IT Management White Papers

IT Management includes a variety of functions for managing computers in a networked environment, including software distribution, version control, backup & recovery, job scheduling, virus protection and performance and capacity planning.

Sub-Categories: Desktop Management, Employee Performance, ITIL, Productivity, Project Management, Sarbanes Oxley Compliance, Service Management, Software Compliance
Results 251 - 275 of 2754Sort Results By: Published Date | Title | Company Name
By: AlienVault     Published Date: Oct 21, 2014

Have you ever wondered how the bad guys actually get control of a system? And, how they convert that system into a data-syphoning droid? Join AlienVault security engineer, Tom D'Aquino as he walks you through the steps of a system compromise and how detect these nefarious activities at every stage. You'll learn: • How attackers exploit vulnerabilities to take control of systems • What they do next to find & exfiltrate valuable data • How to catch them before the damage is done with AlienVault USM Using a real-world example of a common vulnerability, Tom will show you how AlienVault USM gives you the evidence you need to stop an attack in its tracks.

Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
By: AlienVault     Published Date: Oct 21, 2014

In this webinar, we'll cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment so you can: • Detect threats (known and emerging) • Identify vulnerabilities • Accelerate incident response • Identify policy violations • Simplify compliance management Join AlienVault to learn tricks for achieving unified security visibility in the shortest amount of time.

Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
By: AlienVault     Published Date: Oct 21, 2014

The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.

Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
By: AlienVault     Published Date: Oct 21, 2014

If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. Join compliance experts from Terra Verde Services and AlienVault for this practical session on how to take the pain out of PCI DSS reporting. You'll learn: • The key reporting requirements of the PCI DSS standard • The security technologies you need to collect the required data • How AlienVault USM can generate these reports in minutes, not days • How to use your audit reports to improve security on an on-going basis

Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
By: AlienVault     Published Date: Oct 21, 2014

As cyber attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. Event monitoring and correlation technologies and security operations are often tied to incident handling responsibilities, but the number of attack variations is staggering, and many organizations are struggling to develop incident detection and response processes that work for different situations. In this webcast, we'll outline the most common types of events and indicators of compromise (IOCs) that naturally feed intelligent correlation rules, and walk through a number of different incident types based on these. We'll also outline the differences in response strategies that make the most sense depending on what types of incidents may be occurring. By building a smarter incident response playbook, you'll be better equipped to detect and respond more effectively in a number of scenarios.

Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
By: AlienVault     Published Date: Oct 21, 2014

While vulnerability assessments are an essential part of understanding your risk profile, it's simply not realistic to expect to eliminate all vulnerabilities from your environment. So, when your scan produces a long list of vulnerabilities, how do you prioritize which ones to remediate first? By data criticality? CVSS score? Asset value? Patch availability? Without understanding the context of the vulnerable systems on your network, you may waste time checking things off the list without really improving security. Join AlienVault for this session to learn: • The pros & cons of different types of vulnerability scans - passive, active, authenticated, unauthenticated • Vulnerability scores and how to interpret them • Best practices for prioritizing vulnerability remediation • How threat intelligence can help you pinpoint the vulnerabilities that matter most

Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
By: AlienVault     Published Date: Oct 21, 2014

AlienVault is on a mission to change how organizations detect & mitigate threats - affordably & simply. Our USM solution delivers complete security visibility in a fraction of the time of traditional SIEM. So, you can go from installation to insight in days, not months. Download the 2014 Gartner MQ for SIEM.

Tags : mitigate, threats, detect, affordability, solution, deliver, security, visibility
    
By: AlienVault     Published Date: Oct 21, 2014

AlienVault's USM is tailor-made for the needs of the security-savvy SMB. It offers affordability, and a comprehensive and ever-increasing feature set powered by the respectable "AV Labs and Open Threat Exchange.” In this analyst report, Javvad Malik of 451 Research, reviews AlienVault's SMB-focused approach to SIEM and discusses the competitive landscape.

Tags : security, operations, affordability, av labs, open threat, exchange, analyst, report
    
By: AlienVault     Published Date: Oct 21, 2014

The Public Services Network (PSN) is a programme intended to improve communication services across the UK government by reducing the cost and complexity of digital communication across the public sector. The PSN will create one logical network, based on industry standards, thus improving performance and security. The PSN is a replacement to the GSi (Government Secured Intranet), and all Public Sector agencies must migrate to the PSN by 31 October 2014. AlienVault’s Unified Security Management (USM) platform can provide you with the single solution you need to address many of the network- and security-related questions required to complete your PSN IA documentation.

Tags : communication, government, reducing cost, digital, network, public sector, logical, industry
    
By: ShoreTel     Published Date: Oct 20, 2014

This report details Forrester Research, Inc.’s recommendation for IT professionals building out a Unified Communications and Collaboration infrastructure within their business. The key to success of a UC deployment is delivering benefits to both users and business units. This report guides IT professionals through the key needs, drivers, and likely benefits of a UC deployment. The report also predicts and quantifies how a communications and collaboration infrastructure rollout can reduce overall IT cost, drive productivity, and improve collaboration across the firm. The report from Forrester covers: • Benefits of Unified Communications • How to define the business value of UC • How to identify and calculate all sources of hard-dollar Benefits of UC • Obstacles to UC adoption and tips on overcoming it

Tags : unified communications, benefits, business value, uc adoption, it management, telecom
    
By: ShoreTel     Published Date: Oct 20, 2014

This document offers an overview of the current top ten requirements to consider for a premise-based UC solution, with features called out as well as a ShoreTel case study.

Tags : unified communications, requirements, premise-based uc solution, buyers guide, it management, telecom
    
By: ShoreTel     Published Date: Oct 20, 2014

In today’s economy, flexibility and speed are essential to success. It’s no surprise that more companies are turning to VoIP phone systems to give them the freedom they need to grow and accommodate clients near and far. But, how do you know which VoIP provider is best for your business? To answer that question, first you must ask yourself if you want basic hosted VoIP or managed VoIP. Like the names sound, basic is a no-frills, DIY approach, while managed comes with all the latest features, including a team of experts to manage your system for you. To make the best choice for your business and budget, download the e-book "9 Things to Consider Before Choosing a Cloud Phone Provider.”

Tags : cloud provider, voip phone systems, voip providers, flexibility and speed, it management, telecom
    
By: ShoreTel     Published Date: Oct 20, 2014

Historically, IT investments were made simply in the interest of increasing competitiveness and with little insight into the hard, fact-based financial case. As organizations worldwide have been forced to tighten belts and slash budgets, management increasingly require financial evidence for sound IT purchases that fully align with business goals and strategies. This webinar defines and describes total cost of ownership - an important metric for assessing and tracking the risks, costs, and benefits of unified communications solutions. TCO breaks down the many factors used to present a solid business case. You'll learn how to develop a solid business case that: • Compares competing solutions on an equal footing • Aligns solutions with business needs • Provides a framework for establishing ongoing budgets • Offers the ability to audit the original business case

Tags : tco, communications, competing solutions, metrics, communication solutions, it management, telecom
    
By: IBM     Published Date: Oct 17, 2014

In this first-release MQ, Gartner evaluates providers on service delivery, B2B Network/Collaboration, Integration Functionality and success in capitalizing on vision. Rated against an extensive 15-criteria evaluation, IBM earned one of only three Leader positions, and outpaced the competition in "completeness of vision," signifying our strength in delivering the most competitive solution to the marketplace.

Tags : integration brokerage, service delivery, integration functionality, competitive solutions, it management, data management, best practices, business analytics
    
By: IBM     Published Date: Oct 14, 2014

Gives an insight into distributed denial of service (DDoS) attacks and defines a five-step process including preparation, mitigation, around-the-clock monitoring, response and intelligence to help address DDoS attacks.

Tags : ddos attacks, it security, ddos mitigation, security, it management, best practices, business activity monitoring, business analytics
    
By: IBM     Published Date: Oct 14, 2014

Security breaches can cost millions of dollars—but these days they’re virtually inevitable. Every organization needs a formal, documented Computer Security Incident Response Plan (CSIRP) and it needs to be kept up-to-date. In this executive brief, IBM shares the ten most common shortcomings of CSIPRs and how you can avoid these potentially costly mistakes. Read the executive brief to learn how IBM can help protect your organization from cyber threats and strengthen your IT security.

Tags : it security breach, csirp, cyber threats, security, it management, best practices, business activity monitoring
    
By: IBM     Published Date: Oct 14, 2014

Enterprises of all sizes must defend against online attackers. While security threats continue to evolve, organizations often lack the personnel and financial resources required to protect online systems. Read this service profile to learn how IBM Managed Security Services can help you protect your security investment while reducing the cost and complexity of your security operations. Find out how IBM combines industry-leading tools, technology and expertise with flexible, scalable packaging to meet a broad range of security solution requirements.

Tags : security operations, deployment, service delivery, problem management, security, it management, best practices, business activity monitoring
    
By: IBM     Published Date: Oct 14, 2014

Four technology trends—cloud computing, mobile technology, social collaboration and analytics—are shaping the business and converging on the data center. But few data center strategies are designed with the requisite flexibility, scalability or resiliency to meet the new demands. Read the white paper to learn how a good data center strategy can help you prepare for the rigors and unpredictability of emerging technologies. Find out how IBM’s predictive analytics are helping companies build more accurate, forward-looking data center strategies and how those strategies are leading to more agile, efficient and resilient infrastructures.

Tags : it trends, data center strategies, cloud computing, mobile technology, it management, data management, business intelligence
    
By: IBM     Published Date: Oct 14, 2014

Capitalizing on the transformative potential of private cloud requires leveraging the differentiators that will drive exponential value down the road. This IBM white paper discusses the core differentiators that drive transformative business value and to how best incorporate them into your environment, based on the latest research, technologies and solutions.

Tags : private cloud, business value, business agility, hybrid era, it management, knowledge management, business intelligence
    
By: IBM     Published Date: Oct 14, 2014

Flexible workplace forward thinkers are reporting productivity increases and cost decreases of 20% or more. Learn to achieve these benefits for your business by downloading the IBM executive report Achieving success with a flexible workplace: Forward thinkers’ best practices to enhance productivity, spur innovation and reduce costs. The report contains findings from a recent IBM survey covering user mobility, user support, collaboration and security.

Tags : flexible workplace, user mobility, user support, productivity management, it management, best practices, business analytics, business intelligence
    
By: IBM     Published Date: Oct 14, 2014

This white paper, based on original IBM research with analysis by IDC, offers a Mobile Infrastructure Maturity Model and documents the best practices and characteristics of organizations that are leaders.

Tags : mobile technology, it strategies, mobile infrastructure, it management, mobile data systems, best practices, business intelligence
    
By: IBM     Published Date: Oct 14, 2014

Building a mobile collaboration or bring-your-own-device solution requires three things: mobile applications, the mobile devices themselves and the network that underpins them both. Often, the network and its capabilities take a back seat to applications and devices—which can ultimately lead to poor performance or an inflexible infrastructure. Find out how to develop the type of network that truly supports mobile devices, applications and unified communications programs, thereby establishing the foundation for stronger mobile solutions.

Tags : mobile collaboration, mobile applications, mobile solutions, mobile infrastructure, it management, mobile data systems, application performance management, best practices
    
By: IBM     Published Date: Oct 14, 2014

If you're unhappy with the state of your current disaster recovery operations, this Q and A is a must-read. IBM cloud experts share information on how cloud computing can provide nearly instantaneous failover and failback of critical business applications. This type of speedy recovery keeps your organization running in the event of disaster or disruption, limiting the risk of business losses and brand damage.

Tags : disaster recovery operations, cloud technologies, cloud computing, critical business aplplications, it management, knowledge management, business analytics, business intelligence
    
By: IBM     Published Date: Oct 14, 2014

Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.

Tags : it risk management, it security, resilience investments, enhanced brand value, security, it management, best practices, business intelligence
    
By: IBM     Published Date: Oct 10, 2014

Forrester Research has just completed a Total Economic Impact study for a large financial services institution to quantify the actual return on investment for service virtualization. Read Forrester’s analysis to learn how service virtualization is eliminating testing bottlenecks and significantly reducing the cost of testing.

Tags : ibm, virtualization, service virtualization, service components, deploying service, team productivity, software quality, dependent services
    
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.