Tuesday, April 23, 2013

More 2013 Salary Survey Data | 2013 Backup Technology | Chromebooks in the Enterprise

If you have trouble viewing this email, read the online version.

masthead
April 23, 2013
Follow us:  
InformationWeek Reports Newsletter
 
Featured Content
>
>
>
>
>
>
>
>
>
>
>

Your Data Is Gone, Have A Nice Day
Complete data loss and theft remain all too common.
Read More

How Attackers Choose Which Vulnerabilities To Exploit
A look at how the bad guys choose their attack methods -- and what you can do about it
Read More



 
 More Resources
Transforming IT GRC into a Mainstream Business Application
Learn how a straight-forward business application with built-in intelligence simplifies information security management and allows you to protect critical data while delivering compliance by default.

The Rising Threat of Corporate Cybercrime: Cybercriminal Motives and Methods
Learn about cybercriminal motives and methods, and why you should to recognize this growing danger and implement technologies that effectively prevent malware, the root cause of cybercrime.

Choosing the Right Ethernet Solution for Your WAN
Many enterprises are extending Ethernet to the WAN. Learn about drivers for adoption, benefits, the technology behind Ethernet services in the WAN, and how to evaluate the best service provider for your business.



STORAGE & SERVERS

2013 Backup Technologies Survey
Think backups are boring? Not according to our more than 500 respondents. Most, 60%, use two, three or even more different backup applications, and the percentage encrypting all media has jumped 15 points since 2011.
The market is rocking.

MOBILITY & WIRELESS

Chromebooks in the Enterprise
Cloud services, thin clients and a lean OS designed to marry the two — plus price and security advantages — mean Google could finally unseat PCs as the workplace client of choice. Here's how do decide if you can make the move. * Dog food alert: This report was written exclusively within Chrome.

SECURITY

Assessing Risk In Your Enterprise Compliance Initiative Sponsored by TraceSecurity
Risk is a factor in any enterprise, and managing that risk is always a challenge. In regulated industries, however, the challenge is heightened by goals that sometimes overlap but more often do not. In this Dark Reading report, we examine the general considerations organizations must make when putting risk into a compliance context, as well as recommend specific strategies for leveraging organizational risk management work to achieve compliance goals.

Insecurity with Java Sponsored by Imperva
In the wake of a zero-day vulnerability being exploited by multiple active attacks, IT teams wait for Oracle to respond. Again. Here's how to keep your systems safe, but meanwhile, start considering: Does Java's popularity as an attack vector vs. its diminishing functionality make permanently disabling plug-ins a smart idea?

NEXT GEN NETWORK

Networking In A Virtualized World Sponsored by XO Communications
Virtualization is rapidly evolving into a core element of next-generation data centers. This expanded role places new strains on the network. This report explore the technical issues exposed by virtualized infrastructure and looks at standards, technologies and best practices that can make your network ready to support virtualization.

PROFESSIONAL DEVELOPMENT AND SALARY DATA

2013 U.S. IT Salary Survey
Salaries are rising slightly, with median compensation for IT staff at $90,000 and for managers at $120,000. Here are 11 key insights that IT pros should take from the findings from our 14,000 survey respondents.

2013 Salary Survey: Executives
Executive compensation is a contentious topic in IT, but as it turns out, having their opinions valued, helping set company strategy and doing challenging work are what really matter to executives.

2013 Salary Survey: Security
At the RSA Conference in February, Department of Homeland Security deputy undersecretary for cybersecurity Mark Weatherford stressed the need to develop more cybersecurity talent in the U. S. Good IT security professionals are in high demand, he told attendees. "What's the unemployment rate for a good cybersecurity person? Zero," Weatherford said, adding that government agencies and the private sector are stealing the best people from each other. "We are all familiar with the fratricide going on."

2013 SMB IT Salary Survey
IT staff and management in small and midsize businesses take home about 13% less than their colleagues in larger companies, but the intangibles of working in a smaller organization make it easier to swallow.

2013 Salary Survey: Higher Ed
Salaries for IT pros in higher education have been stuck in neutral for some time, rising just 1.4% for managers and remaining flat for staff this year. But workers get satisfaction from job perks such as flexibility and time off.

2013 Salary Survey: Insurance
Salaries are up slightly — 1.6% for staff and 2.4% for managers — while job security appears strong and satisfaction levels are high, with 66% of staff and 73% of managers saying they're satisfied or very satisfied with their jobs.

InformationWeek Reports is brought to you by HP, Imperva, TraceSecurity, Trusteer, XO Communications and UBM Tech.


You are receiving this newsletter because you have previously downloaded a report from the InformationWeek Reports site. You are subscribed as sojo.blo@gmail.com. If you would like to be removed from the newsletter.

If you received this newsletter from a friend and want to join.
Read about and join other InformationWeek Newsletters here.

UBM Tech | 600 Community Drive | Manhasset, NY 11030 | Privacy Policy

 

No comments:

Post a Comment