• Grid View
  • List View
  • Research Bytes - Swine Flu, Avian Flu, and IT Disaster Recovery Planning

    Swine Flu, Avian Flu, and IT Disaster Recovery Planning

    The recent outbreak of swine flu (H1N1) and ongoing concern about avian flu (H5N1) increase the risk of a full-blown influenza pandemic. However, because pandemics are fundamentally different from the disasters commonly envisioned in business continuity plans, most IT organizations are not prepared to face this threat. This Research Byte is an overview of our full report on specific actions that IT risk managers should consider to prepare for a potential flu pandemic.

    April, 2009

  • IT Best Practices - Preparing IT for a Different Kind of Disaster: an Influenza Pandemic 2009

    Preparing IT for a Different Kind of Disaster: an Influenza Pandemic 2009

    Public health authorities warn risks of a pandemic are growing in light of the swine flu outbreak and avian flu cases. Because pandemics are fundamentally different from the disasters commonly envisioned in business continuity plans, most IT organizations are not prepared to face this threat. This updated report outlines the specific ways in which pandemics are different from other types of disasters. It suggests three planning scenarios, and it outlines specific actions that IT risk managers should consider to prepare for a potential flu pandemic. If adequately prepared, the IT group will be able to continue to support critical business functions, and it can provide solutions to help the organization get through a pandemic. (12 pp., 1 fig.) [Executive Summary]

    April, 2009

  • Research Bytes - The Cloud Swells: SaaS Returns Encouraging

    The Cloud Swells: SaaS Returns Encouraging

    Cloud computing can be an effective strategy for postponing or entirely avoiding capital investments in IT infrastructure and for rapidly rolling out new applications--especially when funds are limited. This Research Byte breaks down the offerings of six "cloud computing" vendors into five basic categories: applications, infrastructure, platforms, services, and storage and provides an overview of our full report, which also presents adoption trends and ROI/TCO experiences for software as a service (SaaS).

    March, 2009

  • Technology Trends - SaaS Returns Bolster Cloud Computing’s Promise

    SaaS Returns Bolster Cloud Computing’s Promise

    IT organizations are turning more and more to “the cloud” for computing resources, whether they be applications, data center infrastructure, development platforms, or services. In this study, we present adoption trends, return on investment, and total cost of ownership experiences for software as a service (SaaS), which represents one significant component of the cloud computing paradigm. We also define cloud computing by looking at some of the major vendor offerings and conclude with key points IT managers should consider when evaluating cloud computing options. (14 pp., 8 figs.)[Executive Summary]

    March, 2009

  • Outsourcing - Time Right to Revisit Data Center Outsourcing Strategy

    Time Right to Revisit Data Center Outsourcing Strategy

    In today’s economic climate, many IT organizations are re-examining outsourcing strategies. To assist with that decision, this study presents data on the percentage of organizations outsourcing data center operations, the percentage of data center work outsourced, and the percentage of organizations increasing and decreasing data center outsourcing. We assess how satisfied organizations are with their outsourcing partners. We also examine outsourcing by sector and level of IT spending. The report concludes with our recommendations for organizations considering outsourcing of data center operations as well as negotiating with service providers in light of current economic conditions. (15 pp., 8 figs.) [Executive Summary]

    March, 2009

  • Research Bytes - Data Center Outsourcing Likely to Grow

    Data Center Outsourcing Likely to Grow

    It is no wonder that in today’s economic climate many IT organizations are re-examining outsourcing strategies. This Research Byte is an overview of our full report, which presents data on the percentage of organizations currently outsourcing data center operations, the percentage of data center work outsourced, and the percentage of organizations increasing and decreasing data center outsourcing. It also examines customer satisfaction levels with data center outsourcing.

    March, 2009

  • Research Bytes - Good News and Bad in IT Equipment Discounts

    Good News and Bad in IT Equipment Discounts

    If there is a silver lining this economic recession, it is that buyers are seeing greater discounts on IT equipment than they have in a long time. On the other hand, these greater discounts show how difficult times are for IT equipment manufacturers. Lessors, who sit between buyers and sellers, see a bright side as well as a dark side in the current business climate. This Research Byte is an excerpt from our full report, Vendor Discounts on Computer Equipment (Mar. 2009). A link at the bottom of this Research Byte provides the first five pages of the full report, free.

