Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Search Results:


Research Report: 2016: IT Salary Survey Report

by InformationWeekOct 26, 2017

Wondering what the going rate is for your current job and if your pay is at or up to par? Are you curious how much to ask for when looking for a new gig? Check out the InformationWeek's 2016 US IT Salary Survey and find out!

Research Report: 2015 Strategic Security Survey

by InformationWeekSep 15, 2015

The High Cost of Security Breaches2014 has been dubbed the “Year of the Data Breach” with millions of records containing personally identifiable information and credit and debit card data siphoned off by cybercriminals. The effect this has on the individuals whose identity, money, or medical records have been taken can be devastating, but what is the impact on the organization whose security defenses failed to keep intruders out? Fifteen percent of the 435 respondents to our

Research Report: How Enterprises Are Attacking the IT Security Challenge

by InformationWeekSep 02, 2015

Enterprise data breaches, new security vulnerabilities, and threats in the mobile and cloud arenas continue to dominate the headlines. Maybe that’s why 46% of the 435 respondents to our InformationWeek/Dark Reading 2015 Strategic Security Survey say that this year they have a bigger information security budget than last year. So how are they going to be investing those extra dollars? Firewalls, email filtering, endpoint protection, and VPNs are again the four most widely deployed security

Research Report: Strategy: Monitoring Security in Cloud Environments

by InformationWeekMar 20, 2015

One of the major reasons enterprises have been hesitant to embrace cloud computing technologies is a lack of visibility. Enterprises need ways to track their data as it travels back and forth to the cloud, as well as a way to ensure that their data is safe in a shared infrastructure.To benefit from cloud computing and minimize risks to your organization’s data, several key components are required: visibility across infrastructures and applications, isolation of critical services, and

Research Report: Building a Security Analytics Initiative

by InformationWeekJan 28, 2015

Many security teams empathize with Italian artist Sven Sachsalber, who recently spent 48 hours in a Paris museum looking for a needle in a haystack. At least Sachsalber knew what he was seeking, and the haystack didn't keep increasing in size every hour. Those responsible for network security should be so lucky.

In the face of huge and diverse stores of data, many enterprises are turning to big data analytics to help find threats faster and with more accuracy. Threat detection methods

Research Report: Back Up, Don't Go Broke

by InformationWeekJan 16, 2015

Best-of-Breed Backup Without Breaking the Bank

Look under the covers of the storage market and things are booming, with dozens of new companies and products coming onto the scene. Yet many enterprises are stuck in the same old rut, especially when it comes to backup.

One reason is the fear of snowballing costs. In this report, we'll show you a strategy for exploring new options for backup in strategic areas, while falling back on less expensive technologies in others. You

Research Report: Making Threat Intelligence Services Work for Your Enterprise

by InformationWeekJan 05, 2015

It's always difficult to get a true picture of the state of enterprise security. Most CSOs cannot, or will not, discuss their own experiences in any detail. One thing we do know is that BYOD, social media, and the cloud have significantly increased network complexity and vulnerability, as the latest attacks often leverage these vectors to bypass traditional security defenses, including firewalls, anti-malware, intrusion detection, and user authentication systems. While these technologies are

Research Report: 2015 Analytics & BI Survey

by InformationWeekDec 17, 2014

The world of analytics, business intelligence, and information management is in flux, with old-guard vendors and conventional technologies losing steam and companies entertaining new options for the big data era.Our InformationWeek 2015 Analytics, Business Intelligence, and Information Management Survey finds:>> 28% of the 297 respondents responsible for analytics and BI software selections say their organizations have "standardized on one or a few analytics and BI products deployed

Research Report: Big Data in a Loosely Coupled World

by InformationWeekDec 02, 2014

Hold On LooselyTaken together, InformationWeek's recent Big Data and Analytics and Consumerization of IT surveys show IT somewhere between a rock and a hard place. On one hand, this year's Big Data and Analytics Survey revealed some extremely positive trends, including more focus on external data sets, expanded use of big data tools, and greater emphasis on customer-centric data. However, across the spectrum of sizes and verticals, only 30% say they're very or extremely effective at

Research Report: 2015 Federal Government IT Priorities Survey

by InformationWeekNov 24, 2014

Federal IT PrioritiesGovernment IT organizations, like all tech shops, are challenged with staying on top of rapidly changing business and agency mission needs. But developing a long-term IT vision has become difficult given rapidly shifting economic, political, and technology trends. Respondents to our Federal Government IT Priorities Survey are focusing most of their attention on cyber and information security but have admittedly let cloud strategies, data center consolidation, and