managed service

Results 51 - 75 of 348Sort Results By: Published Date | Title | Company Name

Automation 101

Published By: ConnectWise     Published Date: Aug 22, 2019
The goal of automation is not to eliminate or replace human labor, but to increase productivity and quality beyond what is possible with your existing team, so as to realize economies of scale and predictable quality levels. With automation, your team is able to manage more endpoints, because automation eliminates routine and mundane responsibilities or efforts, giving your technicians the time to focus on higher priority and more complex tasks. In addition, as a managed service provider (MSP), you receive a fixed fee for your services. As a result, you need to provide service in the most efficient way possible while delivering the highest levels of consistency and quality. Building automation into your IT services business will enable you to do so. In this eBook, youíll learn tips and best practices to successfully incorporate automation into your IT services business, including:
Tags : 
    
ConnectWise

Azure Serverless Computing Cookbook

Published By: Microsoft Azure     Published Date: Apr 11, 2018
Spend more time building great apps and less time managing server infrastructure. Get your solutions to market faster using Azure Functions, a fully managed compute platform for processing data, integrating systems, and building simple APIs and microservices. In this e-book youíll find use cases, hands-on steps, and tutorials for quickly configuring your own serverless environments. Explore best practices for Functions, and learn how to: Develop event-based handlers on a serverless architecture. Test, troubleshoot, and monitor Azure functions. Automate administrative tasks from development through to deployment and maintenance. Integrate Functions with other Azure services. Build stateful serverless apps and self-healing jobs using Durable Functions. Download the 325-page serverless computing e-book and get access to dozens of step-by-step recipes for quickly building serverless apps.
Tags : 
    
Microsoft Azure

B2B Integration and Collaboration: Strategies for Building a ROI Business Case

Published By: IBM     Published Date: Sep 27, 2011
Take a look at this summary which reveals that companies who have implemented comprehensive B2B Integration programs are reaping huge benefits!
Tags : 
supply chain visibility, network intelligence, data management, b2b integration, b2b collaboration, managed services, cloud computing, social supply chain
    
IBM

Backup & Disaster Recovery Services

Published By: Kaseya     Published Date: Mar 12, 2015
Providers who add BDR to their offerings can enjoy substantial profit margins and incremental monthly recurring revenue. BDR, therefore, is ideal for solution providers, especially as a first step to a managed services practice.
Tags : 
backup, data loss, risks, recovery services, humor error, program deletions, hardware failures, system crashes
    
Kaseya

Balancing Security Investments - The Challenge of the Modern UK Enterprise

Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Achieving and maintaining a high level of information security requires information security professionals with robust skills as well as organisational, technical and operational capabilities. The gap between intent and ability to be secure is evident in our sample of UK large enterprises. Deficient companies will only close that gap when they acquire the necessary capabilities. Some of these capabilities can be purchased as information security tools or application solutions, but it is more prudent for an organisation to consider acquiring these capabilities through a service arrangement with a dedicated security services partner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017

Becoming a Managed Security Service Provider: Why a layered approach to security is essential

Published By: LogicNow     Published Date: Mar 10, 2016
Focusing your managed services business on cybersecurity creates several opportunities to increase margins; most significantly, by implementing layers of security at client sites you can reduce costly security-related issues. In this whitepaper we highlight the reasons why an effective cyberdefense strategy should involve multiple layers of technology and detail why customer disruption is a revenue killer in world of the managed service provider (MSP).
Tags : 
managed services, cyber security, logicnow, cyberdefense, security, best practices, business activity monitoring, risk management
    
LogicNow

Best practices to architect applications in the IBM Cloud

Published By: IBM Cloud Business     Published Date: Jul 12, 2011
Comprehensive product capability discussed throughout this 15-page technical paper, including 11 Best Practices for the IBM Cloud. Written for IT Managers, IT Architects, and developers, learn how you can better manage SaaS cloud applications and bring new applications on line in the future.
Tags : 
best practice, emerging technologies, ibm corp., managed hosting, software as a service (saas), cloud computing, colocation and web hosting, virtualization
    
IBM Cloud Business

Better Data Recovery Yields Happy Clients

Published By: Datto Inc.     Published Date: Jan 31, 2013
Not all backup and disaster recovery (BDR) solutions are created equal. Read how one MSP found the BDR solution that works best for them, and their clients.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business
    
Datto Inc.

