IT Management White Papers

IT Management includes a variety of functions for managing computers in a networked environment, including software distribution, version control, backup & recovery, job scheduling, virus protection and performance and capacity planning.

Sub-Categories: Desktop Management, Employee Performance, ITIL, Productivity, Project Management, Sarbanes Oxley Compliance, Service Management, Software Compliance
Results 251 - 275 of 2541Sort Results By: Published Date | Title | Company Name
By: Network Instruments     Published Date: Jun 30, 2014

Look at the Graph, Find the Code and Boom – You’re Solving Problems. Identifying and understanding common HTTP status codes can go a long way in troubleshooting complex web application issues.

Tags : network instruments, http, troubleshooting, http status codes, web applications, it management, enterprise applications
    
By: Code 42     Published Date: Jun 30, 2014

When evaluating endpoint backup options, organizations need to look for solutions that back up important data quickly, reliably and efficiently and without adding unnecessary burden to overtaxed and understaffed IT departments.

Tags : codefourtytwo software, code 42, endpoint backup, data protection, it management, enterprise applications
    
By: Foxit     Published Date: Jun 30, 2014

This whitepaper explains how Foxit is helping organizations standardize a PDF vendor which enhances user productivity and improves procurement efficiency.

Tags : foxit, pdf, pdf vendor, mobile pdf, file sharing, records management, rights management, pdf reader
    
By: CA Technologies     Published Date: Jun 27, 2014

Ce livre blanc explique pourquoi les plates-formes d’automatisation de la mise en production et du déploiement des applications deviennent toujours plus essentielles pour les départements IT dans les multinationales. Il analyse les exigences spécifiques auxquelles une plate-forme de ce type doit satisfaire afin d’être efficace et de générer un retour sur investissement important.

Tags : application release, software development, application integration, application performance management, performance testing, project management
    
By: IBM     Published Date: Jun 26, 2014

Cyber attacks are growing every day and become serious threats to your organization, but how do you know and understand the threats out there? Download a copy of this book, and you discover the zero-day exploits and threats used to compromise your enterprise. You also learn about a promising new technology developed by Trusteer, an IBM company, which provides effective yet transparent protection to enterprise endpoints. Start reading Stopping Zero-Day Exploits For Dummies, Trusteer Special Edition, today!

Tags : ibm, security, cyber security, cybercrime, cybercriminals, malware, network security, it management
    
By: DocuSign     Published Date: Jun 25, 2014

Agile development cycles churn out new releases of disruptive technologies as often as every quarter, making the high-tech industry one of unpredictable product cycles and rapid growth. Success in the unpredictable high-tech industry demands improving profitability while regulating costs.

Tags : docusign, high-tech, esignatures, technologies, rapid growth, speed, expand globally, it management
    
By: Sourcefire, LLC     Published Date: Jun 23, 2014

In this report, Cisco offers data on and insights into top security concerns, such as shifts in malware, trends in vulnerabilities, and the resurgence of distributed denial-ofservice (DDoS) attacks. The report also looks at campaigns that target specific organizations, groups, and industries, and the growing sophistication of those who attempt to steal sensitive information. The report concludes with recommendations for examining security models holistically and gaining visibility across the entire attack continuum—before, during, and after an attack.

Tags : sourcefire, cisco, data, security concerns, ddos, malware, attacks, threats
    
By: Sourcefire, LLC     Published Date: Jun 23, 2014

Download this white paper to learn the results of an independent study testing Sourcefire's Advanced Malware Protection conducted by NSS labs.

Tags : sourcefire, breach detection, malware, protection, nss labs, data breaches, threats, attacks
    
By: Sourcefire, LLC     Published Date: Jun 23, 2014

Today, targeted, advanced malware and sophisticated attacks are relentless as they compromise environments using new and stealthy techniques. Once again, Sourcefire is changing the way we must think about security, building on our continuous capability and introducing a new model for the way we need to combat these attacks.

Tags : sourcefire, breach detection, malware, protection, data breaches, threats, attacks, threat detection
    
By: Sourcefire, LLC     Published Date: Jun 23, 2014

This report begins by analyzing the relevant changes in those areas and then derives four key technology trends that will cause the most impact on cybersecurity programs.

Tags : sourcefire, breach detection, malware, protection, nss labs, data breaches, threats, attacks
    
By: Sourcefire, LLC     Published Date: Jun 23, 2014

Control networks and industrial control systems manage the generation and delivery of electricity, automate production lines, control environmental systems in large commercial buildings and hospitals and manage many other vital processes much of which is considered critical infrastructure. They also face a unique set of complications when it comes to cyber security.

Tags : sourcefire, breach detection, malware, protection, data breaches, threats, attacks, threat detection
    
By: Sourcefire, LLC     Published Date: Jun 23, 2014

Gartner issued its latest “Magic Quadrant for Intrusion Prevention Systems” and the leading industry analyst firm has placed Sourcefire in the Leaders' Quadrant. Download to learn more!

Tags : sourcefire, breach detection, malware, protection, data breaches, threats, attacks, threat detection
    
By: Sourcefire, LLC     Published Date: Jun 23, 2014

Not everyone loves a good story. Shocking media reports about intentionally-leaked classified information have commanded the public’s attention in recent years, but they are certainly not entertaining to those of us responsible for safeguarding the data. Clearly we can do more to better protect our nation’s federal agencies and classified information. What’s needed is a threat-centric approach to security that lets agencies and department leaders tackle the most pressing issues first with superior visibility, continuous control, and advanced threat protection – to defend against both insider and external threats.

