ITPro Today Resource Library

Access the latest white papers, research, webinars, case studies, reports, and more covering a wide range of enterprise IT topics.

Showing results 91 - 120 of 152
Showing results 91 - 120 of 152

Filter by

Filters

A practical guide to effective data management and governance for Google Workspace

A practical guide to effective data management and governance for Google Workspace

What you need to know for effective governance of Google Workspace data.

A practical guide to effective data management and governance for Google Workspace

What you need to know for effective governance of Google Workspace data.
Onna
Data migration basics: A comprehensive guide

Data migration basics: A comprehensive guide

The A-Z guide to understanding data migration and how to do it right.

Data migration basics: A comprehensive guide

The A-Z guide to understanding data migration and how to do it right.
Onna
The best data migration plan template to get you started

The best data migration plan template to get you started

Complete your next data migration project on time and within budget. Get the customizable plan template to help ensure a smooth transition.

The best data migration plan template to get you started

Complete your next data migration project on time and within budget. Get the customizable plan template to help ensure a smooth transition.
Onna
The best data retention policy template to get you started

The best data retention policy template to get you started

Need a data retention policy template? Check out this customizable download, complete with best practices for retention, management, and disposal.

The best data retention policy template to get you started

Need a data retention policy template? Check out this customizable download, complete with best practices for retention, management, and disposal.
Onna
5 Building Blocks for Strengthening your IT Security Program

5 Building Blocks for Strengthening your IT Security Program

As organizations transform with new business models and new technologies, they must also change the way they provide protection for their systems and processes from cyber risk.

5 Building Blocks for Strengthening your IT Security Program

As organizations transform with new business models and new technologies, they must also change the way they provide protection for their systems and processes from cyber risk.
AT&T Cybersecurity
A guide to build vs. buy service models for threat detection and response

A guide to build vs. buy service models for threat detection and response

In today's cybersecurity environment, organizations need a way to balance prevention with detection and response.

A guide to build vs. buy service models for threat detection and response

In today's cybersecurity environment, organizations need a way to balance prevention with detection and response.
AT&T Cybersecurity
Evaluator's Guide For Managed Detection And Response (MDR) Services

Evaluator's Guide For Managed Detection And Response (MDR) Services

Many organizations, inundated by the magnitude and complexity of cybersecurity, are turning to managed detection and response (MDR) services.

Evaluator's Guide For Managed Detection And Response (MDR) Services

Many organizations, inundated by the magnitude and complexity of cybersecurity, are turning to managed detection and response (MDR) services.
AT&T Cybersecurity
How Organizations with an Emerging Cybersecurity Program can Accelerate Risk Reduction

How Organizations with an Emerging Cybersecurity Program can Accelerate Risk Reduction

When cybersecurity programs are mature the security functions of an organization go beyond preventing attacks and breaches and become business enablers. Less mature cybersecurity organizations that haven’t yet grown into that enabler role need to chart a path to get there.

How Organizations with an Emerging Cybersecurity Program can Accelerate Risk Reduction

When cybersecurity programs are mature the security functions of an organization go beyond preventing attacks and breaches and become business enablers. Less mature cybersecurity organizations that haven’t yet grown into that enabler role need to chart a path to get there.
AT&T Cybersecurity
How to Achieve Risk-Based Vulnerability�Management

How to Achieve Risk-Based Vulnerability�Management

Data is the foundation on which digital business is built. But protecting that data is more difficult than ever as threats grow in number and sophistication.

How to Achieve Risk-Based Vulnerability�Management

Data is the foundation on which digital business is built. But protecting that data is more difficult than ever as threats grow in number and sophistication.
AT&T Cybersecurity
How to Continuously Improve Risk Management within Leading Cybersecurity Programs

How to Continuously Improve Risk Management within Leading Cybersecurity Programs

No matter how mature a cybersecurity program has evolved to be, there always remains room for improvement. Many organizations that have mastered the basics of cybersecurity can take their practices to the next level by making architectural improvements, adding more sophisticated detection or monitoring, and streamlining operations.

How to Continuously Improve Risk Management within Leading Cybersecurity Programs

No matter how mature a cybersecurity program has evolved to be, there always remains room for improvement. Many organizations that have mastered the basics of cybersecurity can take their practices to the next level by making architectural improvements, adding more sophisticated detection or monitoring, and streamlining operations.
AT&T Cybersecurity
State of SIEM 2020

State of SIEM 2020

The Security and Information Event Management (SIEM) market is undergoing transformation, fueled by continuously evolving IT infrastructure: cloud computing, mobility, virtualization, and other business drivers.

State of SIEM 2020

The Security and Information Event Management (SIEM) market is undergoing transformation, fueled by continuously evolving IT infrastructure: cloud computing, mobility, virtualization, and other business drivers.
AT&T Cybersecurity
Sharpen your competitive edge with AI-powered cyber recovery

Sharpen your competitive edge with AI-powered cyber recovery

Tuesday, October 10th, 2:00pm EDT

Sharpen your competitive edge with AI-powered cyber recovery

Tuesday, October 10th, 2:00pm EDT
Rubrik
Raising the search bar: Delivering better ecommerce search experiences

Raising the search bar: Delivering better ecommerce search experiences

Learn how personalized ecommerce search meets consumer needs

Raising the search bar: Delivering better ecommerce search experiences

Learn how personalized ecommerce search meets consumer needs
Elasticsearch
Real-world problems require real-time data: A strategic guide to putting your data to work

Real-world problems require real-time data: A strategic guide to putting your data to work

In this ebook, you’ll find out how (and why) harnessing the power of your data is the answer to your most pressing business challenges.

Real-world problems require real-time data: A strategic guide to putting your data to work

In this ebook, you’ll find out how (and why) harnessing the power of your data is the answer to your most pressing business challenges.
Elasticsearch
The Total Economic Impact™ of Elasticsearch

The Total Economic Impact™ of Elasticsearch

Learn more about how customers are achieving measurable value from Elastic solutions.

The Total Economic Impact™ of Elasticsearch

Learn more about how customers are achieving measurable value from Elastic solutions.
Elasticsearch
Securing Organizational Confidence Throughout Your Cloud Migration

Securing Organizational Confidence Throughout Your Cloud Migration

Tuesday, October 24th, 2:00pm EDT

Securing Organizational Confidence Throughout Your Cloud Migration

Tuesday, October 24th, 2:00pm EDT
Rubrik
Driving Innovation: Harnessing the Power of 5G In-Vehicle Connectivity

Driving Innovation: Harnessing the Power of 5G In-Vehicle Connectivity

Why is cellular communication the logical choice for connecting field teams given its widespread coverage and adoption?

Driving Innovation: Harnessing the Power of 5G In-Vehicle Connectivity

Why is cellular communication the logical choice for connecting field teams given its widespread coverage and adoption?
GetWireless and Sierra Wireless
How to Achieve Guaranteed In-Vehicle Connectivity

How to Achieve Guaranteed In-Vehicle Connectivity

When personnel are in the field, dealing with both urgent and hazardous situations, data is an essential component of the job.

How to Achieve Guaranteed In-Vehicle Connectivity

When personnel are in the field, dealing with both urgent and hazardous situations, data is an essential component of the job.
GetWireless and Sierra Wireless
Key Considerations for In-Vehicle Communication Systems

Key Considerations for In-Vehicle Communication Systems

Thinking about implementing a new in-vehicle communications system for your mobile workforce? How do you get started?

Key Considerations for In-Vehicle Communication Systems

Thinking about implementing a new in-vehicle communications system for your mobile workforce? How do you get started?
GetWireless and Sierra Wireless
Top 5 Reasons Utility Workers Need an In-Vehicle Router

Top 5 Reasons Utility Workers Need an In-Vehicle Router

What you are missing out on if your organization relies on laptops and data cards for in-vehicle communications.

Top 5 Reasons Utility Workers Need an In-Vehicle Router

What you are missing out on if your organization relies on laptops and data cards for in-vehicle communications.
GetWireless and Sierra Wireless
Maximize Performance and Security For Your Unstructured Healthcare Data

Maximize Performance and Security For Your Unstructured Healthcare Data

Tuesday, September 19th, 2:00pm EDT

Maximize Performance and Security For Your Unstructured Healthcare Data

Tuesday, September 19th, 2:00pm EDT
Rubrik
10 Security Threats to Your Remote Workforce

10 Security Threats to Your Remote Workforce

Wednesday, September 13th at 4 pm EDT | Brought to you by Sonet.io

10 Security Threats to Your Remote Workforce

Wednesday, September 13th at 4 pm EDT | Brought to you by Sonet.io
Sonet.io
Enable Browser-Based Secure Access to Servers in Seconds

Enable Browser-Based Secure Access to Servers in Seconds

Providing remote workers with secure acccess to servers is cumbersome and expensive. Learn how to provide browser-based access to servers instead, quickly and easily.

Enable Browser-Based Secure Access to Servers in Seconds

Providing remote workers with secure acccess to servers is cumbersome and expensive. Learn how to provide browser-based access to servers instead, quickly and easily.
Sonet.io
How to Stop Data Leaks When Workers Are Using Tools Like ChatGPT

How to Stop Data Leaks When Workers Are Using Tools Like ChatGPT

Generative AI tools accelerate workers, but leave organizations at risk of data loss. Learn how to safely enable workers with generative AI tools, while protecting corporate IP.

How to Stop Data Leaks When Workers Are Using Tools Like ChatGPT

Generative AI tools accelerate workers, but leave organizations at risk of data loss. Learn how to safely enable workers with generative AI tools, while protecting corporate IP.
Sonet.io
Onboard Remote Workers Securely in Seconds

Onboard Remote Workers Securely in Seconds

Provide a great experience for remote workers, while enhancing security and observability.

Onboard Remote Workers Securely in Seconds

Provide a great experience for remote workers, while enhancing security and observability.
Sonet.io
Securely Onboard Contract Workers in Seconds

Securely Onboard Contract Workers in Seconds

Contractors are essential for many organizations, but providing secure, temporary access to internal apps and servers is difficult, expensive and time consuming. Learn how to provide secure access to remote contractors in seconds.

Securely Onboard Contract Workers in Seconds

Contractors are essential for many organizations, but providing secure, temporary access to internal apps and servers is difficult, expensive and time consuming. Learn how to provide secure access to remote contractors in seconds.
Sonet.io
ITPro Today Daily Newsletter

ITPro Today Daily Newsletter

Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

ITPro Today Daily Newsletter

Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.
ITPro Today
2022 Guide to Modern Programming Languages

2022 Guide to Modern Programming Languages

ITPro Today compares nine programming languages across 11 categories that modern developers should consider when choosing the language that best suits their needs.

2022 Guide to Modern Programming Languages

ITPro Today compares nine programming languages across 11 categories that modern developers should consider when choosing the language that best suits their needs.
ITPro Today
2023 Trends to Watch: IT Operations

2023 Trends to Watch: IT Operations

2023 is about the balanced use of IT operational resources

2023 Trends to Watch: IT Operations

2023 is about the balanced use of IT operational resources
ITPro Today
2023 Trends to Watch: Systems Integration and Application Services

2023 Trends to Watch: Systems Integration and Application Services

Market corrections will drive caution

2023 Trends to Watch: Systems Integration and Application Services

Market corrections will drive caution
ITPro Today
Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.