REPORTS
FILTER REPORTS BY: Back to Reports
HIGHLIGHTED REPORT(S)
Mobile Security: All About the Data

Mobile Security: All About the Data

Our 2014 survey shows less focus on hardware, more on securing the information residing on devices - a strategy that makes data classification a cornerstone of mobile security. In this report, we'll zero in on how government IT pros manage mobility.

Advanced Attacks Demand New Defenses

Advanced Attacks Demand New Defenses

Cyber-criminals wielding APTs have plenty of innovative techniques to evade network and endpoint defenses. It’s scary stuff, and ­ignorance is definitely not bliss. How to fight back? Think security that’s distributed, stratified, and adaptive. 

Research: 2014 State of Storage

Research: 2014 State of Storage

Data stores are big, with 83% reporting 10% or better annual growth; 27% are wrangling 25% or more yearly increases. The main culprit: Enterprise databases and data warehouses. Yet money’s still tight, with 25% saying they lack the budget to meet demand, never mind optimize for performance and capacity.