Business of Information Technology  >   Business Management  >   Best Practices  >  

Technology Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Technology Best Practices White Papers (View All Report Types)
 
IT Without Boundaries: Choosing Between Conventional or Agile IT?
sponsored by Red Hat
WHITE PAPER: Why should you have to choose between conventional and agile IT? News just in: you don't have to anymore. This white paper explains how organizations can operate more efficiently and become more agile at the same time. Access this research to see how you can balance conventional and agile IT.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

Red Hat

The Right Infrastructure Strategy to Support Bimodal I.T. Capabilities
sponsored by Red Hat
WHITE PAPER: In the following brief white paper, learn the importance of having a bimodal IT infrastructure to handle extreme, real-time innovation. Access now and learn how business leaders can create their own bimodal infrastructure strategy that enables the IT team to not only meet the competing demands it faces today, but in the future as well.
Posted: 12 Jan 2016 | Published: 12 Jan 2016

Red Hat

Shadow IT Guide: Protect Data and Avoid Compliance Violations
sponsored by Globalscape
WHITE PAPER: Are you sure that employees are only using IT-sanctioned ways of transferring data? If the answer is "no," then your sensitive data may be vulnerable. In this guide from Globalscape, you'll learn: what shadow IT is and its drawbacks, how to identify signs of a shadow IT problem, how to reduce shadow IT, and more.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

Globalscape

5 Ways to Create a Successful Innovation Program
sponsored by Spigit
WHITE PAPER: What exactly does it take to create sustainable innovation program, driving impactful results to both the business side and IT? Learn how to implement a successful crowdsourced innovation program with the 5 methods outlined in this white paper.
Posted: 23 Jun 2016 | Published: 23 Jun 2016

Spigit

Profiling an Enigma: The Mystery of North Korea’s Cyber Threat Landscape
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This highly interesting resource delves into North Korea's cyber threat landscape, deeply analyzing what is known about the regime's capabilities and motives, which are largely shrouded in secrecy.
Posted: 05 Feb 2015 | Published: 29 Aug 2014

Hewlett Packard Enterprise

Delivering Enterprise Value with Service Management
sponsored by ServiceNow
WHITE PAPER: This IDC Research report provides an analysis of the business value that 10 businesses are achieving with cloud-based IT service management services. Read on to increase service management productivity across your business by automating repeatable processes, and more.
Posted: 20 Jun 2016 | Published: 31 Mar 2015

ServiceNow

Linking Resiliency to Business Objectives: How To Make a Case For Corporate Investment
sponsored by IBM
WHITE PAPER: This white paper serves as a guideline for IT professionals, and explains how to generate investment for resiliency initiatives by linking IT risks to business risk using one resiliency services framework. Access this white paper to learn how to uncover the critical connections between IT and the business.
Posted: 31 Aug 2015 | Published: 31 May 2015

IBM

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

Enterprise Information Security in Transition
sponsored by IBM
WHITE PAPER: This white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.
Posted: 28 Jul 2014 | Published: 31 Oct 2012

IBM

The Top 5 Tasks to Automate for Privileged Account Management and Security
sponsored by Thycotic
WHITE PAPER: In this white paper, you will discover the top 5 tasks to automate for privileged account management. Access this paper to keep up with the scale and scope of the networks and systems your IT must manage.
Posted: 22 Jan 2016 | Published: 31 Dec 2015

Thycotic
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement