Analyst Perspectives


Search within Analyst Perspectives blog:

TopBar aaaaa BottomBar

Currently Showing:

  • for Topic: It Technologies
  • Available Posts: 0

Artificial intelligence (AI) is no longer a futuristic concept but a current reality, and enterprise leaders are recognizing its profound impact on the IT sector. The development and deployment of AI-driven applications across various industries hinge on a robust IT infrastructure and skilled expertise. The words of industry leaders reinforce this sentiment: Amazon's CEO Andy Jassy indicates that...

Read More

Topics: GRC, Operations, Learning Management, Business Planning, Cybersecurity, Generative AI, IT & Technologies, AI and Machine Learning, IT Management, Skills Gap, Bias, Risk Management


As we stand precariously at the intersection of technology and business strategy, ServiceNow’s Knowledge ’25 conference unveiled “the art of the possible” for what service automation can mean in our efficiency-seeking world. ServiceNow has long been a champion of transforming the mundane into the extraordinary, and in the era of AI, it aims to harness the potential of intelligent automation. The...

Read More

Topics: Operations, Generative AI, Intelligent Automation, IT & Technologies, AgenticAI, IT Management, ADM & DevOps, Platforms, Workflow, Control Tower


The need for effective cybersecurity strategies remains a priority as enterprises face ever-increasing complex cyber threats. Nonetheless, the conventional approach in which IT departments, especially Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs), exclusively manage the procurement of cybersecurity software, is showing its limitations. A crucial shift is...

Read More

Topics: Collaboration, Cybersecurity, Security Posture, Generative AI, IT & Technologies, Agentic AI, Data Backup and Recover, EDR


The shift toward a Zero Trust Network Access (ZTNA) framework is a strategic move for enterprises aiming for an enhanced security posture. ZTNA operates on the principle of "never trust, always verify," ensuring that every user and device is authenticated and authorized before accessing resources. In this context, Privileged Access Management (PAM) emerges as a critical enabler for an effective...

Read More

Topics: Cybersecurity, IT & Technologies, Identity and Access Management, PAM, IAM, ZTNA, Privileged Access, Zero Trust


ISG Software Research’s expertise examines the software provider landscape through two lenses: business applications (including office of finance, human capital management (HCM) and customer experience) and IT and technology (including digital business, digital technology, artificial intelligence (AI) and analytics and data). Most software providers fall into one of these two high-level expertise...

Read More

Topics: Analytics, AI, Data Platforms, IT & Technologies, AI & Technologies, AI and Machine Learning, Cloud Infrastructure


The annual RSAC Conference took place in late April in San Francisco, where over 40,000 professionals from the cybersecurity industry converged at the Moscone Center to discuss the latest trends, products and services aimed at threat identification and organizational security.

Read More

Topics: Cybersecurity, GenAI, IT & Technologies, Agentic AI, EDR, XDR, PAM, SIEM, IAM, Quantum, Threat Intelligence, SOAR, Data Recovery, Data Resilience, ZTNA


Posts by Topic

see all

Posts by Month

see all