IT Management

IT Management includes a variety of functions for managing computers in a networked environment, including software distribution, version control, backup & recovery, job scheduling, virus protection and performance and capacity planning.
Results 2476 - 2500 of 2798Sort Results By: Published Date | Title | Company Name
By: VMware AirWatch     Published Date: Nov 12, 2015
In this paper, we discuss why a bring-your-own-device (BYOD) approach to workforce mobility can be a compromise-free approach, and then how the combined capabilities of Samsung KNOX and Enterprise Mobility Management from AirWatch by VMware turn this compromise-free approach into reality.
Tags : vmware, byod, workspace mobility, airwatch, networking, it management, knowledge management, enterprise applications, platforms, business technology
     VMware AirWatch
By: VMware AirWatch     Published Date: Nov 12, 2015
EMPRESARIAL USUARIOS MÓVILES MÁS PRODUCTIVOS. DEPARTAMENTO DE TI CON MÁS CAPACIDADES. AIRWATCH® POTENCIA LA PRODUCTIVIDAD - Ponga a disposición de los usuarios finales un ÁREA DE TRABAJO DIGITAL
Tags : mobile empowerment, airwatch, mobile, cloud, networking, it management, wireless, knowledge management, data management, business technology
     VMware AirWatch
By: VMware AirWatch     Published Date: Nov 12, 2015
DES UTILISATEURS MOBILES PLUS PRODUCTIFS. UN SERVICE INFORMATIQUE MIEUX ARMÉ. AIRWATCH® AMÉLIORE LA PRODUCTIVITÉ et offre aux utilisateurs un ESPACE DE TRAVAIL NUMÉRIQUE
Tags : mobile empowerment, airwatch, mobile, cloud, it management, wireless, knowledge management, storage, data management, business technology
     VMware AirWatch
By: Okta     Published Date: Nov 03, 2015
Gartner has named Okta as the only leader in its 2015 Identity & Access Management as a Service (IDaaS) Magic Quadrant. Access your complimentary Gartner report today.
Tags : okta, gartner, magic quadrant, identity and management, idaas, networking, security, it management, knowledge management, data management, business technology
     Okta
By: Okta     Published Date: Nov 03, 2015
Enterprise mobility management and identity and access management offerings are moving toward meaningful integration. IAM and mobility leaders must take advantage to gain convenience, security and efficiency benefits.
Tags : okta, enterprise mobility, mobility management, access management, mobility leaders, efficiency, efficiency benefits, networking, security, it management, knowledge management, data management
     Okta
By: Okta     Published Date: Nov 03, 2015
One of the biggest challenges when migrating to Office 365 from your existing Exchange infrastructure, is that of Active Directory integration. Watch this demo to learn how to easily connect your Office 365 environment back to Active Directory without any new servers in your data center.
Tags : okta, directory sync, demo, office 365, exchange infrastructure, active directory, networking, it management, platforms, data management, business technology
     Okta
By: Intel Security     Published Date: Oct 20, 2015
Microsoft Office 365 is being rapidly adopted by organizations of all sizes to give users greater flexibility and access to applications anytime, anywhere, and on virtually any device. Despite built-in data protection, additional capabilities are needed to protect precious data from advanced threats and malicious insiders. McAfee Data Loss Prevention offers comprehensive protection for your most sensitive data regardless of where it resides or where it travels—in the cloud or on premises.
Tags : data loss prevention, dlp, office 365, security, it management, knowledge management
     Intel Security
By: IBM     Published Date: Oct 06, 2015
This Edison Group study provides an overview of three of the market leading MADPs -- IBM, SAP and Koney -- and discusses how they compared them using a real-world use case.
Tags : networking, it management, business technology, telecom
     IBM
By: CDW     Published Date: Sep 21, 2015
This is a video about improving the cost and infrastructure.
Tags : infrastructure, cost, storage, optimization, compression, ssd, drivers, hyperconverged, integrated, it management, enterprise applications
     CDW
By: Cisco     Published Date: Sep 15, 2015
To better understand the benefits, costs, and risks associated with a Cisco UCS implementation, Forrester interviewed several customers with multiple years of experience using Cisco UCS. Cisco Unified Computing System and servers unify computing, networking, management, virtualization, and storage access into a single integrated architecture.
Tags : unified computing system, virtualization, networking, storage, it management, enterprise applications
     Cisco
By: Cisco     Published Date: Sep 15, 2015
IDC finds that leveraging data analytics in business decisions is becoming a top priority for an increasing number of companies. This in turn is placing new demands on IT organizations; the need is twofold: to manage new streams of unstructured data from sources such as social media and to speed response times to deliver real-time analytics.
Tags : sap, analytics, data, real-time, it management, enterprise applications
     Cisco
By: Cisco     Published Date: Sep 15, 2015
In a recent Enterprise Strategy Group (ESG) paper1, senior analyst Mark Bowker listed several requirements and best practices for building a private cloud. High levels of availability and scalability, policy-based automation and application control, workload portability, and unified visibility and management across infrastructures and applications were all cited as desirable attributes.
Tags : enterprise, policy-based, infrastructure, cloud, visibility, scalability, it management, enterprise applications
     Cisco
By: EvolveIP     Published Date: Sep 09, 2015
When considering any new financial undertaking, you need to conduct a comparison between what you are already spending and what you will spend. In most financial comparisons, you can look at previous patterns to predict future costs or options.
Tags : networking, it management, knowledge management, data management, business technology
     EvolveIP
By: IBM     Published Date: Jul 08, 2015
For years, organizations have recognized that a better understanding of customers can translate to more sales, increased customer satisfaction and reduced customer churn. Initiatives focused on a 360-degree view of the customer have gone a long way toward providing those benefits by synthesizing customer profiles, sales history and other structured data from multiple sources across the enterprise. But today, customer-centric organizations are discovering that there is more opportunity for growth when they enhance that 360-degree view with information from more sources, both within and beyond the enterprise (see Figure 1). Information in email messages, unstructured documents and social media sentiments—previously beyond reach—is now extending the 360-degree view.
Tags : ibm, e360, customer satisfaction, customer retention, sales history, big data, it management, knowledge management, enterprise applications, business technology
     IBM
By: IBM     Published Date: Jul 08, 2015
The MDM of product data solutions market segment grew nearly 9% in 2013. Increasingly, end-user organizations are exploiting MDM as the heart of a digital business transformation. This Magic Quadrant, which evaluates 15 providers, will help find the right vendor for their needs. 
Tags : ibm, magic quadrant, gartner, data management, product data solutions, it management, knowledge management, enterprise applications
     IBM
By: VMware AirWatch     Published Date: Jul 06, 2015
This report details the results of a survey taken from pre-qualified IT decision makers from North America and Europe, and shows how AirWatch by VMware received the highest scores for EMM vendor promise and fulfilment. 950 surveys were completed.
Tags : airwatch, vmware, emm, vendor promise, fulfillment, security, it management, business technology
     VMware AirWatch
By: Mimecast     Published Date: Jun 25, 2015
In this whitepaper, Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization, see exactly what happens before, during and after an attack, all the mistakes that made you vulnerable, and how you can get ready for it.
Tags : mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, security, it management, knowledge management, data management
     Mimecast
By: Mimecast     Published Date: Jun 24, 2015
The article is a helpful reminder that your employees often make life easier for attackers by being the weakest link in your network defenses. Social media is a rich hunting ground for hackers. Names, locations, photos, interests, connections, partnerships, vacation details, email addresses and phone numbers – this is often the information that hackers use to target specific employees through well-crafted, highly personalized emails.
Tags : mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, security, it management, knowledge management, data management
     Mimecast
By: Okta     Published Date: Jun 15, 2015
Microsoft made a massive push to the cloud in 2014, and as a result Office 365 is taking off. We’re seeing it in how Okta customers are using Okta to connect to Office 365 in increasing numbers. This eGuide provides some data from the Okta Application Network on the trends we are seeing around Office 365. It also describes the most important things to consider for Identity and Mobility Management during deployment. Office 365 is unlike any other cloud app in it’s complexity, and it is best for IT to plan and deploy solutions around Identity and Mobility Management in concert with their Office 365 roll-out to get maximum user adoption.
Tags : office 365, identity and mobility management, deployment, user adoption, adoption guide, it management
     Okta
By: Okta     Published Date: Jun 15, 2015
Gartner has named Okta as the only leader in its 2015 Identity & Access Management as a Service (IDaaS) Magic Quadrant. Access your complimentary Gartner report today.
Tags : magic quadrant, it management
     Okta
By: QTS Data Centers     Published Date: Jun 09, 2015
In this white paper, 451 Research looks into the cloud to see what’s driving the purchase of cloud security technologies.
Tags : cloud security technologies, cloud security purchases, bring your own device, mobile device management, security, it management, wireless
     QTS Data Centers
By: Arcserve     Published Date: May 29, 2015
Today, data volumes are growing exponentially and organizations of every size are struggling to manage what has become a very expensive and complex problem. It causes real issues such as: • Overprovisioning their backup infrastructure to anticipate rapid future growth. • Legacy systems can’t cope and backups take too long or are incomplete. • Companies miss recovery point objectives and recovery time targets. • Backups overload infrastructure and network bandwidth. • Not embracing new technologies, such as cloud backup, because there is too much data to transfer over wide area networks.
Tags : backup infrastructure, legacy systems, overload infrastructure, cloud, security, it management, knowledge management, data management
     Arcserve
By: IBM     Published Date: May 27, 2015
Continuous engineering is explained in easy to understand terms in this Dummies book, appropriate for all levels of product and systems development stakeholders.
Tags : continuous engineering, systems development, product development, data analysis, software development, it management, knowledge management, data management
     IBM
By: Okta     Published Date: Apr 29, 2015
Authenticating users on a variety of endpoints should provide the right balance of user experience, security and workforce productivity. CISOs and IAM leaders need to keep pace with new methods of remote access for the mobile workforce in a constantly changing work environment. Read this report why.
Tags : workforce, ciso, iam, mobile, workforce, security, it management
     Okta
By: Okta     Published Date: Apr 29, 2015
Creating mobile apps that capture the minds and wallets of your customers will lead to increased revenue and improved customer engagement. However, you must do so while protecting customers’ privacy and shielding them from fraud and other malicious activities. This report will help S&R pros understand the growing mobile authentication market and its transformative impact on customers’ mobile moments.
Tags : mobile, apps, mobile apps, s&r, fraud, okta, security, it management
     Okta
Start   Previous    93 94 95 96 97 98 99 100 101 102 103 104 105 106 107    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com