IT Management White Papers

IT Management includes a variety of functions for managing computers in a networked environment, including software distribution, version control, backup & recovery, job scheduling, virus protection and performance and capacity planning.

Sub-Categories: Desktop Management, Employee Performance, ITIL, Productivity, Project Management, Sarbanes Oxley Compliance, Service Management, Software Compliance
Results 251 - 275 of 3477Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Apr 09, 2015

This ebook outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe, and shows how IBM InfoSphere solutions can help protect data while giving your staff the right levels of access to do their jobs efficiently and accurately.

Tags : data security, ibm, ibm infosphere, privacy strategy, big data security, security, it management, knowledge management
    
By: IBM     Published Date: Apr 09, 2015

The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.

Tags : ibm, cloud, social business, big data, data security, data protection, privacy, security
    
By: IBM     Published Date: Apr 09, 2015

As The Business Becomes Digital, Security Must Become Data-Centric S&R leaders of enterprises undergoing a digital transformation will soon realize that in order to adequately ensure customer protection and enable a digital workforce, S&R pros must abandon traditional perimeter-based security and put the focus on the data by embracing Forrester’s Zero Trust Model.

Tags : data security, ibm, customer protection, digital workforce, zero trust model, security, it management, knowledge management
    
By: IBM     Published Date: Apr 09, 2015

A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and peformance.

Tags : data security, ibm, risk management, network security, security threat, networking, security, it management
    
By: IBM     Published Date: Apr 09, 2015

Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research highlights specific examples of the ways in which these converged security systems put today’s more advanced capabilities to work in practical application. The IBM Security Network Protection XGS 5000 is profiled as an example of this trend, delivering not only intelligence driven, application aware defense against a variety of threats, but also the extensibility required to equip today’s organizations to confront whatever may come tomorrow.

Tags : data security, ibm, converged network security, security risk, networking, security, it management, knowledge management
    
By: IBM     Published Date: Apr 09, 2015

Access the latest Gartner Magic Quadrant for Intrusion Prevention Systems to learn more about IBM's position and the latest developments in the market.

Tags : magic quadrant, ibm, intrusion prevention systems, security, security risk, data security, networking, it management
    
By: IBM     Published Date: Apr 09, 2015

This buyer’s guide can help you select the right identity and access management solution to successfully manage and control user access within, across and between organizations. The guide outlines the most common identity and access management challenges organizations face from the perspective of CSOs, IT operations staff, line-of-business managers and enterprise architects. It then provides a checklist for evaluating solutions and defines the capabilities required to address security complexity, compliance and cost.

Tags : access management solution, ibm, security risk, security compliance, networking, security, it management, knowledge management
    
By: IBM     Published Date: Apr 09, 2015

Managing user identities and user-access privileges is a cornerstone of effective security for organizations. It is vitally important to verify that only the right people can access protected resources and that their activities are sufficiently monitored. However, in order to effectively compete and meet customer expectations, organizations are increasing the number of users—including customers, employees, citizens, partners and suppliers—who are allowed to access information across the web, the cloud and federated environments. This trend makes identity and access management even more challenging and exposes organizations to many potential risks.

Tags : user identities, ibm, user access privileges, customer satisfaction, information access, cloud, security risks, networking
    
By: IBM     Published Date: Apr 09, 2015

IBM Security Privileged Identity Manager helps organizations to securely manage and track the activities of privileged users, thereby reducing the risk of breaches, improving compliance and ensuring accountability. The IBM white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

Tags : ibm, user access, enhanced security, security risk, networking, security, it management, knowledge management
    
By: IBM     Published Date: Apr 09, 2015

IBM Security, in partnership with the Center for Applied Insights, has launched the 2014 IBM CISO Assessment. Driven by the specter of external attacks and the needs of their own organizations, CISO's are continuing the shift toward a business leadership role that focuses on risk management and taking a more integrated and systemic approach.

Tags : ibm, risk management, security risk, security officer, data security, networking, security, it management
    
By: IBM     Published Date: Apr 09, 2015

Adopt cloud confidently with the IBM Dynamic Cloud Security Portfolio. A comprehensive set of capabilities that provide access management, data and application protection, and deep visibility.

Tags : cloud, cloud security, ibm, ibm dynamic cloud security portfolio, access management, data protection, application protection, visibility
    
By: IBM     Published Date: Apr 09, 2015

This white paper walks you through considerations for establishing a proactive, effective approach to cloud computing that is tailored to your organization - including re-evaluating how cloud computing can transform your business and utilizing cloud to gain strategic advantage.

Tags : ibm, cloud computing, strategic advantage, compliance, cloud ecosystem, business transformation, roadmap, best practices
    
By: IBM     Published Date: Apr 09, 2015

Although cloud is recognized as a technological change, its potential for driving business innovation remains untapped. Cloud computing can have an impact on operations, customer relationships and industry value chains. Read this executive report to discover how the cloud can open the door to more efficient, responsive and innovative ways of doing business.

Tags : ibm, cloud, efficiencies, innovation, midsize businesses, network access, business value, innovation
    
By: Basho     Published Date: Apr 07, 2015

Did you know that the total amount of data will reach 44 zettabytes by 2020 and that 80% of that data will be unstructured data? Are you ready for all of this unstructured data? More importantly, do you know how to turn it into a competitive advantage? Learn about the challenges that come with unstructured data and how to deal with those challenges in our latest publication “Meeting the Challenges of Unstructured Data” In this Whitepaper you’ll learn: What is driving the growth in unstructured data The challenges associated with managing unstructured data How companies are capitalizing on the opportunities that unstructured data presents to save money, time, and create new market opportunities

Tags : basho, unstructured data, competitive advantage, new market opportunities, managing unstructured data, it management, data management
    
By: Basho     Published Date: Apr 07, 2015

This whitepaper looks at why companies choose Riak over a relational database. We focus specifically on availability, scalability, and the key/value data model. Then we analyze the decision points that should be considered when choosing a non-relational solution and review data modeling, querying, and consistency guarantees. Finally, we end with simple patterns for building common applications in Riak using its key/value design, dealing with data conflicts that emerge in an eventually consistent system, and discuss multi-datacenter replication.

Tags : basho, riak, relational database, nosql, common applications, simple deployments, it management, data management
    
By: Basho     Published Date: Apr 07, 2015

bet365 is one of the world’s leading online gambling groups with over 14 million customers in two hundred countries. Recently, bet365 chose Riak, the NoSQL distributed database to ensure scalability and reliability for their site. Get a better understanding of how to choose the right database solution directly from Dan Macklin, Head of Research and Development at bet365. Join us for this On Demand webinar to learn about: • bet365's evaluation process • The business and technical challenges addressed • Triumphs achieved by migrating to Riak • Lessons learned and Dan Macklin's advice for anyyone evaluating their database requirements Download to watch this On-Demand webinar to learn why Riak chose bet365.

Tags : basho, riak, database infrastructure, bet365, unstructured data, it management, data management
    
By: IBM     Published Date: Apr 07, 2015

Businesses are transforming themselves to participate in the API economy. But how do you rapidly and securely expose your business to this developer ecosystem? Attend this webcast to find out how you can define and publish your APIs easily using the IBM API Management Service — the new SaaS solution from IBM. This cloud hosted service provides a complete set of capabilities to create, secure, manage, and socialize APIs to internal and external developer communities in the cloud, without incurring any IT infrastructure setup. Learn more from IBM's product team on how it will help enable companies to embrace the API economy and accelerate business transformation. Webcast attendees will learn about the following: •IBM API Management Service capabilities, features and benefits •Understanding different use cases of IBM API Management Service •Pricing models •How to get started using the API Management Service

Tags : ibm, business transformation, api management, develop, saas, it infrastructure, application, programming
    
By: IBM     Published Date: Apr 07, 2015

Today, the growth in the volume, variety, and availability of health data allows greater focus on individual wellness, as well as a way to provide care in a smarter way. In this webcast you will learn how the IBM Integration solution for healthcare can provide rapid connectivity, simplify IT infrastructure and drive enhanced patient care.

Tags : ibm, integration, connectivity, it infrastructure, healthcare providers, clinical applications, business applications, application integration
    
By: IBM     Published Date: Apr 07, 2015

Future proof your investment with IBM WebSphere - Your gateway to cloud, mobile and Internet of Things.

Tags : ibm, websphere, cloud, mobile, analytics, iot, tibco, migrate
    
By: IBM     Published Date: Apr 07, 2015

You may be considering the move to a SaaS model for several reasons: it's cheaper, easier, more flexible. But then reality sets in. You can't afford to move to SaaS right away. Many of your apps are too mission-critical to trust SaaS at this point, and security restrictions and company guidelines will not allow you to use SaaS for many apps. However, for some apps, it's not an issue, and that number continues to grow. So how do you reconcile? Enter stage left-- Hybrid APM. With the ability to pick and choose between SaaS or on-premises monitoring for your different applications and components, wherever they reside, your troubles are alleviated and the shift towards SaaS can be seamless.

Tags : ibm, saas, mission-critical, security, apps, growth, apm, cloud
    
By: IBM     Published Date: Apr 07, 2015

Learn how to understand, manage and debug problems due to size, complexity and scale in operation of virtualized networks for modern data centers, including developer- and user-controlled software in clouds.

Tags : ibm, scale, data center, software, cloud, debug, complex, virtualized networks
    
By: Raritan     Published Date: Apr 07, 2015

Data Center Infrastructure Management (DCIM) has evolved to guide the management of data center assets, their environment, and overall operations. In this paper, we discuss how Raritan’s DCIM software can be integrated with existing ITSM software to increase efficiency and reliability.

Tags : raritan, raritan dcim, it service management, itsm, data center, infrastructure, internetworking hardware, server hardware
    
By: IBM     Published Date: Apr 06, 2015

Mobile capture is quickly becoming an important differentiator for many companies and organizations, especially those in traditionally document-intensive fields like banking, insurance, healthcare and government operations. According to a 2014 study conducted by AIIM, 45% of companies feel that mobile capture is vitally important, pointing to the competitive need for improved process agility and customer service across the board.Discover the top 10 questions to ask before you make your investment in mobile capture.

Tags : mobile capture, customer service, ibm, banking, insurance, healthcare, government, it management
    
By: IBM     Published Date: Apr 06, 2015

Read this report from AIIM to discover what issues on-premise ECM users are facing, how external collaboration support is managed, what cloud and mobile functionalities users are requesting, and what alternative scenarios are being considered.

Tags : ecm, ibm, external collaboration support, cloud, mobile, security, software development, it management
    
By: IBM     Published Date: Apr 06, 2015

MWD Advisors report on how Case Management technology can help drive effective outcomes & how a clear Content Management strategy underpins success in Case Management.

Tags : content management, case management, ibm, data, service fulfillment, security, it management, knowledge management
    
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.