IT Agents  >   IT Workforce  >   Information Technology Professionals  >  

IT Managers

RSS Feed    Add to Google    Add to My Yahoo!
IT Managers Reports
26 - 50 of 356 Matches Previous Page  |  Next Page
Casting A Light on Shadow IT
sponsored by VMware
RESOURCE: Learn everything you need to know about shadow IT in this informative info graphic. Shed light on common motivations for practicing shadow IT and learn how you can better manage this phenomenon within your organization.
Posted: 30 Jun 2015 | Published: 30 Jun 2015


Edge for IT Leaders
sponsored by Unisys
VIDEO: This video explains how users can have access to end-to-end services and a cloud-based ITSM solution that features a real time business service impact dashboard.
Posted: 10 Jun 2015 | Premiered: 10 Jun 2015


Collaboration Tools Case Study: Kingsley Napley
sponsored by IntraLinks, Inc
CASE STUDY: Access this short case study to see what was successful for Kingsley Napley law firm to provide the sharing capabilities required by a large, diverse enterprise.
Posted: 01 May 2015 | Published: 31 Dec 2014

IntraLinks, Inc

Insights: 2015 Infrastructure Imperatives
sponsored by Hewlett-Packard Company
WHITE PAPER: This in-depth white paper examines the results of a survey of over 1,200 senior IT and line-of-business decision makers in order to determine how today's digital leaders are leveraging IT infrastructure in a way that increases revenue streams, creates faster time-to-market and increases profitability.
Posted: 29 Apr 2015 | Published: 29 Apr 2015

Hewlett-Packard Company

2015 Report: Profiling Infrastructure Leaders
sponsored by Hewlett-Packard Company
WHITE PAPER: This report, based on findings from a December 2014 through January 2015 survey, examines who can be considered the leaders, mainstream players and laggards in modern digital asset management by taking a close look at the most successful (and least successful) management practices. Learn where today's organizations stand.
Posted: 27 Apr 2015 | Published: 27 Apr 2015

Hewlett-Packard Company

Data-driven enterprise infrastructure
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this white paper to learn how big data is enabling IT to cater to customer and business needs. Discover why the right infrastructure is essential to harnessing the power of big data to build your brand to the fullest potential. Assess your business' infrastructure and your readiness to harness the power of big data now.
Posted: 23 Apr 2015 | Published: 28 Feb 2015

Hewlett-Packard Company

How Will Digital Transformation and the New Style of IT Impact Your Business?
sponsored by Hewlett-Packard Limited
VIDEO: In this video, Paul Evans, an expert on application transformation at HP, explains the keys to keeping pace with growing end user expectations for instantaneous, relevant, and robust customer experiences.
Posted: 15 Apr 2015 | Premiered: 30 Dec 2014

Hewlett-Packard Limited

Accelerate the Development and Performance of Your Applications
sponsored by Red Hat
PRODUCT OVERVIEW: This resource explores how updated middleware infrastructure can enable your enterprise to accelerate the development and performance of applications; integrate diverse applications, data, and devices; automate business processes and decisions; and more.
Posted: 13 Apr 2015 | Published: 14 Jun 2013

Red Hat

Infographic: The UK’s Evolving BYOD Strategies
sponsored by Dell, Inc.
WHITE PAPER: Access this informative infographic to uncover useful statistics uncovered by computer technology researchers regarding security concerns relevant to BYOD strategies.
Posted: 13 Apr 2015 | Published: 31 Dec 2014

Dell, Inc.

How one Australian Company Built Efficiencies Around their All-Star Team
sponsored by ConnectWise
WHITE PAPER: This white paper describes how IT solution provider PowerNET implemented an integrated business process management and sales analytics system to create profitability through efficiency.
Posted: 19 Feb 2015 | Published: 19 Feb 2015


Optimizing Enterprise Security: Intelligence, Control, and Response
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explores the factors that make network security management and operations more difficult today than ever before.
Posted: 17 Feb 2015 | Published: 28 Nov 2014

ForeScout Technologies, Inc.

