Essential Guides
TechTarget editors have curated a collection of “essential” articles on key IT topics. These articles have been packaged into guides which offer our readers comprehensive, problem solving content to help inform and guide their research.
Sponsored
-
A guide to threat management
This is a CIOs guide to threat management. Continue Reading
-
Essential guide to application modernisation
Tools and technologies are emerging that help IT leaders to modernise existing applications and maintain their investment in legacy systems Continue Reading
-
Essential guide to laptop, desktop PC and mobile device strategy
A guide to the latest technologies and best practice in enterprise IT strategy for laptops, desktop PCs and mobile Continue Reading
Editorial
-
Healthcare cybersecurity risks and management
Healthcare institutions are rich in what cybercriminals want: sensitive data like PII and financial information. Learn the danger and what an effective strategy must include. Continue Reading
-
Essential Guide: Data Analytics in Healthcare
In the healthcare industry, a large amount of data is already being collected to generate insights on emerging conditions and to improve patient care. Yet, like other industries, the healthcare sector continues to grapple with issues such as data ... Continue Reading
-
Essential Guide: State of 5G in APAC
In this Essential Guide, we examine the state of 5G rollouts in Asia-Pacific, how organisations are leveraging 5G and what is being done by telcos to address enterprise use cases of 5G Continue Reading
-
Information security in 2022 – managing constant change
It’s been an unprecedented couple of years for everyone – but a particularly frantic one for cyber security leaders. The pandemic led to a huge rise in remote working, with all the extra risks involved in putting users outside the corporate ... Continue Reading
-
APAC women in cyber security
In this Essential Guide, we examine the state of women representation in cyber security in APAC, the challenges that women face in the field, and what can be done to reduce the gender gap in cyber security. Continue Reading
-
Essential Guide: How APAC firms can ride out the pandemic
In this Essential Guide, we examine the impact of Covid-19 on Asia-Pacific businesses, how they have responded and important lessons that can be learned as they ready themselves for the post-pandemic world. Continue Reading
-
Essential guide to operation-centric security
To stay ahead of cyber attackers, IT security teams need to take an operation-centric approach, to offer a real-time picture of activity across their estate. Continue Reading
-
Essential Guide: Digital transformation in the public sector
Digital technologies and best practices are transforming the public sector across Europe - we look at some of the examples and the lessons being learned Continue Reading
-
Essential Guide: Technology readiness for the Covid-19 coronavirus crisis
The global Covid-19 coronavirus pandemic requires an important response from enterprise IT departments - in this guide, we examine the key considerations for IT leaders Continue Reading
-
Essential guide to cloud management
A well-implemented cloud management strategy allows users to maintain control over public, private and hybrid clouds Continue Reading
-
Essential guide to data breaches, the dark web and the hidden data economy
In this guide, we look at the aftermath of a data breach - what do cyber criminals use that stolen data for, and what can companies do to avoid becoming a victim? Continue Reading
-
Using green computing for improving energy efficiency guide
Green computing is no longer just a white-wash expression, as government schemes like the Carbon Reduction Commitment (CRC) scheme, the Climate Change Agreement (CCA) or the European Union Emission Trading Scheme (EU ETS), are encouraging companies ... Continue Reading
-
Guide to LUN configuration and virtualisation
LUN storage configuration has long been a cornerstone of storage management. The LUN – a chunk of storage created from RAID partitions on a SAN – presents a logical volume of capacity to an individual server. That’s still relevant today in the era... Continue Reading
-
LTFS tape NAS: What it is and how to build it
In storage, cost is everything. So, imagine a storage medium with the frugal cost profile of tape and access times of NAS. Well, it already exists. Since 2010 the Linear Tape File System (LTFS) has allowed access to tapes as if they are spinning ... Continue Reading
-
Essential guide to disaster recovery and business continuity
Everything you need to know about business continuity and disaster recovery, planning and prevention. Continue Reading