Business of Information Technology  >   Business Management  >   Best Practices  >  

IT Technology Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
IT Technology Best Practices White Papers (View All Report Types)
 
Driving Business with Continuous Operational Intelligence
sponsored by Courion Corporation
WHITE PAPER: In this white paper, discover the true meaning of operational intelligence, including what it is, which data types/sets can be used as a basis for it, and how to use it.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

Courion Corporation

Spoofing Server-Server Communication: How You Can Prevent It
sponsored by Symantec Corporation
WHITE PAPER: In this must-read white paper, you'll learn how to prevent the new SSL Strip threat that could compromise your secure applications.
Posted: 19 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

The 2014 Global Cost of Cybercrime Study
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative report distills interviews with senior-level IT personnel about the impact of cybercrime on their organizations in 2014 into trends that apply to every enterprise around the world.
Posted: 19 Nov 2014 | Published: 19 Nov 2014

Hewlett-Packard Company

5 Steps to Reduce the Complexity of PCI Security Assessments
sponsored by Bit9 + Carbon Black
WHITE PAPER: This white paper lists 5 steps that your enterprise can take to guard your endpoints; reduce the complexity of assessments; lower administration costs; and achieve a compliant, secure environment.
Posted: 14 Jan 2015 | Published: 06 Oct 2014

Bit9 + Carbon Black

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

Protecting Against Web Application Threats Using SSL
sponsored by Symantec Corporation
WHITE PAPER: In this shortcut guide, readers will learn how changes in the way we deliver services, the increasing use of mobile devices, the adoption of cloud computing compounded by the ever-evolving means of stealing information and compromising services leave web applications vulnerable to attack.
Posted: 15 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Protecting Users from Firesheep and other Sidejacking Attacks with SSL
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the Firesheep Wi-Fi attack tool and other sidejacking attacks with SSL and explains how to avoid these attacks.
Posted: 15 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

Defending Against Rogue Users, Devices, and Applications
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explains how NAC technologies help to ensure that only appropriate users, devices, and applications have access to your network resources, enabling you to support your users in a secure, efficient way.
Posted: 17 Feb 2015 | Published: 29 Aug 2014

ForeScout Technologies, Inc.

Exposing the Cybersecurity Cracks: A Global Perspective
sponsored by Websense, Inc.
WHITE PAPER: This eye-opening reviews data collected from nearly 5000 experienced IT workers regarding deficiencies in the ways that their companies attempt to think about, fight, and detect security breaches.
Posted: 01 Jul 2014 | Published: 30 Apr 2014

Websense, Inc.

Leveraging Mobility to Drive Productivity and Provide a Superior IT Service Experience
sponsored by CA Technologies.
WHITE PAPER: This exclusive whitepaper details six ways to introduce mobility into IT service management.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement