Searching all of TechTarget| 41,276 results for "practices"


By Craig Mathias Manage May 17, 2016

Mobile identity management best practices

IT admins need identity management tools to ensure network users are who they say they are. This applies to mobile users on an enterprise WLAN and the wired network itself. Continue Reading


By Tayla Holman Problem Solve May 16, 2016

Exchange Server best practices for administrators

Exchange Server errors are an unfortunate but often unavoidable reality for administrators. These tips will help Exchange admins maintain the security and health of their servers. Continue Reading


By Jim Merrifield Evaluate May 05, 2016

Document control practices in the age of HIPAA

The time has come to bring information governance stakeholders together to develop a practical plan for document management and data privacy for HIPAA compliance. Continue Reading


By Rob Bastiaansen Get Started Apr 25, 2016

Best practices for working with a VMware appliance

As VMware appliances become more ubiquitous, administrators should consider a number of options for troubleshooting common virtual machine issues. Continue Reading


By Joseph Flahiff Manage May 26, 2016

Eight best practices for optimizing a distributed team

Having all your team members under one roof is the exception today rather than the rule. How can you ensure your distributed teams are successful? Continue Reading


By Brien Posey Evaluate May 18, 2016

Best practices for authenticating PowerShell script permissions

PowerShell scripts can only run when they have the proper permissions, but an administrator may need to authenticate the script so it has the right privileges. Continue Reading


By Esther Shein Get Started May 17, 2016

Cybersecurity market: The costs of building an IT security practice

Expanding into IT security services can be a costly endeavor for channel firms, requiring investment in new processes, talent and partnerships. Continue Reading


By Brian Kirsch ,Stephen J. Bigelow Manage May 05, 2016

Best practices for proper virtual machine provisioning

Depending on workload and activity level, a virtual machine's required resources can fluctuate significantly. It's common to see admins overlook this and, as a result, VMs become overprovisioned. This can lead to ... Continue Reading


By Harvey R. Koeppel ,Niel Nickolaisen ,Sue Troy Manage Dec 07, 2015

ITSM practices for digital business

There's nothing new about a company's internal and external customers expecting faster and less costly IT service delivery, says SearchCIO columnist and former CIO Harvey Koeppel. Neither is it extraordinary that ... Continue Reading


By Reda Chouffani ,Shaun Sutner Manage Feb 02, 2016

Best Practices for Secure Texting in Healthcare

As healthcare providers and vendors seek information about how to safeguard personal health information (PHI), texting is one area that without question carries a great deal of risk. It's convenient, but unsecured ... Continue Reading