> Technology > IT Management
 

IT Management

IT Management includes a variety of functions for managing computers in a networked environment, including software distribution, version control, backup & recovery, job scheduling, virus protection and performance and capacity planning.
Results 1 - 25 of 2416Sort Results By: Published Date | Title | Company Name
By: XO Communications     Published Date: Jul 22, 2015
Download this white paper to find out how this approach enables you to retain top-down visibility and control of network security and manage the impact of cloud traffic on your WAN.
Tags : shadow it, hybrid cloud management, visibility, network security, cloud traffic
     XO Communications
By: XO Communications     Published Date: Jul 22, 2015
Gannett views its private cloud and WAN capability as a strategic core competency and was looking for a strategic partner to support its growth and cloud initiatives. XO embraced this partnership and earned the trust of the media giant by providing superior technical expertise, smooth implementations, and responsive customer support.
Tags : gannett, private cloud, xo mpls ip-vpn wan, scalability, strategy
     XO Communications
By: XO Communications     Published Date: Jul 22, 2015
Download this white paper to learn how XO MPLS IP-VPN helps Wine.com prevent traffic bottlenecks at order processing centers, especially during high-volume periods, so orders get processed and packages don't get lost.
Tags : xo mpls ip-vpn, traffic bottlenecks, order processing, vpn, it management
     XO Communications
By: CDW-Trend Micro     Published Date: Jul 17, 2015
Rush University Medical Center (Rush) is a not-for-profit healthcare, education, and research enterprise with a 664-bed academic medical center that includes hospital facilities for adults and children. Rush offers residency and fellowship programs in medical and surgical specialties to more than 2,000 students. With a large and experienced IT team, Rush manages three data centers across its campuses. The organization currently supports approximately 1,600 virtual desktops and 600 virtual servers, along with 10,000 physical desktops. The Rush IT team is tasked with supporting users on all devices, including smartphones and tablets. Watch the video to see how Rush protects the entire organization and protects against advanced threats with Trend Micro solutions, including Deep Discovery. Webinar Brought To You By CDW-Trend Micro
Tags : security threats, trend micro, security solutions, mobile devices, network
     CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Jul 17, 2015
Security in the cloud is a shared responsibility. That means customers and cloud service providers must work together to protect applications and data, meet compliance regulations, and ensure business continuity. Watch this video to learn more about cloud security through Trend Micro Deep Security. Webinar Brought To You By CDW-Trend Micro
Tags : it management
     CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Jul 17, 2015
Watch this video to learn why you should defend against targeted attacks, and how the Trend Micro Custom Defense provides unique solutions to detect, analyze and respond to your attackers. Webinar Brought To You By CDW-Trend Micro
Tags : trend micro, targeted attacks, security solutions, technology, it management
     CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Jul 17, 2015
A small business owner named Pete needs a complete security solution that protects everyone on his staff when they email, browse, and share using their Macs, PCs, or mobile devices. Watch this video and see Pete discover Trend Micro™ Worry-Free™ Business Security is an easy-to-use solution that provides complete user protection for all his employees. Webinar Brought To You By CDW-Trend Micro
Tags : security solution, cyber attack, mobile devices, business security, user protection
     CDW-Trend Micro
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : nist requirements, dod requirements, mobile device management, federal affairs, government
     MaaS360 by Fiberlink
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
Manufacturing: The Bring Your Own Device (BYOD) policies that thrive in other industries are gaining momentum in manufacturing as well.
Tags : mobile device management, manufacturing, mobile devices, smartphone, tablet
     MaaS360 by Fiberlink
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
Get the latest mobile devices and apps in the hands of learners and educators quickly and securely with mobile device and app management.
Tags : mobile device management, education, educators, students, app management
     MaaS360 by Fiberlink
By: Bit9     Published Date: Jul 09, 2015
New cyber-security technology architectures are being designed for automation, integration, and orchestration, and could unify point tools to improve incident prevention, detection, and response while streamlining cyber-security operations. Bit9 + Carbon Black has embraced this new model and designs its products for out-of-the-box integration.
Tags : bit9, cyber security, security processes, cyber security architecture, it management
     Bit9
By: Bit9     Published Date: Jul 09, 2015
This eBook will outline the strategies and tactics cyber criminals use to attack corporate endpoints and servers. It will also provide you with strategies and solutions your organization can use to arm your endpoints against these attacks.
Tags : bit9, financial services, endpoint security, security solutions, endpoint software
     Bit9
By: Bit9     Published Date: Jul 09, 2015
Financial services organizations are responsible for protecting sensitive customer information regardless of how it’s transmitted, where it resides or how authorized users access it. Fail to do so, and the effects can be devastating: loss of highly confidential and sensitive information; financial penalties; and damaged trust and credibility. Endpoints such as ATMs, scanners, and peripherals (e.g. digital signing devices, tablets, mobile, and any other device that has an IP address or URL) have created increased liability and need to be tracked, monitored and managed in real-time. By establishing more effective endpoint controls and safeguards for data, organizations can significantly reduce the risks of business interruptions, non-compliance, data breaches and advanced persistent threats (APTs).
Tags : bit9, financial services, compliance solutions, data breaches, it management
     Bit9
By: Compass Datacenters     Published Date: Jul 07, 2015
A high percentage of today’s data centers use water-based cooling methods. Although evaporative cooling, whether through traditional towers or “advanced” adiabatic cooling systems (aka swamp coolers), remain highly effective cooling methods, when you’re planning a new data center you may want to consider the impact of the weather and water availability on your decision.
Tags : echnology, water, evaporative cooling, swamp coolers, data center maintenance
     Compass Datacenters
By: Compass Datacenters     Published Date: Jul 07, 2015
The purpose of this white paper is to describe the provider thinking and product elements that must be addressed to change the data center selection process from one that is tactical to one that is strategic in nature.
Tags : data center, it decision making, data center operators, it management
     Compass Datacenters
By: Compass Datacenters     Published Date: Jul 07, 2015
Read this white paper to learn why ensuring that your data center is in compliance with the appropriate requirements is extremely important.
Tags : data center compliance, data center requirements, data center regulations, it management
     Compass Datacenters
By: IBM     Published Date: Jul 07, 2015
This infographic succinctly explains the value of our Mobile Platform for key stakeholders -- developers, IT managers, app owners and users, and CISOs. It also charts our four capabilities and the modular services aligned to them.
Tags : ibm, developer, app, platform, it manager
     IBM
By: Lenovo     Published Date: Jul 07, 2015
"Lenovo® XClarity™ is a new centralized systems management solution that helps administrators deliver infrastructure faster. This solution integrates easily into Lenovo System x® M5 and X6 rack servers and the Lenovo Flex System™ — all powered by Intel® Xeon® processors — providing automated discovery, monitoring, firmware updates, configuration management, and bare metal deployment of operating systems and hypervisors across multiple systems. Lenovo XClarity provides automated resource management with agentless, software virtual appliance architecture. It features an intuitive graphical user interface. Download now to find out more about Lenovo XClarity! Sponsored by Lenovo® and Intel®"
Tags : lenovo, xclarity, server value, system management, automated discovery
     Lenovo
By: Lenovo     Published Date: Jul 07, 2015
Lenovo® Flex System™ — powered by Intel® Xeon® processors — is the newest blade infrastructure design with the attributes that support soft ware-defi ned infrastructure and virtualization better than any competitor. It delivers key benefits better than any competitor: • Reduces capital and operational costs with consistent hardware/software deployment and the ability to simply scale workloads with the highest VM capacity and performance. • Increases agility with simplified rapid deployment and ongoing management to add, change, or move workloads with their associated resources. • Improves efficiency and increases space, power, and cooling with the leading compute, storage, and network density. Download Now! Sponsored by Lenovo® and Intel®"
Tags : lenovo, flex system, network density, operational costs, software deployment
     Lenovo
By: Lenovo     Published Date: Jul 07, 2015
Lenovo® is known for innovative design, superior performance, and reliability. Lenovo Flex System™ — powered by Intel® Xeon® processors — is designed to be the foundation of your IT infrastructure now and into the future. To meet today’s complex and ever changing demands, Lenovo Flex System provides a high performance, integrated infrastructure platform that supports a mix of compute and networking capabilities. The Flex System architecture provides the efficiency you need now, along with the growth path necessary to protect your investment tomorrow. Read more about it when you download! Sponsored by Lenovo® and Intel®"
Tags : lenovo, chassis, flex system, integrated infrastructure platform, networking capabilities
     Lenovo
By: F5 Networks Inc     Published Date: Jun 24, 2015
Enterprises are moving to a software-defined, private cloud data center model for agility, operational efficiency, and a self-service approach to deploying applications and associated services. They are utilizing a two-tier hybrid services architecture to get the benefits of specialized hardware for front door network services and scalable software for application, stack-specific services. Read this whitepaper to learn how to integrate the necessary services with the orchestration and automation systems of a software-defined data center.
Tags : appplication services, cloud, software, load balancing, iot
     F5 Networks Inc
By: F5 Networks Inc     Published Date: Jun 24, 2015
To succeed in this dynamic environment, organizations must create networks that combine core layer 4-7 functionality, programmability, and application fluency into a scalable Application Delivery Network. While these components all bring their individual benefits, the real lasting value lies in the resulting synergy of the combined solution. Read this whitepaper to learn about the five advantages of F5 when evaluating a replacement for Cisco ACE.
Tags : appplication services, cloud, software, load balancing, iot
     F5 Networks Inc
By: F5 Networks Inc     Published Date: Jun 24, 2015
To meet the challenges of IT organizations, Cisco and F5 have developed a shared architectural vision and joint solution to simplify networking and solve pain points in next-generation data centers. The solution extends the F5 Synthesis architecture and programmable Software-Defined Application Services (SDAS) within the Cisco Application Centric Infrastructure (ACI), helping customers efficiently deliver applications that are fast, secure and available. Read the whitepaper to learn more.
Tags : appplication services, cloud, software, load balancing, iot
     F5 Networks Inc
By: Netsuite DWASF Leads Display Q1 2015     Published Date: Jun 10, 2015
This research paper argues that it is up to the CFO to work with IT to modernize the business before it is too late. Enterprises need greater transparency into the streams of data illuminating market opportunities and market risks. They need systems that scale in step with the organization’s growth and technologies assisting a more intimate customer relationship. This paper highlights five reasons why the CFO must lead the charge to modernize their organizations now—or risk being outrun by the competition.
Tags : business management software, cloud erp, erp, business software, accounting software
     Netsuite DWASF Leads Display Q1 2015
By: Netsuite DWASF Leads Display Q1 2015     Published Date: Jun 10, 2015
Download this white paper on how cloud ERP can help IT meet rapidly evolving business needs. Discover the core characteristics of the modern enterprise, and the new ERP strategies adopted by rapidly growing enterprises like Williams-Sonoma and Knowledge Universe to support their growth.
Tags : business management software, cloud erp, erp, business software, accounting software
     Netsuite DWASF Leads Display Q1 2015
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search