Data Center Data Center Decision Time Is your glass house a sparkling hub of IT innovation or a financial albatross? For many, it's the latter. Worse, we often lack agility, 67% say application and hardware philosophies frequently or occasionally conflict business demand, and just 27% say a private cloud is a high priority. Meanwhile, planned use of colocation facilities is up an anemic 5 points over last year. 2013 State of Storage Sponsored by Asigra A burst of innovation in storage hardware and software means better performance and integration. Some highlights: Ethernet is taking off, with a combined year-over-year boost of 20 points in iSCSI and FCoE; 60% now encrypt at least some stored data; and good help is hard to find, as 26% cite insufficient staffing as a top concern, up from 19% in 2012. Network Infrastructure 5 SDN Business Benefits Sponsored by NEC Have your engineers caught software-defined networking fever yet? While SDN is currently most appropriate for test labs or tech-savvy cloud operators like Google and Facebook, that's poised to change. As the technology matures and products proliferate, enterprise IT executives need a grasp of the potential benefits.
Security Building & Enforcing an Endpoint Security Strategy Sponsored by Symantec In today's enterprise, the endpoint could be any number of devices operating in any number of locations. With endpoint technology changing so rapidly, what's the best approach to building an effective, enforceable endpoint security strategy that works across the enterprise? In this Dark Reading report, we examine the challenges of endpoint security and recommend the steps organizations should take toward developing a security strategy that is both effective and practical.
What Every Database Administrator Should Know About Security Sponsored by IBM Database administrators are the caretakers of an organization's most precious asset-its data-but rarely do they have the experience and skills required to secure that data. Indeed, the goals of DBAs and security pros are often at odds. That gap must be bridged in order for organizations to effectively protect data in an increasingly complex and threat-ridden environment. In this Dark Reading report we examine what DBAs should know about security, as well as recommend how database and security pros can work more effectively together.
Security Outsourcing For The Small Business Sponsored by Symantec Security is a big issue, especially for small and midsize businesses, and it often makes sense for resource-constrained SMBs to look outside their own IT ranks for support. In this Dark Reading report, we examine the types of outsourced services available and provide advice to SMBs about evaluating their own needs and readiness to establish partnerships with third-party security providers. We also recommend ways to leverage existing products and services so that security budgets can be more effectively allocated.
Five Ways To Better Hunt The Zebras In Your Network Sponsored by HP This issue of InformationWeek's Must Reads explores ways to protect vulnerable users in your company, lessons learned from the Evernote breach, how the FBI is improving enterprise insider theft detection and more.
Strengthen Enterprise Defenses With Threat Intelligence Sponsored by IBM The value of threat intelligence is based on organization-specific factors, including how threat intelligence is defined, the data the organization evaluates, the maturity of the shop in question and the use cases for the data. In this Dark Reading report, we examine how a combination of threat intelligence and security monitoring can boost enterprise defenses, and recommend how to determine if your organization is ready to tap into the model.
Offensive Cybersecurity Sponsored by Vormetric Offense is the new defense for private-sector security professionals, some pundits would have you believe. Whether you call it "hacking back" or old-fashioned eye-for-an-eye retaliation, offensive security calls for profiling and, if possible, individually identifying an attacker and taking countermeasures to harm the attacker's systems. Governments have experimented with offensive security and have their own reasons and hesitations around pursuing it. For the private sector, though, it's a controversial approach that IT and business leaders should understand.
Tools and Strategies for File-Level Data Protection Sponsored by Imperva There is nothing in the enterprise that warrants protection more than data, but security pros all too often focus more on perimeter security. This may be because it can be more challenging to secure data, but once data is locked down, any compromises to the networks and servers that transport and house it almost don't matter. In this Dark Reading report we recommend several ways that security pros can effectively ensure that data is kept from prying eyes.
Finding Vulnerabilities By Attacking Your Own Environment Sponsored by Lumension Vulnerability scans are valuable, but you have to think and act like a hacker if you want to truly understand the ways in which your organization could be compromised. In this report, Dark Reading recommends the tools and methodologies that can be used to test your organization's security.
InformationWeek Reports is brought to you by Asigra, HP, Imperva, Lumension, NEC, Symantec, Vormetric, XO Communications and UBM Tech. You are receiving this newsletter because you have previously downloaded a report from the InformationWeek Reports site. You are subscribed as sojo.blo@gmail.com. If you would like to be removed from the newsletter. If you received this newsletter from a friend and want to join. Read about and join other InformationWeek Newsletters here. UBM Tech | 600 Community Drive | Manhasset, NY 11030 | Privacy Policy
| |
No comments:
Post a Comment