InformationWeek is conducting its annual survey on IT spending priorities. The results will appear in an upcoming issue of InformationWeek as well as in an in-depth report. This survey will take about 10 minutes to complete. Upon completion, you will be eligible to enter a drawing to receive one Apple 32GB iPad mini valued at $429 from UBM Tech. This survey sweepstakes is not sponsored, endorsed or administered by Apple. Your responses will remain confidential and will only be reported in aggregate.
Mobile-enabled sales and service tools are improving workforce metrics across industries. Here are seven case studies to show how mobility can transform financial services firms in retail and business banking, capital markets, insurance and wealth management.
The market for IT talent in the sector is strengthening and shifting in focus, with data analysis skills in high demand. However, total compensation for IT staff and managers has been relatively flat.
Knotted and complex database access permissions are among the biggest threats to enterprise data security. In this Dark Reading report, we examine the problems associated with granting permissions to sensitive data, and recommend solutions that will help organizations thoughtfully and effectively grant privilege when and where it is needed -- and only when and where it is needed.
The addition of a global HTTP proxy in Apple's iOS 6, in combination with more mature cloud security services and enterprise mobility management tools, makes it easier, technically, to protect users. But privacy, policy and platform support are still sticking points.
Major database breaches and easy-to-crack selections underscore the vulnerability of our most common authentication mechanism. So what's the alternative for protecting our online lives? To find out, we polled a range of security experts.
Automation and orchestration are all the rage among IT architects these days. One of the best places to apply the technology is to disaster recovery. Most organizations still want a "go" button, but after that, timely recovery requires automation. Here's what you need to know to make it happen.
Assessing an organization's security risk is an important element of an effective enterprise security strategy. It's also a key way to justify future security spending to upper management. In this Dark Reading report, we recommend how to conduct an IT security risk assessment -- and how to translate the results into terms that make sense in dollars.
IT has good reason to demand standardization in SaaS, IaaS and PaaS offerings. But what’s interesting is that vendors themselves are just as interested and, in many cases, are driving standards efforts. In a market this fast-moving, the old top-down model is being turned on its head.
They are out to get you, make no mistake. But there are things you can do to make sure that your organization is unappealing to a cybercriminal bent on finding easy pickings. The key is to understand what cybercriminals are looking for and how they go about the business of infiltrating vulnerable systems and networks.
Exclusive research of 230 IT pros and 68 carriers providing 4G services shows that while customers are pleased with service now, the future looks far less certain.
A managed security service provider should lift at least some cost and resource burden from the IT department's shoulders. But what if it doesn't? What if you aren't any more secure after entering into a contract with an MSSP? And how do you even know if it's doing everything it promised? There is an art to managing the MSSP relationship after the initial deal is done. In this report, Dark Reading provides recommendations for testing the mettle of MSSPs and for dealing with providers if their performance isn't up to snuff.
In this follow-up report to 'Understanding Software-Defined Networks,' we examine IT deployment plans and explore the technology ecosystem around SDN. This report drills into the current and planned efforts of the Open Networking Foundation, which is driving standardization of the OpenFlow protocol, and provides details on SDN strategies from 17 vendors.
When it comes to monitoring, the application space is often forgotten. This leaves a gaping hole because the behavior of applications can reveal a great deal about security events and their causes. The inherent variability of applications can make monitoring a challenge, but enterprises can extend existing tools to include the applications space. In this report, we make the case for the development of an applications monitoring strategy and provide recommendations for implementation that tap into existing products and processes.
Database activity monitoring, or DAM, is an effective compliance and security strategy. However, not every DAM system will work the same in every organization. Indeed, not every organization can even make use of every feature that DAM systems provide. In this report we examine what DAM can and can’t do, and recommend how to evaluate and implement the best system for your organization.
Even as mobility and cloud take off, too many companies still leave data in the clear, spooked by operational and performance concerns. Yes, key management is still a problem. But here are five ways to use encryption without breaking your existing infrastructure, plus a look ahead at the next big thing: identity-based encryption.
If there’s one thing that’s true about security, it’s that an organization can never be completely secure. The trick is to determine what’s most valuable to your organization, and how big the threats to those assets really are. That’s putting risk-based management simply, but it doesn’t have to be complicated. In this report we provide some perspective around risk-based security, as well as recommend some best practices for developing and effectively implementing a program.
The confluence of smartphone-fueled employee mobility and ubiquitous cloud services means it's time to update your data loss prevention strategy. The key: Data protection isn't something you can buy. "DLP 2.0" needs to expand into a smart set of policies backed up by a mix of products.
We hear a lot about controlling devices and data. But there's a third consideration that's just as critical -- and a lot less high profile. Don't let an intense focus on employee mobile devices leave you exposed via insecure apps.
What do concepts like the semantic Web, mashups, Web 3.0 and open data have to do with your enterprise relational databases? Much like consumerization continues to drive innovation in end user computing, these technologies deliver benefits that your business should be exploiting.
Nine in 10 IT pros think mobile will increase in importance, but fewer than half have deployed or are in the process of deploying mobile device management systems. Our review of suites from Good Technology, Symantec and Research In Motion, plus analysis of the most important MDM capabilities, reveals why some companies are holding off.
Today’s 802.11n wireless LANs can reach 450 Mbps to 600 Mbps -- not too shabby. But hold onto your hats because here come next-gen Gigabit Wi-Fi products with 802.11ac enhancements that could deliver nearly 7 Gbps. In this report, we’ll discuss what 11ac brings to the table, which applications benefit, when products are likely to surface, features to look for and guidance on how to get the most from 11ac while protecting past WLAN investments.
Companies of all sizes are embracing data visualization, self-service BI and big data analysis, our survey finds. Advanced analytics is of particular interest to our respondents: 62% say they’re using these technologies to optimize business operations, while 44% aim to identify business risk and another 44% hope to predict promising new business opportunities. This report explores use cases in higher education and insurance, and shows how emerging analytics techniques are achieving breakthrough results.
Got mobile users accustomed to nonstop social networking and sporting multiple devices: PCs, tablets, smartphones, Windows 8 hybrids -- you name it? Then a cloud-based service may be a perfect fit for enterprise collaboration. Plenty of vendors are eager to win your business. Find out what to look for and get profiles of 11 top contenders.
Thirty-one percent of our survey respondents said they anticipate end user support/help desk will be a top area of staffing decrease -- more than for any other category. However, 16% said this area is one of two that would see the biggest increase in staffing at their companies in the next year. BYOD, social media and the general consumerization of IT may be changing the nature of the internal support role at companies -- and in some cases creating new opportunities for support staffers.