IT Policies

  • Research // Aug 2014

    Process Powered Change Management

    Deliver change with accuracy and speed. This new infographic shows how companies have achieved 50% improvement in speed and accuracy with server change management. Get more facts and insights by downloading the infographic now.

    Sponsored By HP

  • Research // Aug 2014

    The Hidden Cost of Compliance

    Database auditing is an integral part of every organization’s compliance protocol, but the built-in auditing tools that come with your database exact a heavy toll on hardware, software, storage, and human resource costs. Businesses have to comply with data protection statutes in more than 100 countries around the world,...

    Sponsored By Imperva

  • Research // Jul 2014

    Mitigating Multiple DDoS Attack Vectors

    Security professionals need to understand how to plug the security gap from Layers 3 to 7, and protect against multi-layer attacks, with a full proxy security architecture.  It's time to rethink and refine the enterprise security architecture, so organizations can remain agile and resilient against future threats.  Download this infographic...

    Sponsored By F5

  • Research // Jul 2014

    Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations. This Gartner report: Covers the major features of WAF technology...

    Sponsored By Imperva

  • Research // Jul 2014

    2014 Gartner Magic Quadrant for Web Application Firewalls

    Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.

    Sponsored By Imperva

  • Research // May 2014

    Lopez Research: Transforming Workflows with Video

    Every company, regardless of size, is becoming a technology company. Line of business managers and the executive team recognize that a strong technology foundation is critical for a company’s success. IT and business alignment must become more than an ideal or a vision. Likewise, IT must proactively offer new services...

    Provided By Polycom, Inc.

  • Research // Apr 2014

    Gartner Confirms: Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations.

    Provided By Imperva

  • Research // Nov 2013

    Support For the New Style of IT : Proactive Care Demo

    When technology issues arise, critical business processes can slow down or stop, and the problem snowballs. HP Proactive Care enables you to anticipate problems and correct them before they disrupt workflow. What are your support challenges, now and for your new IT reality? Explore this demonstration to see how industry...

    Provided By Hewlett-Packard (HP)

  • Research // Apr 2013

    Digital Document Delivery and Management: Achieving Compliance, Security and Improved Patient Care

    Healthcare IT News conducted a survey in January 2012 on behalf of the OpenText Fax and Document Distribution Group, the global market leader in fax and electronic document delivery solutions, to identify drivers and challenges for developing and deploying a solution for centralized digital document delivery that complies with healthcare...

    Provided By OpenText

  • Research // Mar 2013

    IBM PureApplication System Data Sheet

    The PureApplication System is specifically designed and tuned for transactional web and database applications. Its workload-aware, flexible platform is designed to be easier to deploy, customize, safeguard and manage in a traditional or private cloud environment.

    Provided By IBM

  • Research // Feb 2013

    Security Intelligence Can Deliver Value Beyond Expectations And Needs To Be Prioritized

    First-generation security intelligence and security incident and event management products have promised a lot, but some of these tools require considerable resources to manage the solution. The growth in security-as-a-service offerings, however, offers an opportunity for information security teams to follow the path successfully laid by many other IT departments....

    Provided By IBM

  • Research // Feb 2013

    Reputational risk and IT: How security and business continuity can shape the reputation and value of your company

    Reputational risk and IT is an IBM study that investigates how organizations around the world are managing their reputations in today’s digital era. IT risk can imperil companies’ productivity, damage customer relations and ultimately erode trust. Read the research report to find out the three principal forces that drive corporate...

    Provided By IBM

  • Research // Feb 2013

    Security Intelligence Can Deliver Value Beyond Expectations

    First-generation security intelligence and security incident and event management products have promised a lot, but some of these tools require considerable resources to manage the solution. The growth in security-as-a-service offerings, however, offers an opportunity for information security teams to follow the path successfully laid by many other IT departments....

    Provided By IBM

  • Research // Feb 2013

    Source Business Technology Resiliency Capabilities

    Most business continuity management teams today are understaffed, consisting of just a few dedicated corporate resources and regional or business unit representatives. Sound familiar? If so, outsourcing your organization’s business resiliency planning, strategy and program design can be a cost-effective, efficient option. In a study of global business continuity vendors,...

    Provided By IBM

  • Research // Jan 2013

    System x Selection Tool

    Are old servers holding your business back? Maybe it's time to think about replacing them. The right server can reduce costs and complexity while improving business performance. Check out this simple IBM® System x® Selection Tool to find out which server solution, powered by the latest Intel® Xeon® processor...

    Provided By IBM

  • Research // Jan 2013

    How Mobility Is Changing the World

    Never before in the history of technology, has there been such strong development in three key areas: the power of devices; the plethora of back-end information; and the ability to integrate multiple sources of the latter to display on the former. As a result, these global deployments of mobile technology...

