Business of Information Technology  >   Business Management  >   Best Practices  >  

IT Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
IT Best Practices White Papers (View All Report Types)
51 - 75 of 191 Matches Previous Page  |  Next Page
The State of the Trust Gap: Mobile Privacy Expectations
sponsored by MobileIron
WHITE PAPER: This white paper takes the findings from the 2015 Trust Gap Survey and translates them into actionable recommendations for employers in the form of privacy-centric mobile device policies. Read on here to key into the following important insights about bridging the trust gap.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

MobileIron

We're just not doing enough – Working together to meet the digital skills challenge
sponsored by ComputerWeekly.com
WHITE PAPER: This white paper from TechUK focuses on what needs to be done to deliver the digital skills children and young people need, and to create entry-level skills for jobs in a digital world.
Posted: 20 Jul 2015 | Published: 20 Jul 2015

ComputerWeekly.com

2015 IT Skills and Salary Report
sponsored by Global Knowledge
WHITE PAPER: Download your copy of the eighth annual Global Knowledge IT Skills and Salary Survey to learn how your salary compares to your peers, whether you have the skills IT decision-makers are looking for, and much more.
Posted: 20 Apr 2015 | Published: 20 Apr 2015

Global Knowledge

ABCs of ITIL®
sponsored by Global Knowledge
WHITE PAPER: Learn the ITIL® concepts of accountability, boundaries, and consistency (the ABCs) and discover how ITIL helps establish, manage, and maintain the ABCs.
Posted: 31 Mar 2015 | Published: 31 Mar 2015

Global Knowledge

15 Ways Modern IT Pros are Pursuing Certification
sponsored by Global Knowledge
WHITE PAPER: Take a look at some of the top-paying certifications as determined by the more than 11,000 responses to our 2015 IT Skills and Salary Survey of your peers across North America. Certifications in IT security, networking, and systems management are at the top of the certification pay scale.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

Global Knowledge

Techniques for Selling IT Services to Senior Level Executives
sponsored by ConnectWise
WHITE PAPER: How can an IT ticketing and time solution can benefit your clients and allow you to become part of their internal support team? Learn how you can facilitate collaboration with your client's IT team in ways that benefit you both.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

ConnectWise

Improving Patient Matching with the Right Health Information Exchange
sponsored by Information Builders
WHITE PAPER: Access this white paper to explore effective and enduring approaches to patient matching. Discover how providers can take these approaches internally to ensure short- and long-term clinical successes.
Posted: 08 Apr 2015 | Published: 31 Dec 2014

Information Builders

Protecting Data With Secure Collaboration Solutions
sponsored by Dropbox for Business
WHITE PAPER: Access this white paper to learn how a consulting firm evaluated the balance between security and usability for a popular cloud-based file sharing service.
Posted: 30 Mar 2015 | Published: 30 Jan 2015

Dropbox for Business

Profiling an Enigma: The Mystery of North Korea’s Cyber Threat Landscape
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This highly interesting resource delves into North Korea's cyber threat landscape, deeply analyzing what is known about the regime's capabilities and motives, which are largely shrouded in secrecy.
Posted: 05 Feb 2015 | Published: 29 Aug 2014

Hewlett Packard Enterprise

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

SSL for Apps: Best Practices for Developers
sponsored by Symantec Website Security Solutions
WHITE PAPER: This white paper lists the necessary steps that your enterprise needs to take in order to create a stronger, more trustworthy SSL implementation.
Posted: 20 Jan 2015 | Published: 31 Oct 2013

Symantec Website Security Solutions

Internet Trust Marks: Building Confidence and Profit Online
sponsored by Symantec Website Security Solutions
WHITE PAPER: This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.
Posted: 14 Jan 2015 | Published: 31 Oct 2013

Symantec Website Security Solutions

Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust
sponsored by Symantec Website Security Solutions
WHITE PAPER: In this white paper, you'll learn why SSL-based security platforms with solid track records of meeting new challenges are the best way to defend and future-proof e-commerce environments against a growing and dynamic internet threat environment.
Posted: 12 Jan 2015 | Published: 13 Feb 2014

Symantec Website Security Solutions

Outsourcing IT Projects to Managed Hosting or the Cloud
sponsored by Rackspace
WHITE PAPER: View this white paper to discover 12 critical success factors when outsourcing IT to managed hosting or the cloud.
Posted: 09 Jan 2015 | Published: 07 Jun 2014

Rackspace

Beginner's Guide to SSL Certificates: Making the Best Choice When Considering Your Online Security Options
sponsored by Symantec Website Security Solutions
WHITE PAPER: This helpful guide explains how the effective implementation of SSL certificates is critical to protecting your customers, earning their trust, and ensuring your success when it comes to conducting business online.
Posted: 08 Jan 2015 | Published: 10 Jun 2013

Symantec Website Security Solutions

How Organizations Are Responding to Mobile and Cloud Threats
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explores the results of a recent survey that sought to elucidate how organizations are adapting their approach to authentication to protect their sensitive assets as they adopt cloud-based services and BYOD.
Posted: 10 Dec 2014 | Published: 15 May 2014

SafeNet, Inc.

Automating Your IT Processes for Long Term Success
sponsored by Automic
WHITE PAPER: Access this white paper to find out if automating certain IT operations can help lessen the burden on your IT staff while simultaneously improving the end user experience.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

Automic

HP Security Cyber Risk Report
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This HP Security Cyber Risk Report provides industry-wide data on vulnerabilities in software, mobile, and web applications; examines how specific technologies like iOS, Android, and JAVA contribute to the attack surface; and more.
Posted: 19 Nov 2014 | Published: 31 Jan 2014

Hewlett Packard Enterprise

Rethinking People Costs in Enterprise IT
sponsored by Rackspace
WHITE PAPER: This white paper explores how to assess your IT people spend and position IT as a central driver of business growth.
Posted: 15 Oct 2014 | Published: 12 Aug 2014

Rackspace

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

Resolve Performance Issues Within Your Citrix XenApp Environment
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This white paper introduces an innovative application performance management technology that could be very valuable to IT professionals who frequently troubleshoot performance issues across a Citrix server, saving time and taking the guesswork out of the analysis.
Posted: 04 Aug 2014 | Published: 31 Dec 2013

Riverbed Technology, Inc.

Enterprise Information Security in Transition
sponsored by IBM
WHITE PAPER: This white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.
Posted: 28 Jul 2014 | Published: 31 Oct 2012

IBM
51 - 75 of 191 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement