IT Management White Papers

IT Management includes a variety of functions for managing computers in a networked environment, including software distribution, version control, backup & recovery, job scheduling, virus protection and performance and capacity planning.

Sub-Categories: Desktop Management, Employee Performance, ITIL, Productivity, Project Management, Sarbanes Oxley Compliance, Service Management, Software Compliance
Results 251 - 275 of 2835Sort Results By: Published Date | Title | Company Name
By: ForgeRock     Published Date: Oct 24, 2014

Identity is a fundamental requirement to digital growth. Businesses and organizations cannot properly take advantage of mobile, cloud, or Internet of Things (IoT) technologies without a scalable and repeatable identity strategy. Without it, they have no way to identify and engage with their customers in a meaningful way — whether it be through a laptop, mobile phone, tablet, connected car, healthcare wearable, connected home device or the next great connected innovation. This guide is designed to help you understand the essentials of customer-focused identity and how it helps you engage with your customers.

Tags : revenue generator, digital growth, identity management, customer-focused, it management, enterprise applications
    
By: Red Hat     Published Date: Oct 23, 2014

The business case for standardizing on Red Hat infrastructure solutions Read this IDC whitepaper to discover the quantifiable business benefits that standardizing on Red Hat® infrastructure has delivered organizations like yours. You'll learn how customers using Red Hat Enterprise Linux® and Red Hat's system management product, Red Hat Satellite: • Quickly recover up-front subscription costs. • Experience higher ratios of servers and users per administrator. • Significantly reduce annual downtime.

Tags : quantifiable benefits, infrastructure, management product, higher ratios, reduce annual downtime, networking, it management, enterprise applications
    
By: BMC Software     Published Date: Oct 23, 2014

Rapid shifts in the ways that technology and information are consumed and delivered— through cloud computing, big data, social networking, and smart devices—are transforming how companies compete. IT is at the center of the fray, working with business leaders to develop and execute a digital transformation strategy that capitalizes on these major new technologies. In order to lead this transformation, IT executives must focus on three areas: collaborating with business leaders to build a strategic vision, modernizing technology infrastructure, and rebuilding IT organizations to execute against new digital business goals.

Tags : saas, cloud, itsm, integrating itsm, itsm integration, saas integration, networking, it management
    
By: BMC Software     Published Date: Oct 23, 2014

In a first-of-its-kind study, IDC has docu­mented the costs of business risks cre­ated when business and IT teams fail to communicate effectively. Hear how enterprises are addressing the friction associated with IT needs and the gaps and opportunities that exist between business needs and IT service delivery models.

Tags : costs and risks, communication, enterprises, it service delivery models, it management, enterprise applications
    
By: BMC Software     Published Date: Oct 23, 2014

To better support the business, I&O managers often turn to IT service support management (ITSSM) tools. ITSSM tools enable IT operations organizations, specifically infrastructure and operations (I&O) managers, to better support the production environment. ITSSM tools automate the tasks and workflows associated with the management and delivery of quality IT services to the business. The vendors in this Magic Quadrant offer integrated products that address functionality from a combined perspective of people, processes and tooling. BMC was rated as a leader by Gartner in the Magic Quadrant.

Tags : saas, cloud, itsm, integrating itsm, itsm integration, saas integration, it management
    
By: BMC Software     Published Date: Oct 23, 2014

Gartner clients often ask for a comparison of BMC and ServiceNow as viable strategic partners in the ITSSM tool space. Both vendors provide strong ITSSM offerings and benefit from excellent global brand recognition, but the similarities end there. Outside of ITSSM, BMC and ServiceNow are two different companies with two different strategic road maps. Choosing between BMC and ServiceNow requires IT organizations to determine how value will be gained beyond the use of their ITSSM offerings.

Tags : itssm, strategic partners, it organizations, itsm integration, saas, networking, it management, enterprise applications
    
By: Lenovo     Published Date: Oct 23, 2014

Looking for smarter solutions for anywhere agency productivity? Watch webNetwork for Government and learn how webNetwork Unified Workspaces are the right choice for secure, reliable, mission-ready mobility. No more worries about balancing competing priorities around access, accountability, and cost - webNetwork makes IT management easy with simple deployment and a superb end-user experience.

Tags : webnetwork, byod, webnetwork unified workspaces, it management, cloud-powered solutions, vdi or cloud
    
By: xMatters     Published Date: Oct 23, 2014

In many organizations, the IT team ushered in the first generation of primitive mobility, issuing pagers to on-call teams and guardians of key corporate systems. And while today, the vast majority of our pagers have been upgraded to smart phones and intelligent devices, many of them are used for little more than prompting us to log into a desktop system or dial a phone. This paper outlines six strategies for extending mobile devices beyond notification to workflows and robust productivity tools within your IT organization.

Tags : mobile, generation, mobility, on-call, team, corporate system, pagers, smart phones
    
By: CA Technologies     Published Date: Oct 22, 2014

This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.

Tags : service desks, service management platforms, service desk solutions, failing service desks, saas, it management, mobile computing, mobile data systems
    
By: Zerto     Published Date: Oct 22, 2014

A simpler approach to DR! Compare hypervisor-based replication to guest/OS-based and array-based replication. Read about Zerto’s easy integration with VMware.

Tags : zerto, vmware, virtualization, data center, virtual replication, replication, business continuity, disaster recovery
    
By: CA Technologies     Published Date: Oct 22, 2014

A buyer's guide for executives.

Tags : it service management solutions, itsm, service management
    
By: CA Technologies     Published Date: Oct 22, 2014

How CA Cloud Service Management Speeds Deployment and Time to Value.

Tags : cloud service management, speed up deployment, ca cloud service management, accelerate time to value, service management, cloud computing
    
By: CA Technologies     Published Date: Oct 22, 2014

A buyer's guide for executives.

Tags : it service management solutions, itsm, service management
    
By: CA Technologies     Published Date: Oct 22, 2014

A buyer's guide for executives.

Tags : it service management solutions, itsm, service management
    
By: CA Technologies     Published Date: Oct 22, 2014

How CA Cloud Service Management Speeds Deployment and Time to Value.

Tags : cloud service management, speed up deployment, ca cloud service management, accelerate time to value, web service management, service management, cloud computing
    
By: CA Technologies     Published Date: Oct 22, 2014

How CA Cloud Service Management Speeds Deployment and Time to Value.

Tags : cloud service management, speed up deployment, ca cloud service management, accelerate time to value, web service security, web service management, service management, cloud computing
    
By: CA Technologies     Published Date: Oct 22, 2014

How CA Cloud Service Management Speeds Deployment and Time to Value.

Tags : cloud service management, speed up deployment, ca cloud service management, accelerate time to value, web services, web service management, service management, cloud computing
    
By: AlienVault     Published Date: Oct 21, 2014

While vulnerability assessments are essential, considering vulnerability data in a vacuum greatly limits your ability to prioritize your action plan in an effective way. Without the context of which vulnerabilities are the most severe, which are actively being targeted, which are on critical assets, etc, you may waste time checking things off the list without actually improving security. Join us for this session to learn how to integrate threat intelligence into your vulnerability management strategy.

Tags : alienvault, threat intelligence, vulnerability assessments, vulnerability data, security, it management, knowledge management
    
By: AlienVault     Published Date: Oct 21, 2014

Event logs provide valuable information to troubleshoot operational errors, and investigate potential security exposures. They are literally the bread crumbs of the IT world. As a result, a commonly-used approach is to collect logs from everything connected to the network "just in case" without thinking about what data is actually useful. But, as you're likely aware, the "collect everything" approach can actually make threat detection and incident response more difficult as you wade through massive amounts of irrelevant data. Join us for this session to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements.

Tags : alienvault, troubleshooting operational errors, potential security exposures, satisfy compliance requirements, security, it management, knowledge management
    
By: AlienVault     Published Date: Oct 21, 2014

Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources. In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.

Tags : alienvault, limited resources, it time management, it prioritization, it management, security
    
By: AlienVault     Published Date: Oct 21, 2014

If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. In this practical webinar, PCI DSS compliance experts walk through strategies for taking the pain out of PCI DSS reporting.

Tags : alienvault, pci dss reporting, pci dss compliance, it management, knowledge management
    
By: AlienVault     Published Date: Oct 21, 2014

When dealing with ransomware threats like CryptoWall, which encrypt your data and demand payment to unlock it, spotting infections quickly is critical in order to limit the damage. AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the command and control server. Watch this demo on-demand to see how AlienVault USM detects these threats quickly, saving you valuable clean-up time and limiting the damage from the attack.

Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
By: AlienVault     Published Date: Oct 21, 2014

Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. These can be very difficult to detect since they happen as users are going about their normal business. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM. You'll learn: • Common browser vulnerabilities used to execute these attacks • What attackers do next to take control of the system • How to catch it before the attacker moves further into your network

Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
By: AlienVault     Published Date: Oct 21, 2014

Have you ever wondered how the bad guys actually get control of a system? And, how they convert that system into a data-syphoning droid? Join AlienVault security engineer, Tom D'Aquino as he walks you through the steps of a system compromise and how detect these nefarious activities at every stage. You'll learn: • How attackers exploit vulnerabilities to take control of systems • What they do next to find & exfiltrate valuable data • How to catch them before the damage is done with AlienVault USM Using a real-world example of a common vulnerability, Tom will show you how AlienVault USM gives you the evidence you need to stop an attack in its tracks.

Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
By: AlienVault     Published Date: Oct 21, 2014

In this webinar, we'll cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment so you can: • Detect threats (known and emerging) • Identify vulnerabilities • Accelerate incident response • Identify policy violations • Simplify compliance management Join AlienVault to learn tricks for achieving unified security visibility in the shortest amount of time.

Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.