Research Blogs

' The right IoT database depends on the requirements of each IoT project. The first step to select a database is to factor in critical characteristics of IoT when selecting among database architectures. IoT technologists must determine the types of data to be stored and managed; the data...

Almost since the inception of the commercial Internet, security compromises exploiting the ability to hijack dynamic code content have plagued us.  I think cross-site scripting, a form of client-side attack, has been on OWASP's annual top 10 web security threat list since the list's creation. ...

' When it comes to implementing IoT initiatives, tech leaders should internalize one key lesson: IoT infrastructure matters. A growing number of organizations adopt IoT to achieve new goals and improve established processes, which testifies to the advantages that the technology can provide. More than two-thirds of organizations...

Like many industry watchers, I expected to see IT budgets plummet from the financial effects of the COVID-19 pandemic. Though there are changes to IT spending, they aren’t as bleak as they could be — driven in large part by the need to equip home...

The National Security Agency (NSA) recently issued a set of guidelines for configuring IPsec VPNs. You can read the guidelines here; the key points are the following: Reduce the VPN gateway attack surface Verify that cryptographic algorithms are Committee on National Security Systems Policy (CNSSP) 15-compliant ...

Businesses have been moving infrastructure and applications to the cloud for years, but others have remained skeptical about the merits. With concerns about management, performance, security, costs and keeping a competitive edge, CX leaders question whether they want to relinquish their tightly controlled contact center...

With more than 91% of organizations now supporting work-from-home, and an astounding 72% of employees now working remotely, video conferencing has become an integral part of supporting the virtual workplace. According to Nemertes’ Visual Communications and Collaboration: 2020-21 Research Study, more than 91% of participating...

Organizations are dropping their audio conferencing services in favor of video meeting platforms as they consolidate overlapping features and seek integrated communications. The modern workplace, especially during the pandemic, is increasingly built around collaboration tools, such as meeting applications that integrate voice, video conferencing and screen...

Ramping up Risk, pre-COVID-19 and mid-COVID-19 Enterprise organizations pour hundreds of millions into their cybersecurity initiatives, protecting  everything from remote and cloud-based resources to IoT devices to collaboration applications. At the same time, they're also transforming interactions with their employees and customers. They're increasingly enabling employees to...

Reducing the risk of bringing workers back into the office requires thoughtful use of technology and policy. As the rush to enable work-from-home (WFH) subsides, IT, facilities, and HR professionals are now starting to think about the future; specifically, they’re questioning how they bring people back...

Where the Work Is Nemertes documented last year as the first year in which the majority of enterprise workloads ran in external cloud environments, with 27% in SaaS and 29% now in IaaS. While these migrations tend to be one-way, out of the data center and into...