REPORTS
FILTER REPORTS BY: Back to Reports
HIGHLIGHTED REPORT(S)
The Agile Archive

The Agile Archive

When it comes to managing data, don’t look at backup and archiving systems as burdens and cost centers. A well-designed archive can enhance data protection and restores, ease search and e-discovery efforts, and save money by intelligently moving data from expensive primary storage systems.

Strategy: Choosing, Managing and Evaluating A Penetration Testing Service

Strategy: Choosing, Managing and Evaluating A Penetration Testing Service

Pen testing helps companies become more secure by finding and ­analyzing their insecurities, but pen test services can be fraught with their own kind of risk. In this Dark Reading report, we recommend what to look for in a provider and its wares, how to get what you pay for, and how to ensure that pen testing itself doesn’t open the ­company or its employees up to new risk. 

Building and Maintaining Effective Firewall Configurations

Building and Maintaining Effective Firewall Configurations

Perimeter defense isn’t rocket science, which may be the reason security pros often take it for granted. Without thoughtful and robust perimeter security measures, higher-level systems such as Web security and ­application intelligence will be rendered almost worthless. This Dark ­Reading report recommends best practices for rooting out perimeter ­security issues and for configuring firewalls effectively in the first place.

2013 InformationWeek 500

2013 InformationWeek 500

Our 25th annual survey of 500 business IT innovators provided some surprising ­results about the use of cloud, analytics and mobile: Just 12% of surveyed ­companies can switch between public cloud infrastructure and in-house data centers based on ­demand; only 26% use PaaS; 54% do predictive revenue analysis; and 30% have widely deployed mobile apps for employees.

Strategy: How Existing Security Data  Can Help ID Potential Attacks

Strategy: How Existing Security Data Can Help ID Potential Attacks

Having a wealth of data is a good thing — if you can make sense of it. Most companies are challenged with aggregating and analyzing the plethora of data being generated by their security applications and devices. This Dark Reading report recommends how to effectively leverage security data in order to make informed decisions and spot areas of vulnerability.