    Provided By SAP

  • Research // Jun 2012

    Amazon Web Services: A guide to Amazon's cloud

    Amazon launched its cloud in 2006 and since then it has come to dominate the industry. Amazon's APIs are a de facto standard, as almost any popular start-up you care to name has used its services. Enterprises are piling into its low-cost infrastructure-as-a-service technology for anything from basic storage to...

    Provided By ZDNet

  • Research // Feb 2012

    ACTA: A guide to the treaty from ZDNet

    What is ACTA, the Anti-Counterfeiting Trade Agreement? The international legislation is an intensely contentious document. Drawn up mostly behind closed doors, its purpose is to harmonise intellectual-property enforcement around the world and cut down on counterfeiting and commercial-scale piracy. Why does it matter? Critics say its wording could be used...

    Provided By ZDNet

  • Research // Feb 2012

    IT Priorities ANZ 2011: IT Services, Support & Management

    This paper is a subsidiary report to IT Priorities 2011, and looks in more depth than the main report at the current deployment and intended future deployment of a range of IT services, support and management initiatives. The priority initiatives are: IT Training, Asset Management, IT Recruitment, Project Management and...

    Provided By ZDNet

  • Research // Jan 2010

    Best Practices in Lifecycle Management: Comparing KACE, Altiris, LANDesk, and Microsoft SCCM

    Compares the KBOX? family of appliances from KACE with leading competitors Altiris, LANDesk, and Microsoft. It explains key best practices in lifecycle management, uses these as a framework for functional comparison, and includes a cost comparison to determine overall solution value.

    Provided By KACE

  • Research // Nov 2009

    Optimize your performance with the Smart Work Advisor

    Smart Work Advisor shows how businesses can optimize their performance by providing a decision tree they can use to adapt dynamically, collaborate more effectively and connect people and processes inside and outside the organization.

    Provided By IBM

  • Research // Nov 2005

    IT Strategy Maps: A Tool For Strategic Alignment

    Aligning IT and business strategy remains the No. 1 or No. 2 business IT issue year after year. But no matter how much focus and attention this subject receives, little progress seems to be made. Forrester recommends that 1) firms start measuring strategic alignment as part of the "you can't...

    Provided By Forrester Research

  • Research // Oct 2005

    The CIO Profile

    Although CIOs have more access to the business than they did even a year ago, their background and time management choices have typecast them as technology specialists. Most business users view the CIO as a technology expert, and CIOs spend most of their time reinforcing this perception by focusing on...

    Provided By Forrester Research

  • Research // Jul 2014

    2014 Gartner Magic Quadrant for Web Application Firewalls

    Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.

    Sponsored By Imperva

  • Research // Jul 2014

    Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations. This Gartner report: Covers the major features of WAF technology...

    Sponsored By Imperva

  • Research // Jul 2014

    Mitigating Multiple DDoS Attack Vectors

    Security professionals need to understand how to plug the security gap from Layers 3 to 7, and protect against multi-layer attacks, with a full proxy security architecture.  It's time to rethink and refine the enterprise security architecture, so organizations can remain agile and resilient against future threats.  Download this infographic...

    Sponsored By F5

  • Research // Aug 2014

    The Hidden Cost of Compliance

    Database auditing is an integral part of every organization’s compliance protocol, but the built-in auditing tools that come with your database exact a heavy toll on hardware, software, storage, and human resource costs. Businesses have to comply with data protection statutes in more than 100 countries around the world,...

    Sponsored By Imperva

  • Research // Aug 2014

    Process Powered Change Management

    Deliver change with accuracy and speed. This new infographic shows how companies have achieved 50% improvement in speed and accuracy with server change management. Get more facts and insights by downloading the infographic now.

    Sponsored By HP

  • Research // Jan 2010

    Best Practices in Lifecycle Management: Comparing KACE, Altiris, LANDesk, and Microsoft SCCM

    Compares the KBOX? family of appliances from KACE with leading competitors Altiris, LANDesk, and Microsoft. It explains key best practices in lifecycle management, uses these as a framework for functional comparison, and includes a cost comparison to determine overall solution value.

    Provided By KACE

  • Research // Apr 2014

    Gartner Confirms: Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations.

    Provided By Imperva

  • Research // Jan 2013

    System x Selection Tool

    Are old servers holding your business back? Maybe it's time to think about replacing them. The right server can reduce costs and complexity while improving business performance. Check out this simple IBM® System x® Selection Tool to find out which server solution, powered by the latest Intel® Xeon® processor...

    Provided By IBM

  • Research // Feb 2013

    Security Intelligence Can Deliver Value Beyond Expectations And Needs To Be Prioritized

    First-generation security intelligence and security incident and event management products have promised a lot, but some of these tools require considerable resources to manage the solution. The growth in security-as-a-service offerings, however, offers an opportunity for information security teams to follow the path successfully laid by many other IT departments....

