IT Agents  >   IT Workforce  >   Information Technology Professionals  >  

Managers

RSS Feed    Add to Google    Add to My Yahoo!
Managers Reports
 
Applying the Top 20 Critical Security Controls to the Cloud
sponsored by CloudPassage
WEBCAST: This webcast discusses how enterprises can apply the 20 Critical Security Controls for Effective Cyber Defense, a list of best practices for IT security, to the new reality of cloud-based or virtualized infrastructures.
Posted: 06 Feb 2015 | Premiered: Feb 6, 2015

CloudPassage

Email Security Checklist: Eight Steps for Healthcare Organizations
sponsored by Mimecast
WHITE PAPER: This white paper explains how you can embrace email as a core communication tool while still adhering to guidelines.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

Mimecast

Beginner's Guide to SSL Certificates: Making the Best Choice When Considering Your Online Security Options
sponsored by Symantec Corporation
WHITE PAPER: This helpful guide explains how the effective implementation of SSL certificates is critical to protecting your customers, earning their trust, and ensuring your success when it comes to conducting business online.
Posted: 08 Jan 2015 | Published: 10 Jun 2013

Symantec Corporation

Rethinking People Costs in Enterprise IT
sponsored by Rackspace
WHITE PAPER: This white paper explores how to assess your IT people spend and position IT as a central driver of business growth.
Posted: 15 Oct 2014 | Published: 12 Aug 2014

Rackspace

Smarter IT – Optimize IT Delivery, Accelerate Innovation
sponsored by IBM
WHITE PAPER: Access this informative resource to learn how you can optimize your IT delivery to accelerate innovation—regardless of whether it's on-premise, in the cloud, or hybrid operations.
Posted: 23 Feb 2015 | Published: 31 Oct 2014

IBM

Eight Common traits of GREAT Leaders
sponsored by Citrix Online Go To Meeting
RESOURCE: This resource will help you become the best manager you can be with eight simple characteristics.
Posted: 06 Jul 2015 | Published: 06 Jul 2015

Citrix Online Go To Meeting

Protecting Users from Firesheep and other Sidejacking Attacks with SSL
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the Firesheep Wi-Fi attack tool and other sidejacking attacks with SSL and explains how to avoid these attacks.
Posted: 15 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

How Extended Validation SSL Brings Confidence to Online Sales and Transactions
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the importance of increasing customer confidence in the security of online business transactions, and introduces Symantec Extended Validation SSL Certificates as a potential solution to this challenge.
Posted: 15 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Implementing mobility/BYOD programs while maintaining regulatory compliance
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Explore this in-depth resource to learn how you can deploy your own BYOD or mobility program. Discover how to select the right devices for your employees, and effectively manage mobile security within the network. Read on now to learn more.
Posted: 10 Jul 2014 | Published: 28 Feb 2014

Dell, Inc. and Intel®

Infographic: Bridging the Gap Between Business and IT
sponsored by IBM
WHITE PAPER: This infographic illustrates the necessity of integration between business and IT, as well as the fundamental disagreements that exist between the two groups.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement