Subscribe to Infotech feed
Published content from Applications & Infrastructure
Updated: 15 min 52 sec ago

Five Ways to Increase Technology Adoption Rates for Small Enterprise Healthcare

Mon, 25/09/2017 - 05:00
Don’t waste resources on failed health information technology initiatives. Build a robust stakeholder and change management program to improve technology adoption outcomes.

Address Data Quality Issues to Improve Reporting for Small Enterprise Manufacturing

Mon, 25/09/2017 - 05:00
Data is changing the manufacturing industry. Organizations are harnessing data insights to improve operational efficiency, supply chain and logistics, customer intimacy, and product innovation. Don’t let poor data quality hinder your organization’s competitive advantage. Leverage Info-Tech’s insights to address the underlying issues that lead to data quality problems.

Find the Right Balance Between Privacy and Security for K-12

Fri, 22/09/2017 - 05:00
Finding the right balance between security and privacy is difficult for K-12. IT is responsible for protecting faculty, staff, and students, but must do so while remaining compliant with external privacy regulations. Leverage Info-Tech's best practices to develop a security-privacy balance that's right for your school.

Optimize Your Threat Collaboration Environment

Thu, 21/09/2017 - 05:00
Integrate vulnerability management, threat intelligence incident response, and security operations within your very own threat collaboration environment.

Secure Email in and for Office 365

Thu, 21/09/2017 - 05:00
Hosted email is unquestionably the future for organizations (barring only extremely restrictive government agencies or contractors). It is simpler to manage, increases availability, and is easier for end users. Office 365 is the clear leader in the space; however, the major concern is how to ensure organizations get the same (or better) security than when email was located on premises.

Outsource Security

Thu, 21/09/2017 - 05:00
While security becomes more of a business requirement, companies are still lacking internal security professionals. What are the signs it’s time to consider external, third-party support? What should be a consideration to ensure a path to security maturity that minimizes exposure and enhances how our organization operates?

Slash WAN Costs by 50%

Wed, 20/09/2017 - 05:00
Traditional wide area networks (WANs) have long been one of IT’s most expensive costs, but everything that this network was built on is changing. Options now abound for lowering the cost and increasing the value of your WAN.

Manage Your Availability and Capacity in the Cloud Age

Wed, 20/09/2017 - 05:00
In a complicated, increasingly cloud-based world, capacity costs every month. Over-provisioning and redundancy are expensive solutions from a forgotten world – business leaders expect data. It’s the only way to keep your head!

Manage the Internet of Things

Wed, 20/09/2017 - 05:00
The massive growth in the number and variety of IoT devices will increase complexity for managing them and create new concerns. If not well managed, complexity will produce more problems than benefits.

Learn From Real IT Professionals to Select the Right ITSM Tool the First Time

Wed, 20/09/2017 - 05:00
Selecting service desk (ITSM) tools is a complex, knowledge-intensive project. Even organizations with mature processes, and effective service desks, can quickly become overwhelmed with the technical and commercial information they need to select a tool that will meet business needs.

License a Best-Fit ITSM Tool for Your Organization

Wed, 20/09/2017 - 05:00
ITSM licensing has always been a difficult subject to master, and that is more true today than ever. The increased adoption of cloud licensing, combined with the increasing complexity of business requirements, makes an understanding of the subject all the more valuable.

Develop a Cloud Strategy

Wed, 20/09/2017 - 05:00
The decision to go has already been made. Now the key to an successful cloud strategy is in an effective action plan. Info-Tech has the experienced facilitators and the aggregated data from hundreds of members to streamline developing yours.

Information Security Requirements Gathering Tool

Mon, 18/09/2017 - 05:00
Align your security projects properly by clearly defining business needs, and customer / compliance obligations, as well as documenting scope, boundaries, and risk tolerance.

Information Security Pressure Posture Analysis Tool

Mon, 18/09/2017 - 05:00
Security pressure posture analysis helps your organization assess your real security context and enables you to invest in the right security functions while balancing the cost and value in alignment with business strategies.

Transform Your Organization With Effective SharePoint Solutions

Mon, 18/09/2017 - 05:00
SharePoint has evolved into a highly viable solution for enhancing all sorts of business operations. The old expression “SharePoint can do just about anything, just not very well” is giving way to “SharePoint can do just about anything, if you know what you’re doing.”

You Must Know These Secrets of SAP Hana for Your Digital Transformation

Mon, 18/09/2017 - 05:00
Many CIOs and CTOs are facing tough decisions for their existing SAP implementation and do not understand how to follow the SAP Hana roadmap. SAP Hana provides a number of innovative features but understanding true cost and licensing for an existing SAP implementation is the critical first step towards your digital transformation.

Streamline Your Operations with Supply Chain Management Software

Fri, 15/09/2017 - 05:00
A high-functioning supply chain allows organizations to deliver the right quantity of products to the right place at the right time for a reasonable cost. Satisfy your customers’ increasing expectations and provide a platform for organizational growth with the right SCM software.

Declutter Your Report Inventory to Improve the Quality and Velocity of Decision Making

Fri, 15/09/2017 - 05:00
If you are a typical organization, you have amassed hundreds, if not thousands, of reports to date. Report rationalization is no longer optional. To stay aligned with the business and the increased speed of innovation, implement quarterly reviews, and regain your status as a full-fledged business partner and innovation leader.

Begin Your Projects With the End in Mind

Fri, 15/09/2017 - 05:00
For years, project and portfolio managers have made a habit of leaving project closure as an afterthought. Without proper project closing, a clear definition of DONE is rarely agreed upon or communicated, and clumsy hand-offs and backend resource leaks are frequent.

Threat Landscape Briefing – September 2017

Thu, 14/09/2017 - 05:00
This monthly recording covers cyberthreat and regulatory trends, nation states, cybercriminals, and hacktivists campaigns, and more. This month’s topics include InfoSec execs are boosting their SOC deployments, the HBO hack, NIST digital guidelines, and gas pump skimmers.