configuration

Results 151 - 175 of 494Sort Results By: Published Date | Title | Company Name
Published By: BMC ESM     Published Date: Nov 06, 2009
As you know, automation is a critical component in achieving long-term IT savings. We've compiled a few resources to give you an overview of the benefits of service automation and the technology behind our comprehensive solution.
Tags : 
bsm esm, service automation, business service management, roi, configuration management, patch management, server
    
BMC ESM
Published By: BMC ESM     Published Date: Nov 09, 2009
In this article, customers, analysts and IT experts share strategies to help automate your manual processes and ensure that changes are applied according to configurations - every time. Download the ebook.
Tags : 
bmc esm, service automation, utility computing, business service management, itil, roi, server compliance
    
BMC ESM
Published By: Infoblox     Published Date: Nov 07, 2013
Attacks on the computing infrastructure directly impact network management teams. Security is also a network management issue. This paper explains how your network management team is key to securing your business against cyber-attacks.
Tags : 
infoblox_dns_dhcp_ipam, infoblox_ddi, infoblox_dns, infoblox_ipam, infoblox_dhcp, infoblox_ip_address_management, dhs_dhcp_ipam, dns, domain_name_server, dhcp, dynamic_host_configuration_protocol, ipam, ip_address_management, internet_protocol_address_management, ddi, dns server, dhs_dhcp_server, network_control, network_automation, network_availability
    
Infoblox
Published By: Infoblox     Published Date: Nov 07, 2013
Failure to meet compliance can result in fines, dangerous network exposure and damage to a company’s reputation. Traditional techniques leave many organizations at risk. Read this white paper to learn 7 critical steps to achieve network compliance.
Tags : 
infoblox_network_automation, infoblox netmri, infoblox_switch_port_manager, infoblox_automation_change_manager, infoblox_spm, infoblox_acm, network_automation, netmri, spm, acm, switch_port_manager, automation_change_manager, change_and_configuration, compliance_manager, network_compliance, network_complexity, multi-vendor_network, network_change_configuration, network_discovery, it management
    
Infoblox
Published By: Infoblox     Published Date: Nov 07, 2013
Network management is becoming increasingly difficult, costly and time-consuming. Legacy manual procedures cannot keep up with today’s complex networks. Read this white paper to learn why implementing network automation is critical to managing your network
Tags : 
infoblox netmri, infoblox_switch_port_manager, infoblox_automation_change_manager, infoblox_spm, infoblox_acm, network_automation, netmri, spm, acm, switch_port_manager, automation_change_manager, change_and_configuration, compliance_manager, network_compliance, network_complexity, multi-vendor_network, network_change_configuration, network_discovery, it management
    
Infoblox
Published By: Infoblox     Published Date: Nov 07, 2013
Automation tools are available to network teams, but most still use legacy techniques to manage their network. Read this white paper to learn how network automation helps organizations automatically detect, track and archive change and configuration of their network.
Tags : 
infoblox_network_automation, infoblox netmri, infoblox_switch_port_manager, infoblox_automation_change_manager, infoblox_spm, infoblox_acm, network_automation, netmri, spm, acm, switch_port_manager, automation_change_manager, change_and_configuration, compliance_manager, network_compliance, network_complexity, multi-vendor_network, network_change_configuration, network_discovery, software development
    
Infoblox
Published By: AMD     Published Date: Jul 20, 2012
Business agility can be defined as a company's ability to respond to changes in business conditions quickly enough to benefit from them.
Tags : 
amd, dell, microsoft, it administrators, virtualization, agile business execution, virtual server performance, data migration, data management, data center, scalability, system management, provisioning, configuration, monitoring, alerting, poweredge, hyper v, amd opteron, networking
    
AMD
Published By: HP - Intel® Xeon® processors     Published Date: Nov 07, 2012
This technical white paper outlines the mission critical reference configuration that is part of the HP Virtual System family.
Tags : 
virtualization, converged infrastructure, cloud computing, convergence, mission-critical applications, servers, cloud, it infrastructure, data management, business technology, data center
    
