Exclusive content for IT Pros in the know

Premium Editorial

We have gathered our editorially written E-Books, E-Zine, guides and research to save you the effort of having to track such premium content down on your own, ultimately helping you to solve your toughest IT challenges more effectively – and faster – than ever before.

Premium Editorial By Topic

      • Devising a security strategy for the modern network

        The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update their network security strategy to take into account the latest devices coming online, they must also prepare for the future, too. This TechGuide looks at the options for network defense today and in the near future, including how to spot vulnerabilities and how to rank them, too, so infosec pros can respond to inevitable attacks quickly and efficiently.

        View E-Handbook
      • Nailing down a business case for Oracle Fusion Applications

        Oracle Fusion Applications, a suite of enterprise resource planning applications, get a lot of air time. Still, evidence has shown that adoption has yet to hit a blistering pace. While Oracle promises the new applications will bring genuine business value to an organization, some of the hurdles -- among them, cost -- have kept businesses away.

        In this three-part guide, readers will benefit from an in-depth look at how well -- to the surprise of many users -- Oracle Fusion Apps thrive in the cloud. Further, they'll learn why and how to determine the best fit for their organization from Oracle's catalog. First, IT writer Robert Sheldon drills down on the development of Oracle Fusion Cloud Services -- how they came to be and where they're headed. And he gives a rundown of services offered. Next, Alyssa Johnson, Oracle Applications Users Group president, sits down for an interview and details the future of Oracle ERP systems and Fusion Apps. To close, ComputerWeekly writer Lindsay Clark explores the reasons -- despite high expectations for enterprise cloud applications and at least one notable example of a company running them -- Fusion Applications have yet to see a mass conversion.

        View E-Handbook
      • Cultivating IT Talent

        19 August 2014

        Includes:
        • Morrison Utility Services fills in holes faster with ETAdirect
        • Why digitisation transforms supplier relationships
        View E-Zine
      • Three new takes on WAN optimization

        Once considered new technology, WAN optimization is now widespread, and enterprises are including it in their networks from the start. Now that WAN optimization is mature, what's the next step for WAN management? Application delivery optimization and WAN aggregation are now on the radar, as is an all-in-one solution that integrates WAN optimization with management and security.

        View E-Handbook
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 2
      • Understanding hosted Exchange options

        Now that more IT admins are getting comfortable with the idea of hosted Exchange, the next challenge is deciding on the best approach to the cloud, and the best provider. In years past, the hosted Exchange market was mostly controlled by third-party vendors, but with Office 365, Microsoft is a strong contender as well. This handbook explores the competition between Microsoft and third-party hosted Exchange vendors, as well as how to make a realistic evaluation of vendors’ offerings based on a company’s specific needs. Other sections cover the pros and cons of fully hosted Office 365 and the potential advantages of opting for a hybrid approach to the cloud. Readers will be able to decide if it’s wise for their company to move everything off-premises or if they need to develop a more gradual strategy to reduce risk and costs.

        View E-Handbook
      • Virtualizing Microsoft Exchange Server

        While virtualizing Exchange Server can reduce operational costs, improve flexibility and consolidate resources, a proper plan is necessary in order to avoid potential complications. One question many shops contemplate is whether to choose Microsoft technology and virtualize with its Hyper-V platform, or to go with VMware’s more established vSphere. Another possibility is Citrix XenServer, which may appeal to smaller IT shops looking for a good price.

        This handbook cuts through biases about the various platforms to help readers make a realistic evaluation of the pros and cons of each, whether they’re using Exchange 2013 or older versions. Readers will learn about specific steps to take and particular trouble spots to avoid on the way to a successful virtualization of one of their organization’s most essential applications.

        View E-Handbook
      • Mastering Exchange virtualization for VMware

        Virtualization is a great way to consolidate resources and save precious capital, but messaging administrators still need to keep a close eye on performance and scalability. Not only is VMware the dominant virtualization platform, but it works very well with Microsoft Exchange Server 2010, so many organizations are considering it over Hyper-V. In this handbook you'll learn about best practices for Exchange virtualization, including admin tips on the best ways to deploy Exchange on a VMware infrastructure, managing storage and troubleshooting performance.

        View E-Handbook
      • Help with Office 365, mobile devices, Exchange security

        November 2011, Vol. 11

        Includes:
        • Six commonly overlooked Exchange security vulnerabilities
        • Exchange Online mobile device support: A comprehensive look
        View E-Zine
      Page 1 of 2
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • The many paths to Exchange 2013

        Exchange 2013 offers features that could benefit administrators and make the idea of hosted Exchange more appealing. We look at how to install and deploy Exchange 2013 and how to address problems that will likely arise in the upgrade process.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • Who, what, where? How the cloud complicates identity management

        IT security and regulatory compliance require identity and access management. However, the move to the cloud and the spread of mobile devices has added complexity. This handbook looks at tools and best practices for managing authentication, working with cloud providers and understanding how Active Directory can and cannot help.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Email archiving: Planning, policies and product selection

        Get the fundamentals of email archiving from start to finish in this e-book, “Email archiving: Planning, policies and product selection.” Each chapter guides IT managers through the individual phases of the email-archiving project process.

        Email archiving, like any other IT project, requires a fully developed plan. Chapters feature information on creating an email archiving roadmap, defining email archiving policy, analyzing email archiving features, improving storage management and selecting a product.

        View E-Book
      • Email lifecycle planning for Exchange Server

        April 2009, Vol. 1

        Includes:
        • The importance of lifecycle planning for Exchange email archives
        • Part 1: Exchange Server 2007 requirements
        • Obtaining and verifying SSL certificates in Exchange Server
        View E-Zine
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Who's reading your email?

        July 2011, Vol. 10

        Includes:
        • Five steps to preparing for Exchange virtualization failures
        • Exchange 2010 auditing tools to track admin, end-user behavior
        View E-Zine
      •  
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1

Featured E-ZINES on searchExchange.comView all >>

  • Modern Infrastructure

    Modern Infrastructure covers the convergence of technologies -- from cloud computing to virtualization to mobile devices -- and the impact on data centers.

  • Exchange Insider

    SearchExchange.com's Exchange Insider E-Zine gives IT professionals the tools they need to maintain performance, scalability and email storage in Exchange environments – offering a comprehensive look at Exchange Server administration.

ALL TECHTARGET E-ZINES

Featured E-BOOKS on searchExchange.comView all >>

  • Overcome today's disaster recovery challenges

    The use of devices not connected to a local network is a challenge for IT staffs tasked with protecting data on those devices. Completing backups within a reasonable timeframe has become an issue for organizations. Some organizations are opting for alternatives to traditional backup to address these challenges. The cloud has been pushed as an alternative to tape for offsite storage for disaster recovery. However, there are challenges with this approach and with protecting applications running in the cloud.

  • Cloud storage challenges and choices

    Our comprehensive e-book tackles the cloud storage challenges and business decisions that surround cloud storage investments, and breaks them into three areas of concentration: architecture, availability and return on investment.

    Get the latest updates on architectural choices when using the cloud for storage, including cloud controllers and application programming interfaces. We provide a short list of technical capabilities to look for in a cloud controller and questions to ask your service provider. Learn which metrics your peers are using to determine if cloud storage projects are meeting their potential, and what sort of service levels you can expect from providers or hybrid projects. Discover how to leverage the most cutting-edge cloud technologies and how not to get taken advantage of when choosing a cloud storage strategy/service.

OTHER FEATURED E-BOOKS

Featured E-HANDBOOKS on searchExchange.comView all >>

  • Devising a security strategy for the modern network

    The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update their network security strategy to take into account the latest devices coming online, they must also prepare for the future, too. This TechGuide looks at the options for network defense today and in the near future, including how to spot vulnerabilities and how to rank them, too, so infosec pros can respond to inevitable attacks quickly and efficiently.

  • Nailing down a business case for Oracle Fusion Applications

    Oracle Fusion Applications, a suite of enterprise resource planning applications, get a lot of air time. Still, evidence has shown that adoption has yet to hit a blistering pace. While Oracle promises the new applications will bring genuine business value to an organization, some of the hurdles -- among them, cost -- have kept businesses away.

    In this three-part guide, readers will benefit from an in-depth look at how well -- to the surprise of many users -- Oracle Fusion Apps thrive in the cloud. Further, they'll learn why and how to determine the best fit for their organization from Oracle's catalog. First, IT writer Robert Sheldon drills down on the development of Oracle Fusion Cloud Services -- how they came to be and where they're headed. And he gives a rundown of services offered. Next, Alyssa Johnson, Oracle Applications Users Group president, sits down for an interview and details the future of Oracle ERP systems and Fusion Apps. To close, ComputerWeekly writer Lindsay Clark explores the reasons -- despite high expectations for enterprise cloud applications and at least one notable example of a company running them -- Fusion Applications have yet to see a mass conversion.

OTHER FEATURED E-HANDBOOKS