REPORTS
FILTER REPORTS BY:
HIGHLIGHTED REPORT(S)
Threat Intelligence Today

Threat Intelligence Today

Is threat intel the best way to stay ahead of new and complex attacks? The 397 respondents to our new survey seem to think so: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.

Mobile Security: All About the Data

Mobile Security: All About the Data

Our 2014 survey shows less focus on hardware, more on securing the information residing on devices - a strategy that makes data classification a cornerstone of mobile security. In this report, we'll zero in on how government IT pros manage mobility.

State of Cloud Survey

State of Cloud Survey

Steps to take this year: Choose providers with an eye to standards. Think hard about hybrid. Do not ignore Docker. Don't trust, verify security and performance. Find DevOps disciples and let them drive cloud strategy.

2014 Hybrid Cloud Survey

2014 Hybrid Cloud Survey

Mixing public and private can deliver the best of both cloud worlds. But you'll need to consider potential snafus, decide which workloads to run on which type of cloud, and address ­security issues up front.

2014 Cloud ROI Survey

2014 Cloud ROI Survey

Our survey finds one in five companies doesn't calculate ROI for cloud projects, and half can only do a ballpark comparison between cloud and on-premises data centers. Both our survey ­research and the real-world examples of two cloud innovators show that cloud ROI calculations remain far from an exact science.

2014 Mobile Security Survey

2014 Mobile Security Survey

BYOD has major implications for data protection, client software licensing, acceptable use, and more. It's also happening, with or without IT's blessing. Fortunately, our survey shows less focus on iron-fisted device management, more on information control. There might be hope for us yet.