Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Search Results:

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:










Research Report: State of the Cloud

by InformationWeekJul 10, 2019

Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. It will examine the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges.
The information submitted is collected by both Informa and our sponsor.


Research Report: 2019 State of DevOps

by InformationWeekMay 31, 2019

DevOps is becoming more commonplace in the enterprise as IT organizations implement strategies across developer and operations teams to increase efficiency and deploy applications more quickly. But embracing DevOps means making significant cultural, organizational, and technological changes, which can slow and complicate adoption. This research report will examine how and why IT organizations are adopting DevOps methodologies, the major barriers they are facing, major tools and technologies


Research Report: 2016: IT Salary Survey Report

by InformationWeekOct 26, 2017

Wondering what the going rate is for your current job and if your pay is at or up to par? Are you curious how much to ask for when looking for a new gig? Check out the InformationWeek's 2016 US IT Salary Survey and find out!


Research Report: 2015 Strategic Security Survey

by InformationWeekSep 15, 2015

The High Cost of Security Breaches2014 has been dubbed the “Year of the Data Breach” with millions of records containing personally identifiable information and credit and debit card data siphoned off by cybercriminals. The effect this has on the individuals whose identity, money, or medical records have been taken can be devastating, but what is the impact on the organization whose security defenses failed to keep intruders out? Fifteen percent of the 435 respondents to our


Research Report: How Enterprises Are Attacking the IT Security Challenge

by InformationWeekSep 02, 2015

Enterprise data breaches, new security vulnerabilities, and threats in the mobile and cloud arenas continue to dominate the headlines. Maybe that’s why 46% of the 435 respondents to our InformationWeek/Dark Reading 2015 Strategic Security Survey say that this year they have a bigger information security budget than last year. So how are they going to be investing those extra dollars? Firewalls, email filtering, endpoint protection, and VPNs are again the four most widely deployed security


Research Report: Strategy: Monitoring Security in Cloud Environments

by InformationWeekMar 20, 2015

One of the major reasons enterprises have been hesitant to embrace cloud computing technologies is a lack of visibility. Enterprises need ways to track their data as it travels back and forth to the cloud, as well as a way to ensure that their data is safe in a shared infrastructure.To benefit from cloud computing and minimize risks to your organization’s data, several key components are required: visibility across infrastructures and applications, isolation of critical services, and


Research Report: Building a Security Analytics Initiative

by InformationWeekJan 28, 2015

Many security teams empathize with Italian artist Sven Sachsalber, who recently spent 48 hours in a Paris museum looking for a needle in a haystack. At least Sachsalber knew what he was seeking, and the haystack didn't keep increasing in size every hour. Those responsible for network security should be so lucky.

In the face of huge and diverse stores of data, many enterprises are turning to big data analytics to help find threats faster and with more accuracy. Threat detection methods


Research Report: Back Up, Don't Go Broke

by InformationWeekJan 16, 2015

Best-of-Breed Backup Without Breaking the Bank

Look under the covers of the storage market and things are booming, with dozens of new companies and products coming onto the scene. Yet many enterprises are stuck in the same old rut, especially when it comes to backup.

One reason is the fear of snowballing costs. In this report, we'll show you a strategy for exploring new options for backup in strategic areas, while falling back on less expensive technologies in others. You


Research Report: Making Threat Intelligence Services Work for Your Enterprise

by InformationWeekJan 05, 2015

It's always difficult to get a true picture of the state of enterprise security. Most CSOs cannot, or will not, discuss their own experiences in any detail. One thing we do know is that BYOD, social media, and the cloud have significantly increased network complexity and vulnerability, as the latest attacks often leverage these vectors to bypass traditional security defenses, including firewalls, anti-malware, intrusion detection, and user authentication systems. While these technologies are


Research Report: 2015 Analytics & BI Survey

by InformationWeekDec 17, 2014

The world of analytics, business intelligence, and information management is in flux, with old-guard vendors and conventional technologies losing steam and companies entertaining new options for the big data era.Our InformationWeek 2015 Analytics, Business Intelligence, and Information Management Survey finds:>> 28% of the 297 respondents responsible for analytics and BI software selections say their organizations have "standardized on one or a few analytics and BI products deployed