IT Management  >  

IT Departments

RSS Feed    Add to Google    Add to My Yahoo!
IT DepartmentsReports
51 - 75 of 182 Matches Previous Page  | Next Page
Gain Enterprise Mobility: Learn How Your Enterprise Can Become Mobile
sponsored by Hewlett-Packard Limited
WHITE PAPER: Access this white paper now to learn more about overall trends in mobility; how enterprise mobility influences the workplace and changes the way in which IT is delivered and consumed; and how to implement mobility in your enterprise.
Posted: 25 Aug 2014 | Published: 30 May 2014

Hewlett-Packard Limited

Top 3 Reasons to Give Insiders a Unified Identity
sponsored by Centrify Corporation
WHITE PAPER: This white paper stresses the importance of recognizing the danger of malicious insiders and the potential for breaches caused by employee error or negligence, as well as the top 3 reasons to consider giving insiders a unified identity.
Posted: 20 Aug 2014 | Published: 31 Dec 2013

Centrify Corporation

E-Guide: Network-Based Application Performance Management Tools for Complex Apps
sponsored by Fluke Networks
EGUIDE: Access this e-guide now for a discussion of new approaches to application performance management and how they can help to share information among multiple IT and applications teams and give increased visibility into network performance.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Fluke Networks

Privacy, Security and Compliance - What You Don’t Know May Just Hurt You
sponsored by NTT Communications ICT Solutions and Hitachi Data Systems
WHITE PAPER: In this document, explore the changing nature and increasing value of data and how organizations are responding to changes in regulation.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

NTT Communications ICT Solutions and Hitachi Data Systems

Securing Enterprise Networks with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EGUIDE: Enterprise networks are increasing in size and complexity, creating a larger attack surface for hackers. This TechGuide walks you through gaining visibility into your network and devising an effective security strategy.
Posted: 14 Aug 2014 | Published: 11 Aug 2014

SearchSecurity.com

Resolve Performance Issues Within Your Citrix XenApp Environment
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This white paper introduces an innovative application performance management technology that could be very valuable to IT professionals who frequently troubleshoot performance issues across a Citrix server, saving time and taking the guesswork out of the analysis.
Posted: 04 Aug 2014 | Published: 31 Dec 2013

Riverbed Technology, Inc.

Increase Visibility With the Help of Unified IT Monitoring
sponsored by CA Technologies.
WHITE PAPER: This informative whitepaper examines the role of unified IT monitoring in simplifying modern IT challenges by bringing infrastructure, application and service level visibility together.
Posted: 01 Aug 2014 | Published: 01 Aug 2014

CA Technologies.

The Help Desk and the Network Operations Center: What MSPs Need and Why
sponsored by N-able Technologies
WHITE PAPER: This helpful resource defines and discusses network operations centers and help desks, including their functions, what differentiates them from one another, how they contribute to a managed service provider's business, and whether or not MSPs should consider outsourcing them.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

N-able Technologies

Reducing Expenses Starts With the Programming Skills of Operations Groups
sponsored by F5 Networks
WHITE PAPER: This white paper explains what programmability and automation could look like within your enterprise, and also provides valuable advice on implementing these concepts.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

F5 Networks

From BlackBerry to BYOD
sponsored by Citrix
WHITE PAPER: This white paper discusses mobile device management tools and other solutions for enterprises in the era of BYOD and mobile device diversity.
Posted: 30 Jul 2014 | Published: 31 Dec 2013

Citrix

Combatting APTs with a Defense-in-Depth Security Approach
sponsored by CDW Corporation
WHITE PAPER: This informative white paper contains critical information on why a defense-in-depth security approach has proven effective in protecting organizations' sensitive data from APTs.
Posted: 22 Jul 2014 | Published: 05 Mar 2014

CDW Corporation

Keeping IT Security Decision-Making on Track
sponsored by CDW Corporation
WHITE PAPER: This resource defines multiple approaches to IT security organization and decision-making that can help companies to determine the most effective ways of functioning in these areas.
Posted: 22 Jul 2014 | Published: 21 Feb 2013

CDW Corporation

Women in Technology 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Are women flourishing in IT ? Find out by downloading the Women in techology report from Computer Weekly and Mortimer Spinks.
Posted: 04 Jul 2014 | Published: 04 Jul 2014

ComputerWeekly.com

Put Your Customers First with Agile, Powerful and Comprehensive IT Monitoring Software
sponsored by CA Nimsoft
WHITE PAPER: This exclusive resource details an IT monitoring solution that can give you're the visibility you need to run an efficient data center.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

CA Nimsoft

Your Guide to Improving IT Service Visibility
sponsored by Pangea Systems
WHITE PAPER: This whitepaper details the importance of IT service visibility for providing the performance your users demand and justifying the value of your services.
Posted: 25 Jun 2014 | Published: 20 Mar 2014

Pangea Systems

Bridging the Business/IT Divide in B2B Integration
sponsored by IBM
WHITE PAPER: This research report presents results from a survey of 360 line of business managers in regards to B2B integration, and also offers recommendations on narrowing the gap between business and IT to maximize returns from B2B integration initiatives.
Posted: 16 Jun 2014 | Published: 30 May 2014

IBM

How the Convergence of Cloud, Big Data, Mobile, and Social Forces Impacts Global Business
sponsored by IBM
WHITE PAPER: This white paper details the results of a survey of IT professionals from around the world regarding the business impact of cloud, big data, mobile, and social forces.
Posted: 16 Jun 2014 | Published: 13 May 2014

IBM

Code Halos – How the digital lives of People, Things, and Organisations are Changing the Rules of Business
sponsored by ComputerWeekly.com
BOOK: This book extract explains how businesses can harness the power of Code Halo's - the data that accumulates around people, devices, and organizations.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

ComputerWeekly.com

Viewing Application Performance from the End-User Perspective
sponsored by Fluke Networks
WHITE PAPER: This resource introduces Application-Aware Network Performance Management, which quickly identifies the root cause of performance issues within a complex application environment.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Fluke Networks

Making the Case for a BYOD Alternative
sponsored by CA Technologies.
WHITE PAPER: Read this white paper to find out why your business should implement COPE and learn how to cut down device chaos, reduce costs, tighten content control, and more!
Posted: 03 Jun 2014 | Published: 30 Jul 2014

CA Technologies.

Hybrid IT: The Best of All Worlds
sponsored by CenturyLink Technology Solutions
WHITE PAPER: Download "Best of All Worlds" now and fast-forward your business' agility with a hybrid IT solution.
Posted: 30 May 2014 | Published: 30 May 2014

CenturyLink Technology Solutions

Enterprise Information Security in Transition
sponsored by IBM
WHITE PAPER: This white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.
Posted: 28 Jul 2014 | Published: 31 Oct 2012

IBM

Exposing the Cybersecurity Cracks: A Global Perspective
sponsored by Websense, Inc.
WHITE PAPER: This eye-opening reviews data collected from nearly 5000 experienced IT workers regarding deficiencies in the ways that their companies attempt to think about, fight, and detect security breaches.
Posted: 01 Jul 2014 | Published: 30 Apr 2014

Websense, Inc.

Harnessing the Power of Unified IT Monitoring
sponsored by CA Technologies.
VIDEO: This informative video details how technology can help you advance IT and your organization to help keep customers coming back.
Posted: 25 Jun 2014 | Premiered: 25 Apr 2014

CA Technologies.

Secure Mobility Survey Findings Report
sponsored by Dimension Data
WHITE PAPER: Find out about the gap that exists between the enterprise mobility vision and real-would implementations, and uncover a complete list of recent survey results.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Dimension Data
51 - 75 of 182 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement