When it comes to security products 60% of survey respondents said firewalls are the most valuable. Endpoint protection and email filtering also received high marks from 36% and 32%, respectively. But as cloud services, mobile technology, and other emerging technologies play a greater role in IT, the enterprise security picture is slowly shifting forward. Dark Reading’s second Strategic Security Report takes a look at this and more.
The use of cloud technology is booming, often offering the only way to meet customers', employees' and partners' rapidly rising requirements. But IT pros are rightly nervous about a lack of visibility into the security of data in the cloud. In this Dark Reading report, we put the risk in context and offer recommendations for products and practices that can increase insight - and enterprise security.
To identify sophisticated attacks, infosec teams must correlate a huge range of data — from internal systems, threat intelligence services, cloud and network service providers, digital forensics and attribution services, and others. One way to cope: big data tools and practices.
Data is skyrocketing, but your backup budget doesn't have to. Create customized data protection by combining virtual, disk, and cloud technologies.
The more IT protects networks and data, the more attackers will look elsewhere for weak links. Don't underestimate your ability to demand that contractors and suppliers shore up their defenses.
A new spirit of experimentation is in the air: For the first time in years, more companies are trying out multiple analytical tools rather than standardizing on a few favored ones. Data quality and ease of use remain the toughest challenges. The key question: Will buyers look for simpler or smarter tools for big data analytics?
Feeling a bit out of control when it comes to your big data platform? It is possible to serve the needs of multiple departments while still giving business units autonomy over their own operational software, securely. Here's how.
Our most recent survey assessing federal IT priorities for fiscal year 2015 shows that government agencies are focusing more on security, but they're still behind the times when it comes to cloud use, data center consolidation, and overall IT innovation.
Call it consumerization, BYOD, or just the way you do business. The walls are down between corporate-issued and employee-owned devices. Our new survey yielded some surprises: VDI is gaining popularity, and HTML is key for new apps. Not so surprising? BlackBerry use is dropping like a stone.
Big data is here, and analysis is just as critical for government agencies as it for tech startups. We look at three key questions agencies developing a data analysis strategy must consider.
More than 500 respondents weighed in on their plans for DevOps, Agile, APIs, automation, and more. While traditional languages slide, newer options are filling the gaps. Meanwhile, everything from project management to automated deployment is happening more in the cloud. It's an exciting time - but could we be moving too fast?