REPORTS
FILTER REPORTS BY: Back to Reports
HIGHLIGHTED REPORT(S)
2015 State of End User Computing

2015 State of End User Computing

Call it consumerization, BYOD, or just the way you do business. The walls are down between corporate-issued and employee-owned devices. Our new survey yielded some surprises: VDI is gaining popularity, and HTML is key for new apps. Not so surprising? BlackBerry use is dropping like a stone.

Threat Intelligence Today

Threat Intelligence Today

Is threat intel the best way to stay ahead of new and complex attacks? The 397 respondents to our new survey seem to think so: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.

State of Cloud Survey

State of Cloud Survey

Steps to take this year: Choose providers with an eye to standards. Think hard about hybrid. Do not ignore Docker. Don't trust, verify security and performance. Find DevOps disciples and let them drive cloud strategy.

2014 Hybrid Cloud Survey

2014 Hybrid Cloud Survey

Mixing public and private can deliver the best of both cloud worlds. But you'll need to consider potential snafus, decide which workloads to run on which type of cloud, and address ­security issues up front.

2014 Cloud ROI Survey

2014 Cloud ROI Survey

Our survey finds one in five companies doesn't calculate ROI for cloud projects, and half can only do a ballpark comparison between cloud and on-premises data centers. Both our survey ­research and the real-world examples of two cloud innovators show that cloud ROI calculations remain far from an exact science.

2014 Mobile Security Survey

2014 Mobile Security Survey

BYOD has major implications for data protection, client software licensing, acceptable use, and more. It's also happening, with or without IT's blessing. Fortunately, our survey shows less focus on iron-fisted device management, more on information control. There might be hope for us yet.