The Gartner Research Circle is a program that is run throughout the year where participants share their input in a variety of ways on an array of topics throughout the year. Contact: ResearchCircle@gartner.com for additional information.
Watch this webcast and listne to Neail MacDonald and Jim Brennan discuss specific techniques that can help you prevent sophisticated attacks, detect stealthy and persistent threats already inside your organization, and how to best respond in the event of a security breach.
Discover how IBM's B2B Services Reporting and Analytics can deliver unprecedented levels of insight into all of your trading partner relationships in order to drive better, more profitable business decisions.
This IDC study serves as a guide for short-listing the selection of B2Bi gateway software used for midlevel to highly sophisticated projects.
The first part of the webcast briefing will focus on the global survey findings and their business implications – quantifying the cost of a bad app. The second part will cover strategies and solution options for consistently delivering good apps fast. After the webcast, you may view the report...
In this second of four installments, this handbook focuses on describing the technologies, products and services that are available to improve the performance of applications and services.
In a recent survey, “The Mobile Trust Gap,” MobileIron reported that of the 3000 respondents, 80% claimed they are using personal smartphones and tablets for work.
The Internet Security Threat Report provides an overview and analysis of the year’s global internet threat activity. The report is based on data from the Symantec™ Global Intelligence Network, which Symantec’s analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.
Computer viruses are yesterday’s news; automated attacks that morph rapidly, concealing themselves through encryption and deceptive packaging, are the new hotness. This paper describes how to start with improved malware reporting and gateway monitoring and how to combine this output with security intelligence from both internal and external resources.
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks.