Vertical Industries  >  

IT Industry

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Computer Service Industry, Information and Communications Technology Industry, Information and Communication Technologies Industry, Information Technology Industry, Computer Services Industry, ICT Industry, IT Services Industry, IT Service Industry
DEFINITION: ICT (information and communications technology - or technologies) is an umbrella term that includes any communication device or application, encompassing: radio, television, cellular phones, computer and network hardware and software, satellite systems and so on, as well as the various services and applications associated with them, such as videoconferencing and distance learning. ICTs are often spoken  … 
Definition continues below.
IT Industry Reports
1 - 25 of 147 Matches Previous Page  |  Next Page
Best Practices for Selecting a Web Application Scanning (WAS) Solution
sponsored by Qualys
WHITE PAPER: This white paper explains how a Web Application Scanning solution can help you to locate and test web-based apps, and provides a checklist of best practices that will help you to understand what to look for when selecting a WAS solution.
Posted: 23 Jan 2015 | Published: 16 May 2013

Qualys

APTs: Why the Best Defense is a Full Spectrum Offense
sponsored by Zscaler
WHITE PAPER: This white paper provides answers to all of your questions about advanced persistent threats, from the APT lifecycle to the best ways to evaluate potential APT defense solutions.
Posted: 23 Jan 2015 | Published: 23 Jan 2015

Zscaler

Learn About Each Module of the Allgress Insight Risk Management Suite
sponsored by Allgress
WHITE PAPER: This white paper introduces a risk management suite that enables security professionals to apply business context to security and compliance management. It also empowers business stakeholders to make informed investment decisions that align with top business priorities.
Posted: 23 Jan 2015 | Published: 23 Jan 2015

Allgress

La-Z-Boy Incorporated
sponsored by Zscaler
CASE STUDY: This case study describes how La-Z-Boy partnered with Zscaler to reduce bandwidth costs and complexity while increasing the visibility of web activity.
Posted: 23 Jan 2015 | Published: 23 Jan 2015

Zscaler

Istanbul Kultur University: Ready for the Future
sponsored by Hewlett-Packard Limited
CASE STUDY: Check out this case study that profiles one university in particular that needed to replace an ageing network infrastructure to accommodate high-performance wireless solutions.
Posted: 22 Jan 2015 | Published: 01 Nov 2014

Hewlett-Packard Limited

Infographic: Is Your DNS Really Protected?
sponsored by Cloudmark
RESOURCE: View this informative infographic now to learn more about the consequences of DNS attacks, and how you can prevent them within your enterprise.
Posted: 22 Jan 2015 | Published: 22 Jan 2015

Cloudmark

Engage Audit Professionals for Better Security Assessment Outcomes
sponsored by IBM
WHITE PAPER: This white paper explains how to leverage your internal audit team's resources and expertise to develop a more efficient, sustainable compliance program
Posted: 22 Jan 2015 | Published: 26 Jun 2013

IBM

Web Application Firewall Comparative Analysis
sponsored by Citrix
WHITE PAPER: This valuable resource compares the security effectiveness and value of six web application firewalls (WAFs).
Posted: 22 Jan 2015 | Published: 22 Jan 2015

Citrix

The Enemy Within: Why Insiders Are Still the Weakest Link in Your Data Security Chain
sponsored by Absolute Software
WHITE PAPER: This white paper describes the 5 steps that your enterprise needs to take in order to foster a conscientious data security environment within your enterprise, despite the challenges of the digital era.
Posted: 21 Jan 2015 | Published: 29 Dec 2014

Absolute Software

A Quick Guide to SSL for Apps
sponsored by Symantec Corporation
WHITE PAPER: This white paper lists the steps that your enterprise needs to take in order to create a stronger, more trustworthy SSL implementation.
Posted: 20 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

What to Consider When Formulating an Enterprise Mobile Security Strategy
sponsored by BlackBerry
EGUIDE: In this e-guide, Moriah Sargent explains why mobile device security policies should be revisited and revised often. In addition, Zeus Kerravala discusses essential enterprise security controls for the increasing amount of high-value information stored on mobile devices.
Posted: 20 Jan 2015 | Published: 20 Jan 2015

BlackBerry

Wildcard and SAN: Understanding Multi-Use SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: Find out about how Multi-Use SSL Certificates such as Wildcard and SAN certificates can provide greater flexibility to simplify certificate management and reduce costs.
Posted: 20 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

