Services for Organizations

Using our research, best practices and expertise, we help you understand how to optimize your business processes using applications, information and technology. We provide advisory, education, and assessment services to rapidly identify and prioritize areas for improvement and perform vendor selection

Consulting & Strategy Sessions

Ventana On Demand

    Services for Investment Firms

    We provide guidance using our market research and expertise to significantly improve your marketing, sales and product efforts. We offer a portfolio of advisory, research, thought leadership and digital education services to help optimize market strategy, planning and execution.

    Consulting & Strategy Sessions

    Ventana On Demand

      Services for Technology Vendors

      We provide guidance using our market research and expertise to significantly improve your marketing, sales and product efforts. We offer a portfolio of advisory, research, thought leadership and digital education services to help optimize market strategy, planning and execution.

      Analyst Relations

      Demand Generation

      Product Marketing

      Market Coverage

      Request a Briefing



        Jeff Orr's Analyst Perspectives

        Jeff Orr

        As quantum computing advances at an unprecedented pace, the concept of Q-Day—a day when quantum computers can fundamentally undermine our current encryption methods—has entered discussions among cybersecurity professionals and business leaders alike. While there is no definitive date set for Q-Day, we are approaching a critical juncture where traditional cryptographic techniques may no longer suffice to protect sensitive data, digital communications and transactions. This impending shift not...

        Read More

        Topics: Digital Technology, Cybersecurity, Digital Security, Q-Day, Quantum Computing, Cryptography
        Jeff Orr

        The structures that govern enterprise security teams are under scrutiny. A recent report from a government watchdog group has taken issue with Microsoft’s cybersecurity strategies in the wake of its Exchange Server attacks, prompting the enterprise software giant to re-evaluate its reporting structures. The implications of this shift extend beyond Microsoft itself, with cybersecurity becoming a leading challenge for companies from every industry as cyber and ransomware attacks have grown in...

        Read More

        Topics: Digital Technology, Cybersecurity, Digital Security, CISO
        Jeff Orr

        Embracing artificial intelligence technologies opens doors for innovation and efficiency. Alongside these opportunities, however, come risks. Threat actors are keenly aware of the potential impact of AI systems and are actively exploring ways to manipulate them. In this Analyst Perspective, I explore the world of adversarial machine-learning threats and provide practical guidance for securing AI systems.

        Read More

        Topics: Digital Technology, Digital Security, AI and Machine Learning, Generative AI, DevOps and Platforms, Model Building and Large Language Models, Machine Learning Operations, NIST, Model Training
        Jeff Orr

        ServiceNow is a global software provider that has developed a cloud computing platform that helps organizations manage digital workflows for enterprise operations. The provider uses its annual Knowledge user conference to educate customers and showcase product announcements. Ventana Research had the opportunity to attend the Knowledge 2024 event and provides this analyst perspective to summarize what transpired.

        Read More

        Topics: IT Service Management, Digital Technology, natural language processing, Field Service, Digital Security, AI and Machine Learning, Observability, Generative AI, ITOps, Intelligent Automation
        Jeff Orr

        The technology landscape for enterprise IT faces a daunting challenge: complexity. As systems grow more intricate, organizations must actively seek ways to simplify the technology stack. This process, known as decomplexification, is crucial for enhancing efficiency, security and collaboration within an enterprise.

        Read More

        Topics: Cloud Computing, IT Service Management, Digital Technology, Digital Security, IoT and Edge Computing, ITOps, DevOps and Platforms, Intelligent Automation, IaC, CI/CD, SASE
        Jeff Orr

        Enterprises are increasingly recognizing the need to streamline operations for efficiency, agility and innovation. This has led to various “operations” or “Ops” initiatives, each focusing on a specific aspect of enterprise IT. From software development and data analytics to IT and cloud management, these Ops groups are transforming the way enterprises operate and compete.

        Read More

        Topics: Analytics, Cloud Computing, Digital Technology, data operations, digital finance, Digital Security, Observability, Analytic Operations, ITOps, DevOps and Platforms, CloudOps, Machine Learning Operations, MLOps, NetOps, SecOps, DevSecOps, SecFinOps, ProjectOps, AIOps
        Jeff Orr

        Is your organization prepared for the increasingly sophisticated and pervasive cyber threats that are challenging enterprise CIOs and IT leaders? Our previous analyst perspective underscored the importance of protecting digital assets and driving business growth with Continuous Threat Exposure Management (CTEM) — a proactive approach to identifying and managing cyber threats. In this perspective, we delve into the crucial business and technology considerations that enterprises must weigh when...

        Read More

        Topics: Digital Technology, Digital Security, Security Posture, CTEM, Continuous Threat Exposure Management, Threat Management, Threat Landscape, SOC
        Jeff Orr

        Cyber threats are becoming more sophisticated and pervasive, posing a major challenge for CIOs and IT leaders. To protect their digital assets and drive business growth, they need a new approach to security: Continuous Threat Exposure Management (CTEM). CTEM software continuously monitors and manages the enterprise’s exposure to cyber risks, enabling a swift and effective response to any security incident. In this analyst perspective, we will explore how CTEM software works, why it is essential...

        Read More

        Topics: Digital Technology, Digital Security, Security Posture, CTEM, Continuous Threat Exposure Management, Threat Management, Threat Landscape, SOC
        Jeff Orr

        Ventana Research recently announced its 2024 Market Agenda for Digital Technology. This agenda is designed to provide expertise to enterprises across various industries, helping them prioritize technology investments that enhance workforce effectiveness, customer engagement and enterprise agility. Digital Technology is especially important for CIO and Chief Digital Officers looking to rationalize and modernize their IT portfolio. Our expertise will see a significant expansion on this topic in...

        Read More

        Topics: Business Continuity, Cloud Computing, IT Service Management, Digital Technology, Digital Security, Observability, IoT and Edge Computing, ITOps, DevOps and Platforms, Intelligent Automation
        Jeff Orr

        In today’s rapidly evolving digital security landscape, organizations face the challenge of maintaining robust network security resilience. Chief information officers battling increasingly sophisticated cyber threats and the growing complexity of enterprise networks must enhance network security posture with advanced technologies to stay ahead of potential threats. One such technology is DDI – the integration of DNS, DHCP and IPAM.

        Read More

        Topics: Digital Business, Digital Security, Resilience, DNS, IPAM, DDI, DHCP, Security Posture
        JOIN OUR COMMUNITY

        Our Analyst Perspective Policy

        • Ventana Research’s Analyst Perspectives are fact-based analysis and guidance on business, industry and technology vendor trends. Each Analyst Perspective presents the view of the analyst who is an established subject matter expert on new developments, business and technology trends, findings from our research, or best practice insights.

          Each is prepared and reviewed in accordance with Ventana Research’s strict standards for accuracy and objectivity and reviewed to ensure it delivers reliable and actionable insights. It is reviewed and edited by research management and is approved by the Chief Research Officer; no individual or organization outside of Ventana Research reviews any Analyst Perspective before it is published. If you have any issue with an Analyst Perspective, please email them to ChiefResearchOfficer@isg-research.net

        View Policy

        Subscribe to Email Updates



        Analyst Perspectives Archive

        See All