Research report

Research report News

View All News

Research report Get Started

Bring yourself up to speed with our introductory content

  • Does big data analytics deliver value?

    Now that more companies have big data analytics programs, new trends -- and new challenges -- are emerging. Many programs have moved out of experimentation into real production, offering a timely opportunity to learn how companies are tapping into their most massive data sources. New research examines where and how big data analytics programs have been successfully deployed, as well as plans for the future.

    In this report, discover which business departments and processes are most commonly driving big data projects, and the data types these programs are prioritizing. Learn which technologies are now considered part of big data analytics programs. It’s not all about open source tools such as Hadoop. And find out how big data analytics capabilities are delivered across organizations and the greatest challenges these programs face. Continue Reading

  • How, where and why big data analytics are delivering value

    SearchBusinessAnalytics Benchmark Reports examine customer perceptions and adoption rates of technologies in established segments of the business intelligence (BI) market. Each Benchmark Report focuses on a specific area and surveys senior BI and IT professionals to understand the current market state for that segment of the BI market. Continue Reading

  • Planning, skills needed to navigate Hadoop data lakes

    In the business intelligence and analytics world, data lakes are their own region -- one in which today's multifarious forms of information can be stored in their native forms until used -- and cheaply at that. But these vast storage repositories, which are based on open source Apache Hadoop are not for those seeking rest and recreation. They take serious work -- and often sought-after skills -- to build and maintain.

    In this guide, SearchDataManagement peers across several types of data lakes to discover how different organizations today are implementing them. First, editor Craig Stedman talks to three companies that have taken the dive -- and learns about the challenges and benefits presented to each. Next, reporter Jack Vaughan tells one executive's story -- how a Hadoop-based system opened new doors for his company. Finally, Vaughan quizzes Forrester analyst Mike Gualtieri on whether data lakes can compete with data warehouses to quench organizations' thirst for storing and analyzing business data. Continue Reading

View All Get Started

Evaluate Research report Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

  • Insider Edition: Advanced security monitoring scrubs networks clean

    The era of the Internet of Things, bring your own devices and social media has also become an era of highly sophisticated malware. Advanced security monitoring tools are crucial in the fight to protect the enterprise network.

    This Insider Edition of Information Security offers the latest on these tools and how IT pros can best benefit from them. First, we review their newest capabilities, which include the ability to collect and scour immense amounts of data; some tools also have a capacity for learning. Next we talk to network security pros on the frontline, and how they are employing security monitoring tools. Finally, we examine the endpoint protection market, which was jolted back to life by demands for new levels of network protection in an era of smartphones and smartwatches.

    This issue provides network and security IT pros with step-by-step guidance so they can decide what advanced security monitoring tools are right for their network’s particular needs. Continue Reading

  • Catfish, super users and USB drives: We do the math

    The data science that reprogrammed Wall St. trading models may offer lessons for security. Continue Reading

  • How health information may affect the security of Internet of Things

    The FTC wants to standardize the security of Internet of Things, but what does that mean for organizations handling PHI? Expert Mike Chapple breaks down the hype. Continue Reading

View All Evaluate

Manage Research report

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Research report Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

  • Are SIEM products delivering on advanced analytics?

    Faced with a deluge of security and log information, enterprises are overwhelmed by different types of data and finding it harder to respond to potential security events. Interest in security information and event management (SIEM) is increasing as companies look to detect breaches earlier and limit damage, but information overload -- false positives -- and missed signs of advanced attacks continue to be major problems. Big data technologies and advanced analytics have promised to deliver better and more complete threat detection. Should these systems be combined with SIEM products, or is it time to move on? In our cover story, we report on realistic expectations with SIEM products and data analytics today, and what actions companies may want to consider going forward.

    As some enterprises look to advanced analytics for help, we revisit the concept of "good enough" security in the wake of the Sony Pictures Entertainment hacking scandal. CISOs, chief technology officers, and IT security and risk managers weigh in: Will security management have greater influence on business risk decisions in light of the security implications going forward? We report our findings. Finally, we have all heard about the benefits of vulnerability rewards programs, but what about the risks? Organizations outside of the technology industry may not be convinced about the rewards of bug bounty programs. We explore both sides of the issue.

     Continue Reading

  • New scrutiny on bug bounties: Is there strength in numbers?

    Bug bounty programs are a cool idea and often work, so why haven't they taken off for non-tech companies? Continue Reading

  • In denial about DDoS: Defense planning falls short

    Advanced distributed denial-of-service attackers are using a mix of techniques to hit targeted victims in ways all too similar to advanced persistent threats. DDoS defense planning is still lax at many enterprises, but if you do not have mitigation processes in place, it will cost you. Response, brand reputation and opportunity costs quickly add up in major attacks. The primary cost for victims, tied to the length of the outage, is revenue interruption says John Pescatore, director of emerging trends at the SANS Institute. The former Gartner analyst looks at the current denial-of-service landscape and associated costs in his article, “DDoS defense planning falls short.” Adam Rice and James Ringold continue their series on APTs. In their article “Man versus machine data,” the authors outline strategies to implement verbose logging across the enterprise and discuss the promise of big data security analytics to help security professionals track the APT lifecycle. The hard issues around intellectual property protection and the steps enterprises and vendors are taking to address them are also covered this month in Feature Editor Kathleen Richards’ article, “Breaches reignite intellectual property protection.” We also welcome back longtime columnist Marcus Ranum, who starts off the year chatting about metrics with IBM’s Diana Kelley. Security 7 winner Frederick P. Chang, Ph.D., offers his take on what is needed to take cybersecurity education and science to the next level. Continue Reading

View All Problem Solve

-ADS BY GOOGLE

SearchSolidStateStorage

SearchVirtualStorage

SearchCloudStorage

SearchDisasterRecovery

SearchDataBackup

Close