• COVID-19 IMPACT

    COVID-19 IMPACT

    on SMB IT Spend Growth Rates
    FULL ANALYSIS
  • SIMPLIFY. EXPAND. GROW.

    SIMPLIFY. EXPAND. GROW.

    #SMB #MIDMARKET #CHANNEL
    LEARN MORE
  • FEATURED INFOGRAPHIC

    FEATURED INFOGRAPHIC

    2020 Top 10 SMB Business Issues, IT Priorities, IT Challenges
    GET IT NOW
  • CLOUD RESEARCH

    CLOUD RESEARCH

    SMB & Midmarket Cloud Adoption
    LATEST RESEARCH
  • SECURITY RESEARCH

    SECURITY RESEARCH

    SMB & Midmarket Security Adoption Trends
    LATEST RESEARCH
  • CHANNEL PARTNERS

    CHANNEL PARTNERS

    Transformation or Consolidation
    LATEST RESEARCH
  • 2020 SMB PREDICTIONS

    2020 SMB PREDICTIONS

    Top 10 SMB & Midmarket Predictions for 2020
    READ NOW
  • 2020 CHANNEL PARTNER PREDICTIONS

    2020 CHANNEL PARTNER PREDICTIONS

    Channel Partner Predictions for 2020
    READ NOW
  • NEW SMB CUSTOMER RESEARCH

    NEW SMB CUSTOMER RESEARCH

    PC and software purchasing trends
    LEARN MORE
  • WHITE PAPER

    WHITE PAPER

    SMB Path to Digitalization - Prologue and Epilogue
    DOWNLOAD
  • ANALYTICS & ARTIFICIAL INTELLIGENCE

    ANALYTICS & ARTIFICIAL INTELLIGENCE

    SMB & Midmarket Analytics & Artificial Intelligence Adoption
    LEARN MORE
  • BUYERS JOURNEY

    BUYERS JOURNEY

    Influence map & care-abouts
    LEARN MORE
  • DIGITAL TRANSFORMATION

    DIGITAL TRANSFORMATION

    Delivering Connected Business
    LEARN MORE
  • IT MATURITY SEGMENTS RESEARCH

    IT MATURITY SEGMENTS RESEARCH

    Technology adoption trends by IT sophistication
    LEARN MORE
  • SAAS RESEARCH

    SAAS RESEARCH

    US SMB & Midmarket SaaS Adoption
    LEARN MORE
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15

Techaisle Blog

Insightful research, flexible data, and deep analysis by a global SMB IT Market Research and Industry Analyst organization dedicated to tracking the Future of SMBs and Channels.

Connected Security is essential for empowering Future of Work

Security is a feature that needs to be present within each layer of the stack. Security, needs to permeate all layers of an IT solution stack. IT security isn’t a discrete category – it is a ubiquitous factor in all aspects of IT/business infrastructure. 

The most important IT-related development in 2018 and beyond will be a focus on connectedness – connected cloud, edge, applications, security, collaboration, workspaces and insights. Internet and the web are the navigation routes that we have been developing since the 1970s; the always-on, everywhere-connected Interwork© platform is the destination that we will be creating in 2018 and for years to come. Please read Future of Work - Interwork: the next step in connected businesses

If there is an evident downside to ubiquitous and constant connectivity, it’s security. In conventional IT environments, security followed a ‘castle keep’-type approach: IT security staff gathered all critical information assets at the core of the environment, and focused their resources on hardening the perimeter, in much the same way that ancient castles used a moat and wall to safeguard people and assets within a central tower.

Today, of course, nations do not use castles as fortifications – and in truth, the traditional approach to security is scarcely better attuned to contemporary IT security needs. With the rise of mobility, cloud and connected supply chains reaching from component suppliers to OEMs to distribution and consumers, there is no perimeter to harden; any sizeable enterprise will have literally thousands of shifting entry points capable of accessing one or more corporate systems. And the rise in the value of information has spawned a sophisticated cyber theft industry: ‘bad actors’ use many different types of tactics and advanced technology to infiltrate corporate IT environments, with an eye towards stealing customer credit card data or internal financial or engineering information, hijacking corporate IT resources or obtaining some other form of benefit.

