Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.



InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.

Our Website:

Latest Content From InformationWeek

Research Report: Strategy: Monitoring Security in Cloud Environments

by InformationWeekMar 20, 2015

One of the major reasons enterprises have been hesitant to embrace cloud computing technologies is a lack of visibility. Enterprises need ways to track their data as it travels back and forth to the cloud, as well as a way to ensure that their data is safe in a shared infrastructure.

To benefit from cloud computing and minimize risks to your organization’s data, several key components are required: visibility across infrastructures and applications, isolation of critical services, and regularly audited automated processes for threat detection and mitigation. Working closely with cloud providers, administrators can deliver accountability and audit trails for data events in and out of the cloud so enterprises know exactly what is happening with their data. Cloud providers will have their own monitoring tools to track the performance, continuity and security of all of the components that support service delivery, but organizations must invest in their own systems to monitor physical, virtual and cloud environments. Responsibility for security and monitoring of data critical to daily business operations is ultimately your responsibility, not the provider’s.

In this Dark Reading report, we examine tools and practices that enterprises can use to monitor the security of cloud environments and receive notifications when their data might be at risk.

Research Report: Building a Security Analytics Initiative

by InformationWeekJan 28, 2015

Many security teams empathize with Italian artist Sven Sachsalber, who recently spent 48 hours in a Paris museum looking for a needle in a haystack. At least Sachsalber knew what he was seeking, and the haystack didn't keep increasing in size every hour. Those responsible for network security should be so lucky.

In the face of huge and diverse stores of data, many enterprises are turning to big data analytics to help find threats faster and with more accuracy. Threat detection methods based solely on known elements, such as whitelists and blacklists, signature lists, and rule lists, aren't effective against the unknown. However, searching through vast amounts of data can unearth clues that make anomaly detection techniques more effective in spotting malicious activity, while behavioral analytics can better distinguish between legitimate and suspicious users. Gartner predicts that by 2016 more than 25% of global firms will adopt big data analytics for security and fraud detection.

In this report, we discuss tools and methods for harnessing all available security information and for building a forensic analysis process that can lead to faster identification of targeted attacks and to better strategies for enterprise data defense.

Research Report: Back Up, Don't Go Broke

by InformationWeekJan 16, 2015

Best-of-Breed Backup Without Breaking the Bank

Look under the covers of the storage market and things are booming, with dozens of new companies and products coming onto the scene. Yet many enterprises are stuck in the same old rut, especially when it comes to backup.

One reason is the fear of snowballing costs. In this report, we'll show you a strategy for exploring new options for backup in strategic areas, while falling back on less expensive technologies in others. You can have best-of-breed backup without breaking the bank. (S8320116)

Research Report: Making Threat Intelligence Services Work for Your Enterprise

by InformationWeekJan 05, 2015

It's always difficult to get a true picture of the state of enterprise security. Most CSOs cannot, or will not, discuss their own experiences in any detail. One thing we do know is that BYOD, social media, and the cloud have significantly increased network complexity and vulnerability, as the latest attacks often leverage these vectors to bypass traditional security defenses, including firewalls, anti-malware, intrusion detection, and user authentication systems. While these technologies are necessary to mitigate the majority of common threats, security teams need to be able to quickly adapt defenses as the threat landscape evolves.

How? One of the fastest-growing segments of the security industry is threat intelligence services that collect information about potential external cyberthreats and feed it to your organization on a regular basis.

Dark Reading's 2014 Threat Intelligence Survey reveals the extent to which third-party threat intelligence is already being used by enterprises in the battle to keep business and client data secure. Sixty-six percent of respondents say they use it regularly to guide IT security strategies, with 60% of those security pros saying it plays a vital role, even shaping their entire security strategies.

Still, given that the majority of respondents say they have yet to fully realize the benefits of analyzing their own internally generated data, is third-party threat intel just an overhyped, passing fad? Or can it really help to develop a more effective cyber defense strategy? We'll explore.

Research Report: 2015 Analytics & BI Survey

by InformationWeekDec 17, 2014

The world of analytics, business intelligence, and information management is in flux, with old-guard vendors and conventional technologies losing steam and companies entertaining new options for the big data era.

Our InformationWeek 2015 Analytics, Business Intelligence, and Information Management Survey finds:

>> 28% of the 297 respondents responsible for analytics and BI software selections say their organizations have "standardized on one or a few analytics and BI products deployed throughout the organization." That's down from 35% in our 2014 report.

>> 21% say their firms use "many analytics and BI products," up from 16% in 2014.

>> 48% of analytics and BI decision makers and influencers say "ease-of-use challenges with complex software or less technically savvy employees" creates a barrier to success, a close second to "data quality problems" for the third year in a row.

>> 26% of the 374 respondents involved in selecting or recommending information management technologies say their firms are using NoSQL databases, up from 19% in our 2014 survey.

>> 22% say their firms are using Hadoop, up from 15% in our 2014 survey.

In this report, we:

>> Examine two approaches to addressing ease-of-use in analytics and BI software. One camp favors software simplicity, the other focuses on software intelligence.

>> Explore the growing use of Hadoop and consider whether this new platform requires new BI and analytics tools.     R8301214

Respondent breakdown: 35% have 5,000 or more employees; 25% have more than 10,000. Manufacturing, financial services, government, education, and healthcare are well-represented; and 45% are IT director/manager, IT executive management (C-level/VP) level or non-IT executive managers.

Survey Name InformationWeek 2015 Analytics, Business Intelligence and Information Management Survey

Survey Date October 2014

Region North America

Number of Respondents 384

Purpose To examine adoption trends and strategies around analytics, business intelligence and information management

Methodology InformationWeek surveyed business technology decision-makers at North American companies. The survey was conducted online, and respondents were recruited via an email invitation containing an embedded link to the survey. The email invitation was sent to qualified InformationWeek subscribers.

Research Report: Big Data in a Loosely Coupled World

by InformationWeekDec 02, 2014

Hold On Loosely

Taken together, InformationWeek's recent Big Data and Analytics and Consumerization of IT surveys show IT somewhere between a rock and a hard place. 

On one hand, this year's Big Data and Analytics Survey revealed some extremely positive trends, including more focus on external data sets, expanded use of big data tools, and greater emphasis on customer-centric data. However, across the spectrum of sizes and verticals, only 30% say they're very or extremely effective at identifying critical data and using it to make decisions -- that's down from 42% in 2013. A whopping 63% say they're only moderately or slightly effective, with the remaining 7% throwing in the towel and admitting defeat. 

Meanwhile, respondents to the 2015 Consumerization of IT Survey have largely accepted the infiltration of consumer-class tech into enterprise networks. But that doesn't mean they're happy about it or see it as a positive. Just 10% say it's made users much more engaged with IT.

The upshot is that many CIOs feel like business departments don't want IT's help -- even though they clearly need it to get the most from big data. The answer is to re-engage, but with an understanding that one size does not fit all. (S8271214)

Research Report: 2015 Federal Government IT Priorities Survey

by InformationWeekNov 24, 2014

Federal IT Priorities

Government IT organizations, like all tech shops, are challenged with staying on top of rapidly changing business and agency mission needs. But developing a long-term IT vision has become difficult given rapidly shifting economic, political, and technology trends. Respondents to our Federal Government IT Priorities Survey are focusing most of their attention on cyber and information security but have admittedly let cloud strategies, data center consolidation, and collaboration across departments fall by the wayside amid budget and cultural limitations.

Of the 123 survey respondents, 70% are involved with defining technology requirements, evaluating products and services, or have input in the selection of tools, but only 5% make final decisions on product and service purchases. Among them:

>> 70% said that cyber and information security programs are "extremely important" at their agencies. Only 3% said security is "not important at all."

>> The top two barriers to effective execution of IT projects are lack of budget (35%) and conflicting or poorly defined requirements (24%).

>> 46% have no plans to replace any infrastructure with cloud services in the upcoming fiscal year; that's up from 41% in our 2013 survey.

>> 19% say their agencies have enough IT workers with the necessary cloud, security, and acquisition skills to be effective moving forward.

In this report, we:

>> Discuss why government agencies, despite a sharp focus on information security, are falling behind in critical areas such as cloud and IT innovation.

>> Look at how agencies are planning to increase data center consolidation, use more open source software, and find more workers with cloud and security skills. 

Respondent breakdown: 59% have 1,000 or more employees; 30% have over 10,000 employees. Sixteen percent of respondents are IT director/manager or IT executive management (C-level/VP) level, and 22% are IT staff. Twenty-six percent are contractors, systems integrators, and/or consultants. (R8031114)

Survey Name InformationWeek 2014 Federal Government IT Priorities Survey

Survey Date June 2014

Region North America

Number of Respondents 123

Purpose To determine IT priorities for federal government technology professionals and contractors

Methodology InformationWeek surveyed 123 federal government technology decision-makers. The survey was conducted online, and respondents were recruited via an email invitation containing an embedded link to the survey. The email invitation was sent to qualified InformationWeek and InformationWeek Government subscribers.

Research Report: 2015 State of End User Computing

by InformationWeekNov 17, 2014

Forward Motion, Mostly

The 404 respondents to our InformationWeek 2015 Consumerization of IT Survey have accepted the infiltration of consumer-class tech into enterprise networks. But that doesn't mean they're happy about it. For example, just 22% encourage employees to contact tech support for assistance with personally owned devices. Other data points:

>> 74% say there's a difference in approach to technology between workers under 35 versus those over 35.

>> 40% provide iPhones to over 25% of employees, up from 16% in 2012.

>> 39% have strict rules for user access; each device must be individually registered and approved by IT.

>> 26% allow the integration of social media applications into enterprise applications and equipment (including Outlook plug-ins from Twitter, Facebook, and LinkedIn as well as third-party apps for browsers and desktops) with no real policy and/or controls in place.

In this report, we:

>> Examine cloud versus local storage: how mobile affects the decision.

>> Discuss overcoming security concerns by focusing on access and identity, not perimeter. 

>> Translate survey results around security, data storage and backup, productivity, budget, hardware life cycle, training and support, planning, and legacy integration requirements.

Respondent breakdown: 37% have 5,000 or more employees; 26% are over 10,000. Education, financial services, government, and manufacturing are well-represented, and 41% are IT director/manager or IT executive management (C-level/VP) level. (R8191214)

Survey Name InformationWeek 2015 Consumerization of IT Survey

Survey Date October 2014

Region North America

Number of Respondents 404

Purpose To identify the extent of consumer device use in the enterprise and the strategies organizations are employing to manage this trend.

Methodology InformationWeek surveyed business technology decision-makers at North American companies. The survey was conducted online, and respondents were recruited via an email invitation containing an embedded link to the survey. The email invitation was sent to qualified InformationWeek subscribers.


Research Report: Big Data & Government IT: 3 Core Competencies

by InformationWeekNov 12, 2014

Analytics: The Time Is Now

Those charged with using big data analysis for defense and intelligence, healthcare improvements, smart grids, climate, and more must answer three key questions: 

>> Where will we store and analyze data -- on premises, in the cloud, or via a hybrid model? 

>> How do we select the right software and build the right architecture to enable us to process data quickly and securely? 

>> What expertise do we need? 

These are all pressing issues, but the last point may be particularly so. Data scientists are expensive and difficult to find and retain, even for deep-pocketed private sector firms. How can government agencies, which may face hiring restrictions and salary caps, cope? (S8251114)

Research Report: 2015 App Dev Priorities Survey

by InformationWeekNov 12, 2014

Change Will Do You Good

The world of application development is undergoing a transformation. New platforms for server and client, new development tools, new languages, newfound status, and new deployment methodologies mean the already quick pace of change has gotten faster. 

The 528 respondents to InformationWeek and Dr. Dobb's first App Dev Priorities Survey told us in no uncertain terms that they're meeting that change head-on, even as workloads stay the same or increase. And, they're doing it without significantly more money. 

>> 69% of respondents at organizations developing custom applications have Agile development methodologies in use.

>> 59% say demand for application development is rising, yet just 49% say they're adequately funded.

>> 40% bring their security team in at the project planning phase, while 57% have a policy mandating secure coding practices.

>> 38% say their orgs devote 10% or less of the overall IT budget to development and DevOps.

>> 30% have more than 100 developed applications deployed; 12% have more than 500.

In this report we discuss key trends, including:

>> All phases of application development are now occurring in the cloud at a significant number of organizations, with project management in the cloud especially popular.

>> VB/VB.NET is seeing a rapid fall-off in usage, but the replacement is spread across multiple languages, with Swift, Node.JS, and TypeScript seeing the largest gains.

>> Developers are heavily involved in DevOps activities in 40% of organizations - good news for these teams.

Respondent breakdown: Respondents screened into the survey by indicating involvement in determining the need, recommending, specifying or authorizing/approving the purchase of application development tools, application architecture services, or deployment software. Thirty-three percent have 5,000 or more employees; 23% are over 10,000. IT vendors, financial services firms, and government are well represented, and 27% are IT director/manager or IT executive management (C-level/VP) level. (R8211114)

Survey Name InformationWeek and Dr. Dobb's App Dev Priorities Survey

Survey Date October 2014

Region North America

Number of Respondents 528

Purpose To determine the priorities and changes prevalent in the application development landscape

Methodology InformationWeek surveyed 528 application development and business technology professionals at North American organizations. The survey was conducted online, and respondents were recruited via an email invitation containing an embedded link to the survey. The email invitation was sent to qualified InformationWeek and Dr. Dobb's Journal subscribers.