Research Briefs

  • April 7, 2014

    Cloud-based DR Services Drive Increased Frequency of Recovery Testing

    One of the primary deterrents to most BC/DR plans is that recurring testing must occur in order to ensure preparedness for when calamity strikes and to prove compliance for those with regulatory mandates. But testing in general can be not only arduous due to the complexity of bringing replacement systems online, but also risky in that doing so without proper preparation carries the possibility of affecting the primary systems, which are actively serving users. This has historically led to infrequent or even non-existent recovery testing. How­—if at all—do cloud-based disaster recovery services change this dynamic?

    Learn More

  • April 7, 2014

    Endpoint Device Backup Trends

    There has never been so much corporate data outside of the data center as there is now. It is due to the changing usage of endpoint devices, particularly by users in bring-your-own-device (BYOD) environments. Too often, IT tries to utilize complex legacy data center backup approaches to protect these modern endpoints, with the result being that endpoints and all of the corporate data residing in them are left unprotected. But it doesn’t have to be that way.

    Learn More

  • February 26, 2014

    2014 IT Spending Intentions for Data Analytics

    ESG has again completed its annual IT Spending Intentions research survey of global IT decision makers, investigating IT initiatives and priorities, budget changes, staffing outlook, and cloud and big data trends. This research brief highlights key findings around business intelligence, analytics, databases, and big data, which will help paint a sharper picture of the current state of the industry and future directions.

    Learn More

  • February 4, 2014

    The Demand for Hybrid Online File Sharing Solutions

    The OFS market is rapidly maturing from file storage services for consumers to technology solutions that require features to effectively manage and secure business data. As part of this evolution, there is increasing demand for alternatives to the “one-size-fits-all,” cloud-based approach, especially among current OFS users who currently leverage that deployment model.

    Learn More

  • December 4, 2013

    Reference Research: Data Protection Spending Trends

    ESG Reference Research includes data-centric reports and briefs designed for market intelligence, marketing, product marketing/management, engineering, and corporate strategy professionals at IT vendor organizations. ESG’s Reference Research content is intended to assist in market segmentation, market sizing, product requirements analysis, and other business planning exercises, while also providing IT professionals a way to benchmark themselves against their peer organizations. This Reference Research brief focuses on the amount organizations spend on data protection technologies and processes in a typical year and includes analysis of this data by number of employees, vertical industry, annual revenue, number of production servers worldwide, and total volume of data stored on corporate servers and storage systems.

    Learn More

  • October 7, 2013

    Reference Research: Data Protection Staffing Trends

    ESG Reference Research includes data-centric reports and briefs designed for market intelligence, marketing, product marketing/management, engineering, and corporate strategy professionals at IT vendor organizations. ESG’s Reference Research content is intended to assist in market segmentation, market sizing, product requirements analysis, and other business planning exercises, while also providing IT professionals a way to benchmark themselves against their peer organizations. This Reference Research brief focuses on the number of administrators tasked with managing their organizations’ data protection environments and includes analysis of this data by number of employees, industry, average amount spent on data protection technologies annually, number of worldwide production servers, and the total amount of data residing on those systems.

    Learn More

  • September 24, 2013

    Extending Enterprise Security with Mobile Security Services

    Mobile computing is well beyond a fad for e-mail enablement; enterprise organizations are undertaking mobile computing initiatives for new business processes and creative applications that reach employees, customers, and even business partners. When mobile devices were first implemented, CIOs turned to Mobile Device Management (MDM) platforms to onboard and manage devices, but MDM really doesn’t protect employees when they use mobile browsers or applications on the devices themselves. As mobile computing evolves, CISOs are implementing their own mobile security solutions for malware protection and application controls. Cloud-based mobile security solutions that integrate with traditional MDM are becoming popular choices for these requirements.

    Learn More

  • September 24, 2013

    Security Professionals to Washington: Less Talk, More Cybersecurity Action

    Since the term “cyber Pearl Harbor” was first coined during the Clinton administration, the U.S. government has warned about cybersecurity dangers but done little to protect the nation. Earlier this year, President Obama issued an executive order to address cybersecurity, but others in Washington view this as a political move and remain cynical about any real cybersecurity threat. Is the cyber threat real and if so, what should the U.S. Federal Government do about it?  To answer this question, ESG surveyed 315 security professionals working at U.S.-based enterprise organizations (i.e., 1,000 or more employees). This well-informed group of cybersecurity “insiders” is much more certain than DC pundits, think tanks, and legislators—they firmly believe that cybersecurity threats are real and want to see more from Washington in response.

    Learn More

  • September 12, 2013

    Malware and the State of Enterprise Security

    The malware threat landscape is getting worse and many large organizations continue to suffer security breaches as a result. Why? Enterprises often lack the right security skills and their current defenses and security analytics are no match for increasingly sophisticated and stealthy targeted attacks. Fortunately, large organizations recognize these gaps and are increasing security budgets to bolster malware prevention, detection, and response. To benefit from these investments as soon as possible, CISOs should improve malware knowledge, invest in security analytics, and deploy modern anti-malware technologies on networks and hosts.

    Learn More

  • August 29, 2013

    Server Virtualization Usage among SMB Organizations

    In spite of the fact that resource optimization is particularly important to SMB organizations when it comes to supporting technology requirements, server virtualization deployments are not pervasive at this end of the market. However, this dynamic shifts when server footprints and the manner in which technology is viewed come into play.

    Learn More


More Results:
NEWSLETTER

Enter your email address, and click subscribe