Security is the most amorphous of IT market categories. Virtually all other technologies occupy a defined position within the solution stack. Today’s security strategies no longer resemble a ‘wrapper’ around assets – they are built into each element of the corporate IT stack and rely on connectedness to (as the NIST framework recommends ) identify threats, protect against attacks, detect intruders if/when they breach perimeter defenses, respond to security events, and recover information lost to theft, loss and/or malware. 

Continue reading
  0 Comments

The growing importance of IT and Security to SMB business

It is evident from even a casual tour of a modern SMB office that IT has become integral to business activities. Email and communications systems that meld conventional, web-based and mobile phones; and social collaboration tools on the web and within offices provide the basis for connections between companies and customers, across processes and with suppliers, and between staff members. Productivity applications like spreadsheets, graphic presentation packages and word processors enable users to complete tasks, while enterprise applications capture and report on financial data and organize processes.

Given the nearly-ubiquitous nature of IT, it is fair to wonder: are we “there” yet? Have all of the technologies that one needs been deployed? Results from a recent Techaisle survey of 1455 North American SMB IT managers (ITDMs) and business decision makers (BDMs) conducted by Techaisle indicate that there is still a voracious appetite for new IT-based business solutions. Asked to evaluate the business importance of current IT developments, 77 percent of SMB survey respondents reported that new IT systems would have a very high to high impact to their organizations. Only 6 percent believe that new IT products and services will have little impact on their businesses. Clearly, SMB BDMs and ITDMs agree that new technology will play an important role in making their businesses more profitable, and their employees more productive.

Continue reading
  0 Comments

Dell, HPE, IBM, Cisco competing for global SMB US$1 trillion IT Spend

Techaisle forecasts worldwide SMB (1-999 employee segment) IT spend will reach US$735 billion in 2021 and cross US$1 trillion in 2028, growing at 2X the global GDP rate and 3X the enterprise segment. With slightly over 72 million SMBs (excluding home-based businesses), the market segment presents itself as lucrative and yet incredibly difficult to penetrate. Within each employee-size category there exists segments by IT sophistication, cloud maturity, digital transformation strategy, SaaS adoption, cloud first to cloud selective segments. As per Techaisle survey digital transformation is on the minds of most SMBs who are expected to spend US$275 billion on DX in 2018. And 42% of SMBs have become more dependent on technology over the last 12 months for better business outcomes.

techaisle ww smb it spend forecast resized

Continue reading
  0 Comments

Case for Always Connected PCs in edge computing

While cloud is replacing conventional data centers at the core of the network, an entirely new technology tier – “edge” – is emerging as a complementary source of IT infrastructure, supporting many innovative technologies that promise to extend the use and impact of technology into entirely new domains.

Connectedness is an intrinsic component of the edge. It applies in two directions: client devices ranging from PCs to smartphones to sensors connect to more gateways and other powerful edge systems, which process time-critical responses and then communicate data safely back to clouds at the core of the infrastructure fabric.

The edge is broad in scope and deployment. It moves with the user of a device or an appliance or a transport, it morphs when a sensor or a beacon is triggered and it can expand or change when real and/or augmented environments interact. The edge includes the devices and networks that deliver mobility to users – and it also describes the infrastructure needed to support leading-edge solutions like IoT, autonomous and connected vehicles and field-ready AR/VR systems – solutions in which devices are connected and configured to support remote monitoring/service/control, or harvesting data from one or more connected systems and applying contextual analytics to support smarter decision making, or delivering inputs needed to provide better insight into current and future business opportunity.

To be fair, many of these edge-dependent systems are still in their infancy, and will gain widespread adoption after 2018 (or potentially, at some point in the next decade). But there are signposts that we can see today, which indicate how edge resources and expectations will evolve.

One such example is found in “connected PC.” In the context of a Interwork platform in 2018, connected PC may look like an odd inclusion – shouldn’t we focus instead on growth areas like sensors or smartphones, rather than an aging device type that is being eclipsed by these newer form factors?

Continue reading
  0 Comments

Search Blogs

Find Research

SMB Data You Can Rely On | Analysis You Can Act Upon

Techaisle - TA