REPORTS
FILTER REPORTS BY: Back to Reports
HIGHLIGHTED REPORT(S)
Building a Security Analytics Initiative

Building a Security Analytics Initiative

To identify sophisticated attacks, infosec teams must correlate a huge range of data — from internal systems, threat intelligence services, cloud and network service providers, digital forensics and attribution services, and others. One way to cope: big data tools and practices.

Research: 2014 State of Storage

Research: 2014 State of Storage

Data stores are big, with 83% reporting 10% or better annual growth; 27% are wrangling 25% or more yearly increases. The main culprit: Enterprise databases and data warehouses. Yet money’s still tight, with 25% saying they lack the budget to meet demand, never mind optimize for performance and capacity.

 

Research: 2014 State of Storage

Research: 2014 State of Storage

Data stores are big, with 83% reporting 10% or better annual growth; 27% are wrangling 25% or more yearly increases. The main culprit: Enterprise databases and data warehouses. Yet money’s still tight, with 25% saying they lack the budget to meet demand, never mind optimize for performance and capacity.

 

Cloud, Mobility Demand Better IAM

Cloud, Mobility Demand Better IAM

 

Maintaining the security of a traditional “worker bee” model — logging in to an in-office, network-connected PC via Active Directory and accessing on-premises applications and local server resources — while taking advantage of cloud and mobility isn’t easy. But that doesn’t mean we shouldn’t try. 

 

Research: 2014 DevOps Survey

Research: 2014 DevOps Survey

Only 21% of companies have implemented DevOps, with another 21% planning to within a year. But getting good ­results is tough: 31% see or expect significantly improved infrastructure stability from DevOps vs. 51% citing only some improvement.