Research

Insider Pro | Computerworld  >  Salary Survey [2020]
Insider Pro | Computerworld  >  Salary Survey [2020]

Tiny figures are drawn toward a big, glowing lightbulb with a security shield. [idea/opportunity]

Next-generation endpoint security goes beyond the endpoint

AI and behavioral analysis are key to elevating the level of security for devices and back-end systems and are a prerequisite for IoT devices and services. Is your vendor moving in the right direction?

man business suit newspaper [by Olu Eletu - CC0 via Unsplash]

2020 State of the CIO: IT leaders mean business

Expansive revenue-generation responsibilities are helping IT leaders gain recognition for their leadership role.

sd-wan options

SD-WAN sector report: Growing with no end in sight

With the WAN in transition, incumbents make their move through acquisitions, while startups continue to innovate at the edge. Insider Pro looks at why SD-WAN is so hot.

Data center in the clouds virtualization

How IBM plans to compete in the cloud

IBM hopes to reduce the complexity of moving workloads to the cloud through Cloud Paks,’ its series of specialized packaged offerings that enterprise can implement relatively quickly. But is it enough?

4g versus 5g horizon sunrise

Why 5G means new business models and user benefits

5G wireless technology will enable business opportunities that will bring new services and better performance that extend beyond the smartphone.

budget piggy bank spending savings security spending

Security spending up, but adoption of cutting-edge tools is slow

While security budgets are expected to increase over the next year, it’s not clear that spending is aimed at the right problems or that IT is up-to-date on the latest security practices. (Download our research report.)

endpoint security hacker vulnerablility secure mobile security app

Will 5G increase mobile security?

We love our smartphones, but there's a dark side. Their prevalence and users’ tendencies to connect over public Wi-Fi make mobile devices a common target of bad guys. Analyst Jack Gold looks at how to mitigate the risk.

network security / network traffic scanning

3 ways to improve PC security

Insider Pro columnist Jack Gold writes that organizations must focus on three key areas if they want to protect their PCs -- and ultimately the entire organization -- from security breaches.

best places women it primary

What makes a good company a 'best' place to work?

Perks are nice, but free lunches, team-building exercises and off-site outings aren’t the key drivers of workplace satisfaction.

mobile security threat detection

Can you be mobile AND secure?

Despite the security challenges mobile devices create, there is no going back. Users demand corporate access from their smartphones and companies benefit from this access with increased efficiency, better use of time and improved user...

4 tech trends primary

IDC MarketScape: Evaluating 12 leading enterprise performance management (EPM) vendors

Enterprise Performance Management has emerged as one of the fastest-growing subsets of the big data and analytics market. EPM software measures, analyzes and optimizes financial performance management, planning, forecasting and...

cloud

Where in the cloud is IT headed?

The cloud permeates all facets of IT -- from applications to infrastructure. To find out how tech leaders are planning their cloud strategy, Insider Pro interviewed hundreds of tech decision-makers.

cloud computing - data center - network servers

Cloud service review: AWS vs. Microsoft Azure

Real IT users with hands-on cloud services experience compare Amazon Web Services and Microsoft Azure.

2 man with binoculars data breach research spy

Research report: IT Economic Outlook

How are current economic conditions affecting IT spending plans? IDG surveyed IT leaders representing a wide range of vertical markets to find out.

IoT > Internet of Things > network of connected devices

IoT Sector Report: How to prepare for tech’s Wild West

This special bulletin investigates how tech giants are investing their IoT dollars, where VC money is going and risks enterprises must contend with in this chaotic market.

development / developers / double-exposure industrial site cityscape

Digital initiatives drives CIOs advancing role

CIOs’ evolution to business strategist is tied to their success taking ownership of digital innovation and playing a leadership role in the transformational journey.

CSO > Security mechanisms vs. fiery threats

The role of next-gen firewalls in an evolving security architecture

As the commercial enterprise firewall approaches its 30th birthday, it is hard to overstate how dramatically the product has evolved. This 2,700-word research report looks the current state of next-generation firewall technology.

idci mage 1200x630

IDC PeerScape: Practices for using KPIs to drive IT and business performance

This IDC PeerScape explores two organizations that are focused on exploiting next-generation KPIs and becoming more data-driven organizations. One is a cloud-based SaaS business and the other is a more traditional internal IT function....

Load More