IT Management White Papers

IT Management includes a variety of functions for managing computers in a networked environment, including software distribution, version control, backup & recovery, job scheduling, virus protection and performance and capacity planning.

Sub-Categories: Desktop Management, Employee Performance, ITIL, Productivity, Project Management, Sarbanes Oxley Compliance, Service Management, Software Compliance
Results 26 - 50 of 3839Sort Results By: Published Date | Title | Company Name
By: Hostway Services, Inc.     Published Date: Aug 13, 2015

This is a whitepaper outlining what designers and developers should look for in a potential reselling partner.

Tags : hosting, developer, reselling, services, service, it management, knowledge management
    
By: Hostway Services, Inc.     Published Date: Aug 13, 2015

This is a whitepaper about today's competitive website design market.

Tags : hosting, revenue, designing, website, best practices, developers, it management, enterprise applications
    
By: Hostway Services, Inc.     Published Date: Aug 13, 2015

This is a whitepaper about building and hosting a website with a recurring revenue.

Tags : hosting, website, revenue, designers, it management, platforms
    
By: Cloud Sherpas     Published Date: Aug 13, 2015

In the Top 5 Reasons Why Enterprises Are Going Google, Cloud Sherpas explores why leading organizations like these have prepared for the digital workplace of tomorrow by moving their email and collaboration platforms to Google Apps for Work, such as: Eliminating the need to manage hardware or software Embracing a mobile, BYOD culture Reducing IT costs and infrastructure

Tags : google enterprise solutions, google cloud applications, business cloud apps, google apps for business training, google app migration, migrating to google apps, cloud apps for business, google app development
    
By: Arcserve     Published Date: Aug 12, 2015

Download this white paper to read how First Securities is enjoying a range of significant business benefits after implementing the Arcserve backup solution.

Tags : arcserve, backup, data retrieval, arcserve backup solution, finance, backup infrastructure, optimization, it management
    
By: Arcserve     Published Date: Aug 12, 2015

Read this white paper to learn why high capacity storage mediums like magnetic tape are seeing a resurgence in value to IT.

Tags : tape backup, high capacity storage, magnetic tape, cloud, durability, arcserve, hybrid data center, it management
    
By: Arcserve     Published Date: Aug 12, 2015

This survey provides insight into the Data Protection landscape across Asia Pacific. Most notably the results point to IT departments across APAC in a state of transition. While “legacy” methods for data protection are still heavily used, we see that a tipping point has been reached and in most instances the majority of users have moved to newer technologies in the data protection strategies.

Tags : data protection trends, arcserve, smb, data protection landscape, legacy data protection, data protection strategies, security, it management
    
By: Adobe     Published Date: Aug 11, 2015

In this research study hear from more than 1,500 line-of-business leaders, IT leaders, and information workers about the effectiveness of their organization’s document-based business processes.

Tags : adobe, enterprise, mobile, security, saas, document management, cloud, it management
    
By: Vectra Networks     Published Date: Aug 03, 2015

Recent research from Kaspersky has revealed a massive criminal campaign that was able to infiltrate more than 100 different banks and steal upwards of $1 billion from the affected institutions. Kaspersky dubbed this operation the Carbanak APT due to a connection between the malware used in the attacks and the now infamous Carberp banking botnet. You may recall the headlines in 2013 that revealed the Carberp source code had been leaked into the wild, making it accessible to virtually any would-be criminal group that may want it. The accessibility of Carberp source code could easily have provided a starting point for the Carbanak as they built their malware.

Tags : threat, data, security, it management, malware, banking, cyber theft, remote access tool
    
By: Vectra Networks     Published Date: Aug 03, 2015

Protect prominent securities.

Tags : firewall, intrusion detection, intrusion prevention, ips, ids, advanced persistent threat, apt, identity management
    
By: Vectra Networks     Published Date: Aug 03, 2015

Recently, Kasperky Labs disclosed that it was the victim of a sophisticated cyber attack, which they have named Duqu 2.0. The team at Kaspersky Labs has published a detailed analysis of Duqu 2.0 and it’s definitely worth a read.

Tags : cyber attack, protection, security, network, business continuity, compliance, firewalls, productivity
    
By: Vectra Networks     Published Date: Aug 03, 2015

The Dyre family of banking malware is back in the news after researchers recently observed that the malware incorporated tricks to avoid detection in malware sandboxes. Previously, Dyre was most notable for targeting high value bank accounts, including business accounts, and incorporating sophisticated social engineering components to overcome the 2-factor authentication used by most banks.

Tags : malware, data, malware, banking, malware sandbox, authentication, two-factor authentication, identity management
    
By: Vectra Networks     Published Date: Aug 03, 2015

Protect against advanced attacks.

Tags : threat, data, security, it management, budget, firewall, intrusion detection, intrusion prevention
    
By: Brother     Published Date: Jul 31, 2015

Read this white paper to learn more about key printing trends like device underuse and unbalanced fleets and their SMB impact.

Tags : printing trends, brother, multifunction printers, document management systems, productivity, cost savings, small business, medium-sized business
    
By: IBM     Published Date: Jul 31, 2015

Optimize the process of investigating and gathering evidence.

Tags : data, security, threats, protection, business continuity, compliance, hacker detection, intrusion detection
    
By: IBM     Published Date: Jul 31, 2015

Market trends and vendor evaluation criteria.

Tags : security, data, event management, infrastructure, network management, application integration, business intelligence, productivity
    
By: Venafi     Published Date: Jul 27, 2015

According to Gartner, by 2017, more than ?50% of network attacks will use encrypted SSL/TLS. Most organizations cannot decrypt and inspect SSL communications to detect these threats, which creates security blind spots.

Tags : ssl traffic, venafi, tls, security blind spots, it security, it security solutions, it management, knowledge management
    
By: XO Communications     Published Date: Jul 22, 2015

Download this white paper to find out how this approach enables you to retain top-down visibility and control of network security and manage the impact of cloud traffic on your WAN.

Tags : shadow it, hybrid cloud management, visibility, network security, cloud traffic, wan, networking, security
    
By: XO Communications     Published Date: Jul 22, 2015

Gannett views its private cloud and WAN capability as a strategic core competency and was looking for a strategic partner to support its growth and cloud initiatives. XO embraced this partnership and earned the trust of the media giant by providing superior technical expertise, smooth implementations, and responsive customer support.

Tags : gannett, private cloud, xo mpls ip-vpn wan, scalability, strategy, cloud, networking, security
    
By: XO Communications     Published Date: Jul 22, 2015

Download this white paper to learn how XO MPLS IP-VPN helps Wine.com prevent traffic bottlenecks at order processing centers, especially during high-volume periods, so orders get processed and packages don't get lost.

Tags : xo mpls ip-vpn, traffic bottlenecks, order processing, vpn, networking, security, it management, wireless
    
By: CDW-Trend Micro     Published Date: Jul 17, 2015

Rush University Medical Center (Rush) is a not-for-profit healthcare, education, and research enterprise with a 664-bed academic medical center that includes hospital facilities for adults and children. Rush offers residency and fellowship programs in medical and surgical specialties to more than 2,000 students. With a large and experienced IT team, Rush manages three data centers across its campuses. The organization currently supports approximately 1,600 virtual desktops and 600 virtual servers, along with 10,000 physical desktops. The Rush IT team is tasked with supporting users on all devices, including smartphones and tablets. Watch the video to see how Rush protects the entire organization and protects against advanced threats with Trend Micro solutions, including Deep Discovery. Webinar Brought To You By CDW-Trend Micro

Tags : security threats, trend micro, security solutions, mobile devices, network, networking, security, it management
    
By: CDW-Trend Micro     Published Date: Jul 17, 2015

Security in the cloud is a shared responsibility. That means customers and cloud service providers must work together to protect applications and data, meet compliance regulations, and ensure business continuity. Watch this video to learn more about cloud security through Trend Micro Deep Security. Webinar Brought To You By CDW-Trend Micro

Tags : networking, security, it management
    
By: CDW-Trend Micro     Published Date: Jul 17, 2015

Watch this video to learn why you should defend against targeted attacks, and how the Trend Micro Custom Defense provides unique solutions to detect, analyze and respond to your attackers. Webinar Brought To You By CDW-Trend Micro

Tags : trend micro, targeted attacks, security solutions, technology, networking, security, it management
    
By: CDW-Trend Micro     Published Date: Jul 17, 2015

A small business owner named Pete needs a complete security solution that protects everyone on his staff when they email, browse, and share using their Macs, PCs, or mobile devices. Watch this video and see Pete discover Trend Micro™ Worry-Free™ Business Security is an easy-to-use solution that provides complete user protection for all his employees. Webinar Brought To You By CDW-Trend Micro

Tags : security solution, cyber attack, mobile devices, business security, user protection, networking, security, it management
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.