IT Management White Papers

IT Management includes a variety of functions for managing computers in a networked environment, including software distribution, version control, backup & recovery, job scheduling, virus protection and performance and capacity planning.

Sub-Categories: Desktop Management, Employee Performance, ITIL, Productivity, Project Management, Sarbanes Oxley Compliance, Service Management, Software Compliance
Results 1 - 25 of 2491Sort Results By: Published Date | Title | Company Name
By: Citrix     Published Date: Jul 18, 2014

This Citrix Key Project Design Guide provides an overview of the solution architecture and implementation used in the key project on remote access for enterprise PCs.

Tags : citrix, enterprise pc, remote access, remote network management, network architecture, mobile workers, xendesktop, wireless infrastructure
    
By: LogMeIn     Published Date: Jul 18, 2014

This report will explore some of the support services issues, and how support organizations can make the shift needed to meet their customers' needs.

Tags : logmein rescue, support services, customer support, reoporting, system management, network management, network performance management, mobile computing
    
By: Sirius Computer Solutions, Inc.     Published Date: Jul 17, 2014

Recipe for Dramatically Improving Application Performance, Storage Capacity and Total Cost of Ownership

Tags : sirius computer solutions, ibm, application performance, storage capacity, cost of ownership, flash technology, storage, it management
    
By: Sirius Computer Solutions, Inc.     Published Date: Jul 17, 2014

To capitalize on sales opportunities through deeper insights into customer demand, CCBCC needed to crunch more data without increasing time-to-insight, while meeting existing service-level agreements.

Tags : sirius computer solutions, ibm, application performance, storage capacity, cost of ownership, flash technology, storage, it management
    
By: Sirius Computer Solutions, Inc.     Published Date: Jul 17, 2014

Download to read how organizations like Coca-Cola Bottling Company Consolidated are now up to speed with IBM FlashSystem.

Tags : sirius computer solutions, ibm, application performance, storage capacity, cost of ownership, flash technology, storage, it management
    
By: Citrix     Published Date: Jul 17, 2014

This paper addresses many common business challenges facing IT organizations, such as enabling mobile workstyles without compromising security, streamlining desktop management efforts as the number of employees in remote offices and offshore locations increases and making the user experience personal through self-service access to applications and desktops.

Tags : citrix, xenapp, mobile workers, mobile workforce, desktop management, virtual desktop, virtualization, roi
    
By: AlienVault     Published Date: Jul 16, 2014

“AlienVault's USM is tailor-made for the needs of the security-savvy SMB. It offers affordability, and a comprehensive and ever-increasing feature set powered by the respectable AV Labs and Open Threat Exchange.” In this analyst report, Javvad Malik of The 451 Group, reviews AlienVault's SMB-focused approach to SIEM and discusses the competitive landscape.

Tags : alienvault, alienvault usm, security operations center, smb, javvad malik, the 451 group, siem, security-savvy smb
    
By: CA Technologies     Published Date: Jul 16, 2014

This paper provides findings and statistics on users demands and an important list of 5 ways to satisfy both business and user demands for IT Service.

Tags : cloud service management, mobile computing, mobile data systems, customer interaction service, service management, cloud computing
    
By: CA Technologies     Published Date: Jul 16, 2014

This paper focuses on the changing demands from consumers and how the right IT Management Solution can help.

Tags : it service management, changing consumer demands, consumer experience, byod, saas, mobile computing, enterprise software, web service management
    
By: Riverbed     Published Date: Jul 15, 2014

Application environments and the underlying IT infrastructure that supports them are becoming much more dynamic and complicated. New architectures are being deployed to help accelerate time to market, applications are distributed and modular, leveraging web-based or Service Oriented Architectures (SOA). Read this to learn the latest trends.

Tags : big data, integrated, end-user, experience, it infrastructure, networking, it management, data management
    
By: Riverbed     Published Date: Jul 15, 2014

Your business is complex. Big data promises to manage this complexity to make better decisions. But the technology services that run your business are also complex. Many are too complex to manage easily, fueling more complexity, delays, and downtime. Forrester predicts this will inevitably get worse. To combat this onslaught, you can no longer just accelerate current practices or rely on human intelligence. You need machines to analyze conditions to invoke the appropriate actions. These actions themselves can be automated. To perform adaptive, full-service automation, you need IT analytics, a disruption to your existing monitoring and management strategy.

Tags : big data analysis, it analytics, manage, complex, automation, monitoring, management strategy, networking
    
By: Nginx     Published Date: Jul 15, 2014

Users demand fast application delivery and it is essential for the survival of your business. Meeting the expectations of your users is challenging. NGINX Plus offers a broad array of solutions to solve these challenges, allowing you to delight your users.

Tags : nginx, application delivery, web servers, application infrastructure, apache http server, high availability, load balancing, server performance
    
By: Riverbed     Published Date: Jul 15, 2014

The intelligent economy is here, and it is transforming IT's mandate to deliver business value to the enterprise. Businesses recognize that to remain competitive, they need to embrace a broader array of collaborative applications and create ubiquitous access to these applications at the far reaches of the globe. Ensuring IT is the "must have" resource in new revenue-generating opportunities is top of mind for all IT professionals.

Tags : business value, roi, application-awareness, network performance, network management, network performance management, it spending, return on investment
    
By: Neustar     Published Date: Jul 14, 2014

More and more criminals are using DDoS attacks as a distraction or “smokescreen” for other cybercrimes like theft of data or even funds. Watch this video for a behind-the-scenes tour of what this “underground economy” of the Internet really looks like – a place where criminals sell stolen credit cards and credentials by the thousands, offer botnets, malware, and DDoS for hire, and much more

Tags : neustar, ddos, cybercrimes, malware, botnets, stolen cards, smokescreens, underground economy
    
By: Neustar     Published Date: Jul 14, 2014

For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger? What new tactics are criminals employing? See this infographic for clues.

Tags : neustar, blackbeard, pirate, siteprotect, cloud computing, ddos, it department, security
    
By: Neustar     Published Date: Jul 14, 2014

It’s no secret that DDoS attacks are worsening by the day. From the largest financial institutions to smaller Internet companies, everyone’s a target. Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size. Most of these conversations boil down to three key questions and form the conversation you should be having, too—whether you use Neustar, another provider or your in-house team to manage your external DNS.

Tags : neustar, ddos, ecommerce, protection, security, malware, technology, it departments
    
By: Neustar     Published Date: Jul 14, 2014

Historically, communication service providers (CSPs) have viewed network transformation through the narrow lens of technology, as though it were a simple matter of upgrading equipment. But in reality, the solution is much more complex. To ensure a smooth transition to an all-IP network, it’s essential for each area of the business (IT, marketing and operations) to work together and consistently communicate throughout the journey.

Tags : neustar, network transformation, csps, communication service providers, ip networks, marketing, operations, it management
    
By: Neustar     Published Date: Jul 14, 2014

DDoS attacks against high-tech firms have started to take a dangerous turn. It’s called DDoS smokescreening — attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property. This is just one insight in Neustar’s 2014 Annual DDoS Attacks and Impact Survey. The resulting report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology products and/or services such as software, SaaS, IaaS as well as hardware manufacturers

Tags : neustar, ddos, online gaming, ecommerce, protection, security, malware, technology
    
By: AlienVault     Published Date: Jul 14, 2014

While vulnerability assessments are essential, considering vulnerability data in a vacuum greatly limits your ability to prioritize your action plan in an effective way. Without the context of which vulnerabilities are the most severe, which are actively being targeted, which are on critical assets, etc, you may waste time checking things off the list without actually improving security. Join us for this session to learn how to integrate threat intelligence into your vulnerability management strategy.

Tags : alienvault, threat intelligence, vulnerability assessments, vulnerability data, security, it management, knowledge management
    
By: AlienVault     Published Date: Jul 14, 2014

Event logs provide valuable information to troubleshoot operational errors, and investigate potential security exposures. They are literally the bread crumbs of the IT world. As a result, a commonly-used approach is to collect logs from everything connected to the network "just in case" without thinking about what data is actually useful. But, as you're likely aware, the "collect everything" approach can actually make threat detection and incident response more difficult as you wade through massive amounts of irrelevant data. Join us for this session to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements.

Tags : alienvault, troubleshooting operational errors, potential security exposures, satisfy compliance requirements, security, it management, knowledge management
    
By: AlienVault     Published Date: Jul 14, 2014

Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources. In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.

Tags : alienvault, limited resources, it time management, it prioritization, it management, security
    
By: AlienVault     Published Date: Jul 14, 2014

If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. In this practical webinar, PCI DSS compliance experts walk through strategies for taking the pain out of PCI DSS reporting.

Tags : alienvault, pci dss reporting, pci dss compliance, it management, knowledge management
    
By: IBM     Published Date: Jul 14, 2014

In this Frost & Sullivan Executive Brief, you will learn valuable tips for choosing a cloud services provider.

Tags : ibm, cloud, cloud services, cloud service provider, cloud portfolio, it management, it purchasing, cloud computing
    
By: IBM     Published Date: Jul 14, 2014

This practical guide offers steps for moving your company into the cloud, at whatever pace you prefer, with a focus on the IBM Cloud portfolio offered by IBM and its partners.

Tags : ibm, cloud, cloud services, cloud portfolio, ibm cloud portfolio, cloud strategy, it management, cloud computing
    
By: IBM     Published Date: Jul 14, 2014

This paper discusses the importance of workloads when planning for your migration to the cloud. It also describes how a structured approach to cloud workload analysis can help you identify cloud initiatives that offer faster time to value, reduced migration risk and higher potential return.

Tags : ibm, cloud, cloud services, cloud portfolio, workloads, cloud workload, migration, roi
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.