REPORTS
FILTER REPORTS BY: Back to Reports
HIGHLIGHTED REPORT(S)
Mobile Security: All About the Data

Mobile Security: All About the Data

Our 2014 survey shows less focus on hardware, more on securing the information residing on devices - a strategy that makes data classification a cornerstone of mobile security. In this report, we'll zero in on how government IT pros manage mobility.

Advanced Attacks Demand New Defenses

Advanced Attacks Demand New Defenses

Cyber-criminals wielding APTs have plenty of innovative techniques to evade network and endpoint defenses. It’s scary stuff, and ­ignorance is definitely not bliss. How to fight back? Think security that’s distributed, stratified, and adaptive. 

Research: 2014 Application Consolidation Survey

Research: 2014 Application Consolidation Survey

More than half of companies have done app consolidation in the past year, and 45% still are managing duplicate apps. App consolidation’s benefits from lowered cost and complexity are easy to see, but it’s hard to get there because of employee resistance and lack of resources. IT organizations also must build credibility as they cut apps, since in 63% of companies app sprawl is caused in part by unmet needs. 

2014 Next-Gen WAN Survey

2014 Next-Gen WAN Survey

While 68% say demand for WAN bandwidth will increase, just 15% are in the process of bringing new services or more ­capacity online now. For 26%, cost is the problem. Enter ­vendors from Aryaka and Pertino to Cisco and Google, all looking to use cloud to transform how IT delivers wide area connectivity.