• SMB, MIDMARKET, CHANNEL

    SMB, MIDMARKET, CHANNEL

    Delivering Insights to Fact-based IT Industry
    LEARN MORE
  • FEATURED INFOGRAPHIC

    FEATURED INFOGRAPHIC

    2019 Top 10 SMB Business Issues, IT Priorities, IT Challenges
    GET IT NOW
  • WHITE PAPER

    WHITE PAPER

    SMB Path to Digitalization - Prologue and Epilogue
    DOWNLOAD
  • ANALYTICS & ARTIFICIAL INTELLIGENCE

    ANALYTICS & ARTIFICIAL INTELLIGENCE

    SMB & Midmarket Analytics & Artificial Intelligence Adoption
    LEARN MORE
  • CHANNEL PARTNERS

    CHANNEL PARTNERS

    Transformation or Consolidation
    LEARN MORE
  • CLOUD RESEARCH

    CLOUD RESEARCH

    SMB & Midmarket Cloud Adoption
    LEARN MORE
  • BUYERS JOURNEY

    BUYERS JOURNEY

    Influence map & care-abouts
    LEARN MORE
  • DIGITAL TRANSFORMATION

    DIGITAL TRANSFORMATION

    Delivering Connected Business
    LEARN MORE
  • SAAS RESEARCH

    SAAS RESEARCH

    US SMB & Midmarket SaaS Adoption
    LEARN MORE
  • IT MATURITY SEGMENTS RESEARCH

    IT MATURITY SEGMENTS RESEARCH

    Technology adoption trends by IT sophistication
    LEARN MORE
  • SECURITY RESEARCH

    SECURITY RESEARCH

    SMB & Midmarket Security Adoption Trends
    LEARN MORE
  • IOT RESEARCH

    IOT RESEARCH

    SMB & Midmarket IoT Adoption Trends
    LEARN MORE
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12

Techaisle Blog

Insightful research, flexible data, and deep analysis by a global SMB IT Market Research and Industry Analyst organization dedicated to tracking the Future of SMBs and Channels.

Techaisle survey shows SMB BDM involvement in IT security operations is minimal

A trend that is frequently discussed in industry journals revolves around the growing involvement of business decision makers (BDMs) in the IT acquisition process. There is a further issue that is not generally the subject of trade publication articles, though: the extent to which BDMs are going beyond system selection and acquisition, and involving themselves in IT operations.

To obtain some visibility into this issue, Techaisle asked SMB & Midmarket survey respondents (reported in three of Techaisle reports: 1/ SMB & Midmarket Buyers Journey 2/ SMB & Midmarket, ITDM vs BDM Decision Process) to identify the party (ITDM or BDM) most responsible for various aspects of cloud and mobility security. The results both provide insight into the IT operations activity levels of BDMs, and into potential issues that might arise as a result of ad hoc, unplanned and business driven IT purchases (or shadow IT).

Continue reading
  0 Comments

SMB mobility security percolating to the top as threats increase

Techaisle’s US SMB & Midmarket IT Security Adoption survey finds a mismatch between business confidence in mobility security and actual exposure to threats and mitigation actions and investments. Figure below illustrates respondent perceptions of current mobile security preparedness. In the US, roughly 20% of both small and midsized businesses report that they are “fully prepared and confident” with respect to mobile security, and more than twice as many state that they are “as prepared as can be,” while acknowledging that “requirements will change” in the future. Altogether, nearly two-thirds of small businesses and three-quarters of midmarket firms categorize themselves as being in one of these categories, with only 5% of small businesses and 2% of midmarket respondents reporting that they are “not very well prepared.”

Continue reading
  0 Comments

Techaisle survey shows SMB security spending on a strong upward trajectory

In 360 on US SMB & Midmarket Security solutions adoption trends report, Techaisle analyzes survey responses from over 1,100 US SMBs to provide the insight needed to build and execute on IT security marketing strategies for the small and midmarket customer segments. Survey shows that overall, spending on security products by small businesses as flat but spending by midmarket firms is on a strong upward trajectory. Most SMBs rely on core security practices and technologies to address cloud-specific threats, but many are underinvested in cloud security solutions. Data encryption and security for virtual environments are particularly primed for growth. Mobile device security, gateway messaging/web security, and (as noted above) virtualization security as high-growth opportunities for security-as-a-service providers.

Techaisle’s research investigated 17 different types of IT security solutions. Techaisle positions these as belonging to one of four categories-

  1. Protection of data entering the corporate environment
  2. Protection of data that is being used within the corporate environment
  3. Protection of the mobile environment
  4. Traffic inspection and management

Highlights of findings from the survey include:

Continue reading
  0 Comments

Search Blogs

Find Research

SMB Data You Can Rely On | Analysis You Can Act Upon

Techaisle - TA