IT Management White Papers

IT Management includes a variety of functions for managing computers in a networked environment, including software distribution, version control, backup & recovery, job scheduling, virus protection and performance and capacity planning.

Sub-Categories: Desktop Management, Employee Performance, ITIL, Productivity, Project Management, Sarbanes Oxley Compliance, Service Management, Software Compliance
Results 26 - 50 of 2523Sort Results By: Published Date | Title | Company Name
By: Bit9     Published Date: Aug 06, 2014

This eBook explains how a single, positive security solution, such as Bit9, facilitates the convergence of compliance and security—one agent that provides visibility, detection, response and protection and can automate and manage compliance for PCI-DSS, SOX, HIPAA, FISMA, GLBA, GPG 13, NERC CIP and other regulations.

Tags : bit9, pci, dss, security gaps, endpoint monitoring, compliance, security, servers
    
By: Bit9     Published Date: Aug 06, 2014

As a result of the recent spate of high-profile data breaches at brand name retailers, compromising credit and debit card and other personally identifiable information for hundreds of millions of consumers in the process, data security has become priority No. 1 for many retailers in 2014. And for good reason: The consequences of suffering a data breach are numerous, and none of them are positive — consumer mistrust, a drop in traffic and a decrease in sales, to name just a few. With retailers recently testifying before Congress that they’re facing increasingly sophisticated threats from cyber criminals, and no end to those in sight, it’s become apparent that your company needs to implement strategies that will protect itself from a costly data breach. Here are 10 ways you can more easily achieve that goal while maintaining required PCI compliance (all of these tips fall within one of five buckets — visibility; asset control; enforcement; trust policy; advance measurement.)

Tags : bit9, pci, dss, security gaps, endpoint monitoring, compliance, security, servers
    
By: Bit9     Published Date: Aug 06, 2014

Enterprises are entering into a continuous state of compromise, and within this volatile risk market, consequences for organizations that fail to meet their regulatory security guidelines are feeling the pain all the way up the corporate ladder. Within this environment, traditional security controls are no longer sufficient to fully protect your organization. Therefore, IT risk and audit professionals need to understand that simply meeting compliance controls does not equal complete security coverage. By neglecting to pay attention to emerging advanced threat protection solutions and capabilities, a compliant company can still be a vulnerable one. Join Christopher Strand, senior director of compliance at Bit9 + Carbon Black, to understand: • The risks and liability organizations and auditors face by not going beyond compliance • How to meet and exceed compliance standards with emerging security controls • Evaluating emerging security controls within the IT audit process

Tags : bit9, pci, dss, security gaps, endpoint monitoring, compliance, security, servers
    
By: Samanage     Published Date: Aug 05, 2014

Does your IT department have a perception problem within your organization? Listen to the recorded webinar to learn how Shvonne Williams, Director of IT Services at MediFit Corporate Services, was able to turn around her team’s image and transform the IT department into a strategic business partner within the organization.

Tags : samanage, medifit corporate services, it deparment, itsm solution, itsm, it management, enterprise applications
    
By: EMC Corporation     Published Date: Aug 05, 2014

It’s an exciting yet daunting time to be a security professional. Security threats are becoming more aggressive and voracious. Governments and industry bodies are getting more prescriptive around compliance. Combined with exponentially more complex IT environments, security management is increasingly challenging. Moreover, new “Big Data” technologies purport bringing advanced analytic techniques like predictive analysis and advanced statistical techniques close to the security professional.

Tags : big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance, security
    
By: TIBCO     Published Date: Aug 05, 2014

This ebook explains how the TIBCO Fast Data architecture delivers the right information—and the right decision—at the right place and time.

Tags : tibco, tibco software, big data, business intelligence, esb, enterprise service bus, soa, application integration
    
By: Adobe     Published Date: Aug 05, 2014

IT decision-makers can use this analysis to better understand the modern workers they’re supporting, with the objective of making them more productive and better aligned with corporate objectives.

Tags : adobe, adobe systems, byod, collaboration, modern workforce, workforce management, mobile devices, mobile workers
    
By: Windstream     Published Date: Aug 04, 2014

Cloud computing today is fundamentally altering business processes and changing the way organizations interact with customers, partners, and employees. This transformation brings incredible opportunities, including the ability to build a realtime enterprise where interaction and innovation flourish, and more agile, flexible, and cost-effective practices thrive. Yet cloud computing also presents significant challenges. The path to value is not clearly marked, and there are potential stumbling points along the way. Please download the whitepaper to learn more!

Tags : windstream, cloud computing, cloud hybrid options, oxford economics, cloud benefits, it management, knowledge management, data management
    
By: Global Knowledge     Published Date: Jul 29, 2014

This white paper addresses four different components of the Tivoli monitoring infrastructure for creating a high availability environment while providing redundancy and failover capacity. Although the principles are the same for each of these systems, the methods for adhering to these principles are different for each of them.

Tags : global knowledge, ibm, tivoli, monitor, infrastructure, capacity, security, software development
    
By: Global Knowledge     Published Date: Jul 29, 2014

There are many issues and requirements to consider when you upgrade vCenter server and ESXi hosts to vSphere 5.5. The last thing you want is to have the upgrade fail or to encounter problems that you could have avoided with a little bit of research. This paper highlights the process, requirements, and options for upgrading to vSphere 5.5.

Tags : global knowledge, vcenter, server, esxi, host, vsphere, upgrade, security
    
By: Global Knowledge     Published Date: Jul 29, 2014

Present concerns about cloud security are reminiscent of the fears in the 1980s of LANs and a highly distributed IT infrastructure, and they also echo the efforts in the 1990s to stop Internet usage at work. But the issue really isn't security; it's governance to ensure interoperability and portability. We will review these concerns and discuss how the industry dealt with them, and then explore how these same concerns can be mitigated with a proper cloud strategy.

Tags : global knowledge, iaas, public clouds, cloud, security, infrastructure, it management
    
By: Fujitsu     Published Date: Jul 25, 2014

Download to read how Fujitsu gave the Metropolitan Nashville Police Department a cost effective reliable solution to their technology and communication challenges.

Tags : fujitsu, case study, communications, technology, brite fujitsu, police departments, squad cars, it management
    
By: IBM     Published Date: Jul 22, 2014

At the heart of a successful agile development team is a skilled group of developers. Agile software professionals continuously deliver on their objectives, but they need robust development tools and practices to maximize their productivity. If you’re a software developer or solution architect, you'll gain the insights you need to ensure your team has the right tools and practices to maximize your effectiveness in agile development.

Tags : ibm, devops, developement, product development, agile, software, agile software, agile software professional
    
By: F5 Networks Inc     Published Date: Jul 21, 2014

Most organizations are concerned with the speed of their applications. Whether it involves an internal business application or a customer-facing shopping site, web application performance can have a huge impact on business performance. A faster-performing web application results in greater sales, better user engagement and improved productivity. The aim of accelerating these web applications is to improve the end-user experience with faster page-load times and more responsive interactivity. Read this article to learn more about the essential principles driving web application acceleration technologies today.

Tags : web app, acceleration, implementation, data, performance, it management
    
By: CA Technologies     Published Date: Jul 16, 2014

This paper provides findings and statistics on users demands and an important list of 5 ways to satisfy both business and user demands for IT Service.

Tags : cloud service management, mobile computing, mobile data systems, customer interaction service, service management, cloud computing
    
By: CA Technologies     Published Date: Jul 16, 2014

This paper focuses on the changing demands from consumers and how the right IT Management Solution can help.

Tags : it service management, changing consumer demands, consumer experience, byod, saas, mobile computing, enterprise software, web service management
    
By: Neustar     Published Date: Jul 14, 2014

More and more criminals are using DDoS attacks as a distraction or “smokescreen” for other cybercrimes like theft of data or even funds. Watch this video for a behind-the-scenes tour of what this “underground economy” of the Internet really looks like – a place where criminals sell stolen credit cards and credentials by the thousands, offer botnets, malware, and DDoS for hire, and much more

Tags : neustar, ddos, cybercrimes, malware, botnets, stolen cards, smokescreens, underground economy
    
By: Neustar     Published Date: Jul 14, 2014

For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger? What new tactics are criminals employing? See this infographic for clues.

Tags : neustar, blackbeard, pirate, siteprotect, cloud computing, ddos, it department, security
    
By: Neustar     Published Date: Jul 14, 2014

It’s no secret that DDoS attacks are worsening by the day. From the largest financial institutions to smaller Internet companies, everyone’s a target. Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size. Most of these conversations boil down to three key questions and form the conversation you should be having, too—whether you use Neustar, another provider or your in-house team to manage your external DNS.

Tags : neustar, ddos, ecommerce, protection, security, malware, technology, it departments
    
By: Neustar     Published Date: Jul 14, 2014

Historically, communication service providers (CSPs) have viewed network transformation through the narrow lens of technology, as though it were a simple matter of upgrading equipment. But in reality, the solution is much more complex. To ensure a smooth transition to an all-IP network, it’s essential for each area of the business (IT, marketing and operations) to work together and consistently communicate throughout the journey.

Tags : neustar, network transformation, csps, communication service providers, ip networks, marketing, operations, it management
    
By: Neustar     Published Date: Jul 14, 2014

DDoS attacks against high-tech firms have started to take a dangerous turn. It’s called DDoS smokescreening — attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property. This is just one insight in Neustar’s 2014 Annual DDoS Attacks and Impact Survey. The resulting report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology products and/or services such as software, SaaS, IaaS as well as hardware manufacturers

Tags : neustar, ddos, online gaming, ecommerce, protection, security, malware, technology
    
By: AlienVault     Published Date: Jul 14, 2014

While vulnerability assessments are essential, considering vulnerability data in a vacuum greatly limits your ability to prioritize your action plan in an effective way. Without the context of which vulnerabilities are the most severe, which are actively being targeted, which are on critical assets, etc, you may waste time checking things off the list without actually improving security. Join us for this session to learn how to integrate threat intelligence into your vulnerability management strategy.

Tags : alienvault, threat intelligence, vulnerability assessments, vulnerability data, security, it management, knowledge management
    
By: AlienVault     Published Date: Jul 14, 2014

Event logs provide valuable information to troubleshoot operational errors, and investigate potential security exposures. They are literally the bread crumbs of the IT world. As a result, a commonly-used approach is to collect logs from everything connected to the network "just in case" without thinking about what data is actually useful. But, as you're likely aware, the "collect everything" approach can actually make threat detection and incident response more difficult as you wade through massive amounts of irrelevant data. Join us for this session to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements.

Tags : alienvault, troubleshooting operational errors, potential security exposures, satisfy compliance requirements, security, it management, knowledge management
    
By: AlienVault     Published Date: Jul 14, 2014

Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources. In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.

Tags : alienvault, limited resources, it time management, it prioritization, it management, security
    
By: AlienVault     Published Date: Jul 14, 2014

If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. In this practical webinar, PCI DSS compliance experts walk through strategies for taking the pain out of PCI DSS reporting.

Tags : alienvault, pci dss reporting, pci dss compliance, it management, knowledge management
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.