IT Management

IT Management includes a variety of functions for managing computers in a networked environment, including software distribution, version control, backup & recovery, job scheduling, virus protection and performance and capacity planning.
Results 526 - 550 of 2798Sort Results By: Published Date | Title | Company Name
By: Mimecast     Published Date: Aug 19, 2015
A spear-phishing attack could bring your company to its knees – today. For all you know, you may already be under attack. That could result in a data breach that lands your company in the glare of the news cameras – and in hot water with your customers, partners and investors.
Tags : mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, security, it management
     Mimecast
By: Unitrends     Published Date: Aug 18, 2015
When it comes to data protection, what matters most? You want the freedom to choose the types of data, applications, and computing platforms you protect. You want to seal off that data from security threats. You need space to house that data—the right space now with room to grow. You want to support older solutions as you evolve your technology environment to modern strategies, at a pace that suits your business. And you need the ability to reach out for that data at a moment’s notice without overstressing your network. In short, you need it all.
Tags : unitrends, backups, backup software consolidated backup, backup software enterprise, program backup software, network appliance backup, continuous backup software, backup software server
     Unitrends
By: Unitrends     Published Date: Aug 18, 2015
The purpose of deduplication is to provide more storage, particularly backup storage, for less money, right? Then wouldn't it be ridiculous if deduplication vendors were demanding that their customers pay more per terabyte of storage? Or, if they were simply pushing the task of integrating, monitoring, and managing deduplication back onto their users? This white paper is to help you understand the various approaches to deduplication, the strengths and weaknesses of each, and to introduce a different approach to deduplication, Adaptive Deduplication.
Tags : unitrends, backups, backup software consolidated backup, backup software enterprise, program backup software, network appliance backup, continuous backup software, backup software server
     Unitrends
By: Entrust Datacard     Published Date: Aug 18, 2015
This is a guide about securing your website, online business or mail server.
Tags : best practics, security, vulnerabilities, ssl, tls, login credentials, mail server, online business
     Entrust Datacard
By: Entrust Datacard     Published Date: Aug 18, 2015
This is a whitepaper about the business value of extended validation.
Tags : extended validation, certificate, internet, browser, ssl, tls, it management, knowledge management
     Entrust Datacard
By: Canon Business Process Services, Inc.     Published Date: Aug 17, 2015
This paper will explore the potential of applying business performance management (BPM) principles to advance document performance management (DPM) in a way that enables organizations to reduce costs; better manage documents as vital strategic, ?nancial and information assets; and secure positive returns on investments from outsourcing. An example of this approach — spotlighted later in this paper — is MAX, a document performance management system that enables companies to more effectively manage their document processes and outsourcing service providers.
Tags : canon business process services, document management, document imaging, business performance management, outsourcing services, managed services, balanced scorecard framework, slas
     Canon Business Process Services, Inc.
By: AlienVault     Published Date: Aug 13, 2015
Demonstrating compliance with PCI DSS is far from a trivial exercise. Join us for this technical session to learn how AlienVault USM can help you achieve PCI DSS compliance and improve your overall security posture.
Tags : compliance, pci, dss, technical, security, challenges, it management, knowledge management
     AlienVault
By: Hostway Services, Inc.     Published Date: Aug 13, 2015
This is a whitepaper outlining what designers and developers should look for in a potential reselling partner.
Tags : hosting, developer, reselling, services, service, it management, knowledge management
     Hostway Services, Inc.
By: Hostway Services, Inc.     Published Date: Aug 13, 2015
This is a whitepaper about today's competitive website design market.
Tags : hosting, revenue, designing, website, best practices, developers, it management, enterprise applications
     Hostway Services, Inc.
By: Hostway Services, Inc.     Published Date: Aug 13, 2015
This is a whitepaper about building and hosting a website with a recurring revenue.
Tags : hosting, website, revenue, designers, it management, platforms
     Hostway Services, Inc.
By: Cloud Sherpas     Published Date: Aug 13, 2015
In the Top 5 Reasons Why Enterprises Are Going Google, Cloud Sherpas explores why leading organizations like these have prepared for the digital workplace of tomorrow by moving their email and collaboration platforms to Google Apps for Work, such as: Eliminating the need to manage hardware or software Embracing a mobile, BYOD culture Reducing IT costs and infrastructure
Tags : google enterprise solutions, google cloud applications, business cloud apps, google apps for business training, google app migration, migrating to google apps, cloud apps for business, google app development
     Cloud Sherpas
By: Adobe     Published Date: Aug 11, 2015
Download this Aberdeen Group report to learn why the best in class organizations are closing more deals faster by adopting esignatures.
Tags : adobe, document, crm, mobile, sales, automation, cloud, transactions
     Adobe
By: Adobe     Published Date: Aug 11, 2015
In this research study hear from more than 1,500 line-of-business leaders, IT leaders, and information workers about the effectiveness of their organization’s document-based business processes.
Tags : adobe, enterprise, mobile, security, saas, document management, cloud, it management
     Adobe
By: Brother     Published Date: Jul 31, 2015
Read this white paper to learn more about key printing trends like device underuse and unbalanced fleets and their SMB impact.
Tags : printing trends, brother, multifunction printers, document management systems, productivity, cost savings, small business, medium-sized business
     Brother
By: Basho     Published Date: Jul 29, 2015
Download this white paper to learn why Riak KV Enterprise is especially suited to fulfill your Enterprise NoSQL requirements including operational simplicity.
Tags : nosql, riak kv enterprise, enterprise nosql, operational simplicity, applications, scalability, global availability, networking
     Basho
By: F5 Networks Inc     Published Date: Jul 27, 2015
Today, enterprises are extending their businesses by using more web-based and cloud-hosted applications, so a robust and agile web application firewall (WAF) isn't a luxury--it is a requirement. This whitepaper breaksdown some of the key factors you should consider when selecting a WAF to protect your business.
Tags : web application firewall, waf, cloud-hosted applications, it solutions, it security, web-based applications, networking, security
     F5 Networks Inc
By: Venafi     Published Date: Jul 27, 2015
According to Gartner, by 2017, more than ?50% of network attacks will use encrypted SSL/TLS. Most organizations cannot decrypt and inspect SSL communications to detect these threats, which creates security blind spots.
Tags : ssl traffic, venafi, tls, security blind spots, it security, it security solutions, it management, knowledge management
     Venafi
By: BitSight Technologies     Published Date: Jul 23, 2015
Recent BitSight research shows a solid correlation between a company’s botnet grade and their likelihood of experiencing a publicly disclosed breach. Download this report to learn how BitSight Security Ratings are a powerful metric for communicating cyber risk across the enterprise.
Tags : cyber risk, security, data, network, it operations, it management, knowledge management, enterprise applications
     BitSight Technologies
By: XO Communications     Published Date: Jul 22, 2015
Download this white paper to find out how this approach enables you to retain top-down visibility and control of network security and manage the impact of cloud traffic on your WAN.
Tags : shadow it, hybrid cloud management, visibility, network security, cloud traffic, wan, networking, security
     XO Communications
By: XO Communications     Published Date: Jul 22, 2015
Gannett views its private cloud and WAN capability as a strategic core competency and was looking for a strategic partner to support its growth and cloud initiatives. XO embraced this partnership and earned the trust of the media giant by providing superior technical expertise, smooth implementations, and responsive customer support.
Tags : gannett, private cloud, xo mpls ip-vpn wan, scalability, strategy, cloud, networking, security
     XO Communications
By: XO Communications     Published Date: Jul 22, 2015
Download this white paper to learn how XO MPLS IP-VPN helps Wine.com prevent traffic bottlenecks at order processing centers, especially during high-volume periods, so orders get processed and packages don't get lost.
Tags : xo mpls ip-vpn, traffic bottlenecks, order processing, vpn, networking, security, it management, wireless
     XO Communications
By: Riverbed     Published Date: Jul 22, 2015
As enterprise computing has evolved, businesses have been shifting to a “hybrid enterprise” where core applications and data can be located in private data centers and public clouds. The growth of hybrid cloud deployments accelerated the transition to hybrid wide-area networks (WANs). Private networks, such as MPLS, are being joined by Internet connections that offer a choice in delivery channels—costly, but predictable, networks for mission-critical loads and cheaper public networks for bulk loads such as data backups.
Tags : hybrid enterprise, private data centers, public clouds, wans, data backups, it management
     Riverbed
By: Riverbed     Published Date: Jul 21, 2015
IT organizations have been evolving their WAN connectivity strategies to align with new IT cost, resilience, and performance objectives. Hybrid WAN is a growing trend with many organizations and enterprises, enabling them to augment traditional private leased lines or MPLS-based WAN circuits with secured public Internet services to achieve their goals. Riverbed takes a holistic, application-centric approach to solving the challenges of hybrid architectures. Read how SteelHead's hybrid architecture simplifies the laborious aspect of operating in a hybrid WAN environment.
Tags : hybrid enterprise, app performance, wan connectivity, hybrid wan, application-centric, it management
     Riverbed
By: Riverbed     Published Date: Jul 21, 2015
This is a riverbed white paper explains how the flexibility and cost benefits of Internet connectivity lead to a hybrid network and provides best practices to overcoming the challenges introduced. This piece focuses on the ability to control such deployments at scale, and covers our application centric approach, covering our network services in depth (app groups, global policy management, QoS, Path selection, etc.)
Tags : hybrid enterprise, cost and flexibility, internet connectivity, hybrid network, network services, it management
     Riverbed
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com