Business of Information Technology  >   Business Management  >   Best Practices  >  

IT Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
IT Best Practices Reports
201 - 225 of 414 Matches Previous Page  |  Next Page
Top 10 Ways to Use Help Desk to Build Your MSP Business
sponsored by Solarwinds N-able
WHITE PAPER: This informative resource provides 10 helpful suggestions for building a successful MSP business, starting with the help desk.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

Solarwinds N-able

Harnessing Business-Led IT
sponsored by
ESSENTIAL GUIDE: CIOs should treat business-led IT ("Shadow IT") as another, often better, way to achieve the core goals of Corporate IT, this report from CEB argues
Posted: 22 Aug 2014 | Published: 22 Aug 2014

Five Major Trends for MSPs to Watch
sponsored by Solarwinds N-able
WHITE PAPER: This informative white paper provides excellent advice for MSPs as they navigate explosive trends like cloud computing and mobility, helping them to adapt their businesses to meet customers' evolving needs and stay one step ahead of the competition.
Posted: 29 Jul 2014 | Published: 29 Jul 2014

Solarwinds N-able

Strategic IT
sponsored by
BOOK: Find out how two leading CIOs have enabled their organisations to use information technology as strategic driver, in this extract from the book Strategic IT.
Posted: 19 May 2014 | Published: 19 May 2014

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014


Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013


IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013


Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013


Improving Data Center Performance
sponsored by Turbonomic
EGUIDE: This expert e-guide explores how data centers are evolving to meet increased demands and much more.
Posted: 24 Sep 2014 | Published: 24 Sep 2014


Turning Your Network into a Strategic Business Asset
sponsored by Extreme Networks
EBOOK: This eBook introduces a network-based business intelligence solution that captures and analyzes context-based application traffic to deliver meaningful information about applications, users, locations and devices.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Extreme Networks

Countering Cyber-Crime with a Sharp Eye and a Clear Plan
sponsored by
EBOOK: Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
Posted: 14 Aug 2014 | Published: 21 Aug 2014

Resolve Performance Issues Within Your Citrix XenApp Environment
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This white paper introduces an innovative application performance management technology that could be very valuable to IT professionals who frequently troubleshoot performance issues across a Citrix server, saving time and taking the guesswork out of the analysis.
Posted: 04 Aug 2014 | Published: 31 Dec 2013

Riverbed Technology, Inc.

Enterprise Information Security in Transition
sponsored by IBM
WHITE PAPER: This white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.
Posted: 28 Jul 2014 | Published: 31 Oct 2012


The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014


Strategic Server Refresh with IBM System x
sponsored by IBM and Intel.
WHITE PAPER: This white paper demonstrates the value of keeping your servers up to date with refresh and upgrades.
Posted: 07 Jul 2014 | Published: 18 Jun 2013

IBM and Intel.

Essential UXP Guide: MarketScope Helps Buyers Identify Top Priorities
sponsored by IBM
WHITE PAPER: The following MarketScope white paper explores the current state of user experience platforms and what you need to know about the market when moving forward. Learn how to choose the right solution for your organization and gain access to a comprehensive comparison of many of the leading UXP vendors.
Posted: 03 Jul 2014 | Published: 03 Jul 2014


Taming the Digital Dragon: The 2014 CIO Agenda
sponsored by Gartner
WHITE PAPER: Explore this Gartner report to learn how the CIO and IT management roles are changing to meet rising trends in IT and innovation. Learn what the "digital dragon" is, and how IT teams can leverage innovation and technology change to gain competitive advantage. Read on to learn more.
Posted: 27 Jun 2014 | Published: 27 Jun 2014


Leveraging Mobility to Drive Productivity and Provide a Superior IT Service Experience
sponsored by CA Technologies.
WHITE PAPER: This exclusive whitepaper details six ways to introduce mobility into IT service management.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

CA Technologies.

How to overcome roadblocks to legacy software replacement: a guide for IT leaders
sponsored by MSM Software
WHITE PAPER: This whitepaper gathers together the views of IT leaders from a recent survey of IT leaders and identifies the most typical roadblocks encountered when attempting to modernize legacy systems – as well as how they address those challenges.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

MSM Software

Bridging the Business/IT Divide in B2B Integration
sponsored by IBM
WHITE PAPER: This research report presents results from a survey of 360 line of business managers in regards to B2B integration, and also offers recommendations on narrowing the gap between business and IT to maximize returns from B2B integration initiatives.
Posted: 16 Jun 2014 | Published: 30 May 2014


Improve Your IT Management Strategy to Increase Efficiency and Business Agility
sponsored by CA Technologies.
CASE STUDY: This case study tells how one organization was able to leverage the lastest infrastrucutre monitoring solutions and how it helped them mitigate the challenges associated with tight budgets and increasing demands.
Posted: 05 Jun 2014 | Published: 31 Oct 2013

CA Technologies.

Business Benefits of a Shared Vision between CIOs and Line of Business Executives
sponsored by EMC Corporation
WHITE PAPER: Get in-depth insights from a new global survey of executives by The Economist Intelligence Unit, which confirms significant change in how organizations like yours deliver and use IT services, and advocates a blended model of internal and third-party services.
Posted: 30 May 2014 | Published: 30 May 2014

EMC Corporation

ITSM: Connecting Service Desk Operations to IT Strategies
sponsored by IBM
EGUIDE: This expert e-guide examines the changes that ITIL and IT service management are bringing to your IT departments
Posted: 27 May 2014 | Published: 27 May 2014


Transform IT: Transform the Enterprise
sponsored by ServiceNow
WHITE PAPER: Discover the three IT imperatives for a CIO-led transformation, and learn how CIOs are adopting strategies to change IT.
Posted: 19 May 2014 | Published: 19 May 2014


Coming at You: How to Deal with the Latest DDoS Attacks
sponsored by
EBOOK: Access this TechGuide to learn more about DDoS threats and how to protect your systems—while shape-shifting cyberattackers are tough to stay ahead of, they're too destructive to ignore.
Posted: 14 May 2014 | Published: 15 May 2014
201 - 225 of 414 Matches Previous Page    7 8 9 10 11 12    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement