Protocol Independent Multicast Reports

How to Optimize Your Master Data Management Strategy
sponsored by IBM
EGUIDE: This expert e-guide explores an integrated approach to master data management (MDM) that incorporates an enterprise data governance program. Inside, you'll find out how to optimize your data quality strategy and learn how to garner business support for your MDM initiative.
Posted: 26 Sep 2016 | Published: 21 Sep 2016

IBM

The Promise of Mobile Unified Communications
sponsored by BlackBerry
WHITE PAPER: Mobile unified communications allows organizations to provide employees with the ability to collaborate and communicate efficiently, as well as access information on-demand.
Posted: 09 Jan 2009 | Published: 09 Jan 2009

BlackBerry

E-Book: Getting Started with Master Data Management (MDM)
sponsored by TechTarget Data Management
EBOOK: In this e-book, learn about getting started with MDM programs, including how to sell the idea internally in order to secure funding and how to build a foundation for a successful MDM deployment. In addition, read about MDM trends and some of the challenges that companies can face on MDM implementations.
Posted: 03 May 2010 | Published: 03 May 2010

TechTarget Data Management

How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more.
Posted: 21 May 2010 | Published: 20 May 2010

BeyondTrust Corporation

How to enhance your network for the future
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The world of networking is broad in its scope, and touches on almost every other aspect of enterprise IT.
Posted: 08 Feb 2021 | Published: 15 Aug 2016

TechTarget ComputerWeekly.com

Focus: Network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.
Posted: 08 Feb 2021 | Published: 24 Apr 2017

TechTarget ComputerWeekly.com

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

Virtualization Roadmap: Twists, Turns, and Key Considerations
sponsored by Dell, Inc. and Intel®
PRESENTATION TRANSCRIPT: This expert presentation transcript explores key management factors you should consider as you navigate your virtualization initiative, including licensing, memory capabilities, and more. Hear about one company's virtualization roadmap and determine whether it aligns with your own virtualization plans.
Posted: 10 Oct 2011 | Published: 10 Oct 2011

Dell, Inc. and Intel®

Adaptive Packet Filtering
sponsored by Gigamon
WHITE PAPER: This white paper explores many technical processes of adaptive packet filtering, including filtering on FCoE traffic, mutli-encap filtering, and much more.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

Gigamon

E-Guide: Prioritizing Application Security Concerns
sponsored by TechTarget Security
EGUIDE: Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.
Posted: 02 May 2012 | Published: 02 May 2012

TechTarget Security