> Technology > IT Management
 

IT Management

IT Management includes a variety of functions for managing computers in a networked environment, including software distribution, version control, backup & recovery, job scheduling, virus protection and performance and capacity planning.
Results 1 - 25 of 1549Sort Results By: Published Date | Title | Company Name
By: Arbor     Published Date: Sep 17, 2014
Dans la lutte contre les menaces qui se joue actuellement, les analyses de sécurité deviennent de plus en plus indispensables
Tags : firewall, firewall protection, it security, cyber defense, it management
     Arbor
By: IBM     Published Date: Sep 16, 2014
In a world that demands scalability, modularity, quality, fast performance and a best practices approach is key to ensuring predictable results for the business. IBM’s PowerLinux Open Source Infrastructure Services solution is a workload-optimized system that meets or exceeds best practices for a virtualized infrastructure at a reasonable price point. The PowerLinux solution can help turn today’s IT infrastructure into a well-tuned utility, providing a more flexible, scalable and valuable asset to the business.
Tags : virtualized infrastructure, it infrastructure, deployment options, it management
     IBM
By: Lenovo     Published Date: Sep 16, 2014
Virtual Desktop Infrastructure (VDI) works best for smaller centrally located user bases that share a core set of application and file needs. As the world moves to the web and the cloud, is VDI still a good fit for emerging mobility and BYOD needs for your agency? See this infographic to learn more about the tradeoffs, and what you can do to take advantage of emerging cloud solutions to drive improved mobile productivity across your entire organization.
Tags : vid, cloud alternatives, emerging mobility, mobile productivity, it management
     Lenovo
By: Lenovo     Published Date: Sep 16, 2014
Agency IT is tasked with building smarter and more responsive state and local government, with CTOs looking to enable government workforce mobility and address strategic issues like BYOD. Adding to the challenge is a rise in devices and data that IT must deliver, support, and secure. Combined with the decline in traditional Windows-based computing, these challenges are driving agencies toward web and cloud solutions that don't sacrifice security or manageability. See the solution that has government agencies re-thinking how they enable mobile productivity.
Tags : agency it, workforce mobility, mobile productivity, cloud computing, it management
     Lenovo
By: Arbor     Published Date: Sep 15, 2014
This Frost and Sullivan market research study comes at a time when DDoS attacks are accelerating in size, frequency and complexity. Though DDoS is not a new concern, the risk of DDoS attacks and the potential for damage is at an all-time high. As a result, DDoS mitigation is a top-of-mind consideration for IT and security organizations around the world, and demand for DDoS mitigation solutions is growing rapidly.
Tags : ddos attacks, it security, ddos mitigation, it management
     Arbor
By: Bit9     Published Date: Sep 11, 2014
Enterprises are entering into a continuous state of compromise, and within this volatile risk market, consequences for organizations that fail to meet their regulatory security guidelines are feeling the pain all the way up the corporate ladder. Within this environment, traditional security controls are no longer sufficient to fully protect your organization. Therefore, IT risk and audit professionals need to understand that simply meeting compliance controls does not equal complete security coverage. By neglecting to pay attention to emerging advanced threat protection solutions and capabilities, a compliant company can still be a vulnerable one. Join Christopher Strand, senior director of compliance at Bit9 + Carbon Black, to understand: • The risks and liability organizations and auditors face by not going beyond compliance • How to meet and exceed compliance standards with emerging security controls • Evaluating emerging security controls within the IT audit process
Tags : bit9, pci, dss, security gaps, endpoint monitoring
     Bit9
By: GENBAND     Published Date: Sep 11, 2014
GENBAND’s NUViA™ voicemail solution changes the economics of acquiring and managing voicemail. Eliminate end of life platforms that are expensive to maintain while adding new mobility services that make users more productive. Integrates with your existing PBXs or IP-PBXs.
Tags : voicemail, solution, managing, economics, platforms
     GENBAND
By: AlienVault     Published Date: Sep 05, 2014
While vulnerability assessments are essential, considering vulnerability data in a vacuum greatly limits your ability to prioritize your action plan in an effective way. Without the context of which vulnerabilities are the most severe, which are actively being targeted, which are on critical assets, etc, you may waste time checking things off the list without actually improving security. Join us for this session to learn how to integrate threat intelligence into your vulnerability management strategy.
Tags : alienvault, threat intelligence, vulnerability assessments, vulnerability data, it management
     AlienVault
By: AlienVault     Published Date: Sep 05, 2014
Event logs provide valuable information to troubleshoot operational errors, and investigate potential security exposures. They are literally the bread crumbs of the IT world. As a result, a commonly-used approach is to collect logs from everything connected to the network "just in case" without thinking about what data is actually useful. But, as you're likely aware, the "collect everything" approach can actually make threat detection and incident response more difficult as you wade through massive amounts of irrelevant data. Join us for this session to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements.
Tags : alienvault, troubleshooting operational errors, potential security exposures, satisfy compliance requirements, it management
     AlienVault
By: AlienVault     Published Date: Sep 05, 2014
Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources. In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.
Tags : alienvault, limited resources, it time management, it prioritization, it management
     AlienVault
By: AlienVault     Published Date: Sep 05, 2014
If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. In this practical webinar, PCI DSS compliance experts walk through strategies for taking the pain out of PCI DSS reporting.
Tags : alienvault, pci dss reporting, pci dss compliance, it management, knowledge management
     AlienVault
By: Riverbed     Published Date: Sep 05, 2014
Nobody can afford to lose data. But managing the backup and recovery of data and services in far-flung locations can present many logistical and technology challenges that add complexity, expense, and risk. A new branch converged infrastructure approach allows IT to project virtual servers and data to the edge, providing for local access and performance while data is actually stored in centralized data centers. IT can now protect data centrally and restore branch operations in a matter of minutes versus days.
Tags : branch office, data services, data recovery, centralized data centers, it management
     Riverbed
By: Riverbed     Published Date: Sep 05, 2014
Many organizations have invested in server consolidation, particularly in their data centers. In remote offices, though, servers and storage exist as isolated islands of infrastructure that require management through separate operational processes and procedures. This approach could place data at risk. A new kind of storage architecture allows IT to consolidate remote servers and data in the data center by decoupling storage from its server over any distance—even thousands of miles—and still get the same performance as if the storage remained local to the branch. Organizations can now consolidate remote infrastructure to increase security and ef?ciency, without adversely impacting end-user performance in branch of?ces.
Tags : consolidation, servers, remote, storage, isolated islands
     Riverbed
By: Riverbed     Published Date: Sep 05, 2014
The branch office has long been a critical dilemma for the IT organization. Branch offices for many organizations are a critical point of productivity and revenue generation, yet the branch has always come with a tremendous amount of operational overhead and risk. Worse yet, challenges are often exacerbated because the branch office too often looks like a carryover of outdated IT practices.
Tags : convergence, branch office, tco, transforming, operational overhead
     Riverbed
By: Sourcefire, LLC     Published Date: Sep 04, 2014
Not everyone loves a good story. Shocking media reports about intentionally-leaked classified information have commanded the public’s attention in recent years, but they are certainly not entertaining to those of us responsible for safeguarding the data. Clearly we can do more to better protect our nation’s federal agencies and classified information. What’s needed is a threat-centric approach to security that lets agencies and department leaders tackle the most pressing issues first with superior visibility, continuous control, and advanced threat protection – to defend against both insider and external threats.
Tags : sourcefire, network security, cisco, security report, cyber attack
     Sourcefire, LLC
By: Sourcefire, LLC     Published Date: Sep 04, 2014
Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major loss and disruption to organizations and national infrastructure. These advanced attacks are very difficult to detect, remain in networks for long periods of time, and amass network resources to launch attacks elsewhere. Traditional methods that rely exclusively on detection and blocking for protection are no longer adequate. It’s time for a new security model that addresses the full attack continuum – before, during, and after an attack.
Tags : sourcefire, cisco, security report, cyber attack, malware
     Sourcefire, LLC
By: Sourcefire, LLC     Published Date: Sep 04, 2014
This Advanced Endpoint and Server Protection paper will dig into protecting devices against advanced attackers. We will highlight a number of new alternatives for preventing and detecting advanced malware, and examine new techniques and tools to investigate attacks and search for indicators of compromise within your environment.
Tags : securosis, sourcefire, cisco, endpoint protection, server protection
     Sourcefire, LLC
By: Sourcefire, LLC     Published Date: Sep 04, 2014
In this publication, we hope that you'll learn how to evolve your security strategy to overcome today's security challenges, take advantage of new business models, and gain more effective protections- anytime, all the time.
Tags : gartner, network security, sourcefire, cisco, security report
     Sourcefire, LLC
By: Sourcefire, LLC     Published Date: Sep 04, 2014
Making threat protection more intelligent and more accurate
Tags : network security, sourcefire, cisco, security report, cyber attack
     Sourcefire, LLC
By: Sourcefire, LLC     Published Date: Sep 04, 2014
The goal of this paper is to give security managers information to facilitate focusing their investments on the areas that are mostly likely to impact their organizations and customers over the next several years.
Tags : cisco, network security, sourcefire, security report, cyber attack
     Sourcefire, LLC
By: HP     Published Date: Sep 04, 2014
To prepare for doubling its growth and, at the same time, update its 20 year-old IT systems, Focal Point implemented an HP 3PAR StoreServ 7400 Storage Area Network (SAN) with an HP StoreOnce backup to match. The old system was causing weekly unplanned outages and seriously hindering critical business processes.
Tags : 3par, storage, solution, storeonce, system
     HP
By: CradlePoint     Published Date: Sep 04, 2014
In this white paper, learn how PCI-DSS 3.0 effects how you deploy and maintain PCI compliant networks using CradlePoint solutions. Properly configure, monitor, and maintain your CradlePoint devices to meet the requirements of PCI DSS 3.0. Enabling features include network segmentation (ethernet ports, SSIDs, and VLANs), stateful firewall, MAC/IP/URL filtering, authentication/encryption, event logging, event alerts, time synchronization, and configuration/upgrade management from CradlePoint Enterprise Cloud Manager.
Tags : cradlepoint enterprise cloud manager, pci dss 3.0, pci compliance, stateful firewall, mac/ip/url filtering
     CradlePoint
By: Micro Focus     Published Date: Aug 28, 2014
Enabling technologies to streamline regulatory and legislative changes.
Tags : it compliance programs, risk management, it management, data management
     Micro Focus
By: Micro Focus     Published Date: Aug 28, 2014
Micro Focus commissioned fresh research to re-examine attitudes towards core IT systems and discover whether blue sky thinking is delivering real-world solutions. The conclusions may surprise you
Tags : core it systems, it debt, mainframe, it management
     Micro Focus
By: Micro Focus     Published Date: Aug 28, 2014
This white paper examines key approaches to application modernization and evolution for certain IBM mainframe applications with long life spans. It discusses the challenges of legacy applications and the available modernization approaches to handle these challenges. The paper also analyzes in some depth specific approaches that keep application logic largely intact or allow it to evolve incrementally and productively.
Tags : application modernization, mainframe applications, legacy applications, it management, knowledge management
     Micro Focus
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search