IT Agents  >   IT Workforce  >   Information Technology Professionals  >  

Leaders

RSS Feed    Add to Google    Add to My Yahoo!
Leaders Reports
 
The 2014 Bitglass Healthcare Breach Report
sponsored by BitGlass
WHITE PAPER: This informative report takes a close look at reported healthcare data breaches over the past 3 years and discusses what they mean for consumers, healthcare organizations, and the future of digital healthcare records.
Posted: 05 Feb 2015 | Published: 05 Feb 2015

BitGlass

Best Practices for Selecting a Web Application Scanning (WAS) Solution
sponsored by Qualys
WHITE PAPER: This white paper explains how a Web Application Scanning solution can help you to locate and test web-based apps, and provides a checklist of best practices that will help you to understand what to look for when selecting a WAS solution.
Posted: 23 Jan 2015 | Published: 16 May 2013

Qualys

Email Security Checklist: Eight Steps for Healthcare Organizations
sponsored by Mimecast
WHITE PAPER: This white paper explains how you can embrace email as a core communication tool while still adhering to HIPAA guidelines.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

Mimecast

5 Top Reasons Why Project Managers Hate Their PM Tools
sponsored by Workfront
WHITE PAPER: While project management tools can be very powerful, they often fall short of helping you to be truly efficient. This information-packed resource lists the 5 most common reasons why project managers hate their PM tools, and explores what can be done to fix them.
Posted: 16 Apr 2015 | Published: 16 Apr 2015

Workfront

IT Leaders Can Benefit From Disruptive Innovation in the Storage Industry
sponsored by Red Hat
RESOURCE: View this informative resource for a thorough analysis examining the impact of key disruptive innovations, as well as how to benefit from them with 4 recommendations.
Posted: 17 Apr 2015 | Published: 29 Oct 2013

Red Hat

Today's State of Work: The Productivity Drain
sponsored by ServiceNow
WHITE PAPER: View this informative report to find out if businesses leverage the power of connected technology to simplify and accelerate work—or if they still use inefficient, manual tools for mundane administrative tasks.
Posted: 21 May 2015 | Published: 21 May 2015

ServiceNow

Six Essential Elements of Web Application Security
sponsored by Qualys
WHITE PAPER: This white paper discusses the most common classes of web application vulnerabilities, and how hackers most often take advantage of these weaknesses. Read on to learn the 6 essential elements of web application security that are the most valuable places for IT teams to invest their time and resources.
Posted: 26 Jan 2015 | Published: 31 Oct 2013

Qualys

Turning Your Network into a Strategic Business Asset
sponsored by Extreme Networks
EBOOK: This eBook introduces a network-based business intelligence solution that captures and analyzes context-based application traffic to deliver meaningful information about applications, users, locations and devices.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Extreme Networks

Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data

The Big 4 in IT Evolution and How They Affect Your Integration Strategy
sponsored by IBM
WHITE PAPER: This infographic illustrates the impact of the "Big 4" forces in the evolution of IT—big data, the cloud, mobility, and social forces—providing statistics that depict how each force is already impacting workplaces, as well as their effects on B2B integration.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement