More regulation-compliance analytics
While staff and managers are satisfied with their jobs overall, more than 50% of staff and management got raises of less than 5% or had their pay frozen, and about a quarter saw benefit cuts.
The market for IT talent in the sector is strengthening and shifting in focus, with data analysis skills in high demand. However, total compensation for IT staff and managers has been relatively flat.
New business requirements make developers more secure in their jobs and more valuable to their employers than the general IT population--by 11%, when it comes to compensation packages. However, while annual compensation continues to grow, male app dev staffers earn almost 15% more than females.
Insulated for the most part from the financial crisis, insurance IT has not seen wild swings up or down. Compensation is trending upward for staff and downward for managers.
IT needs to make innovation a priority and execute new projects faster. Just 32% of the business technology leaders we surveyed are driving new products or services, only 30% say their teams are creating a new revenue stream or business model, while 57% worry that they can't implement new technologies fast enough. It's time to rewrite the rules for how IT gets done.
While a technology that warns of problems before they arise may sound too good to be true, predictive systems have been in use for years by financial, retail, healthcare and other sectors. Now it's IT's turn.
We outline plans to help you move beyond server virtualization to build a more flexible and efficient data center. From network and storage virtualization to automation and orchestration to promoting your private cloud services, our guide takes you through the essentials needed to build a private cloud.
To find out, we surveyed 536 IT pros. While BlackBerry represents a median of 70% of company-purchased devices in use now, that number plummets to 25% when respondents look ahead 24 months. And, a mere 7% say they plan to increase their use of RIM products. While the future looks pretty grim, there are some moves the company can make--but they need to be bold, and fast.
Data center storage shows all the signs of a maturing discipline: IT professionals are more concerned about data reliability, security and performance vs. just keeping up with capacity demands. Although centralization has been the mantra for several years, distributed, scale-out systems are challenging the hegemony of big storage iron. And with solid state reaching new levels of affordability, it's rapidly displacing mechanical disk for many Tier 1 applications. In short, it's an interesting time to be in the storage business.
Employee ignorance or indifference can bring down even the most carefully constructed security architecture. Don't just trowel on more controls--CIOs have to change user attitudes and behaviors to ensure better security. In this report, we show you how to appeal to employees' self-interest to get buy-in for your security program.
Fact is, today 'proactive' translates to 'real-time reactive' via auto remote wipe, sharply defined mobile policies and enforcement, and segregation of personal and corporate data. We know malware is going to happen. Here's how IT can limit damage.
Are you maintaining extra in-house capacity to handle demand spikes that rarely materialize? Cloud services can help meet scale-out computing and storage needs, but the rent-vs.-buy decision is about more than just elasticity. It's about using the money you have in the most efficient manner to provide the services the business needs in an agile fashion.
IPhones, iPads and Android devices are making their way into your company--like it or not. These devices are opening a new gateway for malware that old security tools and procedures can't completely close. Security professionals must combine education, policy development, and the use of existing tools and new mobile device management systems to effectively balance mobile device risk with productivity rewards.
Private clouds are more than a trendy buzzword. They represent Virtualization 2.0, ushering in a new wave of software designed to turn a rack of commodity servers into an adaptive, scalable platform that further blurs the link between applications and the runtime operating system. For IT organizations willing to dispense with traditional application hosting models, a plethora of pure cloud software options beckons.
As ARM chips go beyond being just the power inside iPads and Kindle Fires, Intel and AMD have reason to worry. Enterprise IT, on the other hand, can expect more choice and savings in end-user computing and data center consolidation projects, as ARM innovation positively affects procurement of infrastructure gear and related application development and migration.
A security information and event management system serves as a repository for all the security alerts and logging systems from a firm's devices. But this can be overkill for a company that is understaffed or has overestimated its security information needs. In this report, we discuss 10 questions to ask yourself in determining whether SIEM makes sense for you--and how to pick the right system if it does.
More than 500 IT pros weighed in on their use of public cloud services, and we can sum the results up in two words: blind leap. Just 28% assess the impact on their internal networks, even though 73% are using multiple providers. It's not too late to reverse the lemming migration. Here’s how.
When it comes to protecting PCs and laptops, IT puts too much emphasis on malware detection. You'll get better results by focusing on performance, management and--most importantly--how users and the security software interact. This report tells you how to evaluate endpoint security software based on what really matters.
Kaspersky Lab and Sophos top our IT evaluations of nine antivirus/anti-malware vendors. Upstart Malwarebytes scores a 4.3 out of 5 for malware removal, the highest score in that category. Symantec and McAfee are the most widely used vendors, but 46% of respondents are considering replacing or adding a vendor. Lucky for them, choices abound in this market.
The biggest threat to your company’s most sensitive data may be the employee who has legitimate access to corporate databases but less-than-legitimate intentions. And while the incidence of insider data breaches has decreased, external attacks often imitate them—and do serious damage. Follow our advice to mitigate the risk.
To protect company and customer data, we need to determine what makes it so vulnerable and appealing. We also need to understand how hackers operate, and what tools and processes they rely on. In this report, we explain how to ensure the best defense by thinking like an attacker and identifying the weakest link in your own corporate data chain.
Storage and networking are ground zero for the next enterprise data center upgrade wave. This time, architecture designs will be based on virtualization and private clouds, not discrete servers and local disks. Translation: Plenty of IT teams are in the market for SANs. Here’s how to make vendors work for your business.
At CES we saw dozens of new tablets and smartphones with unprecedented capabilities. Employees want to make full use of their shiny new devices, while IT teams want to maintain security and control. The principles of secure user access provide a strategy for CIOs to maintain equilibrium.
If businesses rise or fall on their IT prowess, then the way our 508 respondents manage tech projects is a key determinant in business health. So why do just 60% have PMOs? And how does that relate to the fact that just 30% say IT initiatives almost always deliver value to the business? Time to change the world, one project at a time.
Understanding what Azure is and isn't can be confusing, but the platform's place in the enterprise is becoming more clear with a more standardized taxonomy and nomenclature.