Defending Against Rogue Users, Devices, and Applications
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explains how NAC technologies help to ensure that only appropriate users, devices, and applications have access to your network resources, enabling you to support your users in a secure, efficient way.
Posted: 17 Feb 2015 | Published: 29 Aug 2014

ForeScout Technologies, Inc.

Network Access Control: Navigating the Crowded Market
sponsored by ForeScout Technologies, Inc.
ANALYST REPORT: This analyst report from Gartner evaluates and compares 10 top network access control (NAC) vendors. Read on to learn the strengths and weaknesses of each vendor in order to discover which NAC vendor is the best fit for your enterprise's network security needs.
Posted: 16 Feb 2015 | Published: 10 Dec 2014

ForeScout Technologies, Inc.

4 Data Traffic Security Challenges Exposing Enterprises to Hack Attacks
sponsored by Certes Networks
WHITE PAPER: This white paper discusses the 4 major points of weakness that your enterprise needs to prioritize in 2015 in order to defend your business-critical data from hackers.
Posted: 12 Feb 2015 | Published: 22 Jan 2015

Certes Networks

Recognizing Five Sources of High-Profile Data Security Breaches
sponsored by Mimecast
WHITE PAPER: This white paper discusses the 5 major categories of vulnerabilities that IT and security professionals need to account for in their solutions planning.
Posted: 06 Feb 2015 | Published: 06 Feb 2015


Applying the Top 20 Critical Security Controls to the Cloud
sponsored by CloudPassage
WEBCAST: This webcast discusses how enterprises can apply the 20 Critical Security Controls for Effective Cyber Defense, a list of best practices for IT security, to the new reality of cloud-based or virtualized infrastructures.
Posted: 06 Feb 2015 | Premiered: Feb 6, 2015


Infographic: Data Traffic Security is a Mess
sponsored by Certes Networks
WHITE PAPER: This infographic visually displays the sobering results of a recent survey on what are IT decision makers doing to secure and segment their sensitive data traffic.
Posted: 09 Jan 2015 | Published: 09 Jan 2015

Certes Networks

The Compliance and Security Balancing Act
sponsored by Mimecast
EGUIDE: In this expert guide, Karen Scarfone provides several practical tips on technologies that improve enterprise email security, and Christine Parizo discusses how to strike an ideal balance between compliance and security, when "compliant" doesn't necessarily mean "secure."
Posted: 22 Dec 2014 | Published: 22 Dec 2014


Email Archives: Why Old Solutions Aren't Sufficient for Modern Enterprises
sponsored by Mimecast
WHITE PAPER: This white paper examines the difficulties that organizations encounter as they seek a solution to ever-increasing volumes of stored emails and the need for faster, more flexible accessibility to this data.
Posted: 19 Dec 2014 | Published: 31 May 2013


Take Back Control: OEM Maintenance and Life Cycle Myths Exposed
sponsored by Curvature
VIDEO: Watch this video to learn about upgrade myths and how your organization can take advantage of support and equipment alternatives.
Posted: 28 Apr 2015 | Premiered: 04 Dec 2014


Profiling an Enigma: The Mystery of North Korea’s Cyber Threat Landscape
sponsored by Hewlett-Packard Company
WHITE PAPER: This highly interesting resource delves into North Korea's cyber threat landscape, deeply analyzing what is known about the regime's capabilities and motives, which are largely shrouded in secrecy.
Posted: 05 Feb 2015 | Published: 29 Aug 2014

Hewlett-Packard Company

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014


Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data

Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, you'll learn why SSL-based security platforms with solid track records of meeting new challenges are the best way to defend and future-proof e-commerce environments against a growing and dynamic internet threat environment.
Posted: 12 Jan 2015 | Published: 13 Feb 2014

Symantec Corporation

Customer Testimonial: Levi's
sponsored by Commvault
VIRTUAL TRADESHOW: Watch this video to learn what Levi Strauss' VP and CTO Bart Hecht thinks about CommVault.
Posted: 30 Dec 2014 | Premiered: Feb 2, 2012

26 - 50 of 356 Matches Previous Page    1 2 3 4 5    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement