IT Management White Papers

IT Management includes a variety of functions for managing computers in a networked environment, including software distribution, version control, backup & recovery, job scheduling, virus protection and performance and capacity planning.

Sub-Categories: Desktop Management, Employee Performance, ITIL, Productivity, Project Management, Sarbanes Oxley Compliance, Service Management, Software Compliance
Results 26 - 50 of 2691Sort Results By: Published Date | Title | Company Name
By: Onapsis     Published Date: Oct 21, 2014

NVIDIA is a US-headquartered global technology company best known as a manufacturer of graphics and is now able to effectively manage threats to its SAP systems, perform pre and post audit scans of its whole application environment, and conduct basic scans on a regular basis with continuous monitoring and detection of vulnerabilities.

Tags : onapsis, security, security technology, sap systems, threat protection, audit scans, monitoring, detection
    
By: AlienVault     Published Date: Oct 21, 2014

When dealing with ransomware threats like CryptoWall, which encrypt your data and demand payment to unlock it, spotting infections quickly is critical in order to limit the damage. AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the command and control server. Watch this demo on-demand to see how AlienVault USM detects these threats quickly, saving you valuable clean-up time and limiting the damage from the attack.

Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
By: AlienVault     Published Date: Oct 21, 2014

Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. These can be very difficult to detect since they happen as users are going about their normal business. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM. You'll learn: • Common browser vulnerabilities used to execute these attacks • What attackers do next to take control of the system • How to catch it before the attacker moves further into your network

Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
By: AlienVault     Published Date: Oct 21, 2014

Have you ever wondered how the bad guys actually get control of a system? And, how they convert that system into a data-syphoning droid? Join AlienVault security engineer, Tom D'Aquino as he walks you through the steps of a system compromise and how detect these nefarious activities at every stage. You'll learn: • How attackers exploit vulnerabilities to take control of systems • What they do next to find & exfiltrate valuable data • How to catch them before the damage is done with AlienVault USM Using a real-world example of a common vulnerability, Tom will show you how AlienVault USM gives you the evidence you need to stop an attack in its tracks.

Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
By: AlienVault     Published Date: Oct 21, 2014

In this webinar, we'll cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment so you can: • Detect threats (known and emerging) • Identify vulnerabilities • Accelerate incident response • Identify policy violations • Simplify compliance management Join AlienVault to learn tricks for achieving unified security visibility in the shortest amount of time.

Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
By: AlienVault     Published Date: Oct 21, 2014

The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.

Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
By: AlienVault     Published Date: Oct 21, 2014

If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. Join compliance experts from Terra Verde Services and AlienVault for this practical session on how to take the pain out of PCI DSS reporting. You'll learn: • The key reporting requirements of the PCI DSS standard • The security technologies you need to collect the required data • How AlienVault USM can generate these reports in minutes, not days • How to use your audit reports to improve security on an on-going basis

Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
By: AlienVault     Published Date: Oct 21, 2014

As cyber attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. Event monitoring and correlation technologies and security operations are often tied to incident handling responsibilities, but the number of attack variations is staggering, and many organizations are struggling to develop incident detection and response processes that work for different situations. In this webcast, we'll outline the most common types of events and indicators of compromise (IOCs) that naturally feed intelligent correlation rules, and walk through a number of different incident types based on these. We'll also outline the differences in response strategies that make the most sense depending on what types of incidents may be occurring. By building a smarter incident response playbook, you'll be better equipped to detect and respond more effectively in a number of scenarios.

Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
By: AlienVault     Published Date: Oct 21, 2014

While vulnerability assessments are an essential part of understanding your risk profile, it's simply not realistic to expect to eliminate all vulnerabilities from your environment. So, when your scan produces a long list of vulnerabilities, how do you prioritize which ones to remediate first? By data criticality? CVSS score? Asset value? Patch availability? Without understanding the context of the vulnerable systems on your network, you may waste time checking things off the list without really improving security. Join AlienVault for this session to learn: • The pros & cons of different types of vulnerability scans - passive, active, authenticated, unauthenticated • Vulnerability scores and how to interpret them • Best practices for prioritizing vulnerability remediation • How threat intelligence can help you pinpoint the vulnerabilities that matter most

Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
By: AlienVault     Published Date: Oct 21, 2014

AlienVault is on a mission to change how organizations detect & mitigate threats - affordably & simply. Our USM solution delivers complete security visibility in a fraction of the time of traditional SIEM. So, you can go from installation to insight in days, not months. Download the 2014 Gartner MQ for SIEM.

