assets

Results 176 - 200 of 485Sort Results By: Published Date | Title | Company Name
Published By: HP     Published Date: Jul 29, 2008
Join Forrester Research and HP in this webinar which explores common myths about IT disasters and analyzes different strategies to protect a company's information assets based on risk and cost. Stephanie Balaouras of Forrester analyzes 5 common myths around IT disasters e.g. disasters and loss of a data centers are rare.
Tags : 
disaster, disaster recovery, d/r, high availability, mission critical, forrester, webcast, webinar, it management
    
HP
Published By: Entrust Datacard     Published Date: Oct 31, 2013
Mobility Helps Enterprises Enter a New Age
Tags : 
entrust, mobile, mobility, secure mobile assets, mobile devices, mobile device security, security, it management
    
Entrust Datacard
Published By: ArcSight     Published Date: Mar 03, 2009
This document provides an overview of the drivers for Log Management scalability and outlines the key requirements to consider as part of the evaluation process.
Tags : 
log management, security, fraud, insider threat, suspicious network activity, pci dss, hipaa, sox, application security, arcsight, mission critical assets, networking
    
ArcSight
Published By: ArcSight     Published Date: Mar 04, 2009
This document will outline the requirements for an effective fraud mitigation solution. It will detail a solution that considers the entirety of an organization’s fraud mitigation strategy.
Tags : 
fraud, siem, arcsight, mitigating fraud, intrusion prevention systems, fraudsters, fraud policy, insider threats, mission critical assets, security
    
ArcSight
Published By: HP Data Center     Published Date: Mar 25, 2009
When considering server virtualization, planning and design are critical.  How do you optimize your environment through virtualization?  How do you keep your server sprawl from becoming virtual server sprawl?  How will a virtualized environment help your business?  Will your existing data center meet current, and future, business requirements? Answer your Questions today!
Tags : 
hp data center, virtualization, server planning, server design, server sprawl, tco, roi, server consolidation, decentralized environments, centralized environments, it assets, data center design, eos, data center design and management
    
HP Data Center
Published By: Symantec.cloud     Published Date: Sep 12, 2012
In this e-book, you'll learn how to protect your valuable assets without the expense or time commitment of building a full IT infrastructure.
Tags : 
database security, data management, data and security, smb, cloud based security, security, business technology, data center
    
Symantec.cloud
Published By: PC Mall     Published Date: Mar 02, 2011
Download this HP White Paper to learn how to protect your high value virtual assets with a combination of purpose-built IPS platforms and enterprise-class management solutions.
Tags : 
pc mall, virtualization, server virtualization, data centers, data center security, security, data center design and management
    
PC Mall
Published By: PC Mall     Published Date: Mar 21, 2011
Companies realize the benefits of moving to virtualization, however, most virtualized environments today are being deployed in an insecure manner. Download this HP White Paper to learn how to protect your high value virtual assets with a combination of purpose-built IPS platforms and enterprise-class management solutions.
Tags : 
keywords: virtualization, server virtualization, data centers, data center security, security, data center design and management
    
PC Mall
Published By: Quest Software     Published Date: Jul 28, 2011
In this white paper Quest's data protection experts offer five tips for effective backup and recovery to help you avoid the challenges that might keep you from fully protecting your virtual assets and infrastructure.
Tags : 
quest, storage virtualization, it management, systems management solutions, virtualization managemen, windows, database, application, oem, innovation accelerator, smb, recovery, data protection, identity management, development, optimization, access management, migration, consolidation, performance
    
Quest Software
Published By: IBM US Smarter Buildings     Published Date: Dec 20, 2011
Read how IBM Maximo provides a single work and asset management platform that enables operations to quickly see recurring issues, automate escalation and communication, and maintain comprehensive asset histories for governance requirements.
Tags : 
ibm, calgary catholic school, asset management, operations, assets
    
IBM US Smarter Buildings
Published By: IBM US Smarter Buildings     Published Date: Dec 20, 2011
IBM Maximo Asset Management helps healthcare providers track, monitor and manage the increasing variety of assets on which clinical outcomes and patient care depend. It provides a fully integrated software technology platform, allowing a clear view of information on all assets.
Tags : 
ibm, asset management, hospital, health care, technology, assets
    
IBM US Smarter Buildings
Published By: IBM US Smarter Buildings     Published Date: Jan 10, 2012
For many companies, facilities operations and management represent a significant business cost. Thinking of fixed assets as a source of economic advantage allows companies to optimize their processes and resource use to simultaneously reduce environmental impacts and lower cost.
Tags : 
ibm, smarter buildings, fixed assets, go green, environment
    
IBM US Smarter Buildings
Published By: IBM     Published Date: Apr 18, 2012
In their efforts to keep up with these varied needs, healthcareorganizations are experiencing a proliferation of assets and assettypes. But assets themselves are experiencing a convergence.Clinical devices for patient monitoring and care, building systems for cooling and lighting, and technology devices forcommunications and recordkeeping share a common foundation.
Tags : 
healthcare, management, healthcare assets, convergence, ibm
    
IBM
Published By: ForeScout     Published Date: Aug 14, 2012
Business wants more fluid access to data while IT organizations must maintain security. As the variety of access and multitude of threats to network resources and sensitive information have grown, so has the need for more flexible and automated ways to effectuate security policies, controls and enforcement. Rarely is this need more keenly felt than at the network endpoint, where people, technology, information assets and requirements for security and compliance meet most directly.
Tags : 
pragmatic, path, achieving nac results, essential implementation, process, control, consideration, data, access, it organization, security, protection, network, access, control, nac, interoperability, 802.1x standards, control, options
    
ForeScout
Published By: CDW     Published Date: Nov 12, 2012
Whether assigned or brought in ad hoc by staff, mobile-computing devices require MDM to protect enterprise IT assets.
Tags : 
cdw, mdm, mobile device management, cross-platform, apple, ios, business technology
    
CDW
Published By: CDW     Published Date: Jul 18, 2013
Managing Software Resources Saving money, boosting productivity and reducing management headaches.
Tags : 
cdw, software management, software lifecycle, software assets, security, software development
    
CDW
Published By: CDW     Published Date: Nov 05, 2013
As IT infrastructures evolve, the complexity of software assets is constantly increasing, creating headaches for IT pros whose responsibility it is to keep track of it all. In response, many are turning to software asset management (SAM) software. Chances are your organization may already have an asset management product in place that you think is adequate.
Tags : 
cdw solutions, sam provider, software asset management, sam software, it process, software tco improvement, cio pushback, telecommunications, digital assets, delivering business value, hybrid approach, software management, sam program, it management
    
CDW
Published By: McAfee     Published Date: Jan 23, 2013
Vulnerabilities lead to risk exposure and downtime. Protect your critical assets with virtual patching.
Tags : 
virtual patching, network breaches, critical patches, software patches, change management
    
McAfee
Published By: McAfee     Published Date: Jan 23, 2013
As long as there is software, there will be software vulnerabilities and you will find malware and cybercriminals. This paper will examine that risk and provide a step by step process to protect your companies critical assets.
Tags : 
virtual patching, change management, mcafee network security platform, mcafee vulnerability manager, mcafee global threat intelligence, mcafee risk advisor, mcafee epo, security, it management, data management, business technology, data center
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Gartner defines "big data analytics" as the practices and technology used to pursue emerging and divergent pattern detection as well as enhance the use of previously disconnected information assets.
Tags : 
big data analytics, gartner, big data, big security data, advanced targeted attacks, advanced persistent threats, atas, context aware security intelligence, threat intelligence, siem
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Take the stealth, creativity and patience of Stuxnet, the commercialism, wide distribution and easy-to-use toolkits of Zeus, and you understand the potency of todayís malware. Start planning now to protect your intellectual property and other assets.
Tags : 
zues, stuxnet, stealthy threats, rootkits, malware, rootkit binaries, zero-day vulnerabilities, botnet, ddos attacks, keylogging, phishing, trojans, embedded security, endpoint security
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
Databases store companiesí most valuable information assets, but in most cases theyíre poorly protected. Itís important to secure databases as well as or better than other systems in the enterprise. But itís not that simple.
Tags : 
real-time database monitoring, database authentication, database access control, database activity monitoring, database intrusion prevention, authentication and access control, database security
    
McAfee
Published By: QTS Data Centers     Published Date: Mar 31, 2015
One of ITís biggest balancing acts is to make data transactions easily available to authorized users while preventing all others from accessing its data assets. With high-profile data security breaches splashed across headlines nearly every day, CIOs are understandably worried about protecting their data. And for IT leaders who are considering moving their business to the cloud it is critical to ensure the provider they select has undertaken full and robust measures for physical and logical security.
Tags : 
qts, cloud, security, data transactions, cio report, cyber threats, security breaches, it leaders, it management
    
QTS Data Centers
Published By: Teradata     Published Date: Mar 10, 2014
We evaluate vendors providing applications that support the management of marketing resources, such as plans, people, budgets, projects, tasks, assets and cycle times. This Magic Quadrant will help marketing leaders and CIOs find an MRM solution to better manage their marketing resources.
Tags : 
teradata, marketing resource management, magic quadrant, brandmaker, brandsystems, brandwizard, capital id, direxxis, elateral, ibm, infor, microsoft, north plains, pti marketing technologies, saepio, sap, sas, wedia, marketing resources, mrm solution
    
Teradata
Published By: Adobe     Published Date: Jul 28, 2015
Download the new Adobe whitepaper to discover the seven trends impacting how digital marketers create, manage, deliver, and optimize their digital assets.
Tags : 
customer experience, adobe creative cloud, mobile apps, personalization, optimization, digital assets, digital marketing
    
Adobe
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com