-
Article
When Haswell met Xeon
Intel's new Xeon E5 v3 family of server and workstation CPUs, based on the 22nm Haswell architecture, runs the gamut from budget 6-core chips to an 18-core behemoth. We outline what's new and look at ...
-
eBooks
BYOD spotlight: Mitigating risk and implementing policies and solutions
BYOD means freedom of device choice for business users, but it can also unleash an avalanche of security concerns. This ebook will help you sort out the risks and take the right steps to contain them....
-
eBooks
Cybersecurity spotlight: The critical labor shortage
An escalating shortage of information security professionals is prompting industry experts to predict a grave outcome. Violet Blue explores the infosec labor shortage and its causes and consequences. ...
-
Article
Setting up two-factor authentication on Office 365
If you're serious about security, you can't afford to protect your business files and emails with just a password. Ed Bott explains how to use your smartphone to ensure that only you can get access.
-
Article
Transitioning from Windows to Linux Administration: A guide for newcomers, Part III
Windows and Linux are operating systems with many similarities and differences. Learn some tips to help cross the bridge between the two in the conclusion of a multi-part series.
-
Article
Big data: Six critical areas of legal risk
The legal concerns surrounding big data are still uncharted waters, and IT leaders need to be diligent about investigating and addressing the risks they may be taking on before they get in too deep.
-
eBooks
Security roundup: Penetration testing and threat filtering
Violet Blue looks at two critical security measures: pentesting (and why you should do it like you mean it) and threat filtering, which done right might have averted some recent high-profile breaches....
-
Article
Research: 45% report IT budget increases for 2015
IT budgets are rising for nearly half of those who responded to Tech Pro Research's latest survey. It also turns out that developing regions are devoting more of their overall corporate budgets to IT ...
-
Tools & Templates
Severe Weather and Emergency Policy
Numerous instances of severe weather have impacted companies and their personnel as of late, with disastrous results. This includes hurricanes, tornadoes, blizzards and earthquakes. In addition, both ...
-
Research
2015 IT Budget Trends
The Tech Pro Research report on 2015 IT budget trends focuses on how much money are companies spending, and is it more or less than last year. This report includes information on whether budgets are i...
-
Tools & Templates
Employee Privacy Policy
Our Employee Privacy Policy describes the organization's employee privacy guidelines and outlines employee privacy expectations.
-
Tools & Templates
Outsource Provider Security Policy
TechRepublic's Outsource Provider Security Policy will help you outline the requirements for safely outsourcing your organization's operations, systems, and data.
-
Tools & Templates
Telecommuting Policy
Our Telecommuting Policy describes the organization's guidelines and process for requesting, obtaining, using, and terminating remote access to organization networks, systems, and data for the purpose...
-
Tools & Templates
Travel and Entertainment Expense Policy
Our Travel and Entertainment Expense Policy will help you define your organization's policies and procedures for incurring and receiving reimbursement for travel and entertainment expenses. It provide...
-
Research
BYOD Business Strategies: Adoption Plans, Deployment Options, IT Concerns, and Cost Savings
TechRepublic's BYOD Business Strategies: Adoption Plans, Deployment Options, IT Concerns, and Cost Savings report reveals the BYOD plans of over 1,000 IT decision makers worldwide.
-
Analyst Briefings
Analyst briefing: BYOD empowers users but challenges traditional IT
IT leaders are finding ways to capitalize on the benefits of BYOD while reducing its risks. This analysis examines the impact of BYOD and looks at how organizations are dealing with the trend.
-
Analyst Briefings
Analyst briefing: Laying the groundwork for successful cloud deployment and management
This cloud strategy analysis describes current deployment and service models and looks at the key characteristics of cloud service offerings, such as performance, reliability, and compliance.
-
Analyst Briefings
Analyst briefing: Conducting a cloud solution risk assessment
This briefing provides a 10-step assessment process for determining potential areas of vulnerability, mitigating risk, and implementing a comprehensive cloud management strategy.
-
Research
IaaS Research: Leaders Share Cloud Strategies for the 21st Century Data Center
TechRepublic's infrastructure-as-a-service (IaaS) survey reveals what companies say about current and future plans for the cloud, top vendors and business drivers leading them to the cloud.
-
eBooks
SaaS and the cloud: A primer for IT pros
This primer covers a wide range of topics to help you reap the benefits of the cloud while avoiding potential problems, such as security risks, performance issues, and vendor lock-in.
-
Article
When Haswell met Xeon
Intel's new Xeon E5 v3 family of server and workstation CPUs, based on the 22nm Haswell architecture, runs the gamut from budget 6-core chips to an 18-core behemoth. We outline what's new and look at ...
-
Tools & Templates
Employee Privacy Policy
Our Employee Privacy Policy describes the organization's employee privacy guidelines and outlines employee privacy expectations.
-
Tools & Templates
Outsource Provider Security Policy
TechRepublic's Outsource Provider Security Policy will help you outline the requirements for safely outsourcing your organization's operations, systems, and data.
-
Tools & Templates
Telecommuting Policy
Our Telecommuting Policy describes the organization's guidelines and process for requesting, obtaining, using, and terminating remote access to organization networks, systems, and data for the purpose...
-
Tools & Templates
Travel and Entertainment Expense Policy
Our Travel and Entertainment Expense Policy will help you define your organization's policies and procedures for incurring and receiving reimbursement for travel and entertainment expenses. It provide...
-
Research
BYOD Business Strategies: Adoption Plans, Deployment Options, IT Concerns, and Cost Savings
TechRepublic's BYOD Business Strategies: Adoption Plans, Deployment Options, IT Concerns, and Cost Savings report reveals the BYOD plans of over 1,000 IT decision makers worldwide.
-
Analyst Briefings
Analyst briefing: BYOD empowers users but challenges traditional IT
IT leaders are finding ways to capitalize on the benefits of BYOD while reducing its risks. This analysis examines the impact of BYOD and looks at how organizations are dealing with the trend.
-
Analyst Briefings
Analyst briefing: Laying the groundwork for successful cloud deployment and management
This cloud strategy analysis describes current deployment and service models and looks at the key characteristics of cloud service offerings, such as performance, reliability, and compliance.
-
Analyst Briefings
Analyst briefing: Conducting a cloud solution risk assessment
This briefing provides a 10-step assessment process for determining potential areas of vulnerability, mitigating risk, and implementing a comprehensive cloud management strategy.
-
Research
IaaS Research: Leaders Share Cloud Strategies for the 21st Century Data Center
TechRepublic's infrastructure-as-a-service (IaaS) survey reveals what companies say about current and future plans for the cloud, top vendors and business drivers leading them to the cloud.
























