IT Management White Papers

IT Management includes a variety of functions for managing computers in a networked environment, including software distribution, version control, backup & recovery, job scheduling, virus protection and performance and capacity planning.

Sub-Categories: Desktop Management, Employee Performance, ITIL, Productivity, Project Management, Sarbanes Oxley Compliance, Service Management, Software Compliance
Results 1 - 25 of 2985Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Jan 29, 2015

Mobility is no longer an IT trend: It is the new reality for how technology is deployed for business benefit. Research and consulting firm Forrester refers to this tidal wave of change as the “mobile mind shift” and emphasizes that it is more important than ever for enterprises to get it right the first time. But getting it right means more than just launching a customer app, implementing enterprise mobile policies, improving mobile device security or creating campus-wide hot spots. It means developing and continuously delivering mobile applications that truly make a difference for employees, business partners and customers. Increasingly, that means adopting new ways of thinking about how best to develop and manage mobile applications.

Tags : mobile mind shift, it trends, mobility policies, mobile device security, security, it management, knowledge management, enterprise applications
    
By: Lenovo     Published Date: Jan 29, 2015

This paper begins with an examination of BYOPC and its shortcomings. It closes with a look toward the future – Consumerization – and how cloud and web services are combining to finally deliver on the advantage of the new realities of BYOD.

Tags : consumerization, advantage, byod, cloud, web services, it management, enterprise applications
    
By: NextGen     Published Date: Jan 29, 2015

Learn how Mirth’s HIE solution can support your growth, ease data sharing, and help you reach your goals. In this case study, you'll learn why the Chesapeake Regional Information System for our Patients (CRISP) moved to Mirth® solutions.

Tags : mirth, hiw, total cost, erp, system, information, connect, technology
    
By: Kenandy     Published Date: Jan 28, 2015

Are you considering moving some or all of your ERP to the cloud? If so, you’re aware of the many bene?ts of cloud ERP, including quick time to value, social and mobile collaboration for your users, and the ?exibility to rapidly adapt your processes as your business changes. But, you may be asking—how should I start my journey to cloud ERP? Which is the best route for my company? In this white paper, we illuminate the high-value routes customers take to cloud ERP and drivers behind their choices. You will learn about the options to consider along the way and how to stay on track. Whatever road you choose, it’s important that you get started. Cloud ERP is not just a destination, it’s a transformation that will give your company faster time to value and the ?exibility to quickly adapt to changing business needs.

Tags : cloud erp, quick time to value, high-value routes, it management, data center
    
By: IBM     Published Date: Jan 26, 2015

IBM Bluemix, a robust platform as a service (PaaS) to host and deploy your app, also provides a wide range of enterprise grade tools that can be used in your applications to run your business needs. The Analytics Warehouse Service available in IBM Bluemix provides a powerful, easy-to-use, and agile platform for business intelligence (BI) and analytics tasks. Check out this upcoming webcast to learn how you can create a ready-to-use BI and analytics service on Bluemix, in just a few clicks, and even access those results on an Android app.

Tags : analytics service, open cloud platform, ibm, web developers, mobile developers, business integration, security, it management
    
By: IBM     Published Date: Jan 26, 2015

Join us for this webcast to learn about how IBM offers a solution that enables our clients to use continuous quality as an effective means of mobile application development.

Tags : mobile quality assurance, mobile apps, time-to-feedback, mobile trends, it management, enterprise applications, data management
    
By: IBM     Published Date: Jan 26, 2015

There is an exponential increase in connected devices that are producing data about our homes, health, cars, and everything in between. The Internet of things (IoT) is exploding into apps that allow users to see and interact with these devices. Watson can enable IoT apps to understand the meaning and intent of the users that interact with these connected devices. Check out this webcast to learn how the cognitive services from IBM Watson available on Bluemix can make IoT apps be intelligent, overcome complexity, and support discovery and decision making.

Tags : ibm, bluemix, big data, intent, iot, it management, knowledge management, enterprise applications
    
By: IBM     Published Date: Jan 23, 2015

Dominant trends in IT today such as Cloud, Mobile and Smarter Physical Infrastructures are generating massive amounts of corporate data. The inherent value of this data coupled with the increasing complexity of IT environments is forcing those tasked with data protection to re-evaluate their approaches. Join this session to understand how you can reduce the cost and complexity of backup and recovery while ensuring comprehensive data protection across virtual environments, core applications and remote sites.

Tags : it trends, it environments, smarter physical infrastructures, data protection, it management, knowledge management, enterprise applications, data management
    
By: IBM     Published Date: Jan 23, 2015

Organizations are shifting to Cloud to improve agility, reduce costs and increase IT efficiency. To achieve the benefits promised by Cloud, your storage infrastructure needs to be virtualized and provide the required automation and management capabilities. Watch this webinar to learn how you can quickly convert existing storage to Cloud storage, standardize advanced data protection capabilities, and utilize advanced data-driven analytics to optimize tiering across storage systems --- reducing per unit storage costs up to 50% and freeing up valuable IT budget.

Tags : storage environment, cloud storage, it efficiency, cloud agility, data-driven analytics, it management, knowledge management, enterprise applications
    
By: Cisco     Published Date: Jan 23, 2015

Download the Forrester Consulting Total Economic Impact Calculator for SMARTnet to find out what savings your company can realize from your Cisco SMARTnet Service.

Tags : calculator, network, empowering, smartnet, consulting, saving, networking, it management
    
By: Lenovo     Published Date: Jan 22, 2015

Looking for smarter solutions for anywhere agency productivity? Watch webNetwork for Government and learn how webNetwork Unified Workspaces are the right choice for secure, reliable, mission-ready mobility. No more worries about balancing competing priorities around access, accountability, and cost - webNetwork makes IT management easy with simple deployment and a superb end-user experience.

Tags : webnetwork, byod, webnetwork unified workspaces, it management, cloud-powered solutions, vdi or cloud
    
By: Verisign     Published Date: Jan 22, 2015

As a leader in domain management and internet security, Verisign’s network supports more than 82 billion transactions on a daily basis, enabling nearly 50 percent of the internet’s domains. Building networks to survive the largest DDoS attacks on the internet is part of Verisign’s heritage, and Verisign has been using DDoS mitigation techniques for more than 16 years while protecting the .com and .net infrastructures. This gives Verisign the ability to flex its entire 1+ tbps infrastructure as needed in real-time response to attack scenarios against itself and its customers.

Tags : network capabilities, ddos attack mitigation, domain management, internet security, it infrastructure, internet domains, it management, enterprise applications
    
By: Verisign     Published Date: Jan 22, 2015

The Verisign Distributed Denial of Service (DDoS) Trends Report contains the observations and insights derived from mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services, and the security research of Verisign iDefense Security Intelligence Services. It represents a unique view into the attack trends unfolding online for the previous quarter, including attack statistics, DDoS malicious code analysis and behavioral trends

Tags : service trends report, ddos, security research, it security analytics, ssdp vulnerability, security, it management, data management
    
By: Verisign     Published Date: Jan 22, 2015

Cyber security threats have become more pervasive and damaging than ever, ranging from advanced persistent threats to massive distributed denial of service (DDoS) attacks. By moving toward a more holistic, proactive approach to addressing all potential DDoS security threats, you help ensure the availability and security of your business-critical network even as zero-day threats emerge and known threats evolve.

Tags : ddos protection, cyber security threats, cloud-based protection, best practices, security, it management, enterprise applications, data management
    
By: Verisign     Published Date: Jan 22, 2015

To tackle the advanced DDoS threats of today and tomorrow, it is increasingly clear that cloud DDoS mitigation providers must rapidly innovate solutions and implement them quickly on a global scale. To help meet the performance, availability and functional requirements of operating critical Internet infrastructure, Verisign developed its innovative DDoS mitigation platform, called Athena. This technical report describes the Athena platform, a globally distributed DDoS mitigation system that provides comprehensive protection against network- and application-layer attacks, and specializes in mitigating Layer-7 and Secure Sockets Layer (SSL)-based attacks

Tags : mitigation platform, ddos threats, internet infrastructure, ssl based attacks, application-layer attacks, security, it management, enterprise applications
    
By: Verisign     Published Date: Jan 22, 2015

Download this important report and learn why utilizing the expertise and resources of a cloud-based provider is the only sound solution.

Tags : cloud defenses, ddos attacks, cloud-based provider, cyber attacks, security, it management, knowledge management, enterprise applications
    
By: Verisign     Published Date: Jan 22, 2015

Versign OpenHybridTM is a Verisign DDoS Protection Services architecture that enables interoperability between on-premise and cloud-based platforms. An easy to use tool (Open API), allows customers to leverage existing security perimeter devices to signal threat information to the Verisign DDoS protection cloud, when the capabilities of the device are exceeded. Verisign OpenHybrid™ can also be applied to monitor and protect services hosted within other public and private cloud services.

Tags : api specification, cloud signaling, ddos attacks, threat visibility, risk mitigation, security, it management, knowledge management
    
By: Verisign     Published Date: Jan 22, 2015

Distributed Denial of Service (DDoS) attacks are a threat to businesses worldwide and the attacks are getting larger and more sophisticated. The industry’s approach to protecting against DDoS attacks must change, and change fundamentally, to stay ahead of this growing threat. Read this blog today to find out how to stay ahead of these attacks!

Tags : ddos, ddos attacks, it security risk, risk mitigation, security, it management, knowledge management, enterprise applications
    
By: ThreatTrack Security     Published Date: Jan 22, 2015

Stillwater Medical Center: Healthcare provider with 1,000 employees chooses VIPRE after its old antivirus kept crashing systems, disrupting operations and failing to protect against malware infections. Learn how this hospital cured its antivirus ills with VIPRE.

Tags : threattrack, security, threat, track, information, admins, best, practices
    
By: ThreatTrack Security     Published Date: Jan 22, 2015

It’s Time Businesses Wake up to the Mobile Security Reality - Bring Your Own Device (BYOD) is here to stay, and so are the associated risks. IT administrators face a new reality: pressure to account for, manage and secure an array of new endpoints. It's a giant task given the influx of smartphones and tablets, and the corresponding employee expectation - if not outright demand - for connection to the office at all times.

Tags : threattrack, security, threat, track, information, admins, best, practices
    
By: ThreatTrack Security     Published Date: Jan 22, 2015

According to the report ‘Trail Blazers’ “hold the power to dethrone the current market leaders…[and] often shape the future of technology with their innovations and new product designs.” VIPRE was evaluated alongside nearly a dozen endpoint security products and was called a “highly capable solution for small and midsize enterprises with advanced needs that are looking for a solution that is easy to manage and deploy.”

Tags : threattrack, security, threat, track, information, admins, best, practices
    
By: ThreatTrack Security     Published Date: Jan 22, 2015

South Staffordshire College: A U.K. college with 4 campuses, 4,000 students and 500 employees became frustrated with its Kaspersky antivirus and discovered that VIPRE proves robust malware defense doesn’t have to disrupt operations, slow down machines or be difficult to manage.

Tags : threattrack, security, threat, track, information, admins, best, practices
    
By: ThreatTrack Security     Published Date: Jan 22, 2015

AtNetPlus - As an IT services company on the front lines of network defense, AtNetPlus takes choosing antivirus software very seriously. After rigorous testing of multiple antivirus products, their IT specialist chose VIPRE for its small footprint and reliable malware detections.

Tags : threattrack, security, threat, track, information, admins, best, practices
    
By: Cisco     Published Date: Jan 21, 2015

As the Internet of Everything (IoE) drives exponential change — and opportunity — customers and retailers face a complex maze of shopping journeys. Mobility and apps now represent a disruption similar in scope to what we saw with e-commerce in the late 1990s and early 2000s. In the second quarter of 2014, total discretionary retail spending rose 3 percent; e-commerce rose 10 percent; and mobile commerce rose 47 percent.

Tags : digital, shopping, journey, retail, mobility, apps, e-commerce, it management
    
By: JumpCloud     Published Date: Jan 21, 2015

Learn how modern organizations are now easily implementing innovative directory services and the consequences some organizations face by not implementing one.

Tags : ldap, active directory, user management, iam, ssh access, linux, hosted ldap, openldap
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.