Data protection perceptions seem unconnected from reality for our 437 respondents, as 36% say they're very satisfied with their backup systems even as just 23% are extremely confident in their recovery capabilities.
Data stores are big, with 83% reporting 10% or better annual growth; 27% are wrangling 25% or more yearly increases. The main culprit: Enterprise databases and data warehouses. Yet money’s still tight, with 25% saying they lack the budget to meet demand, never mind optimize for performance and capacity.
Is the IT budget moving out of IT’s control? Maybe — 37% of respondents say the rate of outside spending is on the rise, up from 22% last year. Just 21% of CIOs retain full spending authority. What is in our control: How we respond.
Among 688 respondents, 46% have deployed mobile apps, with an additional 24% planning to in the next year. Soon, all apps will look like mobile apps — and it’s past time for those with no plans to get cracking.
Today’s enterprises want less complexity and more user-friendly, visual dashboards. Forty-six percent of respondents say ease-of-use challenges with complex software is one of the biggest barriers. Similarly, data visualization tools rated as the most interesting leading-edge technology, with an average 3.5 rating on a 1-5 scale.
As compelling as social business is, many organizations have not adopted social products or processes. In this report, we examine why social business cannot be ignored and recommend how companies can pave the way for success.
DNS is the world’s largest distributed database, and it’s increasingly being used as a launchpad for attacks. To gird against this growing threat, enterprise security pros need to understand the dangers posed and the damage that can be done. In this Dark Reading report, we provide a detailed examination of the ever-looming DNS threat, as well as advice and recommended resources for protecting the enterprise against it.
Emerging software tools now make analytics feasible -- and cost-effective -- for most companies.
As cloud services pile up, IT teams find themselves in a bind: How do we manage multiple vendors without wasting more money than we save by not owning and operating the infrastructure?
There's no doubt Google has made headway into businesses: Just 28% discourage or ban use of its productivity products, and 69% cite Google Apps' good or excellent mobility. But progress could still stall: 59% of nonusers distrust the security of its cloud, data privacy is an open question and 37% worry about integration.
The complexity of enterprise IT systems and processes is growing, as are threats against organizations’ assets. Unfortunately, security budgets are not. Security pros must therefore play a high-stakes game of figuring out which problems to tackle and in what order. In this Dark Reading report, we explain how risk assessment techniques can inform the process of prioritizing security tasks and processes, and recommend steps security pros can take to glean and apply pertinent data based on their own enterprise’s risk profile.
With the rapid-fire disclosure of new threats and vulnerabilities we are seeing these days, it can be especially challenging for security pros to effectively determine the level of risk each poses to their companies. There are many matrixes and calculators that can help, but they may not reflect an organization’s specific needs. This Dark Reading report examines the vulnerability disclosure process and recommends ways in which security pros can interpret risk and plan mitigation and follow-up.