REPORTS
FILTER REPORTS BY: Back to Reports
HIGHLIGHTED REPORT(S)
Research: 2014 State of Server Technology

Research: 2014 State of Server Technology

Buying power and influence are rapidly shifting to service providers. Where does that leave enterprise IT? Not at the ­cutting edge, that’s for sure: Only 19% are increasing both the number and capability of servers, budgets are level or down for 60% and just 12% are using new micro technology. 

Building and Maintaining Effective Firewall Configurations

Building and Maintaining Effective Firewall Configurations

Perimeter defense isn’t rocket science, which may be the reason security pros often take it for granted. Without thoughtful and robust perimeter security measures, higher-level systems such as Web security and ­application intelligence will be rendered almost worthless. This Dark ­Reading report recommends best practices for rooting out perimeter ­security issues and for configuring firewalls effectively in the first place.

2013 InformationWeek 500

2013 InformationWeek 500

Our 25th annual survey of 500 business IT innovators provided some surprising ­results about the use of cloud, analytics and mobile: Just 12% of surveyed ­companies can switch between public cloud infrastructure and in-house data centers based on ­demand; only 26% use PaaS; 54% do predictive revenue analysis; and 30% have widely deployed mobile apps for employees.

Strategy: How Existing Security Data  Can Help ID Potential Attacks

Strategy: How Existing Security Data Can Help ID Potential Attacks

Having a wealth of data is a good thing — if you can make sense of it. Most companies are challenged with aggregating and analyzing the plethora of data being generated by their security applications and devices. This Dark Reading report recommends how to effectively leverage security data in order to make informed decisions and spot areas of vulnerability.