REPORTS
FILTER REPORTS BY:
HIGHLIGHTED REPORT(S)
Threat Intelligence Today

Threat Intelligence Today

Is threat intel the best way to stay ahead of new and complex attacks? The 397 respondents to our new survey seem to think so: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.

Research: 2014 State of Storage

Research: 2014 State of Storage

Data stores are big, with 83% reporting 10% or better annual growth; 27% are wrangling 25% or more yearly increases. The main culprit: Enterprise databases and data warehouses. Yet money’s still tight, with 25% saying they lack the budget to meet demand, never mind optimize for performance and capacity.

 

2014 Hybrid Cloud Survey

2014 Hybrid Cloud Survey

Mixing public and private can deliver the best of both cloud worlds. But you'll need to consider potential snafus, decide which workloads to run on which type of cloud, and address ­security issues up front.

2014 Cloud ROI Survey

2014 Cloud ROI Survey

Our survey finds one in five companies doesn't calculate ROI for cloud projects, and half can only do a ballpark comparison between cloud and on-premises data centers. Both our survey ­research and the real-world examples of two cloud innovators show that cloud ROI calculations remain far from an exact science.

2014 Mobile Security Survey

2014 Mobile Security Survey

BYOD has major implications for data protection, client software licensing, acceptable use, and more. It's also happening, with or without IT's blessing. Fortunately, our survey shows less focus on iron-fisted device management, more on information control. There might be hope for us yet.

DevOps Impact on Application Security

DevOps Impact on Application Security

Managing the interdependency between software and ­infrastructure is a thorny challenge. Often, it’s a “developers are from Mars, systems engineers are from Venus” situation. Enter DevOps, a methodology aimed at increasing collaboration and communication between these groups while minimizing code flaws. Should security teams worry — or rejoice?