IT Management White Papers

IT Management includes a variety of functions for managing computers in a networked environment, including software distribution, version control, backup & recovery, job scheduling, virus protection and performance and capacity planning.

Sub-Categories: Desktop Management, Employee Performance, ITIL, Productivity, Project Management, Sarbanes Oxley Compliance, Service Management, Software Compliance
Results 251 - 275 of 2702Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Sep 15, 2014

This white paper highlights how a real world FIS client’s utilization of IBM FlashSystem together with the FIS Profile® banking solution1 yielded dramatic performance improvements, truly accelerating the pace of global banking. This client has been an FIS outsourcing client for 14+ years and counting.

Tags : global banking, banking solutions, fis outsourcing, banking information technology, flash technology, business activity monitoring, business analytics, business process automation
    
By: Cisco     Published Date: Sep 12, 2014

Adversaries spend 100 percent of their time finding weak links and using them to their advantage. And as the Internet of Things accelerates and our dependence on the connected environment continues to expand, so do opportunities for attackers. Download the Cisco 2014 Midyear Security Report to learn about the different types of vulnerabilities that exist in the systems we rely upon, including the Internet itself, and what can be done to reduce their number and impact.

Tags : adversaries, weak, link, internet, dependence, connected, environment, attackers
    
By: Bit9     Published Date: Sep 11, 2014

Enterprises are entering into a continuous state of compromise, and within this volatile risk market, consequences for organizations that fail to meet their regulatory security guidelines are feeling the pain all the way up the corporate ladder. Within this environment, traditional security controls are no longer sufficient to fully protect your organization. Therefore, IT risk and audit professionals need to understand that simply meeting compliance controls does not equal complete security coverage. By neglecting to pay attention to emerging advanced threat protection solutions and capabilities, a compliant company can still be a vulnerable one. Join Christopher Strand, senior director of compliance at Bit9 + Carbon Black, to understand: • The risks and liability organizations and auditors face by not going beyond compliance • How to meet and exceed compliance standards with emerging security controls • Evaluating emerging security controls within the IT audit process

Tags : bit9, pci, dss, security gaps, endpoint monitoring, compliance, security, servers
    
By: GENBAND     Published Date: Sep 11, 2014

GENBAND’s NUViA™ voicemail solution changes the economics of acquiring and managing voicemail. Eliminate end of life platforms that are expensive to maintain while adding new mobility services that make users more productive. Integrates with your existing PBXs or IP-PBXs.

Tags : voicemail, solution, managing, economics, platforms, pbx, mobility, messaging
    
By: Riverbed     Published Date: Sep 05, 2014

Nobody can afford to lose data. But managing the backup and recovery of data and services in far-flung locations can present many logistical and technology challenges that add complexity, expense, and risk. A new branch converged infrastructure approach allows IT to project virtual servers and data to the edge, providing for local access and performance while data is actually stored in centralized data centers. IT can now protect data centrally and restore branch operations in a matter of minutes versus days.

Tags : branch office, data services, data recovery, centralized data centers, it management
    
By: Riverbed     Published Date: Sep 05, 2014

Many organizations have invested in server consolidation, particularly in their data centers. In remote offices, though, servers and storage exist as isolated islands of infrastructure that require management through separate operational processes and procedures. This approach could place data at risk. A new kind of storage architecture allows IT to consolidate remote servers and data in the data center by decoupling storage from its server over any distance—even thousands of miles—and still get the same performance as if the storage remained local to the branch. Organizations can now consolidate remote infrastructure to increase security and ef?ciency, without adversely impacting end-user performance in branch of?ces.

Tags : consolidation, servers, remote, storage, isolated islands, efficiency, security, networking
    
By: Riverbed     Published Date: Sep 05, 2014

The branch office has long been a critical dilemma for the IT organization. Branch offices for many organizations are a critical point of productivity and revenue generation, yet the branch has always come with a tremendous amount of operational overhead and risk. Worse yet, challenges are often exacerbated because the branch office too often looks like a carryover of outdated IT practices.

Tags : convergence, branch office, tco, transforming, operational overhead, it practices, networking, it management
    
By: Sourcefire, LLC     Published Date: Sep 04, 2014

Not everyone loves a good story. Shocking media reports about intentionally-leaked classified information have commanded the public’s attention in recent years, but they are certainly not entertaining to those of us responsible for safeguarding the data. Clearly we can do more to better protect our nation’s federal agencies and classified information. What’s needed is a threat-centric approach to security that lets agencies and department leaders tackle the most pressing issues first with superior visibility, continuous control, and advanced threat protection – to defend against both insider and external threats.

Tags : sourcefire, network security, cisco, security report, cyber attack, malware, outdated software, cybersecurity
    
By: Sourcefire, LLC     Published Date: Sep 04, 2014

Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major loss and disruption to organizations and national infrastructure. These advanced attacks are very difficult to detect, remain in networks for long periods of time, and amass network resources to launch attacks elsewhere. Traditional methods that rely exclusively on detection and blocking for protection are no longer adequate. It’s time for a new security model that addresses the full attack continuum – before, during, and after an attack.

Tags : sourcefire, cisco, security report, cyber attack, malware, outdated software, cybersecurity, breaches
    
By: Sourcefire, LLC     Published Date: Sep 04, 2014

This Advanced Endpoint and Server Protection paper will dig into protecting devices against advanced attackers. We will highlight a number of new alternatives for preventing and detecting advanced malware, and examine new techniques and tools to investigate attacks and search for indicators of compromise within your environment.

Tags : securosis, sourcefire, cisco, endpoint protection, server protection, attack protection, advanced attacks, security
    
By: Sourcefire, LLC     Published Date: Sep 04, 2014

Making threat protection more intelligent and more accurate

Tags : network security, sourcefire, cisco, security report, cyber attack, malware, outdated software, cybersecurity
    
By: Sourcefire, LLC     Published Date: Sep 04, 2014

The goal of this paper is to give security managers information to facilitate focusing their investments on the areas that are mostly likely to impact their organizations and customers over the next several years.

Tags : cisco, network security, sourcefire, security report, cyber attack, malware, outdated software, cybersecurity
    
By: Verizon     Published Date: Sep 04, 2014

Enterprises view the cloud as a fundamental way to streamline business processes and increase productivity. Take a closer look at stats and facts that demonstrate the connection between the use of cloud computing, increased agility, and competitive advantages in business. View highlights of a new Verizon sponsored report from Harvard Business Review that reveals significant insights into cloud's mainstream adoption.

Tags : cloud, business processes, cloud computing, verizon, harvard business review, increased agility, it management, data center
    
By: Verizon     Published Date: Sep 04, 2014

A report from Harvard Business Review Analytic Services has revealed a connection between the use of cloud computing and increased business agility and competitive advantage. Read this report to learn for yourself how those companies that aggresively adopt cloud computing are seeing returns via increased business agility, and decreased business complexity. Senior Vice President of Verizon Cloud, Data Center and Connected Solutions, SIki Giunta, introduces this compelling research and offers this message: not all clouds are created equal.

Tags : cloud computing, verizon cloud, private cloud, infrastructure as a service, hybrid cloud, cloud based software, business agility, could computing value proposition
    
By: Verizon     Published Date: Sep 04, 2014

Once considered a passing trend—and even famously referred to as “complete gibberish” by one Fortune 50 CEO—the cloud has certainly come a long way. Today, it’s fundamental to the way you do business, helping reduce operational complexity, securely expand IT infrastructure, and enable business agility. There’s no denying it: The cloud is here to stay.

Tags : verizon, cloud computing, business agility, competitive advantages, evolution of the cloud, it infrastructure, it management, data center
    
By: CradlePoint     Published Date: Sep 04, 2014

In this white paper, learn how PCI-DSS 3.0 effects how you deploy and maintain PCI compliant networks using CradlePoint solutions. Properly configure, monitor, and maintain your CradlePoint devices to meet the requirements of PCI DSS 3.0. Enabling features include network segmentation (ethernet ports, SSIDs, and VLANs), stateful firewall, MAC/IP/URL filtering, authentication/encryption, event logging, event alerts, time synchronization, and configuration/upgrade management from CradlePoint Enterprise Cloud Manager.

Tags : cradlepoint enterprise cloud manager, pci dss 3.0, pci compliance, stateful firewall, mac/ip/url filtering, authentication/encryption, event logging, event alerts
    
By: Soonr     Published Date: Sep 03, 2014

Download this guide for a critical look at 6 EFSS products - Accellion, Anchor/eFolder, Citrix Sharefile, Google Drive, Microsoft OneDrive and Soonr Workplace. In each of the first five, you'll discover 10 reasons why they are not well-suited for business. Then see how Soonr Workplace delivers mobile file sharing and collaboration in an enterprise-grade solution.

Tags : soonr, file sharing, mobile file sharing, file synchronisation, mobile collaboration, file storage, cloud file sharing, hybrid cloud
    
By: IBM     Published Date: Sep 02, 2014

In this short e-book, learn the top ten ways that IBM Platform Computing customers are using technologies like IBM Platform LSF and IBM Platform Symphony to help obtain results faster, share resources more efficiently, and improve the overall cost-effectiveness of their global IT infrastructure.

Tags : ibm, cloud computing, infrastructure, roi, it spending, it costs, it budget, distributed computing
    
By: IBM     Published Date: Aug 28, 2014

Data volumes are getting out of control, but choosing the right information lifecycle governance solution can be a huge challenge, with multiple stakeholders, numerous business processes, and extensive solution requirements. Use this requirements kit from the Compliance, Governance and Oversight Council (CGOC) to find the tools and technology you need.

Tags : ilg, data volumes, cgoc, information economics, it management, business intelligence, configuration management, service oriented architecture
    
By: Micro Focus     Published Date: Aug 28, 2014

Enabling technologies to streamline regulatory and legislative changes.

Tags : it compliance programs, risk management, it management, data management, compliance
    
By: Micro Focus     Published Date: Aug 28, 2014

Micro Focus commissioned fresh research to re-examine attitudes towards core IT systems and discover whether blue sky thinking is delivering real-world solutions. The conclusions may surprise you

Tags : core it systems, it debt, mainframe, it management, cloud computing
    
By: Micro Focus     Published Date: Aug 28, 2014

This white paper examines key approaches to application modernization and evolution for certain IBM mainframe applications with long life spans. It discusses the challenges of legacy applications and the available modernization approaches to handle these challenges. The paper also analyzes in some depth specific approaches that keep application logic largely intact or allow it to evolve incrementally and productively.

Tags : application modernization, mainframe applications, legacy applications, software development, it management, knowledge management, database development
    
By: IBM     Published Date: Aug 28, 2014

The Editor interviews Deidre Paknad, Vice President of IBM’s Information Lifecycle Governance (ILG) Solutions Business, former CEO of PSS Systems, and founder of the Compliance, Governance and Oversight Council (CGOC).

Tags : information economics, ilg, data disposal, e-discovery, storage management, records management, productivity, data warehousing
    
By: IBM     Published Date: Aug 28, 2014

Equipping IT with the resources that they need to optimize the user experience to match that of consumer applications can help you achieve the business outcomes you want, while making the most of your enterprise content management (ECM) investments.

Tags : user experience, ecm, consumer applications, business analytics, content management system, productivity, project management
    
By: Micro Focus     Published Date: Aug 28, 2014

Micro Focus tackles today’s major IT challenges head on for a faster delivery of value back to the business.

Tags : it challenges, core applications, it innovation, it complexity, enterprise applications, productivity, software compliance
    
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.