    Provided By IBM

  • Research // Feb 2013

    Reputational risk and IT: How security and business continuity can shape the reputation and value of your company

    Reputational risk and IT is an IBM study that investigates how organizations around the world are managing their reputations in today’s digital era. IT risk can imperil companies’ productivity, damage customer relations and ultimately erode trust. Read the research report to find out the three principal forces that drive corporate...

    Provided By IBM

  • Research // Feb 2013

    Security Intelligence Can Deliver Value Beyond Expectations

    First-generation security intelligence and security incident and event management products have promised a lot, but some of these tools require considerable resources to manage the solution. The growth in security-as-a-service offerings, however, offers an opportunity for information security teams to follow the path successfully laid by many other IT departments....

    Provided By IBM

  • Research // Mar 2013

    IBM PureApplication System Data Sheet

    The PureApplication System is specifically designed and tuned for transactional web and database applications. Its workload-aware, flexible platform is designed to be easier to deploy, customize, safeguard and manage in a traditional or private cloud environment.

    Provided By IBM

  • Research // Nov 2009

    Optimize your performance with the Smart Work Advisor

    Smart Work Advisor shows how businesses can optimize their performance by providing a decision tree they can use to adapt dynamically, collaborate more effectively and connect people and processes inside and outside the organization.

    Provided By IBM

  • Research // Nov 2013

    Support For the New Style of IT : Proactive Care Demo

    When technology issues arise, critical business processes can slow down or stop, and the problem snowballs. HP Proactive Care enables you to anticipate problems and correct them before they disrupt workflow. What are your support challenges, now and for your new IT reality? Explore this demonstration to see how industry...

    Provided By Hewlett-Packard (HP)

  • Research // Jan 2013

    How Mobility Is Changing the World

    Never before in the history of technology, has there been such strong development in three key areas: the power of devices; the plethora of back-end information; and the ability to integrate multiple sources of the latter to display on the former. As a result, these global deployments of mobile technology...

    Provided By SAP

  • Research // Oct 2005

    The CIO Profile

    Although CIOs have more access to the business than they did even a year ago, their background and time management choices have typecast them as technology specialists. Most business users view the CIO as a technology expert, and CIOs spend most of their time reinforcing this perception by focusing on...

    Provided By Forrester Research

  • Research // Nov 2005

    IT Strategy Maps: A Tool For Strategic Alignment

    Aligning IT and business strategy remains the No. 1 or No. 2 business IT issue year after year. But no matter how much focus and attention this subject receives, little progress seems to be made. Forrester recommends that 1) firms start measuring strategic alignment as part of the "you can't...

    Provided By Forrester Research

  • Research // Apr 2013

    Digital Document Delivery and Management: Achieving Compliance, Security and Improved Patient Care

    Healthcare IT News conducted a survey in January 2012 on behalf of the OpenText Fax and Document Distribution Group, the global market leader in fax and electronic document delivery solutions, to identify drivers and challenges for developing and deploying a solution for centralized digital document delivery that complies with healthcare...

    Provided By OpenText

  • Research // May 2014

    Lopez Research: Transforming Workflows with Video

    Every company, regardless of size, is becoming a technology company. Line of business managers and the executive team recognize that a strong technology foundation is critical for a company’s success. IT and business alignment must become more than an ideal or a vision. Likewise, IT must proactively offer new services...

    Provided By Polycom, Inc.

  • Research // Feb 2013

    Source Business Technology Resiliency Capabilities

    Most business continuity management teams today are understaffed, consisting of just a few dedicated corporate resources and regional or business unit representatives. Sound familiar? If so, outsourcing your organization’s business resiliency planning, strategy and program design can be a cost-effective, efficient option. In a study of global business continuity vendors,...

    Provided By IBM

  • Research // Jun 2012

    Amazon Web Services: A guide to Amazon's cloud

    Amazon launched its cloud in 2006 and since then it has come to dominate the industry. Amazon's APIs are a de facto standard, as almost any popular start-up you care to name has used its services. Enterprises are piling into its low-cost infrastructure-as-a-service technology for anything from basic storage to...

    Provided By ZDNet

  • Research // Feb 2012

    ACTA: A guide to the treaty from ZDNet

    What is ACTA, the Anti-Counterfeiting Trade Agreement? The international legislation is an intensely contentious document. Drawn up mostly behind closed doors, its purpose is to harmonise intellectual-property enforcement around the world and cut down on counterfeiting and commercial-scale piracy. Why does it matter? Critics say its wording could be used...

    Provided By ZDNet

  • Research // Feb 2012

    IT Priorities ANZ 2011: IT Services, Support & Management

    This paper is a subsidiary report to IT Priorities 2011, and looks in more depth than the main report at the current deployment and intended future deployment of a range of IT services, support and management initiatives. The priority initiatives are: IT Training, Asset Management, IT Recruitment, Project Management and...

    Provided By ZDNet