Business of Information Technology  >   Business Management  >   Best Practices  >  

Technology Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Technology Best PracticesReports
 
Securing Enterprise Networks with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EGUIDE: Enterprise networks are increasing in size and complexity, creating a larger attack surface for hackers. This TechGuide walks you through gaining visibility into your network and devising an effective security strategy.
Posted: 14 Aug 2014 | Published: 11 Aug 2014

SearchSecurity.com

Gartner Predicts 2014: Identity and Access Management
sponsored by IBM
WHITE PAPER: Find out what Gartner's security analysts predict for the identity and access management space for 2014 and beyond.
Posted: 08 Oct 2014 | Published: 26 Nov 2013

IBM

Top 10 Ways to Use Help Desk to Build Your MSP Business
sponsored by N-able Technologies
WHITE PAPER: This informative resource provides 10 helpful suggestions for building a successful MSP business, starting with the help desk.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

N-able Technologies

Cloud Migration: A Security Architect Case Study
sponsored by CenturyLink Technology Solutions
WHITE PAPER: This use case describes CenturyLink's partnership with a global shipping and logistics firm looking to adopt cloud technologies to lower IT support costs and refocus its resources.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

CenturyLink Technology Solutions

Strategic IT
sponsored by ComputerWeekly.com
BOOK: Find out how two leading CIOs have enabled their organisations to use information technology as strategic driver, in this extract from the book Strategic IT.
Posted: 19 May 2014 | Published: 19 May 2014

ComputerWeekly.com

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

Improving Data Center Performance
sponsored by VMTurbo
EGUIDE: This expert e-guide explores how data centers are evolving to meet increased demands and much more.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

VMTurbo

The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014

IBM

Dell Performance Analysis Collection Kit
sponsored by Dell, Inc.
WHITE PAPER: This whitepaper details a tool that can help you feel confident in your mission-critical IT solution decisions.
Posted: 27 Dec 2013 | Published: 13 Dec 2013

Dell, Inc.

ITSM: Connecting Service Desk Operations to IT Strategies
sponsored by IBM
EGUIDE: This expert e-guide examines the changes that ITIL and IT service management are bringing to your IT departments
Posted: 27 May 2014 | Published: 27 May 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement