Vertical Industries  >  

IT Industry

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Computer Service Industry, Information and Communications Technology Industry, Information and Communication Technologies Industry, Information Technology Industry, Computer Services Industry, ICT Industry, IT Services Industry, IT Service Industry
DEFINITION: ICT (information and communications technology - or technologies) is an umbrella term that includes any communication device or application, encompassing: radio, television, cellular phones, computer and network hardware and software, satellite systems and so on, as well as the various services and applications associated with them, such as videoconferencing and distance learning. ICTs are often spoken  … 
Definition continues below.
IT IndustryReports
1 - 25 of 113 Matches Previous Page  | Next Page
Getting IT Security Wrong Can Be Costly—How to Balance Investment with Risk
sponsored by Clearswift
WHITE PAPER: This white paper examines why so many executives take little interest in information security; why compliance needs to be combined with a more risk-based approach to security; the importance of creating a security-aware culture; and more.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Clearswift

Are You Fully Prepared for Shellshock?
sponsored by Dell Software
WEBCAST: Join this webinar for technical insight into Shellshock, and learn what you can do to protect networks and Linux-based devices from attacks.
Posted: 25 Nov 2014 | Premiered: Nov 25, 2014

Dell Software

Take Inventory of your Open Source Software Security
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Cobb explains why enterprise development teams should create in-house repositories to mitigate the risks of applications built on open source code.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Hewlett-Packard Company

Update Your Application Security Policy After Heartbleed
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Cobb explains why relying solely on other parties to correctly implement and deliver software security can put enterprise and customer data at risk.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Hewlett-Packard Company

Report Helps Healthcare IT Execs Navigate the Cloud
sponsored by Insight
WHITE PAPER: This white paper summarizes a recent report from the Institute for Health Technology Transformation that addressed the state of cloud computing within the healthcare industry.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Insight

Post Breach Industry Report: A Real-world View of Ongoing Cyber Security Attacks
sponsored by Vectra Networks
WHITE PAPER: This informative report uses real-world data to reveal what attackers do within a network once they evade perimeter defenses.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Vectra Networks

A Closer Look at Cloud and Other Technologies Impact on IT Channel Businesses
sponsored by NaviSite
EGUIDE: This expert e-guide explains how third-platform technologies are transforming the way IT channel companies do business.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

NaviSite

How Data Storage Can Give An Efficiency Boost To Business
sponsored by Peak 10
WHITE PAPER: This white paper proposes that data storage is a good place to establish a "cloud first" mindset, and explores 6 ways in which cloud data storage can reduce spending and reduce IT costs.
Posted: 21 Nov 2014 | Published: 21 Nov 2014

Peak 10

Should I Outsource Infrastructure?
sponsored by Rackspace
WHITE PAPER: In this informative guide, gain the knowledge you need to make a detail, informed assessment of the financial side of the outsourcing decision.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

Rackspace

The Top 5 Security Challenges of Higher Education
sponsored by Tenable Network Security
WHITE PAPER: This informative white paper discusses how in addition to the same IT security challenges as commercial enterprises, universities face a number of difficulties that are entirely unique to higher education.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

Tenable Network Security

The Enemy Within: The Changing Face of Threats to Information Security
sponsored by Clearswift
WHITE PAPER: This white paper discusses the danger that insider threats present to your enterprise, as well as strategies for protecting your company's critical information.
Posted: 21 Oct 2014 | Published: 17 Oct 2014

Clearswift

Secure Access to Sensitive Data on the Move
sponsored by HID
VIDEO: This short video introduces HID Global's ActivID® authentication solutions, which incorporate integrated device identification technology to make location- and risk-based decisions.
Posted: 21 Oct 2014 | Premiered: 21 Oct 2014

HID

Security in the Hybrid Cloud, Now and in 2016
sponsored by F5 Networks
RESOURCE: The infographic illustrates current security practices in the hybrid cloud and investigates where these trends are likely to head by 2016.
Posted: 21 Oct 2014 | Published: 21 Oct 2014

F5 Networks

The Definitive Guide to Managing Cloud Security
sponsored by Cisco & Fujitsu
BOOK: This helpful book serves as a clear and unbiased guide to navigating the complexities of cloud security.
Posted: 17 Oct 2014 | Published: 17 Oct 2014

Cisco & Fujitsu

A Consolidated Platform for Next-Generation Firewall and Secure Web Gateway Services
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper first defines next-generation firewalls, secure web gateways, and their capabilities, and then specifically discusses the Fortinet FortiGate NGFW and the results of ESG Lab's evaluation and testing of the device.
Posted: 16 Oct 2014 | Published: 30 Sep 2014

Fortinet, Inc.

10 Things Every IT Manager Must Know About the Enemy Within
sponsored by Clearswift
WHITE PAPER: This white paper contains critical information on where insider threats originate and explores one company's innovative tools for preventing data breaches within your enterprise.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Clearswift

Cloud Migration: A Security Architect Case Study
sponsored by CenturyLink Technology Solutions
WHITE PAPER: This use case describes CenturyLink's partnership with a global shipping and logistics firm looking to adopt cloud technologies to lower IT support costs and refocus its resources.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

CenturyLink Technology Solutions

Data Loss Prevention Insights from Security Executives
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines findings from a recent study on data loss prevention programs that interviewed 130 CISOs, VPs, directors, and managers.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

Symantec Corporation

Bay Cove Human Services Achieves HIPAA Compliance on Google Apps & BYOD
sponsored by BitGlass
WHITE PAPER: This short white paper details how Bay Cove Human Services collaborated with BitGlass to achieve HIPAA compliance while still enabling the company to utilize Google Apps as their productivity backbone.
Posted: 09 Oct 2014 | Published: 09 Oct 2014


Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

EVERYTHING YOU NEED TO KNOW ABOUT CLOUD-BASED FILE SHARING
sponsored by Novell, Inc.
EGUIDE: In this expert e-guide, examine the technology and various considerations associated with leveraging cloud-based file sharing. Learn about the technology's advantages and weaknesses as well as the common question – can cloud file sharing replace data backup?
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Novell, Inc.

Five Security Considerations in the Mobile Age
sponsored by IBM
WHITE PAPER: This white paper enumerates five security considerations for enterprises in the mobile age and provides a thorough introduction to enterprise mobile applications.
Posted: 07 Oct 2014 | Published: 31 Dec 2012

IBM

Give Your Users What They Want with Cloud and Mobile
sponsored by IBM
WEBCAST: This informative webcast discusses how moving to the cloud can accelerate mobile adoption, as well as how to combine the power of cloud with the freedom and functionality of mobile.
Posted: 07 Oct 2014 | Premiered: Oct 7, 2014

IBM

HP Security Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This HP Security Cyber Risk Report provides industry-wide data on vulnerabilities in software, mobile, and web applications; examines how specific technologies like iOS, Android, and JAVA contribute to the attack surface; and more.
Posted: 19 Nov 2014 | Published: 31 Jan 2014

Hewlett-Packard Company
1 - 25 of 113 Matches Previous Page    1 2 3 4    Next Page
 
IT INDUSTRY DEFINITION (continued): …  of in a particular context, such as ICTs in education, health care, or libraries. The term is somewhat more common outside of the United States. According to the European Commission, the importance of ICTs lies less in the technology itself than in its ability to create greater access to information and communication in underserved populations. Many countries around the world have established organizations for the promotion of ICTs, because it is feared that unless less technologically advanced areas have a chance to catch up, the increasing technological advances in developed nations will only … 
IT Industry definition sponsored by SearchCIO-Midmarket.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement