> White Papers > Technology > IT Management
 

IT Management

IT Management includes a variety of functions for managing computers in a networked environment, including software distribution, version control, backup & recovery, job scheduling, virus protection and performance and capacity planning.
Results 1 - 25 of 3623Sort Results By: Published Date | Title | Company Name
By: Arcserve     Published Date: May 29, 2015
The traditional taxonomy of data protection appliances – also known as Purpose Built Backup Appliances (PBBAs) – covers two primary categories: • Backup Appliances • Deduplication Appliances Let’s explore this taxonomy and market dynamics.
Tags : data protection appliances, purpose built backup appliances, deduplication, market dynamics, security
     Arcserve
By: Arcserve     Published Date: May 29, 2015
Find out what you need to know about data protection appliances in this video brief by the Enterprise Strategy Group’s Sr. Data Protection Analyst, Jason Buffington. In this short video he’ll analyze: -Various types of data protection appliances -Market trends regarding appliance adoption -What data protection specialists expect from appliances -How Arcserve has evolved to solve the issues of today’s complex organizations Watch this video brief today!
Tags : data protection appliances, appliance adoption, arcserve, security, it management
     Arcserve
By: Arcserve     Published Date: May 29, 2015
Today, data volumes are growing exponentially and organizations of every size are struggling to manage what has become a very expensive and complex problem. It causes real issues such as: • Overprovisioning their backup infrastructure to anticipate rapid future growth. • Legacy systems can’t cope and backups take too long or are incomplete. • Companies miss recovery point objectives and recovery time targets. • Backups overload infrastructure and network bandwidth. • Not embracing new technologies, such as cloud backup, because there is too much data to transfer over wide area networks.
Tags : backup infrastructure, legacy systems, overload infrastructure, cloud, security
     Arcserve
By: Arcserve     Published Date: May 29, 2015
Today, data volumes are growing exponentially and organizations of every size are struggling to manage what has become a very expensive and complex problem. It causes real issues such as: • Overprovisioning their backup infrastructure to anticipate rapid future growth. • Legacy systems can’t cope and backups take too long or are incomplete. • Companies miss recovery point objectives and recovery time targets. • Backups overload infrastructure and network bandwidth. • Not embracing new technologies, such as cloud backup, because there is too much data to transfer over wide area networks.
Tags : backup infrastructure, legacy systems, overload infrastructure, cloud, security
     Arcserve
By: Altiscale     Published Date: May 28, 2015
Big Data technologies are maturing and quickly moving into the next phase - one that expands in data use-cases as Hadoop moves into more influential roles throughout IT infrastructures. In this just-released report, Gartner is recognizing four Big Data vendors as "cool." Gartner says these vendors can meaningfully and synergistically combine multiple types of functionality.
Tags : big data, vendors, functionality, cool vendors, consistent performance
     Altiscale
By: Altiscale     Published Date: May 28, 2015
Altiscale’s Hadoop-as-a-Service can reduce costs and improve data scientist productivity, resulting in products, services, and insights realized sooner.
Tags : hadoop-as-a-service, data improvement, data productivity, economic benefits, economic impact
     Altiscale
By: IBM     Published Date: May 28, 2015
How COOs are making their operations more customer-centric.
Tags : growth, customer experience, quality assurance, process acceleration, operations
     IBM
By: Mimecast     Published Date: May 27, 2015
White Paper: 4 Critical Risks Facing Microsoft Office 365 Implementations Migrating to Microsoft® Office 365™ has its risks. In this white paper you’ll learn how to keep email working if Office 365 is offline. Protect critical data with an independent cloud backup. Combat insidious threats to email security. And streamline migration while containing costs.
Tags : mimecast, migration, microsoft office 365, storage, cloud backup
     Mimecast
By: IBM     Published Date: May 27, 2015
This white paper from a leading analyst, VDC Research, outlines some of the key opportunities and challenges facing companies that make the "things" that comprise the Internet of Things.
Tags : internet of things, product development, time to market, data analysis, networking
     IBM
By: IBM     Published Date: May 27, 2015
Tech-Clarity offers the following ten tips to help companies transform their business to take advantage of this opportunity and prepare for growth and profitability.
Tags : internet of things, product development, time to market, data analysis, networking
     IBM
By: IBM     Published Date: May 27, 2015
With continuous validation and verification practices and solutions, engineering organizations can develop today's smarter products and create the opportunities that can put them on the path to competitive advantage.
Tags : continuous verification, product development, product engineering, mobile, prototyping
     IBM
By: ThreatTrack Security     Published Date: May 26, 2015
Organizations have a serious “people problem” when it comes to securing networks. It’s time to address the bad habits of all users that have a hand in nearly every major data breach. Read this white paper to explore the issue and the solution to your cybersecurity “people problem.”
Tags : cybersecurity, misconfiguration, patch management, passwords, mobile devices
     ThreatTrack Security
By: Aternity     Published Date: May 22, 2015
“ This 30-minute webinar that will help you navigate the EUEM landscape and learn how traditional APM and device monitoring products provide some aspects of End User Experience Monitoring, but can often leave enterprise IT Ops teams blind to what their users are actually experiencing.
Tags : enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management
     Aternity
By: Aternity     Published Date: May 22, 2015
Learn how Aternity redefines end user experience management in this series of brief videos.
Tags : enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management
     Aternity
By: IBM     Published Date: May 22, 2015
This presentation will demonstrate that it is possible to turn the promise of Big Data into business value by applying predictive analytics to Big Data sources such as Hadoop, Cloudera, and BigInsights.
Tags : big data, analytics, forecasting, data management, hadoop
     IBM
By: ThreatTrack Security     Published Date: May 21, 2015
This white paper focuses on the security problems organizations of all sizes face in regard to email and other threat vectors, and it offers recommendations about to improving security.
Tags : phishing, next-generation malware, security, email, it management
     ThreatTrack Security
By: ThreatTrack Security     Published Date: May 21, 2015
This report provides a 360 degree view of organizations' security threats, response plans, processes, and investments. More than 800 security decision makers and practitioners were surveyed in December 2014 across North America and Europe.
Tags : cyberthreat, security, malware, defense, it management
     ThreatTrack Security
By: ThreatTrack Security     Published Date: May 21, 2015
Download this eBook to learn how ThreatSecure can detect active advanced attacks and help increase the effectiveness of security and incident response teams.
Tags : advanced protection, cyberthreat, security, incident response team, threatsecure
     ThreatTrack Security
By: ThreatTrack Security     Published Date: May 21, 2015
Download this white paper to learn how to add value through malware analysis.
Tags : malware, security threat, cyberattack, cyberthreat, malware analysis
     ThreatTrack Security
By: ThreatTrack Security     Published Date: May 21, 2015
In an interview recorded at RSA Conference 2015, Itkin discusses: The unique security challenges of the midmarket; Disturbing cyber-extortion trends; What larger organizations can learn from the midmarket.
Tags : security challenges, mid-market security, cyber-extortion, cyberthreat, security
     ThreatTrack Security
By: ThreatTrack Security     Published Date: May 21, 2015
Watch this webinar to learn how to win the battle against Advanced Persistent Threats.
Tags : persistent threats, cyberattacks, security, data breach, it management
     ThreatTrack Security
By: ThreatTrack Security     Published Date: May 21, 2015
Watch the Better Defend Your Network from Targeted Attacks webinar to learn about the broad array of enhancements and new capabilities that enable you to better defend your network from advanced malware threats.
Tags : targeted attacks, cyberattacks, malware threats, malware analysis sandbox, cybersecurity
     ThreatTrack Security
By: ThreatTrack Security     Published Date: May 21, 2015
Watch this webinar for a discussion on: • Advanced threats and their potential points of entry • Why Advanced Targeted Attacks will continue to confound organizations with even the best defenses • Methods, practices, and technologies to help quickly detect and respond to these advanced attacks
Tags : advanced threats, advanced targeted attacks, security, cybersecurity, it management
     ThreatTrack Security
By: Xangati     Published Date: May 20, 2015
The goal for organizations with eCommerce Web sites, application developers and IT infrastructure managers is to deliver a successful end-user experience. Xangati can help you scale environment and succeed in reaching that goal.
Tags : e-commerce, e-commerce web applications, citrix netscaler adc, web server, web application infrastructure
     Xangati
By: Arcserve     Published Date: May 20, 2015
Review this analysis to get a better understanding of how you can eliminate application downtime.
Tags : arcserve, application downtime, critical systems, data loss, it management
     Arcserve
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Desktop Management, Employee Performance, ITIL, Productivity, Project Management, Sarbanes Oxley Compliance, Service Management, Software Compliance

Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.