Gartner stories - Page 59
Power of Internet of Things to change CISO security scope
Wed, 24th Sep 2014
#
iot
#
iiot
#
cybersecurity
Over 20% of enterprises will have digital security services focused on protecting IoT devices by 2017, according to Gartner.
Enterprise beware... 75% of mobile apps will fail basic security tests
Wed, 17th Sep 2014
#
cybersecurity
#
software development
#
apps
More than 75% of mobile apps will fail security tests by 2015, leaving data vulnerable, says Gartner. #mobilesecurity #apps #Gartner.
Is Digital vs IT a generational leadership divide?
Tue, 9th Sep 2014
#
ict
#
analyst report
Old guard CIOs accused of not embracing web-era thinking, sparking debate on if IT's leadership divide is generational.
Data centre security: Moving beyond prevention...
Fri, 5th Sep 2014
#
ddos
#
hyperscale
#
dc
When it comes to gateway and data centre security, there's one aspect grabbing attention – and it's not a specific technology, as Heather Wright discovers.
Major banks hit by cyber attacks... 'alarming but not surprising'
Fri, 29th Aug 2014
#
cybersecurity
#
cyber attacks
#
analyst report
Today's headlines report that big banks have been hit by cyberattacks, according to the FBI. While this news is alarming, it certainly is not surprising.
Gartner: Beware of the Data Lake Fallacy...
Thu, 31st Jul 2014
#
data analytics
#
martech
#
planning
Gartner warns against the data lake hype, highlighting risks from lack of governance to security concerns in the information management sphere.
CEOs take note... It's an Internet of Products too
Tue, 22nd Jul 2014
#
iot
#
tablets
#
analyst report
The Internet of Things is a curious name for what happens when objects other than computers, start to become electronically networked.
The industry asks... Why no security analytics market?
Wed, 9th Jul 2014
#
dlp
#
cybersecurity
#
analyst report
There is no such thing as a 'security analytics market,' says Gartner analyst. No common features, capabilities, or competitive dynamics.
Microsoft is selling Office productivity in the cloud... Are you buying?
Thu, 26th Jun 2014
#
microsoft
#
microsoft office
#
analyst report
Microsoft has made it clear that the future of Office is in the cloud, with all significant innovations on Office 365.
Storage goes under the knife... but is Plastic Surgery working?
Thu, 12th Jun 2014
#
storage
#
virtualisation
#
network infrastructure
In a world where SDS attempts to cosmetically enhance storage solutions, the real beauty lies in the eye of the beholder.
Endpoint protection platforms need to become more proactive
Sat, 7th Jun 2014
#
endpoint protection
#
edr
#
cybersecurity
Gartner study reveals 35% of EPP users hit by malware, urging a shift from reactive to proactive protection strategies for device safety.
Gartner: Big Data needs a data-centric security eye
Fri, 6th Jun 2014
#
data analytics
#
martech
#
planning
Chief Information Security Officers (CISOs) should not treat big data security in isolation, but require policies that encompass all data silos if the.
Gartner: Google, EU Privacy ruling and Privacy
Thu, 22nd May 2014
#
data privacy
#
cybersecurity
#
google
EU court ruling on Google privacy prompts concerns over increased personal data sharing for identity validation, says Gartner analyst.
Palo Alto Networks gains Gartner recognition for Enterprise Network Firewalls
Wed, 23rd Apr 2014
#
firewalls
#
network infrastructure
#
network security
Palo Alto Networks has been recognised by Gartner as a leader in the Magic Quadrant for Enterprise Firewalls for the third year running.
Trend Micro retains midas touch in Endpoint Protection Magic Quadrant
Mon, 7th Apr 2014
#
cybersecurity
#
trend micro
#
analyst report
Trend Micro secures its position in Gartner's Leaders quadrant for Endpoint Protection, affirming its excellence in malware protection.
Virtualisation of mission critical environments
Mon, 31st Mar 2014
#
virtualisation
#
unisys
#
analyst report
Jim Thompson of Unisys highlights the hurdles in virtualising mission-critical systems, revealing a cutting-edge solution for stability.
My black hole theory of computing...
Tue, 18th Feb 2014
#
storage
#
virtualisation
#
operating systems
Unified theory of computer market: CPU, server OS will swallow up all functions & features. New blog by @valdis_filks.
Think Sochi is a Cyber-War Zone? Try Your Local Starbucks
Sat, 8th Feb 2014
#
uc
#
cybersecurity
#
byod
NBC News accused of misleading report on cybersecurity in Sochi; conditions equally bad at Starbucks, says Gartner analyst.
Hackers... Big Data is watching you
Fri, 7th Feb 2014
#
data analytics
#
martech
#
planning
Criminals are rapidly evolving their hacking techniques, and are attacking quickly, making timely security and fraud analytics more critical than ever.
Gartner: The only certainty is change for CIOs in 2014
Mon, 3rd Feb 2014
#
cybersecurity
#
byod
#
ict
Gartner reveals, 51% of CIOs feel ill-prepared for the digital era, facing rapid changes and talent shortages in 2014's IT landscape.