Better Manage Your Companyís Documents to Improve Business Results and Mitigate Risk

Published By: Canon Business Process Services     Published Date: Aug 27, 2013
Be confident that you are measurably improving operational efficiency and reducing costs for your business by initiating a best-practices document performance management system with proven methodologies and tools
Tags : 
records management, records management compliance, records retention, records retention schedule, electronic documents, electronic records management, document imaging, document and print management
    
Canon Business Process Services

Beyond Email Attachments and FTP: A New Approach to Secure, Cost-Effective File Delivery

Published By: YouSendIt     Published Date: Sep 17, 2008
In this FactPoint study, discover why companies are increasingly adopting managed file transfer to send large and important files. Learn key factors driving the migration away from e-mail and FTP; the top 8 features to look for; and tough questions to help you choose a solution. Find out why countless companies are making the move—download your copy now.
Tags : 
cost-effective file delivery, promo code: wp2, file transfer, attachment, email, ftp, security, powerpoint attachment
    
YouSendIt

Beyond Email Attachments and FTP: A New Approach to Secure, Cost-Effective File Delivery

Published By: YouSendIt, Inc.     Published Date: Sep 17, 2008
In this FactPoint study, discover why companies are increasingly adopting managed file transfer to send large and important files. Learn key factors driving the migration away from e-mail and FTP; the top 8 features to look for; and tough questions to help you choose a solution. Also, find out how to maximize privacy, security, speed, and ease of use. Find out why countless companies are making the move—download your copy now.
Tags : 
cost-effective file delivery, promo code: wp2, file transfer, attachment, email, ftp, security, powerpoint attachment
    
YouSendIt, Inc.

Beyond MDM: A Multidimensional Mobility Strategy

Published By: Enterprise Mobile     Published Date: Jul 14, 2014
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. Itís time to move beyond mobile device management to a more holistic management method.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management
    
Enterprise Mobile

Beyond MDM: A Multidimensional Mobility Strategy

Published By: Enterprise Mobile     Published Date: Dec 11, 2014
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. Itís time to move beyond mobile device management to a more holistic management method.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management
    
Enterprise Mobile

Board Oversight of Cybersecurity Risk: A Framework for Inquiry

Published By: Secureworks     Published Date: Dec 09, 2016
The included Framework for Inquiry is a non-prescriptive exercise that can help boards and management craft a replicable reporting template for reviewing risk levels, measuring operational effectiveness, and prioritizing initiatives over time.
Tags : 
cybersecurity, managed security services, security, threat and vulnerability management, risk management, vulnerability management
    
Secureworks

Boost Your Multi-Homed Network for Optimal Availability and Performance

Published By: Internap     Published Date: Jul 15, 2011
Download this webcast and learn how you can boost your multi-homed network with our FCP solution, optimizing availability and improving performance.
Tags : 
managed hosting, colocation, data center, cdn, internap, ecommerce, data center, internap
    
Internap

Business Continuity vs. BDR

Published By: Datto Inc.     Published Date: Jan 31, 2013
Understanding RTO (recovery time objective) is a key to knowing the difference between BDR and intelligent business continuity. Read this article to learn more.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business
    
Datto Inc.

Business Value of Managed Services

Published By: IBM     Published Date: Oct 10, 2013
As the primary focus of IT moves from increasing IT productivity through virtualization and cloud computing to enhancing business productivity, the biggest challenge that businesses face in executing corporate strategy is focusing the right people and resources on strategic initiatives. A key element in enhancing business productivity is driving down costs, which can help free up the funds needed to make strategic investments. Businesses also need a means to more effectively orchestrate how IT interacts with business processes and critical application environments. The solution lies in using managed services. Read here to find out more on how companies gained significant and quantifiable benefits from using managed services.
Tags : 
business value, it productivity, virtualization, cloud computing, enhancing productivity, business productivity, executing corporate strategy, strategic initiatives
    
IBM

Business Value of Managed Services

Published By: IBM     Published Date: Jan 09, 2015
Businesses around the world are looking for ways to innovate, improve customer relationships and drive down costs. But it can be challenging to find the right people and resources to support those corporate initiatives. Managed services from IBM can help.
Tags : 
managed mobility services, business productivity, it infrastructure, end-user productivity, it management, knowledge management, enterprise applications, data management
    
IBM

Business Value of Managed Services

Published By: IBM     Published Date: Dec 03, 2015
Businesses around the world are looking for ways to innovate, improve customer relationships and drive down costs.
Tags : 
ibm, managed services, customer relationships, it management, business technology
    
