it management environment

Results 151 - 175 of 254Sort Results By: Published Date | Title | Company Name

Ovum Decision Matrix: Selecting a Virtualization and Cloud Management Solution, 2013–14

Published By: HP     Published Date: Oct 01, 2014
The role and purpose of IT in an organization is undergoing significant change, driven by the need for businesses to become more agile and have greater control over cost levers when using technology. This transformation of IT involves many different aspects, not all of which are technology-related, but the one thing they all share is that IT modernization is about making changes to meet the current and future demands of business. This report provides a side-by-side comparison of leading virtualization and cloud management solutions, looking at IT modernization from a data center infrastructure perspective, with the findings delivered as the Ovum Decision Matrix (ODM). It considers the significance of management in the virtualization and cloud environments and how this influences the way in which technology is deployed, used, and controlled.
Tags : 
decision, matrix, virtualization, cloud, management, businesses, technology, modernization
    
HP

Top Reasons Why VNX Unified Hybrid Flash

Published By: CDW - EMC     Published Date: Apr 07, 2016
The EMC VNX family delivers industry-leading innovation and enterprise capabilities for file and block storage in a scalable, easy-to-use unified storage solution. VNX storage combines powerful and flexible hardware with advanced efficiency, management, and protection software to meet your economical, and performance needs. With the VNX you can consolidate multiple workloads and still enjoy the best economics for yoru virtual and physical applications without compromise. The VNX allows you to enjoy the performance of flash at the cost-effectiveness of disk for all your mixed workloads. With industry leading application integration, you can start small and scale to multi-petabyte environments, you can utilize automated storage tiering, encryption, local and remote protection all while knowing that VNX is trusted by tens of thousands of customers.
Tags : 
storage management, performance management, best practices, application integration, software protection, business intelligence, it management, enterprise applications
    
CDW - EMC

Enabling Administrators to Morph into Managers by LeveragingReal-time Analytics and Automation

Published By: VMware     Published Date: Dec 17, 2012
VMware announced an extension of its management solutions aimed at simplifying and helping to mold a new operations model of virtual and cloud environments called vCenter Operations.
Tags : 
virtualization, process management, cloud, productivity, project management, business technology, cloud computing
    
VMware

Leveraging Security Risk Intelligence: The Strategic Value of Measuring Real Risk

Published By: Rapid7     Published Date: May 22, 2012
The ongoing struggle to prevent hackers from breaching assets and malware from gaining a foothold requires a vulnerability management strategy that begins with a comprehensive measurement of security risk. Organizations must examine the entire IT stack, including the operating system, network, applications, and databases. These new technologies include dynamic, virtualized environments and services outside traditional physical IT infrastructures, such as virtualized, cloud-based services and social networking.
Tags : 
security, risk management, security intelligence, security assessment, prevent data breach, cyber security, vulnerability management, penetration testing
    
Rapid7

HP CloudSystem Matrix: Build and manage your laaS

Published By: Sponsored by HP and Intel®     Published Date: May 13, 2013
Learn more about this offering that includes a self-service infrastructure portal for quick auto-provisioning, along with built-in infrastructure lifecycle management to optimize infrastructure, manage the resource pools, and help ensure uptime. CloudSystem Matrix is integrated by design with broad support of heterogeneous environments, including VMware, Microsoft® Hyper-V, and KVM through OpenStack as an enabling technology that manages and provisions virtual machines to the Red Hat KVM hosts.
Tags : 
    
Sponsored by HP and Intel®

The Growing Archiving Dilemma

Published By: Mimecast     Published Date: Apr 16, 2009
According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. if not more. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection. In addition to these challenges, IT departments want to know how to control costs of the email environment, while keeping important data accessible for business, legal and regulatory users.
Tags : 
mimecast, saas, email solutions, email managemeng, archiving, ediscovery, mailbox, compliance
    
Mimecast

Credit Union Leverages Talent Management Solution to Improve Efficiencies and Reduce Costs

Published By: Cornerstone OnDemand     Published Date: Feb 24, 2011
GECU has the challenge of operating within one of the nation's most highly regulated industries, and as a result, has long understood that efficient processes for employee training, development and performance management are critical pillars for supporting long-term financial growth within a strict regulatory and compliance environment. Read more to find out why GECU chose Cornerstone OnDemand.
Tags : 
cornerstone, gecu, compliance, employee development, training, web-based training
    
Cornerstone OnDemand

4 Steps to Successful IT Systems Management

Published By: Kaseya     Published Date: Feb 11, 2014
Embrace a new concept and adopt these 4 steps to create IT efficiencies without having to cut service levels. This might just be the change you need.
Tags : 
kaseya, systems management, technology savvy, it efficiencies, systems management strategy, discovery process, mobile workers, it policies
    
Kaseya

Improving Server Performance and Security: An Impact Comparison of Application Control and Tradition

Published By: Lumension     Published Date: Feb 07, 2014
Being able to compare the impact of application control and traditional anti-virus solutions could help you improve your server's performance and security.
Tags : 
lumension, server performance, server security, application control, anti-virus solutions, endpoints, application control solution, malware
    
Lumension

The 5 Key Tactics for Dealing with Advanced Persistent Threats

Published By: Lumension     Published Date: Feb 07, 2014
Do you know about advanced threats? Would you know how to deal with them? This white paper will teach you the 5 tactics for dealing with those advanced persistent threats.
Tags : 
lumension, persistent threats, information security, it regimes, threat solution, risk mitigation, vulnerability management, layered defenses
    
Lumension

Committed to Memory: Protecting Against Memory-Based Attacks

Published By: Lumension     Published Date: Feb 07, 2014
Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Here’s what you need to know about memory-based attacks—and how to effectively protect against them.
Tags : 
lumension, persistent threats, memory-based attacks, information security, it regimes, threat solution, risk mitigation, data security products
    
Lumension

Intelligent Whitelisting: An Introduction to More Effective and Efficient Endpoint Security

Published By: Lumension     Published Date: Jun 03, 2015
The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up. It’s time to rethink how we protect our endpoints. Instead of trying to build a better anti-virus “mousetrap,” without any shift in the underlying management model for vetting change in endpoint environments, security professionals should investigate more innovative approaches to endpoint security that can automate trusted change policies. This paper discusses an innovative approach to application whitelisting – one that integrates application control, anti-virus, patch management and a trusted change management engine into one unified solution – to improve endpoint security and provide the necessary flexibility to optimize IT operations and user productivity.
Tags : 
anti-virus, security, application, management, patch, anti virus, application security, patch management
    
Lumension

Intelligent Whitelisting: An Introduction to More Effective and Efficient Endpoint Security

Published By: Lumension     Published Date: Jun 05, 2015
The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up. It’s time to rethink how we protect our endpoints. Instead of trying to build a better anti-virus “mousetrap,” without any shift in the underlying management model for vetting change in endpoint environments, security professionals should investigate more innovative approaches to endpoint security that can automate trusted change policies. This paper discusses an innovative approach to application whitelisting – one that integrates application control, anti-virus, patch management and a trusted change management engine into one unified solution – to improve endpoint security and provide the necessary flexibility to optimize IT operations and user productivity.
Tags : 
anti-virus, security, application, management, patch, anti virus, application security, patch management
    
Lumension

Why Managing Mobility Matters

Published By: SAP     Published Date: Feb 10, 2011
The recession notwithstanding, mobile devices continue to be purchased in record numbers, pouring into the organization. These devices are coming in a wide variety of hardware and operating system types, making their management and security a big IT challenge. This IDG Playbook is designed to help guide your strategy to manage and secure the booming mobile environment.
Tags : 
sap, mobility, competitive edge, mobile workers, enterprise mobility, mobile, applications, iphone
    
SAP

Top 5 Reasons to Automate Identity Lifecycle

Published By: OKTA     Published Date: Mar 30, 2018
"Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT and user access management. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace and stay secure. This white paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration with comprehensive user provisioning and build a solid foundation for future cloud-first, mobile-first IT."
Tags : 
    
OKTA

The important role of storage for success in server virtualization

Published By: VMware     Published Date: Apr 11, 2011
This white paper describes the advantages of scale-out iSCSI storage in four areas-cost, high availability and disaster recovery, performance, and management-and illustrates how SANs provide better overall support for virtualized environments.
Tags : 
vmware, storage, server virtualization, disaster recovery, storage area network, ip sans, storage area networks, virtualization
    
VMware

Best Practices for Selecting a Vulnerability Management (VM) Solution

Published By: Qualys     Published Date: Jan 11, 2017
With attackers using increasingly-sophisticated ways to break into systems, manual methods of locating and inspecting devices on your network are no longer enough. The right Vulnerability Management (VM) solution can monitor your environment, enabling you to: discover devices running in your network, determine whether they are vulnerable to attack, find fixes to the underlying problems, and protect yourself while those fixes are being implemented
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys

Green IT: Saving Money while Saving Energy Moving Beyond the Hype to Build a Powerful Business Case

Published By: Numara Software     Published Date: Jan 04, 2010
This white paper moves beyond the hype of green IT and provides substantial support for implementing practical, yet cost effective power management policies and tools to "green" your IT environment and boost your bottom line.
Tags : 
numara, green it, energy efficient, green policies, power management, energy consumption, power, cooling
    
Numara Software

Complete storage and data protection architecture for virtual environments

Published By: Intel Corp.     Published Date: Aug 08, 2012
Virtualization reduces the number of physical servers IT needs to provision and maintain, but it also transforms the data protection paradigm. Now businesses can recover from failures in minutes, not hours, with unprecedented affordability. The key to achieving the best business uptime and cost savings is the effective design of storage management and data protection. This white paper outlines an end-to-end storage and data protection architecture optimized for VMware vSphere and Microsoft® Hyper-V environments.
Tags : 
complete, storage, data, protection, architecture, virtual, environments, virtualization
    
Intel Corp.

