Business of Information Technology  >   Business Management  >   Best Practices  >  

Information Technology Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Information Technology Best PracticesReports
 
Combatting APTs with a Defense-in-Depth Security Approach
sponsored by CDW Corporation
WHITE PAPER: This informative white paper contains critical information on why a defense-in-depth security approach has proven effective in protecting organizations' sensitive data from APTs.
Posted: 22 Jul 2014 | Published: 05 Mar 2014

CDW Corporation

AWS Cloud Security
sponsored by CloudPassage
WHITE PAPER: Security and risk professionals should access this Forrester research report to learn about a security solution that provides infrastructure plus a wide set of IT services.
Posted: 29 Aug 2014 | Published: 21 Feb 2014

CloudPassage

The Top 5 Security Challenges of Higher Education
sponsored by Tenable Network Security
WHITE PAPER: This informative white paper discusses how in addition to the same IT security challenges as commercial enterprises, universities face a number of difficulties that are entirely unique to higher education.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

Tenable Network Security

Viewing Application Performance from the End-User Perspective
sponsored by Fluke Networks
WHITE PAPER: This resource introduces Application-Aware Network Performance Management, which quickly identifies the root cause of performance issues within a complex application environment.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Fluke Networks

Managing IT projects for business change. Dealing with trouble.
sponsored by ComputerWeekly.com
PRESENTATION: Jeff Morgan and Chris Dale offer advice on managing unanticipated events that can disrupt IT projects in this extract from their book, Managing IT Projects for Business Change.
Posted: 22 Apr 2014 | Published: 22 Apr 2014

ComputerWeekly.com

The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014

IBM

Top 10 ways that IBM Platform Computing can save you money
sponsored by IBM
WHITE PAPER: Explore this resource to discover the top 10 ways that IBM Platform Computing solutions can help you and your organisation save money.
Posted: 28 Aug 2014 | Published: 28 Feb 2014

IBM

Resolve Performance Issues Within Your Citrix XenApp Environment
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This white paper introduces an innovative application performance management technology that could be very valuable to IT professionals who frequently troubleshoot performance issues across a Citrix server, saving time and taking the guesswork out of the analysis.
Posted: 04 Aug 2014 | Published: 31 Dec 2013

Riverbed Technology, Inc.

It's Time to Mothball Traditional ITSM Approaches
sponsored by Pangea Systems
EGUIDE: In the following expert e-guide from SearchCIO.com, learn how ITSM needs to evolve in order to remain business-aligned, operationally controlled and cost-effective.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Pangea Systems

Leveraging Mobility to Drive Productivity and Provide a Superior IT Service Experience
sponsored by CA Technologies.
WHITE PAPER: This exclusive whitepaper details six ways to introduce mobility into IT service management.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement