Industry perspectives on securing the enterprise from Voice of the Service Provider

451 Research's Voice of the Service Provider service helps to both qualify and quantify buying behaviors, business drivers and strategic priorities for the expanding universe of public cloud providers, hosters, MSPs, telcos, systems integrators, SaaS companies and colos.

The infrastructures and architectures of most large enterprises are starting to resemble those of service providers – with networked datacenters, diverse communication channels, distributed user communities, elastic and scalable services, and agile delivery. This constantly evolving and expanding ecosystem often includes a rapid influx of new technologies and capabilities that are only surpassed by the growing and intensifying threat landscape rising from these advancements. Not only are these environments much more difficult and complex to secure than traditional, centralized IT, but there is also a steep learning curve to fully grasp the intricacies of a 'service provider like' model. With this mind, 451 Research recently asked several service providers what advice they have for enterprises moving in this direction.

Enterprise infrastructures have evolved beyond being solely built to offer intra-company connectivity and services to employees. They now provide services directly to customers, enabling and powering new products and services, and integrating with a long chain of partners, suppliers and distributors. However, securing such customer-facing cloud environments that operate at scale is significantly more challenging. Organizations have to take into account factors such as threat detection and regulatory compliance across multi-cloud, identity management, and disparate tools for edge device authentication. Assuming all clouds are alike is one of the main mistakes enterprises make. Security experts with service providers of all sizes have many recommendations for enterprises such as having a defense-in-depth strategy with comprehensive controls, leveraging APIs and automation to the greatest extent possible, and partnering as needed to fill skills and capability gaps.
Continue reading

The cloud transformation journey: Great expectations lead to a brave new world

It's easy to think of cloud adoption as a one-time event – you choose a cloud and you consume that cloud, and the rest is history – but realistically, for most enterprises this is an incremental and iterative process. Traditional refresh cycles drive periodic purchases of new hardware and updates of software – for cloud, rapidly growing feature sets and on-demand consumption require frequent reassessment of the venues and technologies that best meet changing enterprise needs. No one wants to move providers all the time – enterprises naturally try and optimize what they already have; providers that are best at accommodating them are likely to have the most loyal customers.

Our cloud transformation journey model shows the enterprise cloud cost experience over time. We identify the cycle of cloud consumption – migration and implementation, cost-savings and cost-increases, governance and optimization, and transformative value. The ups and downs of this experience and the time required to realize value vary by company and by application; with experience and automation, the amplitude of the curve flattens and the time to value shortens. And then it starts all over again. It represents the costs payable at each stage of the enterprise journey to value-adding 'utility' IT. Read the full report here.

The Cloud Transformation Jorney

Survey finds security continues to be top priority in deploying IoT projects

451 Research’s most recent Voice of the Enterprise: Internet of Things Vendor Evaluations survey found that security continues to be a major concern for IT professionals when deploying IoT projects within their organizations. When asked to rank which technologies or processes their organizations considered for current or planned IoT initiatives, 55% of respondents ranked IoT security as their top priority.

Vote VE IoT 2018 PR Graphics 1
Continue reading

Webinar: 2018 Digital Commerce Fraud Outlook

Transactions are migrating from offline to online channels, driving dramatic shifts in the fraud landscape. 2018 will be another challenging year as increasing EMV penetration in the US further throttles the counterfeiting market, shifting more fraudulent activity into digital channels.

Join 451 Research Principal Analyst Jordan McKee as he discusses the major fraud trends to monitor in the upcoming year and shares market data on the current and future state of the digital commerce threat environment. Register for the webinar on BrightTALK below:

Webinar: 2018 Trends in Information Security

In 2018, the gains realized from applied analytics will become so pervasive that we expect virtually every security product to be an analytics product. Automation will become more evident, identity will assume new importance, and consolidation will be the word of the day at the endpoint. With new classes of security concerns already making headlines in 2018 – and with EU Global Data Protection Regulation and privacy in the spotlight - what risks are on the horizon?

Join Scott Crawford, Research Director, Information Security at 451 Research for a live webinar on February 13 as he reviews these and other trends expected to shape the information security landscape in 2018, and the level of impact those trends will have on the market. Come armed with questions, as there will be a live Q&A session at the end of the webinar.

Register now!