REPORTS
FILTER REPORTS BY: Back to Reports
HIGHLIGHTED REPORT(S)
2015 State of End User Computing

2015 State of End User Computing

Call it consumerization, BYOD, or just the way you do business. The walls are down between corporate-issued and employee-owned devices. Our new survey yielded some surprises: VDI is gaining popularity, and HTML is key for new apps. Not so surprising? BlackBerry use is dropping like a stone.

Mobile Security: All About the Data

Mobile Security: All About the Data

Our 2014 survey shows less focus on hardware, more on securing the information residing on devices - a strategy that makes data classification a cornerstone of mobile security. In this report, we'll zero in on how government IT pros manage mobility.

How to Hire an MSSP

How to Hire an MSSP

Considering trusting a managed security services provider to be ­vigilant about your company’s well-being? Here’s how to successfully evaluate, select, and manage a hired security gun.

Overlay Networking: An Introduction

Overlay Networking: An Introduction

Overlay networks are built on top of physical networks to ­enable more flexible and scalable datacenters. Get insight into the protocols and technology that underpin overlay networks, including tunneling, network agents, and controllers. This ­report also explains how physical and overlay networks are ­integrated.