assets

Results 226 - 250 of 538Sort Results By: Published Date | Title | Company Name
Published By: HP Data Center     Published Date: Mar 25, 2009
When considering server virtualization, planning and design are critical.  How do you optimize your environment through virtualization?  How do you keep your server sprawl from becoming virtual server sprawl?  How will a virtualized environment help your business?  Will your existing data center meet current, and future, business requirements? Answer your Questions today!
Tags : 
hp data center, virtualization, server planning, server design, server sprawl, tco, roi, server consolidation, decentralized environments, centralized environments, it assets, data center design, eos, data center design and management
    
HP Data Center
Published By: Symantec.cloud     Published Date: Sep 12, 2012
In this e-book, you'll learn how to protect your valuable assets without the expense or time commitment of building a full IT infrastructure.
Tags : 
database security, data management, data and security, smb, cloud based security, security, business technology, data center
    
Symantec.cloud
Published By: PC Mall     Published Date: Mar 02, 2011
Download this HP White Paper to learn how to protect your high value virtual assets with a combination of purpose-built IPS platforms and enterprise-class management solutions.
Tags : 
pc mall, virtualization, server virtualization, data centers, data center security, security, data center design and management
    
PC Mall
Published By: PC Mall     Published Date: Mar 21, 2011
Companies realize the benefits of moving to virtualization, however, most virtualized environments today are being deployed in an insecure manner. Download this HP White Paper to learn how to protect your high value virtual assets with a combination of purpose-built IPS platforms and enterprise-class management solutions.
Tags : 
keywords: virtualization, server virtualization, data centers, data center security, security, data center design and management
    
PC Mall
Published By: Quest Software     Published Date: Jul 28, 2011
In this white paper Quest's data protection experts offer five tips for effective backup and recovery to help you avoid the challenges that might keep you from fully protecting your virtual assets and infrastructure.
Tags : 
quest, storage virtualization, it management, systems management solutions, virtualization managemen, windows, database, application, oem, innovation accelerator, smb, recovery, data protection, identity management, development, optimization, access management, migration, consolidation, performance
    
Quest Software
Published By: IBM US Smarter Buildings     Published Date: Dec 20, 2011
Read how IBM Maximo provides a single work and asset management platform that enables operations to quickly see recurring issues, automate escalation and communication, and maintain comprehensive asset histories for governance requirements.
Tags : 
ibm, calgary catholic school, asset management, operations, assets
    
IBM US Smarter Buildings
Published By: IBM US Smarter Buildings     Published Date: Dec 20, 2011
IBM Maximo Asset Management helps healthcare providers track, monitor and manage the increasing variety of assets on which clinical outcomes and patient care depend. It provides a fully integrated software technology platform, allowing a clear view of information on all assets.
Tags : 
ibm, asset management, hospital, health care, technology, assets
    
IBM US Smarter Buildings
Published By: IBM US Smarter Buildings     Published Date: Jan 10, 2012
For many companies, facilities operations and management represent a significant business cost. Thinking of fixed assets as a source of economic advantage allows companies to optimize their processes and resource use to simultaneously reduce environmental impacts and lower cost.
Tags : 
ibm, smarter buildings, fixed assets, go green, environment
    
IBM US Smarter Buildings
Published By: IBM     Published Date: Apr 18, 2012
In their efforts to keep up with these varied needs, healthcareorganizations are experiencing a proliferation of assets and assettypes. But assets themselves are experiencing a convergence.Clinical devices for patient monitoring and care, building systems for cooling and lighting, and technology devices forcommunications and recordkeeping share a common foundation.
Tags : 
healthcare, management, healthcare assets, convergence, ibm
    
IBM
Published By: ForeScout     Published Date: Aug 14, 2012
Business wants more fluid access to data while IT organizations must maintain security. As the variety of access and multitude of threats to network resources and sensitive information have grown, so has the need for more flexible and automated ways to effectuate security policies, controls and enforcement. Rarely is this need more keenly felt than at the network endpoint, where people, technology, information assets and requirements for security and compliance meet most directly.
Tags : 
pragmatic, path, achieving nac results, essential implementation, process, control, consideration, data, access, it organization, security, protection, network, access, control, nac, interoperability, 802.1x standards, control, options
    
ForeScout
Published By: CDW     Published Date: Nov 12, 2012
Whether assigned or brought in ad hoc by staff, mobile-computing devices require MDM to protect enterprise IT assets.
Tags : 
cdw, mdm, mobile device management, cross-platform, apple, ios, business technology
    
CDW
Published By: CDW     Published Date: Jul 18, 2013
Managing Software Resources Saving money, boosting productivity and reducing management headaches.
Tags : 
cdw, software management, software lifecycle, software assets, security, software development
    
CDW
Published By: CDW     Published Date: Nov 05, 2013
As IT infrastructures evolve, the complexity of software assets is constantly increasing, creating headaches for IT pros whose responsibility it is to keep track of it all. In response, many are turning to software asset management (SAM) software. Chances are your organization may already have an asset management product in place that you think is adequate.
Tags : 
cdw solutions, sam provider, software asset management, sam software, it process, software tco improvement, cio pushback, telecommunications, digital assets, delivering business value, hybrid approach, software management, sam program, it management
    
CDW
Published By: McAfee     Published Date: Jan 23, 2013
Vulnerabilities lead to risk exposure and downtime. Protect your critical assets with virtual patching.
Tags : 
virtual patching, network breaches, critical patches, software patches, change management
    
McAfee
Published By: McAfee     Published Date: Jan 23, 2013
As long as there is software, there will be software vulnerabilities and you will find malware and cybercriminals. This paper will examine that risk and provide a step by step process to protect your companies critical assets.
Tags : 
virtual patching, change management, mcafee network security platform, mcafee vulnerability manager, mcafee global threat intelligence, mcafee risk advisor, mcafee epo, security, it management, data management, business technology, data center
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Gartner defines "big data analytics" as the practices and technology used to pursue emerging and divergent pattern detection as well as enhance the use of previously disconnected information assets.
Tags : 
big data analytics, gartner, big data, big security data, advanced targeted attacks, advanced persistent threats, atas, context aware security intelligence, threat intelligence, siem
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Take the stealth, creativity and patience of Stuxnet, the commercialism, wide distribution and easy-to-use toolkits of Zeus, and you understand the potency of today’s malware. Start planning now to protect your intellectual property and other assets.
Tags : 
zues, stuxnet, stealthy threats, rootkits, malware, rootkit binaries, zero-day vulnerabilities, botnet, ddos attacks, keylogging, phishing, trojans, embedded security, endpoint security
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
Databases store companies’ most valuable information assets, but in most cases they’re poorly protected. It’s important to secure databases as well as or better than other systems in the enterprise. But it’s not that simple.
Tags : 
real-time database monitoring, database authentication, database access control, database activity monitoring, database intrusion prevention, authentication and access control, database security
    
McAfee
Published By: QTS Data Centers     Published Date: Mar 31, 2015
One of IT’s biggest balancing acts is to make data transactions easily available to authorized users while preventing all others from accessing its data assets. With high-profile data security breaches splashed across headlines nearly every day, CIOs are understandably worried about protecting their data. And for IT leaders who are considering moving their business to the cloud it is critical to ensure the provider they select has undertaken full and robust measures for physical and logical security.
Tags : 
qts, cloud, security, data transactions, cio report, cyber threats, security breaches, it leaders, it management
    
QTS Data Centers
Published By: Teradata     Published Date: Mar 10, 2014
We evaluate vendors providing applications that support the management of marketing resources, such as plans, people, budgets, projects, tasks, assets and cycle times. This Magic Quadrant will help marketing leaders and CIOs find an MRM solution to better manage their marketing resources.
Tags : 
teradata, marketing resource management, magic quadrant, brandmaker, brandsystems, brandwizard, capital id, direxxis, elateral, ibm, infor, microsoft, north plains, pti marketing technologies, saepio, sap, sas, wedia, marketing resources, mrm solution
    
Teradata
Published By: Adobe     Published Date: Jul 28, 2015
Download the new Adobe whitepaper to discover the seven trends impacting how digital marketers create, manage, deliver, and optimize their digital assets.
Tags : 
customer experience, adobe creative cloud, mobile apps, personalization, optimization, digital assets, digital marketing
    
Adobe
Published By: Adobe     Published Date: Dec 21, 2015
The Adobe white paper, 7 Trends Impacting How We Use Digital Assets, identifies the trends that help you deliver more meaningful customer experiences with the right assets, through the right channels, at the right time.
Tags : 
adobe, digital asset, media, customer experience, channel, software development, knowledge management, enterprise applications
    
Adobe
Published By: Adobe     Published Date: Dec 21, 2015
Download the Adobe-sponsored IDC InfoBrief Proving the Value of Digital Asset Management and the Adobe white paper 7 Trends Impacting How We Use Digital Assets to see how to use DAM to keep up with the constantly accelerating pace of digital business.
Tags : 
adobe, asset management, digital, idc, knowledge management, enterprise applications, business technology
    
Adobe
Published By: Adobe     Published Date: Sep 16, 2016
Meet the trends that are impacting your ability to create, manage, deliver and optimize your digital assets. The Adobe white paper, 7 Trends Impacting How We Use Digital Assets, identifies the trends that help you deliver more meaningful customer experiences with the right assets, through the right channels, at the right time. Read the Adobe white paper to learn: • How metadata can help increase brand consistency across multiple channels and devices • Why marketers need digital asset tools that increase responsiveness to consumers in real time • The importance of rich media in delivering personalized content that deepens customer connections
Tags : 
adobe, digital, digital asset management, dam, digital asset management system, customer experience, digital assets, enterprise applications, business technology
    
Adobe
Published By: VMware SD-WAN by VeloCloud     Published Date: May 20, 2019
The network of yesterday is not the network that can take businesses into the future. As mission critical enterprise applications move to the cloud, wide area network (WAN) must adapt to become agile, flexible, and scale rapidly. Leading IT trends such as Internet of Things (IoT), Software as a Service (SaaS), cloud storage, enterprise mobility, emerging transport alternatives, and globalization increase the importance of how network assets are leveraged and how the network is conceptualized. The advantages of public and private data centers and cloud-based applications are significantly diminished if the network is slow, inflexible, and unpredictable. Erratic network performance with high latency, jitter and packet loss can significantly impact user adoption, satisfaction, and overall corporate productivity. As connectivity options continue to emerge, end users are no longer tethered to the office or to the localized applications and services that were trademarks of a primary or branc
Tags : 
    
VMware SD-WAN by VeloCloud
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com