ESG Complete Survey Results: The Role of ESG Programs in IT Decision Making

Research Objectives

Measure the impact of environmental, social, and governance (ESG) initiatives on the IT evaluation and purchase process. Identify the groups within organizations most responsible for adhering to ESG requirements as part of IT purchases. Highlight the costs and benefits that organizations have experienced as a result of complying with ESG initiatives. Determine which vendors/brands are perceived as strong in terms of ESG and which are viewed as laggards.

Topics: Storage Cybersecurity Data Protection Networking Data Platforms, Analytics, & AI Converged Infrastructure Cloud Services & Orchestration Systems Management End User Computing

ESG Research Report: The Role of ESG Programs in IT Decision Making

Research Objectives

In order to gain insight into how environmental, social, and governance (ESG) initiatives are impacting IT purchases, Enterprise Strategy Group (also ESG) surveyed 400 IT professionals at organizations in North America (US and Canada), UK, Singapore, Australia, and New Zealand involved in IT product and service purchase decisions.

Topics: Storage Cybersecurity Data Protection Networking Data Platforms, Analytics, & AI Converged Infrastructure Cloud Services & Orchestration

ESG Infographic: Distributed Cloud Series: Observability from Code to Cloud

Abstract:

IT operations teams continue to strive to improve collaboration with developers on building modern application architectures. As companies accelerate or embark on their digital transformation journeys, what is the expected role of ITSM in enabling businesses to realize the benefits of automation, observability, intelligence, and optimization? ESG recently surveyed IT, DevOps, and application development professionals responsible for application infrastructure to find the answers.

Find out what ESG research uncovered with this free infographic, Distributed Cloud Series: Observability from Code to Cloud.

Topics: Cybersecurity Data Protection

ESG Infographic: Securing the Identity Perimeter with Defense in Depth

Abstract:

Organizations continue to rely on user and machine identities that are susceptible to compromise, misuse, and theft. Modern, cloud-managed identity services are available, but organizations have been slow to pivot their security programs to an approach that focuses on identity orchestration and experiences. ESG surveyed IT and cybersecurity professionals responsible for identity and access management programs and solutions to gain insights into these trends.

Topics: Data Protection Identity and Access Management

ESG Complete Survey Results: The Long Road Ahead to Ransomware Preparedness

Abstract:

ESG conducted a comprehensive online survey of IT and cybersecurity professionals from private- and public-sector organizations in North America (United States and Canada) and Western Europe (UK, France, and Germany) between December 21, 2021 and January 10, 2022. To qualify for this survey, respondents were required to be IT and cybersecurity professionals involved with the technology and processes associated with protecting against ransomware.

This Complete Survey Results presentation focuses on understanding the proactive and reactive measures organizations have in place to defend against the growing ransomware threat, and identifying the priorities and plans associated with mitigating the ransomware threat in the coming 12-18 months.

Topics: Cybersecurity Data Protection

ESG Infographic: 2022 Ransomware Landscape

Abstract:

From frequent attacks on critical systems to major data recovery issues and financial impacts, ransomware consequences refuse to be ignored.

See the data behind these trends and more with this ESG Infographic, 2022 Ransomware Landscape.

Topics: Cybersecurity Data Protection

ESG Research Report: The Long Road Ahead to Ransomware Preparedness

Abstract:

The ransomware threat is a top-of-mind issue for so many organizations; however, few feel totally prepared for an attack. Without an industry reference architecture or blueprint for ransomware protection, organizations are building their own strategies and processes to respond. But with ransomware protection included with so many different security and data protection solutions, many are confused about the scope of what is to be included, who is responsible for the implementation, and who needs to be involved in the conversation.

In order to connect the dots between those organizations that feel most prepared and the specific strategies and plans they are using to get there, with an eye on defining best practices, ESG surveyed 620 IT and cybersecurity professionals personally involved with the technology and processes associated with protecting against ransomware attacks at midmarket and enterprise organizations in North America and Western Europe.

For more information on this research, please visit www.esg-global.com/ransomware.

Topics: Cybersecurity Data Protection

ESG Brief: Data Is the Business

Abstract:

Building on existing trends favoring digital transformation initiatives, the pandemic sparked a further shift toward data-centric business models, with virtually all enterprises now using data to support the business and a remarkable one in five claiming data as their core business. To treat data like the business asset it has become, it must be de-risked, protected, made compliant, and leveraged. This will require IT professionals and vendors alike to develop intelligent data management strategies that not only preserve and protect data but also ready it for use in achieving business growth objectives.

Topics: Data Protection data management

ESG Brief: Intelligent Data Management

Abstract:

Driven by data's rapid growth, the menace of cyber-threats and the enterprise push for digital transformation, among other factors, intelligent data management is fast becoming a priority for data protection and storage professionals. More than two-thirds rank it among their organizations' top five data protection and management priorities, a dramatic change from two years ago when only a third of organizations considered intelligent data management a top priority. Among digitally mature organizations, adoption is even higher, suggesting that interest in this approach will continue to grow as digital laggards achieve digital transformation maturity. One in five organizations believe intelligent data management will replace their overall data protection strategies. Learn why now is the time to shift to intelligent data management.

Topics: Data Protection data management

ESG Brief: Compliance and Data Sanitization

Abstract:

Nearly 80% of organizations require data to be made compliant with external mandates or internal standards before it’s reused for non-production purposes. Most also sanitize such data, and increased confidence levels about passing compliance audits are especially pronounced among those that do. But many organizations don’t sanitize or apply compliance processes to all of their secondary data, and these partial approaches can limit the effectiveness of their de-risking efforts and leave them exposed to potential compliance issues.

Topics: Data Protection data management