Information Technology Management

RSS Feed    Add to Google    Add to My Yahoo!
Information Technology ManagementReports
 
Pragmatic Approach to Data Center Management – Control and Manageability
sponsored by Avocent
WHITE PAPER: This white paper explores a pragmatic view of data center management and examines the best practices in real-world data centers for over-arching management solutions. Read on to learn how you can control costs and manage complex technology environments while achieving core objectives for availability and security.
Posted: 24 Nov 2014 | Published: 30 Sep 2010

Avocent

Using Anomalies in Crash Reports to Detect Unknown Threats
sponsored by Websense
WHITE PAPER: In an industry first, Websense® Security Labs™ researchers used Windows Error Reporting (WER) crash reports to detect zero-day exploits in the wild.
Posted: 03 Dec 2014 | Published: 18 Feb 2013

Websense

Top 5 Facts to Know About Data Protection from SafeNet
sponsored by SafeNet, Inc.
WHITE PAPER: This infographic showcases 5 facts about SafeNet, a leading provider of data protection solutions. View now to learn about the protection that SafeNet could bring to your organization's sensitive data.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

SafeNet, Inc.

SDN Security Strategies for Network Attack Prevention
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford discusses the rise of software-defined monitoring; using SDN for security monitoring and packet analysis; how SDN security strategies tackle network attack prevention; and more.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

Websense® Security Labs™: 8 Security Predictions for 2015
sponsored by Websense
WHITE PAPER: This must-read resource from Websense presents the top 8 security predictions for 2015.
Posted: 01 Dec 2014 | Published: 18 Nov 2014

Websense

Closing PCI DSS Security Gaps with Proactive Endpoint Monitoring and Protection
sponsored by Bit9, Inc.
WHITE PAPER: This white paper defines potential compliance and security gaps; identifies the effect that these gaps can have on your organization; and explains how a positive security solution can close these gaps to ensure the security of servers and endpoints, as well as PCI DSS compliance.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

Bit9, Inc.

No IT for a Day: What Does it Mean for your Business?
sponsored by ControlNow
WHITE PAPER: Download this exclusive whitepaper now to discover the real cost of downtime and uncover some best practices to avoid downtime.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

ControlNow

Simplifying cloud management and data center automation
sponsored by IBM
WHITE PAPER: This white paper explores the value of standardizing and automating cloud services with a flexible platform. Read on to learn how to orchestrate the development, deployment and management of cloud services - helping to reduce IT costs and accelerate service delivery.
Posted: 05 Dec 2014 | Published: 30 Apr 2014

IBM

2014 Annual Trends in Managed Services
sponsored by CompTIA
WHITE PAPER: View this extensive and thorough white paper to explore a managed services provider buying guide. Discover what sets the good providers apart from the average ones as well as the red flags to avoid. Read now to learn all you need to know and more when choosing a service provider.
Posted: 18 Dec 2014 | Published: 06 Mar 2014

CompTIA

Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
RESOURCE: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 27 Nov 2014 | Published: 28 Nov 2014

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement