Business of Information Technology  >   Business Management  >   Best Practices  >  

Technology Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Technology Best Practices Reports
 
Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, you'll learn why SSL-based security platforms with solid track records of meeting new challenges are the best way to defend and future-proof e-commerce environments against a growing and dynamic internet threat environment.
Posted: 12 Jan 2015 | Published: 13 Feb 2014

Symantec Corporation

Multifactor Authentication Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.
Posted: 16 Dec 2014 | Premiered: 15 Dec 2014

SearchSecurity.com

Recognizing Five Sources of High-Profile Data Security Breaches
sponsored by Mimecast
WHITE PAPER: This white paper discusses the 5 major categories of vulnerabilities that IT and security professionals need to account for in their solutions planning.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

Mimecast

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

The New Era of Self-Service Analytics
sponsored by Information Builders
WHITE PAPER: Access this informative white paper to learn how organizations are taking advantage of the boom in self-service analytic apps by deploying them to users. Discover solutions that let consumers visualize, analyze and explore data that matters to them, while helping them convert insights into action in real-time.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

Information Builders

Infographic: The UK’s Evolving BYOD Strategies
sponsored by Dell, Inc.
WHITE PAPER: Access this informative infographic to uncover useful statistics uncovered by computer technology researchers regarding security concerns relevant to BYOD strategies.
Posted: 13 Apr 2015 | Published: 31 Dec 2014

Dell, Inc.

IT Infrastructure Strategy: Building for Stability and Agility
sponsored by Red Hat
VIDEO: Access this short video now to hear from Tim Yeaton, Senior VP at the Infrastructure Business Group as he discusses how you can build your IT infrastructure for stability and agility with the help of technological innovations.Discover what new technologies can help improve your organization's IT infrastructure to better meet your business needs.
Posted: 01 Jul 2015 | Premiered: 16 Apr 2015

Red Hat

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Taking Control of File Sharing Services
sponsored by Mimecast
WHITE PAPER: This informative white paper discusses how file sharing services are being used within enterprises; the benefits and risks that they bring; and the factors that organizations should consider in selecting an enterprise-grade service in order to ensure its security.
Posted: 19 Dec 2014 | Published: 30 Apr 2014

Mimecast

The Enterprise Mobility Policy Guidebook
sponsored by Maas360 by IBM
WHITE PAPER: This guide can help you create a mobility policy that will increase productivity, efficiency, and cooperation in your workplace.
Posted: 13 Mar 2015 | Published: 30 Apr 2012

Maas360 by IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement