All resources sponsored by:

TechTarget

1 - 25 of 121 Matches
Effectively Managing BYOD in your Organization
sponsored by TechTarget
RESOURCE:Does your organization know how to improve efficiency and safe money through the use of employees using tablets and smartphones for work? Take our brief survey on mobile devices and in return you will gain immediate access to our eguide, Juggling management and benefits of BYOD in the enterprise & beyond.
Posted: 10 Nov 2014 | Published: 10 Nov 2014
Get This Now


Modernizing your Enterprise Email Security
sponsored by TechTarget
RESOURCE:Email threats are continuing to evolve and become much more dynamic and targeted in nature. As these threats keep growing, how will you ensure email security? Take our brief survey on email security and in return you will gain immediate access to our expert eguide, Improving Enterprise Email Security: Systems and Tips"
Posted: 10 Nov 2014 | Published: 10 Nov 2014
Get This Now


How to Fine-Tune Your Contact Center
sponsored by TechTarget
RESOURCE:If your call center has issues keeping up with new technological advancements in communication like social and mobile then it's time for a multi-channel makeover. This e-book delves into how different contact centers have evolved with the times rather than become outdated and how you cane remain competitive in this growing environment.
Posted: 10 Nov 2014 | Published: 18 Mar 2014
Get This Now


A new look at Vulnerability Management
sponsored by TechTarget
RESOURCE:Does your list of security vulnerabilities seem overwhelming? Visualisation in VM can be an essential tool in making critical issues apparent. Security Visualisation serves as a guideline of how to generate a visual representation of a dataset. Download this guide to get expert advice on how to generate a security visualization plan.
Posted: 24 Oct 2014 | Published: 18 Mar 2014
Get This Now


Looking for ways to optimise your data backup plan?
sponsored by TechTarget
RESOURCE:It's no surprise that data protection is high on every priority list. Limited funding & staffing creates obstacles for IT leaders. Time to Rethink Backup Procedures is a guide that looks at the specific ways your organisation can modify your data backup plan to reduce cost, improve data management, and more! Download your copy today!
Posted: 24 Oct 2014 | Published: 18 Mar 2014
Get This Now


Looking for ways to optimise your data backup plan?
sponsored by TechTarget
RESOURCE:It's no surprise that data protection is high on every priority list. Limited funding & staffing creates obstacles for IT leaders. Time to Rethink Backup Procedures is a guide that looks at the specific ways your organisation can modify your data backup plan to reduce cost, improve data management, and more! Download your copy today!
Posted: 24 Oct 2014 | Published: 18 Mar 2014
Get This Now


The Emergence of SDN in WLAN
sponsored by TechTarget
RESOURCE:SDN is being implemented rapidly—is your organization maximizing its benefit? New use cases have emerged for SDN in wireless networks. Our e-guide, The Emergence of SDN in WLAN explores how SDN can benefit your wireless network through the improvement of how wireless networks are deployed and managed.
Posted: 24 Oct 2014 | Published: 09 Sep 2014
Get This Now


Security Information and Event Management Solutions
sponsored by TechTarget
RESOURCE:Choosing a SIEM solution can be a daunting task with so many options to consider. To help make your decision easier, IT Central Station has compiled this overview of the leading SIEM solutions along with reviews from your fellow IT Professionals. Find out what solution best fits your needs with this comprehensive guide.
Posted: 24 Oct 2014 | Published: 09 Sep 2014
Get This Now


Explore Your Solid-State Storage Options
sponsored by TechTarget
RESOURCE:It's commonly known that there is no one-size-fits-all approach to all-flash arrays. With many routes to choose from picking the right one for deploying solid state storage can be overwhelming. Get an expert look by downloading our e-guide, Navigate the Complex World of All-Flash Arrays, after completing a SSD/Flash Survey.
Posted: 08 Oct 2014 | Published: 18 Mar 2014
Get This Now


Modernizing your Contact Center
sponsored by TechTarget
RESOURCE:Social media and heightened customer expectations are forcing contact centers to update technology and strategy. To offer outstanding customer service, companies must decide between having a hosted or an on-premises model—or a little of both. Take our survey on CRM and get immediate access to our eguide, The Makings of a Modern Contact Center.
Posted: 08 Sep 2014 | Published: 18 Mar 2014
Get This Now


Expert guide to IT management best practices
sponsored by TechTarget
RESOURCE:How do you swap a jumble of different IT methods for one, effective and centralized computing approach? Access your exclusive download, Expert guide to IT management best practices, and discover the top need-to-knows on implementing essential IT management so that you can tackle the latest challenges.
Posted: 12 Jun 2014 | Published: 25 Sep 2014
Get This Now


