IT Agents  >   IT Workforce  >   Information Technology Professionals  >  

Technical Leads

RSS Feed    Add to Google    Add to My Yahoo!
Technical Leads Reports
 
The Compliance and Security Balancing Act
sponsored by Mimecast
EGUIDE: In this expert guide, Karen Scarfone provides several practical tips on technologies that improve enterprise email security, and Christine Parizo discusses how to strike an ideal balance between compliance and security, when "compliant" doesn't necessarily mean "secure."
Posted: 22 Dec 2014 | Published: 22 Dec 2014

Mimecast

The Enemy Within: Why Insiders Are Still the Weakest Link in Your Data Security Chain
sponsored by Absolute Software
WHITE PAPER: This white paper describes the 5 steps that your enterprise needs to take in order to foster a conscientious data security environment within your enterprise, despite the challenges of the digital era.
Posted: 21 Jan 2015 | Published: 29 Dec 2014

Absolute Software

Spoofing Server-Server Communication: How You Can Prevent It
sponsored by Symantec Corporation
WHITE PAPER: In this must-read white paper, you'll learn how to prevent the new SSL Strip threat that could compromise your secure applications.
Posted: 19 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

How to Write a Compelling IT Budget Application
sponsored by Welldata
WHITE PAPER: This concise overview reveals a real-world example of how one IT manager was able to get his budget approved in just one day after weeks of failed attempts to convince his company's C-suite to approve additional funds.
Posted: 09 Apr 2015 | Published: 03 Apr 2015

Welldata

Defending Against Rogue Users, Devices, and Applications
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explains how NAC technologies help to ensure that only appropriate users, devices, and applications have access to your network resources, enabling you to support your users in a secure, efficient way.
Posted: 17 Feb 2015 | Published: 29 Aug 2014

ForeScout Technologies, Inc.

Collaboration Tools Case Study: Kingsley Napley
sponsored by IntraLinks, Inc
CASE STUDY: Access this short case study to see what was successful for Kingsley Napley law firm to provide the sharing capabilities required by a large, diverse enterprise.
Posted: 01 May 2015 | Published: 31 Dec 2014

IntraLinks, Inc

4 Data Traffic Security Challenges Exposing Enterprises to Hack Attacks
sponsored by Certes Networks
WHITE PAPER: This white paper discusses the 4 major points of weakness that your enterprise needs to prioritize in 2015 in order to defend your business-critical data from hackers.
Posted: 12 Feb 2015 | Published: 22 Jan 2015

Certes Networks

Buyer’s Guide: Choosing the Right Project and Portfolio Management Solution
sponsored by CA Technologies.
WHITE PAPER: This buyer's guide will help decision-makers with the critical task of selecting a project and portfolio management solution (PPM) to speed innovation and maximize the ROI of investments over time.
Posted: 12 Jun 2015 | Published: 31 Dec 2014

CA Technologies.

Smarter IT – Optimize IT Delivery, Accelerate Innovation
sponsored by IBM
WHITE PAPER: Access this informative resource to learn how you can optimize your IT delivery to accelerate innovation—regardless of whether it's on-premise, in the cloud, or hybrid operations.
Posted: 23 Feb 2015 | Published: 31 Oct 2014

IBM

Take Back Control: OEM Maintenance and Life Cycle Myths Exposed
sponsored by Curvature
VIDEO: Watch this video to learn about upgrade myths and how your organization can take advantage of support and equipment alternatives.
Posted: 28 Apr 2015 | Premiered: 04 Dec 2014

Curvature
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement