More mobility analytics
They are out to get you, make no mistake. But there are things you can do to make sure that your organization is unappealing to a cybercriminal bent on finding easy pickings. The key is to understand what cybercriminals are looking for and how they go about the business of infiltrating vulnerable systems and networks.
Stage 2 raises requirements for health information exchanges, EHR interoperability and patient involvement. For the first time, providers will have to engage patients in their own care or risk losing out on incentive payments.
When it comes to protecting PCs and laptops, IT puts too much emphasis on malware detection. You'll get better results by focusing on performance, management and -- most importantly -- how users and the security software interact. This report tells you how to evaluate endpoint security software based on what really matters.
Small and midsize businesses have a big security problem: They are vulnerable to the same kinds of attacks as large enterprises, but they often don’t have the same resources for fending off, or recovering from, those attacks. Security services can help small and midsize businesses get and stay secure. In this report, Dark Reading examines the reasons why MSSPs make sense for SMBs, recommends the six categories of services that every SMB needs, and provides tips for evaluating and hiring providers.
Exclusive research of 230 IT pros and 68 carriers providing 4G services shows that while customers are pleased with service now, the future looks far less certain.
A managed security service provider should lift at least some cost and resource burden from the IT department's shoulders. But what if it doesn't? What if you aren't any more secure after entering into a contract with an MSSP? And how do you even know if it's doing everything it promised? There is an art to managing the MSSP relationship after the initial deal is done. In this report, Dark Reading provides recommendations for testing the mettle of MSSPs and for dealing with providers if their performance isn't up to snuff.
In this follow-up report to 'Understanding Software-Defined Networks,' we examine IT deployment plans and explore the technology ecosystem around SDN. This report drills into the current and planned efforts of the Open Networking Foundation, which is driving standardization of the OpenFlow protocol, and provides details on SDN strategies from 17 vendors.
SMBs may not have the IT resources that their bigger peers do, but they do have the same responsibilities when it comes to security. Fortunately, SMBs can build a strong security posture using a few key products, many of which are free. In this report, Dark Reading examines the challenges that SMBs face when it comes to security and recommends the five security tools every SMB must have.
When it comes to monitoring, the application space is often forgotten. This leaves a gaping hole because the behavior of applications can reveal a great deal about security events and their causes. The inherent variability of applications can make monitoring a challenge, but enterprises can extend existing tools to include the applications space. In this report, we make the case for the development of an applications monitoring strategy and provide recommendations for implementation that tap into existing products and processes.
Database activity monitoring, or DAM, is an effective compliance and security strategy. However, not every DAM system will work the same in every organization. Indeed, not every organization can even make use of every feature that DAM systems provide. In this report we examine what DAM can and can’t do, and recommend how to evaluate and implement the best system for your organization.
The competition for tablet dominance is heating up as Google and Microsoft, refusing to go down without a fight, release competitive new products to take on the Apple juggernaut. But for IT pros charged with managing BYOD programs, all that adds up to is more confusion. We analyze Apple’s new Mini and refreshed iPad, Google’s Nexus duo and Microsoft Surface.
Even as mobility and cloud take off, too many companies still leave data in the clear, spooked by operational and performance concerns. Yes, key management is still a problem. But here are five ways to use encryption without breaking your existing infrastructure, plus a look ahead at the next big thing: identity-based encryption.
If there’s one thing that’s true about security, it’s that an organization can never be completely secure. The trick is to determine what’s most valuable to your organization, and how big the threats to those assets really are. That’s putting risk-based management simply, but it doesn’t have to be complicated. In this report we provide some perspective around risk-based security, as well as recommend some best practices for developing and effectively implementing a program.
Our Outlook survey finds 71% of companies with rising demand for IT projects, just 8% cutting IT staff and 60% expecting higher IT budgets than in 2012. But IT’s priority list continues to trend toward IT-centric projects and needs to focus more externally on projects that affect the customer directly.
The confluence of smartphone-fueled employee mobility and ubiquitous cloud services means it's time to update your data loss prevention strategy. The key: Data protection isn't something you can buy. "DLP 2.0" needs to expand into a smart set of policies backed up by a mix of products.
We hear a lot about controlling devices and data. But there's a third consideration that's just as critical -- and a lot less high profile. Don't let an intense focus on employee mobile devices leave you exposed via insecure apps.
Vulnerability scans are valuable, but you have to think and act like a hacker if you want to truly understand the ways in which your organization could be compromised. In this report, Dark Reading recommends the tools and methodologies that can be used to test your organization’s security.
What do concepts like the semantic Web, mashups, Web 3.0 and open data have to do with your enterprise relational databases? Much like consumerization continues to drive innovation in end user computing, these technologies deliver benefits that your business should be exploiting.
While 86% of organizations we surveyed said application services are very or critically important in their organizations, fewer than 40% use application performance monitoring tools, and 51% of organizations that have rejected APM say the products require too much staff time to implement correctly. Find out how to get the benefits of application monitoring while avoiding the complexity and performance headaches.
Nine in 10 IT pros think mobile will increase in importance, but fewer than half have deployed or are in the process of deploying mobile device management systems. Our review of suites from Good Technology, Symantec and Research In Motion, plus analysis of the most important MDM capabilities, reveals why some companies are holding off.
Today’s 802.11n wireless LANs can reach 450 Mbps to 600 Mbps -- not too shabby. But hold onto your hats because here come next-gen Gigabit Wi-Fi products with 802.11ac enhancements that could deliver nearly 7 Gbps. In this report, we’ll discuss what 11ac brings to the table, which applications benefit, when products are likely to surface, features to look for and guidance on how to get the most from 11ac while protecting past WLAN investments.
Companies of all sizes are embracing data visualization, self-service BI and big data analysis, our survey finds. Advanced analytics is of particular interest to our respondents: 62% say they’re using these technologies to optimize business operations, while 44% aim to identify business risk and another 44% hope to predict promising new business opportunities. This report explores use cases in higher education and insurance, and shows how emerging analytics techniques are achieving breakthrough results.
Small and midsize businesses face the same escalated cyber attacks and increased frequency and scope of natural disasters as enterprises. Fortunately, new cloud offerings can help everyone work smarter.
Security policy has been around for as long as we have had computing systems to secure. So why is policy so often ineffective? Dark Reading examines the persistent problems companies have faced and offers some recommendations for developing, communicating and following through with a security policy.
Got mobile users accustomed to nonstop social networking and sporting multiple devices: PCs, tablets, smartphones, Windows 8 hybrids -- you name it? Then a cloud-based service may be a perfect fit for enterprise collaboration. Plenty of vendors are eager to win your business. Find out what to look for and get profiles of 11 top contenders.
- Big Data: Architecting Systems at Speed - E2 Conference Boston
- Learn how to enage customers through mobility - Mobile Commerce World - Mobile Commerce World
- Explore best practices for marketers in the new mobile world - Mobile Commerce World - Mobile Commerce World
- Learn how to best integrate mobile commerce with your current systems -- Mobile Commerce World - Mobile Commerce World
- Evaluating Emerging Technologies for the Enterprise - E2 Conference Boston
- Building a Hybrid Cloud in Government: It's not that Complicated
- Why is Information Governance So Important for Modern Analytics?
- Maximize the benefits of virtualization for greater ROI
- Get Actionable Insight with Security Intelligence for Mainframe Environments
- The ROI of Mobile Photo Bill Pay