IT Management White Papers

IT Management includes a variety of functions for managing computers in a networked environment, including software distribution, version control, backup & recovery, job scheduling, virus protection and performance and capacity planning.

Sub-Categories: Desktop Management, Employee Performance, ITIL, Productivity, Project Management, Sarbanes Oxley Compliance, Service Management, Software Compliance
Results 1 - 25 of 3111Sort Results By: Published Date | Title | Company Name
By: CDW     Published Date: Feb 27, 2015

CDW’s Technology Insights guides provide a high-level, informative take on today’s most pressing IT solution areas and related issues. Speaking to the interests and concerns of IT managers and their staff, as well as their enterprise counterparts, the guides provide up-to-date summaries, strategic guidance and best practice tips on the technologies driving IT operations forward. Some of the topics covered in this Total Software Management Technology Insights guide includes trends, lessons, key solutions, cloud, and audits.

Tags : software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
    
By: CDW     Published Date: Feb 27, 2015

Man Investments is one of the world’s largest independent alternative asset managers. With a fast moving and diverse IT infrastructure, Man needed to be able to automate software license compliance reporting in conjunction with optimizing license usage and sourcing.

Tags : software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
    
By: CDW     Published Date: Feb 27, 2015

Bank of Ireland is a leading retail and commercial bank. Snow has helped Bank of Ireland streamline and optimize its software licensing.

Tags : software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
    
By: CDW     Published Date: Feb 27, 2015

The real test of any SAM system goes beyond creating a one-time Effective Licensing Position (ELP) for a given software publisher. To be truly valuable, the SAM solution has to have the ability to manage change. Being able to work from a dependable list of software that has been approved by, and which also serves the business, means that finite IT & SAM resources are not wasted through the support of legacy software that might be deemed redundant, and should keep a company on track technically by not becoming dependent on aging software. This 10 –Minute Guide from SAM experts at Snow Software will show how to establish and maintain a Software Catalog for the purpose of ensuring that your software estate remains relevant and fit for its business purpose.

Tags : software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
    
By: CDW     Published Date: Feb 27, 2015

In a perfect world, managing the discovery of software assets, the capture of license entitlements and optimization of an organization’s software usage and compliance situation would be a single-click operation. Unfortunately, the world is not perfect and those charged with managing an organization’s software compliance, availability and expenditure face a number of challenges that can easily derail a Software Asset Management (SAM) program. This paper from the SAM experts at Snow Software investigates some of the major challenges facing SAM managers and IT executives and highlights how to build a successful strategy to overcome them, ensuring the SAM program delivers true value to the business.

Tags : software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
    
By: Acquia     Published Date: Feb 26, 2015

The impact of commerce on modern business is undeniable. From changing the retail experience to the introduction of pure pricing transparency, online shopping is now the primary way that brands interact with loyal and prospective customers. In this ebook, we’ll look at the trends sweeping over the commerce landscape and show you how you can take advantage of the content and commerce combination to sell your story.

Tags : audience segmentation, commerce-content connection, online shopping, acquia, it management, knowledge management, enterprise applications
    
By: IBM     Published Date: Feb 24, 2015

Read this Forrester whitepaper to learn more about the critical, yet often overlooked, role that data classification and data discovery can play in reducing your organization's risk and enhancing security.

Tags : ibm, data discovery, data classification, big data, risk mitigation, security, it management, data management
    
By: IBM     Published Date: Feb 24, 2015

Big data analytics offer organizations an unprecedented opportunity to derive new business insights and drive smarter decisions. The outcome of any big data analytics project, however, is only as good as the quality of the data being used. Although organizations may have their structured data under fairly good control, this is often not the case with the unstructured content that accounts for the vast majority of enterprise information. Good information governance is essential to the success of big data analytics projects. Good information governance also pays big dividends by reducing the costs and risks associated with the management of unstructured information. This paper explores the link between good information governance and the outcomes of big data analytics projects and takes a look at IBM's StoredIQ solution.

Tags : big data, ibm, big data outcomes, information governance, big data analytics, it management, data management, data center
    
By: IBM     Published Date: Feb 24, 2015

This paper asks the key questions that IT, legal, records, compliance officers and corporate managers should consider when contemplating an information lifecycle governance solution, and why these elements are critical in addressing e-discovery challenges.

Tags : ibm, lifecycle governance, e-discovery, e-discovery challenges, ilg solutions, it management, knowledge management, data management
    
By: IBM     Published Date: Feb 24, 2015

Mobile capture is quickly becoming an important differentiators for many companies and organizations, especially those in traditionally document-intensive fields like banking, insurance, healthcare and government operations. According to a 2014 study conducted by AIIM, 45% of companies feel that mobile capture is vitally important, pointing to the competitive need for improved process agility and customer service across the board. Discover the top 10 questions to ask before you make your investment in mobile capture.

Tags : mobile capture, ibm, process agility, customer service, it management, knowledge management, enterprise applications
    
By: IBM     Published Date: Feb 24, 2015

Read this report from AIIM to discover what issues on-premise ECM users are facing, how external collaboration support is managed, what cloud and mobile functionalities users are requesting, and what alternative scenarios are being considered.

Tags : ibm, ecm, ecm users, mobile funtionalities, cloud functionalities, it management, knowledge management, enterprise applications
    
By: IBM     Published Date: Feb 24, 2015

Read this report from Forrester Research to learnhow IBM ACM solutions improve the efficiency of knowledge workers, integrate with analytics to create upselling and cross-selling opportunities and reduce the cost and risk of regulatory fines through increased audit consistency.

Tags : ibm, acm solutions, cross-selling opportunities, audit consistency, it management, knowledge management, enterprise applications
    
By: IBM     Published Date: Feb 24, 2015

In an unpredictable world, forecasting errors are unavoidable. This webinar offers some valuable guidance, in the form of Six Principles of Forecast Mastery, which point the way to a better future. Watch today and learn why treating forecast error as a friend can help you improve your organization's performance.

Tags : forecasting errors, quality forecasting, best practices, business performance solutions, knowledge management, enterprise applications, analytical applications, productivity
    
By: CDW     Published Date: Feb 24, 2015

Software piracy, whether accidental or malicious, is a problem for software vendors as these activities can directly affect the bottom line. Organizations that use software are affected as well. Along with rising software prices, they can face stiff fines and other costs for noncompliance with software licenses. This can come as a result of an audit that software vendors are more inclined to initiate in a lackluster economy. This white paper will discuss actions to take before, during and after an audit. As well as outline the best ways for the enterprise to remain compliant with software licenses.

Tags : software piracy, software vendors, audit, software licenses, software compliance, piracy misconceptions, auditing, compliance
    
By: CDW     Published Date: Feb 24, 2015

The fundamentals of security and management of software have not changed. But the new computing environment – mobile devices, cloud computing and virtualization – requires new approaches to familiar challenges. What’s more, software publishers are bringing a new energy to their own vigilance. A capricious economy has many of them stepping up the number of customer audits. As organizations deal with these software licensing challenges, they also face increasingly sophisticated security threats that continuously morph, just a step ahead of remedies to stop them. Organizations need a comprehensive approach to security and software asset management. This white paper will examine the interconnection between SAM and security, offering practical advice on how enterprises can protect themselves and where to go for support.

Tags : software asset management, it enterprise, software licensing, mobility, cloud computing, data protection, data management, software testing
    
By: CDW     Published Date: Feb 24, 2015

All organizations require software systems to conduct daily operations. These strategic enterprise assets are often acquired or created in isolation of each other as an organization grows, particularly for those that provide services rather than physical products. Over time, these systems become complex, overlapping and highly dependent on one another, so more effort must be expended to discover the full effects of any system change. The ability of an entity to update, replace or improve the overall capabilities of the enterprise can become severely impaired. Moreover, support and administrative costs for these critical assets inevitably grow to be a major burden. Add to all this the need to control licensing, follow the organization’s policies and ensure security for the internal network, and it becomes clear that some manner of oversight is required for the enterprise to be successful.

Tags : sam, software asset management, strategic enterprise assets, license utilization, cloud based computing, network security, software compliance, vulnerability management
    
By: CDW     Published Date: Feb 24, 2015

Learn how software asset management can play the crucial role of cataloging and managing the myriad of software elements that could possibly pose a threat to network security at your enterprise.

Tags : software asset management, network security, licensing, cloud-based apps, licensing security, security management strategies, application security, security management
    
By: CDW     Published Date: Feb 24, 2015

Software asset management (SAM) solutions promise to fix all that. They present a set of tools, practices and processes that take the uncertainty out of software licensing and enable organizations to fully optimize software inventories.

Tags : software license, software compliance, software asset management, sam, strategic license management, cloud-based services, virtualization, network security
    
By: HGST     Published Date: Feb 23, 2015

Learn how to best understand flash-based architectures and see how with this webcast you will learn the pros and cons of relevant flash technologies, while also learning how to choose from among the many alternatives.

Tags : flash, hgst, flash architecture, sans, it management
    
By: BitSight Technologies     Published Date: Feb 20, 2015

Download "Continuous Third Party Security Monitoring Powers Business Objectives And Vendor Accountability" (a commissioned study conducted by Forrester Consulting on behalf of BitSight) to learn how companies are continuously managing third party risk.

Tags : bitsight technologies, security, cyber attacks, monitoring, third party security monitoring, third party risk, risk management, it management
    
By: Bit9     Published Date: Feb 20, 2015

You can’t open a newspaper or visit an online news site these days without some mention of a cyber-attack or data breach. These activities are becoming more prevalent, and as a result, the reporting of these activities is also on the rise. Bit9 + Carbon Black reached out to a series of experts to collect their thoughts and advice on dealing with data security incidents or breaches.

Tags : breach preparation, data breaches, bit9, it data security, security, it management, enterprise applications, business intelligence
    
By: Bit9     Published Date: Feb 20, 2015

Businesses need to view security as a process and leverage solutions that can proactively collect data, apply aggregated threat intelligence, reduce the cost and complexity of incident response and evolve, adapt and learn from your investigation. This eGuide will cover how a continuous approach to response can resolve these challenges and put your organization in a better security posture by proactively preparing for a breach.

Tags : it threat intelligence, aggregated data, bit9, security solutions, incident response, security, it management, enterprise applications
    
By: Bit9     Published Date: Feb 20, 2015

Most organizations have not proactively prepared for a breach. In fact, a majority of incident responders (52 percent) say they lack the necessary visibility into endpoint vulnerabilities. Without continuous data collection at the endpoint, preparing and responding to a breach is exponentially hampered. Download the SANS Institute’s latest industry survey to understand these key findings.

Tags : endpoint data, bit9, ir capabilities, siem integration tools, security, it management, enterprise applications, business intelligence
    
By: Bit9     Published Date: Feb 20, 2015

With the number of advanced attacks increasing every day—most undiscovered through traditional detection and response solutions—truly hunting for threats within your environment can be a laborious task. To combat this, enterprises must focus on prioritizing endpoint data collection over detection, leveraging comprehensive threat intelligence, and expanding detection beyond the moment of compromise.

Tags : advanced attacks, bit9, endpoint data, it threat intelligence, it security solutions, security, it management, enterprise applications
    
By: Extreme Networks     Published Date: Feb 20, 2015

Use these questions to help decide which vendor’s SDN platform is best equipped to support your organization as you face a rapidly changing world of technology.

Tags : sdn platform, sdn solutions, software-defined networking, it solutions, it management, enterprise applications, data management
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.