REPORTS
FILTER REPORTS BY: Back to Reports
HIGHLIGHTED REPORT(S)
Mobile Security: All About the Data

Mobile Security: All About the Data

Our 2014 survey shows less focus on hardware, more on securing the information residing on devices - a strategy that makes data classification a cornerstone of mobile security. In this report, we'll zero in on how government IT pros manage mobility.

Overlay Networking: An Introduction

Overlay Networking: An Introduction

Overlay networks are built on top of physical networks to ­enable more flexible and scalable datacenters. Get insight into the protocols and technology that underpin overlay networks, including tunneling,  network agents, and controllers. This ­report also explains how physical and overlay networks are ­integrated.

Research: 2014 Private Cloud Survey

Research: 2014 Private Cloud Survey

Respondents are on a roll: 53% brought their private clouds from concept to production in less than one year, and 60% ­extend their clouds across multiple data centers. But expertise is scarce, with 51% saying acquiring skilled employees is a roadblock.