systems management

Results 201 - 225 of 535Sort Results By: Published Date | Title | Company Name

Easy, agile development and administration: For cloud, analytics and mobile computing

Published By: IBM     Published Date: Apr 01, 2016
Keep your workforce and systems current for faster DevOps, deployment, and management of cloud, analytics and mobile applications. Learn about updated, intuitive mainframe tools that are easy-to-to use for both millennials and baby-boomers.
Tags : 
ibm, agile, agile development, cloud, mobile, z systems, mobile computing, cloud computing
    
IBM

IDS Evaluation Guide

Published By: AlienVault     Published Date: Mar 30, 2016
An Intrusion Detection System (IDS) is an essential tool in every security practitioner’s arsenal. Intrusion Detection Systems are designed to gather and analyze information from networks and hosts to detect malicious activity both before and after a security breach. In this guide, you will learn about the critical components of host and network IDS, requirements to evaluate IDS solutions, as well as how AlienVault Unified Security Management (USM) meets those requirements. Topics covered to help you evaluate IDS solutions include: • An overview of network and host-based IDS • Signature-based vs. anomaly-based systems • Throughput of IDS solutions • Protocol analysis • Aggregation capabilities • Integration capabilities • Contextual enhancement Download your version now to learn what capabilities you should consider when evaluating IDS solutions.
Tags : 
    
AlienVault

How to Simplify PCI DSS Compliance with AlienVault USM

Published By: AlienVault     Published Date: Mar 30, 2016
Demonstrating compliance with PCI DSS is far from a trivial exercise. Those 12 requirements often translate into a lot of manual and labor-intensive tasks, along with the need to access data and reports from many different systems and tools. Watch this technical demo to learn how AlienVault can simplify PCI DSS compliance and improve your overall security posture. You'll learn: • Common PCI DSS compliance challenges • Questions to ask as you plan and prepare • Core capabilities needed to demonstrate compliance • How AlienVault Unified Security Management simplifies compliance
Tags : 
    
AlienVault

The Power of Client Virtualization

Published By: CDW     Published Date: Mar 18, 2016
Client virtualization technologies are redefining the way IT resources are delivered to end users, and creating exciting new opportunities for IT organizations as they work to streamline and improve operations. By abstracting applications and operating systems from client hardware, virtualization enables client assets to be stored on central servers and delivered to client endpoints. The implications are profound. End users can log on to any networkconnected computing device and access their custom operating system and application environment. For IT departments, central management of client virtual machine (VM) images brings efficiencies in everything from routine maintenance and updating to operating system upgrades.
Tags : 
    
CDW

Cheat Sheet: Mobility and Your Remote Workforce: What to Consider Before Deploying New Laptops

Published By: Dell     Published Date: Feb 04, 2016
Older PCs are a risk due to a lack of robust hardware-based security, older processors, and outdated operating systems. This Cheat Sheet paper discusses the points you should consider when selecting notebooks and laptops for your mobile and remote workforce. Download this paper today to learn about how combining the right hardware upgrades with newer OS options and endpoint management software can provide the needed protection against today’s security risks.
Tags : 
hardware, tpm, it security, windows, telecommunication, byod
    
Dell

Vblock Systems Empower IT Teams in Oil & Gas Companies

Published By: EMC Converged Platforms     Published Date: Jan 27, 2016
In the spring of 2015, IDC organized a study on the business value Vblock systems bring VCE customers. The organizations that took part in this study ranged from 400 employees to 200,000 employees, with an average employee count of 27,113. These organizations represent a wide array of industries and countries. The results of this study were published in the VCE-sponsored IDC white paper entitled, “The Business Value of VCE Vblock Systems: Leveraging Convergence to Drive Business Agility, May 2015”. This report discusses how Vblock Systems empowers IT teams to move quickly and more flexibly.
Tags : 
vce, vblock systems, it management, it solutions, oil and gas industry, innovation, customer experience, financial benefits
    
EMC Converged Platforms

Business Transformation Doesn't Need to be a Long Drawn-Out Process

Published By: K2     Published Date: Jan 07, 2016
When driving any major change within an organization, strategy and execution are intrinsic to a project’s success. Nevertheless, closing the gap between strategy and execution remains a challenge for many organizations, as explored in a recent Process Excellence Network report: “Shift Business Excellence Into High Gear: Drive Strategic Performance Through Process Excellence.” Companies tend to focus more on execution than strategy for quick results, instead of taking the time needed to understand the parts that make up the whole, so the right execution plan can be put in place to deliver the best outcomes. A large part of closing this gap is understanding that business operations don’t fit neatly within the traditional organizational hierarchy. Business processes are often messy, collaborative efforts that span people, departments and systems, making them difficult to manage within a hierarchical structure. Business process management (BPM) helps by redefining an organization accordin
Tags : 
business transformation, organizational change, process excellence network, strategic performance, networking, software development, it management, knowledge management
    
K2

Fortune 500 Security on a Budget

Published By: BAE Systems     Published Date: Dec 29, 2015
How to secure your network without busting your IT budget
Tags : 
bae systems, applied intelligence, fortune 500, business security, network security, it management, security products, security systems
    
BAE Systems

What Financial Institutions Should Look for in a Managed Security Service Provider

Published By: BAE Systems     Published Date: Dec 29, 2015
This framework will help you decide which MSSP best meets the needs of your financial institution
Tags : 
bae systems, applied intelligence, financial institution, managed security, managed security services, managed security service provider, mssp, data breach
    
BAE Systems

Forrester: TEI of UCS

Published By: Cisco     Published Date: Nov 17, 2015
In March 2014, Cisco Systems commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Cisco Unified Computing System (UCS). The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the Cisco UCS on their organizations. To better understand the benefits, costs, and risks associated with a Cisco UCS implementation, Forrester interviewed several customers with multiple years of experience using Cisco UCS. Cisco Unified Computing System and servers unify computing, networking, management, virtualization, and storage access into a single integrated architecture
Tags : 
cisco, ucs, unified computing system, total economic impact, forrester report, it management, wireless, knowledge management
    
Cisco

Sumtotal Workforce Management Guidebook

Published By: Skillsoft     Published Date: Oct 20, 2015
SumTotal Systems, a Skillsoft company, delivers the SumTotal Work suite of solutions that provides time and attendance, scheduling, absence and leave management, and payroll data processing.
Tags : 
skillsoft, sumtotal, workforce management, wfm data, payroll processing, human capital management
    
Skillsoft

The CIO Mandate: Engaging Customers With Business Technology

Published By: Netsuite DWASF Leads Display Q1 2015     Published Date: Oct 06, 2015
Read this report to understand how the age of the customer requires tech management to transform into a customer-facing function in speci?c ways. Business technology (BT) brings together technology and traditionally customer-facing roles like marketing, sales, service, brand/product management, and ful?llment for the purpose of deploying systems of engagement that provide di?erential customer experience. Firms must build these systems of engagement from the outside in, according to how customers move in market spaces. The rules for planning, building, and running systems of engagement are not the same as for previous generations of tech management because customers are not employees. The increasingly crucial role that digital technologies play in customer engagement elevates the CIO role in business — if CIOs can move beyond the traditional IT focus on technology assets and adopt an expanded view that centers on customer experience and choice
Tags : 
business technology, customer engagement, customer experience, cios, enterprise applications
    
Netsuite DWASF Leads Display Q1 2015

The Converged Infrastructure Payoff for IT

Published By: CDW     Published Date: Sep 29, 2015
This is a whitepaper about pre-validated systems assisting it;s effort to simplify infrastructure management and free up resources for innovation efforts.
Tags : 
converged, infrastructure, management, innovation, resources, channel, optimize, it management
    
CDW

Cisco Systems Capital Corporation

Published By: Clarizen     Published Date: Sep 23, 2015
Read more to find out how Clarizen became the ideal solution for delivering the much-needed framework for planning and executing, and at the same time, seamlessly aligning with the collaborative manner in which the Cisco Systems wanted to manage projects and programs.
Tags : 
cisco systems, cisco capital, clarizen, cloud based solutions, productivity, project management, program management, cross functional collaboration
    
Clarizen

Monetizing the Internet of Things

Published By: Aria Systems     Published Date: Sep 21, 2015
Here at Aria Systems, we live and breathe all things related to monetization via customer care and relationships. We live in a world where recurring revenue management is becoming a dominant theme. Lately there’s been a natural gravitation to the Internet of Things/Internet of Everything, and the synchronicity between the business models the IoT produces and how Aria is serendipitously designed to support all of it. Simply put, we want people to think a lot about the new age the IoT heralds. To that end, this post is the first in a series intended to explore the monetization of the IoT in some depth; i.e.,the Monetization of Things.
Tags : 
    
Aria Systems

The Customer Decision Hub – What’s inside your customer brain?

Published By: Pega     Published Date: Sep 11, 2015
In this e-book, Pegasystems’ Vince Jeffs explains why firms must aspire to win over fickle and demanding consumers and to do it efficiently and effectively - they need a Customer Decision Hub – a customer relationship management brain with memory and predictive intelligence.
Tags : 
    
Pega

Magic Quadrant for BPM-Platform-Based Case Management Frameworks

Published By: Pega     Published Date: Sep 11, 2015
In this new report, Pegasystems is recognized as a leader in the growing market for flexible case management solutions. Pega leads the market in delivering applications that meet rising expectations for: -Built-in change governance procedures -Open APIs -Ability to federate case management -Flexible data structures -Focus on business outcomes
Tags : 
    
Pega

6 Must-Haves for Modern Financial Management Systems

Published By: Workday     Published Date: Sep 08, 2015
Download this white paper to understand the six key capabilities that separate Workday Financial Management from old-world business apps.
Tags : 
financial systems, finance technology, workday, security, payroll software, financial management, cloud computing, modern financial mangement system
    
Workday

The Converged Infrastructure Payoff for IT

Published By: CDW     Published Date: Aug 28, 2015
PRE-VALIDATED SYSTEMS ASSIST IT’S EFFORT TO SIMPLIFY INFRASTRUCTURE MANAGEMENT AND FREE UP RESOURCES FOR INNOVATION EFFORTS.
Tags : 
storage, servers, cloud computing, architecture, convergence, virtualization, infrastructure
    
CDW

The World's Most Manageable PCs: Why Customers Buy Dell

Published By: Dell     Published Date: Aug 11, 2015
For every $950 spent on a new system, organizations can spend over $2,400 to support it through a three year lifecycle— that’s why Dell provides systems management solutions that are superior to the competition. Download this infographic to learn why customers buy Dell.
Tags : 
    
Dell

The State of the Trust Gap in 2015

Published By: MobileIron     Published Date: Jul 31, 2015
This whitepaper takes the findings from the 2015 Trust Gap Survey and translates them into actionable recommendations for employers in the form of privacy-centric mobile device policies. This white paper also reviews the privacy enhancements that Apple, Google, and Microsoft have made to their operating systems. When used with an enterprise mobility management (EMM) platform, these enhancements enable a more powerful set of privacy protections than was available even two years ago.
Tags : 
    
MobileIron

OpenStack for Enterprise: The Tipping Point Cometh E-Book

Published By: VMTurbo     Published Date: Jul 08, 2015
This E-Book covers a brief history of the OpenStack cloud operating system, its releases and projects, significant enterprise adoptions, and the function and contributions VMTurbo.
Tags : 
cloud strategy, cloud operating systems, enterprise adoption, database management, business integration, web interface, application management, software licensing
    
VMTurbo

Lenovo XClarity™ - Enhancing Server value with Innovative System Management

Published By: Lenovo     Published Date: Jul 07, 2015
"Lenovo® XClarity™ is a new centralized systems management solution that helps administrators deliver infrastructure faster. This solution integrates easily into Lenovo System x® M5 and X6 rack servers and the Lenovo Flex System™ — all powered by Intel® Xeon® processors — providing automated discovery, monitoring, firmware updates, configuration management, and bare metal deployment of operating systems and hypervisors across multiple systems. Lenovo XClarity provides automated resource management with agentless, software virtual appliance architecture. It features an intuitive graphical user interface. Download now to find out more about Lenovo XClarity! Sponsored by Lenovo® and Intel®"
Tags : 
lenovo, xclarity, server value, system management, automated discovery, configuration management, software development, it management
    
Lenovo

Five Key Questions for Assessing Integrated Third Party Due Diligence Systems

Published By: NAVEX Global     Published Date: Jul 02, 2015
In this whitepaper, industry expert Michael Volkov, CEO of The Volkov Law Group, LLC, shares key questions now business can afford to overlook when evaluating and selecting vendor risk management solutions.
Tags : 
diligence systems, risk management solutions, integrated due diligence, compliance, risk management, workforce management
    
NAVEX Global

Realizing the Full Value of Workforce Management (WFM) Systems

Published By: Skillsoft     Published Date: Jun 25, 2015
Workforce Management (WFM) systems have clearly evolved from the strictly transactional platforms used to deploy workers, track their time and attendance, manage their costs, pay them, administer benefits and provide compliance support. However, WFM systems are actually vital for driving overall business performance … not just for achieving excellence in HR, payroll and benefits administration, time and attendance management Read this white paper to learn how to realize the full value of workforce management systems.
Tags : 
workforce management system, wfm, attendance, cost, payroll, benefits, compliance, administration
    
Skillsoft
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.