Business of Information Technology  >   Business Management  >   Best Practices  >  

IT Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
IT Best PracticesReports
1 - 25 of 249 Matches Previous Page  | Next Page
EMM Challenges: Three Ways to Balance IT Needs With User Demands
sponsored by BlackBerry
WHITE PAPER: Read this whitepaper to find out three ways to balance IT needs with user demands.
Posted: 25 Jul 2014 | Published: 25 Jul 2014

BlackBerry

Banco Galicia Plans its Global Future with the Help of IBM and SAP
sponsored by IBM
CASE STUDY: In this case study you will learn how one of Argentina's top three private banks deployed this infrastructure and was able to develop and launch new banking and financial products much faster, helping the bank to win new customers from private and corporate banks and improve its competitiveness.
Posted: 24 Jul 2014 | Published: 30 Jun 2013

IBM

IBM X-Force Threat Intelligence Quarterly, 6/14: The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014

IBM

Symantec Backup Exec 2014: Achieving Best Practices for Virtual Machine Backup and Recovery
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses how to assess virtualization backup solutions. Read on to find out which high-level best practices you should consider when choosing a virtualization protection solution management and monitoring, multi-hypervisor, deduplication, and more.
Posted: 23 Jul 2014 | Published: 31 May 2014

Symantec Corporation

Survey: Can Security in Higher Education Be Both Open and Secure?
sponsored by AlienVault
WHITE PAPER: This report contains data collected by SANS regarding the successes and challenges that colleges and universities experience in protecting their environments from threats, and also provides advice for security professionals working in these environments to improve their tactics in this critical area.
Posted: 23 Jul 2014 | Published: 30 Jun 2014

AlienVault

Webcast: Practical Threat Management and Incident Response for Small and Medium-Sized Enterprises
sponsored by AlienVault
WEBCAST: This helpful webcast discusses a multitude of critical issues related to threat management in small and medium-sized enterprises.
Posted: 23 Jul 2014 | Premiered: Jul 23, 2014

AlienVault

Protecting Organizations Against Advanced Persistent Threats
sponsored by CDW Corporation
VIDEO: This helpful video provides an overview of advanced persistent threats (APTs) and identifies several best practices that organizations should keep in mind to identify vulnerabilities and enforce stronger security policies.
Posted: 22 Jul 2014 | Premiered: 21 May 2014

CDW Corporation

Combatting APTs with a Defense-in-Depth Security Approach
sponsored by CDW Corporation
WHITE PAPER: This informative white paper contains critical information on why a defense-in-depth security approach has proven effective in protecting organizations' sensitive data from APTs.
Posted: 22 Jul 2014 | Published: 05 Mar 2014

CDW Corporation

Keeping IT Security Decision-Making on Track
sponsored by CDW Corporation
WHITE PAPER: This resource defines multiple approaches to IT security organization and decision-making that can help companies to determine the most effective ways of functioning in these areas.
Posted: 22 Jul 2014 | Published: 21 Feb 2013

CDW Corporation

White Paper: Developing More Effective Enterprise Mobile Programs
sponsored by IBM
WHITE PAPER: This practical "how-to" guide will help your business create an effective and sustainable mobile enterprise program in four steps.
Posted: 21 Jul 2014 | Published: 30 Nov 2012

IBM

Cisco Unified Access Technology Overview: Converged Access
sponsored by Cisco India
WHITE PAPER: This white paper details one company's approach to unified access, an integrated, simplified, and intelligent network platform that streamlines the IT department's task of running a multitude of separate networks.
Posted: 21 Jul 2014 | Published: 31 Jan 2013

Cisco India

HP Enterprise Services Video Innovation
sponsored by Hewlett-Packard Company
WEBCAST: This webcast breaks down 5 levels of innovation that can help your business form a better relationship with customers through this new style of IT. Watch to find out how to spark innovation among your IT team and leverage technology to help it along.
Posted: 18 Jul 2014 | Premiered: Jul 18, 2014

Hewlett-Packard Company

The world's most important gathering of CIOs and Senior IT Executives. Barcelona, Spain.
sponsored by Gartner
WHITE PAPER: Click on the link now to download this exclusive resource and learn about the 2014 Gartner Symposium/ITxpo. 
Posted: 17 Jul 2014 | Published: 17 Jul 2014

Gartner

Tips for Driving User Adoption in New Technology Deployment
sponsored by Code42
WHITE PAPER: How can you successfully deploy a new technology and ensure users are on board? In this on-demand webinar, Paul Glen, author of "The Geek Leader's Handbook," delves into the interpersonal issues IT faces when implementing a new technology and shares how user adoption is the key to a successful deployment.
Posted: 07 Jul 2014 | Published: 03 Jul 2014

Code42

Strategic Server Refresh with IBM System x
sponsored by IBM and Intel.
WHITE PAPER: This white paper demonstrates the value of keeping your servers up to date with refresh and upgrades.
Posted: 07 Jul 2014 | Published: 18 Jun 2013

IBM and Intel.

MarketScope for User Experience Platforms
sponsored by IBM
WHITE PAPER: The following MarketScope white paper explores the current state of user experience platforms and what you need to know about the market when moving forward. Learn how to choose the right solution for your organization and gain access to a comprehensive comparison of many of the leading UXP vendors.
Posted: 03 Jul 2014 | Published: 03 Jul 2014

IBM

Exposing the Cybersecurity Cracks: A Global Perspective
sponsored by Websense, Inc.
WHITE PAPER: This eye-opening reviews data collected from nearly 5000 experienced IT workers regarding deficiencies in the ways that their companies attempt to think about, fight, and detect security breaches.
Posted: 01 Jul 2014 | Published: 30 Apr 2014

Websense, Inc.

A research summary report with key highlights from “Taming the Digital Dragon: The 2014 CIO Agenda”
sponsored by Gartner
WHITE PAPER: Explore this Gartner report to learn how the CIO and IT management roles are changing to meet rising trends in IT and innovation. Learn what the "digital dragon" is, and how IT teams can leverage innovation and technology change to gain competitive advantage. Read on to learn more.
Posted: 27 Jun 2014 | Published: 27 Jun 2014

Gartner

7 Key Trends in the Business of Tech
sponsored by K2
WHITE PAPER: This paper addresses 7 key trends in the business of tech today, from business acceleration to the consumerization of IT. Learn how you can capitalize on these trends with business application software that has 4 key capabilities.
Posted: 27 Jun 2014 | Published: 27 Jun 2014

K2

Leveraging Mobility to Drive Productivity and Provide a Superior IT Service Experience
sponsored by CA Technologies.
WHITE PAPER: This exclusive whitepaper details six ways to introduce mobility into IT service management.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

CA Technologies.

5 Ways to Satisfy Both Business and User Demands for IT Service
sponsored by CA Technologies.
WHITE PAPER: This whitepaper details five steps you must take in order to provide the IT service your end-users want at the cost your business demands.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

CA Technologies.

How to overcome roadblocks to legacy software replacement: a guide for IT leaders
sponsored by MSM Software
WHITE PAPER: This whitepaper gathers together the views of IT leaders from a recent survey of IT leaders and identifies the most typical roadblocks encountered when attempting to modernize legacy systems – as well as how they address those challenges.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

MSM Software

The Four Cornerstones of a Successful BYOD Program
sponsored by IBM
EGUIDE: In this expert e-guide, learn about the four corner stones of a successful BYOD program, and how these key considerations can help you establish a thorough BYOD security policy checklist to ensure your organization deploys an optimized and secure mobile device program. Read on to learn more.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

IBM

A Flexible, Scalable MSP Platform
sponsored by IBM
WHITE PAPER: This informative case study explores the role of the cloud in their IT infrastructure – outlining the benefits of its implementation.
Posted: 06 Jun 2014 | Published: 31 Dec 2013

IBM

AT&S Increases Efficiency and Business Agility with Improved IT Management
sponsored by CA Technologies.
CASE STUDY: This case study tells how one organization was able to leverage the lastest infrastrucutre monitoring solutions and how it helped them mitigate the challenges associated with tight budgets and increasing demands.
Posted: 05 Jun 2014 | Published: 31 Oct 2013

CA Technologies.
1 - 25 of 249 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement