> White Papers > Technology > IT Management
 

IT Management

IT Management includes a variety of functions for managing computers in a networked environment, including software distribution, version control, backup & recovery, job scheduling, virus protection and performance and capacity planning.
Results 1 - 25 of 2572Sort Results By: Published Date | Title | Company Name
By: CA Technologies     Published Date: Jul 30, 2014
Join us on July 30th at 10am PT, the panelists will examine the current state of enterprise mobility programs and outline concrete steps and examples that businesses can take to reboot their own mobility efforts.
Tags : ca technologies, emm, enterprise mobility management, mobile workers, mobile devices
     CA Technologies
By: Citrix     Published Date: Jul 25, 2014
In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share security best practices for IT leaders.
Tags : network security, application security, compliance, email security, hacker detection
     Citrix
By: Polycom     Published Date: Jul 24, 2014
Download this survey to learn what 5,000 business professionals around the world say are their biggest collaboration challenges—and discover the strategies they deploy to overcome them. In late 2013, Polycom invited customers and partners around the world to participate in a survey that focused on collaboration challenges. More than 5,000 business professionals from all job levels, functions and vertical sectors responded, candidly sharing insights about their obstacles and the strategies they deploy to overcome them. The survey reveals that 85% of the respondents believe video conferencing helps them achieve their business goals. See how they successfully use video in their profession and how you can leverage technology to defy distance and improve remote collaboration within your organization as well.
Tags : polycom, collaboration video conferencing, defy distance, networking, it management
     Polycom
By: Polycom     Published Date: Jul 24, 2014
Organizations today are using video conferencing and collaboration in many ways that were not imaginable just a few years ago. These implementations and use cases are delivering hard and soft benefits far beyond the cost savings associated with business travel and general purpose meetings.
Tags : polycom, video conferencing, collaboration, cost savings, it management
     Polycom
By: IBM     Published Date: Jul 22, 2014
Listen to an interactive discussion (socialcast) with a select group of IBM Data Scientists that goes beyond the tools and tackles new ways your business can use data.
Tags : ibm, it operations analytics, it operations, analytical applications, data
     IBM
By: Citrix     Published Date: Jul 18, 2014
This Citrix Key Project Design Guide provides an overview of the solution architecture and implementation used in the key project on remote access for enterprise PCs.
Tags : citrix, enterprise pc, remote access, remote network management, network architecture
     Citrix
By: Sirius Computer Solutions, Inc.     Published Date: Jul 17, 2014
Recipe for Dramatically Improving Application Performance, Storage Capacity and Total Cost of Ownership
Tags : sirius computer solutions, ibm, application performance, storage capacity, cost of ownership
     Sirius Computer Solutions, Inc.
By: Sirius Computer Solutions, Inc.     Published Date: Jul 17, 2014
To capitalize on sales opportunities through deeper insights into customer demand, CCBCC needed to crunch more data without increasing time-to-insight, while meeting existing service-level agreements.
Tags : sirius computer solutions, ibm, application performance, storage capacity, cost of ownership
     Sirius Computer Solutions, Inc.
By: Sirius Computer Solutions, Inc.     Published Date: Jul 17, 2014
Download to read how organizations like Coca-Cola Bottling Company Consolidated are now up to speed with IBM FlashSystem.
Tags : sirius computer solutions, ibm, application performance, storage capacity, cost of ownership
     Sirius Computer Solutions, Inc.
By: Citrix     Published Date: Jul 17, 2014
This paper addresses many common business challenges facing IT organizations, such as enabling mobile workstyles without compromising security, streamlining desktop management efforts as the number of employees in remote offices and offshore locations increases and making the user experience personal through self-service access to applications and desktops.
Tags : citrix, xenapp, mobile workers, mobile workforce, desktop management
     Citrix
By: AlienVault     Published Date: Jul 16, 2014
“AlienVault's USM is tailor-made for the needs of the security-savvy SMB. It offers affordability, and a comprehensive and ever-increasing feature set powered by the respectable AV Labs and Open Threat Exchange.” In this analyst report, Javvad Malik of The 451 Group, reviews AlienVault's SMB-focused approach to SIEM and discusses the competitive landscape.
Tags : alienvault, alienvault usm, security operations center, smb, javvad malik
     AlienVault
By: CA Technologies     Published Date: Jul 16, 2014
This paper provides findings and statistics on users demands and an important list of 5 ways to satisfy both business and user demands for IT Service.
Tags : cloud service management, mobile computing, mobile data systems, customer interaction service, service management
     CA Technologies
By: CA Technologies     Published Date: Jul 16, 2014
This paper focuses on the changing demands from consumers and how the right IT Management Solution can help.
Tags : it service management, changing consumer demands, consumer experience, byod, saas
     CA Technologies
By: Riverbed     Published Date: Jul 15, 2014
Application environments and the underlying IT infrastructure that supports them are becoming much more dynamic and complicated. New architectures are being deployed to help accelerate time to market, applications are distributed and modular, leveraging web-based or Service Oriented Architectures (SOA). Read this to learn the latest trends.
Tags : big data, integrated, end-user, experience, it infrastructure
     Riverbed
By: Riverbed     Published Date: Jul 15, 2014
