Research Blogs

More than a third of organizations in Nemertes Research's recent Cloud and Cybersecurity Research Study do not yet use public cloud infrastructure and platform services. Even enterprises that embrace the public cloud typically still conduct a significant portion of their IT workloads inside their data...

Johna Till Johnson, CEO and Founder of Nemertes Research, became the Content Committee Chair for the Wall Street Technology Association (WSTA®) in January of 2019. After almost two decades of working with the WSTA in various capacities – including during her previous role as Chief...

Having a clearly defined IoT architecture framework greatly improves the chances for success of an enterprise's connected deployment. If your company is like many organizations, it's actively engaged in or considering launching one or more IoT initiatives. It has a goal, a strategy and a desired...

Bellwether cybersecurity technologies -- advanced endpoint security, behavioral threat analytics and a trio of cloud-based apps -- are used by successful cybersecurity teams. Find out why. When it comes to cybersecurity, what differentiates highly successful enterprise technology organizations from their less successful counterparts can often be...

The time has come for IT to once again dive into the world of homegrown automation for running their networks. Network teams have a love/hate relationship with automation, and have had for decades. Time after time, they have tentatively extended the reach of automation, working with...

Nokia is bringing enterprise services to the fore in a concerted effort to increase its reach (and revenues) outside its better known communications service provider markets. They want IoT, 5G, and SD-WAN to be their foot (feet?) in the enterprise door, creating opportunities to expand...

I attended the Mitel Next conference in Phoenix last week. Though no big announcements came out of the conference, there were some key takeways. Mitel executives conveyed the message to customers and partners that they’re not abandoning on-premises Unified Communications (UC) or contact center customers. Unlike...

Should you be worried about the Chinese Supermicro spy chip revelations? In a nutshell, yes. If you're among the organizations using Supermicro server boards: Run, do not walk, to your server rooms and examine the boards in minute detail. And regardless of what server hardware you use,...

[caption id="attachment_4456" align="aligncenter" width="300"] DevOps is Coming! In character as Paul Revere. Photo by WSTA[/caption] Last month I presented the keynote at an afternoon seminar on Enterprise Architecture held by the Wall St. Technology Association (WSTA). I also moderated a panel session on the topic. Other presenters and...

[caption id="attachment_4442" align="alignleft" width="300"] Not just a box: Firewall, router, SD-WAN, and WAN optimizer![/caption] AT&T's Universal CPE It’s always fun seeing something you’ve helped with reach fruition. So I was thrilled yesterday at the AT&T Summit to finally see the universal CPE (uCPE) device. AT&T has made...

I've been mulling over things I learned at the recent CenturyLink analyst day. I keep coming back to their pledge to not lose focus on the fact that they own a transport network, and to make sure that fact can provide differentiation when considering new...

As adoption of team collaboration applications grows, so do concerns related to governance, retention, and security of conversations stored within them. Organizations, especially those in regulated industries, have spent a great deal of time, money, and effort to build security strategies for their documents, email, and...