TechRepublic Premium

Displaying 11 - 20 of 1159 results

  • Research: How 5G will transform business

    Downloads · Jan 2020 · Provided By TechRepublic Premium

    Now that 5G access is becoming available in major US cities, it may significantly impact how businesses use the Internet of Things (IoT). 5G promises higher bandwidth and ultra-reliable, low latency communications, which are needed for the next generation of IoT devices to drive the digital transformation of business processes,...

    Download Now
  • Access management policy

    Downloads · Jan 2020 · Provided By TechRepublic Premium

    Without appropriate access management controls, businesses are at significant risk from the loss or theft of both physical and digital assets. Access management controls establish who is allowed the appropriate level of access in order to do their jobs, while reducing the potential for damage or harm to the company....

    Download Now
  • Bring your own device (BYOD) policy

    Downloads · Jan 2020 · Provided By TechRepublic Premium

    The Bring Your Own Device (BYOD) movement has helped business save money on technological spending by allowing employees to use their own mobile devices, tablets or other electronics to conduct company operations. The convenience of letting users rely upon devices they are familiar with (and for which they have their...

    Download Now
  • Quick glossary: Cybersecurity countermeasures

    Downloads · Jan 2020 · Provided By TechRepublic Premium

    Cybersecurity attacks are inevitable for modern business. Therefore, it is vital that businesses deploy countermeasures to mitigate the damage these attacks cause. This quick glossary from TechRepublic Premium explains the terminology behind the most common cybersecurity countermeasures in use today and will help you understand what factors you should consider...

    Download Now
  • Malware response checklist

    Tools & Templates · Jan 2020 · Provided By TechRepublic Premium

    Whether an infection is the result of a disgruntled employee, hardware vulnerability, software-based threat, social engineering penetration, robotic attack or human error, all organizations must be prepared to immediately respond effectively to such infections if the corresponding damage is to be minimized. Because even the best protected networks become infected,...

    View This Now
  • Security Response Policy

    Downloads · Jan 2020 · Provided By TechRepublic Premium

    Good cyber and physical security can make or break companies. While of course it would be preferable that security breaches or incidents not take place at all, they don’t necessarily signal the death knell of an organization unless responded to in a poor fashion (or not at all). Companies with...

    Download Now
  • Hiring kit: Storage engineer

    Tools & Templates · Dec 2019 · Provided By TechRepublic Premium

    Storage engineers take ownership and responsibility for the smooth operation of an organization’s communication and storage networks. This hiring kit from TechRepublic Premium provides a workable framework you can use to find, recruit, and ultimately hire the best candidate for your organization. From the hiring kit: INTRODUCTION Regardless of size,...

    View This Now
  • Storage area networking (SANs) policy

    Downloads · Dec 2019 · Provided By TechRepublic Premium

    Storage Area Networks (SANs) provide manageable, centralized storage capacity for systems offering vast amounts of disk space via a dedicated network link. SANs can offer servers much more disk space than they might be able to utilize locally, often spanning dozens if not hundreds of terabytes of data. Because of...

    Download Now
  • Checklist: Consultant evaluation form

    Tools & Templates · Dec 2019 · Provided By TechRepublic Premium

    Organizations contract with a vast range of information technology consultants. Whether requiring programming and coding services, managed services assistance, security consulting expertise or other assistance, success typically depends upon selecting a capable provider that under- stands the organization’s needs, possesses the required expertise, and is capable of completing the project...

    View This Now
  • Emerging technology: What tech pros need to know

    Downloads · Dec 2019 · Provided By TechRepublic Premium

    Everyday IT professionals are tasked with identifying, evaluating, analyzing, learning--and possibly--deploying new technologies. With an array of new technology launching seemingly daily, how does a tech professional weed through the hype to determine what emerging technologies are most relevant to their business? This ebook from TechRepublic Premium is here to...

    Download Now