• SMB, MIDMARKET, CHANNEL

    SMB, MIDMARKET, CHANNEL

    Delivering Insights to Fact-based IT Industry
    LEARN MORE
  • FEATURED INFOGRAPHIC

    FEATURED INFOGRAPHIC

    2019 Top 10 SMB Business Issues, IT Priorities, IT Challenges
    GET IT NOW
  • WHITE PAPER

    WHITE PAPER

    SMB Path to Digitalization - Prologue and Epilogue
    DOWNLOAD
  • ANALYTICS & ARTIFICIAL INTELLIGENCE

    ANALYTICS & ARTIFICIAL INTELLIGENCE

    SMB & Midmarket Analytics & Artificial Intelligence Adoption
    LEARN MORE
  • CHANNEL PARTNERS

    CHANNEL PARTNERS

    Transformation or Consolidation
    LEARN MORE
  • CLOUD RESEARCH

    CLOUD RESEARCH

    SMB & Midmarket Cloud Adoption
    LEARN MORE
  • BUYERS JOURNEY

    BUYERS JOURNEY

    Influence map & care-abouts
    LEARN MORE
  • DIGITAL TRANSFORMATION

    DIGITAL TRANSFORMATION

    Delivering Connected Business
    LEARN MORE
  • SAAS RESEARCH

    SAAS RESEARCH

    US SMB & Midmarket SaaS Adoption
    LEARN MORE
  • IT MATURITY SEGMENTS RESEARCH

    IT MATURITY SEGMENTS RESEARCH

    Technology adoption trends by IT sophistication
    LEARN MORE
  • SECURITY RESEARCH

    SECURITY RESEARCH

    SMB & Midmarket Security Adoption Trends
    LEARN MORE
  • IOT RESEARCH

    IOT RESEARCH

    SMB & Midmarket IoT Adoption Trends
    LEARN MORE
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12

Techaisle Blog

Insightful research, flexible data, and deep analysis by a global SMB IT Market Research and Industry Analyst organization dedicated to tracking the Future of SMBs and Channels.

SMB and Midmarket IT maturity segments – cloud adoption challenges

Techaisle’s SMB & Midmarket IT maturity segmentation reveals that 52% of midmarket firms and 16% of small businesses (down from 31% two years ago) belong to Advanced IT segment and 37% of midmarket firms (up from 14% two years ago) and 0% of small businesses are in the Enterprise IT segment.

IT products are often described as having ‘a market’ – but ‘the’ IT market is comprised of many segments, each of which has its own approach to IT adoption. Some industry sectors (e.g., aerospace) tend to move faster than others (e.g., retail) and different countries and regions invest in new technologies at different rates. Until they are supplanted by new solutions, mature IT products are acquired at about the same rate by all buyers. These technologies generate the majority of ‘run rate’ revenue in the IT industry. When IT industry growth opportunities are discussed, the focus often turns to earlier-stage technologies. Sellers of these technologies tend to focus on advanced segments (large accounts, particularly in leading-edge industries). SMBs are generally viewed as a secondary market.

Four IT Maturity Segments

However, the SMB market is not a monolith. Techaisle research has identified four attitudinal/behavioral segments that have different approaches to IT adoption. Suppliers who understand the scope and characteristics of these segments are able to expand their target markets and develop strategies geared to reaching high-potential SMB prospects. These suppliers ultimately have access to an expanded TAM, and have the insight needed to align marketing investments with priority customers.

Continue reading
  0 Comments

Techaisle Take – HPE vs Dell SMB IT solution stack

Comparing Dell and HPE offerings and ecosystems against the Techaisle SMB IT solution stack model

Techaisle’s latest report is designed to help SMB buyers and suppliers identify IT stack requirements, and to compare the offerings and ecosystems of the two current market leaders, Dell and HPE, against Techaisle’s definition of essential SMB & midmarket business technologies. The report is structured in three parts:

  • The IT stack: the report begins by outlining the technologies that SMBs require – and require integration across – in order to support current and emerging business requirements
  • Vendor comparison: an evaluation of Dell and HPE offerings, including core products, non-core products and partner-delivered capabilities, against the stack requirements
  • Evaluating stack suppliers: advice on how to use the stack comparison, and additional Techaisle research findings, to evaluate Dell and HPE strengths
Continue reading
Tags:
  0 Comments

Connected Security is essential for empowering Future of Work

Security is a feature that needs to be present within each layer of the stack. Security, needs to permeate all layers of an IT solution stack. IT security isn’t a discrete category – it is a ubiquitous factor in all aspects of IT/business infrastructure. 

The most important IT-related development in 2018 and beyond will be a focus on connectedness – connected cloud, edge, applications, security, collaboration, workspaces and insights. Internet and the web are the navigation routes that we have been developing since the 1970s; the always-on, everywhere-connected Interwork© platform is the destination that we will be creating in 2018 and for years to come. Please read Future of Work - Interwork: the next step in connected businesses

If there is an evident downside to ubiquitous and constant connectivity, it’s security. In conventional IT environments, security followed a ‘castle keep’-type approach: IT security staff gathered all critical information assets at the core of the environment, and focused their resources on hardening the perimeter, in much the same way that ancient castles used a moat and wall to safeguard people and assets within a central tower.

Today, of course, nations do not use castles as fortifications – and in truth, the traditional approach to security is scarcely better attuned to contemporary IT security needs. With the rise of mobility, cloud and connected supply chains reaching from component suppliers to OEMs to distribution and consumers, there is no perimeter to harden; any sizeable enterprise will have literally thousands of shifting entry points capable of accessing one or more corporate systems. And the rise in the value of information has spawned a sophisticated cyber theft industry: ‘bad actors’ use many different types of tactics and advanced technology to infiltrate corporate IT environments, with an eye towards stealing customer credit card data or internal financial or engineering information, hijacking corporate IT resources or obtaining some other form of benefit.

Security is the most amorphous of IT market categories. Virtually all other technologies occupy a defined position within the solution stack. Today’s security strategies no longer resemble a ‘wrapper’ around assets – they are built into each element of the corporate IT stack and rely on connectedness to (as the NIST framework recommends ) identify threats, protect against attacks, detect intruders if/when they breach perimeter defenses, respond to security events, and recover information lost to theft, loss and/or malware. 

Continue reading
  0 Comments

US SMB and Midmarket firms optimistic but constrained in their digitalization strategies

Techaisle's extensive and unique survey research (N=1476) on US SMB & Midmarket Digitalization trends shows a great belief in SMBs’ organizational commitment to digitalization strategies. Survey data shows more than 40% of small (10-99 employees) and midmarket (100-999 employees) businesses believe that they are “holistic” with respect to digital transformation – that within their firms, the Internet and digital technologies impact every aspect of the business and are at the core of organizational strategy. Another large proportion of the SMB population – 30% of small businesses, 43% of midmarket firms – report that their organizations are best categorized as “inclusive,” seeing digital as important to the business, but as a relatively minor factor in strategic planning, and not having organization-wide impact. Lesser proportions of both populations (20% of small, 12% mf midmarket) see themselves as ‘siloed’ with respect to digital initiatives, and less than 5% of both groups believe that their digital strategies are either ‘in the shadows’ or ‘nonexistent.’

Continue reading
  0 Comments

Search Blogs

Find Research

SMB Data You Can Rely On | Analysis You Can Act Upon

Techaisle - TA