Analyses

a boy screaming into a microphone / confidence
budget piggy bank spending savings security spending

multiple-exposure shot of a woman using a tablet with a virtual interface and augmented reality

Why it's time to augment our thinking about AR

The most revolutionary outcome of AR is that the physical world will function like the digital world. And that's a big deal for enterprises.

endpoint security hacker vulnerablility secure mobile security app

Will 5G increase mobile security?

We love our smartphones, but there's a dark side. Their prevalence and users’ tendencies to connect over public Wi-Fi make mobile devices a common target of bad guys. Analyst Jack Gold looks at how to mitigate the risk.

1 fake profile

Deepfakes get real (and real easy)

As if deepfake technology wasn’t scary enough. Expect the panic to reach new heights now that it’s easily accessible to everyone. Prepare for deepfakes to revolutionize social engineering.

calculator finance budget savings cost revenue

Cloud vs. on-premises: Chasing the elusive cost comparison

Every business needs to consider cost when making the leap to the cloud, but there’s no benefit from apples-to-oranges comparisons.

coder/ developer/ hacker/ programmer/ remote worker/ digital nomad/ woman/ laptop/ mobile computing

Why your company needs a BYOO (bring your own office) policy

Remote work is not a trend. It’s there to stay. Insider Pro columnist Mike Elgan explains why it's time to re-orient your organization's thinking around workshifting and BYOO.

network security / network traffic scanning

3 ways to improve PC security

Insider Pro columnist Jack Gold writes that organizations must focus on three key areas if they want to protect their PCs -- and ultimately the entire organization -- from security breaches.

abstract laptop showing wireless internet connection

Don’t be blinded by 5G: Why you can’t neglect Wi-Fi 6

As important as 5G is for smartphones and other devices, don't overlook an equally important next-generation wireless technology -- Wi-Fi 6.

google chromebook in the enterprise buildings city getty images google

Will Chromebooks rule the enterprise? (5 reasons it may)

Google schooled Apple and Microsoft in the education market by growing market share from zero to 60 in eight years. Insider Pro columnist Mike Elgan examines whether Google can do it again in the enterprise.

mobile security threat detection

Can you be mobile AND secure?

Despite the security challenges mobile devices create, there is no going back. Users demand corporate access from their smartphones and companies benefit from this access with increased efficiency, better use of time and improved user...

cloud

Where in the cloud is IT headed?

The cloud permeates all facets of IT -- from applications to infrastructure. To find out how tech leaders are planning their cloud strategy, Insider Pro interviewed hundreds of tech decision-makers.

5g 4g wireless speed wireless network devices

When should enterprises move to 5G?

Maybe not today and maybe not tomorrow, but eventually everyone will be on 5G. However, before rushing to implement it in your business be sure to know what the available benefits are and which types of users will notice a real...

Network World [slideshow] - Top 10 Supercomputers 2018 [slide-01]

10 most-read articles on Insider Pro this week

What are your colleagues – or your competitors – reading on Insider Pro? These are our 10 most popular articles this week.

IoT > Internet of Things > network of connected devices

IoT Sector Report: How to prepare for tech’s Wild West

This special bulletin investigates how tech giants are investing their IoT dollars, where VC money is going and risks enterprises must contend with in this chaotic market.

development / developers / double-exposure industrial site cityscape

Digital initiatives drives CIOs advancing role

CIOs’ evolution to business strategist is tied to their success taking ownership of digital innovation and playing a leadership role in the transformational journey.

CSO > Security mechanisms vs. fiery threats

The role of next-gen firewalls in an evolving security architecture

As the commercial enterprise firewall approaches its 30th birthday, it is hard to overstate how dramatically the product has evolved. This 2,700-word research report looks the current state of next-generation firewall technology.

Discover five emerging tech trends with transformational impact

State of the cloud in 2019

The cloud is the perennial metatrend of enterprise tech, yet it remains poorly understood. Peek under the hood and today’s real benefits emerge.

handshake deal vendor management hands business relationship agreement

Digital transformation brings IT and LOB together

CIOs have an opportunity to shrink the distance between technology and line of business as IT takes a leadership role with digital business initiatives.

idci mage 1200x630

IDC PeerScape: Practices for using KPIs to drive IT and business performance

This IDC PeerScape explores two organizations that are focused on exploiting next-generation KPIs and becoming more data-driven organizations. One is a cloud-based SaaS business and the other is a more traditional internal IT function....

Load More