IT Management White Papers

IT Management includes a variety of functions for managing computers in a networked environment, including software distribution, version control, backup & recovery, job scheduling, virus protection and performance and capacity planning.

Sub-Categories: Desktop Management, Employee Performance, ITIL, Productivity, Project Management, Sarbanes Oxley Compliance, Service Management, Software Compliance
Results 251 - 275 of 2558Sort Results By: Published Date | Title | Company Name
By: MobileIron     Published Date: Jul 03, 2014

Every year Gartner evaluates the enterprise mobility management vendors on their completeness of vision and ability to execute. This criteria is used to place vendors into one of four quadrants. For the fourth consecutive year MobileIron has been placed in the Leaders quadrant. According to Gartner, "The hallmark of leaders is that they focus and invest in their offerings to the point that they lead the market and can affect its overall direction." Download to learn more!

Tags : mobileiron, mobile technology, enterprise changes, consumer adoption technology, pc dominance, mobile first, enterprise application, iphone
    
By: HP     Published Date: Jul 03, 2014

Opportunity from uncertainty. Choosing the right strategic partner for your data center.

Tags : hewlett packard, data centers, data, data management, big data, digital asset management, data center services, data center knowledge
    
By: MEDHOST     Published Date: Jul 03, 2014

Click here to learn more about 7 key questions that can help you choose the best patient portal solution for your facility.

Tags : medhost, yourcommunitycare, patient portal, patient data, patient database, medical information, healthcare community, patient applications
    
By: Logicalis     Published Date: Jul 02, 2014

This was a live discussion that took place on May 15th, 2014. Our experts discussed what should be top-of-mind as you seek a Cloud or Infrastructure as a Service (IaaS) provider.

Tags : logicalis, iaas, infrastructure-as-a-service, iaas market, it management, infrastructure management, infrastructure
    
By: Code 42     Published Date: Jul 01, 2014

Ten years ago, file data lived almost exclusively on file servers. If you backed up the file servers, you were protecting it all. It’s now a BYOD world, and the landscape has changed.

Tags : codefourtytwo software, code 42, endpoint backup, data protection, it management, enterprise applications
    
By: Code 42     Published Date: Jul 01, 2014

The consumerization of IT is more than just people using iPads or iPhones at work. Consumer markets for mobile devices and software continue to drive technology and applications, causing a tremendous impact on how work gets done.

Tags : code 42 software, enterprise sync, share flexibility, share app, cloud strategies, shareplan, it management, knowledge management
    
By: Corporate Executive Board     Published Date: Jul 01, 2014

Employee engagement is necessary but not sufficient in achieving your company’s key business priorities. Learn how to ensure workers are engaged and aligned with your organization's strategy, and agile enough to create and sustain advantage in an ever-changing marketplace.

Tags : new work environment, agility, engagement, alignment, organization, strategy, marketplace, it management
    
By: Corporate Executive Board     Published Date: Jul 01, 2014

If your organization is representative of trends at large, your workforce is more engaged than ever. But is all that enthusiasm, pride, and willingness being applied in directions that really matter to the company? See why organizations that measure more than just engagement drive real business results.

Tags : workforce survey, insight, tools, solutions, enterprise performance, research, it management
    
By: Corporate Executive Board     Published Date: Jul 01, 2014

Expand your survey’s potential by linking its content to your firm’s business priorities, and create a culture that fuels your organization’s strategy.

Tags : business priorities, framework, alignment, agility, engagement, organization, cultural attributes, it management
    
By: Xora, A ClickSoftware Company     Published Date: Jul 01, 2014

Learn How to Turn Your Mobile Employees’ Devices into Productivity Tools

Tags : xora, mobile devices, productivity, business apps, healthcare, it management, wireless, enterprise applications
    
By: Xora, A ClickSoftware Company     Published Date: Jun 30, 2014

Learn How to Turn Your Construction Employees’ Mobile Devices into Productivity Tools

Tags : xora, mobile devices, productivity, business apps, networking, it management, wireless
    
By: Xora, A ClickSoftware Company     Published Date: Jun 30, 2014

Turn Your Field Services Employees’ Mobile Devices into Productivity Tools

Tags : xora, mobile devices, workforce management, business apps, networking, it management, wireless, enterprise applications
    
By: Epicor     Published Date: Jun 30, 2014

View this customer success video to learn how D&S Manufacturing has utilized Epicor ERP throughout their business processes, including purchasing, operations, planning, engineering, and shipping/receiving. In the video below, D&S Manufacturing unveils how Epicor ERP has provided the foundation to integrate all aspects of the business and deliver continued commitment to their customers.

Tags : epicor, manufacturing, operations, cost cutting, machinery, labor, contract manufacturing, erp software
    
By: Network Instruments     Published Date: Jun 30, 2014

Look at the Graph, Find the Code and Boom – You’re Solving Problems. Identifying and understanding common HTTP status codes can go a long way in troubleshooting complex web application issues.

Tags : network instruments, http, troubleshooting, http status codes, web applications, it management, enterprise applications
    
By: Code 42     Published Date: Jun 30, 2014

When evaluating endpoint backup options, organizations need to look for solutions that back up important data quickly, reliably and efficiently and without adding unnecessary burden to overtaxed and understaffed IT departments.

Tags : codefourtytwo software, code 42, endpoint backup, data protection, it management, enterprise applications
    
By: Foxit     Published Date: Jun 30, 2014

This whitepaper explains how Foxit is helping organizations standardize a PDF vendor which enhances user productivity and improves procurement efficiency.

Tags : foxit, pdf, pdf vendor, mobile pdf, file sharing, records management, rights management, pdf reader
    
By: CA Technologies     Published Date: Jun 27, 2014

Ce livre blanc explique pourquoi les plates-formes d’automatisation de la mise en production et du déploiement des applications deviennent toujours plus essentielles pour les départements IT dans les multinationales. Il analyse les exigences spécifiques auxquelles une plate-forme de ce type doit satisfaire afin d’être efficace et de générer un retour sur investissement important.

Tags : application release, software development, application integration, application performance management, performance testing, project management
    
By: IBM     Published Date: Jun 26, 2014

Cyber attacks are growing every day and become serious threats to your organization, but how do you know and understand the threats out there? Download a copy of this book, and you discover the zero-day exploits and threats used to compromise your enterprise. You also learn about a promising new technology developed by Trusteer, an IBM company, which provides effective yet transparent protection to enterprise endpoints. Start reading Stopping Zero-Day Exploits For Dummies, Trusteer Special Edition, today!

Tags : ibm, security, cyber security, cybercrime, cybercriminals, malware, network security, it management
    
By: DocuSign     Published Date: Jun 25, 2014

Agile development cycles churn out new releases of disruptive technologies as often as every quarter, making the high-tech industry one of unpredictable product cycles and rapid growth. Success in the unpredictable high-tech industry demands improving profitability while regulating costs.

Tags : docusign, high-tech, esignatures, technologies, rapid growth, speed, expand globally, it management
    
By: Sourcefire, LLC     Published Date: Jun 23, 2014

In this report, Cisco offers data on and insights into top security concerns, such as shifts in malware, trends in vulnerabilities, and the resurgence of distributed denial-ofservice (DDoS) attacks. The report also looks at campaigns that target specific organizations, groups, and industries, and the growing sophistication of those who attempt to steal sensitive information. The report concludes with recommendations for examining security models holistically and gaining visibility across the entire attack continuum—before, during, and after an attack.

Tags : sourcefire, cisco, data, security concerns, ddos, malware, attacks, threats
    
By: Sourcefire, LLC     Published Date: Jun 23, 2014

Download this white paper to learn the results of an independent study testing Sourcefire's Advanced Malware Protection conducted by NSS labs.

Tags : sourcefire, breach detection, malware, protection, nss labs, data breaches, threats, attacks
    
By: Sourcefire, LLC     Published Date: Jun 23, 2014

Today, targeted, advanced malware and sophisticated attacks are relentless as they compromise environments using new and stealthy techniques. Once again, Sourcefire is changing the way we must think about security, building on our continuous capability and introducing a new model for the way we need to combat these attacks.

Tags : sourcefire, breach detection, malware, protection, data breaches, threats, attacks, threat detection
    
By: Sourcefire, LLC     Published Date: Jun 23, 2014

This report begins by analyzing the relevant changes in those areas and then derives four key technology trends that will cause the most impact on cybersecurity programs.

Tags : sourcefire, breach detection, malware, protection, nss labs, data breaches, threats, attacks
    
By: Sourcefire, LLC     Published Date: Jun 23, 2014

Control networks and industrial control systems manage the generation and delivery of electricity, automate production lines, control environmental systems in large commercial buildings and hospitals and manage many other vital processes much of which is considered critical infrastructure. They also face a unique set of complications when it comes to cyber security.

Tags : sourcefire, breach detection, malware, protection, data breaches, threats, attacks, threat detection
    
By: Sourcefire, LLC     Published Date: Jun 23, 2014

Gartner issued its latest “Magic Quadrant for Intrusion Prevention Systems” and the leading industry analyst firm has placed Sourcefire in the Leaders' Quadrant. Download to learn more!

Tags : sourcefire, breach detection, malware, protection, data breaches, threats, attacks, threat detection
    
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.