Research Brief: Ransomware Data Recovery Needs Work

Abstract:

Most organizations are not doing a very good job of protecting all their mission-critical data and applications. And, after suffering a ransomware attack, these victimized companies further report difficulties in recovering clean and recent data that might also have been compromised. Businesses have several options to protect their data and applications from attack but are slow in adopting perhaps the most viable and practical solution: air-gapped data protection infrastructure.

Topics: Cybersecurity Data Protection

Research Brief: Ransomware: The Gift That Keeps on Taking

Abstract:

Ransomware attacks are frequent, disruptive, and costly, but paying a ransom to the perpetrators as a quick fix is a bad idea. Ransom payments usually don't guarantee the return of all the stolen data or prevent further attacks. Even the data that's returned may have been encrypted or compromised. That's why ransomware attacks must be prevented before they happen. And if they do occur, a foolproof data backup and recovery process must be in place to avoid suffering the consequences of paying a ransom and rewarding bad behavior.

Topics: Cybersecurity Data Protection

Research Brief: State of the Ransomware Preparedness Market

Abstract:

Findings from a TechTarget’s Enterprise Strategy Group survey gauging the state of the ransomware preparedness market conclude that much work lies ahead for many organizations as they holistically address and resolve ransomware's ongoing threat to disrupt IT and business operations. Though most organizations are at a relatively low level of ransomware preparedness maturity, a notable gap exists in attack prevention and data recovery between the companies most prepared and the industry average.

Topics: Cybersecurity Data Protection

Research Brief: What Ransomware Attackers Really Want

Abstract:

Ransomware attackers disrupt business operations by targeting a variety of data sources and leveraging multiple types of infrastructure to get what they want: business’ money. But the most often targeted point of entry in successful ransomware attacks is not a bad link in an infected email. Rather, the most vulnerable points of attack lie in the software and misconfigurations. Therefore, organizations must plan for every contingency, look beyond safeguarding the obvious vulnerabilities, and protect all components of their IT environment.

Topics: Cybersecurity Data Protection

Infographic: 2023 Technology Spending Intentions Survey

Abstract:

Despite global macroeconomic conditions, aggressive technology investments are expected to continue among more digitally transformed organizations. See highlights from research into these trends by TechTarget’s Enterprise Strategy Group with this infographic, 2023 Technology Spending Intentions.

Topics: Storage Cybersecurity Data Protection Networking Data Platforms, Analytics, & AI Converged Infrastructure Cloud Services & Orchestration Infrastructure, Cloud and DevOps End User Computing

Research Report: 2023 Technology Spending Intentions Survey

Research Objectives

Based on a survey of 742 senior IT decision makers at midmarket and enterprise organizations, the 2023 Technology Spending Intentions Survey analyzes private and public sector technology spending expectations, the business and technology priorities driving those plans, and year-over-year trends in technology adoption and customer preferences. This year’s study from TechTarget’s Enterprise Strategy Group finds that enterprise technology spending will generally slow due to global macroeconomic conditions and the threat of a worldwide recession, but aggressive investments are expected to continue among more digitally transformed organizations.

For more information on this research, please visit www.esg-global.com/2023-technology-spending.

Topics: Storage Cybersecurity Data Protection Networking Data Platforms, Analytics, & AI Converged Infrastructure data management Application & Infrastructure Modernization End User Computing

Complete Survey Results: 2023 Technology Spending Intentions Survey

Research Objectives

Ascertain IT budget outlook for 2023 overall and for specific technologies. Determine key business and technology priorities driving 2023 spending plans. Establish a profile of digitally mature companies in terms of the technologies and processes underlying their IT strategies. Monitor YoY trends with respect to technology adoption and changing customer preferences.



Topics: Storage Cybersecurity Data Protection Networking Data Platforms, Analytics, & AI Converged Infrastructure data management Application & Infrastructure Modernization End User Computing

ESG Complete Survey Results: SaaS Data Protection: A Work in Progress

Research Objectives

Determine key challenges organizations face deploying and leveraging data protection mechanisms for their SaaS environments. Understand the education and best practices gaps that exist in protecting SaaS environments, with specific focus on key capabilities and data protection SLAs. Gain insights into key trends and requirements for successful high availability and data protection strategies for SaaS environments. Gauge end-users’ data protection knowledge and challenges for specific SaaS environments.

Topics: Data Protection Converged Infrastructure Cloud Services & Orchestration

ESG Research Report: SOC Modernization and the Role of XDR

Research Objectives

Based upon years of previous research, for most organizations, security operations are in a period of both disarray and transition. While organizations expand the development of digital transformation initiatives, cloud-native application development, and remote worker support, SOC teams continue to conduct day-to-day operations using assorted point tools, manual processes, and a shortage of staff and skills. CISOs realize this mismatch leads to an unacceptable reality of ever-increasing cyber-risk.

To address this growing security operations gap, organizations are taking numerous actions to modernize security operations, including automating processes, utilizing advanced analytics, integrating security technologies, and embracing the MITRE ATT&CK framework. In order to gain insights into these trends, ESG surveyed 376 IT and cybersecurity professionals at organizations in North America (US and Canada) personally responsible for evaluating, purchasing, and utilizing threat detection and response security products and services.

Topics: Cybersecurity Data Protection

ESG Infographic: The Role of ESG Programs in IT Decision Making

Abstract:

IT suppliers' environmental, social, and governance (ESG) program status is a new and important evaluation factor for buyers.

See data behind this emerging trend with this free ESG Infographic, The Role of ESG Programs in IT Decision Making.

Topics: Cybersecurity Data Protection Data Platforms, Analytics, & AI Converged Infrastructure Infrastructure, Cloud and DevOps