Business of Information Technology  >   Business Management  >   Best Practices  >  

IT Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
IT Best Practices Reports
76 - 100 of 320 Matches Previous Page  |  Next Page
Six Essential Elements of Web Application Security
sponsored by Qualys
WHITE PAPER: This white paper discusses the most common classes of web application vulnerabilities, and how hackers most often take advantage of these weaknesses. Read on to learn the 6 essential elements of web application security that are the most valuable places for IT teams to invest their time and resources.
Posted: 26 Jan 2015 | Published: 31 Oct 2013

Qualys

Thrive, Survive or Perish - Compute Economics
sponsored by Hewlett-Packard Company
WEBCAST: View this in-depth webcast to learn about the "new style" of IT and how a mix of tools, such as converged infrastructure, and techniques, like maintenance task automation, frees your IT staff to pursue web and app development and deployment.
Posted: 23 Jan 2015 | Premiered: Oct 22, 2014

Hewlett-Packard Company

Is Your Printing/Imaging Environment As Safe As the Rest of Your Infrastructure?
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper explains the importance of securing your printing and imaging environment, and introduces a streamlined, policy-based approach to securing these devices before a data breach occurs.
Posted: 22 Jan 2015 | Published: 31 Oct 2014

Hewlett-Packard Limited

The Enemy Within: Why Insiders Are Still the Weakest Link in Your Data Security Chain
sponsored by Absolute Software
WHITE PAPER: This white paper describes the 5 steps that your enterprise needs to take in order to foster a conscientious data security environment within your enterprise, despite the challenges of the digital era.
Posted: 21 Jan 2015 | Published: 29 Dec 2014

Absolute Software

Infographic: Data Traffic Security is a Mess
sponsored by Certes Networks
WHITE PAPER: This infographic visually displays the sobering results of a recent survey on what are IT decision makers doing to secure and segment their sensitive data traffic.
Posted: 09 Jan 2015 | Published: 09 Jan 2015

Certes Networks

Redefining IT Delivery and Economics with Converged Infrastructure
sponsored by Hewlett-Packard Company
WEBCAST: View this in-depth webcast to learn about the "new style" of IT and how you can leverage your staff to overcome the pressures and obstacles presented today. Watch now to discover the path to impact business performance around workforce productivity, business trends and intelligence, and customer acquisition and loyalty in the digital age.
Posted: 07 Jan 2015 | Premiered: Oct 22, 2014

Hewlett-Packard Company

The Compliance and Security Balancing Act
sponsored by Mimecast
EGUIDE: In this expert guide, Karen Scarfone provides several practical tips on technologies that improve enterprise email security, and Christine Parizo discusses how to strike an ideal balance between compliance and security, when "compliant" doesn't necessarily mean "secure."
Posted: 22 Dec 2014 | Published: 22 Dec 2014

Mimecast

Taking Control of File Sharing Services
sponsored by Mimecast
WHITE PAPER: This informative white paper discusses how file sharing services are being used within enterprises; the benefits and risks that they bring; and the factors that organizations should consider in selecting an enterprise-grade service in order to ensure its security.
Posted: 19 Dec 2014 | Published: 30 Apr 2014

Mimecast

Techniques for Selling IT Services to Senior Level Executives
sponsored by ConnectWise
WHITE PAPER: Access the following ebook to learn about an additional service offering you can sell to your clients that allows you to become part of their internal support team. Read on to learn how you can facilitate collaboration with your client's IT team in ways that benefit you both.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

ConnectWise

Healthcare Email Management: Balancing Security, Compliance, and Cost
sponsored by Mimecast
WHITE PAPER: This white paper discusses a number of email management challenges facing healthcare CIOs, including HITECH and HIPAA compliance, budget constraints, cloud-based email and collaboration technologies, and data security.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Mimecast

Multifactor Authentication Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.
Posted: 16 Dec 2014 | Premiered: 15 Dec 2014

SearchSecurity.com

Adapting to New Data Channels and Improving Performance with Converged Infrastructure
sponsored by Hewlett-Packard Company
WEBCAST: View this in-depth webcast to learn about the "new style" of IT and how you can leverage your staff to overcome the pressures and obstacles presented today. Watch now to discover the path to impact business performance around workforce productivity, business trends and intelligence, and customer acquisition and loyalty in the digital age.
Posted: 05 Dec 2014 | Premiered: Oct 22, 2014

