Business of Information Technology  >   Business Management  >   Best Practices  >  

IT Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
IT Best Practices Reports
101 - 125 of 366 Matches Previous Page  |  Next Page
On the Front Lines: How IT Can Manage Real-Time Risks
sponsored by Hewlett-Packard Limited
WHITE PAPER: Access this white paper to learn the basics of managing risk in your enterprise. While a challenge, this resource explains why analytics and data management consultants are your main line of defense that allow you to detect threats.
Posted: 06 Apr 2015 | Published: 31 Dec 2014

Hewlett-Packard Limited

Don't Let Colocation Bring You Down
sponsored by Richardsoneyres
RESOURCE: This resource highlights several benefits behind a colocation site, and why you shouldn't fear data center migrations.
Posted: 03 Apr 2015 | Published: 28 Oct 2014

Richardsoneyres

5 Trends That are Reshaping Information Technology
sponsored by Qlik
WHITE PAPER: This white paper illustrates the level of technological transformation IT must commit to if they wish to keep up with employee expectations. Learn how to make these changes by optimizing visualization, big data, and more
Posted: 31 Mar 2015 | Published: 31 Mar 2015

Qlik

ABCs of ITIL®
sponsored by Global Knowledge
WHITE PAPER: Learn the ITIL® concepts of accountability, boundaries, and consistency (the ABCs) and discover how ITIL helps establish, manage, and maintain the ABCs.
Posted: 31 Mar 2015 | Published: 31 Mar 2015

Global Knowledge

Understand the True Value of the Private Cloud
sponsored by Dell and Microsoft
EGUIDE: This expert e-guide reveals the value of the private cloud and provides important tips to keep in mind when creating a cloud model to fit your organization.
Posted: 27 Mar 2015 | Published: 27 Mar 2015

Dell and Microsoft

Staying the course as a CIO
sponsored by ComputerWeekly.com
BOOK: In this extract from his book, Staying the Course as a CIO, Jonathan M. Mitchell looks at the challenges of managing IT projects.
Posted: 27 Mar 2015 | Published: 27 Mar 2015

ComputerWeekly.com

The Importance of Senior Executive Involvement in Breach Response
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this white paper, discover survey results that reveal how IT pros feel about leadership and executive involvement in breach mitigation.
Posted: 24 Mar 2015 | Published: 31 Oct 2014

Hewlett-Packard Limited

The Evolving Role of the CIO and Challenges Awaiting
sponsored by Google
WHITE PAPER: This resource contains engaging articles on the changing role of IT and how you can take advantage of these changes.
Posted: 16 Mar 2015 | Published: 16 Mar 2015

Google

The Ultimate Enterprise Mobility Policy Guidebook
sponsored by Maas360 by IBM
WHITE PAPER: This guide can help you create effective and implement successful mobility strategies for your enterprise. Read it now for in-depth advice on how you can create a mobility policy that will increase productivity, efficiency, and cooperation in your workplace.
Posted: 13 Mar 2015 | Published: 30 Apr 2012

Maas360 by IBM

15 Top-Paying IT Certifications for 2015
sponsored by Global Knowledge
WHITE PAPER: Take a look at some of the top-paying certifications as determined by the more than 11,000 responses to our 2015 IT Skills and Salary Survey of your peers across North America. Certifications in IT security, networking, and systems management are at the top of the certification pay scale.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

Global Knowledge

Cloud IT: The Impact of Cloud Supply Chain Platforms on the Role of IT
sponsored by GT Nexus
WHITE PAPER: In this valuable white paper learn more about the impact of cloud supply chain platforms on the role of IT and how you can better prepare your team for the challenges they may face.
Posted: 19 Feb 2015 | Published: 19 Feb 2015

GT Nexus

4 Data Traffic Security Challenges Exposing Enterprises to Hack Attacks
sponsored by Certes Networks
WHITE PAPER: This white paper discusses the 4 major points of weakness that your enterprise needs to prioritize in 2015 in order to defend your business-critical data from hackers.
Posted: 12 Feb 2015 | Published: 22 Jan 2015

Certes Networks

Recognizing Five Sources of High-Profile Data Security Breaches
sponsored by Mimecast
WHITE PAPER: This white paper discusses the 5 major categories of vulnerabilities that IT and security professionals need to account for in their solutions planning.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

Mimecast

Applying the Top 20 Critical Security Controls to the Cloud
sponsored by CloudPassage
WEBCAST: This webcast discusses how enterprises can apply the 20 Critical Security Controls for Effective Cyber Defense, a list of best practices for IT security, to the new reality of cloud-based or virtualized infrastructures.
Posted: 06 Feb 2015 | Premiered: Feb 6, 2015

CloudPassage

A Quick Guide to SSL for Apps
sponsored by Symantec Corporation
WHITE PAPER: This white paper lists the steps that your enterprise needs to take in order to create a stronger, more trustworthy SSL implementation.
Posted: 20 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

Wildcard and SAN: Understanding Multi-Use SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: Find out about how Multi-Use SSL Certificates such as Wildcard and SAN certificates can provide greater flexibility to simplify certificate management and reduce costs.
Posted: 20 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

SSL for Apps: Best Practices for Developers
sponsored by Symantec Corporation
WHITE PAPER: This white paper lists the necessary steps that your enterprise needs to take in order to create a stronger, more trustworthy SSL implementation.
Posted: 20 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Securing the Future of Trust on the Internet
sponsored by Symantec Corporation
WHITE PAPER: This white paper explains why public key infrastructure (PKI) is the key to the future of trust on the Internet, and the steps that must be taken to build a stronger, more trustworthy PKI ecosystem.
Posted: 20 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

Spoofing Server-Server Communication: How You Can Prevent It
sponsored by Symantec Corporation
WHITE PAPER: In this must-read white paper, you'll learn how to prevent the new SSL Strip threat that could compromise your secure applications.
Posted: 19 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Protecting Data With Secure Collaboration Solutions
sponsored by Dropbox for Business
WHITE PAPER: Access this white paper to learn how a consulting firm evaluated the balance between security and usability for a popular cloud-based file sharing service.
Posted: 30 Mar 2015 | Published: 30 Jan 2015

Dropbox for Business

How to Reap the Benefits of a Flexible ITSM Platform
sponsored by ServiceNow
EGUIDE: This eguide explains how to remain business-aligned, operationally controlled and cost-effective with an evolving ITSM.
Posted: 29 Mar 2015 | Published: 29 Mar 2015

ServiceNow

Computer Weekly – 24 March 2015: Government backs tech in 2015 Budget
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, chancellor George Osborne's 2015 Budget was the most technology friendly ever – we examine the key policy announcements. Sainsbury's CIO talks about the challenges of going digital. And we look at how virtual reality could be coming to a workplace near you, thanks to the latest developments. Read the issue now.
Posted: 23 Mar 2015 | Published: 20 Mar 2015

ComputerWeekly.com

Profiling an Enigma: The Mystery of North Korea’s Cyber Threat Landscape
sponsored by Hewlett-Packard Company
WHITE PAPER: This highly interesting resource delves into North Korea's cyber threat landscape, deeply analyzing what is known about the regime's capabilities and motives, which are largely shrouded in secrecy.
Posted: 05 Feb 2015 | Published: 29 Aug 2014

Hewlett-Packard Company

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data
101 - 125 of 366 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement