IT Agents  >   Standards Organizations  >   Information Industry Standards Organizations  >  

INCITS

RSS Feed   
INCITS White Papers (View All Report Types)
 
IT jobswatch – trends in media IT recruitment
sponsored by ComputerWeekly.com
WHITE PAPER: This quarters figures compiled by jobadswatch.co.uk show that during the fourth quarter of 2010 the IT jobs market for permanent staff being recruited by media organisations is up by 1.8%. This is the sixth consecutive quarter that has seen higher demand.
Posted: 20 Oct 2011 | Published: 15 Mar 2011

ComputerWeekly.com

Does Your Service Management Solution Meet the Needs of a Modern Organization?
sponsored by Ivanti
WHITE PAPER: Think about your IT organization. Does it look the exact same as when your current IT service management tools were first deployed? Odds are, probably not. Unlock access to an exclusive ITSM checklist that explains how to properly measure your service management tools ability to keep up with change.
Posted: 01 Oct 2020 | Published: 29 May 2020

Ivanti

Secure IT Asset Disposition: Achieving Business Value While Mitigating Risks
sponsored by Iron Mountain
WHITE PAPER: The risks of not having an IT asset disposition (ITAD) solution are substantial.Download this white paper for advice on how to dispose of old IT equipment successfully while achieving security, compliance, and environmental goals.
Posted: 23 Jul 2020 | Published: 23 Jul 2020

Iron Mountain

Real World Stories of IT Admin Heroes
sponsored by Pure Storage
WHITE PAPER: Check out this compendium of case studies to see 7 shining examples of everyday IT admin heroes as they use Pure Storage to help their organizations simplify and transform operations for mission-critical databases, virtualized environments, and analytics with all-flash and NVMe.
Posted: 21 Aug 2020 | Published: 21 Aug 2020

Pure Storage

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

CW+: Overview of the Open Group Security Forum
sponsored by ComputerWeekly.com
WHITE PAPER: The Security Forum is a membership group of security experts from both the customer and supply sides of industry, government, and academia, who share a common aim to raise confidence levels in IT business operations.
Posted: 20 Oct 2011 | Published: 19 Oct 2010

ComputerWeekly.com

The Enterprise Guide to Cloud Security Essentials
sponsored by Forcepoint
BROCHURE: Like almost any other aspect of business, cloud security is people-driven, which is why it must be people-centric in practice. Download this brochure, The Enterprise Guide to Cloud Security Essentials, to discover how to overcome key cloud concerns achieve security at the people-level.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Forcepoint

CW Benelux November 2017
sponsored by ComputerWeekly.com
EZINE: The Netherlands is seen as a pioneering country which often takes different approaches to solving problems. It is a small country with limited resources and often finds itself using innovative methods to keep up.
Posted: 03 Nov 2017 | Published: 09 Nov 2017

ComputerWeekly.com

Computer Weekly – 24 October 2017: Where will AI take us?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, artificial intelligence (AI) enthusiasts and sceptics debate the opportunities and risks of the much-hyped technology. Our latest buyer's guide examines the benefits of cloud-native applications. And we look at best practice in defending email systems from cyber attacks. Read the issue now.
Posted: 20 Oct 2017 | Published: 24 Oct 2017

ComputerWeekly.com

The Evolution of Threat Detection and Management
sponsored by SearchSecurity.com
EGUIDE: This e-guide from SearchSecurity.com explores the [evolution of threat detection and management] and offers advice on how to tackle potentially disastrous APTs, detailing multiple mitigation methods, from SIEMs and big data to sandboxing and whitelisting.
Posted: 19 Jun 2013 | Published: 19 Jun 2013

SearchSecurity.com

Security Analytics for Threat Detection and Breach Resolution in 2019
sponsored by Gigamon
ANALYST REPORT: While there is no security silver bullet, security analytics is a great step forward for any organization to improve its ability to detect threats. In this white paper, explore the top 4 considerations for investigating a security analytics tool.
Posted: 27 Aug 2019 | Published: 27 Aug 2019

Gigamon

Keeping up to Date with your Organization's Threat and Authentication Techniques
sponsored by SearchSecurity.com
EGUIDE: Enterprises must have an understanding around two main topics when looking to protect their organizations. This expert e-guide explores the allure of risk-based authentication and how to make access easy for your clients while still make sure their data is secure.
Posted: 05 Dec 2013 | Published: 05 Dec 2013

SearchSecurity.com

How to Keep Each Cloud Workload Accessible and Secure
sponsored by SearchSecurity.com
EBOOK: While the shared responsibility model of cloud security is still relevant, responsibility for keeping cloud workloads safe is increasingly falling more on the shoulders of the in-house security team and management. Download this handbook for everything you need to know about keeping your cloud workloads accessible and secure.
Posted: 29 Jan 2020 | Published: 29 Jan 2020

SearchSecurity.com

Hacking the Human Operating System
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

ComputerWeekly.com

Expert Ebook: Mastering PCI
sponsored by Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco
BOOK: This eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance.
Posted: 20 Aug 2008 | Published: 20 Aug 2008

Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco

2020: The State of Endpoint Resilience Report
sponsored by Absolute Software Corporation
ANALYST REPORT: In this research report, 2020: The State of Endpoint Resilience Report, explore insights designed to help enterprises strengthen their security posture, and build the resilience needed to continue to face today’s cyber challenges head on.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Absolute Software Corporation

E-Book: Game-changing business analytics trends for 2011 and beyond
sponsored by Actian Corporation
EGUIDE: This expert e-guide is a collection of recent articles that focus on the latest business intelligence (BI) trends, practices and tools.
Posted: 23 Nov 2011 | Published: 22 Nov 2011

Actian Corporation

Computer Weekly - 23 August 2011: Download this week's issue of the UK's leading technology publication, with our analysis of the latest news and IT trends
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, Oxfam's CIO talks about how IT supports a global aid operation; we ask if £530m government funding will be enough to roll-out superfast broadband; we examine the security issues around moving to IPv6; plus our analysis of the week’s biggest news stories in IT. Download the latest issue now.
Posted: 22 Aug 2011 | Published: 23 Aug 2011

ComputerWeekly.com

eBook: Strategies for Securing Virtual Machines
sponsored by Information Security Magazine
EBOOK: Check out this expert eBook to learn about the special security concerns of virtualization and get best practices for securing virtual machines.
Posted: 18 Dec 2008 | Published: 18 Dec 2008

Information Security Magazine

eBook: Virtualization Security
sponsored by TechTarget
EBOOK: Space savings and reductions in energy costs are causing more organizations to move, or at least consider the move, to virtual environments. Download this eBook and discover how to mitigate the inherent security risks associated with the adoption of virtualization security.
Posted: 21 May 2009 | Published: 21 May 2009

TechTarget

Enterprise Decisions E-Zine Feature: How mobile IT is revamping network strategies
sponsored by SearchCIO.com
EZINE: Inside this edition of CIO Decisions E-zine, find out how your peers are keeping up with consumerization trends. Uncover practical network management advice from the experiences of several high-profile organizations.
Posted: 07 Nov 2012 | Published: 07 Nov 2012

SearchCIO.com

Cloud-Ready Data Center Reference Architecture
sponsored by Juniper Networks, Inc.
WHITE PAPER: Without effective data center network architecture and processes in place, your business cannot embrace cloud computing. This white paper examines the current state of the data center and the steps you need to take to adapt to changing trends and enable the cloud.
Posted: 11 Jun 2012 | Published: 31 Dec 2011

Juniper Networks, Inc.

Gartner IT Financial, Procurement & Asset Management Summit 2013
sponsored by Gartner
BROCHURE: This brochure outlines the Gartner IT Financial, Procurement & Asset Management Summit 2013, a conference that aims to help you destroy legacy costs and create value from new technologies and trends. View now to learn more!
Posted: 19 Jul 2013 | Published: 19 Jul 2013

Gartner

The Definitive Guide to Lead Nurturing
sponsored by Marketo
WHITE PAPER: The goal of this guide is to arm B2B marketers with the ultimate resource for lead nurturing, whether you’re just starting to think about lead nurturing in your business or are looking for ways to enhance and optimize your existing programs. Read this definitive guide to learn more.
Posted: 12 Nov 2010 | Published: 12 Nov 2010

Marketo

Information Security Magazine: June Issue
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at how malware is adapting to virtual machines and strategies that can help organizations secure these environments.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

SearchSecurity.com

Exploiting Big Data: Strategies for Integrating with Hadoop to Deliver Business Insights
sponsored by BeyeNETWORK
EBOOK: This e-book, penned by business intelligence expert Wayne Eckerson, will explain how big data -- the combination of Hadoop and analytical databases -- is transforming the business intelligence industry.
Posted: 01 Jun 2012 | Published: 01 Jun 2012

BeyeNETWORK

Computer Weekly – 13 November 2012: Government commits to open standards
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the government's controversial new policy on open standards and what it means for public sector IT. After hurricane Sandy hit New York, we talk to one datacentre operator about how it kept services running. And our latest buyers' guide examines the market for infrastructure on demand. Read the issue now.
Posted: 09 Nov 2012 | Published: 13 Nov 2012

ComputerWeekly.com

March Issue of Information Security magazine: “Virtual Certainty: VMs introduce a new security dynamic”
sponsored by Information Security Magazine
EZINE: This month’s Information Security Magazine Online cover story explores the need for sound security and risk management strategies around virtualization technology.
Posted: 04 Mar 2011 | Published: 04 Mar 2011

Information Security Magazine
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info