ITPro Today Resource Library

Access the latest white papers, research, webinars, case studies, reports, and more covering a wide range of enterprise IT topics.

Showing results 91 - 120 of 151
Showing results 91 - 120 of 151

Filter by

Filters

State of SIEM 2020

State of SIEM 2020

The Security and Information Event Management (SIEM) market is undergoing transformation, fueled by continuously evolving IT infrastructure: cloud computing, mobility, virtualization, and other business drivers.

State of SIEM 2020

The Security and Information Event Management (SIEM) market is undergoing transformation, fueled by continuously evolving IT infrastructure: cloud computing, mobility, virtualization, and other business drivers.
AT&T Cybersecurity
Sharpen your competitive edge with AI-powered cyber recovery

Sharpen your competitive edge with AI-powered cyber recovery

Tuesday, October 10th, 2:00pm EDT

Sharpen your competitive edge with AI-powered cyber recovery

Tuesday, October 10th, 2:00pm EDT
Rubrik
Raising the search bar: Delivering better ecommerce search experiences

Raising the search bar: Delivering better ecommerce search experiences

Learn how personalized ecommerce search meets consumer needs

Raising the search bar: Delivering better ecommerce search experiences

Learn how personalized ecommerce search meets consumer needs
Elasticsearch
Real-world problems require real-time data: A strategic guide to putting your data to work

Real-world problems require real-time data: A strategic guide to putting your data to work

In this ebook, you’ll find out how (and why) harnessing the power of your data is the answer to your most pressing business challenges.

Real-world problems require real-time data: A strategic guide to putting your data to work

In this ebook, you’ll find out how (and why) harnessing the power of your data is the answer to your most pressing business challenges.
Elasticsearch
The Total Economic Impact™ of Elasticsearch

The Total Economic Impact™ of Elasticsearch

Learn more about how customers are achieving measurable value from Elastic solutions.

The Total Economic Impact™ of Elasticsearch

Learn more about how customers are achieving measurable value from Elastic solutions.
Elasticsearch
Securing Organizational Confidence Throughout Your Cloud Migration

Securing Organizational Confidence Throughout Your Cloud Migration

Tuesday, October 24th, 2:00pm EDT

Securing Organizational Confidence Throughout Your Cloud Migration

Tuesday, October 24th, 2:00pm EDT
Rubrik
Driving Innovation: Harnessing the Power of 5G In-Vehicle Connectivity

Driving Innovation: Harnessing the Power of 5G In-Vehicle Connectivity

Why is cellular communication the logical choice for connecting field teams given its widespread coverage and adoption?

Driving Innovation: Harnessing the Power of 5G In-Vehicle Connectivity

Why is cellular communication the logical choice for connecting field teams given its widespread coverage and adoption?
GetWireless and Sierra Wireless
How to Achieve Guaranteed In-Vehicle Connectivity

How to Achieve Guaranteed In-Vehicle Connectivity

When personnel are in the field, dealing with both urgent and hazardous situations, data is an essential component of the job.

How to Achieve Guaranteed In-Vehicle Connectivity

When personnel are in the field, dealing with both urgent and hazardous situations, data is an essential component of the job.
GetWireless and Sierra Wireless
Key Considerations for In-Vehicle Communication Systems

Key Considerations for In-Vehicle Communication Systems

Thinking about implementing a new in-vehicle communications system for your mobile workforce? How do you get started?

Key Considerations for In-Vehicle Communication Systems

Thinking about implementing a new in-vehicle communications system for your mobile workforce? How do you get started?
GetWireless and Sierra Wireless
Top 5 Reasons Utility Workers Need an In-Vehicle Router

Top 5 Reasons Utility Workers Need an In-Vehicle Router

What you are missing out on if your organization relies on laptops and data cards for in-vehicle communications.

Top 5 Reasons Utility Workers Need an In-Vehicle Router

What you are missing out on if your organization relies on laptops and data cards for in-vehicle communications.
GetWireless and Sierra Wireless
Maximize Performance and Security For Your Unstructured Healthcare Data

Maximize Performance and Security For Your Unstructured Healthcare Data

Tuesday, September 19th, 2:00pm EDT

Maximize Performance and Security For Your Unstructured Healthcare Data

Tuesday, September 19th, 2:00pm EDT
Rubrik
10 Security Threats to Your Remote Workforce

10 Security Threats to Your Remote Workforce

Wednesday, September 13th at 4 pm EDT | Brought to you by Sonet.io

10 Security Threats to Your Remote Workforce

Wednesday, September 13th at 4 pm EDT | Brought to you by Sonet.io
Sonet.io
Enable Browser-Based Secure Access to Servers in Seconds

Enable Browser-Based Secure Access to Servers in Seconds

Providing remote workers with secure acccess to servers is cumbersome and expensive. Learn how to provide browser-based access to servers instead, quickly and easily.

Enable Browser-Based Secure Access to Servers in Seconds

Providing remote workers with secure acccess to servers is cumbersome and expensive. Learn how to provide browser-based access to servers instead, quickly and easily.
Sonet.io
How to Stop Data Leaks When Workers Are Using Tools Like ChatGPT

How to Stop Data Leaks When Workers Are Using Tools Like ChatGPT

Generative AI tools accelerate workers, but leave organizations at risk of data loss. Learn how to safely enable workers with generative AI tools, while protecting corporate IP.

How to Stop Data Leaks When Workers Are Using Tools Like ChatGPT

Generative AI tools accelerate workers, but leave organizations at risk of data loss. Learn how to safely enable workers with generative AI tools, while protecting corporate IP.
Sonet.io
Onboard Remote Workers Securely in Seconds

Onboard Remote Workers Securely in Seconds

Provide a great experience for remote workers, while enhancing security and observability.

Onboard Remote Workers Securely in Seconds

Provide a great experience for remote workers, while enhancing security and observability.
Sonet.io
Securely Onboard Contract Workers in Seconds

Securely Onboard Contract Workers in Seconds

Contractors are essential for many organizations, but providing secure, temporary access to internal apps and servers is difficult, expensive and time consuming. Learn how to provide secure access to remote contractors in seconds.

Securely Onboard Contract Workers in Seconds

Contractors are essential for many organizations, but providing secure, temporary access to internal apps and servers is difficult, expensive and time consuming. Learn how to provide secure access to remote contractors in seconds.
Sonet.io
5 Building Blocks for Strengthening your IT Security Program

5 Building Blocks for Strengthening your IT Security Program

As organizations transform with new business models and new technologies, they must also change the way they provide protection for their systems and processes from cyber risk.

5 Building Blocks for Strengthening your IT Security Program

As organizations transform with new business models and new technologies, they must also change the way they provide protection for their systems and processes from cyber risk.
AT&T Cybersecurity
A comprehensive guide to data management for Slack

A comprehensive guide to data management for Slack

Loaded with intricate, multi-faceted features to boost productivity, Slack has undeniably changed the way we work for the better. However, the more dynamic Slack's workflows and integrations get, the more complex its data becomes. Whether you need to back up Slack data, require it for eDiscovery or investigation, or need support in maintaining compliance and information governance, this guide provides essential insights to help you get started.

A comprehensive guide to data management for Slack

Loaded with intricate, multi-faceted features to boost productivity, Slack has undeniably changed the way we work for the better. However, the more dynamic Slack's workflows and integrations get, the more complex its data becomes. Whether you need to back up Slack data, require it for eDiscovery or investigation, or need support in maintaining compliance and information governance, this guide provides essential insights to help you get started.
Onna
A guide to build vs. buy service models for threat detection and response

A guide to build vs. buy service models for threat detection and response

In today's cybersecurity environment, organizations need a way to balance prevention with detection and response.

A guide to build vs. buy service models for threat detection and response

In today's cybersecurity environment, organizations need a way to balance prevention with detection and response.
AT&T Cybersecurity
Evaluator's Guide For Managed Detection And Response (MDR) Services

Evaluator's Guide For Managed Detection And Response (MDR) Services

Many organizations, inundated by the magnitude and complexity of cybersecurity, are turning to managed detection and response (MDR) services.

Evaluator's Guide For Managed Detection And Response (MDR) Services

Many organizations, inundated by the magnitude and complexity of cybersecurity, are turning to managed detection and response (MDR) services.
AT&T Cybersecurity
How Organizations with an Emerging Cybersecurity Program can Accelerate Risk Reduction

How Organizations with an Emerging Cybersecurity Program can Accelerate Risk Reduction

When cybersecurity programs are mature the security functions of an organization go beyond preventing attacks and breaches and become business enablers. Less mature cybersecurity organizations that haven’t yet grown into that enabler role need to chart a path to get there.

How Organizations with an Emerging Cybersecurity Program can Accelerate Risk Reduction

When cybersecurity programs are mature the security functions of an organization go beyond preventing attacks and breaches and become business enablers. Less mature cybersecurity organizations that haven’t yet grown into that enabler role need to chart a path to get there.
AT&T Cybersecurity
How to Achieve Risk-Based Vulnerability Management

How to Achieve Risk-Based Vulnerability Management

Data is the foundation on which digital business is built. But protecting that data is more difficult than ever as threats grow in number and sophistication.

How to Achieve Risk-Based Vulnerability Management

Data is the foundation on which digital business is built. But protecting that data is more difficult than ever as threats grow in number and sophistication.
AT&T Cybersecurity
How to Continuously Improve Risk Management within Leading Cybersecurity Programs

How to Continuously Improve Risk Management within Leading Cybersecurity Programs

No matter how mature a cybersecurity program has evolved to be, there always remains room for improvement. Many organizations that have mastered the basics of cybersecurity can take their practices to the next level by making architectural improvements, adding more sophisticated detection or monitoring, and streamlining operations.

How to Continuously Improve Risk Management within Leading Cybersecurity Programs

No matter how mature a cybersecurity program has evolved to be, there always remains room for improvement. Many organizations that have mastered the basics of cybersecurity can take their practices to the next level by making architectural improvements, adding more sophisticated detection or monitoring, and streamlining operations.
AT&T Cybersecurity
The Essential Guide to Secure Web Gateway

The Essential Guide to Secure Web Gateway

The rapid adoption of cloud-based applications combined with a more mobile, distributed workforce has put a lot of stress on cyber defenses. It’s challenging for administrators to maintain visibility and control over data. Or to apply unified security policies.

The Essential Guide to Secure Web Gateway

The rapid adoption of cloud-based applications combined with a more mobile, distributed workforce has put a lot of stress on cyber defenses. It’s challenging for administrators to maintain visibility and control over data. Or to apply unified security policies.
AT&T Cybersecurity
Build A Roadmap to a Secure Hybrid Cloud

Build A Roadmap to a Secure Hybrid Cloud

On-Demand Webinar

Build A Roadmap to a Secure Hybrid Cloud

On-Demand Webinar
Rubrik
ITPro Today Daily Newsletter

ITPro Today Daily Newsletter

Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

ITPro Today Daily Newsletter

Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.
ITPro Today
2022 Guide to Modern Programming Languages

2022 Guide to Modern Programming Languages

ITPro Today compares nine programming languages across 11 categories that modern developers should consider when choosing the language that best suits their needs.

2022 Guide to Modern Programming Languages

ITPro Today compares nine programming languages across 11 categories that modern developers should consider when choosing the language that best suits their needs.
ITPro Today
2023 Trends to Watch: IT Operations

2023 Trends to Watch: IT Operations

2023 is about the balanced use of IT operational resources

2023 Trends to Watch: IT Operations

2023 is about the balanced use of IT operational resources
ITPro Today
2023 Trends to Watch: Systems Integration and Application Services

2023 Trends to Watch: Systems Integration and Application Services

Market corrections will drive caution

2023 Trends to Watch: Systems Integration and Application Services

Market corrections will drive caution
ITPro Today
8 Tips for Creating a Ransomware Response Plan

8 Tips for Creating a Ransomware Response Plan

Every organization needs a ransomware response plan. Find out what to do after a ransomware attack.

8 Tips for Creating a Ransomware Response Plan

Every organization needs a ransomware response plan. Find out what to do after a ransomware attack.
ITPro Today
Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.