Tags : sourcefire, breach detection, malware, protection, data breaches, threats, attacks, threat detection
    
By: Sourcefire, LLC     Published Date: Jun 23, 2014

This Next-Generation Network Security Buyer’s Criteria will provide an in-depth explanation of the factors that drive organizations to look at next-generation solutions. It offers an analysis of the key capabilities you should look for (and demand) from your network security gear, and will arm you with the information you need to be an educated buyer, ensuring you get what you need and not just a set of future capabilities packaged in a marketecture that you can’t deploy.

Tags : sourcefire, breach detection, malware, protection, data breaches, threats, attacks, threat detection
    
By: Sourcefire, LLC     Published Date: Jun 23, 2014

Virtualization brings significant business benefits. It is capable of reducing costs, enabling rapid deployment, improving system availability and leveraging cloud architectures. Yet implementing virtualization has also introduced potential security risks. The process creates blind spots where there is greater potential for misconfiguration than in physical networks. And virtual infrastructure consolidates functions, such as networking or security, that were previously managed by other groups. This further increases the risk for misconfiguration. Taking advantage of these vulnerabilities, attackers are targeting threats at virtualized systems.

Tags : sourcefire, breach detection, malware, protection, data breaches, threats, attacks, threat detection
    
By: Alert Logic and Rackspace     Published Date: Jun 20, 2014

To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts,risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.

Tags : alert logic, rackspace, pci, pci dss, payment security, compliance, cloud pci, security
    
By: Alert Logic and Rackspace     Published Date: Jun 20, 2014

Defending against application security threats is an ongoing battle. With new threats emerging every day, this whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.

Tags : alert logic, rackspace, pci, pci dss, payment security, compliance, vulnerability life cycle, security
    
By: Alert Logic and Rackspace     Published Date: Jun 20, 2014

To comply with today’s government and industry mandates, such as PCI, Sarbanes-Oxley, HIPAA and GLBA, log data must be collected, regularly reviewed and archived. In addition, regular analysis and forensics can also be performed on the same log data to enhance overall security and availability. This paper discusses the challenges associated with effective log management and enables you to better define best practices and requirements for log management projects, as well as log management and review solutions.

Tags : alert logic, rackspace, log management, automated log management, pci, hipaa, glba, log data
    
By: Alert Logic and Rackspace     Published Date: Jun 20, 2014

With large data breaches affecting retailers in 2013 and the PCI DSS 3.0 January 1, 2015 deadline approaching, the Payment Card Industry Data Security Standard (PCI DSS) is an important topic for many organizations in 2014. PCI DSS requirements can be challenging to meet from a time, resources and cost perspective. Requirements 6, 10 and 11 can be some of the most costly and resource intensive, requiring log management, vulnerability assessment, intrusion detection and a web application firewall. Alert Logic delivers solutions to meet these and other PCI DSS requirements. As the security industry’s only provider of on-demand log management, threat management, web application security, and IT compliance automation solutions, Alert Logic provides organizations with the easiest and most affordable way to secure their networks and comply with policies and regulations.

Tags : alert logic, rackspace, pci, dss, data breaches, log management, it compliance, automation solutions
    
By: Alert Logic and Rackspace     Published Date: Jun 20, 2014

A new version of the PCI DSS standard was released in January of this year, containing some new and updated requirements. This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the new standard.

Tags : alert logic, rackspace, pci, dss, compliance, security, it management
    
By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014

To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts, risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.

Tags : alert logic, sungard, pci, pci dss, payment security, compliance, cloud pci, security
    
By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014

Defending against application security threats is an ongoing battle. With new threats emerging every day, this whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.

Tags : alert logic, sungard, pci, pci dss, payment security, compliance, vulnerability life cycle, security
    
By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014

To comply with today’s government and industry mandates, such as PCI, Sarbanes-Oxley, HIPAA and GLBA, log data must be collected, regularly reviewed and archived. In addition, regular analysis and forensics can also be performed on the same log data to enhance overall security and availability. This paper discusses the challenges associated with effective log management and enables you to better define best practices and requirements for log management projects, as well as log management and review solutions.

Tags : alert logic, sungard, log management, automated log management, pci, hipaa, glba, log data
    
By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014

With large data breaches affecting retailers in 2013 and the PCI DSS 3.0 January 1, 2015 deadline approaching, the Payment Card Industry Data Security Standard (PCI DSS) is an important topic for many organizations in 2014. PCI DSS requirements can be challenging to meet from a time, resources and cost perspective. Requirements 6, 10 and 11 can be some of the most costly and resource intensive, requiring log management, vulnerability assessment, intrusion detection and a web application firewall. Alert Logic delivers solutions to meet these and other PCI DSS requirements. As the security industry’s only provider of on-demand log management, threat management, web application security, and IT compliance automation solutions, Alert Logic provides organizations with the easiest and most affordable way to secure their networks and comply with policies and regulations.

Tags : alert logic, sungard, pci, dss, data breaches, log management, it compliance, automation solutions
    
By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014

A new version of the PCI DSS standard was released in January of this year, containing some new and updated requirements. This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the new standard.

Tags : alert logic, sungard, pci, dss, compliance, security, it management
    
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.