REPORTS
FILTER REPORTS BY: Back to Reports
HIGHLIGHTED REPORT(S)
Mobile Security: All About the Data

Mobile Security: All About the Data

Our 2014 survey shows less focus on hardware, more on securing the information residing on devices - a strategy that makes data classification a cornerstone of mobile security. In this report, we'll zero in on how government IT pros manage mobility.

2014 US IT Salary Survey: Healthcare

2014 US IT Salary Survey: Healthcare

IT compensation in healthcare tends to be 2% to 3% lower than the median for all industries, although the median compensation for healthcare CIOs is actually 7% higher. Workers say their pay is not increasing as fast as the work they must do to meet regulatory demands.

2014 US IT Salary Survey: Networking

2014 US IT Salary Survey: Networking

Salaries in US datacenters and network facilities for 2014 continue their anemic growth pattern, with base salaries essentially flat. But when you factor in actual declines in pay for women and the cost of IT training, the gap between gainers and losers may be widening.

2014 US IT Salary Survey: Government

2014 US IT Salary Survey: Government

A three-year freeze on federal salaries has exacted a toll on federal IT pros: While 53% of managers and 56% of staffers say they received a raise in the past year, more than one-quarter say they had fewer training opportunities, and roughly 20% had their benefits cut, resulting in another year of declining job satisfaction.

2014 US IT Salary Survey: App Dev

2014 US IT Salary Survey: App Dev

Base salaries are up for the 2,006 app dev pros in our survey, for the third year in a row. For 86% of managers, aligning business and technology goals is just as critical as coding, and 66% of staffers got a raise in the past 12 months. However, the gender gap is wide, youth is valued, and outsourcing remains a sore point.

6 Tools to Protect Big Data

6 Tools to Protect Big Data

Most IT teams have their conventional databases covered in terms of security and business continuity. But as we enter the era of big data, Hadoop, and NoSQL, protection schemes need to evolve. In fact, big data could drive the next big security strategy shift.