IT Management  >  

IT Governance

RSS Feed   
ALSO CALLED: Information Technology Governance, Governance
DEFINITION: IT governance is a structure of processes that govern decision making around investment decisions, client relationships, project management and other important IT operational areas.
IT Governance Reports
1 - 25 of 261 Matches Previous Page  |  Next Page
Executive Summary 2020 Thales Data Threat Report
sponsored by Thales
ANALYST REPORT: Threat intelligence and information has never been more valuable to businesses. As such, an IDC survey commissioned by Thales found that 45% of respondents felt that their organizations would exceed their original 2020 security budgets. In APAC, the time for action is now. Read the full threat report to see how attitudes are changing.
Posted: 24 Sep 2020 | Published: 24 Sep 2020

Thales

Project Brief: Inside Juniper's radical IT transformation
sponsored by ComputerWeekly.com
EGUIDE: Western Australian aged care provider Juniper embarked on an aggressive strategy to completely transform its IT operations in just two years. This 1-page brief summarises how this overhaul has helped free up the resources needed to provide better quality of care for residents.
Posted: 14 Sep 2020 | Published: 15 Sep 2020

ComputerWeekly.com

Beyond COVID-19 Webinar
sponsored by Hyperproof
WEBCAST: COVID-19 has both introduced new risks and amplified existing ones. Business continuity, security, crisis management and customer acquisition have all been put to the test, and all the while, the economy has become totally unpredictable. Watch this webinar to learn how to manage new risks and stay compliant throughout COVID-19 and beyond.
Posted: 14 Sep 2020 | Premiered: Sep 14, 2020

Hyperproof

IDC Market Share
sponsored by Splunk
WHITE PAPER: Check out this white paper for an update on the IT operations management market including a market share snapshot, revenue snapshot, advice for technology suppliers, what vendor shaped the year and much more.
Posted: 14 Sep 2020 | Published: 14 Sep 2020

Splunk

Advances in Technology Make Virtual Health a Reality
sponsored by Comcast Business
WHITE PAPER: Virtual health, otherwise known as telehealth, has gained popularity over the last few years. More than video chat with a physician, it has emerged as an extension of, and possibly a replacement for, in-person health services. But the technology behind it must live up to expectation. Read this white paper to learn 4 challenges of virtual health.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

Comcast Business

The Power of Tokenization for Protecting Sensitive Data
sponsored by Thales
WHITE PAPER: For protecting sensitive data, there are many security options to choose from. Tokenization is not yet a popular choice, but it may serve organizations well in fending off threat actors. Sensitive data is replaced with a non-sensitive equivalent, known as a token, that has no exploitable meaning or value. Dig into this white paper to learn more.
Posted: 09 Sep 2020 | Published: 09 Sep 2020

Thales

How is the Role and World of the CISO Changing?
sponsored by Kaspersky Lab
RESOURCE: As cybersecurity risks increase, the role of the CISO becomes more dynamic. 70% of current CISOs report that risk management is now a key part of their role. For more CISO trends, take a look at this survey conducted by 451 Research. Use it to understand what the role of today’s CISOs looks like as well as the top 5 skills to succeed in the role.
Posted: 09 Sep 2020 | Published: 09 Sep 2020

Kaspersky Lab

Top 10 Ways Your IT Team is Wasting Time (And What You Can Do About It)
sponsored by Advizex
WHITE PAPER: Access this white paper to see the 10 most common IT inefficiencies that organizations are facing and learn how to solve them.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Advizex

Top reasons for running SAP solutions on Red Hat and IBM infrastructure
sponsored by Red Hat
WHITE PAPER: Explore some of the top reasons for running SAP solutions on Red Hat and IBM infrastructure in this product overview.
Posted: 02 Sep 2020 | Published: 02 Sep 2020

Red Hat

IT And Security Silos: A Spotlight On The APAC Region
sponsored by VMware
WHITE PAPER: VMware commissioned Forrester Consulting to evaluate the relationship between IT and security teams. These two important organizational pieces tend to disagree with one another. Their leaders plan to consolidate the two, which brings both great challenges and great benefits. Read this report to learn why this is so crucial today.
Posted: 31 Aug 2020 | Published: 31 Aug 2020

VMware

Best of Both Worlds: Modernize IT Environments While Protecting Existing Investments
sponsored by Hewlett Packard Enterprise
RESOURCE: Access this resource from 451 Research to discover the results of a survey of over 1000 IT decision-makers discussing the future of IT environments and how composable infrastructure can mitigate current pain points, with 4 key takeaways.
Posted: 31 Aug 2020 | Published: 31 Aug 2020

Hewlett Packard Enterprise

Tension between IT and Security Professionals Reinforces Silos and Security Strain
sponsored by VMware
WHITE PAPER: IT and security teams have a hard time seeing eye to eye. They are often siloed as a result, and this can be a major risk to network integrity. VMware commissioned Forrester Consulting to learn how consolidating IT and security could help improve security outcomes. Read their report to see the results and learn 3 key findings.
Posted: 31 Aug 2020 | Published: 31 May 2020

