Business of Information Technology  >   Business Management  >   Best Practices  >  

Technology Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Technology Best PracticesReports
 
Post Breach Industry Report: A Real-world View of Ongoing Cyber Security Attacks
sponsored by Vectra Networks
WHITE PAPER: This informative report uses real-world data to reveal what attackers do within a network once they evade perimeter defenses.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Vectra Networks

Gartner Predicts 2014: Identity and Access Management
sponsored by IBM
WHITE PAPER: Find out what Gartner's security analysts predict for the identity and access management space for 2014 and beyond.
Posted: 08 Oct 2014 | Published: 26 Nov 2013

IBM

White Paper: Developing More Effective Enterprise Mobile Programs
sponsored by IBM
WHITE PAPER: This practical "how-to" guide will help your business create an effective and sustainable mobile enterprise program in four steps.
Posted: 21 Jul 2014 | Published: 30 Nov 2012

IBM

Guarding Against a Data Breach
sponsored by Hewlett-Packard Company
WHITE PAPER: In this informative white paper, discover how modern enterprises should respond to growing security threats while balancing economic and organizational concerns.
Posted: 22 Aug 2014 | Published: 31 Jan 2012

Hewlett-Packard Company

From BlackBerry to BYOD
sponsored by Citrix
WHITE PAPER: This white paper discusses mobile device management tools and other solutions for enterprises in the era of BYOD and mobile device diversity.
Posted: 30 Jul 2014 | Published: 31 Dec 2013

Citrix

C&J Energy: Going Public and Outgrowing Its Infrastructure
sponsored by Alert Logic
WHITE PAPER: This white paper describes how C&J Energy, an oilfield services firm, collaborated with Alert Logic in order to meet user needs and achieve SOX compliance quickly without compromising protected information or spending unnecessary time on installation and implementation.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

Alert Logic

Making the Move from Legacy AAA Platforms to Policy Management
sponsored by Aruba Networks
WHITE PAPER: This white paper discusses how the use of policy management in a mobile environment provides a simpler, more cost-effective method of ensuring that productivity isn't lost due to denied access.
Posted: 26 Sep 2014 | Published: 30 Jun 2014

Aruba Networks

Creating a Successful Patch Management Strategy
sponsored by N-able Technologies
EGUIDE: In this expert e-Guide, learn how to ensure that your patch management strategy remains secure following the transition from physical to virtual desktops; why delaying security patches puts organizations at risk; and how to build a case for a formal patch management program.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

N-able Technologies

Is Your Identity Management Infrastructure a Mess?
sponsored by Radiant Logic, Inc.
WHITE PAPER: This infographic depicts the reasons behind identity management challenges, the impact that they have on organizations, and what your enterprise needs to do to confront these issues head-on.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Radiant Logic, Inc.

Top 5 IT Benefits of the Next-Generation Workplace
sponsored by Aruba Networks
WHITE PAPER: This guide explores 5 top IT benefits of the next-generation workplace and how with the right network tools in place, you can reap the maximum benefits of mobility.
Posted: 14 Apr 2014 | Published: 31 Dec 2013

Aruba Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement