving Role of Network Detection and Response.

  • What Security Teams Want from MDR Providers

    IT organizations shouldn’t be fooled by the name: Managed detection and response (MDR) providers are delivering much more than basic detection and response. With no end in sight for the cybersecurity skills shortage, MDR services can bring immediate expert resources online to help security teams gain control and set themselves up for future security program success. TechTarget’s Enterprise Strategy Group recently surveyed cybersecurity professionals in order to better understand these trends.

    Learn more about these trends with the infographic, What Security Teams Want from MDR Providers.

  • Research Objectives

    To gain insight into the market dynamics for integrated technology solutions from strategic partners, Enterprise Strategy Group surveyed 352 IT professionals in North America (US and Canada) involved in the purchases of integrated solutions at their organizations.

    Examples of integrated solutions include:

    • On-premises infrastructure such as multi-vendor converged infrastructure and data protection integrated with storage platforms.
    • Infrastructure-as-a-service/platform-as-a-service such as a virtualization platform integrated with a cloud-native infrastructure service.
    • Platforms/applications like APIs or other technology integrated into a broader platform or application.
    • Software-as-a-service such as marketing integration with a CRM.
    • Hybrid cloud like on-premises applications or infrastructure integrated with cloud services.
    • Cybersecurity such as firewalls integrated with public cloud infrastructure or integrated threat intelligence.
    • Data platforms and analytics like a data warehouse integrated with business intelligence.
    • Services provided on top of a vendor’s product or service, sometimes from a managed services provider.

    This study sought to answer the following questions:

    • What is the current status of integrated solution adoption? What technologies are customers purchasing or planning to purchase, and for what use cases?
    • What individuals or groups hold influence over the research, evaluation, purchase, and deployment of integrated solutions? Which individuals or groups hold the most influence?
    • What are the budget plans of organizations buying and planning to buy integrated solutions?
    • What are the business and technology drivers behind the purchase of integrated solutions?
    • What are the KPIs or metrics that organizations expect to improve with integrated solutions?
    • To what extent are integrated solutions meeting expectations for drivers and KPIs?
    • From where do organizations procure integrated solutions?
    • What challenges do organizations encounter throughout the research, evaluation, purchase, and deployment phases of integrated solution acquisitions?
    • When do organizations learn about integrated solutions when seeking technologies for certain use cases?
    • What sources do organizations use when researching integrated solutions?
    • How does the evaluation of integrated solutions compare with the evaluation of standalone technologies?
    • Do organizations also examine standalone technologies when seeking to meet requirements for certain use cases?
    • How do integrated solutions impact customer perceptions of the vendors involved with them?
    • To what degree does a relationship with one or both of the vendors affect selection and ultimately success?

    Survey participants represented a wide range of industries including manufacturing, technology, financial services, and retail/wholesale. For more details, please see the Research Methodology and Respondent Demographics sections of this report.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Cloud Entitlements and Posture Management Trends

    Research Objectives

    Organizations are moving applications to the cloud and embracing digital transformation strategies to speed development cycles and better serve employees, partners, and customers. However, the subsequent faster release cycles and broad internet exposure increases the number of potential security incidents caused by misconfigurations, including a high number of those that are identity-related. Security teams are looking for efficient ways to drive actions that reduce security risk, including trimming excessive access permissions and fixing coding issues that make them vulnerable to attack.

    In order to gain further insights into these trends, TechTarget’s Enterprise Strategy Group (ESG) surveyed 383 IT and cybersecurity decision makers responsible for evaluating or purchasing cloud security technology products and services at midmarket (100 to 999 employees) and enterprise (1,000 or more employees) organizations in North America (US and Canada).

    This study sought to answer the following questions:

    • Of all the production server workloads used by organizations, approximately what percentage is run on public cloud infrastructure services today? How is this expected to change over the next 24 months?
    • To what extent do organizations plan to incorporate security processes and controls via their DevOps processes (i.e., DevSecOps)?
    • What are the biggest cloud security challenges organizations face? What issues, if any, associated with the misconfiguration of a cloud application or service have organizations detected within the last 12 months?
    • What were the most effective steps organizations have taken to improve the security posture of their cloud-native applications, infrastructure, and development environment?
    • Which group has the primary responsibility for securing organizations’ cloud-native applications and infrastructure? Which groups implement and operate the cybersecurity controls organizations employ to secure cloud-native applications?
    • What role, if any, did cloud entitlements play in any cybersecurity incidents organizations experienced due to multiple misconfigurations? Have cloud entitlements caused organizations to fail a security audit?
    • How important is CIEM to organizations in terms of reducing security risk?
    • What are the top business drivers behind investments in CSPM? What attributes would be most attractive to organizations as part of a comprehensive CSPM product offering?
    • What types of CSPM tools are organizations using?
    • Relative to other areas of cybersecurity, how do organizations expect their level of investment in CSPM to change, if at all, over the next 12 months?

    Survey participants represented a wide range of industries including manufacturing, technology, financial services, and retail/wholesale. For more details, please see the Research Methodology and Respondent Demographics sections of this report.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.