Open Access to Avasant Research
Avasant announced open access to its research library for end-user organizations globally, expanding how enterprise decision-makers engage with trusted market insight in an era defined by AI, real-time intelligence, and accelerated decision-making.
LEARN MORE
Avasant Copilot
Instant Research Insights With Advanced Generative AI Platform
LEARN MORE
Avasant Research and Data
Leverage the power of our products and solutions - AvaMark™, RadarView™, AvaSense™ and Global Equations™
LEARN MORE
Avasant Distinguished Analysts and Fellows
Get actionable insights from practitioners
GET IN TOUCH

Latest Reports

Worldwide IT Spending and Staffing Outlook for 2022

In this annual report of the IT spending and staffing outlook for 2022, we find that IT leaders worldwide generally have a positive outlook on the year ahead. On the whole, companies have put the chaos of the pandemic behind them.

March, 2022

Avasant Digital Forum: Quantum Revolution: Entering the New Age of Computing

It is time to get ready for a “quantum” leap in computing. In the past decade, quantum computing has leaped from science fiction to working prototypes and pilots run by large enterprises. Quantum computing has the potential to revolutionize almost every field and will have broad-ranging impact on every industry. It will open the doors to real-time analytics, faster and better decision-making, better forecasting, faster prototyping, and the creation of new products. 

March, 2022

Two-Factor Authentication Among Least Mature Best Practices

Computer Economics has released its major annual study on 33 IT management best practices, with two-factor authentication topping our list of least mature practices. This Research Byte highlights some of our findings on the least mature practices, along with an overview of the contents of the full study. The full study analyzes the growth and maturity of all 33 best practices, which are grouped into five major categories: IT governance, IT financial management, IT operational management, IT security and risk management, and application development.

March, 2022

IT Management Best Practices 2022 Sample Pages

The best-run IT organizations not only focus their process improvement efforts on those of other departments, they also seek to optimize their own IT management processes internally. In this study, we examine the growth and maturity of 33 IT management practices, which we have grouped into five major categories: IT governance practices, IT financial management practices, IT operational management practices, IT security and risk management practices, and application development practices. (196 pp., 178 figs.)

March, 2022

IT Management Best Practices 2022

The best-run IT organizations not only focus their process improvement efforts on those of other departments, they also seek to optimize their own IT management processes internally. In this study, we examine the growth and maturity of 33 IT management practices, which we have grouped into five major categories: IT governance practices, IT financial management practices, IT operational management practices, IT security and risk management practices, and application development practices. (196 pp., 178 figs.)

March, 2022

Google’s Latest Move in Building Out its Security Platform Offering

The rising threat landscape has led cloud service providers to expand the scope of their cybersecurity offerings to multiple data sources and automate the triage process and incident response. This includes the use of artificial intelligence/machine learning to model the behavior of attackers and identify threats in advance. By acquiring Mandiant and Siemplify, Google is taking a big step in its vision of “invisible security” with automated threat hunting, detecting, and response. This will allow CISOs to capitalize on the SIEM-to-SOAR maturity trend for streamlining their threat response procedures.

March, 2022

IT Security and Cybersecurity Spending Benchmarks—Download Free Sample Pages

Security and cybersecurity incidents are costly, with losses increasing every year. No wonder, then, that our research shows IT security and cybersecurity are the top priority for new IT investments year after year. But how much is enough?

March, 2022

Avasant Digital Forum: Making Smart Choices in Complex Cloud Environments

Nearly all business leaders today understand the need to move to the cloud. But many do not appreciate the complexity of the decisions needed to get true business value from their cloud investments. In this fast-paced digital forum, four industry thought leaders will share their insights and lessons learned with organizations that have gotten smart about these decisions.

March, 2022

Navigating IT Outsourcing Challenges amid Russia-Ukraine Conflict

Ukraine has looked at IT outsourcing as an important source of revenue. The current conflict will have massive repercussions on its IT industry. From the perspective of enterprise customers, unfortunately, this conflict will force them to go back to the drawing board and lay out contingency plans. They will need to find a way forward with their Ukranian service providers that is empathetic but at the same time protects customers against disruption.

March, 2022

Residual Value Forecast March 2022

Our quarterly Residual Value Forecast (RVF) report provides forecasts for the following categories of IT equipment: desktop computers, laptops, network equipment, printers, servers, storage devices, and other IT equipment. It also includes residual values for other non-IT equipment in the following categories: copiers, material handling equipment (forklifts), mail equipment, medical equipment, test equipment, and miscellaneous equipment such as manufacturing machinery and NC machines. Residual Value Forecasts are provided for five years for  end-user, wholesale, and orderly liquidation values (OLV) prices.

March, 2022
Welcome to Avasant

LOGIN

Login to get free content each month and build your personal library at Avasant.com

NEW TO AVASANT?

Welcome to Avasant