Research Brief: Ransomware Data Recovery Needs Work

Abstract:

Most organizations are not doing a very good job of protecting all their mission-critical data and applications. And, after suffering a ransomware attack, these victimized companies further report difficulties in recovering clean and recent data that might also have been compromised. Businesses have several options to protect their data and applications from attack but are slow in adopting perhaps the most viable and practical solution: air-gapped data protection infrastructure.

Topics: Cybersecurity Data Protection

Research Brief: Ransomware: The Gift That Keeps on Taking

Abstract:

Ransomware attacks are frequent, disruptive, and costly, but paying a ransom to the perpetrators as a quick fix is a bad idea. Ransom payments usually don't guarantee the return of all the stolen data or prevent further attacks. Even the data that's returned may have been encrypted or compromised. That's why ransomware attacks must be prevented before they happen. And if they do occur, a foolproof data backup and recovery process must be in place to avoid suffering the consequences of paying a ransom and rewarding bad behavior.

Topics: Cybersecurity Data Protection

Research Brief: State of the Ransomware Preparedness Market

Abstract:

Findings from a TechTarget’s Enterprise Strategy Group survey gauging the state of the ransomware preparedness market conclude that much work lies ahead for many organizations as they holistically address and resolve ransomware's ongoing threat to disrupt IT and business operations. Though most organizations are at a relatively low level of ransomware preparedness maturity, a notable gap exists in attack prevention and data recovery between the companies most prepared and the industry average.

Topics: Cybersecurity Data Protection

Research Brief: The State of DataOps Implementations

Abstract:

The demand for rapid actionable analytical insights is forcing organizations to prioritize agility, transparency, and speed across their data ecosystems. These enterprises are investing in data-driven initiatives that maximize operational efficiency, improve collaboration, and accelerate time to value. They're turning to DataOps.

Topics: data management Data Analytics

Research Brief: The Shift in DataOps Stakeholders

Abstract:

Gone are the days when the data engineer was the key persona driving DataOps. IT operations, line-of-business leaders, developers, and end-users can all claim roles in the direction of their company’s DataOps initiatives. While this cross-functional team approach to DataOps is viewed as a positive trend, the ongoing technical skills gap in key DataOps positions continues to plague most organizations, overburden stakeholders, and compromise the value of DataOps initiatives.

Topics: data management Data Analytics

Research Brief: The Value of DataOps Initiatives

Abstract:

Data quality issues, distributed data, tool proliferation, overburdened and underskilled teams, rising costs, and increased risk all contribute to the complexities of today’s data ecosystem that hinder the democratization of data and analytics. As a result, organizations are looking for ways to empower data teams to reliably deliver data and analytics to all consumers. DataOps processes liberate data silos and democratize workloads throughout the data lifecycle, yielding significant improvements in data quality, cross-functional collaboration, and analytics outcomes.

Topics: data management Data Analytics

Research Brief: What Ransomware Attackers Really Want

Abstract:

Ransomware attackers disrupt business operations by targeting a variety of data sources and leveraging multiple types of infrastructure to get what they want: business’ money. But the most often targeted point of entry in successful ransomware attacks is not a bad link in an infected email. Rather, the most vulnerable points of attack lie in the software and misconfigurations. Therefore, organizations must plan for every contingency, look beyond safeguarding the obvious vulnerabilities, and protect all components of their IT environment.

Topics: Cybersecurity Data Protection

Research Brief: IT and Business Priorities Supported with Hosted Desktops

Abstract:

VDI and DaaS are primed to displace traditional desktops, as the benefits of hosted desktops for both IT and the business come into focus. Over the next 12 to 24 months, organizations plan to decrease their use of traditional desktops, while use of VDI and DaaS, by contrast, shows no signs of decreasing, suggesting that hosted desktops are becoming the approach of choice for IT decision makers.

Topics: End User Computing

Research Brief: Evolving Remote Work Policies Complicate and Elevate Role of IT

Abstract:

In the wake of COVID-19 lockdowns, virtually all organizations made significant improvements to their end-user computing (EUC) environments, primarily by investing in existing solutions or by supplementing their historical solutions with new products. Now is not the time to let up. While the top EUC challenges businesses face today are the same ones they grappled with pre-pandemic (e.g., supporting remote and hybrid work, security, and identity access management), workplace locations and policies have changed. IT decision makers must rise to the challenge of a fluid and evolving workplace and implement EUC technologies that shape the future of work.

Topics: End User Computing

Research Brief: EUC Strategies Driven by Operational Efficiency Despite IT’s Continued Reliance on Legacy Technology

Abstract:

Most end-user computing strategies are carried out amid a complex mix of legacy systems and newer technologies. Organizations must balance their top priority (security) with the challenges IT faces in managing security for the growing array of endpoint devices preferred by employees. Cloud consumption models and newer security approaches hold promise for simplifying those responsibilities, cutting costs, and improving flexibility and service.

