Analyst Perspectives


Search within Analyst Perspectives blog:

TopBar Analyst Perspectives BottomBar
  • Available Posts: 0

Artificial intelligence (AI) is no longer a futuristic concept but a current reality, and enterprise leaders are recognizing its profound impact on the IT sector. The development and deployment of AI-driven applications across various industries hinge on a robust IT infrastructure and skilled expertise. The words of industry leaders reinforce this sentiment: Amazon's CEO Andy Jassy indicates that...

Read More

Topics: GRC, Operations, Learning Management, Business Planning, Cybersecurity, Generative AI, IT & Technologies, AI and Machine Learning, IT Management, Skills Gap, Bias, Risk Management


As we stand precariously at the intersection of technology and business strategy, ServiceNow’s Knowledge ’25 conference unveiled “the art of the possible” for what service automation can mean in our efficiency-seeking world. ServiceNow has long been a champion of transforming the mundane into the extraordinary, and in the era of AI, it aims to harness the potential of intelligent automation. The...

Read More

Topics: Operations, Generative AI, Intelligent Automation, IT & Technologies, AgenticAI, IT Management, ADM & DevOps, Platforms, Workflow, Control Tower


The need for effective cybersecurity strategies remains a priority as enterprises face ever-increasing complex cyber threats. Nonetheless, the conventional approach in which IT departments, especially Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs), exclusively manage the procurement of cybersecurity software, is showing its limitations. A crucial shift is...

Read More

Topics: Collaboration, Cybersecurity, Security Posture, Generative AI, IT & Technologies, Agentic AI, Data Backup and Recover, EDR


The shift toward a Zero Trust Network Access (ZTNA) framework is a strategic move for enterprises aiming for an enhanced security posture. ZTNA operates on the principle of "never trust, always verify," ensuring that every user and device is authenticated and authorized before accessing resources. In this context, Privileged Access Management (PAM) emerges as a critical enabler for an effective...

Read More

Topics: Cybersecurity, IT & Technologies, Identity and Access Management, PAM, IAM, ZTNA, Privileged Access, Zero Trust


The annual RSAC Conference took place in late April in San Francisco, where over 40,000 professionals from the cybersecurity industry converged at the Moscone Center to discuss the latest trends, products and services aimed at threat identification and organizational security.

Read More

Topics: Cybersecurity, GenAI, IT & Technologies, Agentic AI, EDR, XDR, PAM, SIEM, IAM, Quantum, Threat Intelligence, SOAR, Data Recovery, Data Resilience, ZTNA


As quantum computing advances at an unprecedented pace, the concept of Q-Day—a day when quantum computers can fundamentally undermine our current encryption methods—has entered discussions among cybersecurity professionals and business leaders alike. While there is no definitive date set for Q-Day, we are approaching a critical juncture where traditional cryptographic techniques may no longer...

Read More

Topics: Digital Technology, Cybersecurity, Digital Security


In an era defined by the relentless advance of cyber threats, enterprise security leaders grapple with an overwhelming landscape. Enterprises face complex challenges as sophisticated attacks and increasing responsibilities stretch security teams thin. Many describe daily experiences as perpetual "firefighting," trapped in cycles of reacting to incidents rather than developing proactive strategies...

Read More

Topics: Digital Technology, Cybersecurity


In a defining moment for the artificial intelligence (AI) sector, the recent breach involving Chinese company Liang Wenfeng (makers of DeepSeek AI) has shed light on the emerging cyber threats that challenge the industry. The reported incident revealed that DeepSeek AI had left its ClickHouse database accessible to the public, exposing over one million lines of log entry data. This data included...

Read More

Topics: Digital Technology, Cybersecurity, Generative AI, DeepSeek, OpenAI


Conversational automation leverages artificial intelligence (AI)-powered agents, chatbots and virtual assistants to automate both customer interactions and internal processes. These systems understand natural language, sentiment and intent, generating relevant responses and executing actions based on user input. The software provider landscape is analyzed in the ISG Buyers Guide for...

Read More

Topics: Self-service, natural language processing, Chatbots, Conversational Automation


The evolution from basic task automation platforms to advanced task orchestration and management marks a milestone in the journey toward Intelligent Automation. Task automation platforms initially enabled enterprises to automate repetitive tasks, freeing valuable human resources for more strategic activities. However, as the need for seamless coordination of multiple automated tasks becomes...

Read More

Topics: Digital Technology, RPA


The structures that govern enterprise security teams are under scrutiny. A recent report from a government watchdog group has taken issue with Microsoft’s cybersecurity strategies in the wake of its Exchange Server attacks, prompting the enterprise software giant to re-evaluate its reporting structures. The implications of this shift extend beyond Microsoft itself, with cybersecurity becoming a...

Read More

Topics: Digital Technology, Cybersecurity, CISO


Generative AI (GenAI) software can transform various aspects of enterprise operations, which makes it a critical component of modern business strategies. GenAI tools can automate repetitive tasks such as data entry, report generation and customer interactions. GenAI can improve overall operational efficiency, resulting in time and cost savings for the organization. Another benefit from GenAI...

Read More

Topics: Playbook, Digital Technology, employee experience


The latest ISG Buyers Guide for Cloud Computing Platforms uncovers the market evolution of regional and global cloud providers. Buyers Guides for Public Cloud Platforms, Private Cloud Platforms and Hybrid Cloud Platforms are part of the recent software provider evaluations. ISG Software Research defines Cloud Platforms as a software service for organizations to access virtualized IT resources via...

Read More

Topics: Cloud Computing, Digital Technology, natural language processing, ITOps, Accessibility, Hybrid Cloud Platforms


I am happy to share insights gleaned from our latest Buyers Guide, an assessment of how well software providers’ offerings meet buyers’ requirements. The Cloud Computing Platforms Ventana Research Buyers Guide is the distillation of a year of market and product research by ISG and Ventana Research.

Read More

Topics: Cloud Computing, Digital Technology


Embracing artificial intelligence technologies opens doors for innovation and efficiency. Alongside these opportunities, however, come risks. Threat actors are keenly aware of the potential impact of AI systems and are actively exploring ways to manipulate them. In this Analyst Perspective, I explore the world of adversarial machine-learning threats and provide practical guidance for securing AI...

Read More

Topics: Digital Technology, DevOps and Platforms, AI and Machine Learning


ServiceNow is a global software provider that has developed a cloud computing platform that helps organizations manage digital workflows for enterprise operations. The provider uses its annual Knowledge user conference to educate customers and showcase product announcements. Ventana Research had the opportunity to attend the Knowledge 2024 event and provides this analyst perspective to summarize...

Read More

Topics: IT Service Management, Digital Technology, natural language processing, AI and Machine Learning


The technology landscape for enterprise IT faces a daunting challenge: complexity. As systems grow more intricate, organizations must actively seek ways to simplify the technology stack. This process, known as decomplexification, is crucial for enhancing efficiency, security and collaboration within an enterprise.

Read More

Topics: Cloud Computing, IT Service Management, Digital Technology, DevOps and Platforms


Enterprises are increasingly recognizing the need to streamline operations for efficiency, agility and innovation. This has led to various “operations” or “Ops” initiatives, each focusing on a specific aspect of enterprise IT. From software development and data analytics to IT and cloud management, these Ops groups are transforming the way enterprises operate and compete.

Read More

Topics: Analytics, Cloud Computing, Digital Technology, data operations, Analytic Operations, AIOps


Is your organization prepared for the increasingly sophisticated and pervasive cyber threats that are challenging enterprise CIOs and IT leaders? Our previous analyst perspective underscored the importance of protecting digital assets and driving business growth with Continuous Threat Exposure Management (CTEM) — a proactive approach to identifying and managing cyber threats. In this perspective,...

Read More

Topics: Digital Technology


Cyber threats are becoming more sophisticated and pervasive, posing a major challenge for CIOs and IT leaders. To protect their digital assets and drive business growth, they need a new approach to security: Continuous Threat Exposure Management (CTEM). CTEM software continuously monitors and manages the enterprise’s exposure to cyber risks, enabling a swift and effective response to any security...

Read More

Topics: Digital Technology


Posts by Topic

see all

Posts by Month

see all