REPORTS
FILTER REPORTS BY: Back to Reports
HIGHLIGHTED REPORT(S)
Strategy: Monitoring Security in Cloud Environments

Strategy: Monitoring Security in Cloud Environments

The use of cloud technology is booming, often offering the only way to meet customers', employees' and partners' rapidly rising requirements. But IT pros are rightly nervous about a lack of visibility into the security of data in the cloud. In this Dark Reading report, we put the risk in context and offer recommendations for products and practices that can increase insight - and enterprise security.

Threat Intelligence Today

Threat Intelligence Today

Is threat intel the best way to stay ahead of new and complex attacks? The 397 respondents to our new survey seem to think so: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.

2014 Cloud ROI Survey

2014 Cloud ROI Survey

Our survey finds one in five companies doesn't calculate ROI for cloud projects, and half can only do a ballpark comparison between cloud and on-premises data centers. Both our survey ­research and the real-world examples of two cloud innovators show that cloud ROI calculations remain far from an exact science.

2014 Mobile Security Survey

2014 Mobile Security Survey

BYOD has major implications for data protection, client software licensing, acceptable use, and more. It's also happening, with or without IT's blessing. Fortunately, our survey shows less focus on iron-fisted device management, more on information control. There might be hope for us yet.