    March, 2009

  • Research Bytes - Security Threats in Employee Misuse of IT Resources

    Security Threats in Employee Misuse of IT Resources

    Employees and other insiders are using computers and the Internet more and more in their day-to-day work. Although these resources can greatly increase worker productivity, they can also be misused, leading to serious security threats. This Research Byte is based on our full report, which analyzes 14 forms of insider misuse in detail, including: unauthorized file copying; downloading of software, music, or other media; P2P file-sharing; rogue remote access programs, modems, and wireless access points; misuse of business or personal email; instant messaging; blogging and posting to message boards; and personal web surfing.

    March, 2009

  • IT Best Practices - Insider Misuse of Computing Resources

    Insider Misuse of Computing Resources

    This special report, based on our survey of IT security professionals and executives worldwide, analyzes the threat of insider misuse of computing resources--that is, any violation of an organization's policies regarding acceptable use. Examples include unauthorized file copying; downloading of software, music, or other media; P2P file-sharing; rogue remote access programs, modems, and wireless access points; misuse of business or personal email; instant messaging; blogging and posting to message boards; and personal web surfing. For each of these types of insider misuse, we present data concerning the perceived seriousness of the threat, typical organizational policies or lack thereof, frequency of violations against company policy, analysis of preventive and detective actions taken by organizations to deter the misuse, and typical levels of enforcement. (77 pp., 75 figs.) [Extended Description] [Executive Summary]

    March, 2009

  • Research Bytes - Misuse of Portable Storage Media Top Insider Threat

    Misuse of Portable Storage Media Top Insider Threat

    (Irvine, Calif.) – IT executives rank misuse of portable storage devices by employees as the most serious security threat posed by insiders  who unintentionally expose corporations to loss of data, malware, liability, and other security risks.

    March, 2009

  • Research Bytes - ITIL Benefits and Barriers to Success

    ITIL Benefits and Barriers to Success

    Large IT organizations continuing to expand ITIL initiatives at a healthy pace, but new adoption be slowing. This Research Byte, as summary of our full report, highlights the potential benefits of ITIL adoption along with barriers to its success.

    February, 2009

  • IT Best Practices - ITIL Implementation Trending Up, But Adoption May Slow

    ITIL Implementation Trending Up, But Adoption May Slow

    In theory, imposing disciplines on IT processes should improve productivity and make IT more responsive to the business. Many organizations are turning to ITIL to accomplish this goal. This study begins with a brief explanation of ITIL’s history and current framework for IT service management. We next summarize ITIL adoption trends in the U.S.and Canada, examining levels of adoption by organization size and sector. The study concludes with best practice recommendations for a phased, incremental approach to ITIL implementation. (7 pp., 5 figs.)[Executive Summary]

    February, 2009

  • Research Bytes - Investing in Network Automation

    Investing in Network Automation

    The rationale for automating the myriad tasks associated with network management is obvious to anyone who has attempted to perform them manually. This Research Byte defines this category of IT automation tools and provides an overview of our full report on this subject.

    February, 2009

  • Technology Trends - Recession No Barrier to Adoption of Network Automation Tools

    Recession No Barrier to Adoption of Network Automation Tools

    For many organizations the counts of routers, switches, and other network devices number in the thousands. Manual deployment is labor-intensive, costly, error-prone, and difficult to manage. In this study, we examine adoption trends for network support automation tools by organization size and sector. We also break down the key functions that network automation tools provide, as defined by the leading network management software vendors. (6 pp., 5 figs.)[Executive Summary]

    February, 2009

  • Research Bytes - IT Management Levels Hold Steady

    IT Management Levels Hold Steady

    Finding the right balance between IT managers, administrative personnel, and technical staff can be difficult. This Research Byte is a summary of our full report on IT management and administrative staffing ratios.

    February, 2009