IT Management White Papers

IT Management includes a variety of functions for managing computers in a networked environment, including software distribution, version control, backup & recovery, job scheduling, virus protection and performance and capacity planning.

Sub-Categories: Desktop Management, Employee Performance, ITIL, Productivity, Project Management, Sarbanes Oxley Compliance, Service Management, Software Compliance
Results 1 - 25 of 2483Sort Results By: Published Date | Title | Company Name
By: CA Technologies     Published Date: Jul 30, 2014

Join us on July 30th at 10am PT, the panelists will examine the current state of enterprise mobility programs and outline concrete steps and examples that businesses can take to reboot their own mobility efforts.

Tags : ca technologies, emm, enterprise mobility management, mobile workers, mobile devices, byod, enteprise mobility, remote access
    
By: Citrix     Published Date: Jul 25, 2014

After its extensive vendor evaluation, Gartner has recognized Citrix as a Leader, highlighting strengths in its mobile app portfolio that improve the user experience.

Tags : mobility management, citrix, mobile app, network security, remote access, mobile workers, smart phones, wireless infrastructure
    
By: Citrix     Published Date: Jul 25, 2014

Learn how Citrix XenMobile can empower your organization to move from traditional corporate issued BlackBerry devices to any user-owned mobile device without sacrificing security and control.

Tags : blackberry, byod, citrix xenmobile, control, security, mobile computing, mobile workers, smart phones
    
By: Citrix     Published Date: Jul 25, 2014

In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share security best practices for IT leaders.

Tags : network security, application security, compliance, email security, hacker detection, best practices, software compliance, pci compliance
    
By: Polycom     Published Date: Jul 24, 2014

Download this survey to learn what 5,000 business professionals around the world say are their biggest collaboration challenges—and discover the strategies they deploy to overcome them. In late 2013, Polycom invited customers and partners around the world to participate in a survey that focused on collaboration challenges. More than 5,000 business professionals from all job levels, functions and vertical sectors responded, candidly sharing insights about their obstacles and the strategies they deploy to overcome them. The survey reveals that 85% of the respondents believe video conferencing helps them achieve their business goals. See how they successfully use video in their profession and how you can leverage technology to defy distance and improve remote collaboration within your organization as well.

Tags : polycom, collaboration video conferencing, defy distance, networking, it management
    
By: Polycom     Published Date: Jul 24, 2014

Organizations today are using video conferencing and collaboration in many ways that were not imaginable just a few years ago. These implementations and use cases are delivering hard and soft benefits far beyond the cost savings associated with business travel and general purpose meetings.

Tags : polycom, video conferencing, collaboration, cost savings, it management, wireless
    
By: IBM     Published Date: Jul 22, 2014

Listen to an interactive discussion (socialcast) with a select group of IBM Data Scientists that goes beyond the tools and tackles new ways your business can use data.

Tags : ibm, it operations analytics, it operations, analytical applications, data, big data, it app infrastructure, cloud
    
By: Citrix     Published Date: Jul 18, 2014

This Citrix Key Project Design Guide provides an overview of the solution architecture and implementation used in the key project on remote access for enterprise PCs.

Tags : citrix, enterprise pc, remote access, remote network management, network architecture, mobile workers, xendesktop, wireless infrastructure
    
By: Sirius Computer Solutions, Inc.     Published Date: Jul 17, 2014

Recipe for Dramatically Improving Application Performance, Storage Capacity and Total Cost of Ownership

Tags : sirius computer solutions, ibm, application performance, storage capacity, cost of ownership, flash technology, storage, it management
    
By: Sirius Computer Solutions, Inc.     Published Date: Jul 17, 2014

To capitalize on sales opportunities through deeper insights into customer demand, CCBCC needed to crunch more data without increasing time-to-insight, while meeting existing service-level agreements.

Tags : sirius computer solutions, ibm, application performance, storage capacity, cost of ownership, flash technology, storage, it management
    
By: Sirius Computer Solutions, Inc.     Published Date: Jul 17, 2014

Download to read how organizations like Coca-Cola Bottling Company Consolidated are now up to speed with IBM FlashSystem.

Tags : sirius computer solutions, ibm, application performance, storage capacity, cost of ownership, flash technology, storage, it management
    
By: Citrix     Published Date: Jul 17, 2014

This paper addresses many common business challenges facing IT organizations, such as enabling mobile workstyles without compromising security, streamlining desktop management efforts as the number of employees in remote offices and offshore locations increases and making the user experience personal through self-service access to applications and desktops.

Tags : citrix, xenapp, mobile workers, mobile workforce, desktop management, virtual desktop, virtualization, roi
    
By: AlienVault     Published Date: Jul 16, 2014

“AlienVault's USM is tailor-made for the needs of the security-savvy SMB. It offers affordability, and a comprehensive and ever-increasing feature set powered by the respectable AV Labs and Open Threat Exchange.” In this analyst report, Javvad Malik of The 451 Group, reviews AlienVault's SMB-focused approach to SIEM and discusses the competitive landscape.

Tags : alienvault, alienvault usm, security operations center, smb, javvad malik, the 451 group, siem, security-savvy smb
    
By: CA Technologies     Published Date: Jul 16, 2014

This paper provides findings and statistics on users demands and an important list of 5 ways to satisfy both business and user demands for IT Service.

Tags : cloud service management, mobile computing, mobile data systems, customer interaction service, service management, cloud computing
    
By: CA Technologies     Published Date: Jul 16, 2014

This paper focuses on the changing demands from consumers and how the right IT Management Solution can help.

Tags : it service management, changing consumer demands, consumer experience, byod, saas, mobile computing, enterprise software, web service management
    
By: Riverbed     Published Date: Jul 15, 2014

Application environments and the underlying IT infrastructure that supports them are becoming much more dynamic and complicated. New architectures are being deployed to help accelerate time to market, applications are distributed and modular, leveraging web-based or Service Oriented Architectures (SOA). Read this to learn the latest trends.

Tags : big data, integrated, end-user, experience, it infrastructure, networking, it management, data management
    
By: Riverbed     Published Date: Jul 15, 2014

Your business is complex. Big data promises to manage this complexity to make better decisions. But the technology services that run your business are also complex. Many are too complex to manage easily, fueling more complexity, delays, and downtime. Forrester predicts this will inevitably get worse. To combat this onslaught, you can no longer just accelerate current practices or rely on human intelligence. You need machines to analyze conditions to invoke the appropriate actions. These actions themselves can be automated. To perform adaptive, full-service automation, you need IT analytics, a disruption to your existing monitoring and management strategy.

Tags : big data analysis, it analytics, manage, complex, automation, monitoring, management strategy, networking
    
By: Nginx     Published Date: Jul 15, 2014

Users demand fast application delivery and it is essential for the survival of your business. Meeting the expectations of your users is challenging. NGINX Plus offers a broad array of solutions to solve these challenges, allowing you to delight your users.

Tags : nginx, application delivery, web servers, application infrastructure, apache http server, high availability, load balancing, server performance
    
By: Riverbed     Published Date: Jul 15, 2014

The intelligent economy is here, and it is transforming IT's mandate to deliver business value to the enterprise. Businesses recognize that to remain competitive, they need to embrace a broader array of collaborative applications and create ubiquitous access to these applications at the far reaches of the globe. Ensuring IT is the "must have" resource in new revenue-generating opportunities is top of mind for all IT professionals.

Tags : business value, roi, application-awareness, network performance, network management, network performance management, it spending, return on investment
    
By: Neustar     Published Date: Jul 14, 2014

More and more criminals are using DDoS attacks as a distraction or “smokescreen” for other cybercrimes like theft of data or even funds. Watch this video for a behind-the-scenes tour of what this “underground economy” of the Internet really looks like – a place where criminals sell stolen credit cards and credentials by the thousands, offer botnets, malware, and DDoS for hire, and much more

Tags : neustar, ddos, cybercrimes, malware, botnets, stolen cards, smokescreens, underground economy
    
By: Neustar     Published Date: Jul 14, 2014

For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger? What new tactics are criminals employing? See this infographic for clues.

Tags : neustar, blackbeard, pirate, siteprotect, cloud computing, ddos, it department, security
    
By: Neustar     Published Date: Jul 14, 2014

It’s no secret that DDoS attacks are worsening by the day. From the largest financial institutions to smaller Internet companies, everyone’s a target. Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size. Most of these conversations boil down to three key questions and form the conversation you should be having, too—whether you use Neustar, another provider or your in-house team to manage your external DNS.

Tags : neustar, ddos, ecommerce, protection, security, malware, technology, it departments
    
By: Neustar     Published Date: Jul 14, 2014

Historically, communication service providers (CSPs) have viewed network transformation through the narrow lens of technology, as though it were a simple matter of upgrading equipment. But in reality, the solution is much more complex. To ensure a smooth transition to an all-IP network, it’s essential for each area of the business (IT, marketing and operations) to work together and consistently communicate throughout the journey.

Tags : neustar, network transformation, csps, communication service providers, ip networks, marketing, operations, it management
    
By: Neustar     Published Date: Jul 14, 2014

DDoS attacks against high-tech firms have started to take a dangerous turn. It’s called DDoS smokescreening — attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property. This is just one insight in Neustar’s 2014 Annual DDoS Attacks and Impact Survey. The resulting report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology products and/or services such as software, SaaS, IaaS as well as hardware manufacturers

Tags : neustar, ddos, online gaming, ecommerce, protection, security, malware, technology
    
By: AlienVault     Published Date: Jul 14, 2014

While vulnerability assessments are essential, considering vulnerability data in a vacuum greatly limits your ability to prioritize your action plan in an effective way. Without the context of which vulnerabilities are the most severe, which are actively being targeted, which are on critical assets, etc, you may waste time checking things off the list without actually improving security. Join us for this session to learn how to integrate threat intelligence into your vulnerability management strategy.

Tags : alienvault, threat intelligence, vulnerability assessments, vulnerability data, security, it management, knowledge management
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.