HP - Intel® Xeon® processors
Published By: BMC Software     Published Date: Aug 26, 2014
Is your IT Automation strategy saving you money or just becoming more complex and costly? With the right unified strategy, IT Automation can pay for itself and deliver far more business value. Watch this on-demand webinar, “New Strategies to Manage IT Automation Complexity” and learn how to: • Reduce costs by integrating automatio n for servers, middleware, networks and databases • Eliminate manual and tedious IT Operations tasks with both new and existing technology • Save time and money by consolidating configuration management processes across your IT infrastructure • Transform compliance, audit that and remediation from a stressful event to a standard practice Become part of the Automation revival is serving as a catalyst for IT Operations. Watch this on-demand webinar and learn how to integrate your IT automation strategy.
Tags : 
it automation, strategy, operations, it infrastructure, automation, it management
    
BMC Software
Published By: Infoblox     Published Date: Sep 09, 2014
Active Directory can manage Microsoft tools; but core network services require best-in-class DNS and DHCP management utilities. Learn how Infoblox enhances Microsoft environments by improving visibility and management of DNS, DHCP, and IPAM processes.
Tags : 
infoblox_dns_dhcp_ipam, infoblox_ddi, infoblox_dns, infoblox_ipam, infoblox_dhcp, infoblox_ip_address_management, dhs_dhcp_ipam, dns, domain_name_server, dhcp, dynamic_host_configuration_protocol, ipam, ip_address_management, internet_protocol_address_management, ddi, dns server, dhs_dhcp_server, network_control, network_automation, network_availability
    
Infoblox
Published By: Infoblox     Published Date: Sep 09, 2014
By enhancing DNS services provided to Active Directory (AD), IT organizations see immediate benefits in performance, speed, and accuracy of data across DNS and AD. Read this white paper to learn how to transform your Microsoft environment today.
Tags : 
infoblox_dns_dhcp_ipam, infoblox_ddi, infoblox_dns, infoblox_ipam, infoblox_dhcp, infoblox_ip_address_management, dhs_dhcp_ipam, dns, domain_name_server, dhcp, dynamic_host_configuration_protocol, ipam, ip_address_management, internet_protocol_address_management, ddi, dns server, dhs_dhcp_server, network_control, network_automation, network_availability
    
Infoblox
Published By: Infoblox     Published Date: Sep 09, 2014
With trends like virtualization and BYOD making networks more complex, the need for accurate and dynamic IP address management (IPAM) is growing. Learn how to implement an IPAM solution that centralizes information to create highly efficient teams.
Tags : 
infoblox_dns_dhcp_ipam, infoblox_ddi, infoblox_dns, infoblox_ipam, infoblox_dhcp, infoblox_ip_address_management, dhs_dhcp_ipam, dns, domain_name_server, dhcp, dynamic_host_configuration_protocol, ipam, ip_address_management, internet_protocol_address_management, ddi, dns server, dhs_dhcp_server, network_control, network_automation, network_availability
    
Infoblox
Published By: HP     Published Date: Nov 05, 2014
One thing is clear: the old way of running IT just won’t work in the new business environment.Truth is, preparing your IT department (and your company) to be agile, cost-efficient, metrics-driven, and flexible will require a change in how you operate. To support new business processes, you would do well to turn to a converged system, like HP ConvergedSystem for Virtualization. In this paper, we look at the greatest challenges faced by IT departments, and how traditional configurations, processes, and organizations are poorly-equipped to handle today’s workplace. We discuss the benefits of converged systems that are engineered to handle virtualized workloads. Finally, we look at HP ConvergedSystem for Virtualization as a simple and effective way for businesses to optimize their data center infrastructure and processes to better meet business needs.
Tags : 
frost and sullivan, business value, it optimization, converged systems, it organization, virtualization, application availability, data center, data management
    
HP
Published By: Ahead     Published Date: Nov 15, 2018
If your business is like many other organizations that are in the process of enabling a Microsoft Azure public cloud platform, then you might be struggling with the guardrails needed to secure and manage cost, while at the same time enabling flexibility for the teams consuming cloud services. While the Azure platform is already very secure, it also allows a great deal of flexibility in configuration. In order to avoid accidentally creating security holes and out-of-control spend, a Governance Framework is required. We created the AHEAD Azure Governance framework to allow enterprises to develop and maintain a fully optimized, and secure environment. The resulting framework will be tailored to your organization’s specific business and compliance needs, as every enterprise is different. This guide will introduce you to the components of this necessary Azure Foundational Governance Design.
Tags : 
    
Ahead
Published By: Alight Solutions     Published Date: Aug 09, 2018
Download this webinar to learn more about how to prepare for your company's upcoming Workday release! During this webinar, Alight's panel of Workday experts will focus on the steps we recommend you take during each phase of your testing schedule, highlighting specific considerations for: • Configuration, including a focus on Payroll and Financial Management • Integrations and reports • Test management
Tags : 
    
Alight Solutions
Published By: Aviatrix     Published Date: Jun 11, 2018
Once you've designed and secured your Global Transit Network, are you done? Are you ready to hand day-to-day responsibility over to an operations team? Or, are there other elements you need to ensure that the day-to-day operation of your transit hub is efficient and effective? As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, demonstrate the best practices they've gleaned from working with operations teams, all who require: • Visibility: Do you have a way to centrally view your network, see performance bottlenecks, control security policies, and set other configuration details? • Deep Analytics: Can you easily gather performance and audit data and export it to Splunk, DataDog, or other advanced reporting tools? • Monitoring and Troubleshooting: Do you have a real-time view of network health, and how easily can you access the data needed to locate and fix issues? • Alert Management: When issues do occur, what r
Tags : 
aws, aws vpc, aws global transit network, aws transit vpc, cisco csr, csr 1000v
    
Aviatrix
Published By: Jamf     Published Date: Jan 14, 2019
Mobile technology offers you the chance to transform your business — unifying online and offline sales channels, coordinating with staff and suppliers, and bringing insight to each customer interaction. Now, the only challenge is managing the mobile devices, apps and configurations that make it all work.
Tags : 
mobile device management, mdm, managed devices, mobile, apple, ios
    
Jamf
Published By: Oracle     Published Date: Oct 20, 2017
This document discusses how to secure applications using Oracle Solaris 11 security and the hardware-assisted cryptography capabilities of Oracle’s SPARC servers. This document explores the end-to-end application security scenarios, technical prerequisites, configuration, deployment, and verification guidelines for multitier application deployments running on Oracle Solaris 11–based SPARC servers. In addition, this document covers the Oracle hardware-assisted cryptographic acceleration of the SPARC processor, a key feature when performance and data protection are deemed critical. The derived security benefits can be leveraged into a variety of solutions including application software, middleware, and infrastructure software.
Tags : 
    
Oracle
Published By: Solidcore     Published Date: Jan 07, 2008
This IT audit checklist guide includes advice on assessing the effectiveness of change management in a variety of areas.   As companies grow more dependent on interdependent IT systems, the risks associated with untested changes in development and production environments have increased proportionately.
Tags : 
audit, auditing, security audit, vulnerabilities, vulnerability, vulnerability management, security management, auditor, change management, configuration management, solidcore, fortrex
    
Solidcore
Published By: Solidcore     Published Date: Jan 07, 2008
Identifying critical change control failure points in your infrastructure can help reduce the threat of costly downtime, potential security breaches, and compliance weaknesses. Read this paper for guidelines on how to identify and categorize systems that have characteristics which heighten risk.
Tags : 
audit, auditing, security audit, vulnerabilities, vulnerability, vulnerability management, security management, change management, configuration management, solidcore, fortrex, infrastructure, risk management
    
Solidcore
Published By: Solidcore     Published Date: Jan 07, 2008
Demonstrating ROI for service management investments can be difficult, especially with multi-phase deployments like ITIL that can require significant up-front investment in exchange for returns produced in the future.  Learn how setting milestones and measuring the value of each phase of an ITIL implementation can help prove the project’s value and shape its focus.
Tags : 
itil, roi, service, service management, solidcore, return on investment, cmdb, change management, configuration management
    
Solidcore
Published By: Tripwire     Published Date: Nov 07, 2012
Properly configuring security parameters on servers, workstations and network infrastructure platforms has been a mandatory of best practices in information security. Read this white paper to learn how secure configurations can reduce overall attack.
Tags : 
secure configuration, tripwire, information security, data security, network infrastructure platforms, business technology
    
Tripwire
Published By: Tripwire     Published Date: Nov 07, 2012
Cloud computing, virtualization and social networking have several things in common - they create new threat vectors that can leave companies vulnerable to new types of attacks. Read on to learn how to prevent new attacks by getting back to basics.
Tags : 
security, configuration, basics, security flaw, it assets, it infrastructure, security infrastructure, tripwire, data management, business technology, data center
    
Tripwire
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.