Business of Information Technology  >   Business Management  >   Best Practices  >  

IT Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
IT Best Practices White Papers (View All Report Types)
51 - 75 of 216 Matches Previous Page  |  Next Page
Securing Microsoft Exchange 2010 with Symantec™ SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: This guide will help you take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs).
Posted: 12 Jan 2015 | Published: 02 Jul 2014

Symantec Corporation

Infographic: Data Traffic Security is a Mess
sponsored by Certes Networks
WHITE PAPER: This infographic visually displays the sobering results of a recent survey on what are IT decision makers doing to secure and segment their sensitive data traffic.
Posted: 09 Jan 2015 | Published: 09 Jan 2015

Certes Networks

The 15 MDM Providers That Matter Most, and How They Stack Up
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, Forrester identifies, evaluates, and compares the 15 foremost MDM providers, detailing how well each vendor fulfills key requirements and where each provider stands in relation to the others.
Posted: 08 Jan 2015 | Published: 30 Sep 2014

Symantec Corporation

Beginner's Guide to SSL Certificates: Making the Best Choice When Considering Your Online Security Options
sponsored by Symantec Corporation
WHITE PAPER: This helpful guide explains how the effective implementation of SSL certificates is critical to protecting your customers, earning their trust, and ensuring your success when it comes to conducting business online.
Posted: 08 Jan 2015 | Published: 10 Jun 2013

Symantec Corporation

CompTIA Managed Services Trustmark Quick Start Guide
sponsored by CompTIA
WHITE PAPER: Explore this featured resource to learn the strategies to maximize your revenue and provide high caliber services. Examine this guide to gain expert insight into managed services and how to excel as a provider.
Posted: 22 Dec 2014 | Published: 05 Dec 2013

CompTIA

Taking Control of File Sharing Services
sponsored by Mimecast
WHITE PAPER: This informative white paper discusses how file sharing services are being used within enterprises; the benefits and risks that they bring; and the factors that organizations should consider in selecting an enterprise-grade service in order to ensure its security.
Posted: 19 Dec 2014 | Published: 30 Apr 2014

Mimecast

Techniques for Selling IT Services to Senior Level Executives
sponsored by ConnectWise
WHITE PAPER: Access the following ebook to learn about an additional service offering you can sell to your clients that allows you to become part of their internal support team. Read on to learn how you can facilitate collaboration with your client's IT team in ways that benefit you both.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

ConnectWise

A resourceful solution for reinventing IT to support innovation with a balanced budget
sponsored by EMC Corporation
WHITE PAPER: How can IT departments stay ahead of constant business demands for usable, actionable information via more accessible cloud-based applications—with little to no budget growth? Consult the following white paper to find out now.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

EMC Corporation

Healthcare Email Management: Balancing Security, Compliance, and Cost
sponsored by Mimecast
WHITE PAPER: This white paper discusses a number of email management challenges facing healthcare CIOs, including HITECH and HIPAA compliance, budget constraints, cloud-based email and collaboration technologies, and data security.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Mimecast

Driving Business with Continuous Operational Intelligence
sponsored by Courion Corporation
WHITE PAPER: In this white paper, discover the true meaning of operational intelligence, including what it is, which data types/sets can be used as a basis for it, and how to use it.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

Courion Corporation

Websense® Security Labs™: 8 Security Predictions for 2015
sponsored by Websense
WHITE PAPER: This must-read resource from Websense presents the top 8 security predictions for 2015.
Posted: 01 Dec 2014 | Published: 18 Nov 2014

Websense

Is Your Identity Management Infrastructure a Mess?
sponsored by Radiant Logic, Inc.
WHITE PAPER: This infographic depicts the reasons behind identity management challenges, the impact that they have on organizations, and what your enterprise needs to do to confront these issues head-on.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Radiant Logic, Inc.

Turn Data into Knowledge
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, discover one solution that collects user-generated data and transforms it into a self-service help desk. By engaging users to have conversations on a platform as easy and intuitive as Facebook or Twitter, your IT organization mines data to create a self-help portal.
Posted: 26 Nov 2014 | Published: 18 Jun 2014

Hewlett-Packard Company

The 2014 Global Cost of Cybercrime Study
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative report distills interviews with senior-level IT personnel about the impact of cybercrime on their organizations in 2014 into trends that apply to every enterprise around the world.
Posted: 19 Nov 2014 | Published: 19 Nov 2014

Hewlett-Packard Company

Expro Minimises Business Risk
sponsored by IBM
WHITE PAPER: This whitepaper explains how Expro engaged Tectrade to assess its backup environment and recommend a suitable backup solution. Get an overview of the solution they chose and its benefits.
Posted: 11 Nov 2014 | Published: 31 Mar 2013

IBM

A Consolidated Platform for Next-Generation Firewall and Secure Web Gateway Services
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper first defines next-generation firewalls, secure web gateways, and their capabilities, and then specifically discusses the Fortinet FortiGate NGFW and the results of ESG Lab's evaluation and testing of the device.
Posted: 16 Oct 2014 | Published: 30 Sep 2014

Fortinet, Inc.

Cloud Migration Security Check
sponsored by CenturyLink Technology Solutions
WHITE PAPER: This use case describes CenturyLink's partnership with a global shipping and logistics firm looking to adopt cloud technologies to lower IT support costs and refocus its resources.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

CenturyLink Technology Solutions

Extracting the Full Business Value from Cloud Services
sponsored by NaviSite
WHITE PAPER: This white paper proposes that the key to achieving the most value from cloud investments includes considering the impact that they will have throughout an entire organization, and explores real-world customer experiences that examine the true business impact of the cloud.
Posted: 30 Sep 2014 | Published: 30 Sep 2014

NaviSite

Managing the Transition to IT as a Service Broker
sponsored by Rackspace
WHITE PAPER: By transitioning to a service broker model, IT can provide optimal solutions faster, more efficiently, and at a lower cost. Access this whitepaper to find out the best practices for managing the transition to IT as a service broker.
Posted: 15 Sep 2014 | Published: 15 Sep 2014

Rackspace

Automating Your IT Processes for Long Term Success
sponsored by Automic
WHITE PAPER: Access this white paper to find out if automating certain IT operations can help lessen the burden on your IT staff while simultaneously improving the end user experience.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

Automic

HP Security Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This HP Security Cyber Risk Report provides industry-wide data on vulnerabilities in software, mobile, and web applications; examines how specific technologies like iOS, Android, and JAVA contribute to the attack surface; and more.
Posted: 19 Nov 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM
51 - 75 of 216 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement