IT Management  >  

IT Governance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Information Technology Governance, Governance
DEFINITION: IT governance is a structure of processes that govern decision making around investment decisions, client relationships, project management and other important IT operational areas.
IT Governance Reports
1 - 25 of 150 Matches Previous Page  |  Next Page
15 Top-Paying IT Certifications for 2015
sponsored by Global Knowledge
WHITE PAPER: Take a look at some of the top-paying certifications as determined by the more than 11,000 responses to our 2015 IT Skills and Salary Survey of your peers across North America. Certifications in IT security, networking, and systems management are at the top of the certification pay scale.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

Global Knowledge

Envisioning and Enabling the Next Generation Enterprise
sponsored by Jive Software
WEBCAST: This webcast covers what it takes to envision and enable a next generation enterprise by considering much of the new technology that is flowing through the market. Learn how the CIO must change and adapt to meet new technology pressures and ultimately, give way to the next generation enterprise.
Posted: 17 Feb 2015 | Premiered: Feb 17, 2015

Jive Software

A Five Step Manifesto for Successful IT Modernization
sponsored by Colt IT Services
WHITE PAPER: This white paper discusses five critical steps modern CIOs need to take in order to overcome the process- and culture-oriented challenges faced when attempting to modernize IT environments.
Posted: 13 Feb 2015 | Published: 13 Feb 2015

Colt IT Services

How IPL’s Enterprise Architecture work helps remedy complex council IT environments
sponsored by IPL
CASE STUDY: This case study explores how IPL's enterprise architecture work can help remedy complex and inefficient webs of technology that often occur as a result of constantly onboarding new technology.
Posted: 05 Feb 2015 | Published: 05 Feb 2015

IPL

IBM InfoSphere Guardium: Manage the Entire Data Security and Compliance Lifecycle
sponsored by IBM
WHITE PAPER: This white paper introduces a robust solution from IBM capable of safeguarding your enterprise's data across all enterprise systems and data center environments.
Posted: 03 Feb 2015 | Published: 31 Oct 2013

IBM

Transform Your Risk, Security, and Compliance Results into Business Insight
sponsored by Allgress
WHITE PAPER: This concise white paper introduces an IT GRC suite that enables risk, security, and compliance professionals to efficiently manage their enterprise's risk posture with quick time-to-value.
Posted: 20 Jan 2015 | Published: 20 Jan 2015

Allgress

5 Steps to Reduce the Complexity of PCI Security Assessments
sponsored by Bit9 + Carbon Black
WHITE PAPER: This white paper lists 5 steps that your enterprise can take to guard your endpoints; reduce the complexity of assessments; lower administration costs; and achieve a compliant, secure environment.
Posted: 14 Jan 2015 | Published: 06 Oct 2014

Bit9 + Carbon Black

A Prescription for Privacy
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines the challenges surrounding the emerging world of EHR technology, including the requirements that govern the protection of confidential patient data online; the measures that organizations need to take right now to prepare for these upcoming changes to the healthcare industry; and more.
Posted: 14 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

Case Study: Levi Strauss & Co. Gets Comfortable with Simpana Software
sponsored by CommVault
VIRTUAL TRADESHOW: Watch this video to learn what Levi Strauss' VP and CTO Bart Hecht thinks about CommVault.
Posted: 30 Dec 2014 | Premiered: Feb 2, 2012

CommVault

The Compliance and Security Balancing Act
sponsored by Mimecast
EGUIDE: In this expert guide, Karen Scarfone provides several practical tips on technologies that improve enterprise email security, and Christine Parizo discusses how to strike an ideal balance between compliance and security, when "compliant" doesn't necessarily mean "secure."
Posted: 22 Dec 2014 | Published: 22 Dec 2014

Mimecast

Email Archives: Why Old Solutions Aren't Sufficient for Modern Enterprises
sponsored by Mimecast
WHITE PAPER: This white paper examines the difficulties that organizations encounter as they seek a solution to ever-increasing volumes of stored emails and the need for faster, more flexible accessibility to this data.
Posted: 19 Dec 2014 | Published: 31 May 2013

