ITPro Today Resource Library

Access the latest white papers, research, webinars, case studies, reports, and more covering a wide range of enterprise IT topics.

Showing results 1 - 30 of 156
Showing results 1 - 30 of 156

Filter by

Filters

3 Superpowers for Next Level Microservices Orchestration

3 Superpowers for Next Level Microservices Orchestration

Start accelerating your process automation strategy. View the recording today.

3 Superpowers for Next Level Microservices Orchestration

Start accelerating your process automation strategy. View the recording today.
Camunda
Future-proofing Your Hyperautomation Tech Stack

Future-proofing Your Hyperautomation Tech Stack

Discover expert insights on the hyperautomation landscape and ensure your automation tech stack stacks up.

Future-proofing Your Hyperautomation Tech Stack

Discover expert insights on the hyperautomation landscape and ensure your automation tech stack stacks up.
Camunda
Patience Pays Off - Benefits of Long-running Microservices

Patience Pays Off - Benefits of Long-running Microservices

The advantages of microservices can be a double-edged sword. Learn how in this webinar recording.

Patience Pays Off - Benefits of Long-running Microservices

The advantages of microservices can be a double-edged sword. Learn how in this webinar recording.
Camunda
Roadmap to Process Automation Success Takeaways from the 2024 State of Process Orchestration Report

Roadmap to Process Automation Success Takeaways from the 2024 State of Process Orchestration Report

Learn why process orchestration is becoming integral to the success of automation projects.

Roadmap to Process Automation Success Takeaways from the 2024 State of Process Orchestration Report

Learn why process orchestration is becoming integral to the success of automation projects.
Camunda
Cybersecurity Acronyms Cheat Sheet

Cybersecurity Acronyms Cheat Sheet

Brought to you by ITPro Today

Cybersecurity Acronyms Cheat Sheet

Brought to you by ITPro Today
ITPro Today
Building search in the age of AI: A blueprint for success

Building search in the age of AI: A blueprint for success

Discover the options for integrating generative AI and LLMs into your search function.

Building search in the age of AI: A blueprint for success

Discover the options for integrating generative AI and LLMs into your search function.
Elasticsearch
Building search in the age of AI: A blueprint for success

Building search in the age of AI: A blueprint for success

Discover the options for integrating generative AI and LLMs into your search function.

Building search in the age of AI: A blueprint for success

Discover the options for integrating generative AI and LLMs into your search function.
Elasticsearch
The Total Economic Impact™ of Elasticsearch

The Total Economic Impact™ of Elasticsearch

Learn more about how customers are achieving measurable value from Elastic solutions.

The Total Economic Impact™ of Elasticsearch

Learn more about how customers are achieving measurable value from Elastic solutions.
Elasticsearch
The Total Economic Impact™ of Elasticsearch

The Total Economic Impact™ of Elasticsearch

Learn more about how customers are achieving measurable value from Elastic solutions.

The Total Economic Impact™ of Elasticsearch

Learn more about how customers are achieving measurable value from Elastic solutions.
Elasticsearch
Transform customer support with AI-powered search: A playbook for IT leaders

Transform customer support with AI-powered search: A playbook for IT leaders

Discover the capabilities of AI-powered search and how you can integrate it into your user experience to drive customer satisfaction.

Transform customer support with AI-powered search: A playbook for IT leaders

Discover the capabilities of AI-powered search and how you can integrate it into your user experience to drive customer satisfaction.
Elasticsearch
Transform customer support with AI-powered search: A playbook for IT leaders

Transform customer support with AI-powered search: A playbook for IT leaders

Discover the capabilities of AI-powered search and how you can integrate it into your user experience to drive customer satisfaction.

Transform customer support with AI-powered search: A playbook for IT leaders

Discover the capabilities of AI-powered search and how you can integrate it into your user experience to drive customer satisfaction.
Elasticsearch
Generative AI for the Enterprise: A Full Stack Approach

Generative AI for the Enterprise: A Full Stack Approach

On-Demand Webcast| Brought to you by Oracle

Generative AI for the Enterprise: A Full Stack Approach

On-Demand Webcast| Brought to you by Oracle
Oracle
Top IT Certifications for a Career in Finance

Top IT Certifications for a Career in Finance

Everything you need to know to pursue an IT career in the finance industry

Top IT Certifications for a Career in Finance

Everything you need to know to pursue an IT career in the finance industry
ITPro Today
5 Building Blocks for Strengthening your IT Security Program

5 Building Blocks for Strengthening your IT Security Program

As organizations transform with new business models and new technologies, they must also change the way they provide protection for their systems and processes from cyber risk.

5 Building Blocks for Strengthening your IT Security Program

As organizations transform with new business models and new technologies, they must also change the way they provide protection for their systems and processes from cyber risk.
AT&T Cybersecurity
A guide to build vs. buy service models for threat detection and response

A guide to build vs. buy service models for threat detection and response

In today's cybersecurity environment, organizations need a way to balance prevention with detection and response.

A guide to build vs. buy service models for threat detection and response

In today's cybersecurity environment, organizations need a way to balance prevention with detection and response.
AT&T Cybersecurity
Evaluator's Guide For Managed Detection And Response (MDR) Services

Evaluator's Guide For Managed Detection And Response (MDR) Services

Many organizations, inundated by the magnitude and complexity of cybersecurity, are turning to managed detection and response (MDR) services.

Evaluator's Guide For Managed Detection And Response (MDR) Services

Many organizations, inundated by the magnitude and complexity of cybersecurity, are turning to managed detection and response (MDR) services.
AT&T Cybersecurity
How Organizations with an Emerging Cybersecurity Program can Accelerate Risk Reduction

How Organizations with an Emerging Cybersecurity Program can Accelerate Risk Reduction

When cybersecurity programs are mature the security functions of an organization go beyond preventing attacks and breaches and become business enablers. Less mature cybersecurity organizations that haven’t yet grown into that enabler role need to chart a path to get there.

How Organizations with an Emerging Cybersecurity Program can Accelerate Risk Reduction

When cybersecurity programs are mature the security functions of an organization go beyond preventing attacks and breaches and become business enablers. Less mature cybersecurity organizations that haven’t yet grown into that enabler role need to chart a path to get there.
AT&T Cybersecurity
How to Achieve Risk-Based Vulnerability Management

How to Achieve Risk-Based Vulnerability Management

Data is the foundation on which digital business is built. But protecting that data is more difficult than ever as threats grow in number and sophistication.

How to Achieve Risk-Based Vulnerability Management

Data is the foundation on which digital business is built. But protecting that data is more difficult than ever as threats grow in number and sophistication.
AT&T Cybersecurity
How to Continuously Improve Risk Management within Leading Cybersecurity Progs

How to Continuously Improve Risk Management within Leading Cybersecurity Progs

No matter how mature a cybersecurity program has evolved to be, there always remains room for improvement. Many organizations that have mastered the basics of cybersecurity can take their practices to the next level by making architectural improvements, adding more sophisticated detection or monitoring, and streamlining operations.

How to Continuously Improve Risk Management within Leading Cybersecurity Progs

No matter how mature a cybersecurity program has evolved to be, there always remains room for improvement. Many organizations that have mastered the basics of cybersecurity can take their practices to the next level by making architectural improvements, adding more sophisticated detection or monitoring, and streamlining operations.
AT&T Cybersecurity
The Essential Guide to Secure Web Gateway

The Essential Guide to Secure Web Gateway

The rapid adoption of cloud-based applications combined with a more mobile, distributed workforce has put a lot of stress on cyber defenses. It’s challenging for administrators to maintain visibility and control over data. Or to apply unified security policies.

The Essential Guide to Secure Web Gateway

The rapid adoption of cloud-based applications combined with a more mobile, distributed workforce has put a lot of stress on cyber defenses. It’s challenging for administrators to maintain visibility and control over data. Or to apply unified security policies.
AT&T Cybersecurity
Quick Reference Guide for Software for Development

Quick Reference Guide for Software for Development

Modern software development is a complex, multi-faceted process that intersects with a variety of other IT domains and concepts.

Quick Reference Guide for Software for Development

Modern software development is a complex, multi-faceted process that intersects with a variety of other IT domains and concepts.
ITPro Today
Empowering IT with Cyber Resilience

Empowering IT with Cyber Resilience

Tuesday, April 9, 2:00pm ET

Empowering IT with Cyber Resilience

Tuesday, April 9, 2:00pm ET
Rubrik
JavaScript Reference Guide: A Beginner's Introduction to Pure JavaScript

JavaScript Reference Guide: A Beginner's Introduction to Pure JavaScript

Brought to you by ITPro Today!

JavaScript Reference Guide: A Beginner's Introduction to Pure JavaScript

Brought to you by ITPro Today!
ITPro Today
2024 Technology in Sports Report

2024 Technology in Sports Report

From the circuits of Formula One to the gridiron of the NFL, information technology is ushering in a new era for professional sports.

2024 Technology in Sports Report

From the circuits of Formula One to the gridiron of the NFL, information technology is ushering in a new era for professional sports.
ITPro Today
Quick Reference Guide for Understanding AI For IT Pros

Quick Reference Guide for Understanding AI For IT Pros

AI represents a transformative era in computing and IT

Quick Reference Guide for Understanding AI For IT Pros

AI represents a transformative era in computing and IT
ITPro Today
Cyber Resilience in 2024: Availability is Your Best Ability

Cyber Resilience in 2024: Availability is Your Best Ability

May 2nd, 2024 from 11:00am - 5:00pm ET | A Sponsored Virtual Event | Doors Open at 10:30am ET

Cyber Resilience in 2024: Availability is Your Best Ability

May 2nd, 2024 from 11:00am - 5:00pm ET | A Sponsored Virtual Event | Doors Open at 10:30am ET
InformationWeek and ITPro Today
Secure Your Sensitive Microsoft 365 Data from Cyber Attack

Secure Your Sensitive Microsoft 365 Data from Cyber Attack

Thursday, March 14, 2:00pm EDT

Secure Your Sensitive Microsoft 365 Data from Cyber Attack

Thursday, March 14, 2:00pm EDT
Rubrik
Securing Your Cloud Data with Rubrik + Laminar

Securing Your Cloud Data with Rubrik + Laminar

Tuesday, February 27, 2:00pm ET

Securing Your Cloud Data with Rubrik + Laminar

Tuesday, February 27, 2:00pm ET
Rubrik
Quick Reference Guide for Cybersecurity

Quick Reference Guide for Cybersecurity

Key principles, best practices, and technologies

Quick Reference Guide for Cybersecurity

Key principles, best practices, and technologies
ITPro Today
5 Building Blocks for Strengthening your IT Security Program

5 Building Blocks for Strengthening your IT Security Program

As organizations transform with new business models and new technologies, they must also change the way they provide protection for their systems and processes from cyber risk.

5 Building Blocks for Strengthening your IT Security Program

As organizations transform with new business models and new technologies, they must also change the way they provide protection for their systems and processes from cyber risk.
AT&T Cybersecurity
Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.