Tags : mitigate, threats, detect, affordability, solution, deliver, security, visibility
    
By: AlienVault     Published Date: Oct 21, 2014

AlienVault's USM is tailor-made for the needs of the security-savvy SMB. It offers affordability, and a comprehensive and ever-increasing feature set powered by the respectable "AV Labs and Open Threat Exchange.” In this analyst report, Javvad Malik of 451 Research, reviews AlienVault's SMB-focused approach to SIEM and discusses the competitive landscape.

Tags : security, operations, affordability, av labs, open threat, exchange, analyst, report
    
By: AlienVault     Published Date: Oct 21, 2014

The Public Services Network (PSN) is a programme intended to improve communication services across the UK government by reducing the cost and complexity of digital communication across the public sector. The PSN will create one logical network, based on industry standards, thus improving performance and security. The PSN is a replacement to the GSi (Government Secured Intranet), and all Public Sector agencies must migrate to the PSN by 31 October 2014. AlienVault’s Unified Security Management (USM) platform can provide you with the single solution you need to address many of the network- and security-related questions required to complete your PSN IA documentation.

Tags : communication, government, reducing cost, digital, network, public sector, logical, industry
    
By: ShoreTel     Published Date: Oct 20, 2014

This report details Forrester Research, Inc.’s recommendation for IT professionals building out a Unified Communications and Collaboration infrastructure within their business. The key to success of a UC deployment is delivering benefits to both users and business units. This report guides IT professionals through the key needs, drivers, and likely benefits of a UC deployment. The report also predicts and quantifies how a communications and collaboration infrastructure rollout can reduce overall IT cost, drive productivity, and improve collaboration across the firm. The report from Forrester covers: • Benefits of Unified Communications • How to define the business value of UC • How to identify and calculate all sources of hard-dollar Benefits of UC • Obstacles to UC adoption and tips on overcoming it

Tags : unified communications, benefits, business value, uc adoption, it management, telecom
    
By: ShoreTel     Published Date: Oct 20, 2014

This document offers an overview of the current top ten requirements to consider for a premise-based UC solution, with features called out as well as a ShoreTel case study.

Tags : unified communications, requirements, premise-based uc solution, buyers guide, it management, telecom
    
By: ShoreTel     Published Date: Oct 20, 2014

In today’s economy, flexibility and speed are essential to success. It’s no surprise that more companies are turning to VoIP phone systems to give them the freedom they need to grow and accommodate clients near and far. But, how do you know which VoIP provider is best for your business? To answer that question, first you must ask yourself if you want basic hosted VoIP or managed VoIP. Like the names sound, basic is a no-frills, DIY approach, while managed comes with all the latest features, including a team of experts to manage your system for you. To make the best choice for your business and budget, download the e-book "9 Things to Consider Before Choosing a Cloud Phone Provider.”

Tags : cloud provider, voip phone systems, voip providers, flexibility and speed, it management, telecom
    
By: ShoreTel     Published Date: Oct 20, 2014

Historically, IT investments were made simply in the interest of increasing competitiveness and with little insight into the hard, fact-based financial case. As organizations worldwide have been forced to tighten belts and slash budgets, management increasingly require financial evidence for sound IT purchases that fully align with business goals and strategies. This webinar defines and describes total cost of ownership - an important metric for assessing and tracking the risks, costs, and benefits of unified communications solutions. TCO breaks down the many factors used to present a solid business case. You'll learn how to develop a solid business case that: • Compares competing solutions on an equal footing • Aligns solutions with business needs • Provides a framework for establishing ongoing budgets • Offers the ability to audit the original business case

Tags : tco, communications, competing solutions, metrics, communication solutions, it management, telecom
    
By: IBM     Published Date: Oct 17, 2014

In this first-release MQ, Gartner evaluates providers on service delivery, B2B Network/Collaboration, Integration Functionality and success in capitalizing on vision. Rated against an extensive 15-criteria evaluation, IBM earned one of only three Leader positions, and outpaced the competition in "completeness of vision," signifying our strength in delivering the most competitive solution to the marketplace.

Tags : integration brokerage, service delivery, integration functionality, competitive solutions, it management, data management, best practices, business analytics
    
By: VCE     Published Date: Oct 16, 2014

Learn how a true Cconverged Iinfrastructure will enable your organize to achieve rapid, cost-effective private cloud deployments and see the six benefits that this will provide for your business.

Tags : vce, converged infrastructure, networking, it management
    
By: Aerohive     Published Date: Oct 15, 2014

This paper aims to facilitate understanding and addressing IT’s dilemma in a bring your own device (BYOD) world

Tags : mobile computing, the increase in mobile workers, byod policy implications for it, it management, mobile data systems, mobile workers, wireless infrastructure, cloud computing
    
By: Aerohive     Published Date: Oct 15, 2014

This paper aims to facilitate understanding and addressing IT’s dilemma in a bring your own device (BYOD) world

Tags : mobile computing, the increase in mobile workers, byod policy implications for it, it management, mobile data systems, mobile workers, cloud computing, data center design and management
    
By: IBM     Published Date: Oct 14, 2014

Four technology trends—cloud computing, mobile technology, social collaboration and analytics—are shaping the business and converging on the data center. But few data center strategies are designed with the requisite flexibility, scalability or resiliency to meet the new demands. Read the white paper to learn how a good data center strategy can help you prepare for the rigors and unpredictability of emerging technologies. Find out how IBM’s predictive analytics are helping companies build more accurate, forward-looking data center strategies and how those strategies are leading to more agile, efficient and resilient infrastructures.

Tags : it trends, data center strategies, cloud computing, mobile technology, it management, data management, business intelligence
    
By: IBM     Published Date: Oct 14, 2014

Capitalizing on the transformative potential of private cloud requires leveraging the differentiators that will drive exponential value down the road. This IBM white paper discusses the core differentiators that drive transformative business value and to how best incorporate them into your environment, based on the latest research, technologies and solutions.

Tags : private cloud, business value, business agility, hybrid era, it management, knowledge management, business intelligence
    
By: IBM     Published Date: Oct 14, 2014

Flexible workplace forward thinkers are reporting productivity increases and cost decreases of 20% or more. Learn to achieve these benefits for your business by downloading the IBM executive report Achieving success with a flexible workplace: Forward thinkers’ best practices to enhance productivity, spur innovation and reduce costs. The report contains findings from a recent IBM survey covering user mobility, user support, collaboration and security.

Tags : flexible workplace, user mobility, user support, productivity management, it management, best practices, business analytics, business intelligence
    
By: IBM     Published Date: Oct 14, 2014

This white paper, based on original IBM research with analysis by IDC, offers a Mobile Infrastructure Maturity Model and documents the best practices and characteristics of organizations that are leaders.

Tags : mobile technology, it strategies, mobile infrastructure, it management, mobile data systems, best practices, business intelligence
    
By: IBM     Published Date: Oct 14, 2014

Building a mobile collaboration or bring-your-own-device solution requires three things: mobile applications, the mobile devices themselves and the network that underpins them both. Often, the network and its capabilities take a back seat to applications and devices—which can ultimately lead to poor performance or an inflexible infrastructure. Find out how to develop the type of network that truly supports mobile devices, applications and unified communications programs, thereby establishing the foundation for stronger mobile solutions.

Tags : mobile collaboration, mobile applications, mobile solutions, mobile infrastructure, it management, mobile data systems, application performance management, best practices
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.