> Technology > IT Management
 

IT Management

IT Management includes a variety of functions for managing computers in a networked environment, including software distribution, version control, backup & recovery, job scheduling, virus protection and performance and capacity planning.
Results 2576 - 2600 of 2818Sort Results By: Published Date | Title | Company Name
White Paper Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services. This paper explains that employees may not be aware that their file transfer methods can cause a risk to security. Ways to ensure that employees can securely send files without risking corporate data security and what that dangers are with BYOD transfers are also discussed. Recent security breaches are referenced in the paper, and why such attacks are expected to continue into the future. The paper concludes with a description of how companies can ensure data security and how Globalscape's secure file transfer products meet and exceed that need.
Tags : 
byod, dropbox, google drive, file transfer, file sharing
    
Globalscape
White Paper Published By: Globalscape     Published Date: Mar 21, 2014
Email. It can be the source of some of IT's biggest headaches. As it eats up storage and bandwidth, it also opens up holes in your IT security plan. But there is good news. Mail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too!
Tags : 
file transfer, file sharing, mft, mobile security, data protection
    
Globalscape
White Paper Published By: Globalscape     Published Date: Mar 21, 2014
Find out the answer and as well as the other deployment options.
Tags : 
globalscape, saas, managed file transfer, mft, deployment
    
Globalscape
White Paper Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the way in which enterprise mobility has both increased employee productivity and decreased the security of corporate networks. The paper discusses the challenges IT managers have with controlling the "Bring Your Own Device" (BYOD) trend to allow mobile users to have access to the corporate network. Explained in the paper is the limit to visibility and control of file transfers when employees use ad hoc methods, and that educating employees on proper data access is not enough to protect the corporate network. The paper concludes by describing how Globalscape's EFT™ and Tappin™ can provide mobile access, without compromising security and controls over file sharing.
Tags : 
mobile, mobile access, remote access, byod, smartphones
    
Globalscape
White Paper Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally. The paper explains that no manually handling of files, such as with USB drives, is unnecessary when you set up a secure network architecture using five zones of protection. You can transfer files to and from your network around the globe, and know the data and the network are secure, automatically scanning files to block dangerous data while allowing "clean" data into the network. The paper notes several reasons why it matters that data is secure while remaining accessible.
Tags : 
viruses, malware, hackers, leaks, supply chain interruptions
    
Globalscape
White Paper Published By: Logicalis     Published Date: Mar 21, 2014
Learn the top trends and concerns for choosing the right managed services partner.
Tags : 
logicalis, modular computing, data optimization, cloud computing, network rationalization
    
Logicalis
White Paper Published By: Logicalis     Published Date: Mar 21, 2014
Learn the top trends and concerns for choosing the right service desk provider.
Tags : 
logicalis, modular computing, data optimization, cloud computing, network rationalization
    
Logicalis
White Paper Published By: FireEye     Published Date: Feb 28, 2014
If I were to boil down these survey results to a single sentence, it would be this: To keep pace with today’s advanced threats, incident response teams need tools and techniques that give them greater speed, accuracy and insight.
Tags : 
fireeye, incident response, greater speed, greater accuracy, advanced threats
    
FireEye
White Paper Published By: FireEye     Published Date: Feb 28, 2014
This whitepaper further educates you on the new security challenges for state and local governments.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature
    
FireEye
White Paper Published By: FireEye     Published Date: Feb 28, 2014
How are data centers becoming unwitting accomplices in advanced cyber attacks?
Tags : 
fireeye, persistent threats, advanced attacks, data centers, cyber-attacks
    
FireEye
White Paper Published By: FireEye     Published Date: Feb 28, 2014
Organizations need much more than fundamental security tools. Do you know why? Learn more in this whitepaper.
Tags : 
fireeye, gartner research, cyber attacks, security posture, system exploitation
    
FireEye
White Paper Published By: FireEye     Published Date: Feb 28, 2014
The Top 10 Mistakes Incident Responders Make Combatting Advanced Threats
Tags : 
fireeye, persistent threats, advanced attacks, it security, incident response
    
FireEye
White Paper Published By: FireEye     Published Date: Feb 28, 2014
Five Reasons Your Small or Midsize Business is a Prime Target for Cybercriminals
Tags : 
fireeye, persistent threats, advanced attacks, data centers, cyber-attacks
    
FireEye
White Paper Published By: Logicalis     Published Date: Feb 14, 2014
Learn the top trends and concerns for choosing the right infrastructure-as-a-service (IaaS) provider.
Tags : 
logicalis, iaas, infrastructure-as-a-service, iaas market, it management
    
Logicalis
White Paper Published By: OutSystems     Published Date: Jan 29, 2014
11 Usability Rules for IT Developers
Tags : 
outsystems, usability, apps, it developers, outsystems platform
    
OutSystems
White Paper Published By: IBM     Published Date: Jan 09, 2014
Organizations are looking to eliminate data center complexity, sprawl and underutilization. This requires solutions that can boost efficiency and economics, while delivering high-performance capabilities. Read the white paper and see how users and industry analysts alike trust IBM Power Systems to break free from costly and impractical systems.
Tags : 
it solutions, smart analytics, analytics systems, testimonials, it management
    
IBM
White Paper Published By: IBM     Published Date: Jan 09, 2014
IBM Systems Director 6.3 has just been released. Read the white paper and see how this new revision can improve usability with a more logical interface, as well as simplify installation for the program and associated plug-ins. Also learn how its extended functionality enhances control over physical systems, virtualized resources and storage devices.
Tags : 
system director 6.3, system director, virtual machine, installability functionality, energy management
    
IBM
White Paper Published By: Dell Brought to you by Intel     Published Date: Dec 09, 2013
Extending your Datacenter Affordably
Tags : 
dell, datacenter, mini datacenter, complex enterprise solutions, networking
    
Dell Brought to you by Intel
White Paper Published By: VMware, Inc     Published Date: Dec 05, 2013
IT as a service (ITaaS) provides a unique opportunity for IT and line-of-business leaders to realign to transform business. Over the past decade, IT organizations have worked hard to reduce delivery time and costs through automation and commoditization. At the same time, line-of-business owners have demanded more and unique offerings to drive agility and competitive advantage. More recently, the result has been business owners working outside of IT to meet their needs. Now, enabled by cloud computing, ITaaS is catalyzing profound change in IT organizations and the processes companies follow to achieve business goals. Please download the white paper to learn more.
Tags : 
itaas, delivery time, it automation, it commoditization, vmware
    
VMware, Inc
White Paper Published By: Varonis     Published Date: Nov 18, 2013
This whitepaper explores some of the challenges IT faces when migrating and archiving data, provides a migration planning guide with these challenges in mind, and introduces a new approach to solving them using metadata and automation.
Tags : 
varonis, data migration, migrating data, archiving data, metadata
    
Varonis
White Paper Published By: Varonis     Published Date: Nov 12, 2013
The purpose of this document is to explain how Varonis products can help ease migration to Microsoft SharePoint, and how it can help keep data properly managed and protected once data has been moved.
Tags : 
varonis, sharepoint, sharepoint migrations, managing sharepoint content, protecting sharepoint content
    
Varonis
White Paper Published By: Varonis     Published Date: Nov 12, 2013
Odds are fairly high that there is sensitive data on your corporate network that is overexposed and itching to escape. But will it ?Forrester thinks so – in a recent survey, 22% of security decision makers reported a data breach in the past twelve months, and at an average cost of $7.2 million per breach, it’s no shock that organizations are constantly working to strengthen their defenses.
Tags : 
varonis, data protection, context awareness, inevitable breach, sensitive data
    
Varonis
White Paper Published By: Blue Jeans Network     Published Date: Oct 17, 2013
In this white paper, you will learn how third-party service providers can help Lync to become the ubiquitous solution empowering information workers, speeding decision making, and enabling the next generation of B2B and B2C communications.
Tags : 
visual collaboration, video conferencing, collaboration, unified communications, it management
    
Blue Jeans Network
White Paper Published By: Verizon     Published Date: Sep 27, 2013
Embracing IaaS to Bridge the Divide between IT and the Lines of Business
Tags : 
verizon, iaas, social media, global competition, third industrial revolution
    
Verizon
White Paper Published By: Amazon Web Services, Inc     Published Date: Sep 19, 2013
Amazon Web Services (AWS) provides a secure and dependable environment for deploying Microsoft Exchange Server 2010. Customers can use their existing Windows Server applications licenses, such as MS Exchange or SharePoint, on AWS without paying additional licensing fees. Take advantage of the pay-as-you-go-pricing, scalability, and data integrity of the AWS Cloud to run your Exchange Server workloads today. Download the Planning and Implementation Guide to learn more.
Tags : 
aws exchange, microsoft exchange, micrsoft exchange server, microsoft exchange download, microsoft exchange server download
    
Amazon Web Services, Inc
Start   Previous    97 98 99 100 101 102 103 104 105 106 107 108 109 110 111    Next    End
Search      

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com