VMware

CW Benelux November 2019-January 2020: Dutch banks fight money laundering
sponsored by ComputerWeekly.com
EGUIDE: Dutch banks have decided to work together in the fight against money laundering. Globally, only about 3% of money laundering activity is detected and stopped.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

ComputerWeekly.com

Security as a Team Sport: A Spotlight on the Growing Role of IT in Security Tasks
sponsored by VMware
WHITE PAPER: IT and security teams have a hard time seeing eye to eye. They are often siloed as a result, and this can be a major risk to network integrity. VMware commissioned Forrester Consulting to learn how consolidating IT and security could help improve security outcomes. Read their report to see the results and learn 3 key findings.
Posted: 27 Aug 2020 | Published: 31 May 2020

VMware

Higher Education Industry Brief
sponsored by Ahead LLC
WHITE PAPER: Universities are challenged to improve academic outcomes, foster cutting-edge research, and extend greater access to education. Overcoming these starts with upgrading legacy IT infrastructure. Read this product brief for an overview of AHEAD’s digital delivery platform and how it can be used to support DX in higher education.
Posted: 26 Aug 2020 | Published: 26 Aug 2020

Ahead LLC

The digital governance imperative
sponsored by Capgemini
WHITE PAPER: A robust digital governance strategy is no longer a luxury. Today, digital governance is a critical requirement for any company looking to drive value. This article proposes an easy solution: Combine ServiceNow’s platform and automated workflows with Capgemini’s custom Digital Governance Framework.
Posted: 25 Aug 2020 | Published: 25 Aug 2020

TOPICS:  IT Governance
Capgemini

Danger Within: Email and Security Awareness Training Strategies for Effective Account Takeover Protection
sponsored by Mimecast
WHITE PAPER: It’s a common misconception that email-borne attacks come only from outside the organization. Can your employees discern an impersonation email or email attack using a legitimate internal account? How good is your security posture? Take a look at this whitepaper how you can create more effective email security as well as a more vigilant workforce.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

Mimecast

Capgemini is selected by Bayer as a core strategic partner to transform its IT landscape
sponsored by Capgemini
RESOURCE: In this press release, learn about Bayer AG and Capgemini’s new deal, which will include massive IT transformation and digitization of Bayer’s core systems, like ERP, UC, cloud infrastructure and more.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

Capgemini

Worldwide ITOM Analysis
sponsored by Splunk
ANALYST REPORT: Dive into this Gartner Market Share Analysis to learn about the top five vendors in the ITOM space and their core competencies and to get more information on the latest trends in the ITOM world.
Posted: 21 Aug 2020 | Published: 21 Aug 2020

Splunk

Tropical Smoothie Cafe growth required a new recipe for technology support
sponsored by Capgemini
CASE STUDY: When Tropical Smoothie Café needed a way to provide franchisees with proper IT support, they decided to implement Capgemini’s Agile Store solution. Learn about their experience—and the benefits they’ve realized with Capgemini—in this case study.
Posted: 21 Aug 2020 | Published: 21 Aug 2020

Capgemini

DTEX and Phishing
sponsored by Dtex
CASE STUDY: Phishing shows no signs of slowing down. It’s responsible for more than 90% of incidents and data breaches driven by social engineering, with 66% of malware reportedly installed via malicious email attachments. Vigilance is key. View this case study to find out how DTEX was able to help an energy company locate the origin of a phishing attack.
Posted: 18 Aug 2020 | Published: 18 Aug 2020

Dtex

How IT Security is Adapting to the Changing Environment in 2020
sponsored by Cisco Umbrella
WEBCAST: With COVID-19 upon the world, IT security professionals are asking: What are the main challenges organizations are facing? What are some of the trends in the security market today? How can businesses adapt to stay secure now that employees and customers are working from home? Watch this webcast for a look at answers to these questions.
Posted: 18 Aug 2020 | Premiered: Apr 21, 2020

Cisco Umbrella

Product Video: Page Integrity Manager
sponsored by Akamai Technologies
VIDEO: Did you know that third-party scripts running on your website can make up more than half the code in your digital ecosystem? Those scripts are often outside your control, leaving you vulnerable at the browser-level. Watch this product demo and learn about a powerful, easy to implement, behavior-based approach to script attacks.
Posted: 13 Aug 2020 | Premiered: 13 Aug 2020

Akamai Technologies

Modernizing Aramex for greater agility and innovation
sponsored by Rackspace
CASE STUDY: Read this case study to see how manufacturing company, Aramex, was able to streamline their cloud migration with the help of Rackspace and explore the benefits they’ve experienced since moving.
Posted: 12 Aug 2020 | Published: 12 Aug 2020

Rackspace

How to Secure Operational Technology
sponsored by Fortinet, Inc.
RESOURCE: The consequences of a successful intrusion into operational technology (OT) are serious. In businesses that rely on operational and industrial production systems, the chief information security officer (CISO) must ensure that security teams have the right architectural defenses in place. Read this checklist for 7 considerations for securing OT.
Posted: 07 Aug 2020 | Published: 05 May 2020

Fortinet, Inc.
1 - 25 of 261 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info