Your business is complex. Big data promises to manage this complexity to make better decisions. But the technology services that run your business are also complex. Many are too complex to manage easily, fueling more complexity, delays, and downtime. Forrester predicts this will inevitably get worse. To combat this onslaught, you can no longer just accelerate current practices or rely on human intelligence. You need machines to analyze conditions to invoke the appropriate actions. These actions themselves can be automated. To perform adaptive, full-service automation, you need IT analytics, a disruption to your existing monitoring and management strategy.
Tags : big data analysis, it analytics, manage, complex, automation
     Riverbed
By: Nginx     Published Date: Jul 15, 2014
Users demand fast application delivery and it is essential for the survival of your business. Meeting the expectations of your users is challenging. NGINX Plus offers a broad array of solutions to solve these challenges, allowing you to delight your users.
Tags : nginx, application delivery, web servers, application infrastructure, apache http server
     Nginx
By: Riverbed     Published Date: Jul 15, 2014
The intelligent economy is here, and it is transforming IT's mandate to deliver business value to the enterprise. Businesses recognize that to remain competitive, they need to embrace a broader array of collaborative applications and create ubiquitous access to these applications at the far reaches of the globe. Ensuring IT is the "must have" resource in new revenue-generating opportunities is top of mind for all IT professionals.
Tags : business value, roi, application-awareness, network performance, network management
     Riverbed
By: Neustar     Published Date: Jul 14, 2014
More and more criminals are using DDoS attacks as a distraction or “smokescreen” for other cybercrimes like theft of data or even funds. Watch this video for a behind-the-scenes tour of what this “underground economy” of the Internet really looks like – a place where criminals sell stolen credit cards and credentials by the thousands, offer botnets, malware, and DDoS for hire, and much more
Tags : neustar, ddos, cybercrimes, malware, botnets
     Neustar
By: Neustar     Published Date: Jul 14, 2014
For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger? What new tactics are criminals employing? See this infographic for clues.
Tags : neustar, blackbeard, pirate, siteprotect, cloud computing
     Neustar
By: Neustar     Published Date: Jul 14, 2014
It’s no secret that DDoS attacks are worsening by the day. From the largest financial institutions to smaller Internet companies, everyone’s a target. Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size. Most of these conversations boil down to three key questions and form the conversation you should be having, too—whether you use Neustar, another provider or your in-house team to manage your external DNS.
Tags : neustar, ddos, ecommerce, protection, security
     Neustar
By: Neustar     Published Date: Jul 14, 2014
Historically, communication service providers (CSPs) have viewed network transformation through the narrow lens of technology, as though it were a simple matter of upgrading equipment. But in reality, the solution is much more complex. To ensure a smooth transition to an all-IP network, it’s essential for each area of the business (IT, marketing and operations) to work together and consistently communicate throughout the journey.
Tags : neustar, network transformation, csps, communication service providers, ip networks
     Neustar
By: Neustar     Published Date: Jul 14, 2014
DDoS attacks against high-tech firms have started to take a dangerous turn. It’s called DDoS smokescreening — attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property. This is just one insight in Neustar’s 2014 Annual DDoS Attacks and Impact Survey. The resulting report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology products and/or services such as software, SaaS, IaaS as well as hardware manufacturers
Tags : neustar, ddos, online gaming, ecommerce, protection
     Neustar
By: AlienVault     Published Date: Jul 14, 2014
While vulnerability assessments are essential, considering vulnerability data in a vacuum greatly limits your ability to prioritize your action plan in an effective way. Without the context of which vulnerabilities are the most severe, which are actively being targeted, which are on critical assets, etc, you may waste time checking things off the list without actually improving security. Join us for this session to learn how to integrate threat intelligence into your vulnerability management strategy.
Tags : alienvault, threat intelligence, vulnerability assessments, vulnerability data, security
     AlienVault
By: AlienVault     Published Date: Jul 14, 2014
Event logs provide valuable information to troubleshoot operational errors, and investigate potential security exposures. They are literally the bread crumbs of the IT world. As a result, a commonly-used approach is to collect logs from everything connected to the network "just in case" without thinking about what data is actually useful. But, as you're likely aware, the "collect everything" approach can actually make threat detection and incident response more difficult as you wade through massive amounts of irrelevant data. Join us for this session to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements.
Tags : alienvault, troubleshooting operational errors, potential security exposures, satisfy compliance requirements, security
     AlienVault
By: AlienVault     Published Date: Jul 14, 2014
Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources. In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.
Tags : alienvault, limited resources, it time management, it prioritization, it management
     AlienVault
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Desktop Management, Employee Performance, ITIL, Productivity, Project Management, Sarbanes Oxley Compliance, Service Management, Software Compliance

Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.