EMC

Research report News

View All News

Research report Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Research report Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

  • Two predictions for 2016 from a health IT reporter

    Being a health IT reporter, you start to notice when certain technologies are being picked up by hospitals and other healthcare organizations more and more. I'm sure my colleague Shaun Sutner, the ... Continue Reading

  • Will the role of the chief data officer eclipse that of the CIO?

    Chief data officers make the case why organizations need them; watch out CIOs: The Data Mill reports from the MIT Chief Data Officer and Information Quality Symposium. Continue Reading

  • Insider Edition: Advanced security monitoring scrubs networks clean

    The era of the Internet of Things, bring your own devices and social media has also become an era of highly sophisticated malware. Advanced security monitoring tools are crucial in the fight to protect the enterprise network.

    This Insider Edition of Information Security offers the latest on these tools and how IT pros can best benefit from them. First, we review their newest capabilities, which include the ability to collect and scour immense amounts of data; some tools also have a capacity for learning. Next we talk to network security pros on the frontline, and how they are employing security monitoring tools. Finally, we examine the endpoint protection market, which was jolted back to life by demands for new levels of network protection in an era of smartphones and smartwatches.

    This issue provides network and security IT pros with step-by-step guidance so they can decide what advanced security monitoring tools are right for their network’s particular needs. Continue Reading

View All Evaluate

Manage Research report

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Research report Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

  • ERP security: How to defend against SAP vulnerabilities

    A recent study revealed more than 95% of SAP systems were exposed to potentially disastrous vulnerabilities. Expert Nick Lewis explains how to mitigate these SAP vulnerabilities and maintain ERP security. Continue Reading

  • Planning, skills needed to navigate Hadoop data lakes

    In the business intelligence and analytics world, data lakes are their own region -- one in which today's multifarious forms of information can be stored in their native forms until used -- and cheaply at that. But these vast storage repositories, which are based on open source Apache Hadoop are not for those seeking rest and recreation. They take serious work -- and often sought-after skills -- to build and maintain.

    In this guide, SearchDataManagement peers across several types of data lakes to discover how different organizations today are implementing them. First, editor Craig Stedman talks to three companies that have taken the dive -- and learns about the challenges and benefits presented to each. Next, reporter Jack Vaughan tells one executive's story -- how a Hadoop-based system opened new doors for his company. Finally, Vaughan quizzes Forrester analyst Mike Gualtieri on whether data lakes can compete with data warehouses to quench organizations' thirst for storing and analyzing business data. Continue Reading

  • Security lessons from the NSA malware defense report

    The NSA's Information Assurance Directorate released a report on malware defense. Uncover which guidance and best practices would be fruitful to integrate into your enterprise security plan. Continue Reading

View All Problem Solve

-ADS BY GOOGLE

SearchSolidStateStorage

SearchVirtualStorage

SearchCloudStorage

SearchDisasterRecovery

SearchDataBackup

Close