Research Brief: Prioritizing Shift Left Security Solutions to Keep Up with Faster Release Cycles

Abstract:

As organizations modernize their software development processes leveraging cloud services for faster, more efficient software application delivery, cybersecurity teams are investing in developer-focused security tools to keep up. ESG research shows organizations have experienced a range of security incidents, many caused by preventable coding mistakes. This puts pressure on security teams to incorporate security into development to fix coding issues before the applications are deployed and to enable efficient remediation to prevent security incidents.

Topics: Cybersecurity

Research Brief: Addressing Cloud Infrastructure and Open Source Code for Cloud Application Security

Abstract:

As organizations move to cloud-native application development to meet business demands with greater productivity and innovation, security teams need to adapt their application security strategies to support modern development processes. Developers’ increased usage of infrastructure-as-code (IaC) to provision their own cloud infrastructure and the availability of open source software (OSS) enable them to efficiently build, release, and update their software. Security teams need to ensure that they have the right security processes and controls in place to support these key components of cloud-native software and to effectively manage risk as development scales.

Topics: Cybersecurity

Research Brief: Ransomware Data Recovery Needs Work

Abstract:

Most organizations are not doing a very good job of protecting all their mission-critical data and applications. And, after suffering a ransomware attack, these victimized companies further report difficulties in recovering clean and recent data that might also have been compromised. Businesses have several options to protect their data and applications from attack but are slow in adopting perhaps the most viable and practical solution: air-gapped data protection infrastructure.

Topics: Cybersecurity Data Protection

Research Brief: Ransomware: The Gift That Keeps on Taking

Abstract:

Ransomware attacks are frequent, disruptive, and costly, but paying a ransom to the perpetrators as a quick fix is a bad idea. Ransom payments usually don't guarantee the return of all the stolen data or prevent further attacks. Even the data that's returned may have been encrypted or compromised. That's why ransomware attacks must be prevented before they happen. And if they do occur, a foolproof data backup and recovery process must be in place to avoid suffering the consequences of paying a ransom and rewarding bad behavior.

Topics: Cybersecurity Data Protection

Research Brief: State of the Ransomware Preparedness Market

Abstract:

Findings from a TechTarget’s Enterprise Strategy Group survey gauging the state of the ransomware preparedness market conclude that much work lies ahead for many organizations as they holistically address and resolve ransomware's ongoing threat to disrupt IT and business operations. Though most organizations are at a relatively low level of ransomware preparedness maturity, a notable gap exists in attack prevention and data recovery between the companies most prepared and the industry average.

Topics: Cybersecurity Data Protection

Research Brief: The State of DataOps Implementations

Abstract:

The demand for rapid actionable analytical insights is forcing organizations to prioritize agility, transparency, and speed across their data ecosystems. These enterprises are investing in data-driven initiatives that maximize operational efficiency, improve collaboration, and accelerate time to value. They're turning to DataOps.

Topics: data management Data Analytics

Research Brief: The Shift in DataOps Stakeholders

Abstract:

Gone are the days when the data engineer was the key persona driving DataOps. IT operations, line-of-business leaders, developers, and end-users can all claim roles in the direction of their company’s DataOps initiatives. While this cross-functional team approach to DataOps is viewed as a positive trend, the ongoing technical skills gap in key DataOps positions continues to plague most organizations, overburden stakeholders, and compromise the value of DataOps initiatives.

Topics: data management Data Analytics

Research Brief: The Value of DataOps Initiatives

Abstract:

Data quality issues, distributed data, tool proliferation, overburdened and underskilled teams, rising costs, and increased risk all contribute to the complexities of today’s data ecosystem that hinder the democratization of data and analytics. As a result, organizations are looking for ways to empower data teams to reliably deliver data and analytics to all consumers. DataOps processes liberate data silos and democratize workloads throughout the data lifecycle, yielding significant improvements in data quality, cross-functional collaboration, and analytics outcomes.

Topics: data management Data Analytics

Research Brief: What Ransomware Attackers Really Want

Abstract:

Ransomware attackers disrupt business operations by targeting a variety of data sources and leveraging multiple types of infrastructure to get what they want: business’ money. But the most often targeted point of entry in successful ransomware attacks is not a bad link in an infected email. Rather, the most vulnerable points of attack lie in the software and misconfigurations. Therefore, organizations must plan for every contingency, look beyond safeguarding the obvious vulnerabilities, and protect all components of their IT environment.

Topics: Cybersecurity Data Protection

Research Brief: IT and Business Priorities Supported with Hosted Desktops

Abstract:

VDI and DaaS are primed to displace traditional desktops, as the benefits of hosted desktops for both IT and the business come into focus. Over the next 12 to 24 months, organizations plan to decrease their use of traditional desktops, while use of VDI and DaaS, by contrast, shows no signs of decreasing, suggesting that hosted desktops are becoming the approach of choice for IT decision makers.

Topics: End User Computing