Exclusive content for IT Pros in the know

Premium Editorial

We have gathered our editorially written E-Books, E-Zine, guides and research to save you the effort of having to track such premium content down on your own, ultimately helping you to solve your toughest IT challenges more effectively – and faster – than ever before.

Premium Editorial By Topic

      • The next frontier for managed print services

        The managed print services (MPS) market has matured since many organisations inked their first deal. Organisations moving beyond first generation engagements have often reached the end of their cost-cutting phase and are now looking for innovation to drive more business value. MPS is extending beyond the enterprise print environment to address requirements of mobile and remote workers, as well as encompass IT infrastructure and business process outsourcing. By leveraging the synergies of managed print services (MPS), business process services (BPS) and IT services (ITS) through a single provider, enterprises can drive business process innovation that pays continuous dividends.

        View E-Handbook
      • World-Class EA: The Agile Enterprise

        The concept of “agile” has recently come to the fore, typically in connection with technical activities, such as software development. Subsequently, the agile approach has been extended and applied to, for example, solution architecture activities. However, we suggest that agile is in fact a way of working, a mindset. It applies to more than just software development, or architecture, or any other one area of activity. The real benefit comes from applying an end-to-end agile delivery approach throughout the enterprise.

        View E-Handbook
      • Security Visualisation

        This article is guideline of how to generate a visual representation of a given dataset and use in the evaluation of known security vulnerabilities. Although this example is based on the output of an automated vulnerability scanner (Nessus), the suggested information visualisation process can be applied to generate any kind of visualisation.

        View E-Handbook
      • The Human Face of Big Data: Data Driven

        On a small scale, the effects of software are benign. But at large companies, institutions, and agencies with hundreds of millions of users, something so apparently small as the choice of what should be a default setting has an immediate impact on the daily behavior patterns of a large percentage of the planet’s population.

        View E-Handbook
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Staying secure in a hybrid cloud world

        Special Edition, May 2014

        Includes:
        • CSA STAR analysis: Processes for cloud provider security evaluation
        • CSA Cloud Trust Protocol working group to foster cloud transparency
        • Hybrid IT services in the cloud age: What CISOs should do now
        View E-Zine
      •  
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Understanding advanced virtualization security practices

        SearchCloudSecurity.com presents a comprehensive guide to virtualization security. Our experts help you assess and prioritize the risks and threats to virtual environments. You’ll learn what steps you must take to handle secure multitenancy, hypervisor threats and hypervisor protection, and data management service security.

        View E-Book
      •  
      Page 1 of 1
    • Page 1 of 1
      • Security in the cloud expert e-book

        Information technology is undergoing a radical change because of cloud computing. Information security must change its approach to data protection right along with it. This e-book will cover encryption and key management, infrastructure risks, data integrity, and access control, all in the context of cloud computing. Get answers to your biggest data security in the cloud questions. In this comprehensive deep dive into data security in the cloud, our experts cover all the angles in order to help you keep data safe as you move infrastructure and services into the cloud.

        View E-Book
      •  
      Page 1 of 1

Featured E-ZINES on searchCloudSecurity.comView all >>

  • Information Security magazine

    Information Security is the leading publication for enterprise security professionals, providing in-depth coverage of security technologies, practices and trends.

  • Modern Infrastructure

    Modern Infrastructure covers the convergence of technologies -- from cloud computing to virtualization to mobile devices -- and the impact on data centers.

ALL TECHTARGET E-ZINES

Featured E-BOOKS on searchCloudSecurity.comView all >>

  • Forging the path to tomorrow's CRM

    Perhaps no two words have more of an effect on business today than "customer experience." Consumers have a wealth of options for buying products and services -- and they're not shy about letting the social media sphere know when they’re not happy. To keep them coming -- and coming back -- organizations need to ensure that the experiences they’re serving up are nothing less than stellar.

    In our e-book series, The Risks and Rewards of Customer Experience Management, readers will get practical advice and real-world insight into strategies that place the focus of organizations' operations and processes on their customers. The first chapter concentrates on automation in the contact center. It will explore the technologies, such as interactive voice response and virtual agents. And it will examine what organizations need to evaluate when deciding which processes to automate and which areas will always need a human touch. The second installment delves into digital marketing, mobile applications and social media. It's no longer enough to send the same message to all customers; messages now must be personalized -- and soon, based on where customers are at any given moment. The chapter will look at location-based automated marketing and the pros and cons -- including the loss of privacy -- associated with such practices. The final chapter digs deep into the role of analytics in customer experience management plans, scrutinizing data harvesting methods and ways to use big data to augment customer experiences. And the chapter will look at times when knowing all about your customer goes horribly wrong.

  • Market trends tell the future of predictive analytics deployments

    Predictive analytics employs statistical or machine-learning models to discover patterns and relationships in data, thereby enabling the prediction of future behavior or activity. Long used by credit card companies, predictive analytics -- and now self-service predictive analytics -- is making inroads in organizations of all sizes. Based on a survey of more than 3,000 IT and business professionals, this report analyzes their responses to provide information on implementation status, maturity of implementations, value and vendors of predictive analytics tools.

OTHER FEATURED E-BOOKS

Featured E-HANDBOOKS on searchCloudSecurity.comView all >>

  • The next frontier for managed print services

    The managed print services (MPS) market has matured since many organisations inked their first deal. Organisations moving beyond first generation engagements have often reached the end of their cost-cutting phase and are now looking for innovation to drive more business value. MPS is extending beyond the enterprise print environment to address requirements of mobile and remote workers, as well as encompass IT infrastructure and business process outsourcing. By leveraging the synergies of managed print services (MPS), business process services (BPS) and IT services (ITS) through a single provider, enterprises can drive business process innovation that pays continuous dividends.

  • World-Class EA: The Agile Enterprise

    The concept of “agile” has recently come to the fore, typically in connection with technical activities, such as software development. Subsequently, the agile approach has been extended and applied to, for example, solution architecture activities. However, we suggest that agile is in fact a way of working, a mindset. It applies to more than just software development, or architecture, or any other one area of activity. The real benefit comes from applying an end-to-end agile delivery approach throughout the enterprise.

OTHER FEATURED E-HANDBOOKS