Kurt Marko, May 2, 2013
Have your engineers caught software-defined networking fever yet? While SDN is currently most appropriate for test labs or tech-savvy cloud operators like Google and Facebook, that’s poised to change. As the technology matures and products proliferate, enterprise IT executives need a grasp of the potential benefits.
Michael Finneran, Mar 25, 2013
Many UC projects are stuck in neutral: Only 38% have deployed, up just two points from our 2011 survey, and 31% of these respondents have rolled UC out to less than 10% of their user bases. Here’s how to get out of the rut.
| Read Report » | 3 MB
InformationWeek Staff, May 24, 2013
Cyber attackers of all types -- financially motivated, nation-state spies and hacktivists -- continue to hammer away at their targets en masse, and once in a while, they get caught.
Ed Moyle, May 24, 2013
The value of threat intelligence is based on organization-specific factors, including how threat intelligence is defined, the data the organization evaluates, the maturity of the shop in question and the use cases for the data. In this Dark Reading report, we examine how a combination of threat intelligence and security monitoring can boost enterprise defenses, and recommend how to determine if your organization is ready to tap into the model.
Ericka Chickowski, May 24, 2013
After years of relying on passwords, technology vendors -- and enterprises -- are ready for new methods of proving user identity.
| Read Report » | 354 KB
Peter Rysavy, May 24, 2013
71% of nearly 900 qualified respondents say m-commerce is very or extremely important to their organizations, yet just 26% have comprehensive strategies in place now. That spells opportunity.
| Read Report » | 403 KB
Michael A. Davis, May 24, 2013
Our 1,029 respondents are getting wise on awareness, with just 13% saying they're more vulnerable than last year. Still, 73% see mobility as a threat, and 75% admit they may be ignorant of a breach.
| Read Report » | 5 MB
Adrian Lane, May 23, 2013
Database administrators are the caretakers of an organization’s most precious asset—its data—but rarely do they have the experience and skills required to secure that data. Indeed, the goals of DBAs and security pros are often at odds. That gap must be bridged in order for organizations to effectively protect data in an increasingly complex and threat-ridden environment. In this Dark Reading report we examine what DBAs should know about security, as well as recommend how database and security pros can work more effectively together.
Art Wittmann, May 23, 2013
Almost half, 47%, of our 450 respondents consider the company a serious threat in the networking market, with just 34% calling the government ban on carriers buying Huawei equipment for U.S. networks a deal breaker. What’s your stance?
Fahmida Y. Rashid, May 22, 2013
It seems as though not a day goes by without a headline screaming that some organization has experienced a data breach, putting the business — and its customers and partners — at risk. To keep your own organization out of the news, it’s important to understand the most common causes of data breaches and what you can do to mitigate the threats they present.
Greg Ferro, May 22, 2013
A DCI lets companies link two or more data centers together for disaster recovery or business continuity, but it’s not easy. This report provides an overview of the major DCI technologies and describes their pros and cons.
Joe Masters Emison, May 21, 2013
Few of our 446 respondents will change their IT strategies as result of the cloud. That spells lost opportunity.
| Read Report » | 171 KB