REPORTS
FILTER REPORTS BY: Back to Reports
HIGHLIGHTED REPORT(S)
Mobile Security: All About the Data

Mobile Security: All About the Data

Our 2014 survey shows less focus on hardware, more on securing the information residing on devices - a strategy that makes data classification a cornerstone of mobile security. In this report, we'll zero in on how government IT pros manage mobility.

The Agile Archive

The Agile Archive

When it comes to managing data, don’t look at backup and archiving systems as burdens and cost centers. A well-designed archive can enhance data protection and restores, ease search and e-discovery efforts, and save money by intelligently moving data from expensive primary storage systems.

How to Hire an MSSP

How to Hire an MSSP

Considering trusting a managed security services provider to be ­vigilant about your company’s well-being? Here’s how to successfully evaluate, select, and manage a hired security gun.

Overlay Networking: An Introduction

Overlay Networking: An Introduction

Overlay networks are built on top of physical networks to ­enable more flexible and scalable datacenters. Get insight into the protocols and technology that underpin overlay networks, including tunneling,  network agents, and controllers. This ­report also explains how physical and overlay networks are ­integrated.