Exclusive content for IT Pros in the know

Premium Editorial

We have gathered our editorially written E-Books, E-Zine, guides and research to save you the effort of having to track such premium content down on your own, ultimately helping you to solve your toughest IT challenges more effectively – and faster – than ever before.

Premium Editorial By Topic

Featured E-ZINES on searchSecurity.comView all >>

  • Information Security magazine

    Information Security is the leading publication for enterprise security professionals, providing in-depth coverage of security technologies, practices and trends.

  • Modern Infrastructure

    Modern Infrastructure covers the convergence of technologies -- from cloud computing to virtualization to mobile devices -- and the impact on data centers.


Featured E-BOOKS on searchSecurity.comView all >>

  • Intrusion detection and prevention: IT decision center

    Intrusion detection and intrusion prevention systems (IDS/IPS) help to identify potential threats and to launch a swift response to defend your network. There are many factors to take into account when choosing IDS/IPS products, and this Decision Center series lays them out. It also provides critical questions to ask vendors, offers insight on how to match product features to your particular requirements, and challenges vendors in the IDS/IPS space to present the facts on their offerings.

  • Enterprise Hadoop: Ready for prime time?

    Many vendors are pitching Hadoop as the foundation for enterprise data management environments that delivers information and insights to business users and serves as a hub for other data systems and applications. In the era of big data, the case for Hadoop is strong: Hadoop provides a cost-effective way to ingest, store and process large volumes of multi-structured data. With Hadoop, organizations can store all data in its original format and provide a system of record for the enterprise. Even more, they can bring the applications to Hadoop and process the data in place.

    But does reality square with the promise today? Are companies willing to trust their enterprise data to Hadoop? The big question is whether Hadoop is ready to support enterprise-scale, production environments where data can't be corrupted or inconsistent. Does Hadoop have adequate management, monitoring, backup, recovery and security features? What are the major gaps today and what are vendors doing to plug the holes? At what point can companies trust production computing environments to Hadoop? This report, based on a comprehensive survey of business intelligence professionals and interviews with experts in the field, addresses these questions.


Featured E-HANDBOOKS on searchSecurity.comView all >>

  • Sorting through AWS Data Storage options

    Selecting a storage option from those offered by Amazon Web Services -- Amazon Simple Storage Service (S3), Amazon Elastic Block Storage (EBS) and the AWS Data Pipeline -- is a difficult task facing many businesses exploring the cloud. All three are designed to work best for particular storage requirements, but it’s no easy job determining which is best for your organization. In this three-part guide, SearchAWS contributors light the path to selecting an effective, secure AWS Storage option.

    First, systems architect and consultant Dan Sullivan offers up some background on Amazon S3 and EBS. A bit of information, he writes, can help struggling organizations choose between the two. Next, Ofir Nachmani, a business technology adviser, discusses new changes to the encryption feature on Amazon Web Services S3. Those tweaks have given administrators a flexibility with AWS encryption not available in the initial feature. An increased willingness to adopt the public cloud is another outcome of recent updates to encryption on AWS. Sullivan finishes the guide with a look at managing workflows in the cloud. For many organizations, the AWS Data Pipeline satisfies a host of essential workflow requirements.

  • The lost opportunity – assessing the impact of OTT services

    In this special report for Computer Weekly readers, Juniper Research looks at the challenges and opportunities facing mobile operator business models.