Exclusive content for IT Pros in the know

Premium Editorial

We have gathered our editorially written E-Books, E-Zine, guides and research to save you the effort of having to track such premium content down on your own, ultimately helping you to solve your toughest IT challenges more effectively – and faster – than ever before.

Premium Editorial By Topic

Featured E-ZINES on searchSecurity.comView all >>

  • Information Security magazine

    Information Security is the leading publication for enterprise security professionals, providing in-depth coverage of security technologies, practices and trends.

  • Modern Infrastructure

    Modern Infrastructure covers the convergence of technologies -- from cloud computing to virtualization to mobile devices -- and the impact on data centers.

ALL TECHTARGET E-ZINES

Featured E-BOOKS on searchSecurity.comView all >>

  • Intrusion detection and prevention: IT decision center

    Intrusion detection and intrusion prevention systems (IDS/IPS) help to identify potential threats and to launch a swift response to defend your network. There are many factors to take into account when choosing IDS/IPS products, and this Decision Center series lays them out. It also provides critical questions to ask vendors, offers insight on how to match product features to your particular requirements, and challenges vendors in the IDS/IPS space to present the facts on their offerings.

  • Enterprise Hadoop: Ready for prime time?

    Many vendors are pitching Hadoop as the foundation for enterprise data management environments that delivers information and insights to business users and serves as a hub for other data systems and applications. In the era of big data, the case for Hadoop is strong: Hadoop provides a cost-effective way to ingest, store and process large volumes of multi-structured data. With Hadoop, organizations can store all data in its original format and provide a system of record for the enterprise. Even more, they can bring the applications to Hadoop and process the data in place.

    But does reality square with the promise today? Are companies willing to trust their enterprise data to Hadoop? The big question is whether Hadoop is ready to support enterprise-scale, production environments where data can't be corrupted or inconsistent. Does Hadoop have adequate management, monitoring, backup, recovery and security features? What are the major gaps today and what are vendors doing to plug the holes? At what point can companies trust production computing environments to Hadoop? This report, based on a comprehensive survey of business intelligence professionals and interviews with experts in the field, addresses these questions.

OTHER FEATURED E-BOOKS

Featured E-HANDBOOKS on searchSecurity.comView all >>

  • Companies face big challenges with big data analytics applications

    It's hardly breaking news, but businesses today are looking to cash in on big data. And naturally, vendors of big data analytics applications are trying to capitalize on that by promising new opportunities for companies looking to increase revenues and gain competitive advantages over business rivals. What you won't hear about, at least not as readily, are the challenges they first need to overcome.

    In this three-part guide, three consultants weigh in with concrete offers of encouragement for companies struggling to turn big data -- large, varied and fast-changing data sets -- into valuable business insight. First, Wayne Eckerson serves up an in-depth analysis of Hadoop. The open source software offers companies a platform for reining in the spreadmarts set up by data analysts and business users, while still giving them a place to do self-service analytics. Next, Keith B. Carter delivers a warning about big mistakes that many organizations make on big data analytics projects, with tips on how to avoid them. Barry Devlin, the founder and principal of 9sight Consulting, finishes with a cautionary note about overreliance on data analytics at the expense of intuitive decision making.

  • Strategies for a successful data protection program

    Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies, experts say that custom policies are essential to making a DLP system perform efficiently. Selection of a DLP vendor of-ten depends on how well the software integrates with the systems in place. Fortunately, enough companies have performed a DLP deployment providing best practices to avoid getting tripped up. The rollout is typically performed slowly and systematically. False positives are still an issue, though the system can be immediately tuned to avoid any disruption to employee productivity.

    This TechGuide identifies some of the challenges associated with deploying data protection technology, highlights some of the initial pitfalls encountered by early adopters and explains how it can be used effectively in an organization. CSOs share how they use it to mitigate risks and identify weaknesses and experts discuss some best practices for deploying data protection solutions.

OTHER FEATURED E-HANDBOOKS