IT Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Strategy, MIS, Management Information Systems, IT Management Leadership, Information Technology Management, Information Technology Strategy
DEFINITION: MIS (management information systems) is a general term for the computer systems in an enterprise that provide information about its business operations. It's also used to refer to the people who manage these systems. Typically, in a large corporation, "MIS" or the "MIS department" refers to a central or centrally-coordinated system of computer expertise and management, often including mainframe systems  … 
Definition continues below.
IT Management White Papers (View All Report Types)
151 - 175 of 777 Matches Previous Page  |  Next Page
4 Data Traffic Security Challenges Exposing Enterprises to Hack Attacks
sponsored by Certes Networks
WHITE PAPER: This white paper discusses the 4 major points of weakness that your enterprise needs to prioritize in 2015 in order to defend your business-critical data from hackers.
Posted: 12 Feb 2015 | Published: 22 Jan 2015

Certes Networks

The Current State of Security Operations Around the World
sponsored by Hewlett-Packard Company
WHITE PAPER: This report summarizes the results of a recent HP assessment of the capabilities of 87 security operations centers worldwide. Read on to learn the latest trends in security defenses and operations, the attributes of the most effective organizations, and much more.
Posted: 12 Feb 2015 | Published: 30 Jan 2015

Hewlett-Packard Company

Veeam Data Center Availability Report: The Challenge of the Always-On Business
sponsored by Veeam Software
WHITE PAPER: This report investigates the increasing demands organizations face to provide an 'Always-On Business'. It also explores which actions they are taking to meet those demands and examines how successful their actions are.
Posted: 11 Feb 2015 | Published: 31 Dec 2014

Veeam Software

3 Things in 3 Years: Innovating A Digital Strategy for the Financial Industry
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, learn the three factors to building a digital strategy for success in the next three years.
Posted: 10 Feb 2015 | Published: 07 Jan 2015

Hewlett-Packard Company

Recognizing Five Sources of High-Profile Data Security Breaches
sponsored by Mimecast
WHITE PAPER: This white paper discusses the 5 major categories of vulnerabilities that IT and security professionals need to account for in their solutions planning.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

Mimecast

The 2014 Bitglass Healthcare Breach Report
sponsored by BitGlass
WHITE PAPER: This informative report takes a close look at reported healthcare data breaches over the past 3 years and discusses what they mean for consumers, healthcare organizations, and the future of digital healthcare records.
Posted: 05 Feb 2015 | Published: 05 Feb 2015

BitGlass

Maximize IT Reliability Through Service Automation
sponsored by FrontRange Solutions Inc.
WHITE PAPER: To ensure operational efficiency and improved service quality, your organization must integrate service automation into the change management processes that govern the adoption of trending technologies. Access this white paper to find out how to maximize IT reliability through service automation.
Posted: 05 Feb 2015 | Published: 21 Nov 2014

FrontRange Solutions Inc.

Why Outsourcing CRM Doesn't Mean That You Can Outsource Data Protection
sponsored by BitGlass
WHITE PAPER: This white paper explains why enterprises utilizing cloud applications like Salesforce should consider investing in a cloud access security broker, which restores data protection and visibility to your IT team while respecting user privacy.
Posted: 05 Feb 2015 | Published: 05 Feb 2015

BitGlass

How to Bolster Office 365's Built-In Security Functionality
sponsored by BitGlass
WHITE PAPER: This white paper explains how you can bolster Office 365's built-in security functionality with a comprehensive, in-house security plan, and lists the key areas that your enterprise has to address.
Posted: 04 Feb 2015 | Published: 31 Dec 2014

BitGlass

Survey Shows Need for Security Improvement
sponsored by Hewlett-Packard Company
WHITE PAPER: The following white paper explores what far too many organizations are leaving out of their IT security practices and explains what can be done to improve their overall effectiveness. Read on to learn if your own IT security protocols are leaving you open to a malicious attack.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

Hewlett-Packard Company

Few Businesses Feel Fully Prepared for Software Security Risks
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper reveals the results of a recent survey that explored enterprises' confidence in the security of the software that runs their businesses.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

Hewlett-Packard Company

Office 365: How Bitglass Restores Visibility and Data Protection to IT
sponsored by BitGlass
WHITE PAPER: This white paper presents a potential solution for the security and compliance issues raised by Office 365, enabling enterprises to secure their data outside of the firewall while maintaining user privacy.
Posted: 03 Feb 2015 | Published: 03 Feb 2015

BitGlass

Cloud Data Security for Financial Services
sponsored by BitGlass
WHITE PAPER: This white paper explains that banks can ensure the security of sensitive data stored in the public cloud by deploying a Cloud Access Security Broker, which enables banks to deploy a security platform within their own network infrastructure.
Posted: 30 Jan 2015 | Published: 30 Jan 2015

BitGlass

The Big Shift to Cloud-Based Security for Small Businesses
sponsored by Qualys
WHITE PAPER: This white paper explains why SMBs are just as vulnerable to cyberattacks as larger corporations, and how cloud-based security can provide them with a stronger network security posture without breaking the bank.
Posted: 28 Jan 2015 | Published: 29 Aug 2014

Qualys

Six Essential Elements of Web Application Security
sponsored by Qualys
WHITE PAPER: This white paper discusses the most common classes of web application vulnerabilities, and how hackers most often take advantage of these weaknesses. Read on to learn the 6 essential elements of web application security that are the most valuable places for IT teams to invest their time and resources.
Posted: 26 Jan 2015 | Published: 31 Oct 2013

Qualys

Dissect 5 Major Myths for Managing Virtual Teams
sponsored by Citrix Online Go To Meeting
WHITE PAPER: Access this white paper to unveil 5 common myths surrounding virtual teams that can cause friction within the team or damage its performance.
Posted: 23 Jan 2015 | Published: 23 Jan 2015

Citrix Online Go To Meeting

Best Practices for Selecting a Web Application Scanning (WAS) Solution
sponsored by Qualys
WHITE PAPER: This white paper explains how a Web Application Scanning solution can help you to locate and test web-based apps, and provides a checklist of best practices that will help you to understand what to look for when selecting a WAS solution.
Posted: 23 Jan 2015 | Published: 16 May 2013

Qualys

Rethinking IT to Drive Business Value
sponsored by Hewlett-Packard Company
WHITE PAPER: This survey of 300 enterprise organization decision makers involved in hardware investment decisions gives insight into the challenges and opportunities that lie between the old and new styles of IT and drive innovation, transformation and improved delivery against business expectations.
Posted: 22 Jan 2015 | Published: 09 Jan 2015

Hewlett-Packard Company

The Enemy Within: Why Insiders Are Still the Weakest Link in Your Data Security Chain
sponsored by Absolute Software
WHITE PAPER: This white paper describes the 5 steps that your enterprise needs to take in order to foster a conscientious data security environment within your enterprise, despite the challenges of the digital era.
Posted: 21 Jan 2015 | Published: 29 Dec 2014

Absolute Software

Why IT Leaders Should Take Strategic Action in Mobile and Endpoint Computing in 2015
sponsored by Absolute Software
WHITE PAPER: This white paper explains why enterprises should develop a broader-based, long-term endpoint strategy that connects to business goals, processes, and practices.
Posted: 19 Jan 2015 | Published: 25 Apr 2014

Absolute Software

Top 10 Reasons to Choose Cloud-Based Archiving
sponsored by Hewlett-Packard Company
WHITE PAPER: Companies are moving to cloud-based archiving to improve security, access to data and more. Learn how it can help you.
Posted: 12 Jan 2015 | Published: 12 Jan 2015

Hewlett-Packard Company

Profiling an Enigma: The Mystery of North Korea’s Cyber Threat Landscape
sponsored by Hewlett-Packard Company
WHITE PAPER: This highly interesting resource delves into North Korea's cyber threat landscape, deeply analyzing what is known about the regime's capabilities and motives, which are largely shrouded in secrecy.
Posted: 05 Feb 2015 | Published: 29 Aug 2014

Hewlett-Packard Company

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

Simplifying IT to Drive Better Business Outcomes and Improve ROI
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: In this analyst white paper, examine several strategies to cut IT complexity. Explore the pros and cons of virtualization, converged infrastructure, outsourcing operations, and more within. Read on now to learn which strategy is right for your organization.
Posted: 28 Jan 2015 | Published: 04 Jun 2014

Oracle Corporation UK Ltd

Top 10 Myths about Flash Storage
sponsored by NetApp
WHITE PAPER: Flash storage is growing, but that's led to many widespread misunderstandings. Find out what's fact and what's fiction.
Posted: 15 Jan 2015 | Published: 24 Feb 2015

TOPICS:  IT Management
NetApp
151 - 175 of 777 Matches Previous Page    5 6 7 8 9 10    Next Page
 
IT MANAGEMENT DEFINITION (continued): …  but also including by extension the corporation's entire network of computer resources. In the beginning, business computers were used for the practical business of computing the payroll and keeping track of accounts payable and receivable. As applications were developed that provided managers with information about sales, inventories, and other data that would help in managing the enterprise, the term "MIS" arose to describe these kinds of applications. Today, the term is used broadly in a number of contexts and includes (but is not limited to): decision support systems, resource and people … 
IT Management definition sponsored by SearchDataCenter.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement