Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

InformationWeek

InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.

Headquarters: 2 Penn Plaza, 15th Floor, New York, NY, 10121 United States
Our Website: http://www.informationweek.com


Latest Content From InformationWeek

Digital Editorial Content: Top IT Trends for 2018

by InformationWeekMar 26, 2018

This InformationWeek Trend Report explores the hot trends for 2018 and how IT organizations like yours will be experimenting with them.

IN THIS REPORT:

  • Learn how to identify the major trends that will affect your IT environment in the coming year
  • Find out where IT organizations will be focusing their infrastructure investments in 2018
  • Look beyond doubts and fears of public cloud to develop a cloud strategy that works best for your needs
  • And more.

Research Report: 2016: IT Salary Survey Report

by InformationWeekOct 26, 2017

Wondering what the going rate is for your current job and if your pay is at or up to par? Are you curious how much to ask for when looking for a new gig? Check out the InformationWeek's 2016 US IT Salary Survey and find out!


Digital Editorial Content: Digital Transformation Myths & Truths

by InformationWeekSep 12, 2017

Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.

IN THIS REPORT:

  • Learn how to set realistic goals in terms of how and what need to be transformed in your environment
  • Discover the major steps required to move your company to a digitally transformed state
  • Explore strategies for changing the culture mindset and achieving progress in an organization
  • And more.


Research Report: 2015 Strategic Security Survey

by InformationWeekSep 15, 2015

The High Cost of Security Breaches

2014 has been dubbed the “Year of the Data Breach” with millions of records containing personally identifiable information and credit and debit card data siphoned off by cybercriminals. The effect this has on the individuals whose identity, money, or medical records have been taken can be devastating, but what is the impact on the organization whose security defenses failed to keep intruders out?

Fifteen percent of the 435 respondents to our InformationWeek/Dark Reading 2015 Strategic Security Survey suffered a targeted breach or compromise. Fifteen percent of respondents who had a breach or compromise estimated the cost of that breach at between $500,000 and a $1 million, with 6% putting the figure at $5 million or more.

Get all the insight in 2015 Strategic Security Report.


Research Report: How Enterprises Are Attacking the IT Security Challenge

by InformationWeekSep 02, 2015

Enterprise data breaches, new security vulnerabilities, and threats in the mobile and cloud arenas continue to dominate the headlines. Maybe that’s why 46% of the 435 respondents to our InformationWeek/Dark Reading 2015 Strategic Security Survey say that this year they have a bigger information security budget than last year. So how are they going to be investing those extra dollars? Firewalls, email filtering, endpoint protection, and VPNs are again the four most widely deployed security technologies. But 24% of respondents don’t even measure the value of their security investments, so for many enterprises, new investment decisions may be based more on subjective opinion than hard facts.

Information security spending will range from 1% to 10% of this year’s annual IT budget for 51% of our respondents. But for some enterprises, increased spending hasn’t helped much: 15% of our respondents suffered a targeted breach or compromise costing between $500,000 and $1 million, with 6% putting the figure at $5 million or more.


Research Report: Strategy: Monitoring Security in Cloud Environments

by InformationWeekMar 20, 2015

One of the major reasons enterprises have been hesitant to embrace cloud computing technologies is a lack of visibility. Enterprises need ways to track their data as it travels back and forth to the cloud, as well as a way to ensure that their data is safe in a shared infrastructure.

To benefit from cloud computing and minimize risks to your organization’s data, several key components are required: visibility across infrastructures and applications, isolation of critical services, and regularly audited automated processes for threat detection and mitigation. Working closely with cloud providers, administrators can deliver accountability and audit trails for data events in and out of the cloud so enterprises know exactly what is happening with their data. Cloud providers will have their own monitoring tools to track the performance, continuity and security of all of the components that support service delivery, but organizations must invest in their own systems to monitor physical, virtual and cloud environments. Responsibility for security and monitoring of data critical to daily business operations is ultimately your responsibility, not the provider’s.

In this Dark Reading report, we examine tools and practices that enterprises can use to monitor the security of cloud environments and receive notifications when their data might be at risk.


Research Report: Building a Security Analytics Initiative

by InformationWeekJan 28, 2015

Many security teams empathize with Italian artist Sven Sachsalber, who recently spent 48 hours in a Paris museum looking for a needle in a haystack. At least Sachsalber knew what he was seeking, and the haystack didn't keep increasing in size every hour. Those responsible for network security should be so lucky.

In the face of huge and diverse stores of data, many enterprises are turning to big data analytics to help find threats faster and with more accuracy. Threat detection methods based solely on known elements, such as whitelists and blacklists, signature lists, and rule lists, aren't effective against the unknown. However, searching through vast amounts of data can unearth clues that make anomaly detection techniques more effective in spotting malicious activity, while behavioral analytics can better distinguish between legitimate and suspicious users. Gartner predicts that by 2016 more than 25% of global firms will adopt big data analytics for security and fraud detection.

In this report, we discuss tools and methods for harnessing all available security information and for building a forensic analysis process that can lead to faster identification of targeted attacks and to better strategies for enterprise data defense.


Research Report: Back Up, Don't Go Broke

by InformationWeekJan 16, 2015

Best-of-Breed Backup Without Breaking the Bank

Look under the covers of the storage market and things are booming, with dozens of new companies and products coming onto the scene. Yet many enterprises are stuck in the same old rut, especially when it comes to backup.

One reason is the fear of snowballing costs. In this report, we'll show you a strategy for exploring new options for backup in strategic areas, while falling back on less expensive technologies in others. You can have best-of-breed backup without breaking the bank. (S8320116)


Research Report: Making Threat Intelligence Services Work for Your Enterprise

by InformationWeekJan 05, 2015

It's always difficult to get a true picture of the state of enterprise security. Most CSOs cannot, or will not, discuss their own experiences in any detail. One thing we do know is that BYOD, social media, and the cloud have significantly increased network complexity and vulnerability, as the latest attacks often leverage these vectors to bypass traditional security defenses, including firewalls, anti-malware, intrusion detection, and user authentication systems. While these technologies are necessary to mitigate the majority of common threats, security teams need to be able to quickly adapt defenses as the threat landscape evolves.

How? One of the fastest-growing segments of the security industry is threat intelligence services that collect information about potential external cyberthreats and feed it to your organization on a regular basis.

Dark Reading's 2014 Threat Intelligence Survey reveals the extent to which third-party threat intelligence is already being used by enterprises in the battle to keep business and client data secure. Sixty-six percent of respondents say they use it regularly to guide IT security strategies, with 60% of those security pros saying it plays a vital role, even shaping their entire security strategies.

Still, given that the majority of respondents say they have yet to fully realize the benefits of analyzing their own internally generated data, is third-party threat intel just an overhyped, passing fad? Or can it really help to develop a more effective cyber defense strategy? We'll explore.


Research Report: 2015 Analytics & BI Survey

by InformationWeekDec 17, 2014

The world of analytics, business intelligence, and information management is in flux, with old-guard vendors and conventional technologies losing steam and companies entertaining new options for the big data era.

Our InformationWeek 2015 Analytics, Business Intelligence, and Information Management Survey finds:

>> 28% of the 297 respondents responsible for analytics and BI software selections say their organizations have "standardized on one or a few analytics and BI products deployed throughout the organization." That's down from 35% in our 2014 report.

>> 21% say their firms use "many analytics and BI products," up from 16% in 2014.

>> 48% of analytics and BI decision makers and influencers say "ease-of-use challenges with complex software or less technically savvy employees" creates a barrier to success, a close second to "data quality problems" for the third year in a row.

>> 26% of the 374 respondents involved in selecting or recommending information management technologies say their firms are using NoSQL databases, up from 19% in our 2014 survey.

>> 22% say their firms are using Hadoop, up from 15% in our 2014 survey.

In this report, we:

>> Examine two approaches to addressing ease-of-use in analytics and BI software. One camp favors software simplicity, the other focuses on software intelligence.

>> Explore the growing use of Hadoop and consider whether this new platform requires new BI and analytics tools.     R8301214

Respondent breakdown: 35% have 5,000 or more employees; 25% have more than 10,000. Manufacturing, financial services, government, education, and healthcare are well-represented; and 45% are IT director/manager, IT executive management (C-level/VP) level or non-IT executive managers.

Survey Name InformationWeek 2015 Analytics, Business Intelligence and Information Management Survey

Survey Date October 2014

Region North America

Number of Respondents 384

Purpose To examine adoption trends and strategies around analytics, business intelligence and information management

Methodology InformationWeek surveyed business technology decision-makers at North American companies. The survey was conducted online, and respondents were recruited via an email invitation containing an embedded link to the survey. The email invitation was sent to qualified InformationWeek subscribers.