Hewlett-Packard Company

The 2014 Global Cost of Cybercrime Study
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative report distills interviews with senior-level IT personnel about the impact of cybercrime on their organizations in 2014 into trends that apply to every enterprise around the world.
Posted: 19 Nov 2014 | Published: 19 Nov 2014

Hewlett-Packard Company

Expro Minimises Business Risk
sponsored by IBM
WHITE PAPER: This whitepaper explains how Expro engaged Tectrade to assess its backup environment and recommend a suitable backup solution. Get an overview of the solution they chose and its benefits.
Posted: 11 Nov 2014 | Published: 31 Mar 2013

IBM

The Data Center Life Cycle
sponsored by Schneider Electric
VIDEO: Schneider Electric helps you focus on the Data Centre Life Cycle to keep your business agile to innovate and move forward. From assessing to designing and building and operating the data centre, Schneider works alongside you through the lifecycle as many times as you need to go through it.
Posted: 04 Nov 2014 | Premiered: 06 Nov 2013

Schneider Electric

How to Improve HIPAA Compliance, Reduce Costs and Increase Patient Engagement
sponsored by RES Software
WHITE PAPER: What would happen if IT were to learn from clinical healthcare's pursuit of "patient engagement" by creating its own "user engagement" strategies? What would the benefits of doing so be? And what would it take to make it all happen? Read the following brief to find out more.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

RES Software

Extracting the Full Business Value from Cloud Services
sponsored by NaviSite
WHITE PAPER: This white paper proposes that the key to achieving the most value from cloud investments includes considering the impact that they will have throughout an entire organization, and explores real-world customer experiences that examine the true business impact of the cloud.
Posted: 30 Sep 2014 | Published: 30 Sep 2014

NaviSite

Creating a Successful Patch Management Strategy
sponsored by Solarwinds N-able
EGUIDE: In this expert e-Guide, learn how to ensure that your patch management strategy remains secure following the transition from physical to virtual desktops; why delaying security patches puts organizations at risk; and how to build a case for a formal patch management program.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Solarwinds N-able

How Effective Systems Management Can Improve your Infrastructure Speed
sponsored by Dell, Inc. and Intel®
VIDEO: This exclusive video details some systems management tools from Dell that will help improve your IT infrastructure speed.
Posted: 19 Sep 2014 | Premiered: 19 Sep 2014

Dell, Inc. and Intel®

CeBIT: 26-30 March 2015
sponsored by CeBIT
EVENT: Be our guest at CeBIT 2015 - Visit the world's leading IT trade show and conference for professionals.
Posted: 13 Jan 2015 | Published: 13 Jan 2015


How Organizations Are Responding to Mobile and Cloud Threats
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explores the results of a recent survey that sought to elucidate how organizations are adapting their approach to authentication to protect their sensitive assets as they adopt cloud-based services and BYOD.
Posted: 10 Dec 2014 | Published: 15 May 2014

SafeNet, Inc.

Automating Your IT Processes for Long Term Success
sponsored by Automic
WHITE PAPER: Access this white paper to find out if automating certain IT operations can help lessen the burden on your IT staff while simultaneously improving the end user experience.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

Automic

HP Security Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This HP Security Cyber Risk Report provides industry-wide data on vulnerabilities in software, mobile, and web applications; examines how specific technologies like iOS, Android, and JAVA contribute to the attack surface; and more.
Posted: 19 Nov 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

UKTech50: The senior IT event of the year
sponsored by ComputerWeekly.com
EVENT: UKTech50 returns in 2014 for its 5th annual event, highlighting the successes of individuals within UK IT. With a combination of fantastic speakers and the countdown of the top 50, this event never fails to please.
Posted: 18 Nov 2014 | Published: 17 Nov 2014

ComputerWeekly.com

Improving Data Center Performance
sponsored by VMTurbo
EGUIDE: This expert e-guide explores how data centers are evolving to meet increased demands and much more.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

VMTurbo
76 - 100 of 320 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement