Exclusive content for IT Pros in the know

Premium Editorial

We have gathered our editorially written E-Books, E-Zine, guides and research to save you the effort of having to track such premium content down on your own, ultimately helping you to solve your toughest IT challenges more effectively – and faster – than ever before.

Premium Editorial By Topic

      • The AWS role in disaster recovery

        No matter how well prepared you might be, disaster can strike. Most mature IT organizations have disaster recovery plans, but Amazon Web Services offers a unique set of services that can keep your business running if the worst happens. This handbook discusses the strategies and options available to companies looking to AWS for disaster preparedness and business continuity, including understanding EC2 availability zones, using S3 for backup and storage, testing your DR strategy in AWS and preparing for AWS outages.

        View E-Handbook
      • The HIPAA omnibus rule spells big change for health IT operations

        Known informally as "the omnibus rule," last year's HHS HIPAA-update threw healthcare providers, payers and their business associates for a loop. The biggest changes wrought under the new rule affect HIPAA's Security Rule, with both business associates and healthcare providers facing increased liability over data security.

        This three-part guide takes a hard look at what these changes mean for day-to-day health IT operations and, more broadly, for the industry. First, compliance and standards expert Mike Chapple drills down on the repercussions for business associates under the HIPAA omnibus rule: an increased accountability when entering into business associate agreements. Chapple then explores the steps health IT pros can take to adjust business processes and remain compliant with HIPAA regulations. Next, Chapple dives deeper into the compliance issue -- specifically, how a continuous approach helps organizations increase data security and reduce stress on IT teams. To close, SearchHealthIT news writer Shaun Sutner takes a bird's-eye view of legislation reformation. Readers will learn how one decades-old federal regulation -- and discussions of reform, especially -- has prompted an important conversation on data regulation and integration.

        View E-Handbook
      • Unified threat management aspires to the enterprise class

        Unified threat management (UTM) long focused on small and medium-sized businesses, but now it's climbing the ladder and attempting to become enterprise-class technology. This Technical Guide shows IT pros how to determine whether a vendor's UTM is truly an enterprise-grade security appliance and, if so, how to integrate and manage it into existing infrastructure.

        View E-Handbook
      • Cloud storage challenges and choices

        Our comprehensive e-book tackles the cloud storage challenges and business decisions that surround cloud storage investments, and breaks them into three areas of concentration: architecture, availability and return on investment.

        Get the latest updates on architectural choices when using the cloud for storage, including cloud controllers and application programming interfaces. We provide a short list of technical capabilities to look for in a cloud controller and questions to ask your service provider. Learn which metrics your peers are using to determine if cloud storage projects are meeting their potential, and what sort of service levels you can expect from providers or hybrid projects. Discover how to leverage the most cutting-edge cloud technologies and how not to get taken advantage of when choosing a cloud storage strategy/service.

        View E-Book
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 2
      • Understanding hosted Exchange options

        Now that more IT admins are getting comfortable with the idea of hosted Exchange, the next challenge is deciding on the best approach to the cloud, and the best provider. In years past, the hosted Exchange market was mostly controlled by third-party vendors, but with Office 365, Microsoft is a strong contender as well. This handbook explores the competition between Microsoft and third-party hosted Exchange vendors, as well as how to make a realistic evaluation of vendors’ offerings based on a company’s specific needs. Other sections cover the pros and cons of fully hosted Office 365 and the potential advantages of opting for a hybrid approach to the cloud. Readers will be able to decide if it’s wise for their company to move everything off-premises or if they need to develop a more gradual strategy to reduce risk and costs.

        View E-Handbook
      • Virtualizing Microsoft Exchange Server

        While virtualizing Exchange Server can reduce operational costs, improve flexibility and consolidate resources, a proper plan is necessary in order to avoid potential complications. One question many shops contemplate is whether to choose Microsoft technology and virtualize with its Hyper-V platform, or to go with VMware’s more established vSphere. Another possibility is Citrix XenServer, which may appeal to smaller IT shops looking for a good price.

        This handbook cuts through biases about the various platforms to help readers make a realistic evaluation of the pros and cons of each, whether they’re using Exchange 2013 or older versions. Readers will learn about specific steps to take and particular trouble spots to avoid on the way to a successful virtualization of one of their organization’s most essential applications.

        View E-Handbook
      • Mastering Exchange virtualization for VMware

        Virtualization is a great way to consolidate resources and save precious capital, but messaging administrators still need to keep a close eye on performance and scalability. Not only is VMware the dominant virtualization platform, but it works very well with Microsoft Exchange Server 2010, so many organizations are considering it over Hyper-V. In this handbook you'll learn about best practices for Exchange virtualization, including admin tips on the best ways to deploy Exchange on a VMware infrastructure, managing storage and troubleshooting performance.

        View E-Handbook
      • Help with Office 365, mobile devices, Exchange security

        November 2011, Vol. 11

        Includes:
        • Six commonly overlooked Exchange security vulnerabilities
        • Exchange Online mobile device support: A comprehensive look
        View E-Zine
      Page 1 of 2
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • The many paths to Exchange 2013

        Exchange 2013 offers features that could benefit administrators and make the idea of hosted Exchange more appealing. We look at how to install and deploy Exchange 2013 and how to address problems that will likely arise in the upgrade process.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • Who, what, where? How the cloud complicates identity management

        IT security and regulatory compliance require identity and access management. However, the move to the cloud and the spread of mobile devices has added complexity. This handbook looks at tools and best practices for managing authentication, working with cloud providers and understanding how Active Directory can and cannot help.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Email archiving: Planning, policies and product selection

        Get the fundamentals of email archiving from start to finish in this e-book, “Email archiving: Planning, policies and product selection.” Each chapter guides IT managers through the individual phases of the email-archiving project process.

        Email archiving, like any other IT project, requires a fully developed plan. Chapters feature information on creating an email archiving roadmap, defining email archiving policy, analyzing email archiving features, improving storage management and selecting a product.

        View E-Book
      • Email lifecycle planning for Exchange Server

        April 2009, Vol. 1

        Includes:
        • The importance of lifecycle planning for Exchange email archives
        • Part 1: Exchange Server 2007 requirements
        • Obtaining and verifying SSL certificates in Exchange Server
        View E-Zine
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Who's reading your email?

        July 2011, Vol. 10

        Includes:
        • Five steps to preparing for Exchange virtualization failures
        • Exchange 2010 auditing tools to track admin, end-user behavior
        View E-Zine
      •  
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1

Featured E-ZINES on searchExchange.comView all >>

  • Modern Infrastructure

    Modern Infrastructure covers the convergence of technologies -- from cloud computing to virtualization to mobile devices -- and the impact on data centers.

  • Exchange Insider

    SearchExchange.com's Exchange Insider E-Zine gives IT professionals the tools they need to maintain performance, scalability and email storage in Exchange environments – offering a comprehensive look at Exchange Server administration.

ALL TECHTARGET E-ZINES

Featured E-BOOKS on searchExchange.comView all >>

  • Cloud storage challenges and choices

    Our comprehensive e-book tackles the cloud storage challenges and business decisions that surround cloud storage investments, and breaks them into three areas of concentration: architecture, availability and return on investment.

    Get the latest updates on architectural choices when using the cloud for storage, including cloud controllers and application programming interfaces. We provide a short list of technical capabilities to look for in a cloud controller and questions to ask your service provider. Learn which metrics your peers are using to determine if cloud storage projects are meeting their potential, and what sort of service levels you can expect from providers or hybrid projects. Discover how to leverage the most cutting-edge cloud technologies and how not to get taken advantage of when choosing a cloud storage strategy/service.

  • Forging the path to tomorrow's CRM

    Perhaps no two words have more of an effect on business today than "customer experience." Consumers have a wealth of options for buying products and services -- and they're not shy about letting the social media sphere know when they’re not happy. To keep them coming -- and coming back -- organizations need to ensure that the experiences they’re serving up are nothing less than stellar.

    In our e-book series, The Risks and Rewards of Customer Experience Management, readers will get practical advice and real-world insight into strategies that place the focus of organizations' operations and processes on their customers. The first chapter concentrates on automation in the contact center. It will explore the technologies, such as interactive voice response and virtual agents. And it will examine what organizations need to evaluate when deciding which processes to automate and which areas will always need a human touch. The second installment delves into digital marketing, mobile applications and social media. It's no longer enough to send the same message to all customers; messages now must be personalized -- and soon, based on where customers are at any given moment. The chapter will look at location-based automated marketing and the pros and cons -- including the loss of privacy -- associated with such practices. The final chapter digs deep into the role of analytics in customer experience management plans, scrutinizing data harvesting methods and ways to use big data to augment customer experiences. And the chapter will look at times when knowing all about your customer goes horribly wrong.

OTHER FEATURED E-BOOKS

Featured E-HANDBOOKS on searchExchange.comView all >>

  • The AWS role in disaster recovery

    No matter how well prepared you might be, disaster can strike. Most mature IT organizations have disaster recovery plans, but Amazon Web Services offers a unique set of services that can keep your business running if the worst happens. This handbook discusses the strategies and options available to companies looking to AWS for disaster preparedness and business continuity, including understanding EC2 availability zones, using S3 for backup and storage, testing your DR strategy in AWS and preparing for AWS outages.

  • The HIPAA omnibus rule spells big change for health IT operations

    Known informally as "the omnibus rule," last year's HHS HIPAA-update threw healthcare providers, payers and their business associates for a loop. The biggest changes wrought under the new rule affect HIPAA's Security Rule, with both business associates and healthcare providers facing increased liability over data security.

    This three-part guide takes a hard look at what these changes mean for day-to-day health IT operations and, more broadly, for the industry. First, compliance and standards expert Mike Chapple drills down on the repercussions for business associates under the HIPAA omnibus rule: an increased accountability when entering into business associate agreements. Chapple then explores the steps health IT pros can take to adjust business processes and remain compliant with HIPAA regulations. Next, Chapple dives deeper into the compliance issue -- specifically, how a continuous approach helps organizations increase data security and reduce stress on IT teams. To close, SearchHealthIT news writer Shaun Sutner takes a bird's-eye view of legislation reformation. Readers will learn how one decades-old federal regulation -- and discussions of reform, especially -- has prompted an important conversation on data regulation and integration.

OTHER FEATURED E-HANDBOOKS