Nemertes Blog

Everything is different now. That's true for all of us, as we cope with the enduring presence and lingering aftereffects of the Covid-19 pandemic. But it's particularly true for enterprise technologists, who are witnessing a once-in-a-generation set of paradigm shifts that are transforming how companies and...

As enterprises begin to embrace the idea of edge computing, all evaluations should begin with use cases. After all, the only reason to deploy resources on or near a remote location, as opposed to in a data center or in the cloud, is to meet stringent,...

Growing video sharing and streaming demand requires a proactive strategy. Image: metamorworks - stock.adobe.com COVID-19 has driven a massive jump in enterprise adoption and video use. In this related No Jitter article, I previously noted that more than 91 percent of the 528 companies we observed for our...

The concept of threat-informed defense is near and dear to my heart, given that it aligns with three themes I've been preaching about for years: the importance of matching cybersecurity investments (in both technology and operations) with risk;  the value of aligning one's cybersecurity practices...

Edge computing focuses on putting compute and storage resources outside the enterprise data center, in or near branches. But edge computing, propelled by IoT and poised to grow with the spread 5G services, is not traditional decentralized computing. CIOs need to understand what drives an edge computing strategy in order...

In the past few years, there has been an explosion of cloud service offerings to match the wide variety of industry cloud infrastructure needs. Today, the average enterprise uses external clouds to deliver more than 56% of its workloads. Plus, nearly all organizations operate multi-cloud...

IT Service Management (ITSM) defines the processes that organizations use to deliver information technology in a way that delivers measurable business value. For the last several years organizations have adopted structured ITSM approaches, often based on ITIL (IT Infrastructure Library), to ensure that IT services...

Organizations can realize maximum business value for investments with a proactive approach to video conferencing deployment, management and employee engagement Nemertes’ recently published “Visual Communications and Collaboration: 2020-21.” This global research study of more than 525 end-user organizations found that just 8.2% plan to return to...

Work from home is attractive to some, but not all. Here are some tips to create a work strategy that offers flexibility to support different desires. In my recent client conversations, work from home (WFH) is the primary topic, along with if, or how, a return...

According to Nemertes' Cloud and Cybersecurity 2019-2020 Research Study, 2019 was the year the average enterprise for the first time found more than half its IT workloads running outside the data center. This ongoing shift of enterprise IT work into cloud environments -- whether SaaS,...

The ultimate end state of software-defined network security is what we at Nemertes Research call deep segmentation. The term refers to the ability to finely control what entities can see, who they communicate with and how they do this, end to end across the enterprise network. With...

There are no shortages of application options -- and, with them, technology costs -- in the contact center. But the key focus for any spending should be to improve the customer experience.There are a variety of contact center technology options, including contact center software, customer...