Exclusive content for IT Pros in the know

Premium Editorial

We have gathered our editorially written E-Books, E-Zine, guides and research to save you the effort of having to track such premium content down on your own, ultimately helping you to solve your toughest IT challenges more effectively – and faster – than ever before.

Premium Editorial By Topic

Featured E-ZINES on searchSecurity.comView all >>

  • Information Security magazine

    Information Security is the leading publication for enterprise security professionals, providing in-depth coverage of security technologies, practices and trends.

  • Modern Infrastructure

    Modern Infrastructure covers the convergence of technologies -- from cloud computing to virtualization to mobile devices -- and the impact on data centers.

ALL TECHTARGET E-ZINES

Featured E-BOOKS on searchSecurity.comView all >>

  • Overcome today's disaster recovery challenges

    The use of devices not connected to a local network is a challenge for IT staffs tasked with protecting data on those devices. Completing backups within a reasonable timeframe has become an issue for organizations. Some organizations are opting for alternatives to traditional backup to address these challenges. The cloud has been pushed as an alternative to tape for offsite storage for disaster recovery. However, there are challenges with this approach and with protecting applications running in the cloud.

  • Cloud storage challenges and choices

    Our comprehensive e-book tackles the cloud storage challenges and business decisions that surround cloud storage investments, and breaks them into three areas of concentration: architecture, availability and return on investment.

    Get the latest updates on architectural choices when using the cloud for storage, including cloud controllers and application programming interfaces. We provide a short list of technical capabilities to look for in a cloud controller and questions to ask your service provider. Learn which metrics your peers are using to determine if cloud storage projects are meeting their potential, and what sort of service levels you can expect from providers or hybrid projects. Discover how to leverage the most cutting-edge cloud technologies and how not to get taken advantage of when choosing a cloud storage strategy/service.

OTHER FEATURED E-BOOKS

Featured E-HANDBOOKS on searchSecurity.comView all >>

  • Conquer the endpoint backup challenge

    Endpoint backup has typically been left to end users or ignored altogether. However, the increased use of smartphones and tablets is driving interest in the technology. Also, the software is evolving and converging with other technologies aimed at increasing user productivity. One challenge for backing up laptops and mobile devices is that they aren't always connected to a corporate network. They must be backed up over the Internet -- which can be troublesome -- or when they reconnect. Depending on how much time passes between backups, this could leave a good deal of data unprotected.

    This handbook looks at how vendors are addressing the challenges associated with backing up these devices, the convergence of mobile backup with file sharing and security, confusion about the difference between file sync and backup, and how to choose a solution that is right for your organization's needs.

  • Open Trusted Technology Provider Standard (O-TTPS)

    The O-TTPS is an open standard containing a set of guidelines that when properly adhered to have been shown to enhance the security of the global supply chain and the integrity of Commercial Off-The-Shelf (COTS) ICT products. It provides a set of guidelines, requirements, and recommendations that help assure against maliciously tainted and counterfeit products throughout the COTS ICT product life cycle encompassing the following phases: design, sourcing, build, fulfillment, distribution, sustainment, and disposal.

OTHER FEATURED E-HANDBOOKS