ESG Complete Survey Results: ESG/ISSA Cybersecurity Process and Technology Survey

Abstract:

ESG conducted a comprehensive online survey of IT professionals from private- and public-sector organizations in North America (United States and Canada), Western Europe, Central/South America, Africa, Asia, and Australia between December 20, 2021 and December 31, 2021. To qualify for this survey, respondents were required to be information security managers, chief information officers, IT senior executives, IT managers/directors, or general IT staff responsible for information security and other comparable titles.

This Complete Survey Results presentation focuses on cybersecurity technology purchase trends, including the current threat landscape’s impact on strategies and subsequent buying decisions, efforts to consolidate vendors and products, the appetite for cybersecurity platforms, and cybersecurity process integration with DevOps practices.

Topics: Cybersecurity ISSA

ESG Brief: Has the Web Browser Become the New Operating System?

Abstract:

End-users are increasingly relying on web browsers as their primary access to corporate applications and data. The most commonly used web browsers are Google Chrome, Mozilla Firefox, Microsoft Edge, and Apple Safari. Due to advances in technology, security, and internet speeds, browsers can provide several advantages in a corporate environment compared to PC and mobile operating systems. Yet browser security remains a major issue among IT professionals charged with managing security patches, updates, and policies as part of an overall end-user computing (EUC) strategy. As businesses accelerate the adoption of applications accessed through web browsers, and IT continues to improve support and security for multiple browsers, enterprises may one day treat browsers as the de facto operating system in a corporate environment.

Topics: Enterprise Mobility

ESG Brief: The Impact of 5G on End-user Computing Strategies

Abstract:

The significant performance and bandwidth advantages of 5G cellular networks have numerous implications for businesses as well as consumers. 5G has the potential to deliver reliable connections for hybrid work and collaboration strategies while enabling augmented reality and other multimedia applications to run on a wider range of endpoints and locations. To realize these opportunities, IT leaders should consider 5G integral to their network infrastructure plans and strategies.

Topics: Enterprise Mobility

ESG Complete Survey Results: The Long Road Ahead to Ransomware Preparedness

Abstract:

ESG conducted a comprehensive online survey of IT and cybersecurity professionals from private- and public-sector organizations in North America (United States and Canada) and Western Europe (UK, France, and Germany) between December 21, 2021 and January 10, 2022. To qualify for this survey, respondents were required to be IT and cybersecurity professionals involved with the technology and processes associated with protecting against ransomware.

This Complete Survey Results presentation focuses on understanding the proactive and reactive measures organizations have in place to defend against the growing ransomware threat, and identifying the priorities and plans associated with mitigating the ransomware threat in the coming 12-18 months.

Topics: Cybersecurity Data Protection

ESG Complete Survey Results: Securing the Identity Perimeter with Defense in Depth

Abstract:

ESG conducted a comprehensive online survey of IT and cybersecurity professionals from private- and public-sector organizations in North America (United States and Canada) between December 14, 2021 and December 28, 2021. To qualify for this survey, respondents were required to be IT and cybersecurity professionals focusing on identity and access management programs, projects, processes, solutions/platforms, and services.

This Complete Survey Results presentation focuses how organizations are currently monitoring and protecting identities in terms of the breadth of identity products, platforms, and technologies supporting current business operations, as well as how that is expected to evolve over time.

Topics: Cybersecurity Identity and Access Management

ESG Infographic: 2022 Ransomware Landscape

Abstract:

From frequent attacks on critical systems to major data recovery issues and financial impacts, ransomware consequences refuse to be ignored.

See the data behind these trends and more with this ESG Infographic, 2022 Ransomware Landscape.

Topics: Cybersecurity Data Protection

ESG Research Report: The Long Road Ahead to Ransomware Preparedness

Abstract:

The ransomware threat is a top-of-mind issue for so many organizations; however, few feel totally prepared for an attack. Without an industry reference architecture or blueprint for ransomware protection, organizations are building their own strategies and processes to respond. But with ransomware protection included with so many different security and data protection solutions, many are confused about the scope of what is to be included, who is responsible for the implementation, and who needs to be involved in the conversation.

In order to connect the dots between those organizations that feel most prepared and the specific strategies and plans they are using to get there, with an eye on defining best practices, ESG surveyed 620 IT and cybersecurity professionals personally involved with the technology and processes associated with protecting against ransomware attacks at midmarket and enterprise organizations in North America and Western Europe.

For more information on this research, please visit www.esg-global.com/ransomware.

Topics: Cybersecurity Data Protection