Vertical Industries  >  

IT Industry

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Computer Service Industry, Information and Communications Technology Industry, Information and Communication Technologies Industry, Information Technology Industry, Computer Services Industry, ICT Industry, IT Services Industry, IT Service Industry
DEFINITION: ICT (information and communications technology - or technologies) is an umbrella term that includes any communication device or application, encompassing: radio, television, cellular phones, computer and network hardware and software, satellite systems and so on, as well as the various services and applications associated with them, such as videoconferencing and distance learning. ICTs are often spoken  … 
Definition continues below.
IT Industry Reports
1 - 25 of 182 Matches Previous Page  |  Next Page
Extracting the Full Business Value from Cloud Services
sponsored by NaviSite
WHITE PAPER: This white paper proposes that the key to achieving the most value from cloud investments includes considering the impact that they will have throughout the entire organization, and explores real-world customer experiences that examine the true business impact of the cloud.
Posted: 03 Mar 2015 | Published: 30 Sep 2014

NaviSite

Smarter IT – Optimize IT Delivery, Accelerate Innovation
sponsored by IBM
WHITE PAPER: Access this informative resource to learn how you can optimize your IT delivery to accelerate innovation—regardless of whether it's on-premise, in the cloud, or hybrid operations.
Posted: 23 Feb 2015 | Published: 31 Oct 2014

IBM

How one Australian Company Built Efficiencies Around their All-Star Team
sponsored by ConnectWise
WHITE PAPER: This white paper describes how ConnectWise, a leading business management platform, enabled Australian-based IT solution provider PowerNET to create profitability through efficiency and make sales predictable.
Posted: 19 Feb 2015 | Published: 19 Feb 2015

ConnectWise

Collaboration and Social Media in the Pharmaceutical Industry
sponsored by Actiance
WHITE PAPER: This white paper is an excellent resource for pharmaceutical companies weighing the benefits and risks of social media. Read on to learn what the pharmaceutical industry's regulatory landscape looks like, and which concerns you should be aware of from a legal perspective.
Posted: 17 Feb 2015 | Published: 11 Jul 2014

Actiance

Social Media Risks and Benefits for the Pharmaceutical Industry
sponsored by Actiance
WHITE PAPER: This white paper discusses the push and pull that pharmaceutical companies feel between utilizing social networks to improve business results, and meeting the regulatory requirements of agencies like the FDA for the use of these networks.
Posted: 17 Feb 2015 | Published: 11 Jul 2014

Actiance

Magic Quadrant for Network Access Control
sponsored by ForeScout Technologies, Inc.
ANALYST REPORT: This analyst report from Gartner evaluates and compares 10 top network access control (NAC) vendors. Read on to learn the strengths and weaknesses of each vendor in order to discover which NAC vendor is the best fit for your enterprise's network security needs.
Posted: 16 Feb 2015 | Published: 10 Dec 2014

ForeScout Technologies, Inc.

North Korea and the Attack on Sony Pictures Entertainment
sponsored by Hewlett-Packard Company
WHITE PAPER: While the FBI has named North Korea as a culprit in the significant breach on Sony Pictures Entertainment in 2014, it's still possible that the regime didn't act alone. This resource discusses the critical threat intelligence issues that the breach highlights; analyzes North Korea's purported involvement and motivation; and much more.
Posted: 13 Feb 2015 | Published: 19 Dec 2014

Hewlett-Packard Company

Gartner Identity & Access Management Summit 2015
sponsored by Gartner
EVENT: At Gartner Identity & Access Management Summit, taking place on March 16 & 17 in London, you'll gain the insight you need to address complex IAM issues. Click through now to register and view the full agenda and speaker line-up for the summit.
Posted: 13 Feb 2015 | Published: 16 Jan 2015

Gartner

4 Data Traffic Security Challenges Exposing Enterprises to Hack Attacks
sponsored by Certes Networks
WHITE PAPER: This white paper discusses the 4 major points of weakness that your enterprise needs to prioritize in 2015 in order to defend your business-critical data from hackers.
Posted: 12 Feb 2015 | Published: 22 Jan 2015

Certes Networks

The Current State of Security Operations Around the World
sponsored by Hewlett-Packard Company
WHITE PAPER: This report summarizes the results of a recent HP assessment of the capabilities of 87 security operations centers worldwide. Read on to learn the latest trends in security defenses and operations, the attributes of the most effective organizations, and much more.
Posted: 12 Feb 2015 | Published: 30 Jan 2015

Hewlett-Packard Company

The IT Infrastructure Conversation: How To Prepare For the Next Generation of IT Needs
sponsored by IBM
WHITE PAPER: Access this valuable resource to learn more about conversation surrounding IT infastructures and how you can work to prepare your IT workers for the next-generation of new content, new participants, and new tone.
Posted: 12 Feb 2015 | Published: 31 Jul 2014

IBM

Implement a Proactive Strategy for Data Security
sponsored by IBM
WHITE PAPER: Access this white paper to learn the 5 key findings of a recent Forrester study that evaluated data security decision-making by security buyers and influencers, and what it means to engage in proactive data security and privacy efforts.
Posted: 10 Feb 2015 | Published: 30 Sep 2014

IBM

The New Rules of Data Security: Best Practices to Secure Data and Ensure Compliance
sponsored by IBM
VIRTUAL ENVIRONMENT: This virtual environment contains 4 informative webcasts discussing the new rules of data security.
Posted: 09 Feb 2015 | Premiered: 29 Jan 2015

IBM

Recognizing Five Sources of High-Profile Data Security Breaches
sponsored by Mimecast
WHITE PAPER: This white paper discusses the 5 major categories of vulnerabilities that IT and security professionals need to account for in their solutions planning.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

Mimecast

The Top 5 Security Goal Challenges
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative resource distills the reports and opinions of 300 IT decision-makers into a realistic picture of the current state of software security in enterprises across a range of industries.
Posted: 06 Feb 2015 | Published: 31 Oct 2014

Hewlett-Packard Company

Applying the Top 20 Critical Security Controls to the Cloud
sponsored by CloudPassage
WEBCAST: This webcast discusses how enterprises can apply the 20 Critical Security Controls for Effective Cyber Defense, a list of best practices for IT security, to the new reality of cloud-based or virtualized infrastructures.
Posted: 06 Feb 2015 | Premiered: Feb 6, 2015

CloudPassage

Profiling an Enigma: The Mystery of North Korea’s Cyber Threat Landscape
sponsored by Hewlett-Packard Company
WHITE PAPER: This highly interesting resource delves into North Korea's cyber threat landscape, deeply analyzing what is known about the regime's capabilities and motives, which are largely shrouded in secrecy.
Posted: 05 Feb 2015 | Published: 29 Aug 2014

Hewlett-Packard Company

Why Outsourcing CRM Doesn't Mean That You Can Outsource Data Protection
sponsored by BitGlass
WHITE PAPER: This white paper explains why enterprises utilizing cloud applications like Salesforce should consider investing in a cloud access security broker, which restores data protection and visibility to your IT team while respecting user privacy.
Posted: 05 Feb 2015 | Published: 05 Feb 2015

BitGlass

How to Bolster Office 365's Built-In Security Functionality
sponsored by BitGlass
WHITE PAPER: This white paper explains how you can bolster Office 365's built-in security functionality with a comprehensive, in-house security plan, and lists the key areas that your enterprise has to address.
Posted: 04 Feb 2015 | Published: 31 Dec 2014

BitGlass

Case Study: Public School Implements Identity Solution to Centralize Management and Increase Security
sponsored by Centrify Corporation
WHITE PAPER: This case study details how the Grand Island school district in Nebraska implemented the Centrify for Mac and Mobile solution for integration into a centralized IAM framework to handle authorization and authentication district-wide.
Posted: 04 Feb 2015 | Published: 30 Aug 2013

Centrify Corporation

Few Businesses Feel Fully Prepared for Software Security Risks
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper reveals the results of a recent survey that explored enterprises' confidence in the security of the software that runs their businesses.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

Hewlett-Packard Company

The Definitive Guide to Cloud Access Security Brokers
sponsored by BitGlass
WHITE PAPER: This white paper discusses Cloud Access Security Brokers (CASBs) as a potential solution for enterprises looking to safely enable cloud apps and mobile devices.
Posted: 04 Feb 2015 | Published: 29 Aug 2014

BitGlass

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

Office 365: How Bitglass Restores Visibility and Data Protection to IT
sponsored by BitGlass
WHITE PAPER: This white paper presents a potential solution for the security and compliance issues raised by Office 365, enabling enterprises to secure their data outside of the firewall while maintaining user privacy.
Posted: 03 Feb 2015 | Published: 03 Feb 2015

BitGlass

IBM InfoSphere Guardium: Manage the Entire Data Security and Compliance Lifecycle
sponsored by IBM
WHITE PAPER: This white paper introduces a robust solution from IBM capable of safeguarding your enterprise's data across all enterprise systems and data center environments.
Posted: 03 Feb 2015 | Published: 31 Oct 2013

IBM
1 - 25 of 182 Matches Previous Page    1 2 3 4    Next Page
 
IT INDUSTRY DEFINITION (continued): …  of in a particular context, such as ICTs in education, health care, or libraries. The term is somewhat more common outside of the United States. According to the European Commission, the importance of ICTs lies less in the technology itself than in its ability to create greater access to information and communication in underserved populations. Many countries around the world have established organizations for the promotion of ICTs, because it is feared that unless less technologically advanced areas have a chance to catch up, the increasing technological advances in developed nations will only … 
IT Industry definition sponsored by SearchCIO-Midmarket.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement