REPORTS
FILTER REPORTS BY: Back to Reports
HIGHLIGHTED REPORT(S)
Mobile Security: All About the Data

Mobile Security: All About the Data

Our 2014 survey shows less focus on hardware, more on securing the information residing on devices - a strategy that makes data classification a cornerstone of mobile security. In this report, we'll zero in on how government IT pros manage mobility.

Advanced Attacks Demand New Defenses

Advanced Attacks Demand New Defenses

Cyber-criminals wielding APTs have plenty of innovative techniques to evade network and endpoint defenses. It’s scary stuff, and ­ignorance is definitely not bliss. How to fight back? Think security that’s distributed, stratified, and adaptive. 

Cloud, Mobility Demand Better IAM

Cloud, Mobility Demand Better IAM

 

Maintaining the security of a traditional “worker bee” model — logging in to an in-office, network-connected PC via Active Directory and accessing on-premises applications and local server resources — while taking advantage of cloud and mobility isn’t easy. But that doesn’t mean we shouldn’t try. 

 

Research: 2014 DevOps Survey

Research: 2014 DevOps Survey

Only 21% of companies have implemented DevOps, with another 21% planning to within a year. But getting good ­results is tough: 31% see or expect significantly improved infrastructure stability from DevOps vs. 51% citing only some improvement.