Building an Ethernet-based WAN Infrastructure for the Financial Services Industry

Published By: Singtel     Published Date: Oct 28, 2014
Examine the three broad challenges that Financial Services Institutions (FSIs) face today: compliance and risk management, consolidation and innovation. To address these effectively, FSIs require an Information and Communication Technology (ICT) infrastructure that offers both the security and reliability of their legacy communications systems as well as the flexibility and scalability that new generation networks provide, in order to adapt and innovate in the highly competitive financial services environment.
Tags : 
singtel, vpn, wan, lan, infrastructure, ip networks, ip telephony, local area networking
    
Singtel

Lab Validation Report NEC Express5800/R320 Server

Published By: Intel Corporation     Published Date: Sep 10, 2014
Sponsored by: NEC and Intel® Xeon® processor The goal of ESG Lab reports is to educate IT professionals about emerging technologies and products in the storage, data management and information security industries. ESG Lab reports are not meant to replace the evaluation process that should be conducted before making purchasing decisions, but rather to provide insight into these emerging technologies. Our objective is to go over some of the more valuable feature/functions of products, show how they can be used to solve real customer problems and identify any areas needing improvement. ESG Lab's expert third-party perspective is based on our own hands-on testing as well as on interviews with customers who use these products in production environments. This ESG Lab report was sponsored by NEC Corporation of America. Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries.
Tags : 
lab, reports, improvement, storage, data, technologies, purchasing, valuable
    
Intel Corporation

A partner to monitor, manage and maintain your cloud

Published By: Rackspace     Published Date: Jan 19, 2016
Rackspace® Private Cloud Powered by OpenStack® is backed with our results-obsessed service known as Fanatical Support.® Our exceptional customer service means we’re in it with you every step of the way. From initial design to ongoing management for your production environment, we manage your cloud so you can focus on your core business.
Tags : 
rackspace, cloud, information technology, security, data center
    
Rackspace

How can you turbocharge your digital transformation through always on customer experiences?

Published By: Group M_IBM Q2'19     Published Date: Jun 10, 2019
In the era of individual-centered economy, customers are demanding faster, more personalized services. To deliver these services, successful organizations realize the benefits of accurate and trusted master data. And in today's always on society, companies can no longer afford to allow downtime for maintenance and scheduled upgrades for these services and the supporting applications. With low latency capabilities in IBM InfoSphere Master Data Management designed to easily connect to applications in a zero-downtime environment, the highest demands for user interactions can now be realized. As a result, businesses can therefore take the next step in their digital transformation initiatives to truly drive personalized differentiated customer experiences to separate themselves in today's crowded marketplace. View this webinar to discover how IBM MDM puts these capabilities within easy reach. The webinar will: Reveal how these capabilities are being delivered on-premise and on t
Tags : 
    
Group M_IBM Q2'19

Advanced Endpoint Security for Dummies

Published By: Symantec     Published Date: Jun 13, 2018
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices desktops, laptops, tablets, and smartphones with various operating systems to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. In the wake of this disruption, vendors offered myriad point products that solve only a portion of the security problem. These products usually require costly custom integrations and high management overhead to boot. Making matters worse, traditional security approaches can’t address an evolving threat landscape that includes ransomware, stealthy attacks that dwell in a customer’s environment for months, and threats targeting iOS and Android devices. In fact, the mobile workforce is more vulnerable than ever before.
Tags : 
    
Symantec

The Enterprise Mobility Survival Guide

Published By: IBM MaaS360     Published Date: Apr 04, 2016
Learn how to become an enterprise mobility Mowglie. In today’s completely connected mobile jungle, many users and employees are accessing information from multiple devices and from many locations. Enterprise mobile management tools are becoming a must have for most businesses to survive and deliver an optimal experience. The MaaS360 suite from IBM allows for a robust app development platform where users can become mobile Mowglies and increase portability and interoperability. Download this e-book to create a failsafe Enterprise Mobility Survival Guide and build the best mobile environment for your users and employees.
Tags : 
ibm, mobile, management, guide, app development, networking, it management, business technology
    
IBM MaaS360
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.