> Technology > IT Management
 

IT Management

IT Management includes a variety of functions for managing computers in a networked environment, including software distribution, version control, backup & recovery, job scheduling, virus protection and performance and capacity planning.
Results 1 - 25 of 2212Sort Results By: Published Date | Title | Company Name
By: CrownPeak     Published Date: Apr 17, 2015
Websites today are required to meet comprehensive safety, security and confidentiality measures. However, dangerous cyber attacks like Distributed Denial of Service (DDoS) can temporarily, or worse, permanently, affect the accessibility and availability of a website. So how does a website protect itself from these malicious attacks to ensure safety, scalability and security for its users? They must build services and applications which are resilient to these security threats.
Tags : amazon web services, aws, ddos attacks, resilient architecture, crownpeak
     CrownPeak
By: VMware, Inc.     Published Date: Apr 15, 2015
Regulatory mandates and ongoing fiscal austerity are driving federal and defense organizations to explore options for extending their virtual infrastructures to the cloud. VMware vCloud® Government Service by Carpathia™ is an excellent option to ease the transition to the cloud. It provides the elasticity and scalability of the cloud using VMware infrastructure—with minimal disruption to IT environments. VMware has partnered with managed service provider Carpathia to deliver this solution. Built on VMware vSphere® platform, vCloud Government Service enables federal personnel to access all of their IT resources from the cloud with the same tools, processes, and skills they already use. Organizations making their first forays into the cloud are often concerned about risks relating to security, compliance, ownership, costs, and interoperability. This compatibility with their existing infrastructure provides welcome relief to federal government employees.
Tags : fiscal austerity, virtual infrastructures, defense organizations, it environments, cloud
     VMware, Inc.
By: VMware, Inc.     Published Date: Apr 15, 2015
New technology comes with tremendous benefits for agencies but also challenges.
Tags : cloud technology, benefits, big data, collaboration efforts, cloud migration
     VMware, Inc.
By: VMware, Inc.     Published Date: Apr 15, 2015
Hybrids connect multiple clouds and cloud types into one centrally managed place, but agencies still struggle with the steps to implementation.
Tags : hybrid models, cloud adoption, implementation, cloud benefits, it benchmarking
     VMware, Inc.
By: VMware, Inc.     Published Date: Apr 15, 2015
VMware vCloud® Government Service provided by Carpathia® is an enterprise-class hybrid cloud service that delivers the tried and tested VMware capabilities widely used by government organizations today, with the added security and compliance assurance of FedRAMP authorization. The hybrid cloud is becoming more and more prevalent – in fact, nearly three-fourths of large enterprises expect to have hybrid deployments by 2015.
Tags : enterprise-class hybrid cloud, government organizations, security and compliance, hybrid deployments, large enterprises
     VMware, Inc.
By: VMware, Inc.     Published Date: Apr 15, 2015
VMware vCloud® Government Service provided by Carpathia® is an enterprise-class hybrid cloud solution built on vSphere®, which empowers government customers to leverage existing investments in applications and infrastructure. As a result, government agencies can avoid the cost and complexity of re-architecting and retraining sta? for public cloud infrastructure that is radically di?erent from what is in place today. Instead of operating a combination of onsite and o?site IT environments and struggling to maintain both new and legacy applications and infrastructure, vCloud Government Service provides the right mix of internal controls with the ability to securely scale to meet demand for IT resources. As you contemplate migrating basic workloads and/or mission-critical and sensitive data to the cloud, be sure to address these top 5 considerations.
Tags : enterprise-class hybrid, government cloud, applications, infrastructure, re-architecting
     VMware, Inc.
By: Microsoft Dynamics     Published Date: Apr 15, 2015
If you aren’t tapping into social selling, you’re missing out. Customers want to be treated like individuals, not psychographic profiles. The more connected you are to today’s social and mobile customer, the better chance you have of establishing trust and having an honest dialogue. Social doesn’t replace email. Cold calls aren’t dead. These tactics all have their time and place, but social represents the most exciting channel that sales has had in a long time to stay connected and informed.
Tags : crm, microsoft crm, microsoft dynamics, crm online, free crm for small business
     Microsoft Dynamics
By: Cisco     Published Date: Apr 14, 2015
You face unprecedented challenges to protect your midsize business from cybersecurity threats. New trends such as mobility and cloud are changing how you need to secure devices, data and your network. To deal with these challenges, you need a smart, scalable threat-centric security model. This model needs to provide cost-effective threat remediation and support standard security policies and controls. Cisco can help. We deliver intelligent cybersecurity for the real world. Our threat-centric approach reduces complexity while delivering superior visibility and control—saving you time and reducing costs. With Cisco, you gain advanced threat protection across the entire attack continuum—before, during, and after an attack.
Tags : cisco, cybersecurity, mobility, attacks, protection
     Cisco
By: IBM     Published Date: Apr 14, 2015
Whether it's a web application or an enterprise cloud application, Websphere Application Server has the right fit-for-purpose cloud environment for your business.
Tags : web application, ibm, enterprise cloud application, cloud environment, application server
     IBM
By: Basho     Published Date: Apr 13, 2015
Today’s consumers expect instant access to communications services whether they’re in the office, at home, or on the road. With data speeds increasing and international roaming costs decreasing, data usage is rapidly growing. Telecommunications Service Providers (TSPs) are under pressure to deliver more services to more people and approach 100% uptime all while lowering prices to consumers. Traditional relational databases can’t meet the requirements for massive scalability, availability, and fault tolerance that the rapid growth in data usage and rise of big data demands. Read this solution brief to learn how Riak excels at these. Riak is a distributed NoSQL database optimized for big data. Riak meets many of the challenges you may be facing with your own service operations systems.
Tags : riak, basho, telecommunications service provider, license fees, scalability
     Basho
By: Cisco     Published Date: Apr 10, 2015
In only a few short years, technology and changing consumer behaviors have upended the retail landscape. The digital consumer has truly come of age and expects a rich palette of retail options, channels, and experiences that provide ever-increasing value and convenience. Disruption, meanwhile, is arising from new competitors enabled by fast-changing technology, threatening established incumbents as never before.
Tags : retail, insights, ioe, technology, disruption
     Cisco
By: IBM     Published Date: Apr 09, 2015
This survey examines the costs incurred by organizations after experiencing genuine data loss incidents.
Tags : data loss, data breach, cost, ibm, security
     IBM
By: IBM     Published Date: Apr 09, 2015
This paper describes the persistent and evolving IT threat landscape, along with the need for and benefits of building an enterprise security operations center (SOC).
Tags : it threat, security threat, security operations center, ibm, optimization
     IBM
By: IBM     Published Date: Apr 09, 2015
IDC collected and analyzed data on 11 MSSPs within the 2014 IDC MarketScape worldwide managed security services market assessment. While the market arena for MSS is very broad and there are many suppliers that offer these services, IDC narrowed down the field of players that participate in worldwide MSS based on the following criteria: Service capability across the MSS life cycle; Revenue and Geographic presence.
Tags : mssp, idc, idc marketscape, global managed security services, ibm
     IBM
By: IBM     Published Date: Apr 09, 2015
This ebook outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe, and shows how IBM InfoSphere solutions can help protect data while giving your staff the right levels of access to do their jobs efficiently and accurately.
Tags : data security, ibm, ibm infosphere, privacy strategy, big data security
     IBM
By: IBM     Published Date: Apr 09, 2015
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : ibm, cloud, social business, big data, data security
     IBM
By: IBM     Published Date: Apr 09, 2015
As The Business Becomes Digital, Security Must Become Data-Centric S&R leaders of enterprises undergoing a digital transformation will soon realize that in order to adequately ensure customer protection and enable a digital workforce, S&R pros must abandon traditional perimeter-based security and put the focus on the data by embracing Forrester’s Zero Trust Model.
Tags : data security, ibm, customer protection, digital workforce, zero trust model
     IBM
By: IBM     Published Date: Apr 09, 2015
A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and peformance.
Tags : data security, ibm, risk management, network security, security threat
     IBM
By: IBM     Published Date: Apr 09, 2015
Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research highlights specific examples of the ways in which these converged security systems put today’s more advanced capabilities to work in practical application. The IBM Security Network Protection XGS 5000 is profiled as an example of this trend, delivering not only intelligence driven, application aware defense against a variety of threats, but also the extensibility required to equip today’s organizations to confront whatever may come tomorrow.
Tags : data security, ibm, converged network security, security risk, it management
     IBM
By: IBM     Published Date: Apr 09, 2015
Access the latest Gartner Magic Quadrant for Intrusion Prevention Systems to learn more about IBM's position and the latest developments in the market.
Tags : magic quadrant, ibm, intrusion prevention systems, security, security risk
     IBM
By: Basho     Published Date: Apr 07, 2015
Did you know that the total amount of data will reach 44 zettabytes by 2020 and that 80% of that data will be unstructured data? Are you ready for all of this unstructured data? More importantly, do you know how to turn it into a competitive advantage? Learn about the challenges that come with unstructured data and how to deal with those challenges in our latest publication “Meeting the Challenges of Unstructured Data” In this Whitepaper you’ll learn: What is driving the growth in unstructured data The challenges associated with managing unstructured data How companies are capitalizing on the opportunities that unstructured data presents to save money, time, and create new market opportunities
Tags : basho, unstructured data, competitive advantage, new market opportunities, managing unstructured data
     Basho
By: Basho     Published Date: Apr 07, 2015
This whitepaper looks at why companies choose Riak over a relational database. We focus specifically on availability, scalability, and the key/value data model. Then we analyze the decision points that should be considered when choosing a non-relational solution and review data modeling, querying, and consistency guarantees. Finally, we end with simple patterns for building common applications in Riak using its key/value design, dealing with data conflicts that emerge in an eventually consistent system, and discuss multi-datacenter replication.
Tags : basho, riak, relational database, nosql, common applications
     Basho
By: Basho     Published Date: Apr 07, 2015
bet365 is one of the world’s leading online gambling groups with over 14 million customers in two hundred countries. Recently, bet365 chose Riak, the NoSQL distributed database to ensure scalability and reliability for their site. Get a better understanding of how to choose the right database solution directly from Dan Macklin, Head of Research and Development at bet365. Join us for this On Demand webinar to learn about: • bet365's evaluation process • The business and technical challenges addressed • Triumphs achieved by migrating to Riak • Lessons learned and Dan Macklin's advice for anyyone evaluating their database requirements Download to watch this On-Demand webinar to learn why Riak chose bet365.
Tags : basho, riak, database infrastructure, bet365, unstructured data
     Basho
By: IBM     Published Date: Apr 06, 2015
Mobile capture is quickly becoming an important differentiator for many companies and organizations, especially those in traditionally document-intensive fields like banking, insurance, healthcare and government operations. According to a 2014 study conducted by AIIM, 45% of companies feel that mobile capture is vitally important, pointing to the competitive need for improved process agility and customer service across the board.Discover the top 10 questions to ask before you make your investment in mobile capture.
Tags : mobile capture, customer service, ibm, banking, insurance
     IBM
By: IBM     Published Date: Apr 06, 2015
Read this report from AIIM to discover what issues on-premise ECM users are facing, how external collaboration support is managed, what cloud and mobile functionalities users are requesting, and what alternative scenarios are being considered.
Tags : ecm, ibm, external collaboration support, cloud, mobile
     IBM
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search