BPM E-Guide: Part I: The rise of BPM for Process Modeling, Part II: BPMN 2.0: The emerging star of business process modeling
sponsored by TechTarget
RESOURCE:Process modeling standards have grown more important over time, especially given that businesses have sought tools that could enhance their ability to create models and build systems. Take this 2 min survey to access this expert guide on BPMN's evolution and why BPMN use is increasing and where the standard is likely to be headed.
Posted: 09 May 2014 | Published: 09 May 2014
Get This Now


Information Security: Insider edition
sponsored by TechTarget
RESOURCE:Keeping your organization's Web presence safe is a difficult task, especially with recent threats against Web applications. Simply take this 2 min survey and learn how you can help application developers acquire the necessary security tools and training to keep your Web presence protected!
Posted: 18 Apr 2014 | Published: 18 Apr 2014
Get This Now


Improving Security with GRC Best Practices
sponsored by TechTarget
RESOURCE:Although they have many of the same goals, an organization's compliance and security departments usually do not work together enough to meet common objectives. Take this 2 minute survey and gain access to this eguide which outlines essential guidelines for improving security with governance, risk and compliance best practices.
Posted: 18 Apr 2014 | Published: 18 Apr 2014
Get This Now


Machine data equals big value for analytics programs
sponsored by TechTarget
RESOURCE:Sensors and log files capture large volumes of data about industrial equipment and other machines. With a lot of refining, big data analytics can turn that raw material into useful information. Take this short survey to access an e-guide to arm you with the insight to gain real business value from the exceedingly large volumes of data.
Posted: 18 Apr 2014 | Published: 18 Apr 2014
Get This Now


Networked Storage "Need-to-Knows"
sponsored by TechTarget
RESOURCE:With evolving technological advancements in the computing landscape, traditional storage arrays are no longer maintaining capacity and performance. Whatever the reason, it's time to upgrade your storage array. Take this survey and access this guide to discover the latest trends, techniques and technologies in the networked storage market today.
Posted: 18 Apr 2014 | Published: 18 Apr 2014
Get This Now


CW Ezine April
sponsored by TechTarget
WHITE PAPER:CW Ezine April
Posted: 12 Dec 2014 | Published: 12 Dec 2014
Get This Now

TOPICS:  White Papers

Next-Generation Switches to Consider
sponsored by TechTarget
RESOURCE:Next-generation switches have a lot of capabilities, especially as vendors retool their product lines to support application awareness and other features. How do you know you're buying the right switch? Take our brief survey on network infrastructure and you'll gain immediate access to our expert guide, What you need to know about switch upgrades.
Posted: 10 Nov 2014 | Published: 10 Nov 2014
Get This Now


A new look at Vulnerability Management
sponsored by TechTarget
RESOURCE:Does your list of security vulnerabilities seem overwhelming? Visualisation in VM can be an essential tool in making critical issues apparent. Security Visualisation serves as a guideline of how to generate a visual representation of a dataset. Download this guide to get expert advice on how to generate a security visualization plan.
Posted: 24 Oct 2014 | Published: 18 Mar 2014
Get This Now


Redacted QSO
sponsored by TechTarget
WHITE PAPER:Redacted QSO
Posted: 01 Oct 2014 | Published: 01 Oct 2014
Get This Now

TOPICS:  White Papers

Custom 360 (Infographic)
sponsored by TechTarget
WHITE PAPER:Custom 360 (Infographic)
Posted: 09 Sep 2014 | Published: 09 Sep 2014
Get This Now

TOPICS:  White Papers

Custom Content Only Grid
sponsored by TechTarget
WHITE PAPER:Custom Content Only Grid
Posted: 14 May 2014 | Published: 14 May 2014
Get This Now

TOPICS:  White Papers

Content Grid
sponsored by TechTarget
WHITE PAPER:Content Grid
Posted: 14 May 2014 | Published: 14 May 2014
Get This Now

TOPICS:  White Papers

Custom Express Special Report 2
sponsored by TechTarget
WHITE PAPER:Custom Express Special Report 2
Posted: 24 Apr 2014 | Published: 24 Apr 2014
Get This Now

TOPICS:  White Papers

Custom Express Special Report 1
sponsored by TechTarget
WHITE PAPER:Custom Express Special Report 1
Posted: 24 Apr 2014 | Published: 24 Apr 2014
Get This Now

TOPICS:  White Papers

1 - 25 of 121 Matches
Page: 2 3 4 5 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement