Business of Information Technology  >   Business Management  >   Best Practices  >  

IT Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
IT Best Practices Reports
151 - 175 of 370 Matches Previous Page  |  Next Page
Is Your Identity Management Infrastructure a Mess?
sponsored by Radiant Logic, Inc.
WHITE PAPER: This infographic depicts the reasons behind identity management challenges, the impact that they have on organizations, and what your enterprise needs to do to confront these issues head-on.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Radiant Logic, Inc.

Top 10 Ways to Use Help Desk to Build Your MSP Business
sponsored by Solarwinds N-able
WHITE PAPER: This informative resource provides 10 helpful suggestions for building a successful MSP business, starting with the help desk.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

Solarwinds N-able

Harnessing Business-Led IT
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: CIOs should treat business-led IT ("Shadow IT") as another, often better, way to achieve the core goals of Corporate IT, this report from CEB argues
Posted: 22 Aug 2014 | Published: 22 Aug 2014

ComputerWeekly.com

Five Major Trends for MSPs to Watch
sponsored by Solarwinds N-able
WHITE PAPER: This informative white paper provides excellent advice for MSPs as they navigate explosive trends like cloud computing and mobility, helping them to adapt their businesses to meet customers' evolving needs and stay one step ahead of the competition.
Posted: 29 Jul 2014 | Published: 29 Jul 2014

Solarwinds N-able

How Organizations Are Responding to Mobile and Cloud Threats
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explores the results of a recent survey that sought to elucidate how organizations are adapting their approach to authentication to protect their sensitive assets as they adopt cloud-based services and BYOD.
Posted: 10 Dec 2014 | Published: 15 May 2014

SafeNet, Inc.

Automating Your IT Processes for Long Term Success
sponsored by Automic
WHITE PAPER: Access this white paper to find out if automating certain IT operations can help lessen the burden on your IT staff while simultaneously improving the end user experience.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

Automic

HP Security Cyber Risk Report
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This HP Security Cyber Risk Report provides industry-wide data on vulnerabilities in software, mobile, and web applications; examines how specific technologies like iOS, Android, and JAVA contribute to the attack surface; and more.
Posted: 19 Nov 2014 | Published: 31 Jan 2014

Hewlett Packard Enterprise

UKTech50: The senior IT event of the year
sponsored by ComputerWeekly.com
EVENT: UKTech50 returns in 2014 for its 5th annual event, highlighting the successes of individuals within UK IT. With a combination of fantastic speakers and the countdown of the top 50, this event never fails to please.
Posted: 18 Nov 2014 | Published: 17 Nov 2014

ComputerWeekly.com

Rethinking People Costs in Enterprise IT
sponsored by Rackspace
WHITE PAPER: This white paper explores how to assess your IT people spend and position IT as a central driver of business growth.
Posted: 15 Oct 2014 | Published: 12 Aug 2014

Rackspace

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

Improving Data Center Performance
sponsored by VMTurbo
EGUIDE: This expert e-guide explores how data centers are evolving to meet increased demands and much more.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

VMTurbo

Turning Your Network into a Strategic Business Asset
sponsored by Extreme Networks
EBOOK: This eBook introduces a network-based business intelligence solution that captures and analyzes context-based application traffic to deliver meaningful information about applications, users, locations and devices.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Extreme Networks

Securing Enterprise Networks with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EBOOK: Enterprise networks are increasing in size and complexity, creating a larger attack surface for hackers. This TechGuide walks you through gaining visibility into your network and devising an effective security strategy.
Posted: 14 Aug 2014 | Published: 11 Aug 2014

SearchSecurity.com

Resolve Performance Issues Within Your Citrix XenApp Environment
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This white paper introduces an innovative application performance management technology that could be very valuable to IT professionals who frequently troubleshoot performance issues across a Citrix server, saving time and taking the guesswork out of the analysis.
Posted: 04 Aug 2014 | Published: 31 Dec 2013

Riverbed Technology, Inc.

Enterprise Information Security in Transition
sponsored by IBM
WHITE PAPER: This white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.
Posted: 28 Jul 2014 | Published: 31 Oct 2012

IBM

The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014

IBM

Strategic Server Refresh with IBM System x
sponsored by IBM and Intel.
WHITE PAPER: This white paper demonstrates the value of keeping your servers up to date with refresh and upgrades.
Posted: 07 Jul 2014 | Published: 18 Jun 2013

IBM and Intel.

Essential UXP Guide: MarketScope Helps Buyers Identify Top Priorities
sponsored by IBM
WHITE PAPER: The following MarketScope white paper explores the current state of user experience platforms and what you need to know about the market when moving forward. Learn how to choose the right solution for your organization and gain access to a comprehensive comparison of many of the leading UXP vendors.
Posted: 03 Jul 2014 | Published: 03 Jul 2014

IBM

Taming the Digital Dragon: The 2014 CIO Agenda
sponsored by Gartner
WHITE PAPER: Explore this Gartner report to learn how the CIO and IT management roles are changing to meet rising trends in IT and innovation. Learn what the "digital dragon" is, and how IT teams can leverage innovation and technology change to gain competitive advantage. Read on to learn more.
Posted: 27 Jun 2014 | Published: 27 Jun 2014

Gartner

Leveraging Mobility to Drive Productivity and Provide a Superior IT Service Experience
sponsored by CA Technologies.
WHITE PAPER: This exclusive whitepaper details six ways to introduce mobility into IT service management.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

CA Technologies.

How to overcome roadblocks to legacy software replacement: a guide for IT leaders
sponsored by MSM Software
WHITE PAPER: This whitepaper gathers together the views of IT leaders from a recent survey of IT leaders and identifies the most typical roadblocks encountered when attempting to modernize legacy systems – as well as how they address those challenges.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

MSM Software

Bridging the Business/IT Divide in B2B Integration
sponsored by IBM
WHITE PAPER: This research report presents results from a survey of 360 line of business managers in regards to B2B integration, and also offers recommendations on narrowing the gap between business and IT to maximize returns from B2B integration initiatives.
Posted: 16 Jun 2014 | Published: 30 May 2014

IBM
151 - 175 of 370 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement