IT Management White Papers

IT Management includes a variety of functions for managing computers in a networked environment, including software distribution, version control, backup & recovery, job scheduling, virus protection and performance and capacity planning.

Sub-Categories: Desktop Management, Employee Performance, ITIL, Productivity, Project Management, Sarbanes Oxley Compliance, Service Management, Software Compliance
Results 1 - 25 of 3137Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Feb 24, 2015

Read this Forrester whitepaper to learn more about the critical, yet often overlooked, role that data classification and data discovery can play in reducing your organization's risk and enhancing security.

Tags : ibm, data discovery, data classification, big data, risk mitigation, security, it management, data management
    
By: IBM     Published Date: Feb 24, 2015

Big data analytics offer organizations an unprecedented opportunity to derive new business insights and drive smarter decisions. The outcome of any big data analytics project, however, is only as good as the quality of the data being used. Although organizations may have their structured data under fairly good control, this is often not the case with the unstructured content that accounts for the vast majority of enterprise information. Good information governance is essential to the success of big data analytics projects. Good information governance also pays big dividends by reducing the costs and risks associated with the management of unstructured information. This paper explores the link between good information governance and the outcomes of big data analytics projects and takes a look at IBM's StoredIQ solution.

Tags : big data, ibm, big data outcomes, information governance, big data analytics, it management, data management, data center
    
By: IBM     Published Date: Feb 24, 2015

This paper asks the key questions that IT, legal, records, compliance officers and corporate managers should consider when contemplating an information lifecycle governance solution, and why these elements are critical in addressing e-discovery challenges.

Tags : ibm, lifecycle governance, e-discovery, e-discovery challenges, ilg solutions, it management, knowledge management, data management
    
By: IBM     Published Date: Feb 24, 2015

Mobile capture is quickly becoming an important differentiators for many companies and organizations, especially those in traditionally document-intensive fields like banking, insurance, healthcare and government operations. According to a 2014 study conducted by AIIM, 45% of companies feel that mobile capture is vitally important, pointing to the competitive need for improved process agility and customer service across the board. Discover the top 10 questions to ask before you make your investment in mobile capture.

Tags : mobile capture, ibm, process agility, customer service, it management, knowledge management, enterprise applications
    
By: IBM     Published Date: Feb 24, 2015

Read this report from AIIM to discover what issues on-premise ECM users are facing, how external collaboration support is managed, what cloud and mobile functionalities users are requesting, and what alternative scenarios are being considered.

Tags : ibm, ecm, ecm users, mobile funtionalities, cloud functionalities, it management, knowledge management, enterprise applications
    
By: IBM     Published Date: Feb 24, 2015

Read this report from Forrester Research to learnhow IBM ACM solutions improve the efficiency of knowledge workers, integrate with analytics to create upselling and cross-selling opportunities and reduce the cost and risk of regulatory fines through increased audit consistency.

Tags : ibm, acm solutions, cross-selling opportunities, audit consistency, it management, knowledge management, enterprise applications
    
By: IBM     Published Date: Feb 24, 2015

In an unpredictable world, forecasting errors are unavoidable. This webinar offers some valuable guidance, in the form of Six Principles of Forecast Mastery, which point the way to a better future. Watch today and learn why treating forecast error as a friend can help you improve your organization's performance.

Tags : forecasting errors, quality forecasting, best practices, business performance solutions, knowledge management, enterprise applications, analytical applications, productivity
    
By: HGST     Published Date: Feb 23, 2015

Learn how to best understand flash-based architectures and see how with this webcast you will learn the pros and cons of relevant flash technologies, while also learning how to choose from among the many alternatives.

Tags : flash, hgst, flash architecture, sans, it management
    
By: BitSight Technologies     Published Date: Feb 20, 2015

Download "Continuous Third Party Security Monitoring Powers Business Objectives And Vendor Accountability" (a commissioned study conducted by Forrester Consulting on behalf of BitSight) to learn how companies are continuously managing third party risk.

Tags : bitsight technologies, security, cyber attacks, monitoring, third party security monitoring, third party risk, risk management, it management
    
By: Bit9     Published Date: Feb 20, 2015

You can’t open a newspaper or visit an online news site these days without some mention of a cyber-attack or data breach. These activities are becoming more prevalent, and as a result, the reporting of these activities is also on the rise. Bit9 + Carbon Black reached out to a series of experts to collect their thoughts and advice on dealing with data security incidents or breaches.

Tags : breach preparation, data breaches, bit9, it data security, security, it management, enterprise applications, business intelligence
    
By: Bit9     Published Date: Feb 20, 2015

Businesses need to view security as a process and leverage solutions that can proactively collect data, apply aggregated threat intelligence, reduce the cost and complexity of incident response and evolve, adapt and learn from your investigation. This eGuide will cover how a continuous approach to response can resolve these challenges and put your organization in a better security posture by proactively preparing for a breach.

Tags : it threat intelligence, aggregated data, bit9, security solutions, incident response, security, it management, enterprise applications
    
By: Bit9     Published Date: Feb 20, 2015

Most organizations have not proactively prepared for a breach. In fact, a majority of incident responders (52 percent) say they lack the necessary visibility into endpoint vulnerabilities. Without continuous data collection at the endpoint, preparing and responding to a breach is exponentially hampered. Download the SANS Institute’s latest industry survey to understand these key findings.

Tags : endpoint data, bit9, ir capabilities, siem integration tools, security, it management, enterprise applications, business intelligence
    
By: Bit9     Published Date: Feb 20, 2015

With the number of advanced attacks increasing every day—most undiscovered through traditional detection and response solutions—truly hunting for threats within your environment can be a laborious task. To combat this, enterprises must focus on prioritizing endpoint data collection over detection, leveraging comprehensive threat intelligence, and expanding detection beyond the moment of compromise.

Tags : advanced attacks, bit9, endpoint data, it threat intelligence, it security solutions, security, it management, enterprise applications
    
By: Extreme Networks     Published Date: Feb 20, 2015

Este documento expone cinco criterios clave que cualquier organización que se esté planteando desplegar o evolucionar su red inalámbrica debería tener en cuenta si pretende tomar una decisión de compra acertada.

Tags : soluciones wireless, byod, wi-fi, infraestructura, it management, wireless, knowledge management, enterprise applications
    
By: Extreme Networks     Published Date: Feb 20, 2015

Use these questions to help decide which vendor’s SDN platform is best equipped to support your organization as you face a rapidly changing world of technology.

Tags : sdn platform, sdn solutions, software-defined networking, it solutions, it management, enterprise applications, data management
    
By: Extreme Networks     Published Date: Feb 20, 2015

Download this whitepaper to learn key concepts for designing a standards-based data center fabric to meet the requirements of today and tomorrow.

Tags : data center networking, standards-based data center, vendor-specific training, it solutions, it management, knowledge management, enterprise applications
    
By: IBM     Published Date: Feb 19, 2015

Read how Big Data and Analytics can help businesses deliver on customer needs, acquire customers, increase profitability and help retain the most valuable customers.

Tags : big data, business analytics, customer retention, customer aquisition, it management, enterprise applications, data management
    
By: IBM     Published Date: Feb 19, 2015

Refining business processes can be the key to achieving operational excellence.

Tags : business analytics, ibm, predictive analytics, performance management, it management, knowledge management, best practices, business intelligence
    
By: F5 Networks Inc     Published Date: Feb 18, 2015

Organizations in every industry rely on applications to drive customer engagement, employee productivity and revenue. Deployed between users and the applications are a wide variety of “application services” designed to enhance security, improve performance and ensure reliability. F5 set out to evaluate the state of these services by asking IT professionals about their current and planned use of application services. Read the report to learn which strategic initiatives are driving application deployments including the most important trend for the next 2-5 years.

Tags : application services, customer engagement, employee productivity, application deployment, it management, knowledge management, enterprise applications, data management
    
By: F5 Networks Inc     Published Date: Feb 18, 2015

As a website building service for consumers, Weebly is often the target of DDoS attacks. Previously they mitigated attacks through an internally built security infrastructure but the increasing scale and complexity of DDoS attacks had the company evaluating secondary protection. Learn how Weebly is well protected from DDoS threats of all sizes and complexities after incorporating an added layer of protection and resulting uninterrupted DDoS mitigation and analysis.

Tags : ddos attacks, ddos protection, ddos solutions, mitgation, security, it management, business intelligence, data protection
    
By: F5 Networks Inc     Published Date: Feb 18, 2015

In this article, F5's Karl Triebes and VMware's Kit Colbert share their perspectives on where the market is headed, and how IT organizations can stay ahead of the curve when it comes to securing apps in a mobility-focused world.

Tags : application security, mobility-focused world, application solutions, it management, knowledge management, enterprise applications, business intelligence
    
By: F5 Networks Inc     Published Date: Feb 18, 2015

SSL is the set of cryptographic protocols that secure data in transit. Today SSL is often the only tool standing between your organization and the bad actors. Read this whitepaper to learn how your organization can properly embrace a higher security posture to protect SSL.

Tags : ssl, cryptographic protocols, data security, higher security posture, security, it management, data management
    
By: IBM     Published Date: Feb 18, 2015

IBM Rational test automation capabilities and tools can help software integrators, developers and testers alike overcome the challenges of testing banking, insurance and financial market applications.

Tags : ibm, automation capabilities, automated testing, business agility, testing banking, it management, knowledge management, enterprise applications
    
By: IBM     Published Date: Feb 18, 2015

DevOps processes and tools help retailers compete in fast-paced mobile, digital and physical markets. See what retailers can do to deliver innovation faster. Test virtualization and deployment automation can improve front-end mobile and back-end mainframe development processes.

Tags : ibm, devops, retail industry, devops processes, test virtualization, it management, knowledge management, enterprise applications
    
By: IBM     Published Date: Feb 18, 2015

An approach to governance can help you manage your software supply chain. This approach has three imperatives: balance governance with agility, increase visibility and deliver measurable business value.

Tags : ibm, industry trends, software management, software supply chain, it management, knowledge management, enterprise applications
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.