Storage

An infrastructure or hospitable environment for running and managing the information needs of your business. Research coverage includes storage and data management, area networks, hardware, networking, resource management, and virtualization.

Latest Research

  • For CIO Professionals

    REPORT: US Tech Market Outlook For 2018 And 2019

    Cloud Powers Tech Spend To Nearly 7% Growth And Software To 8% Growth

    July 2, 2018 Andrew Bartels

    CIOs and other tech decision makers will see positive fundamentals in 2018 and 2019. This report lays out Forrester's analysis of how conflicting forces will affect US tech markets in 2018 and 2019 and how CIOs should position their firms' tech spending plans.

  • For Infrastructure & Operations Professionals

    REPORT: Back Up Your SaaS Data — Because Most SaaS Providers Don't

    Cloud-To-Cloud Backup Is The Only Practical Option For SaaS Data Protection

    December 29, 2017 Naveen Chhabra

    Software-as-a-service (SaaS) is a popular element of a sound technology strategy. While almost all SaaS vendors explicitly state that protecting data is the customer's responsibility, infrastructure and operations (I&O) leaders usually send critical data to those providers without any plan for ensuring data resiliency. Back up SaaS data or risk losing customers, partners, and employees. Stop leaving the door open to data loss, and start proactively protecting cloud data before it's too late. This report helps I&O leaders navigate the landscape of SaaS services and data recovery. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.

  • For Infrastructure & Operations Professionals

    REPORT: The Forrester Tech Tide™: Continuous Deployment Technologies, Q4 2017

    Road Map: The Continuous Deployment Playbook

    December 18, 2017Robert Stroud, Bill Martorelli, Elinor Klavens

    Continuous software deployment is increasingly critical to firms' ability to win, serve, and retain customers. Speeding up the rate of deploying code to production mandates seamless delivery, ensuring enhanced quality. To accelerate performance in continuous deployment (CD), organizations are evaluating and adopting a range of contributing technologies. This report analyzes the maturity and business value of 18 technology categories that support continuous software deployment and helps infrastructure and operations (I&O) professionals shape their firm's investment approach to these technologies.

  • For Infrastructure & Operations Professionals

    REPORT: Three Vendors Disrupting Integrated Secondary Storage And Data Protection

    Integrated Secondary Storage And Data Protection Will Gain Widespread Adoption In 24 Months

    October 30, 2017 Naveen Chhabra

    Data protection suffers from archaic tools and processes, a lack of innovation and architectural change, and the need for proprietary secondary storage alongside primary storage and software. No single solution supports fast, reliable recovery and secondary data copies. This report shows infrastructure and operations (I&O) pros how three vendors — Cohesity, Reduxio, and Rubrik — are trying to change the way enterprises manage secondary storage, data protection, and data copies and to attain a 1-second recovery point objective (RPO) for mission-critical applications.

  • For Security & Risk Professionals

    REPORT: TechRadar™: Data Security And Privacy, Q4 2017

    Road Map: The Data Security And Privacy Playbook

    October 4, 2017 Heidi Shey, Enza Iannopollo, Stephanie Balaouras, Alexander Spiliotes

    As data volumes explode, it's becoming a Herculean task to protect sensitive data from cybercriminals and malicious actors while preventing privacy infringements and abuses — intentional and unintentional. Every day, vendors introduce a new product or service that claims to be the silver bullet for data security and privacy challenges. This TechRadar assesses 20 of the key traditional and emerging data security and privacy technologies that security and privacy leaders and their staffs can use to underpin a holistic strategy.

View all research

Analysts Who Cover Storage

View all related analysts