SSL for Apps: Best Practices for Developers
sponsored by Symantec Corporation
WHITE PAPER: This white paper lists the necessary steps that your enterprise needs to take in order to create a stronger, more trustworthy SSL implementation.
Posted: 20 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Securing the Future of Trust on the Internet
sponsored by Symantec Corporation
WHITE PAPER: This white paper explains why public key infrastructure (PKI) is the key to the future of trust on the Internet, and the steps that must be taken to build a stronger, more trustworthy PKI ecosystem.
Posted: 20 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

To Increase Downloads, Instill Trust First
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, learn how code signing mitigates the risks of transferring code over the Internet or wireless networks, and also allows end users to take advantage of the ease and convenience of content distribution without worrying about security consequences.
Posted: 20 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Transform Your Risk, Security, and Compliance Results into Business Insight
sponsored by Allgress
WHITE PAPER: This concise white paper introduces an IT GRC suite that enables risk, security, and compliance professionals to efficiently manage their enterprise's risk posture with quick time-to-value.
Posted: 20 Jan 2015 | Published: 20 Jan 2015

Allgress

Spoofing Server-Server Communication: How You Can Prevent It
sponsored by Symantec Corporation
WHITE PAPER: In this must-read white paper, you'll learn how to prevent the new SSL Strip threat that could compromise your secure applications.
Posted: 19 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Why IT Leaders Should Take Strategic Action in Mobile and Endpoint Computing in 2015
sponsored by Absolute Software
WHITE PAPER: This white paper explains why enterprises should develop a broader-based, long-term endpoint strategy that connects to business goals, processes, and practices.
Posted: 19 Jan 2015 | Published: 25 Apr 2014

Absolute Software

Point of Sale (POS) Systems and Security
sponsored by Bit9 + Carbon Black
WHITE PAPER: This white paper explains why organizations need more than the PCI DSS compliance stamp in order to truly secure their POS systems; describes how to secure your POS systems against common attacks; and discusses the Council on CyberSecurity's top 20 suggestions for protecting payment card information.
Posted: 16 Jan 2015 | Published: 31 Oct 2014

Bit9 + Carbon Black

A Holistic Approach to Data Privacy
sponsored by Hewlett-Packard Limited & Intel® (Procesor Intel® Xeon®)
WHITE PAPER: This white paper makes a case for a holistic approach to privacy within every enterprise, and explains the steps that your enterprise needs to take in order to maximize the privacy of your sensitive data.
Posted: 16 Jan 2015 | Published: 30 Sep 2013

Hewlett-Packard Limited & Intel® (Procesor  Intel® Xeon®)

Protecting Against Web Application Threats Using SSL
sponsored by Symantec Corporation
WHITE PAPER: In this shortcut guide, readers will learn how changes in the way we deliver services, the increasing use of mobile devices, the adoption of cloud computing compounded by the ever-evolving means of stealing information and compromising services leave web applications vulnerable to attack.
Posted: 15 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Executive’s Guide to Windows Server 2003 End of Life
sponsored by Bit9 + Carbon Black
WHITE PAPER: This white paper aims to help executives navigate the process of creating and implementing an End of Life plan for Windows Server 2003.
Posted: 15 Jan 2015 | Published: 07 Nov 2014

Bit9 + Carbon Black

Point-of-Sale Security for Dummies
sponsored by Bit9 + Carbon Black
BOOK: This eBook will teach you how to secure your POS systems, minimize your risk, achieve PCI DSS compliance, protect cardholder data, and more.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

Bit9 + Carbon Black

Protecting Users from Firesheep and other Sidejacking Attacks with SSL
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the Firesheep Wi-Fi attack tool and other sidejacking attacks with SSL and explains how to avoid these attacks.
Posted: 15 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

How Extended Validation SSL Brings Confidence to Online Sales and Transactions
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the importance of increasing customer confidence in the security of online business transactions, and introduces Symantec Extended Validation SSL Certificates as a potential solution to this challenge.
Posted: 15 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation
1 - 25 of 147 Matches Previous Page    1 2 3 4    Next Page
 
IT INDUSTRY DEFINITION (continued): …  of in a particular context, such as ICTs in education, health care, or libraries. The term is somewhat more common outside of the United States. According to the European Commission, the importance of ICTs lies less in the technology itself than in its ability to create greater access to information and communication in underserved populations. Many countries around the world have established organizations for the promotion of ICTs, because it is feared that unless less technologically advanced areas have a chance to catch up, the increasing technological advances in developed nations will only … 
IT Industry definition sponsored by SearchCIO-Midmarket.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement