managing

Results 1001 - 1025 of 1338Sort Results By: Published Date | Title | Company Name

Advantage cloud: The clear path to modernizing B2B integration

Published By: IBM     Published Date: Oct 11, 2016
View this ebook to learn how leading organizations are managing, deploying, designing or planning cloud-based B2B integration alternatives to future-proof their B2B trading operations. Discover the benefits that clients of IBM Sterling B2B Cloud Services cite, including: -Reduced risk and total cost of ownership (TCO) in B2B integration - Enhanced visibility and control over business processes shared with partners - Faster partner onboarding and faster, more reliable data exchange - Greater collaboration across IT, business managers and external partners
Tags : 
ibm, commerce, b2b, b2b integration, cloud, advantage cloud, networking, knowledge management, enterprise applications, business technology
    
IBM

Disposing of Digital Debris: Information Governance Strategy and Practice in Action

Published By: IBM     Published Date: Oct 18, 2016
The worldwide growth rate of digital data is staggering. If you're a CIO or a data center administrator, data growth statistics aren't just big numbers, they are a big problem -- for your company. Email messages, social media and blog posts, text and instant messages, photos, video and audio, machine-generated data, and transactional detail are on track to overwhelm your storage capacity. Read this paper for practical advice and smarter solutions for managing the information in your organization and getting back to a position of mastery over your data. Get this valuable resource now.
Tags : 
ibm, analytics, big data, information governance, ecm, information lifecycle governance, knowledge management, enterprise applications, data management, data center
    
IBM

Cloud For Dummies E-Book

Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the user’s identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
    
Group M_IBM Q418

PAM Interactive Whitepaper

Published By: Group M_IBM Q4'19     Published Date: Oct 28, 2019
Privileged access management (PAM) is the top cybersecurity project for chief information security officers. Managing and protecting privileged accounts is critical. Check out the latest interactive whitepaper for a detailed analysis of PAM, endpoint privilege management, application control and integrations with identity governance. Get scalable, enterprise-grade security solutions, backed by unmatched service and support from IBM Security.
Tags : 
    
Group M_IBM Q4'19

The Past, Present and Future of Application Performance Management

Published By: Gomez IT     Published Date: Dec 19, 2011
The Gomez Application Performance Management (APM) platform is the industry's leading solution for managing and optimizing the performance, availability and quality of web, non-web, mobile, streaming and cloud applications.
Tags : 
gomez, technology, performance management, web, mobile, cloud, performance testing, project management, data protection, desktop management, cloud computing
    
Gomez IT

Unified Management of Endpoints, End Users and Everything in Between

Published By: IBM     Published Date: May 01, 2017
Today's enterprises support an assortment of end-user devices, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, and, of course, smartphones. Not only do employees use a variety of form factors, but they run a variety of platforms on those devices, including: Apple iOS and Apple macOS Google Android Microsoft Windows To complicate the situation further, they run different versions of those platforms for example, Microsoft Windows XP SP3, Microsoft Windows 10 or anything in between. In addition, IT is being tasked more and more with managing and securing wearables, ruggedized devices and the Internet of Things (IoT). Read this whitepaper to learn more.
Tags : 
enterprise management, mobile management, organization optimization, security management, microsoft, data protection, bug prevention, information management
    
IBM

UEM For Dummies eBook

Published By: IBM     Published Date: May 01, 2017
Endpoints continue to advance… Employees come and go... And the security landscape is in constant flux. IT leadership must rise to the challenge of managing a disparate and growing number of endpoints, operating systems, and platforms. The only efficient method of managing and securing all endpoints, their users, apps, content, and data is to implement and deploy a unified endpoint management (UEM) solution that changes and adapts with new technology, more skilled users, and increasingly sophisticated attacks by hackers. Read onward to learn why UEM is necessary, how it addresses complex problems encountered in the modern enterprise, and best practices for a successful deployment.
Tags : 
endpoints, employees, security landscape, security leaders, it security, unified endpoint management
    
IBM

Mobile Vision 2020

Published By: IBM     Published Date: May 01, 2017
In October 2016, IBM commissioned Forrester Consulting to evaluate the means by which enterprises are managing and securing various endpoint form factors today and how strategies will change over the next three years. In conducting an in-depth survey of 556 IT and security leaders in the US, the UK, Germany, India, and Australia, Forrester found that while enterprises have a decentralized approach to managing and securing smartphones, tablets, laptops, and IoT today, they will move to a more consolidated and cognitive approach by 2020. Download report to learn more.
Tags : 
ibm, consulting, it security, smartphones, tablets, laptops, enterprise management
    
IBM

Uncovering the Risk of SAP Cyber Breaches

Published By: IBM     Published Date: Jul 26, 2017
Ponemon Institute is pleased to present the results of Uncovering the Risks of SAP Cyber Breaches sponsored by Onapsis. The purpose of this study is to understand the threat of an SAP cyber breach and how companies are managing the risk of information theft, modification of data and disruption of business processes. The companies represented in this study say their SAP platform has been breached an average of two times in the past 24 months.
Tags : 
cyber breach, data security, information theft, security risk, risk management
    
IBM

Video Surveillance Trends Report

Published By: Seagate Technology     Published Date: May 15, 2015
An inside look at how IT Executives and System Integrators are managing video surveillance data.
Tags : 
system integrators, enterprise it, video surveillance, knowledge management, ip networks, biometrics, intrusion detection, mobile data systems, wireless infrastructure
    
Seagate Technology

An Introduction to OS Server Virtualization and a Different Approach to Server Virtualization

Published By: SWsoft     Published Date: Aug 21, 2009
Today's IT organizations are dealing with the consequences of exploring IT Infrastructure growth and complexity. With its growing complexity and volume, the cost of managing the infrastructure from simple patch management to skill sets requirements for IT administrators is increasing.
Tags : 
active directory, bandwidth management, convergence, swsoft, server virtualization, patch management, network management, infrastructure, it management, virtuozzo, sw soft
    
SWsoft

How to Effectively Manage SSL Certificates Across the Enterprise

Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
Get your guide today and discover a smart, new strategy for managing SSL security across your network. With VeriSign's Managed PKI for SSL Web-based service, you can centrally manage all of your SSL Certificates with a simple, Web-based interface.
Tags : 
mpki for ssl, managed security solutions, ssl, verisign, http protocol, secure sockets layer, public key infrastructure, certification-authority (root ca), server gated cryptography, sgc, certificate management, certificate-revocation list, crl, international computing
    
VeriSign Incorp.

5 Steps to Double Your Web Marketing Value

Published By: Pardot     Published Date: Apr 29, 2009
Learn how to use marketing automation tools to streamline your process and push leads quickly through the pipeline without increasing your spend. Marketing automation suites offer an integrated option for generating and managing leads with landing page and email marketing tools, automated scoring and grading, drip nurturing emails, micro-level analytics and anonymous visitor identification.
Tags : 
pardot, web marketing value, leads, streamline, pipeline, marketing automation, lead management, lead generation, lead gen, leads, micro-level analytics, drip nurturing, scoring, grading, b2b, b2c, sales growth, sales team, sales, sales rep
    
Pardot

Guide to IT Search: Managing the Modern Data Center

Published By: Splunk Inc.     Published Date: Jun 02, 2009
This document explains IT Search's ability to instantly search all the data generated by applications, servers and network devices in your IT infrastructure. Download to learn more today!
Tags : 
operations, it search, data center, splunk, business intelligence, compliance, security, it infrastructure, data generation, data management, application management, snmp, opsec, wmi, ajax, single sign on, sso, knowledge management, enterprise applications, information management
    
Splunk Inc.

IT Silos Are Hurting Your Company: Make IT Data a Strategic Asset

Published By: Splunk Inc.     Published Date: Jun 02, 2009
According to Forrester, organizations spent $1.5 trillion globally managing IT last year. 75% of this was spent on silos, legacy systems that still don't get answers to the most important questions: troubleshooting outages, investigating security incidents, and demonstrating compliance. Learn about the innovative software product forward-thinking organizations are using to dramatically improve their productivity and change the way they manage and secure IT.
Tags : 
it management, forrester, silos, legacy, data center, compliance, security, troubleshooting, secure data access, silo, splunk, secure, operations, compliance, audit, soa, virtualization, service-oriented architecture, service desk, productivity
    
Splunk Inc.

Managing Your Social Presence: A Marketer's Guide for Managing Social Media

Published By: Direct Message Lab     Published Date: Oct 02, 2009
Participation in social media has become a necessity. Done properly, social media can deliver new users, drive revenue and increase engagement. DML has asked its partners to share their approach to social media from a strategic standpoint and the day-to-day mechanics of managing their social presence.
Tags : 
social media, social networks, social media management, social media agency, dml, direct message lab, facebook, twitter
    
Direct Message Lab

Creating and Managing Value with IBM Tivoli Service Management Center for System z

Published By: IBM     Published Date: Jun 22, 2010
Download this free IBM white paper to learn how to better manage your data center with System z.
Tags : 
tivoli service management center, data warehousing, system z, middleware, ibm, automation, business process automation, tivoli, service management
    
IBM

Don't Get Duped By Dedupe: Introducing Adaptive Deduplication

Published By: Unitrends     Published Date: Apr 12, 2010
The purpose of deduplication is to provide more storage, particularly backup storage, for less money, right? Then wouldn't it be ridiculous if deduplication vendors were demanding that their customers pay more per terabyte of storage? Or if they were simply pushing the task of integrating, monitoring, and managing deduplication back onto their users?
Tags : 
unitrends, backup, data protection, data quality, server, replication, lossless, lossy, data compression, backup and recovery, storage area networks, storage management, storage virtualization, encryption, database development
    
Unitrends

TDWI: Data Preparation Challenges facing every organization

Published By: SAS     Published Date: Aug 28, 2018
With the widespread adoption of predictive analytics, organizations have a number of solutions at their fingertips. From machine learning capabilities to open platform architectures, the resources available to innovate with growing amounts of data are vast. In this TDWI Navigator Report for Predictive Analytics, researcher Fern Halper outlines market opportunities, challenges, forces, status and landscape to help organizations adopt technology for managing and using their data. As highlighted in this report, TDWI shares some key differentiators for SAS, including the breadth and depth of functionality when it comes to advanced analytics that supports multiple personas including executives, IT, data scientists and developers.
Tags : 
    
SAS

Managing Fraud Risk in the Digital Age

Published By: SAS     Published Date: Oct 03, 2018
Risks have intensified as retailers and financial organizations embrace new technologies to meet customer demands for convenience. The rise of mobile and online transactions introduces new risks – and with that, new requirements for fraud mitigation. This paper discusses key steps for fighting back against fraud risk by establishing appropriate and accurate data, analytics and alert management.
Tags : 
    
SAS

Managing the Intelligence Life Cycle: A More Effective Way to Tackle Crime

Published By: SAS     Published Date: Oct 03, 2018
Because terrorists and other criminals are already using technology to carry out their missions, intelligence professionals need to access all available, appropriate information, to extract important elements and process, analyze and disseminate it quickly to keep ahead of potential threats. The scale, complexity and changing nature of intelligence data can make it impossible to stay in front without the aid of technology to collect, process and analyze big data. This paper describes a solution for how this information can be quickly and safely shared with access based on a user's organizational responsibilities and need to know.
Tags : 
    
SAS

Managing a Remote Workforce: Proven Practices from Successful Leaders

Published By: GoToMeeting     Published Date: Oct 11, 2011
Distributed work programs are one of the most effective ways of achieving badly-needed operational savings. To be effective, however, you need to know which practices and tools are most effective for managing remote staff. This new white paper addresses three fundamental management questions, explores key challenges of managing remote workers and provides best practices for setting up a successful remote work program.
Tags : 
citrix, technology, business. remote work program, management, employee, employee performance, productivity, project management, business technology
    
GoToMeeting

The Tod Point Group: IBM Storwize V7000 Unified Provides Enterprise-Class Value

Published By: IBM     Published Date: Apr 17, 2013
Microsoft Exchange Server 2010 provides a powerful environment for users to conduct business through scheduling their time (calendar), managing their relationships (contacts), and communicating inside and outside their organization (e-mail). The IBM Storwize V7000 Unified storage system, combined with powerful management software from IBM Tivoli, provides an ideal complement to Exchange 2010 deployments by providing a highly virtualized storage infrastructure designed to meet the specific needs of Exchange 2010 environments.
Tags : 
ibm, microsoft exchange server, powerful, environment, storage, virtualized, infrastructure, organization
    
IBM

Has Anyone Ever Returned an Unused Software License?

Published By: IBM     Published Date: May 09, 2013
While software license costs are a major expense, most companies spend very little time managing this critical and widely distributed asset until an audit occurs or a cost reduction program forces attention. This should be the year you flip from being reactive to being proactive in dealing with software asset and license management. Costs savings and peace of mind are just two of the benefits that you will realize. In this Webcast an analyst from Frost and Sullivan will go over the results of a recently published white paper on this topic and Deloitte & Touche will discuss the benefits their customers have gained in automating their license management processes. View this Webcast to learn how you can reclaim licenses, avoid unnecessary license costs, achieve continuous compliance, and improve risk management.
Tags : 
software license, automate, reclaim licenses, compliance, improve, risk management
    
IBM
Start   Previous    34 35 36 37 38 39 40 41 42 43 44 45 46 47 48    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.