Recent Posts by ESG:

ESG Complete Survey Results: SOC Modernization and the Role of XDR

Research Objectives

Examine the people, processes, and technology supporting the modernization of security operations. Identify key value points, the metrics to back up those value points, and what’s expected from both products and managed services for XDR and SOC modernization. Determine current perception and role of XDR as a component of security operations modernization efforts. Explore strategies used to automate triage, speed investigations, and help organizations find unknown threats.

Topics: Cybersecurity

ESG Complete Survey Results: The Role of ESG Programs in IT Decision Making

Research Objectives

Measure the impact of environmental, social, and governance (ESG) initiatives on the IT evaluation and purchase process. Identify the groups within organizations most responsible for adhering to ESG requirements as part of IT purchases. Highlight the costs and benefits that organizations have experienced as a result of complying with ESG initiatives. Determine which vendors/brands are perceived as strong in terms of ESG and which are viewed as laggards.

Topics: Storage Cybersecurity Data Protection Networking Data Platforms, Analytics, & AI Converged Infrastructure Cloud Services & Orchestration Systems Management End User Computing

ESG Research Report: The Role of ESG Programs in IT Decision Making

Research Objectives

In order to gain insight into how environmental, social, and governance (ESG) initiatives are impacting IT purchases, Enterprise Strategy Group (also ESG) surveyed 400 IT professionals at organizations in North America (US and Canada), UK, Singapore, Australia, and New Zealand involved in IT product and service purchase decisions.

Topics: Storage Cybersecurity Data Protection Networking Data Platforms, Analytics, & AI Converged Infrastructure Cloud Services & Orchestration

ESG Infographic: The State of Digital Ecosystems at the Edge


The need to collect and analyze data generated at edge locations is playing an increasingly important role in enabling organizations to improve quality, deliver enhanced experiences (both customer and employee), and gather deeper insights into the business. To understand how IT organizations are leveraging and optimizing their use of important edge sites, ESG surveyed IT professionals responsible for their organization’s edge computing applications, tools, policies, and procedures.

Topics: Data Platforms, Analytics, & AI Cloud Services & Orchestration Infrastructure, Cloud and DevOps

ESG Infographic: The State of DataOps


Between data quality issues, distributed data, over-burdened teams, rising costs, and increased risk, the complexity of today’s data ecosystem hinders democratization of data and analytics. This is a big reason organizations are turning to DataOps, an agile, automated, and process-oriented methodology used by data stakeholders to improve the quality, delivery, and management of data and analytics.

Topics: Data Platforms, Analytics, & AI Converged Infrastructure Cloud Services & Orchestration

ESG Complete Survey Results: Distributed Cloud Series: Digital Ecosystems

Research Objectives

Understand the current state of the edge computing environment, including budgets and prioritization. Determine the key drivers, challenges, benefits, and use cases for edge computing. Get an accurate picture of edge infrastructure, network, security, and data environments. Identify vital players and their roles/influence for enabling edge environments.

Topics: Networking

ESG Complete Survey Results: The State of DataOps

Research Objectives

Determine the extent to which organizations have shifted power to new personas who influence and make decisions when it comes to utilizing an analytics platform that enables rapid and reliable insight. Understand the tipping point for all data stakeholders, including data engineers, IT, developers, and end-users who enable the democratization of data and analytics platforms to the business. Gain insights into what matters most to businesses and end-users based on where they are in their data-centric journey, from data engineering and tooling to automation and collaboration. Gauge buyer preferences for different capabilities, features, and guidance to help enable data-driven success.

Topics: Data Platforms, Analytics, & AI

ESG Infographic: The 5 Pillars of Ransomware Preparedness


The ransomware threat is a top-of-mind issue for many organizations, but few feel totally prepared for an attack. IT organizations are building their own processes to respond, but many are confused about the scope of what is to be included and even who is responsible for the implementation. In order to establish a framework for modern ransomware preparedness, ESG surveyed IT and cybersecurity professionals personally involved with protecting against ransomware attacks and developed the 5 pillars of ransomware preparedness.

Topics: Identity and Access Management Ransomware

ESG Infographic: Trends in Modern Application Protection


Securing applications has become more difficult than ever thanks to heterogeneous application environments, distributed responsibility for application security, and advanced attack campaigns. Converged application protection platforms have emerged to address many of these issues, but organizations can struggle with prioritizing the capabilities they require, assessing the different types of tools available, and meeting the diverse needs of a broad set of stakeholders.

Topics: Application & Infrastructure Modernization

ESG Complete Survey Results: Trends in Modern Application Protection


ESG’s Complete Survey Results provide the complete output of syndicated research surveys in graphical format. In addition to the data, these documents provide background information on the survey, including respondent profiles at an individual and organizational level. It is important to note that these documents do not contain analysis of the data.

This Complete Survey Results presentation focuses on how modern application environments and API usage have impacted security strategies, including the inflection point organizations have reached with traditional web application firewalls, as well as preferences for converged web application and API protection solutions.

Topics: Cybersecurity ISSA