IT Management White Papers

IT Management includes a variety of functions for managing computers in a networked environment, including software distribution, version control, backup & recovery, job scheduling, virus protection and performance and capacity planning.

Sub-Categories: Desktop Management, Employee Performance, ITIL, Productivity, Project Management, Sarbanes Oxley Compliance, Service Management, Software Compliance
Results 1 - 25 of 2556Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Sep 16, 2014

In a world that demands scalability, modularity, quality, fast performance and a best practices approach is key to ensuring predictable results for the business. IBM’s PowerLinux Open Source Infrastructure Services solution is a workload-optimized system that meets or exceeds best practices for a virtualized infrastructure at a reasonable price point. The PowerLinux solution can help turn today’s IT infrastructure into a well-tuned utility, providing a more flexible, scalable and valuable asset to the business.

Tags : virtualized infrastructure, it infrastructure, deployment options, it management, best practices, business intelligence
    
By: IBM     Published Date: Sep 15, 2014

This white paper highlights how a real world FIS client’s utilization of IBM FlashSystem together with the FIS Profile® banking solution1 yielded dramatic performance improvements, truly accelerating the pace of global banking. This client has been an FIS outsourcing client for 14+ years and counting.

Tags : global banking, banking solutions, fis outsourcing, banking information technology, flash technology, business activity monitoring, business analytics, business process automation
    
By: ClickSoftware     Published Date: Sep 12, 2014

An e-Book providing 12 on-the-clock reasons why we think field service management is the perfect place for a mobile timesheet app.

Tags : mobile timesheets, mobile workforce management, clicksoftware, business software, sales software, productivity
    
By: Bit9     Published Date: Sep 11, 2014

Enterprises are entering into a continuous state of compromise, and within this volatile risk market, consequences for organizations that fail to meet their regulatory security guidelines are feeling the pain all the way up the corporate ladder. Within this environment, traditional security controls are no longer sufficient to fully protect your organization. Therefore, IT risk and audit professionals need to understand that simply meeting compliance controls does not equal complete security coverage. By neglecting to pay attention to emerging advanced threat protection solutions and capabilities, a compliant company can still be a vulnerable one. Join Christopher Strand, senior director of compliance at Bit9 + Carbon Black, to understand: • The risks and liability organizations and auditors face by not going beyond compliance • How to meet and exceed compliance standards with emerging security controls • Evaluating emerging security controls within the IT audit process

Tags : bit9, pci, dss, security gaps, endpoint monitoring, compliance, security, servers
    
By: GENBAND     Published Date: Sep 11, 2014

GENBAND’s NUViA™ voicemail solution changes the economics of acquiring and managing voicemail. Eliminate end of life platforms that are expensive to maintain while adding new mobility services that make users more productive. Integrates with your existing PBXs or IP-PBXs.

Tags : voicemail, solution, managing, economics, platforms, pbx, mobility, messaging
    
By: AlienVault     Published Date: Sep 05, 2014

While vulnerability assessments are essential, considering vulnerability data in a vacuum greatly limits your ability to prioritize your action plan in an effective way. Without the context of which vulnerabilities are the most severe, which are actively being targeted, which are on critical assets, etc, you may waste time checking things off the list without actually improving security. Join us for this session to learn how to integrate threat intelligence into your vulnerability management strategy.

Tags : alienvault, threat intelligence, vulnerability assessments, vulnerability data, security, it management, knowledge management
    
By: AlienVault     Published Date: Sep 05, 2014

Event logs provide valuable information to troubleshoot operational errors, and investigate potential security exposures. They are literally the bread crumbs of the IT world. As a result, a commonly-used approach is to collect logs from everything connected to the network "just in case" without thinking about what data is actually useful. But, as you're likely aware, the "collect everything" approach can actually make threat detection and incident response more difficult as you wade through massive amounts of irrelevant data. Join us for this session to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements.

Tags : alienvault, troubleshooting operational errors, potential security exposures, satisfy compliance requirements, security, it management, knowledge management
    
By: AlienVault     Published Date: Sep 05, 2014

Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources. In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.

Tags : alienvault, limited resources, it time management, it prioritization, it management, security
    
By: AlienVault     Published Date: Sep 05, 2014

If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. In this practical webinar, PCI DSS compliance experts walk through strategies for taking the pain out of PCI DSS reporting.

Tags : alienvault, pci dss reporting, pci dss compliance, it management, knowledge management
    
By: Riverbed     Published Date: Sep 05, 2014

Nobody can afford to lose data. But managing the backup and recovery of data and services in far-flung locations can present many logistical and technology challenges that add complexity, expense, and risk. A new branch converged infrastructure approach allows IT to project virtual servers and data to the edge, providing for local access and performance while data is actually stored in centralized data centers. IT can now protect data centrally and restore branch operations in a matter of minutes versus days.

Tags : branch office, data services, data recovery, centralized data centers, it management
    
By: Riverbed     Published Date: Sep 05, 2014

Many organizations have invested in server consolidation, particularly in their data centers. In remote offices, though, servers and storage exist as isolated islands of infrastructure that require management through separate operational processes and procedures. This approach could place data at risk. A new kind of storage architecture allows IT to consolidate remote servers and data in the data center by decoupling storage from its server over any distance—even thousands of miles—and still get the same performance as if the storage remained local to the branch. Organizations can now consolidate remote infrastructure to increase security and ef?ciency, without adversely impacting end-user performance in branch of?ces.

Tags : consolidation, servers, remote, storage, isolated islands, efficiency, security, networking
    
By: Riverbed     Published Date: Sep 05, 2014

The branch office has long been a critical dilemma for the IT organization. Branch offices for many organizations are a critical point of productivity and revenue generation, yet the branch has always come with a tremendous amount of operational overhead and risk. Worse yet, challenges are often exacerbated because the branch office too often looks like a carryover of outdated IT practices.

Tags : convergence, branch office, tco, transforming, operational overhead, it practices, networking, it management
    
By: TeamQuest     Published Date: Sep 05, 2014

TeamQuest Director of Market Development Dave Wagner and Chris Lynn, Safeway's Capacity Manager and Performance Analyst, cover the application of automatic, exception-oriented analytics to a wide variety of IT and business metrics in order to simultaneously optimize service performance and IT cost. Multiple conceptual approaches are shared, including pros and cons. Most of the presentation includes real examples by which Safeway has integrated performance, capacity, business, and power data into an automated optimization process spanning 1000s of servers and virtual servers and their applications.

Tags : automated analytics, automated optimization, it cost, power data, application performance management, business intelligence, business process automation, productivity
    
By: TeamQuest     Published Date: Sep 05, 2014

Verizon Wireless uses TeamQuest software to prove a need before purchasing hardware, to plan for peak demands, and to monitor performance on a daily basis

Tags : business activity monitoring, business intelligence, project management, service management
    
By: Sourcefire, LLC     Published Date: Sep 04, 2014

Not everyone loves a good story. Shocking media reports about intentionally-leaked classified information have commanded the public’s attention in recent years, but they are certainly not entertaining to those of us responsible for safeguarding the data. Clearly we can do more to better protect our nation’s federal agencies and classified information. What’s needed is a threat-centric approach to security that lets agencies and department leaders tackle the most pressing issues first with superior visibility, continuous control, and advanced threat protection – to defend against both insider and external threats.

Tags : sourcefire, network security, cisco, security report, cyber attack, malware, outdated software, cybersecurity
    
By: Sourcefire, LLC     Published Date: Sep 04, 2014

Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major loss and disruption to organizations and national infrastructure. These advanced attacks are very difficult to detect, remain in networks for long periods of time, and amass network resources to launch attacks elsewhere. Traditional methods that rely exclusively on detection and blocking for protection are no longer adequate. It’s time for a new security model that addresses the full attack continuum – before, during, and after an attack.

Tags : sourcefire, cisco, security report, cyber attack, malware, outdated software, cybersecurity, breaches
    
By: Sourcefire, LLC     Published Date: Sep 04, 2014

This Advanced Endpoint and Server Protection paper will dig into protecting devices against advanced attackers. We will highlight a number of new alternatives for preventing and detecting advanced malware, and examine new techniques and tools to investigate attacks and search for indicators of compromise within your environment.

Tags : securosis, sourcefire, cisco, endpoint protection, server protection, attack protection, advanced attacks, security
    
By: Sourcefire, LLC     Published Date: Sep 04, 2014

In this publication, we hope that you'll learn how to evolve your security strategy to overcome today's security challenges, take advantage of new business models, and gain more effective protections- anytime, all the time.

Tags : gartner, network security, sourcefire, cisco, security report, cyber attack, malware, outdated software
    
By: Sourcefire, LLC     Published Date: Sep 04, 2014

Making threat protection more intelligent and more accurate

Tags : network security, sourcefire, cisco, security report, cyber attack, malware, outdated software, cybersecurity
    
By: Sourcefire, LLC     Published Date: Sep 04, 2014

The goal of this paper is to give security managers information to facilitate focusing their investments on the areas that are mostly likely to impact their organizations and customers over the next several years.

Tags : cisco, network security, sourcefire, security report, cyber attack, malware, outdated software, cybersecurity
    
By: HP     Published Date: Sep 04, 2014

To prepare for doubling its growth and, at the same time, update its 20 year-old IT systems, Focal Point implemented an HP 3PAR StoreServ 7400 Storage Area Network (SAN) with an HP StoreOnce backup to match. The old system was causing weekly unplanned outages and seriously hindering critical business processes.

Tags : 3par, storage, solution, storeonce, system, it management
    
By: CradlePoint     Published Date: Sep 04, 2014

In this white paper, learn how PCI-DSS 3.0 effects how you deploy and maintain PCI compliant networks using CradlePoint solutions. Properly configure, monitor, and maintain your CradlePoint devices to meet the requirements of PCI DSS 3.0. Enabling features include network segmentation (ethernet ports, SSIDs, and VLANs), stateful firewall, MAC/IP/URL filtering, authentication/encryption, event logging, event alerts, time synchronization, and configuration/upgrade management from CradlePoint Enterprise Cloud Manager.

Tags : cradlepoint enterprise cloud manager, pci dss 3.0, pci compliance, stateful firewall, mac/ip/url filtering, authentication/encryption, event logging, event alerts
    
By: IBM     Published Date: Sep 02, 2014

In this short e-book, learn the top ten ways that IBM Platform Computing customers are using technologies like IBM Platform LSF and IBM Platform Symphony to help obtain results faster, share resources more efficiently, and improve the overall cost-effectiveness of their global IT infrastructure.

Tags : ibm, cloud computing, infrastructure, roi, it spending, it costs, it budget, distributed computing
    
By: Micro Focus     Published Date: Aug 28, 2014

Enabling technologies to streamline regulatory and legislative changes.

Tags : it compliance programs, risk management, it management, data management, compliance
    
By: Micro Focus     Published Date: Aug 28, 2014

Micro Focus commissioned fresh research to re-examine attitudes towards core IT systems and discover whether blue sky thinking is delivering real-world solutions. The conclusions may surprise you

Tags : core it systems, it debt, mainframe, it management, cloud computing
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.