REPORTS
FILTER REPORTS BY:
HIGHLIGHTED REPORT(S)
Research: 2014 State of Storage

Research: 2014 State of Storage

Data stores are big, with 83% reporting 10% or better annual growth; 27% are wrangling 25% or more yearly increases. The main culprit: Enterprise databases and data warehouses. Yet money’s still tight, with 25% saying they lack the budget to meet demand, never mind optimize for performance and capacity.

 

Research: 2014 State of Server Technology

Research: 2014 State of Server Technology

Buying power and influence are rapidly shifting to service providers. Where does that leave enterprise IT? Not at the ­cutting edge, that’s for sure: Only 19% are increasing both the number and capability of servers, budgets are level or down for 60% and just 12% are using new micro technology. 

2014 Hybrid Cloud Survey

2014 Hybrid Cloud Survey

Mixing public and private can deliver the best of both cloud worlds. But you'll need to consider potential snafus, decide which workloads to run on which type of cloud, and address ­security issues up front.

2014 Cloud ROI Survey

2014 Cloud ROI Survey

Our survey finds one in five companies doesn't calculate ROI for cloud projects, and half can only do a ballpark comparison between cloud and on-premises data centers. Both our survey ­research and the real-world examples of two cloud innovators show that cloud ROI calculations remain far from an exact science.

2014 Mobile Security Survey

2014 Mobile Security Survey

BYOD has major implications for data protection, client software licensing, acceptable use, and more. It's also happening, with or without IT's blessing. Fortunately, our survey shows less focus on iron-fisted device management, more on information control. There might be hope for us yet.

DevOps Impact on Application Security

DevOps Impact on Application Security

Managing the interdependency between software and ­infrastructure is a thorny challenge. Often, it’s a “developers are from Mars, systems engineers are from Venus” situation. Enter DevOps, a methodology aimed at increasing collaboration and communication between these groups while minimizing code flaws. Should security teams worry — or rejoice?