IBM

Buyer's Guide For SD-WAN Managed SD-WAN Services for Digital Transformation

Published By: Masergy     Published Date: Nov 04, 2019
Digital transformation is reshaping the business landscape faster now than at any other time in history. While it once took decades to disrupt a market, natively digital companies have disrupted their industries in just half a decade. Digitization is creating new winners and losers at an unprecedented rate. Organizations that adopt a digital strategy will leapfrog the competition, while those that do not will risk becoming irrelevant within five years. One important step in becoming a digital enterprise is gaining agilityóthat is, having the ability to take advantage of market opportunities faster than the competition. Although achieving business agility has become a top goal for IT and business leaders, it cannot be realized if companies lack an agile IT infrastructure to enable it. This is why businesses spent an estimated $14 billion on technology in 2018 to make IT more agile, according to ZK Research. However, one part of IT that has yet to evolve and lacks flexibility is the ente
Tags : 
    
Masergy

Buyer's Guide For SD-WAN: Managed SD-WAN Services for Digital Transformation

Published By: Masergy     Published Date: Sep 18, 2019
Slow is the new broken, and SD-WAN is helping IT teams move at the speed of todayís digital innovation. But an SD-WAN investment requires you to make critical decisions around architectural design, the use of broadband connectivity, and security. How do you navigate those decisions and identify the right service provider? Zeus Kerravala, Founder and Principal Analyst at ZK Research, offers his guide to investing in SD-WAN.
Tags : 
    
Masergy

BYOD Policy: Itís Protection, Not Paperwork

Published By: Enterprise Mobile     Published Date: Sep 30, 2013
Creating a BYOD policy helps to minimize frustration and risk as you take advantage of cost savings. With a BYOD policy in place, youíll be able to confidently move forward with your own BYOD program, staying at the forefront of mobility trends and fostering improved productivity and user satisfaction. Using a short template can help you identify the key elements that your policy should include. The more policy elements youíre able to cover in the template and the more elements you add on your own, the easier it will be to create the final, formal BYOD policy.
Tags : 
mobility-as-a service, managed mobility services, byod, bring-your-own-device, enterprise mobile, mobility, enterprise mobility, mobile strategy
    
Enterprise Mobile

CA Application Quality Management and Testing Tools

Published By: CA Mainframe     Published Date: Sep 12, 2008
Automated application quality assurance and testing are fundamental to the delivery of the service levels and managed risks that are essential to delivering business outcomes you can depend on. In this context, CA’s mainframe Application Quality Management and Testing Tools send very strong messages: the tools are being actively developed and, where appropriate, integrated with equivalent tools on the distributed platforms, to help companies deliver holistic, automated, business services.
Tags : 
ca mainframe, mainframe, application quality, application testing, testing, application performance management, software testing
    
CA Mainframe

Campus Networking Requirements

Published By: Cisco EMEA     Published Date: Mar 05, 2018
Enterprise IT is changing. Itís evolving from a rigid, static, manually configured and managed architecture to one where connectivity is dynamic, application services are on demand, and processes are automated. Enterprise networking is evolving along with IT. This has been evident in the past several years in initiatives such as enterprise digitization and as-a-service consumption models, as well as their enablers, including BYOD, IoT and cloud. Add to this, all of the security implications of each initiative. The evolution of IT requires a network that evolves along with ITís changing requirements Ė a network that continuously adapts to ever-changing security threats, and evolving digitization, mobility, IoT and cloud requirements.
Tags : 
networking, enterprise, architecture, applications
    
Cisco EMEA

CASE STUDY | Noble Group

Published By: Rackspace     Published Date: May 28, 2019
Noble Group needed to revamp its IT approach to support its technology and global business, which had in-house apps spread across 1,000 different servers around the world. Having worked with Rackspace previously, it had confidence in Rackspaceís expertise in IT transformation, and decided to take up its managed public cloud services for Microsoft Azure, and professional services for cloud migration, performance and scalability. Yet, this resulted in greater gained cost-savings and increased agility, as Noble moved its massive workloads to the Azure cloud with round-the-clock expertise from Rackspace. This proved to be a wise choice. To adapt to Noble Groupís fast changing business model, Rackspace needed to migrate 60 percent of its resources from on-premises infrastructure to Azure, following eight months of planning. At the end of the cloud migration, Noble Group successfully reduced the 2,000 servers from its infrastructure to just 200 servers.
Tags : 
    
Rackspace
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.