IT Management White Papers

IT Management includes a variety of functions for managing computers in a networked environment, including software distribution, version control, backup & recovery, job scheduling, virus protection and performance and capacity planning.

Sub-Categories: Desktop Management, Employee Performance, ITIL, Productivity, Project Management, Sarbanes Oxley Compliance, Service Management, Software Compliance
Results 1 - 25 of 2558Sort Results By: Published Date | Title | Company Name
By: Arbor     Published Date: Sep 17, 2014

Dans la lutte contre les menaces qui se joue actuellement, les analyses de sécurité deviennent de plus en plus indispensables

Tags : firewall, firewall protection, it security, cyber defense, security, it management, business activity monitoring, business intelligence
    
By: New Relic     Published Date: Sep 17, 2014

So you’re ready to plunge headlong into DevOps. Right on! You’ve done your homework, and you realize that in order to keep up with the rapid pace of business today, you need to implement DevOps practices at your organization. Yet despite the obvious benefits, such as faster deployments and fewer failures, the rest of your organization may not be so enthusiastic. This eBook will help you familiarize yourself with the common barriers to DevOps adoption so that you can come up with ways to win over the skeptics—and get your organization’s DevOps movement rolling.

Tags : devops, benefits, deployments and fewer failures, successful transition, common barriers, devops implementation, networking, it management
    
By: IBM     Published Date: Sep 16, 2014

In a world that demands scalability, modularity, quality, fast performance and a best practices approach is key to ensuring predictable results for the business. IBM’s PowerLinux Open Source Infrastructure Services solution is a workload-optimized system that meets or exceeds best practices for a virtualized infrastructure at a reasonable price point. The PowerLinux solution can help turn today’s IT infrastructure into a well-tuned utility, providing a more flexible, scalable and valuable asset to the business.

Tags : virtualized infrastructure, it infrastructure, deployment options, it management, best practices, business intelligence
    
By: Lenovo     Published Date: Sep 16, 2014

Virtual Desktop Infrastructure (VDI) works best for smaller centrally located user bases that share a core set of application and file needs. As the world moves to the web and the cloud, is VDI still a good fit for emerging mobility and BYOD needs for your agency? See this infographic to learn more about the tradeoffs, and what you can do to take advantage of emerging cloud solutions to drive improved mobile productivity across your entire organization.

Tags : vid, cloud alternatives, emerging mobility, mobile productivity, it management, bandwidth management, content integration
    
By: Lenovo     Published Date: Sep 16, 2014

Agency IT is tasked with building smarter and more responsive state and local government, with CTOs looking to enable government workforce mobility and address strategic issues like BYOD. Adding to the challenge is a rise in devices and data that IT must deliver, support, and secure. Combined with the decline in traditional Windows-based computing, these challenges are driving agencies toward web and cloud solutions that don't sacrifice security or manageability. See the solution that has government agencies re-thinking how they enable mobile productivity.

Tags : agency it, workforce mobility, mobile productivity, cloud computing, it management, project management, web services, database security
    
By: Lenovo     Published Date: Sep 16, 2014

Renewed interest in Virtualized Desktop Infrastructure (VDI) comes largely from the need to solve mobility and BYOD demands. Though traditional VDI vendors bring their own solutions to market, is it time to consider smarter alternatives? By focusing on where VDI excels, where it falls short, and where web and cloud services are most compatible, agencies can take a smarter approach to these difficult decisions. Understand the tradeoffs, and learn why more agencies are taking notice to emerging web technologies through this executive summary.

Tags : vdi, cloud alternatives, byod demands, emerging web technologies, business intelligence, data protection, database security, productivity
    
By: Arbor     Published Date: Sep 15, 2014

This Frost and Sullivan market research study comes at a time when DDoS attacks are accelerating in size, frequency and complexity. Though DDoS is not a new concern, the risk of DDoS attacks and the potential for damage is at an all-time high. As a result, DDoS mitigation is a top-of-mind consideration for IT and security organizations around the world, and demand for DDoS mitigation solutions is growing rapidly.

Tags : ddos attacks, it security, ddos mitigation, security, it management, business analytics
    
By: IBM     Published Date: Sep 15, 2014

This white paper highlights how a real world FIS client’s utilization of IBM FlashSystem together with the FIS Profile® banking solution1 yielded dramatic performance improvements, truly accelerating the pace of global banking. This client has been an FIS outsourcing client for 14+ years and counting.

Tags : global banking, banking solutions, fis outsourcing, banking information technology, flash technology, business activity monitoring, business analytics, business process automation
    
By: ClickSoftware     Published Date: Sep 12, 2014

An e-Book providing 12 on-the-clock reasons why we think field service management is the perfect place for a mobile timesheet app.

Tags : mobile timesheets, mobile workforce management, clicksoftware, business software, sales software, productivity
    
By: GENBAND     Published Date: Sep 11, 2014

GENBAND’s NUViA™ voicemail solution changes the economics of acquiring and managing voicemail. Eliminate end of life platforms that are expensive to maintain while adding new mobility services that make users more productive. Integrates with your existing PBXs or IP-PBXs.

Tags : voicemail, solution, managing, economics, platforms, pbx, mobility, messaging
    
By: AlienVault     Published Date: Sep 05, 2014

While vulnerability assessments are essential, considering vulnerability data in a vacuum greatly limits your ability to prioritize your action plan in an effective way. Without the context of which vulnerabilities are the most severe, which are actively being targeted, which are on critical assets, etc, you may waste time checking things off the list without actually improving security. Join us for this session to learn how to integrate threat intelligence into your vulnerability management strategy.

Tags : alienvault, threat intelligence, vulnerability assessments, vulnerability data, security, it management, knowledge management
    
By: AlienVault     Published Date: Sep 05, 2014

Event logs provide valuable information to troubleshoot operational errors, and investigate potential security exposures. They are literally the bread crumbs of the IT world. As a result, a commonly-used approach is to collect logs from everything connected to the network "just in case" without thinking about what data is actually useful. But, as you're likely aware, the "collect everything" approach can actually make threat detection and incident response more difficult as you wade through massive amounts of irrelevant data. Join us for this session to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements.

Tags : alienvault, troubleshooting operational errors, potential security exposures, satisfy compliance requirements, security, it management, knowledge management
    
By: AlienVault     Published Date: Sep 05, 2014

Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources. In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.

Tags : alienvault, limited resources, it time management, it prioritization, it management, security
    
By: AlienVault     Published Date: Sep 05, 2014

If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. In this practical webinar, PCI DSS compliance experts walk through strategies for taking the pain out of PCI DSS reporting.

Tags : alienvault, pci dss reporting, pci dss compliance, it management, knowledge management
    
By: Riverbed     Published Date: Sep 05, 2014

Nobody can afford to lose data. But managing the backup and recovery of data and services in far-flung locations can present many logistical and technology challenges that add complexity, expense, and risk. A new branch converged infrastructure approach allows IT to project virtual servers and data to the edge, providing for local access and performance while data is actually stored in centralized data centers. IT can now protect data centrally and restore branch operations in a matter of minutes versus days.

Tags : branch office, data services, data recovery, centralized data centers, it management
    
By: Riverbed     Published Date: Sep 05, 2014

Many organizations have invested in server consolidation, particularly in their data centers. In remote offices, though, servers and storage exist as isolated islands of infrastructure that require management through separate operational processes and procedures. This approach could place data at risk. A new kind of storage architecture allows IT to consolidate remote servers and data in the data center by decoupling storage from its server over any distance—even thousands of miles—and still get the same performance as if the storage remained local to the branch. Organizations can now consolidate remote infrastructure to increase security and ef?ciency, without adversely impacting end-user performance in branch of?ces.

Tags : consolidation, servers, remote, storage, isolated islands, efficiency, security, networking
    
By: Riverbed     Published Date: Sep 05, 2014

The branch office has long been a critical dilemma for the IT organization. Branch offices for many organizations are a critical point of productivity and revenue generation, yet the branch has always come with a tremendous amount of operational overhead and risk. Worse yet, challenges are often exacerbated because the branch office too often looks like a carryover of outdated IT practices.

Tags : convergence, branch office, tco, transforming, operational overhead, it practices, networking, it management
    
By: TeamQuest     Published Date: Sep 05, 2014

TeamQuest Director of Market Development Dave Wagner and Chris Lynn, Safeway's Capacity Manager and Performance Analyst, cover the application of automatic, exception-oriented analytics to a wide variety of IT and business metrics in order to simultaneously optimize service performance and IT cost. Multiple conceptual approaches are shared, including pros and cons. Most of the presentation includes real examples by which Safeway has integrated performance, capacity, business, and power data into an automated optimization process spanning 1000s of servers and virtual servers and their applications.

Tags : automated analytics, automated optimization, it cost, power data, application performance management, business intelligence, business process automation, productivity
    
By: TeamQuest     Published Date: Sep 05, 2014

Verizon Wireless uses TeamQuest software to prove a need before purchasing hardware, to plan for peak demands, and to monitor performance on a daily basis

Tags : business activity monitoring, business intelligence, project management, service management
    
By: Sourcefire, LLC     Published Date: Sep 04, 2014

Not everyone loves a good story. Shocking media reports about intentionally-leaked classified information have commanded the public’s attention in recent years, but they are certainly not entertaining to those of us responsible for safeguarding the data. Clearly we can do more to better protect our nation’s federal agencies and classified information. What’s needed is a threat-centric approach to security that lets agencies and department leaders tackle the most pressing issues first with superior visibility, continuous control, and advanced threat protection – to defend against both insider and external threats.

Tags : sourcefire, network security, cisco, security report, cyber attack, malware, outdated software, cybersecurity
    
By: Sourcefire, LLC     Published Date: Sep 04, 2014

Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major loss and disruption to organizations and national infrastructure. These advanced attacks are very difficult to detect, remain in networks for long periods of time, and amass network resources to launch attacks elsewhere. Traditional methods that rely exclusively on detection and blocking for protection are no longer adequate. It’s time for a new security model that addresses the full attack continuum – before, during, and after an attack.

Tags : sourcefire, cisco, security report, cyber attack, malware, outdated software, cybersecurity, breaches
    
By: Sourcefire, LLC     Published Date: Sep 04, 2014

This Advanced Endpoint and Server Protection paper will dig into protecting devices against advanced attackers. We will highlight a number of new alternatives for preventing and detecting advanced malware, and examine new techniques and tools to investigate attacks and search for indicators of compromise within your environment.

Tags : securosis, sourcefire, cisco, endpoint protection, server protection, attack protection, advanced attacks, security
    
By: Sourcefire, LLC     Published Date: Sep 04, 2014

In this publication, we hope that you'll learn how to evolve your security strategy to overcome today's security challenges, take advantage of new business models, and gain more effective protections- anytime, all the time.

Tags : gartner, network security, sourcefire, cisco, security report, cyber attack, malware, outdated software
    
By: Sourcefire, LLC     Published Date: Sep 04, 2014

Making threat protection more intelligent and more accurate

Tags : network security, sourcefire, cisco, security report, cyber attack, malware, outdated software, cybersecurity
    
By: Sourcefire, LLC     Published Date: Sep 04, 2014

The goal of this paper is to give security managers information to facilitate focusing their investments on the areas that are mostly likely to impact their organizations and customers over the next several years.

Tags : cisco, network security, sourcefire, security report, cyber attack, malware, outdated software, cybersecurity
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.