Mimecast

Reduce IT Complexity – Optimize Infrastructure – Ensure Regulatory Compliance
sponsored by EMC Corporation
WHITE PAPER: Read the following white paper to learn about the information dilemma that is facing nearly every organization and how by optimizing IT infrastructure, you can ensure regulatory compliance, reduce complexity, and improve operations. Access now to learn the steps you can take to reach these benefits.
Posted: 19 Dec 2014 | Published: 19 Dec 2014

EMC Corporation

Healthcare Email Management: Balancing Security, Compliance, and Cost
sponsored by Mimecast
WHITE PAPER: This white paper discusses a number of email management challenges facing healthcare CIOs, including HITECH and HIPAA compliance, budget constraints, cloud-based email and collaboration technologies, and data security.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Mimecast

Is Your Identity Management Infrastructure a Mess?
sponsored by Radiant Logic, Inc.
WHITE PAPER: This infographic depicts the reasons behind identity management challenges, the impact that they have on organizations, and what your enterprise needs to do to confront these issues head-on.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Radiant Logic, Inc.

How HPA improved IT value and facilitated maximum growth
sponsored by Cisco & Fujitsu
VIDEO: Hutchison Ports Australia is developing new facilities at Brisbane and expects that when fully operational, these facilities will increase capacity by almost 100 per cent, providing importers, exporters and shipping lines with more choice and better service. View this video to see how Fujitsu is helping them achieve these goals.
Posted: 24 Oct 2014 | Premiered: 24 Oct 2014

Cisco & Fujitsu

Big Data, Move it up the Value Chain
sponsored by Rackspace
WHITE PAPER: The following article examines the challenge of moving IT up the value chain and explores how with a 3 step approach to big data, you can do so easily as well as increase operational efficiency, customer service delivery, and more.
Posted: 06 Oct 2014 | Published: 06 Oct 2014

Rackspace

Identity Management Challenges in an Increasingly Complex IT Environment
sponsored by Radiant Logic, Inc.
WHITE PAPER: This resource points out how organizations continue to struggle with identity management in such key areas as safeguarding against security breaches, enabling single sign-on for the extended organization, and automating key tasks instead of relying on manual intervention.
Posted: 30 Sep 2014 | Published: 30 Sep 2014

Radiant Logic, Inc.

Chasing and Attaining the Goal of Zero Downtime
sponsored by SUSE
RESEARCH CONTENT: In this expert resource, explore the findings of a recent research report on how successful organizations are  identifying causes of downtime and attempting to achieve "zero downtime."
Posted: 31 Aug 2014 | Published: 30 Aug 2014

SUSE

Harnessing Business-Led IT
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: CIOs should treat business-led IT ("Shadow IT") as another, often better, way to achieve the core goals of Corporate IT, this report from CEB argues
Posted: 22 Aug 2014 | Published: 22 Aug 2014

ComputerWeekly.com

Research snapshot – BYOD in the UK
sponsored by ComputerWeekly.com
EBRIEF: BYOD is fast becoming a normal part of daily business life in the UK, this snapshot survey of 100 UK businesses by Vanson Bourne reveals.
Posted: 15 Aug 2014 | Published: 15 Aug 2014

ComputerWeekly.com

Use Analytics to Find Problems and Avoid Outages
sponsored by IBM
WEBCAST: Tune into the following webinar to learn how IBM can help you with operations, performance, analytics, automation and delivery of your IT services in today's complex on-premises, hybrid, and cloud environments.
Posted: 24 Oct 2014 | Premiered: Oct 24, 2014

IBM

Manage Change & Enable Agility like a Superhero with Automated IT Service and Asset Management
sponsored by IBM
WEBCAST: Tune into the following webcast to hear from 9 brilliant minds as they reveal the secrets to optimizing IT and Service management through the use of cloud virtual environments.
Posted: 24 Oct 2014 | Premiered: Oct 24, 2014

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

How SIEM Helps IT Security, Compliance, Operations and Management
sponsored by CDW Corporation
WHITE PAPER: Security information and event management (SIEM) tools offer more than just security. In fact, many organizations overlook some of the most useful aspects of SIEM technology, including fraud prevention and operations management. In this expert resource, discover the value of SIEM tools for four different audiences.
Posted: 12 Sep 2014 | Published: 12 Sep 2014

CDW Corporation
1 - 25 of 150 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement