IT Agents  >   Professional Organizations  >   Information Industry Professional Organizations  >  

ASIS&T

RSS Feed   
ASIS&T White Papers (View All Report Types)
 
Real World Stories of IT Admin Heroes
sponsored by Pure Storage
WHITE PAPER: Check out this compendium of case studies to see 7 shining examples of everyday IT admin heroes as they use Pure Storage to help their organizations simplify and transform operations for mission-critical databases, virtualized environments, and analytics with all-flash and NVMe.
Posted: 21 Aug 2020 | Published: 21 Aug 2020

Pure Storage

IT jobswatch – trends in media IT recruitment
sponsored by ComputerWeekly.com
WHITE PAPER: This quarters figures compiled by jobadswatch.co.uk show that during the fourth quarter of 2010 the IT jobs market for permanent staff being recruited by media organisations is up by 1.8%. This is the sixth consecutive quarter that has seen higher demand.
Posted: 20 Oct 2011 | Published: 15 Mar 2011

ComputerWeekly.com

Secure IT Asset Disposition: Achieving Business Value While Mitigating Risks
sponsored by Iron Mountain
WHITE PAPER: The risks of not having an IT asset disposition (ITAD) solution are substantial.Download this white paper for advice on how to dispose of old IT equipment successfully while achieving security, compliance, and environmental goals.
Posted: 23 Jul 2020 | Published: 23 Jul 2020

Iron Mountain

Does Your Service Management Solution Meet the Needs of a Modern Organization?
sponsored by Ivanti
WHITE PAPER: Think about your IT organization. Does it look the exact same as when your current IT service management tools were first deployed? Odds are, probably not. Unlock access to an exclusive ITSM checklist that explains how to properly measure your service management tools ability to keep up with change.
Posted: 01 Oct 2020 | Published: 29 May 2020

Ivanti

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Prevent Downtime: Ascend to Peak Performance with ASI & HP Proactive Care Services
sponsored by ASI Systems
WHITE PAPER: This whitepaper covers the importance of taking a proactive approach in your data center and details a product to help you do so.
Posted: 30 Dec 2013 | Published: 22 May 2013

ASI Systems

Data Governance for the Enterprise
sponsored by SearchBusinessAnalytics
EBOOK: Data governance is all about managing data as a business asset and ensuring that data is accurate, consistent, integrated, timely, complete and secure. This report examines the market trends for implementing data governance.
Posted: 24 Mar 2014 | Published: 24 Mar 2014

SearchBusinessAnalytics

Deduplication School 2010 Presentation Download
sponsored by EMC Backup and Recovery Solutions
PRESENTATION TRANSCRIPT: This presentation download will explain how to leverage data deduplication technology to benefit your organization.
Posted: 05 Apr 2010 | Published: 05 Apr 2010

EMC Backup and Recovery Solutions

Expert Checklist: 11 Steps for Aligning Your BC/DR Program with Business Needs
sponsored by SearchStorage.com
EGUIDE: This e-guide provides an expert checklist for developing a successful business continuity program, designed with the specific needs of your organization in mind.
Posted: 25 Jul 2013 | Published: 25 Jul 2013

SearchStorage.com

Information Security Asean July 2016
sponsored by SearchSecurity.com
EZINE: In April, the Philippines suffered its worst-ever government data breach, when personal information, including fingerprint data and passport information, belonging to around 70 million people, were compromised.
Posted: 05 Jul 2016 | Published: 04 Jul 2016

SearchSecurity.com

Backup School 2010 Presentation Download
sponsored by SearchDataBackup.com
PRESENTATION TRANSCRIPT: Storage demands continue to grow exponentially – even as the budgets and resources available to satisfy those demands shrink. This Storage Decisions’ Data Deduplication seminar presentation download provides independent information that will help end users select the appropriate deduplication system for their IT environment.
Posted: 09 Apr 2010 | Published: 09 Apr 2010

SearchDataBackup.com

E-Book: Standardizing Business Continuity
sponsored by IBM
EBOOK: Download this e-book, brought to you by SearchCompliance.com, for insights, tips and suggestions for developing an optimal business continuity plan. Read on to learn details of FEMA’s PS-Prep, how to make the case for business continuity, what standard to use, how to measure continuity risk, and much more!
Posted: 15 Dec 2010 | Published: 15 Dec 2010

IBM

CW buyer's guide: context-aware security
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 11-page  Computer Weekly buyer's guide  looks at how organisations should approach context-aware security technologies and what business benefits they can deliver.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

E-Guide: DR Checklist: Tailoring your Plan to your Organization's Needs
sponsored by FalconStor Software
EGUIDE: This E-Guide is your ticket to establishing a successful disaster recovery and business continuity strategy.
Posted: 03 May 2012 | Published: 03 May 2012

FalconStor Software

Focus: Securing for the future
sponsored by ComputerWeekly.com
EGUIDE: 2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.
Posted: 10 Jan 2017 | Published: 10 Jan 2017

ComputerWeekly.com

Windows 8 Secrets
sponsored by ComputerWeekly.com
BOOK: Download a step by step guide to installing Windows 8 from the book Windows 8 Secrets and receive a 30% discount on the full book.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

ComputerWeekly.com

Information Security ANZ March 2016
sponsored by TechTarget ANZ
EZINE: Australian organisations face a huge skills shortage when it comes to fighting cyber-crime unless they act quickly
Posted: 03 Mar 2016 | Published: 03 Mar 2016


Cybersecurity Information Sharing: Establishing New Protocols
sponsored by BMC Software, Inc.
EGUIDE: This eGuide will tune you in to the challenges of cybersecurity information sharing, why it's needed more than ever, and what can be done to keep everyone properly informed and protected. Topics covered include today's sharing initiatives, the importance of baseline cybersecurity practices, the rules governing cybersecurity information, and more.
Posted: 26 Dec 2012 | Published: 26 Dec 2012

BMC Software, Inc.

Information security breaches survey 2012
sponsored by ComputerWeekly.com
IT BRIEFING: Rising security breaches cost UK billions over the last 12 months as cyber attacks reached record levels, according to the 2012 Information Security Breaches survey.
Posted: 24 Apr 2012 | Published: 24 Apr 2012

ComputerWeekly.com

Presentation Transcript: Understanding Dedupe
sponsored by Symantec Corporation
PRESENTATION TRANSCRIPT: Access this presentation transcript, brought to you by SearchStorage.com, to develop a better understanding of data deduplication from one of the world’s leading experts on deduplication – W. Curtis Preston.
Posted: 10 Aug 2010 | Published: 10 Aug 2010

Symantec Corporation

Information Security ANZ March 2014
sponsored by SearchSecurity.com
EZINE: This issue looks at the security challenges facing IT security professionals in the Australia/New Zealand region.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

SearchSecurity.com

Privacy and Big Data
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from ISACA, a non-profit security association, lists 16 key questions companies need to answer when considering the privacy and governance aspects of big data.
Posted: 19 Aug 2013 | Published: 19 Aug 2013

ComputerWeekly.com

Developing Effective DR/BC Plans
sponsored by Iron Mountain
EZINE: This Essential Guide offers a primer on business continuity and risk management.  Get exclusive information on tailoring a DR plan to your organization's needs and discover 10 things every IT professional should know about disaster recovery. Read on to make DR planning a priority before it's too late.
Posted: 31 May 2013 | Published: 31 May 2013

Iron Mountain

Developing Effective DR/BC Plans
sponsored by SearchDisasterRecovery.com
ESSENTIAL GUIDE: This handbook offers tips on how to develop and implement an effective disaster recovery plan.
Posted: 15 May 2013 | Published: 15 May 2013

SearchDisasterRecovery.com

Calculating Cloud ROI : From the Customer Perspective
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This white paper lays out a framework to help IT and business decision makers calculate the return on investment of cloud services.
Posted: 15 Mar 2013 | Published: 01 Jul 2012

ComputerWeekly.com

Computer Weekly – 5 August 2014: Driving virtualisation into pole position in Formula One
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how the Caterham F1 team has used virtualisation in its trackside technology to help race performance. We analyse how growing competition in the cloud market is affecting Amazon Web Services' dominant position. And we look at an emerging datacentre technology - silicon photonics. Read the issue now.
Posted: 04 Aug 2014 | Published: 04 Aug 2014

ComputerWeekly.com

Information Security Magazine – November 2012
sponsored by Dell SonicWALL
EZINE: Consult this enlightening online magazine to learn more about how you can keep up with the rapidly changing technology trends. Find out to defend against adversaries and create a strong enterprise that's prepared for a myriad of attacks.
Posted: 13 Nov 2012 | Published: 01 Nov 2012

Dell SonicWALL

Your Guide to Combatting Ransomware's Domination of 2017
sponsored by CyberArk Software, Inc
EGUIDE: Learn how to boost your ransomware security awareness in this expert e-guide. Additionally, discover why ransomware continues to be a major threat and what ransomware prevention tools can help you win the battle.
Posted: 06 Jun 2017 | Published: 02 Jun 2017

CyberArk Software, Inc

Computer Weekly: How cloud is saving lives
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how the power of public cloud is helping scientists to tackle diseases such as cancer and malaria. Big banks are turning to tech startups for innovation – we ask why. And our latest buyer's guide examines micro-datacentre technologies. Read the issue now.
Posted: 08 Sep 2014 | Published: 08 Sep 2014

ComputerWeekly.com

New E-Guide: Securing and Consolidating Remote and Branch Offices
sponsored by Brocade
WHITE PAPER: The remote office/branch office (ROBO) is now a main part of many organizations' storage initiatives. This eGuide, featuring articles from Storage magazine, outlines the issues of protecting ROBO data and provides insight and strategies for...
Posted: 04 Sep 2007 | Published: 01 Sep 2007

Brocade
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info