it infrastructure

Results 251 - 275 of 3014Sort Results By: Published Date | Title | Company Name
By: CA Technologies     Published Date: Nov 12, 2014
This white paper examines why unified IT monitoring is an important enabling technology for both enterprises and management service providers, including both the organizational and strategic impacts as well as the business case surrounding it. It goes further to examine CA Unified Infrastructure Management as an example of unified IT monitoring, and reviews three case studies where the solution has been deployed for active use in a unified manner.
Tags : complete it visualization, it operations visibility, application visibility, infrastructure management, uim, enterprise applications, data management, business technology
     CA Technologies
By: CA Technologies     Published Date: Nov 12, 2014
This paper explains how CA Unified Infrastructure Management can have an important impact on your business.
Tags : complete it visualization, it operations visibility, application visibility, infrastructure management, uim, it management, enterprise applications, business technology
     CA Technologies
By: CA Technologies     Published Date: Nov 12, 2014
This info-graph explains the challenges and potential problems caused by the monitoring of multiple tools and devices and provides a complete unified visualization to help provide you with a single view in one architecture.
Tags : complete it visualization, it operations visibility, application visibility, infrastructure management, uim
     CA Technologies
By: CA Technologies     Published Date: Feb 09, 2015
This white paper examines why unified IT monitoring is an important enabling technology for both enterprises and management service providers.
Tags : complete it visualization, it operations visibility, application visibility, infrastructure management, uim, it management, enterprise applications, data management, business technology
     CA Technologies
By: CA Technologies     Published Date: Feb 09, 2015
This paper provides information on how CA Unified Infrastructure Management (CA UIM) delivers the essential capabilities needed to help you proactively monitor and manage alarms, performance and SLAs across even the most dynamic and complex environments.
Tags : ca uim, it monitoring, client mobility, cloud services, ca unified infrastructure management, it infrastructure and services, business technology
     CA Technologies
By: CA Technologies     Published Date: Aug 19, 2014
As demands on the data center increase, IT and facilities departments need to be able to increase and sustain high availability, maximize efficiency and minimize costs. Data Center Infrastructure Management (DCIM) provides an integrated platform for monitoring and measuring consumption, capacity and performance of both IT and facilities resources in the data center.
Tags : ca technologies, dcim, data center, data center operations, infrastructure
     CA Technologies
By: CA Technologies     Published Date: Aug 26, 2016
Many breaches happen because of compromised privileged user accounts. Risks spread like wildfire in the dynamic traditional, virtualized and cloud environments common in enterprises today. One improperly authorized privileged account can cause widespread and irreparable damage to an organization’s infrastructure, intellectual property and brand equity, leading to sudden drops in market value, broad organizational disruption and costly compliance penalties. Effectively managing privileged access across your hybrid enterprise is an imperative to reducing security and compliance risks.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Apr 06, 2017
A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solutions that are available to deal with these issues. It compares their technology, the market position each vendor has achieved, their ability to execute, and the overall maturity of each offering.
Tags : data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
     CA Technologies
By: CA Technologies     Published Date: Apr 06, 2017
Privileged credentials have served as a major attack vector in the successful execution of many breaches. Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. CA Privileged Access Management helps drive IT security and compliance risk reduction and improves operational efficiency by enabling privileged access defense in depth—providing broad and consistent protection of sensitive administrative credentials, management of privileged identity access and control of administrator activity.
Tags : it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits, user authentication
     CA Technologies
By: CA Technologies     Published Date: Apr 06, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against today’s external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
     CA Technologies
By: CA Technologies     Published Date: Apr 06, 2017
Managing and protecting privileged credentials is essential to reducing risk and addressing compliance requirements. Organizations need to evaluate privileged password management solutions for the depth of controls, scope of coverage and degree of cloud alignment they provide. CA Privileged Access Manager delivers against all three of these dimensions, providing a next-generation solution for privileged credential management that drives IT risk reduction, improves operational efficiency and protects an organization’s investment by supporting traditional, virtualized and hybrid-cloud infrastructure alike.
Tags : cloud security, cloud management, it protection, api integration, credential verification, security efficiency
     CA Technologies
By: CA Technologies     Published Date: Apr 06, 2017
CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network devices and applications.
Tags : security information, security management, event management, system security, system management, risk management, security infrastructure, it infrastructure, privilege management, system authentication
     CA Technologies
By: CA Technologies     Published Date: Aug 21, 2017
Lured by opportunities to speed innovation, reduce costs and enhance agility, many business executives are opting to move their organization’s applications into public cloud environments. Whether or not organizations realize these advantages to the fullest extent possible will in part be dictated by the monitoring capabilities in place. This paper offers a detailed look at the monitoring challenges cloud environments can pose, and it examines the key approaches = organizations need to take to foster maximum service levels, efficiency and agility in the cloud.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 21, 2017
By necessity, every company is now a software company. By 2017, two-thirds of customer service transactions will no longer require the support of a human intermediary. That means that if you haven’t already done so, you must adapt your business model to meet the needs of online customers. Failure to do so will put you at a severe competitive disadvantage. And chief among those demands is that you provide an exceptional user experience. App speed, reliability and ease of use are the new currency in this fast-changing landscape. In fact, app characteristics such as convenience and the ability to save users time can enhance brand loyalty by 60 percent or more.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 21, 2017
If you’ve seen recent car ads, you know they’re as likely to promote applications and connections as they are styling and horsepower. But manufacturers aren’t the only ones pushing apps these days. Banks, airlines, restaurants—you name it—all are using them to attract and engage customers. This is the application economy; where every company is in the software business and user experience is the new survival of the fittest.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 21, 2017
To manage IT like a business, you need tools to proactively ensure IT service reliability while simultaneously boosting operational agility. This requires a new approach to IT infrastructure management, including the selection of an infrastructure management vendor that can meet modern IT and business requirements.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 21, 2017
To manage IT like a business, you need tools to proactively ensure IT service reliability while simultaneously boosting operational agility. This requires a new approach to IT infrastructure management, including the selection of an infrastructure management vendor that can meet modern IT and business requirements.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 21, 2017
IDC's research shows that, worldwide, over 70% of enterprise cloud users currently rely on multiple clouds (public and/or private) to support a wide range of applications and workloads. Efficient management of these resources depends on IT operations and DevOps teams having access to consistent, accurate infrastructure performance monitoring data and reporting that span the full set of on-premise cloud infrastructure and public cloud IaaS services. CA Technologies recently announced new capabilities for CA Unified Infrastructure Management (CA UIM) that allow the product to more fully address the monitoring needs of complex multicloud infrastructure as part of delivering on CA's vision to fully enable the agile DevOps in the application economy.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 21, 2017
CA Technologies recently released version 8.5.1 of its flagship United Infrastructure Management (UIM) platform. The company continues its efforts to make it a powerful contender in the highly competitive and crowded hybrid IT management market. The latest enhancements, and those coming soon in the next release, should help strengthen its position as an intelligent and predictive toolset that enables administrators to quickly – and in some cases proactively – react and remediate performance and capacity anomalies.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
APIs are an emerging technology for integrating applications using web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think we can secure APIs using the same methods and technology that we used to secure the conventional, browser-centric web. While it is true that APIs share many of the same threats that plague the web, they are fundamentally differently and have an entirely unique risk profile that you need to manage. This eBooklet provides an overview of these new risks, and offers five simple solutions to counter the common threats. By adopting a secure API architecture from the beginning, organizations can pursue an API strategy more safely and securely — and reap the benefits of agile integration promised by this exciting new technology.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
The application programming interface (API) is an emerging technology for integrating applications using Web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think you can secure APIs using the same methods and technology with which we secured the browser-centric Web. APIs are fundamentally different from websites and have an entirely unique risk profile that must be addressed.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
The application programming interface (API) is an emerging technology for integrating applications using Web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think you can secure APIs using the same methods and technology with which we secured the browser-centric Web. APIs are fundamentally different from websites and have an entirely unique risk profile that must be addressed.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 24, 2017
Target, Home Depot, eBay, le Bureau de gestion du personnel des États-Unis... Les incidents de sécurité majeurs subis par ces organisations (et d’autres) récemment sont survenus suite au vol ou à la compromission des informations d’identification d’un utilisateur à forts privilèges qui disposait d’un accès étendu à des systèmes sensibles. Dans près de deux tiers des cas, la violation initiale a été facilitée par la faiblesse des pratiques de sécurité mises en place par un tiers, fournisseur ou partenaire commercial, qui avait accès à un réseau interne. C’est en volant les informations d’identification de ce tiers que les attaquants ont été en mesure d’exploiter les infrastructures informatiques des entreprises visées, pour y localiser des comptes à forts privilèges qu’ils ont ensuite utilisés pour accéder à des systèmes critiques et leur porter atteinte.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 24, 2017
CA Technologies recently released version 8.5.1 of its flagship United Infrastructure Management (UIM) platform. The company continues its efforts to make it a powerful contender in the highly competitive and crowded hybrid IT management market. The latest enhancements, and those coming soon in the next release, should help strengthen its position as an intelligent and predictive toolset that enables administrators to quickly – and in some cases proactively – react and remediate performance and capacity anomalies.
Tags : 
     CA Technologies
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com