Topics: End User Computing

Research Brief: Endpoint Hardware Highlighted as a Top UCC Challenge

Abstract:

The quality and flexibility of endpoint hardware is now seen as the critical driver of unified communications and collaboration strategies. While networking requirements also play a major role, no factor influences the UCC employee and customer experience more than hardware. Organizations should keep end-user computing environments and endpoint hardware in the forefront of their UCC planning while seeking cost and labor savings from cloud delivery models.

Topics: End User Computing

Research Brief: Why Organizations Are Revisiting Smartphones for Device Consolidation

Abstract:

Endpoint devices, with their growing capabilities and variety, are increasingly driving end-user computing strategies and have now overtaken operating systems and applications as the determining factor in EUC delivery models. While traditional desktop and laptop systems remain important, IT departments are investigating the viability of smartphones to serve as a single device for users, perhaps backed by cloud-based virtual desktop infrastructure. The potential support, security, and cost advantages from consolidating multiple end-user devices on one platform are significant. However, this isn't the first time device consolidation has come up. Today's device management and security strategies have evolved, as have the demands on digital workspaces, but is the landscape different enough to give it another shot?

Topics: End User Computing

Research Brief: Businesses Have Surged Through Initial UCC Implementation Wave

Abstract:

To support the rise in remote work triggered by COVID-19 work-from-home mandates, most IT organizations (91%) maintain multiple meeting and collaboration platforms. Employee response to the number and variety of the unified communications and collaboration (UCC) platforms provided has been exceptionally positive, with 90% of survey respondents highly satisfied with their meeting and collaboration software. The challenge for EUC professionals is maintaining momentum. Employee experience vis-à-vis UCC technology has become a top EUC priority for businesses, second only to improving IT efficiency and on par with managing security risks. With hybrid work likely to remain the norm, even as employees return to offices, continued investment in UCC solutions will be needed to preserve the current high levels of employee satisfaction.

Topics: End User Computing

Research Brief: The Need to Operationalize Strong Authentication

Abstract:

Challenged by ransomware and other password-related breaches and attacks, organizations are taking action to strengthen their authentication processes by deploying multifactor authentication (MFA). Like passwords, MFA is susceptible to attack, and doesn’t completely address the authentication problem. Passwordless authentication methods can protect against phishing and other attacks. To increase security and gain additional benefits, such as a better user experience and improved efficiency of IT and security teams, organizations need to operationalize strong authentication, making MFA or passwordless authentication mandatory.

Topics: Cybersecurity

Research Brief: The Complexity of Identity Security

Abstract:

Managing and securing the identities of an organization to increase security can be a challenge, and it is getting more challenging with the increased need for anywhere, anytime access to both cloud and in-house resources. Organizations are leveraging third parties and commercial solutions, including privileged access management (PAM) and identity governance and administration (IGA) to secure identities in their IT environment.

Topics: Cybersecurity

Research Brief: Identity Proofing, Screening, and Monitoring Reduce Risk

Abstract:

As business activity shifts online, with a hybrid workforce, many activities are conducted over the network rather than in person, exposing an organization to fraud and attacks by nefarious individuals or groups or through identity theft. Organizations are increasingly protecting themselves from the uncertainty of working entirely online by using services to help screen their employees, contractors, and customers to prove they are who they say they are.

Topics: Cybersecurity

Research Brief: The Benefits of Commercial CIAM Solutions

Abstract:

Building an in-house system to manage customer and third-party usernames and passwords may seem straightforward, but in practice may be an unexpectedly difficult task fraught with security risks. As a result, organizations are increasingly turning to customer identity and access management (CIAM) solutions to help increase performance and scalability with less effort and expense. While enterprises are turning to commercial CIAM solutions, IT and cybersecurity leaders are facing issues as they evaluate their CIAM options.

Topics: Cybersecurity

Infographic: 2023 Technology Spending Intentions Survey

Abstract:

Despite global macroeconomic conditions, aggressive technology investments are expected to continue among more digitally transformed organizations. See highlights from research into these trends by TechTarget’s Enterprise Strategy Group with this infographic, 2023 Technology Spending Intentions.

Topics: Storage Cybersecurity Data Protection Networking Data Platforms, Analytics, & AI Converged Infrastructure Cloud Services & Orchestration Infrastructure, Cloud and DevOps End User Computing

Infographic: Walking the Line: GitOps and Shift Left Security

Abstract:

Security teams are challenged by the speed of modern software development processes. See data behind the movement to shift security left in an effort to increase security (without slowing down development) with this infographic, Walking the Line: GitOps and Shift Left Security.

Topics: Cybersecurity