Exclusive content for IT Pros in the know

Premium Editorial

We have gathered our editorially written E-Books, E-Zine, guides and research to save you the effort of having to track such premium content down on your own, ultimately helping you to solve your toughest IT challenges more effectively – and faster – than ever before.

Premium Editorial By Topic

      • Deloitte CIO Survey 2014

        Deloitte's second global CIO survey assesses CIO's role in innovation, spending and technology priorities, and their relationship with the business.

        View E-Handbook
      • Hacking IT from the inside

        30 September 2014

        Includes:
        • Case study: OpenStack hybrid cloud powers CERN’s experiments with universe
        • Huawei ploughs $4bn into fixed broadband research
        View E-Zine
    • Page 1 of 1
      • Getting control of cloud-based applications

        Employees use cloud services for work whether those services are sanctioned by IT or not. IT's only choices -- aside from blocking every service, which won't make users happy -- are to embrace these services or develop user- and IT-friendly alternatives.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 3
      • Juggling management and benefits of BYOD in the enterprise

        Employees using tablets and smartphones for work, whether through an official bring your own device strategy or not, provides IT the opportunity to deliver new applications, improve efficiency and even save money -- all while satisfying employee demand for constant access to their iPads, iPhones and other devices. This handbook explores those positive aspects of devices in the enterprise and presents the challenges of managing more endpoints, facing security risks and enforcing usage policies.

        View E-Handbook
      • Adopting enterprise mobility management

        The number and types of devices touching the enterprise continue to proliferate, so a mobility assessment is the first step in preparing a comprehensive plan for mobile device management.

        View E-Book
      • Consumerization security and compliance

        Rather than try to secure the plethora of consumer devices accessing their systems, enterprises may have better luck focusing on data and application management. Approaches may include the use of encryption, virtual desktop infrastructure and containers for corporate data and apps. Regulatory compliance and data security are top concerns of enterprise IT administrators, and the bring your own device trend is posing new management challenges. The interaction among consumer devices, conventional desktops and corporate data requires a unified approach to new and existing security tools.

        View E-Handbook
      • State of the art endpoint management

        Employees use cloud services for work whether they’re sanctioned by IT or not. IT's only choices -- aside from blocking every service, which won’t make users happy -- are to embrace these services or develop user- and IT-friendly alternatives. It’s no longer sufficient for enterprise IT admins to periodically patch desktops. They must know how to properly secure data, monitor a range of devices, and understand the roles of virtual desktop infrastructure and cloud computing in delivering apps and data.

        View E-Handbook
      Page 1 of 3
    • Page 1 of 1
      • Corporate data in the consumer cloud

        Consumerization trends are having a massive effect on enterprise IT. As end users turn to easy-to use, cloud-based services such as Dropbox and Gmail, which are out of IT's control, they are putting pressure on corporate IT to provide more flexible and user-friendly applications while maintaining security. Consumer-focused apps and services can offer productivity benefits; they also pose significant challenges and risks for companies that do not have strong data policies. In this series, we delve into data loss prevention and usage polices that can lead to a solid corporate plan. We also explore some of the most popular consumer cloud applications that have entered the enterprise.

        View E-Book
      •  
      Page 1 of 1
    • Page 1 of 1
      • Designing and stocking an enterprise app store

        Enterprise app stores are one way to deploy and manage user access to applications. To the user, an app store appears as a simple portal, but there's a lot that goes into it on the back end. This handbook explains the ins and outs of building an app store, integrating it with identity management systems and tying it into public app stores from Apple and Google.

        View E-Handbook
      • Mobile application delivery: The next frontier

        Just as mobile device management deals with the proliferation of laptops, smartphones and tablets in the enterprise, mobile application management is how IT can make sure that apps and data stay secure across platforms. Let’s look at how to best deliver mobile apps and what tools can help. We take a look at best practices and tools for mobile application delivery.

        Organizations that want to deliver mobile applications to workers across devices can benefit from these best practices and tools for mobile application delivery and management. Instead of monitoring just networks or endpoints, IT must find the most efficient and secure ways to deliver apps to users.

        As enterprise IT attempts to assert uniformity and control over a variety of mobile devices, application delivery and access are primary concerns. The challenge of proper mobile app delivery is an opportunity for new tools as IT shops explore their options.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • The next mobility model: COPE challenges BYOD

        As the initial excitement about the bring your own device trend dies down, alternate approaches to mobility are emerging. The corporate-owned, personally enabled (COPE) model aims to give more control without curbing users’ activities on smartphones and tablets. We explain the pros and cons of BYOD and COPE to help readers decide which model is the best fit.

        View E-Handbook
      •  
      Page 1 of 1

Featured E-ZINES on searchConsumerization.comView all >>

  • Modern Infrastructure

    Modern Infrastructure covers the convergence of technologies -- from cloud computing to virtualization to mobile devices -- and the impact on data centers.

  • CIO Decisions

    Enterprise CIO Decisions Ezine offers IT and business strategies and insights on the latest technologies making waves in the modern IT organization.

ALL TECHTARGET E-ZINES

Featured E-BOOKS on searchConsumerization.comView all >>

  • Enterprise Hadoop: Ready for prime time?

    Many vendors are pitching Hadoop as the foundation for enterprise data management environments that delivers information and insights to business users and serves as a hub for other data systems and applications. In the era of big data, the case for Hadoop is strong: Hadoop provides a cost-effective way to ingest, store and process large volumes of multi-structured data. With Hadoop, organizations can store all data in its original format and provide a system of record for the enterprise. Even more, they can bring the applications to Hadoop and process the data in place.

    But does reality square with the promise today? Are companies willing to trust their enterprise data to Hadoop? The big question is whether Hadoop is ready to support enterprise-scale, production environments where data can't be corrupted or inconsistent. Does Hadoop have adequate management, monitoring, backup, recovery and security features? What are the major gaps today and what are vendors doing to plug the holes? At what point can companies trust production computing environments to Hadoop? This report, based on a comprehensive survey of business intelligence professionals and interviews with experts in the field, addresses these questions.

  • Overcome today's disaster recovery challenges

    The use of devices not connected to a local network is a challenge for IT staffs tasked with protecting data on those devices. Completing backups within a reasonable timeframe has become an issue for organizations. Some organizations are opting for alternatives to traditional backup to address these challenges. The cloud has been pushed as an alternative to tape for offsite storage for disaster recovery. However, there are challenges with this approach and with protecting applications running in the cloud.

OTHER FEATURED E-BOOKS

Featured E-HANDBOOKS on searchConsumerization.comView all >>

OTHER FEATURED E-HANDBOOKS