IT Management White Papers

IT Management includes a variety of functions for managing computers in a networked environment, including software distribution, version control, backup & recovery, job scheduling, virus protection and performance and capacity planning.

Sub-Categories: Desktop Management, Employee Performance, ITIL, Productivity, Project Management, Sarbanes Oxley Compliance, Service Management, Software Compliance
Results 1 - 25 of 2527Sort Results By: Published Date | Title | Company Name
By: KANA®, A Verint® Company     Published Date: Aug 28, 2014

Webinar: August 28, 2014 at 1PM EDT Join us as guest speakers Megan Burns from Forrester Research, Inc. and Craig Harsip from Vistaprint join Scott Hays from KANA®, a Verint® Company to examine the dynamics and challenges of today’s customer service landscape. During this session, you will learn: 1. Today’s challenges of customer service organizations 2. Trends and predictions on how customer service will evolve 3. How organizations like Vistaprint face those challenges and simplify interactions 4. Practical ideas on how you can simplify your customer service in the short term

Tags : customer service, interactions, simplify, agent interactions, consumer, agent-delivered, business, customer experience management
    
By: Samanage     Published Date: Aug 22, 2014

One of the oldest and largest global private equity firms, The Riverside Company was fed up with their complex ITSM solution, the costly consultants it required to maintain, and the sub-par customer service they received from their vendor. In this webinar, Eric Feldman, Director of IT at Riverside, shares behind-the-scenes details of how they regained control of their domain, including: "IT"SM…and Beyond – Cross functional business challenges that drove their requirements The journey – What they learned about cloud ITSM along the way The tangible benefits – Immediate business impact and what’s now possible including more accurate budgeting and building economies of scale If you’re actively looking at, or merely thinking about a new IT Service Management (ITSM) solution for your organization, this is one conversation you don’t want to miss. Like Riverside, you can get control and become master of your own IT domain.

Tags : samanage, itsm, riverside, itsm solutions, vendors, it management, knowledge management, enterprise applications
    
By: Riverbed     Published Date: Aug 22, 2014

Because WAN optimization sits at the intersection of applications, networking, and storage, its potential benefits goes well beyond what enterprises had realized in the past. In fact, WAN optimization has now evolved into an architectural design element that shapes the performance lifecycle of IT.

Tags : optimization, benefit, organization, application, networking, storage, architectural design, performance
    
By: Brocade Communications Systems     Published Date: Aug 21, 2014

The limitations of traditional three-tier campus network architectures are being severely tested by peer-centered, wired/wireless, multi-device, and multi-application environments running rich media like streaming video and audio.These legacy networks are inflexible, inefficient, and have high OpEx costs.1

Tags : campus networks, wired, wireless, multi-device, multi-application, rich media, limitations, three-tier
    
By: Brocade Communications Systems     Published Date: Aug 21, 2014

The security of your campus network is essential to managing your organization's risk - and unlike the networking infrastructure of third-part service providers, the responsibility for campus network security falls primarily on your own organization. This report explains why security for your campus network is essential, and outlines three straightforward ways that you can improve it.

Tags : security, campus network, network, infrastructure, risk, service providers, networking, it management
    
By: Brocade Communications Systems     Published Date: Aug 21, 2014

This white paper explores today's campus networking environment: its operational shortcomings and potential to address knowledge workers' growing needs. IT managers need to look to their near- and midterm future needs in terms of how a software-defined network architecture can provide incremental value to their IT and network infrastructure; why it is likely to be the foundation of next-generation enterprise networking solutions; the importance of open technologies and protocols such as OpenFlow; and how SDN will help better manage physical and virtual network resources to deliver a better application experience.

Tags : enterprise, campus network, sdn it, virtual, network architecture, networking, security, it management
    
By: Brocade Communications Systems     Published Date: Aug 21, 2014

For the last two years, Software-Defined Networking (SDN) has been the hottest topic in networking. There is tremendous interest in SDN on the part of vendors and a wide range of user groups including hyper-scale data center providers, service providers and enterprises of all types and sizes. While most of the discussion of SDN focuses on its use in the data center, The 2013 Guide to Network Virtualization and SDN1 highlights the fact that enterprise IT organizations are interested in deploying SDN broadly throughout their environment, including in their WAN and campus networks.

Tags : security, hyper-scale, sdn, campus networks, wan, networking, it management
    
By: Brocade Communications Systems     Published Date: Aug 21, 2014

IT Agility: How Do You Stack Up?

Tags : agility, stack, network, technology, networking, it management
    
By: Global Knowledge     Published Date: Aug 19, 2014

VMware Horizon 6 was announced in April and began shipping in June 2014, bringing a more unified suite delivering more integration with infrastructure and cloud products and more simplicity for all devices. Along with the numerous updates across the Horizon suite, VMware has transitioned to a more traditional product licensing hierarchy. This paper explores the new licensing model and provides an overview of the new features associated with VMware Horizon 6.

Tags : cloud products, application catalog, product licensing, end-user computing, it management, cloud computing
    
By: Global Knowledge     Published Date: Aug 19, 2014

IT service managers are now required to rethink the way they deliver and support services. This white paper provides a snapshot of challenges for IT service and support and explains why the Service Desk is now more critical than ever.

Tags : it support, omnichannel support, cloud based services, end-user experience, it services, customer relationship management, customer satisfaction, customer service
    
By: Box     Published Date: Aug 15, 2014

This paper looks at how bring-your-own policies and consumerisation of IT are transforming the way professionals and enterprises purchase, distribute and consume mobile software. Which revenue models should you use and what platforms should you target.

Tags : business and productivity, byod policies, mobile software, mobile computing, mobile data systems, mobile workers, application integration, application performance management
    
By: Box     Published Date: Aug 15, 2014

This paper looks at how bring-your-own policies and consumerisation of IT are transforming the way professionals and enterprises purchase, distribute and consume mobile software. Which revenue models should you use and what platforms should you target.

Tags : business and productivity, byod policies, mobile software, mobile computing, mobile data systems, mobile workers, productivity, cloud computing
    
By: IBM     Published Date: Aug 14, 2014

IBM® Mobile Web Push allows marketers to influence and inform their mobile audience in innovative ways. Web push notifications are dynamically triggered for display on mobile websites based on the actions of your visitors. This personalization is possible without the complications of existing content management, advertisement servers or IT involvement.

Tags : ibm, mobile, web push, free notifications, marketing, it management
    
By: CA Technologies     Published Date: Aug 14, 2014

IT luminaries discuss the major issues impacting DevOps today

Tags : devops, software, training, project management, best practices, workforce management, employee performance, productivity
    
By: Samanage     Published Date: Aug 13, 2014

Join us for this educational webcast, presented by Randy Michaels of Knowledge ToolWorks, a leading expert on IT and business processes, to learn how you can make ITSM work for you without getting tangled up in its ugly tentacles.

Tags : samanage, randy michaels, itsm, it service management, knowledge toolworks, service driven organization, itsm framework, it management
    
By: Box     Published Date: Aug 13, 2014

This paper looks at how bring-your-own policies and consumerisation of IT are transforming the way professionals and enterprises purchase, distribute and consume mobile software. Which revenue models should you use and what platforms should you target.

Tags : business and productivity, byod policies, mobile software, mobile computing, mobile data systems, mobile workers, application integration, application performance management
    
By: Box     Published Date: Aug 13, 2014

This paper breaks down the main features of the Box mobile app

Tags : box, mobile content experience, sales mobility, presentation software, work on the go, enterprise applications, web service security, mobile computing
    
By: Dell Software     Published Date: Aug 07, 2014

Leverage integration platform as a service (iPaaS) and capitalize on the speed, agility and economics of the cloud to increase the value of your hybrid IT investment. Read this white paper to learn how.

Tags : cloud, cloud integration, technology, hybrid it, enterprises, it management, cloud computing
    
By: Dell Software     Published Date: Aug 07, 2014

Discover how Dell Boomi AtomSphere integration PaaS (iPaaS) helped Novartis overcome issues with on-premises middleware solutions to speed development efforts and realize significant costs savings.

Tags : middleware, integration, business, novartis, cost of ownership, it management
    
By: Bit9     Published Date: Aug 06, 2014

Download this new white paper to learn: • How compliance and security gaps can affect your organization • How a positive solution can close these gaps to ensure the security of servers and endpoints and compliance with industry regulations • How Bit9 manages five core compliance controls that apply to PCI-DSS compliance

Tags : bit9, pci, dss, security gaps, endpoint monitoring, compliance, security, servers
    
By: Bit9     Published Date: Aug 06, 2014

This eBook explains how a single, positive security solution, such as Bit9, facilitates the convergence of compliance and security—one agent that provides visibility, detection, response and protection and can automate and manage compliance for PCI-DSS, SOX, HIPAA, FISMA, GLBA, GPG 13, NERC CIP and other regulations.

Tags : bit9, pci, dss, security gaps, endpoint monitoring, compliance, security, servers
    
By: Bit9     Published Date: Aug 06, 2014

As a result of the recent spate of high-profile data breaches at brand name retailers, compromising credit and debit card and other personally identifiable information for hundreds of millions of consumers in the process, data security has become priority No. 1 for many retailers in 2014. And for good reason: The consequences of suffering a data breach are numerous, and none of them are positive — consumer mistrust, a drop in traffic and a decrease in sales, to name just a few. With retailers recently testifying before Congress that they’re facing increasingly sophisticated threats from cyber criminals, and no end to those in sight, it’s become apparent that your company needs to implement strategies that will protect itself from a costly data breach. Here are 10 ways you can more easily achieve that goal while maintaining required PCI compliance (all of these tips fall within one of five buckets — visibility; asset control; enforcement; trust policy; advance measurement.)

Tags : bit9, pci, dss, security gaps, endpoint monitoring, compliance, security, servers
    
By: Bit9     Published Date: Aug 06, 2014

Enterprises are entering into a continuous state of compromise, and within this volatile risk market, consequences for organizations that fail to meet their regulatory security guidelines are feeling the pain all the way up the corporate ladder. Within this environment, traditional security controls are no longer sufficient to fully protect your organization. Therefore, IT risk and audit professionals need to understand that simply meeting compliance controls does not equal complete security coverage. By neglecting to pay attention to emerging advanced threat protection solutions and capabilities, a compliant company can still be a vulnerable one. Join Christopher Strand, senior director of compliance at Bit9 + Carbon Black, to understand: • The risks and liability organizations and auditors face by not going beyond compliance • How to meet and exceed compliance standards with emerging security controls • Evaluating emerging security controls within the IT audit process

Tags : bit9, pci, dss, security gaps, endpoint monitoring, compliance, security, servers
    
By: Samanage     Published Date: Aug 05, 2014

Does your IT department have a perception problem within your organization? Listen to the recorded webinar to learn how Shvonne Williams, Director of IT Services at MediFit Corporate Services, was able to turn around her team’s image and transform the IT department into a strategic business partner within the organization.

Tags : samanage, medifit corporate services, it deparment, itsm solution, itsm, it management, enterprise applications
    
By: EMC Corporation     Published Date: Aug 05, 2014

It’s an exciting yet daunting time to be a security professional. Security threats are becoming more aggressive and voracious. Governments and industry bodies are getting more prescriptive around compliance. Combined with exponentially more complex IT environments, security management is increasingly challenging. Moreover, new “Big Data” technologies purport bringing advanced analytic techniques like predictive analysis and advanced statistical techniques close to the security professional.

Tags : big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance, security
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.