REPORTS
FILTER REPORTS BY: Back to Reports
HIGHLIGHTED REPORT(S)
Strategy: Monitoring Security in Cloud Environments

Strategy: Monitoring Security in Cloud Environments

The use of cloud technology is booming, often offering the only way to meet customers', employees' and partners' rapidly rising requirements. But IT pros are rightly nervous about a lack of visibility into the security of data in the cloud. In this Dark Reading report, we put the risk in context and offer recommendations for products and practices that can increase insight - and enterprise security.

6 Tools to Protect Big Data

6 Tools to Protect Big Data

Most IT teams have their conventional databases covered in terms of security and business continuity. But as we enter the era of big data, Hadoop, and NoSQL, protection schemes need to evolve. In fact, big data could drive the next big security strategy shift.

Mobile Security: All About the Data

Mobile Security: All About the Data

Our 2014 survey shows less focus on hardware, more on securing the information residing on devices - a strategy that makes data classification a cornerstone of mobile security. In this report, we'll zero in on how government IT pros manage mobility.

InformationWeek Elite 100

InformationWeek Elite 100

Our data shows these innovators using digital technology in two key areas: providing better products and cutting costs. Almost half of them expect to introduce a new IT-led product this year, and 46% are using technology to make business processes more efficient.