> Technology > IT Management
 

IT Management

IT Management includes a variety of functions for managing computers in a networked environment, including software distribution, version control, backup & recovery, job scheduling, virus protection and performance and capacity planning.
Results 1 - 25 of 1526Sort Results By: Published Date | Title | Company Name
By: Samanage     Published Date: Aug 22, 2014
One of the oldest and largest global private equity firms, The Riverside Company was fed up with their complex ITSM solution, the costly consultants it required to maintain, and the sub-par customer service they received from their vendor. In this webinar, Eric Feldman, Director of IT at Riverside, shares behind-the-scenes details of how they regained control of their domain, including: "IT"SM…and Beyond – Cross functional business challenges that drove their requirements The journey – What they learned about cloud ITSM along the way The tangible benefits – Immediate business impact and what’s now possible including more accurate budgeting and building economies of scale If you’re actively looking at, or merely thinking about a new IT Service Management (ITSM) solution for your organization, this is one conversation you don’t want to miss. Like Riverside, you can get control and become master of your own IT domain.
Tags : samanage, itsm, riverside, itsm solutions, vendors
     Samanage
By: Brocade Communications Systems     Published Date: Aug 21, 2014
The limitations of traditional three-tier campus network architectures are being severely tested by peer-centered, wired/wireless, multi-device, and multi-application environments running rich media like streaming video and audio.These legacy networks are inflexible, inefficient, and have high OpEx costs.1
Tags : campus networks, wired, wireless, multi-device, multi-application
     Brocade Communications Systems
By: Brocade Communications Systems     Published Date: Aug 21, 2014
The security of your campus network is essential to managing your organization's risk - and unlike the networking infrastructure of third-part service providers, the responsibility for campus network security falls primarily on your own organization. This report explains why security for your campus network is essential, and outlines three straightforward ways that you can improve it.
Tags : security, campus network, network, infrastructure, risk
     Brocade Communications Systems
By: Brocade Communications Systems     Published Date: Aug 21, 2014
This white paper explores today's campus networking environment: its operational shortcomings and potential to address knowledge workers' growing needs. IT managers need to look to their near- and midterm future needs in terms of how a software-defined network architecture can provide incremental value to their IT and network infrastructure; why it is likely to be the foundation of next-generation enterprise networking solutions; the importance of open technologies and protocols such as OpenFlow; and how SDN will help better manage physical and virtual network resources to deliver a better application experience.
Tags : enterprise, campus network, sdn it, virtual, network architecture
     Brocade Communications Systems
By: Brocade Communications Systems     Published Date: Aug 21, 2014
For the last two years, Software-Defined Networking (SDN) has been the hottest topic in networking. There is tremendous interest in SDN on the part of vendors and a wide range of user groups including hyper-scale data center providers, service providers and enterprises of all types and sizes. While most of the discussion of SDN focuses on its use in the data center, The 2013 Guide to Network Virtualization and SDN1 highlights the fact that enterprise IT organizations are interested in deploying SDN broadly throughout their environment, including in their WAN and campus networks.
Tags : security, hyper-scale, sdn, campus networks, wan
     Brocade Communications Systems
By: Brocade Communications Systems     Published Date: Aug 21, 2014
IT Agility: How Do You Stack Up?
Tags : agility, stack, network, technology, it management
     Brocade Communications Systems
By: Global Knowledge     Published Date: Aug 19, 2014
VMware Horizon 6 was announced in April and began shipping in June 2014, bringing a more unified suite delivering more integration with infrastructure and cloud products and more simplicity for all devices. Along with the numerous updates across the Horizon suite, VMware has transitioned to a more traditional product licensing hierarchy. This paper explores the new licensing model and provides an overview of the new features associated with VMware Horizon 6.
Tags : cloud products, application catalog, product licensing, end-user computing, it management
     Global Knowledge
By: IBM     Published Date: Aug 14, 2014
IBM® Mobile Web Push allows marketers to influence and inform their mobile audience in innovative ways. Web push notifications are dynamically triggered for display on mobile websites based on the actions of your visitors. This personalization is possible without the complications of existing content management, advertisement servers or IT involvement.
Tags : ibm, mobile, web push, free notifications, marketing
     IBM
By: Samanage     Published Date: Aug 13, 2014
Join us for this educational webcast, presented by Randy Michaels of Knowledge ToolWorks, a leading expert on IT and business processes, to learn how you can make ITSM work for you without getting tangled up in its ugly tentacles.
Tags : samanage, randy michaels, itsm, it service management, knowledge toolworks
     Samanage
By: Dell Software     Published Date: Aug 07, 2014
Leverage integration platform as a service (iPaaS) and capitalize on the speed, agility and economics of the cloud to increase the value of your hybrid IT investment. Read this white paper to learn how.
Tags : cloud, cloud integration, technology, hybrid it, enterprises
     Dell Software
By: Dell Software     Published Date: Aug 07, 2014
Discover how Dell Boomi AtomSphere integration PaaS (iPaaS) helped Novartis overcome issues with on-premises middleware solutions to speed development efforts and realize significant costs savings.
Tags : middleware, integration, business, novartis, cost of ownership
     Dell Software
By: Bit9     Published Date: Aug 06, 2014
Download this new white paper to learn: • How compliance and security gaps can affect your organization • How a positive solution can close these gaps to ensure the security of servers and endpoints and compliance with industry regulations • How Bit9 manages five core compliance controls that apply to PCI-DSS compliance
Tags : bit9, pci, dss, security gaps, endpoint monitoring
     Bit9
By: Bit9     Published Date: Aug 06, 2014
This eBook explains how a single, positive security solution, such as Bit9, facilitates the convergence of compliance and security—one agent that provides visibility, detection, response and protection and can automate and manage compliance for PCI-DSS, SOX, HIPAA, FISMA, GLBA, GPG 13, NERC CIP and other regulations.
Tags : bit9, pci, dss, security gaps, endpoint monitoring
     Bit9
By: Bit9     Published Date: Aug 06, 2014
As a result of the recent spate of high-profile data breaches at brand name retailers, compromising credit and debit card and other personally identifiable information for hundreds of millions of consumers in the process, data security has become priority No. 1 for many retailers in 2014. And for good reason: The consequences of suffering a data breach are numerous, and none of them are positive — consumer mistrust, a drop in traffic and a decrease in sales, to name just a few. With retailers recently testifying before Congress that they’re facing increasingly sophisticated threats from cyber criminals, and no end to those in sight, it’s become apparent that your company needs to implement strategies that will protect itself from a costly data breach. Here are 10 ways you can more easily achieve that goal while maintaining required PCI compliance (all of these tips fall within one of five buckets — visibility; asset control; enforcement; trust policy; advance measurement.)
Tags : bit9, pci, dss, security gaps, endpoint monitoring
     Bit9
By: Bit9     Published Date: Aug 06, 2014
Enterprises are entering into a continuous state of compromise, and within this volatile risk market, consequences for organizations that fail to meet their regulatory security guidelines are feeling the pain all the way up the corporate ladder. Within this environment, traditional security controls are no longer sufficient to fully protect your organization. Therefore, IT risk and audit professionals need to understand that simply meeting compliance controls does not equal complete security coverage. By neglecting to pay attention to emerging advanced threat protection solutions and capabilities, a compliant company can still be a vulnerable one. Join Christopher Strand, senior director of compliance at Bit9 + Carbon Black, to understand: • The risks and liability organizations and auditors face by not going beyond compliance • How to meet and exceed compliance standards with emerging security controls • Evaluating emerging security controls within the IT audit process
Tags : bit9, pci, dss, security gaps, endpoint monitoring
     Bit9
By: Samanage     Published Date: Aug 05, 2014
Does your IT department have a perception problem within your organization? Listen to the recorded webinar to learn how Shvonne Williams, Director of IT Services at MediFit Corporate Services, was able to turn around her team’s image and transform the IT department into a strategic business partner within the organization.
Tags : samanage, medifit corporate services, it deparment, itsm solution, itsm
     Samanage
By: EMC Corporation     Published Date: Aug 05, 2014
It’s an exciting yet daunting time to be a security professional. Security threats are becoming more aggressive and voracious. Governments and industry bodies are getting more prescriptive around compliance. Combined with exponentially more complex IT environments, security management is increasingly challenging. Moreover, new “Big Data” technologies purport bringing advanced analytic techniques like predictive analysis and advanced statistical techniques close to the security professional.
Tags : big data, data management, security threats, advanced analytics, security management
     EMC Corporation
By: Windstream     Published Date: Aug 04, 2014
Cloud computing today is fundamentally altering business processes and changing the way organizations interact with customers, partners, and employees. This transformation brings incredible opportunities, including the ability to build a realtime enterprise where interaction and innovation flourish, and more agile, flexible, and cost-effective practices thrive. Yet cloud computing also presents significant challenges. The path to value is not clearly marked, and there are potential stumbling points along the way. Please download the whitepaper to learn more!
Tags : windstream, cloud computing, cloud hybrid options, oxford economics, cloud benefits
     Windstream
By: Apple Corporation     Published Date: Jul 30, 2014
Join Apple Business Experts for a free on-demand online seminar focused on progressive IT. Learn about a new way to work where IT empowers employees with the very best tools, technologies, and apps to do their jobs. Register now.
Tags : apple, progressive it, ipad, iphone, new it
     Apple Corporation
By: Global Knowledge     Published Date: Jul 29, 2014
This white paper addresses four different components of the Tivoli monitoring infrastructure for creating a high availability environment while providing redundancy and failover capacity. Although the principles are the same for each of these systems, the methods for adhering to these principles are different for each of them.
Tags : global knowledge, ibm, tivoli, monitor, infrastructure
     Global Knowledge
By: Global Knowledge     Published Date: Jul 29, 2014
There are many issues and requirements to consider when you upgrade vCenter server and ESXi hosts to vSphere 5.5. The last thing you want is to have the upgrade fail or to encounter problems that you could have avoided with a little bit of research. This paper highlights the process, requirements, and options for upgrading to vSphere 5.5.
Tags : global knowledge, vcenter, server, esxi, host
     Global Knowledge
By: Global Knowledge     Published Date: Jul 29, 2014
Present concerns about cloud security are reminiscent of the fears in the 1980s of LANs and a highly distributed IT infrastructure, and they also echo the efforts in the 1990s to stop Internet usage at work. But the issue really isn't security; it's governance to ensure interoperability and portability. We will review these concerns and discuss how the industry dealt with them, and then explore how these same concerns can be mitigated with a proper cloud strategy.
Tags : global knowledge, iaas, public clouds, cloud, security
     Global Knowledge
By: Fujitsu     Published Date: Jul 25, 2014
Download to read how Fujitsu gave the Metropolitan Nashville Police Department a cost effective reliable solution to their technology and communication challenges.
Tags : fujitsu, case study, communications, technology, brite fujitsu
     Fujitsu
By: HP     Published Date: Jul 22, 2014
If you’re looking to make a primary storage investment in the near future, you can’t afford to not consider an all-flash array. HP 3PAR StoreServ Storage was built to make your IT investments go farther and protect them for longer without asking you to sacrifice performance or scalability. That’s why the HP 3PAR StoreServ 7450 is the only all-flash array on the market that is flash-optimized without being flash-limited—so you won’t have to make business limiting decisions when it comes to implementing your new all-flash array.
Tags : 3par, storeserv, storage, invest, array
     HP
By: HP     Published Date: Jul 22, 2014
To prepare for doubling its growth and, at the same time, update its 20 year-old IT systems, Focal Point implemented an HP 3PAR StoreServ 7400 Storage Area Network (SAN) with an HP StoreOnce backup to match. The old system was causing weekly unplanned outages and seriously hindering critical business processes.
Tags : 3par, storage, solution, storeonce, system
     HP
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search