information technology

Results 176 - 200 of 462Sort Results By: Published Date | Title | Company Name
By: Entrust Datacard     Published Date: May 15, 2014
The immense popularity of mobile devices has introduced major changes to information technology in all industries, but one clear constant is the need to preserve security. This infographic provides a quick glance at the importance of device certificates in a mobile-powered world.
Tags : entrust, certificates, mobile devices, security, device certificates, it management
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 21, 2014
The immense popularity of mobile devices has introduced major changes to information technology in all industries, but one clear constant is the need to preserve security. This infographic provides a quick glance at the importance of device certificates in a mobile-powered world.
Tags : device certificates, identity, authentication, mobile world, information technology, security
     Entrust Datacard
By: TriGeo Network Security     Published Date: Oct 03, 2008
It’s widely accepted that Security Information and Event Management (SIEM) systems are excellent tools for regulatory compliance, log management and analysis, trouble-shooting and forensic analysis. What’s surprising to many is that this technology can play a significant role in actively defending networks. This whitepaper explains precisely how real-time analysis, combined with in-memory correlation, and automated notification and remediation capabilities can provide unprecedented network visibility, security and control.
Tags : trigeo whitepaper, siem, log management, security event management, automated remediation, active response, correlation, compliance, proactive network security, security, data management
     TriGeo Network Security
By: Dell     Published Date: Oct 23, 2008
The Information Technology Infrastructure Library offers basic steps for managing a successful Windows Vista migration.
Tags : dell, vista migration management, it infrastructure library, it asset management, it management
     Dell
By: F5 Networks Inc     Published Date: Nov 20, 2008
Intelligent file virtualization helps resolves the dilemma of managing and storing an ever increasing amount of information. This white paper introduces the F5 ARX intelligent file virtualization solution. It also discusses the key applications and benefits of this innovative technology.
Tags : intelligent file virtualization, f5 arx, key applications, data migration, data replication, enterprise applications, storage, data management
     F5 Networks Inc
By: VMware     Published Date: Feb 26, 2009
In this flash demo, see how CA ARCserve Backup r12 can help your business protect your most vital information — business data. Take this opportunity to quickly view a few powerful features and benefits of the backup virtualization technology available in CA ARCserve Backup. 
Tags : vmware, virtualization support, ca arcserve, ca xosoft solutions, business data, backup virtualization, security, data management
     VMware
By: Citrix Systems     Published Date: Apr 15, 2016
Simple, secure ways to deliver a great experience for remote users. As mobile workstyles transform the way people and businesses work, remote access is becoming more important than ever. In enabling people to work anywhere, on any device, you need to meet IT’s requirements for security and manageability—but it’s just as important to consider user experience. Citrix, a leader in mobile workstyles, has long recognized that remote access has to address the needs of users as well as IT. With an entire team dedicated to user experience, Citrix has developed secure-by-design remote access solutions that make it simple for people to work the way they choose, anywhere and on any device, to deliver optimal productivity and business impact for their organizations
Tags : network management, network secuirty, network optimization, information technology, best practices
     Citrix Systems
By: Citrix Systems     Published Date: Apr 15, 2016
The need to reduce costs and simplify IT can
Tags : best practices, budget, business optimization, business management, information technology
     Citrix Systems
By: LogMeIn     Published Date: Jan 15, 2014
With this whitepaper, you will be given tips on global solution for audio and web conferencing at an affordable price with meetings being hassle-free.
Tags : logmein, getronics, leading information, communications technology, integrated itc services, public sector markets, global conferencing, collaboration tool, web conferencing, conference costs, ad-hoc collaboration, real-time solution, online meeting solution, it spending, it management
     LogMeIn
By: ForeScout     Published Date: Aug 14, 2012
Business wants more fluid access to data while IT organizations must maintain security. As the variety of access and multitude of threats to network resources and sensitive information have grown, so has the need for more flexible and automated ways to effectuate security policies, controls and enforcement. Rarely is this need more keenly felt than at the network endpoint, where people, technology, information assets and requirements for security and compliance meet most directly.
Tags : pragmatic, path, achieving nac results, essential implementation, process, control, consideration, data, access, it organization, security, protection, network, access, control, nac, interoperability, 802.1x standards, control, options
     ForeScout
By: CDW     Published Date: Nov 13, 2012
With daily reports of network breaches on the way up, now is the time to double down on solid network protection.
Tags : cdw, data, identity security, it security, enterprise information technology, network breaches, business technology
     CDW
By: BMC Software     Published Date: Oct 23, 2014
Rapid shifts in the ways that technology and information are consumed and delivered— through cloud computing, big data, social networking, and smart devices—are transforming how companies compete. IT is at the center of the fray, working with business leaders to develop and execute a digital transformation strategy that capitalizes on these major new technologies. In order to lead this transformation, IT executives must focus on three areas: collaborating with business leaders to build a strategic vision, modernizing technology infrastructure, and rebuilding IT organizations to execute against new digital business goals.
Tags : saas, cloud, itsm, integrating itsm, itsm integration, saas integration, networking, it management, data center
     BMC Software
By: RightAnswers     Published Date: Sep 04, 2013
Every day, technology plays a bigger and bigger role throughout corporate America, corporate success becomes increasingly dependent on productive use of information technology – and IT support grows more critical. But while excellent IT support rapidly returns users to productive work, the information necessary to that excellence is often fragmented in different parts of the IT organization. Effective knowledge management empowers service desks – and even users themselves – by enabling quick, accurate and consistent user solutions. That leads to measureable benefits for your business. This brief explores 20 metrics that measure those benefits – in other words, your “return on knowledge.”
Tags : return on knowledge, knowledge management, rightanswers, knowledge, measuring business benefits, crm, customer relationship management, crm, b2b
     RightAnswers
By: QTS Data Centers     Published Date: Mar 31, 2015
Information technology is undergoing rapid change as organizations of all types begin to embrace the idea of moving computing infrastructure from on-premises to the cloud. It is easy to understand why the cloud has taken off faster than any technology phenomenon in recent memory. The cloud has the potential to reduce total cost of ownership (TCO) while enabling quicker responses to fast-moving markets and ever-changing customer needs. “Being able to flex your compute resources based on changes in volume and customer demand increases agility, making going to the cloud a very attractive proposition for our customers,” says Brian Johnston, chief technology officer for QTS in Overland Park, Kansas, a provider of data center solutions and fully managed services.
Tags : qts, cloud, security, data transactions, cio report, cyber threats, security breaches, it leaders, it management
     QTS Data Centers
By: Xangati     Published Date: Sep 01, 2015
If you are a healthcare professional, then you and your organization are caught between the horns of compliance and improving the patient experience. With the Health Information Technology for Economic and Clinical Health Act (HITECH) now in full effect, the days of lax enforcement are over. First-time penalties or violations can reach up to $250,000. The transition to EMR/EHR use, along with all of the systems and equipment upgrading that entails, will be done and done well – or else. Penalties can also extend to your organization’s business associates.
Tags : performance management, information technology, cloud and systems virtualization
     Xangati
By: CommVault     Published Date: Jun 10, 2015
Data and information management is becoming increasingly complex and dynamic. There are innovations in technology and process that can supply new advantages.
Tags : software, backup, optimize, management, efficiency, business technology
     CommVault
By: ServiceNow     Published Date: Oct 11, 2017
For years, companies have used CRM as the software of choice to manage customer engagement and information, in an attempt to deliver a great customer experience. Managing the front end of the engagement process is important. However, delivering proactive customer service – that prevents and resolves issues – requires much more than that. At ServiceNow, we believe that it is time to rethink the fundamentals of CRM and customer service and we invite you to explore the new strategies, processes, and technology presented in this toolkit. Doing so will enable your customer service teams to connect seamlessly with other departments and deliver the effortless and proactive service experience your customers expect. We hope you find the collection of research reports and whitepapers valuable.
Tags : 
     ServiceNow
By: LogRhythm     Published Date: Aug 08, 2016
Security threats continue to be more sophisticated and advanced with each day, with the majority often going completely undetected. • Organizations are usually scrambling to keep up and implement new security controls to protect themselves, which adds a new layer of complexity. • With the rise of Advanced Persistent Threats (APTs) and insider attacks, it becomes extremely difficult for security staff to detect all the risks. • Many IT and IT Security staff are already stretched thin by keeping track of many different security technologies that already exist.
Tags : security, technology, best practices, information technology
     LogRhythm
By: LogRhythm     Published Date: Aug 08, 2016
IT environments have become much more vulnerable as enterprise mobility, cloud services and “bring-your-own-everything” have broken down the defensible perimeter and added layers of complexity to securing the enterprise. At the same time, the nature of cyber threats has changed dramatically. Threat actors are well organized and well funded, and many of them are known to be supported by nation states. They have sophisticated technical skills which allow these actors to create custom malware for very specific targets, and they are relentless in pursuit of their objectives. Moreover, almost anyone with a malicious intent can purchase malware and rent botnets on the Dark Web, lowering the bar for criminal entities, nation states, and terrorists to use cyber as a weapon of choice towards their intended purpose.
Tags : security, technology, best practices, information technology, cyber threats, mobility, business technology
     LogRhythm
By: LogRhythm     Published Date: Aug 08, 2016
Security information and event management technologies vary widely in their focus and functionalities, with vendors offering divergent security monitoring visions. This research helps IT security managers align their needs with one of the three most common use cases to choose the best SIEM solution.
Tags : security, technology, best practices, information technology, business technology
     LogRhythm
By: LogRhythm     Published Date: Aug 08, 2016
The first two installments of the Cyber-threat defense report began the process of looking beyond major breaches and the never ending evolution of cyber-threats to better understand what IT security teams are doing to defend against them.
Tags : security, technology, best practices, information technology, cyber threat, business technology
     LogRhythm
By: LogRhythm     Published Date: Aug 08, 2016
Over the past three years, ransomware has jumped into the spotlight of the cyber threat landscape. Kaspersky Lab reports that in 2015, its solutions detected ransomware on more than 50,000 computers in corporate networks—double the figure for 2014. Even at this rate of detection, Kaspersky admits that the real number of incidents is several times higher than what has been detected and reported.1 In just the first quarter of 2016, $209 million was paid out to cyber criminals using ransomware. The FBI estimates that losses to be incurred in 2016 due to ransomware will top $1 billion.2 Once again, this is just the tip of the iceberg.
Tags : security, technology, best practices, information technology, business technology
     LogRhythm
By: LogRhythm     Published Date: Aug 08, 2016
It feels as if these folks have been around forever. They started life as a SIEM with a heavy emphasis on log management. Today they are all that plus a solid suite of next-generation attributes. They have many of the attributes of next-gen SIEMs: artificial intelligence, sophisticated log correlation, sophisticated pattern recognition and behavioral analysis. Their strength is, as it always has been, log management. But “log management” has taken on an entirely new dimension with this product. As is absolutely necessary today, it has the intelligence to analyze, correlate and make sense of huge amounts of data.
Tags : security, technology, best practices, information technology, business intelligence, business technology
     LogRhythm
By: Oracle HCM Cloud     Published Date: May 25, 2017
The journey to digital healthcare begins with simply moving HR and other healthcare information to a digital format. An important next step is moving back-office operations to the cloud. Use the checklists of industry, technology and internal challenges facing healthcare organizations contained within this white paper to determine where you are on the cloud readiness spectrum, and begin creating a digital healthcare transformation plan for your organization.
Tags : 
     Oracle HCM Cloud
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com