REPORTS
FILTER REPORTS BY: Back to Reports
HIGHLIGHTED REPORT(S)
Threat Intelligence Today

Threat Intelligence Today

Is threat intel the best way to stay ahead of new and complex attacks? The 397 respondents to our new survey seem to think so: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.

Overlay Networking: An Introduction

Overlay Networking: An Introduction

Overlay networks are built on top of physical networks to ­enable more flexible and scalable datacenters. Get insight into the protocols and technology that underpin overlay networks, including tunneling, network agents, and controllers. This ­report also explains how physical and overlay networks are ­integrated.

Research: 2014 Private Cloud Survey

Research: 2014 Private Cloud Survey

Respondents are on a roll: 53% brought their private clouds from concept to production in less than one year, and 60% ­extend their clouds across multiple data centers. But expertise is scarce, with 51% saying acquiring skilled employees is a roadblock.