ESG Infographic: Securing the Identity Perimeter with Defense in Depth

Abstract:

Organizations continue to rely on user and machine identities that are susceptible to compromise, misuse, and theft. Modern, cloud-managed identity services are available, but organizations have been slow to pivot their security programs to an approach that focuses on identity orchestration and experiences. ESG surveyed IT and cybersecurity professionals responsible for identity and access management programs and solutions to gain insights into these trends.

Topics: Data Protection Identity and Access Management

ESG Complete Survey Results: ESG/ISSA Cybersecurity Process and Technology Survey

Abstract:

ESG conducted a comprehensive online survey of IT professionals from private- and public-sector organizations in North America (United States and Canada), Western Europe, Central/South America, Africa, Asia, and Australia between December 20, 2021 and December 31, 2021. To qualify for this survey, respondents were required to be information security managers, chief information officers, IT senior executives, IT managers/directors, or general IT staff responsible for information security and other comparable titles.

This Complete Survey Results presentation focuses on cybersecurity technology purchase trends, including the current threat landscape’s impact on strategies and subsequent buying decisions, efforts to consolidate vendors and products, the appetite for cybersecurity platforms, and cybersecurity process integration with DevOps practices.

Topics: Cybersecurity ISSA

ESG Brief: Has the Web Browser Become the New Operating System?

Abstract:

End-users are increasingly relying on web browsers as their primary access to corporate applications and data. The most commonly used web browsers are Google Chrome, Mozilla Firefox, Microsoft Edge, and Apple Safari. Due to advances in technology, security, and internet speeds, browsers can provide several advantages in a corporate environment compared to PC and mobile operating systems. Yet browser security remains a major issue among IT professionals charged with managing security patches, updates, and policies as part of an overall end-user computing (EUC) strategy. As businesses accelerate the adoption of applications accessed through web browsers, and IT continues to improve support and security for multiple browsers, enterprises may one day treat browsers as the de facto operating system in a corporate environment.

Topics: Enterprise Mobility

ESG Brief: The Impact of 5G on End-user Computing Strategies

Abstract:

The significant performance and bandwidth advantages of 5G cellular networks have numerous implications for businesses as well as consumers. 5G has the potential to deliver reliable connections for hybrid work and collaboration strategies while enabling augmented reality and other multimedia applications to run on a wider range of endpoints and locations. To realize these opportunities, IT leaders should consider 5G integral to their network infrastructure plans and strategies.

Topics: Enterprise Mobility

ESG Complete Survey Results: The Long Road Ahead to Ransomware Preparedness

Abstract:

ESG conducted a comprehensive online survey of IT and cybersecurity professionals from private- and public-sector organizations in North America (United States and Canada) and Western Europe (UK, France, and Germany) between December 21, 2021 and January 10, 2022. To qualify for this survey, respondents were required to be IT and cybersecurity professionals involved with the technology and processes associated with protecting against ransomware.

This Complete Survey Results presentation focuses on understanding the proactive and reactive measures organizations have in place to defend against the growing ransomware threat, and identifying the priorities and plans associated with mitigating the ransomware threat in the coming 12-18 months.

Topics: Cybersecurity Data Protection

ESG Complete Survey Results: Securing the Identity Perimeter with Defense in Depth

Abstract:

ESG conducted a comprehensive online survey of IT and cybersecurity professionals from private- and public-sector organizations in North America (United States and Canada) between December 14, 2021 and December 28, 2021. To qualify for this survey, respondents were required to be IT and cybersecurity professionals focusing on identity and access management programs, projects, processes, solutions/platforms, and services.

This Complete Survey Results presentation focuses how organizations are currently monitoring and protecting identities in terms of the breadth of identity products, platforms, and technologies supporting current business operations, as well as how that is expected to evolve over time.

Topics: Cybersecurity Identity and Access Management

ESG Infographic: 2022 Ransomware Landscape

Abstract:

From frequent attacks on critical systems to major data recovery issues and financial impacts, ransomware consequences refuse to be ignored.

See the data behind these trends and more with this ESG Infographic, 2022 Ransomware Landscape.

Topics: Cybersecurity Data Protection

ESG Research Report: The Long Road Ahead to Ransomware Preparedness

Abstract:

The ransomware threat is a top-of-mind issue for so many organizations; however, few feel totally prepared for an attack. Without an industry reference architecture or blueprint for ransomware protection, organizations are building their own strategies and processes to respond. But with ransomware protection included with so many different security and data protection solutions, many are confused about the scope of what is to be included, who is responsible for the implementation, and who needs to be involved in the conversation.

In order to connect the dots between those organizations that feel most prepared and the specific strategies and plans they are using to get there, with an eye on defining best practices, ESG surveyed 620 IT and cybersecurity professionals personally involved with the technology and processes associated with protecting against ransomware attacks at midmarket and enterprise organizations in North America and Western Europe.

For more information on this research, please visit www.esg-global.com/ransomware.

Topics: Cybersecurity Data Protection

ESG Infographic: Cloud-native Applications

Abstract:

See how IT professionals use cloud-native applications to help advance their businesses into the future with this free ESG Infographic, Distributed Cloud Series: Cloud-native Applications.

Topics: IT Infrastructure Converged Infrastructure Cloud Services & Orchestration

ESG Research Report: Securing the Identity Perimeter with Defense in Depth

Abstract:

The core tenet of a zero trust strategy is least-privilege access. Yet, organizations continue to rely on user and machine identities that are susceptible to compromise, abuse/misuse, and theft. Risk is compounded by over-permissive, static access rights that provide little to no visibility into who and what is using access and how. Vaguer is how identities are being/should be monitored and protected. Availability of modern, cloud-managed identity services is widespread. Yet organizations have been slow to pivot their security programs from traditional endpoint, network, and SecOps to an approach that focuses on identity orchestration and experiences, which is dynamic and distributed. Where there are no perimeters, a multitude of identity verification services and managed identity services exist.

In order to gain insights into these trends, ESG surveyed 488 IT and cybersecurity professionals personally responsible for identity and access management programs, projects, processes, solutions/platforms, and services at large midmarket (500 to 999 employees) and enterprise (1,000 or more employees) organizations in North America (US and Canada).

Topics: Cybersecurity Identity and Access Management