ESG has again completed its annual IT Spending Intentions research survey of global IT decision makers, investigating IT initiatives and priorities, budget changes, staffing outlook, and cloud and big data trends. This research brief highlights key findings around business intelligence, analytics, databases, and big data, which will help paint a sharper picture of the current state of the industry and future directions.
The OFS market is rapidly maturing from file storage services for consumers to technology solutions that require features to effectively manage and secure business data. As part of this evolution, there is increasing demand for alternatives to the “one-size-fits-all,” cloud-based approach, especially among current OFS users who currently leverage that deployment model.
ESG Reference Research includes data-centric reports and briefs designed for market intelligence, marketing, product marketing/management, engineering, and corporate strategy professionals at IT vendor organizations. ESG’s Reference Research content is intended to assist in market segmentation, market sizing, product requirements analysis, and other business planning exercises, while also providing IT professionals a way to benchmark themselves against their peer organizations. This Reference Research brief focuses on the amount organizations spend on data protection technologies and processes in a typical year and includes analysis of this data by number of employees, vertical industry, annual revenue, number of production servers worldwide, and total volume of data stored on corporate servers and storage systems.
ESG Reference Research includes data-centric reports and briefs designed for market intelligence, marketing, product marketing/management, engineering, and corporate strategy professionals at IT vendor organizations. ESG’s Reference Research content is intended to assist in market segmentation, market sizing, product requirements analysis, and other business planning exercises, while also providing IT professionals a way to benchmark themselves against their peer organizations. This Reference Research brief focuses on the number of administrators tasked with managing their organizations’ data protection environments and includes analysis of this data by number of employees, industry, average amount spent on data protection technologies annually, number of worldwide production servers, and the total amount of data residing on those systems.
Mobile computing is well beyond a fad for e-mail enablement; enterprise organizations are undertaking mobile computing initiatives for new business processes and creative applications that reach employees, customers, and even business partners. When mobile devices were first implemented, CIOs turned to Mobile Device Management (MDM) platforms to onboard and manage devices, but MDM really doesn’t protect employees when they use mobile browsers or applications on the devices themselves. As mobile computing evolves, CISOs are implementing their own mobile security solutions for malware protection and application controls. Cloud-based mobile security solutions that integrate with traditional MDM are becoming popular choices for these requirements.
Since the term “cyber Pearl Harbor” was first coined during the Clinton administration, the U.S. government has warned about cybersecurity dangers but done little to protect the nation. Earlier this year, President Obama issued an executive order to address cybersecurity, but others in Washington view this as a political move and remain cynical about any real cybersecurity threat. Is the cyber threat real and if so, what should the U.S. Federal Government do about it? To answer this question, ESG surveyed 315 security professionals working at U.S.-based enterprise organizations (i.e., 1,000 or more employees). This well-informed group of cybersecurity “insiders” is much more certain than DC pundits, think tanks, and legislators—they firmly believe that cybersecurity threats are real and want to see more from Washington in response.
The malware threat landscape is getting worse and many large organizations continue to suffer security breaches as a result. Why? Enterprises often lack the right security skills and their current defenses and security analytics are no match for increasingly sophisticated and stealthy targeted attacks. Fortunately, large organizations recognize these gaps and are increasing security budgets to bolster malware prevention, detection, and response. To benefit from these investments as soon as possible, CISOs should improve malware knowledge, invest in security analytics, and deploy modern anti-malware technologies on networks and hosts.
In spite of the fact that resource optimization is particularly important to SMB organizations when it comes to supporting technology requirements, server virtualization deployments are not pervasive at this end of the market. However, this dynamic shifts when server footprints and the manner in which technology is viewed come into play.
Lack of data protection expertise specifically in the area of highly virtualized environments can affect an IT organization’s ability to recover systems and/or data. How well aligned are backup and recovery skill sets with virtualization objectives, and what are organizations doing to compensate for any potential gaps in coverage?
Disruptive technology innovations such as smart mobile computing devices, social enterprise applications, and online file sharing and collaboration solutions have the potential to drastically alter the way corporate knowledge workers do their jobs. If the goal of the IT department is to provide these employees with the tools and capabilities they need to be their most productive, then understanding their preferences with respect to new technologies is critical. This brief explores some of the shifting demographic tectonics surrounding the use of these technologies and what those shifts mean for IT organizations.