Business of Information Technology  >   Business Management  >   Best Practices  >  

Information Technology Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Information Technology Best Practices White Papers (View All Report Types)
 
Shadow IT Guide: Protect Data and Avoid Compliance Violations
sponsored by Globalscape
WHITE PAPER: Are you sure that employees are only using IT-sanctioned ways of transferring data? If the answer is "no," then your sensitive data may be vulnerable. In this guide from Globalscape, you'll learn: what shadow IT is and its drawbacks, how to identify signs of a shadow IT problem, how to reduce shadow IT, and more.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

Globalscape

The Flux7 Enterprise DevOps Framework
sponsored by Flux7
WHITE PAPER: Learning from the experience of other DevOps adopters, discover how to use an enterprise DevOps framework to streamline the delivery of apps and services. Plus, uncover 7 steps for DevOps and digital transformation success.
Posted: 07 Aug 2017 | Published: 07 Aug 2017

Flux7

5 Ways to Save on IBM Licensing
sponsored by Snow Software
WHITE PAPER: This white paper explores how to put an effective software asset management strategy in place that's tailored to the complexities of IBM-specific processes and products. Access now to discover how you can increase the efficiency of entitlement management, licensing, and more.
Posted: 10 Oct 2016 | Published: 16 Mar 2016

Snow Software

The State of the Trust Gap: Mobile Privacy Expectations
sponsored by MobileIron
WHITE PAPER: This white paper takes the findings from the 2015 Trust Gap Survey and translates them into actionable recommendations for employers in the form of privacy-centric mobile device policies. Read on here to key into the following important insights about bridging the trust gap.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

MobileIron

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

How Organizations Are Responding to Mobile and Cloud Threats
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explores the results of a recent survey that sought to elucidate how organizations are adapting their approach to authentication to protect their sensitive assets as they adopt cloud-based services and BYOD.
Posted: 10 Dec 2014 | Published: 15 May 2014

SafeNet, Inc.

Taming the Digital Dragon: The 2014 CIO Agenda
sponsored by Gartner
WHITE PAPER: Explore this Gartner report to learn how the CIO and IT management roles are changing to meet rising trends in IT and innovation. Learn what the "digital dragon" is, and how IT teams can leverage innovation and technology change to gain competitive advantage. Read on to learn more.
Posted: 27 Jun 2014 | Published: 27 Jun 2014

Gartner

Key Technical Support Considerations for the Cognitive Era
sponsored by IBM
WHITE PAPER: Download this white paper to discover the different support and maintenance challenges that confront CIOs when implementing an infrastructure that includes new solutions like mobile, social, cloud initiatives and other new breeds of computer models, including cognitive.
Posted: 13 Apr 2017 | Published: 28 Feb 2016

IBM

The Buyer's Guide to Innovation Management Platforms
sponsored by Spigit
WHITE PAPER: Did you know that advanced crowd science algorithms will surface innovations with the highest potential? Discover 5 criteria with which you should scrutinize potential innovation management platforms to distinguish their offerings. Read on to determine how to foster innovation and sustained customer engagement.
Posted: 24 Jun 2016 | Published: 24 Jun 2016

Spigit

Linking Resiliency to Business Objectives: How To Make a Case For Corporate Investment
sponsored by IBM
WHITE PAPER: This white paper serves as a guideline for IT professionals, and explains how to generate investment for resiliency initiatives by linking IT risks to business risk using one resiliency services framework. Access this white paper to learn how to uncover the critical connections between IT and the business.
Posted: 31 Aug 2015 | Published: 31 May 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement