> Technology > IT Management
 

IT Management

IT Management includes a variety of functions for managing computers in a networked environment, including software distribution, version control, backup & recovery, job scheduling, virus protection and performance and capacity planning.
Results 1 - 25 of 1920Sort Results By: Published Date | Title | Company Name
By: Kenandy     Published Date: Jan 28, 2015
Are you considering moving some or all of your ERP to the cloud? If so, you’re aware of the many bene?ts of cloud ERP, including quick time to value, social and mobile collaboration for your users, and the ?exibility to rapidly adapt your processes as your business changes. But, you may be asking—how should I start my journey to cloud ERP? Which is the best route for my company? In this white paper, we illuminate the high-value routes customers take to cloud ERP and drivers behind their choices. You will learn about the options to consider along the way and how to stay on track. Whatever road you choose, it’s important that you get started. Cloud ERP is not just a destination, it’s a transformation that will give your company faster time to value and the ?exibility to quickly adapt to changing business needs.
Tags : cloud erp, quick time to value, high-value routes, it management, data center
     Kenandy
By: SpectorSoft     Published Date: Jan 23, 2015
This White Paper will present some common sense suggestions for improving the “beginning of the lifecycle” risk mitigation process. In other words, ways to add a bit more intelligence beginning with the screening and hiring process. Then, we’ll look at how to tie the efforts made at the beginning of the lifecycle to the rest of the employee lifecycle, using a combination of process and tools to significantly improve security, and reduce the chances of an insider incident.
Tags : spectorsoft, risk mitigation, insider threat, background checks, screening process
     SpectorSoft
By: IBM     Published Date: Jan 23, 2015
Dominant trends in IT today such as Cloud, Mobile and Smarter Physical Infrastructures are generating massive amounts of corporate data. The inherent value of this data coupled with the increasing complexity of IT environments is forcing those tasked with data protection to re-evaluate their approaches. Join this session to understand how you can reduce the cost and complexity of backup and recovery while ensuring comprehensive data protection across virtual environments, core applications and remote sites.
Tags : it trends, it environments, smarter physical infrastructures, data protection, it management
     IBM
By: IBM     Published Date: Jan 23, 2015
Organizations are shifting to Cloud to improve agility, reduce costs and increase IT efficiency. To achieve the benefits promised by Cloud, your storage infrastructure needs to be virtualized and provide the required automation and management capabilities. Watch this webinar to learn how you can quickly convert existing storage to Cloud storage, standardize advanced data protection capabilities, and utilize advanced data-driven analytics to optimize tiering across storage systems --- reducing per unit storage costs up to 50% and freeing up valuable IT budget.
Tags : storage environment, cloud storage, it efficiency, cloud agility, data-driven analytics
     IBM
By: Cisco     Published Date: Jan 23, 2015
Download the Forrester Consulting Total Economic Impact Calculator for SMARTnet to find out what savings your company can realize from your Cisco SMARTnet Service.
Tags : calculator, network, empowering, smartnet, consulting
     Cisco
By: Lenovo     Published Date: Jan 22, 2015
Looking for smarter solutions for anywhere agency productivity? Watch webNetwork for Government and learn how webNetwork Unified Workspaces are the right choice for secure, reliable, mission-ready mobility. No more worries about balancing competing priorities around access, accountability, and cost - webNetwork makes IT management easy with simple deployment and a superb end-user experience.
Tags : webnetwork, byod, webnetwork unified workspaces, it management, cloud-powered solutions
     Lenovo
By: Verisign     Published Date: Jan 22, 2015
As a leader in domain management and internet security, Verisign’s network supports more than 82 billion transactions on a daily basis, enabling nearly 50 percent of the internet’s domains. Building networks to survive the largest DDoS attacks on the internet is part of Verisign’s heritage, and Verisign has been using DDoS mitigation techniques for more than 16 years while protecting the .com and .net infrastructures. This gives Verisign the ability to flex its entire 1+ tbps infrastructure as needed in real-time response to attack scenarios against itself and its customers.
Tags : network capabilities, ddos attack mitigation, domain management, internet security, it infrastructure
     Verisign
By: Verisign     Published Date: Jan 22, 2015
The Verisign Distributed Denial of Service (DDoS) Trends Report contains the observations and insights derived from mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services, and the security research of Verisign iDefense Security Intelligence Services. It represents a unique view into the attack trends unfolding online for the previous quarter, including attack statistics, DDoS malicious code analysis and behavioral trends
Tags : service trends report, ddos, security research, it security analytics, ssdp vulnerability
     Verisign
By: Verisign     Published Date: Jan 22, 2015
Cyber security threats have become more pervasive and damaging than ever, ranging from advanced persistent threats to massive distributed denial of service (DDoS) attacks. By moving toward a more holistic, proactive approach to addressing all potential DDoS security threats, you help ensure the availability and security of your business-critical network even as zero-day threats emerge and known threats evolve.
Tags : ddos protection, cyber security threats, cloud-based protection, best practices, it management
     Verisign
By: Verisign     Published Date: Jan 22, 2015
To tackle the advanced DDoS threats of today and tomorrow, it is increasingly clear that cloud DDoS mitigation providers must rapidly innovate solutions and implement them quickly on a global scale. To help meet the performance, availability and functional requirements of operating critical Internet infrastructure, Verisign developed its innovative DDoS mitigation platform, called Athena. This technical report describes the Athena platform, a globally distributed DDoS mitigation system that provides comprehensive protection against network- and application-layer attacks, and specializes in mitigating Layer-7 and Secure Sockets Layer (SSL)-based attacks
Tags : mitigation platform, ddos threats, internet infrastructure, ssl based attacks, application-layer attacks
     Verisign
By: Verisign     Published Date: Jan 22, 2015
Download this important report and learn why utilizing the expertise and resources of a cloud-based provider is the only sound solution.
Tags : cloud defenses, ddos attacks, cloud-based provider, cyber attacks, it management
     Verisign
By: Verisign     Published Date: Jan 22, 2015
Versign OpenHybridTM is a Verisign DDoS Protection Services architecture that enables interoperability between on-premise and cloud-based platforms. An easy to use tool (Open API), allows customers to leverage existing security perimeter devices to signal threat information to the Verisign DDoS protection cloud, when the capabilities of the device are exceeded. Verisign OpenHybrid™ can also be applied to monitor and protect services hosted within other public and private cloud services.
Tags : api specification, cloud signaling, ddos attacks, threat visibility, risk mitigation
     Verisign
By: Verisign     Published Date: Jan 22, 2015
Distributed Denial of Service (DDoS) attacks are a threat to businesses worldwide and the attacks are getting larger and more sophisticated. The industry’s approach to protecting against DDoS attacks must change, and change fundamentally, to stay ahead of this growing threat. Read this blog today to find out how to stay ahead of these attacks!
Tags : ddos, ddos attacks, it security risk, risk mitigation, it management
     Verisign
By: Cisco     Published Date: Jan 21, 2015
As the Internet of Everything (IoE) drives exponential change — and opportunity — customers and retailers face a complex maze of shopping journeys. Mobility and apps now represent a disruption similar in scope to what we saw with e-commerce in the late 1990s and early 2000s. In the second quarter of 2014, total discretionary retail spending rose 3 percent; e-commerce rose 10 percent; and mobile commerce rose 47 percent.
Tags : digital, shopping, journey, retail, mobility
     Cisco
By: JumpCloud     Published Date: Jan 21, 2015
Learn how modern organizations are now easily implementing innovative directory services and the consequences some organizations face by not implementing one.
Tags : ldap, active directory, user management, iam, ssh access
     JumpCloud
By: Actiance, Inc.     Published Date: Jan 15, 2015
Healthcare providers are starting to realize that using electronic communication, collaboration, and social networks to keep in touch with each other and with patients can improve the quality of care they provide. However, it also exposes them to risk since the information they share on these networks has to be protected in order to meet specific regulatory guidelines, like those mandated by HIPAA. The prescription for success is to consider compliant use of these networks before and while they are being used and the technology that helps achieve that goal. Read this paper to gain an understanding of: What the regulatory landscape of the healthcare industry looks like What concerns you should be aware of from a legal perspective
Tags : electronic communications, hipaa requirements, social networks, compliance, it management
     Actiance, Inc.
By: Cisco     Published Date: Jan 15, 2015
Today’s adversaries continue to increase their capabilities faster than the defenses deployed to stop them. Whether they are obfuscating their attacks or hiding malicious code within webpages and other files, they are making it more and more difficult to profile and identify legitimate network traffic. This is especially true in firstgeneration network security devices that restrict protection and policies to ports and protocols.
Tags : firewall, buyers guide, protocols, next generation, networks
     Cisco
By: Actiance, Inc.     Published Date: Jan 15, 2015
Government and public sector agencies are just beginning to realize how social networks can improve business results. With access to real-time communication, collaboration, and social networking platforms, agencies can improve internal process efficiencies that help them provide better services to their constituents. But first, these agencies have to consider regulatory requirements like the Freedom of Information Act (FOIA) which require compliant use of these networks and the content people create on them. Read this paper to gain an understanding of: What the regulatory landscape of the public sector looks like What concerns you should be aware of from a legal perspective
Tags : electronic communications, public sector, social networking platforms, compliance, real-time communication
     Actiance, Inc.
By: Cisco     Published Date: Jan 15, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : firewall, next generation, networks, computing, cloud
     Cisco
By: Actiance, Inc.     Published Date: Jan 15, 2015
But what seems like a spoon full of sugar is often a tough pill to swallow when you consider regulatory requirements from agencies like the FDA for use of these networks. Adopting new technologies that allow employees to share information and exchange ideas with each other and with your customers is often the best way to achieve better business results, but doing so can involve considerable risk. That’s because the content people create using these technologies is subject to the scrutiny of regulators, legislators, and litigators. On top of that, increasing litigation has made it a business requirement to consider solutions that help bring down skyrocketing legal costs. Pharmaceuticals companies must be knowledgeable of, and abide by, specific information retention regulations in every country where they do business, including those countries that prohibit data from leaving the countries’ borders. Not having technology in place to help manage these requirements and increasing risks, or
Tags : collaboration, social media risk and reward, retention regulations, data, business requirements
     Actiance, Inc.
By: Actiance, Inc.     Published Date: Jan 15, 2015
Social Media Risks and Benefits for the Pharmaceuticals Industry Drug makers are just beginning to realize how social networks can improve business processes. Social media helps your organization share information and exchange ideas with your customers quickly, but doing so can involve considerable risk. That’s because social media is subject to the scrutiny of regulators, legislators, and litigators. So, what seems like a spoon full of sugar is often a tough pill to swallow when you consider regulatory requirements from agencies like the FDA. On top of that, increasing litigation has made it a business requirement to consider solutions that help bring down skyrocketing legal costs. Not having technology in place to help manage these requirements and increasing risks, or doing so without careful planning, can be a costly mistake. Read this paper to gain an understanding of: What the regulatory landscape of the pharmaceuticals industry looks like What concerns you should be aware of f
Tags : social media, increased risks, business processes, regulatory requirements, it management
     Actiance, Inc.
By: Actiance, Inc.     Published Date: Jan 15, 2015
The use of instant messaging in the energy industry is widespread, with one source estimating that as much as 60% of trading in the physical power markets is conducted using the technology. Moreover, a Microsoft/Accenture survey found that 34% of oil and gas professionals are collaborating more than they were 12 months earlier, while only 10% are collaborating less. While real-time communications, such as instant messaging, are very useful for traders and others in the energy industry, a failure to monitor and retain them along with other electronic communications can result in substantial penalties and other serious consequences. Download this whitepaper to learn more.
Tags : communications, energy, real-time communications, collaboration, it management
     Actiance, Inc.
By: IBM     Published Date: Jan 09, 2015
Making changes to your business strategy can often create new risks. If your business continuity management (BCM) plan is not part of an organization-wide, integrated program, it may not evolve to address these new risks. Understand which practices can be followed to successfully protect your organization’s business operations and reputation with a proactive, business-centric approach to BCM that highlights critical practices.
Tags : business continuity management, risk management, bcm plan, business solutions, it management
     IBM
By: IBM     Published Date: Jan 09, 2015
Every organization must put a plan in place for recoverability after an outage, but testing your enterprise resilience without full business and IT validation is ineffective. Read the white paper to learn how to put a plan in place for full functional validation, and get details on the importance of validating resiliency in a live environment; learn why small-scale recovery “simulations” are inadequate and misleading; understand why validating resilience demands involvement from IT and the business; and get details on the checks and balances you need to maintain and validate business resilience.
Tags : resiliency testing, it validation, business resilience, small-scale recovery simulations, it management
     IBM
By: IBM     Published Date: Jan 09, 2015
Read the case study “A broadband company streamlines its recovery processes with IBM Cloud” to learn how IBM service teams used cloud-based technology to help the company develop an innovative and proven cloud computing solution for its backup and recovery environment. IBM’s turnkey solution helped the company improve protection, recovery, performance and scalability within its disaster recovery processes, and maximize backup performance and disaster recovery capabilities.
Tags : cloud computing solutions, service teams, cloud-based technology, it performance, it recovery capabilities
     IBM
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search