Research Briefs

  • July 2, 2014

    The Evolving Public Cloud Landscape

    ESG research indicates that the corporate usage of public cloud computing in the form of cloud-based infrastructure services (i.e., IaaS), business applications (i.e., SaaS), and/or application development (i.e., PaaS) continues to grow. What are the profiles of the organizations at the forefront of the cloud adoption movement, how are these services being leveraged today, and what is their likely level of impact over a five-year horizon?

    Learn More

  • May 29, 2014

    2014 Networking Spending Trends

    Much of the hype in networking is centered on software-defined networking (SDN), but how are organizations actually investing their IT budgets? And how will overall network spending fare in 2014 as compared with last year when a significant portion of respondents (42%) reported flat budgets? How does that compare by industry or age of company?

    Learn More

  • April 18, 2014

    Amazon Web Services Usage Trends Foreshadow a Changing of the Guard

    ESG research indicates that the corporate usage of public cloud computing continues to grow, including infrastructure (IaaS) and application development (PaaS) services. Being one of the first movers in these areas, it’s not surprising that Amazon Web Services is one of the most widely leveraged providers among current users, but how do these organizations view AWS as a long-term IT partner? And, perhaps more importantly, how do these trends vary by the age of organizations and the individual IT decision makers responsible for strategic direction?

    Learn More

  • April 7, 2014

    Cloud-based DR Services Drive Increased Frequency of Recovery Testing

    One of the primary deterrents to most BC/DR plans is that recurring testing must occur in order to ensure preparedness for when calamity strikes and to prove compliance for those with regulatory mandates. But testing in general can be not only arduous due to the complexity of bringing replacement systems online, but also risky in that doing so without proper preparation carries the possibility of affecting the primary systems, which are actively serving users. This has historically led to infrequent or even non-existent recovery testing. How­—if at all—do cloud-based disaster recovery services change this dynamic?

    Learn More

  • April 7, 2014

    Endpoint Device Backup Trends

    There has never been so much corporate data outside of the data center as there is now. It is due to the changing usage of endpoint devices, particularly by users in bring-your-own-device (BYOD) environments. Too often, IT tries to utilize complex legacy data center backup approaches to protect these modern endpoints, with the result being that endpoints and all of the corporate data residing in them are left unprotected. But it doesn’t have to be that way.

    Learn More

  • February 26, 2014

    2014 IT Spending Intentions for Data Analytics

    ESG has again completed its annual IT Spending Intentions research survey of global IT decision makers, investigating IT initiatives and priorities, budget changes, staffing outlook, and cloud and big data trends. This research brief highlights key findings around business intelligence, analytics, databases, and big data, which will help paint a sharper picture of the current state of the industry and future directions.

    Learn More

  • February 4, 2014

    The Demand for Hybrid Online File Sharing Solutions

    The OFS market is rapidly maturing from file storage services for consumers to technology solutions that require features to effectively manage and secure business data. As part of this evolution, there is increasing demand for alternatives to the “one-size-fits-all,” cloud-based approach, especially among current OFS users who currently leverage that deployment model.

    Learn More

  • December 4, 2013

    Reference Research: Data Protection Spending Trends

    ESG Reference Research includes data-centric reports and briefs designed for market intelligence, marketing, product marketing/management, engineering, and corporate strategy professionals at IT vendor organizations. ESG’s Reference Research content is intended to assist in market segmentation, market sizing, product requirements analysis, and other business planning exercises, while also providing IT professionals a way to benchmark themselves against their peer organizations. This Reference Research brief focuses on the amount organizations spend on data protection technologies and processes in a typical year and includes analysis of this data by number of employees, vertical industry, annual revenue, number of production servers worldwide, and total volume of data stored on corporate servers and storage systems.

    Learn More

  • October 7, 2013

    Reference Research: Data Protection Staffing Trends

    ESG Reference Research includes data-centric reports and briefs designed for market intelligence, marketing, product marketing/management, engineering, and corporate strategy professionals at IT vendor organizations. ESG’s Reference Research content is intended to assist in market segmentation, market sizing, product requirements analysis, and other business planning exercises, while also providing IT professionals a way to benchmark themselves against their peer organizations. This Reference Research brief focuses on the number of administrators tasked with managing their organizations’ data protection environments and includes analysis of this data by number of employees, industry, average amount spent on data protection technologies annually, number of worldwide production servers, and the total amount of data residing on those systems.

    Learn More

  • September 24, 2013

    Extending Enterprise Security with Mobile Security Services

    Mobile computing is well beyond a fad for e-mail enablement; enterprise organizations are undertaking mobile computing initiatives for new business processes and creative applications that reach employees, customers, and even business partners. When mobile devices were first implemented, CIOs turned to Mobile Device Management (MDM) platforms to onboard and manage devices, but MDM really doesn’t protect employees when they use mobile browsers or applications on the devices themselves. As mobile computing evolves, CISOs are implementing their own mobile security solutions for malware protection and application controls. Cloud-based mobile security solutions that integrate with traditional MDM are becoming popular choices for these requirements.

    Learn More


More Results:
NEWSLETTER

Enter your email address, and click subscribe