IT Management  >  

Information Technology Departments

RSS Feed    Add to Google    Add to My Yahoo!
Information Technology DepartmentsReports
 
Hybrid IT: The Best of All Worlds
sponsored by CenturyLink Technology Solutions
WHITE PAPER: Download "Best of All Worlds" now and fast-forward your business' agility with a hybrid IT solution.
Posted: 30 May 2014 | Published: 30 May 2014

CenturyLink Technology Solutions

Creating a Successful Patch Management Strategy
sponsored by N-able Technologies
EGUIDE: In this expert e-Guide, learn how to ensure that your patch management strategy remains secure following the transition from physical to virtual desktops; why delaying security patches puts organizations at risk; and how to build a case for a formal patch management program.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

N-able Technologies

Gartner Predicts 2014: Identity and Access Management
sponsored by IBM
WHITE PAPER: Find out what Gartner's security analysts predict for the identity and access management space for 2014 and beyond.
Posted: 08 Oct 2014 | Published: 26 Nov 2013

IBM

Combatting APTs with a Defense-in-Depth Security Approach
sponsored by CDW Corporation
WHITE PAPER: This informative white paper contains critical information on why a defense-in-depth security approach has proven effective in protecting organizations' sensitive data from APTs.
Posted: 22 Jul 2014 | Published: 05 Mar 2014

CDW Corporation

Women in Technology 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Are women flourishing in IT ? Find out by downloading the Women in techology report from Computer Weekly and Mortimer Spinks.
Posted: 04 Jul 2014 | Published: 04 Jul 2014

ComputerWeekly.com

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Top 3 Reasons to Give Insiders a Unified Identity
sponsored by Centrify Corporation
WHITE PAPER: This white paper stresses the importance of recognizing the danger of malicious insiders and the potential for breaches caused by employee error or negligence, as well as the top 3 reasons to consider giving insiders a unified identity.
Posted: 20 Aug 2014 | Published: 31 Dec 2013

Centrify Corporation

The Future of IT Infrastructure in the Professional Services Industry
sponsored by Sungard
WHITE PAPER: This white paper shares insights gathered from the professional services sector into the future of IT infrastructure and its impact on the industry.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Sungard

How to Get Fast, Effective IT Help
sponsored by ASI Systems
EGUIDE: This whitepaper covers the importance of getting the best IT vendor support possible especially if you rely heavily on IT.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

ASI Systems

ITSM: Connecting Service Desk Operations to IT Strategies
sponsored by IBM
EGUIDE: This expert e-guide examines the changes that ITIL and IT service management are bringing to your IT departments
Posted: 27 May 2014 | Published: 27 May 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement