managed it

Results 276 - 300 of 505Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Dec 30, 2008
Corporate master data is a critical asset that must be increasingly managed within and beyond the enterprise, primarily to solve business problems in compliance, customer service, sales, and marketing. Such master data may be indentified, harmonized and integrated at multiple levels of the software stack to materialize a single customer view (or supplier, product, view etc.).
Tags : 
ibm, enterprise master data management, corporate master data, data integration, data management
    
IBM
Published By: IBM     Published Date: Oct 13, 2009
Stopping inappropriate data access. This turnkey solution safeguards servers - where business data is stored and accessed - with a combination of software and managed security services that automate critical areas of security oversight. By monitoring and tracking system access, the solution is effective at enforcing security policies.
Tags : 
security threats, ibm, server, express mps, security policies, intrusion prevention, server sensor, internet security systems
    
IBM
Published By: Stratus Technologies     Published Date: Sep 30, 2008
The Choices from many reputable suppliers of IT managed services can appear very much alike. Yet when you have a mission-critical business process whose function must not be interrupted, you know your requirements call for something above and beyond. This paper serves as a field guide to help you identify key characteristics that set a critical managed IT service apart from even highly capable general-purpose offerings.
Tags : 
stratus technologies, it services, business impact analysis (bia), recovery point (rpo), recovery time objectives (rto), business continuity (bc), disaster recovery (dr) protection, service level agreement (sla)
    
Stratus Technologies
Published By: Stratus Technologies     Published Date: Mar 10, 2009
Learn how Stratus Mission-Critical Managed services have delivered 100% business capability for a clients' global operation - so they can 'have their cake and eat it too!'
Tags : 
stratus, business capability, business process, it components, business centric managed service, slas, mission critical environments, disaster prevention
    
Stratus Technologies
Published By: Stratus Technologies     Published Date: Jun 04, 2009
Cloud computing allows companies to use IT resources as a service, taking advantage of shared applications, processing and storage managed within the cloud - either inside a private cloud at an internal data center, or in an external cloud at a service provider. Greater robustness of the virtualized servers supporting this new IT model will ensure a resilient cloud infrastructure capable of delivering "on-demand" access to users.
Tags : 
demand, stratus, cloud computing, virtualized, on demand, storage management, shared applications, cloud
    
Stratus Technologies
Published By: YouSendIt     Published Date: Sep 17, 2008
Sending presentations, audio, video, or graphics files can jeopardize your network’s security. Now learn why you should never use FTP or conventional email to send oversize files; how managed file transfer makes networks safer; and how to avoid email compliance hassles. Don’t let large files become a security issue—download this white paper now.
Tags : 
promo code: wp1, file transfer, attachment, email, ftp, security, powerpoint attachment, mp3 attachment
    
YouSendIt
Published By: YouSendIt     Published Date: Sep 17, 2008
In this FactPoint study, discover why companies are increasingly adopting managed file transfer to send large and important files. Learn key factors driving the migration away from e-mail and FTP; the top 8 features to look for; and tough questions to help you choose a solution. Find out why countless companies are making the move—download your copy now.
Tags : 
cost-effective file delivery, promo code: wp2, file transfer, attachment, email, ftp, security, powerpoint attachment
    
YouSendIt
Published By: YouSendIt, Inc.     Published Date: Sep 17, 2008
Sending presentations, audio, video, or graphics files can jeopardize your network’s security. Now learn why you should never use FTP or conventional email to send oversize files; how managed file transfer can make your network safer; and 7 key criteria to look for. Plus, find out how to avoid email compliance hassles using tracking and traceability. Transferring large files could be a potential security issue. Download this white paper now and learn how to prevent it.
Tags : 
promo code: wp1, file transfer, attachment, email, ftp, security, powerpoint attachment, mp3 attachment
    
YouSendIt, Inc.
Published By: YouSendIt, Inc.     Published Date: Sep 17, 2008
In this FactPoint study, discover why companies are increasingly adopting managed file transfer to send large and important files. Learn key factors driving the migration away from e-mail and FTP; the top 8 features to look for; and tough questions to help you choose a solution. Also, find out how to maximize privacy, security, speed, and ease of use. Find out why countless companies are making the move—download your copy now.
Tags : 
cost-effective file delivery, promo code: wp2, file transfer, attachment, email, ftp, security, powerpoint attachment
    
YouSendIt, Inc.
Published By: Dell Storage     Published Date: Jan 16, 2009
On-Demand Managed Hosting ranges from simple Managed Servers with one or two processors to the design of complex computing environments, which typically include multiple servers, storage, networking, security, backup, load balancing, and more.
Tags : 
dell, intelenet, on-demand computing services, equallogic iscsi san, das, direct attached storage, on-demand managed hosting, storage
    
Dell Storage
Published By: Cisco     Published Date: Jan 29, 2009
The following are 10 tips for using network technology to help your business increase operational efficiency, reduce costs, improve customer satisfaction, and stay ahead of the competition.
Tags : 
cisco, increasing operational efficiency, boost operational efficiency, mobile employees, smb employees, secure wireless access, outsource it tasks, improve employee retention
    
Cisco
Published By: LANDesk     Published Date: Mar 23, 2009
Peters' and Waterman's well-known book 'In Search of Excellence', a study of some of the most well-managed companies in the United States at that time, was one of the best-known business books of the 1980s. In the book, the authors identified eight common themes which they argued were responsible for the success of the included corporations. These attributes included hands-on management, centralized values accompanied by entrepreneurial productivity, and focusing on the core business (sticking to the knitting).
Tags : 
itsm, it service management, it management, business management, avocent, landesk, survey, cio
    
LANDesk
Published By: Savvis     Published Date: Jul 07, 2010
Savvis delivers a complex, fully managed infrastructure for Discovery to support its real-time advertising deliverables, ad sales, scheduling, and programming for all its international operations.
Tags : 
savvis, saas, deliverability, managed infrastructure, outsourcing
    
Savvis
Published By: ScriptLogic     Published Date: Mar 30, 2012
Desktop Authority helps you achieve secure, protected and centrally managed desktops when migrating to Windows 7.
Tags : 
scriptlogic, desktop management, desktop authority, windows, software asset management, software license, tracking, automation
    
ScriptLogic
Published By: Lumension     Published Date: Nov 19, 2010
Learn how removable device policy enforcement can mitigate these risks while enabling managed use of these necessary productivity tools.
Tags : 
lumension security, usb insecurity, universal serial bus, enterprise, policy, risk mitigation, productivity tool, data loss
    
Lumension
Published By: Liaison Technologies     Published Date: Feb 07, 2014
Learn why businesses are increasingly using a managed services approach for their EDI/B2B needs. You too may consider it for your business.
Tags : 
liaison, electronically exchange, managed services, manage data, b2b, data management, enterprise application integration, eai
    
Liaison Technologies
Published By: Liaison Technologies     Published Date: Feb 07, 2014
Businesses and their IT departments are increasingly looking into the Cloud to drive innovation and increase business agility. Are you on the cloud?
Tags : 
liaison, the cloud, cloud computing, hybrid approach, hybrid business, business agility, increase innovation, applications or processes
    
Liaison Technologies
Published By: Liaison Technologies     Published Date: Feb 07, 2014
Big Data holds the promise of a virtually unlimited ability to gain insight – and foresight – to sharpen strategies and improve tactical execution but only if it can be harnessed and managed. Through this whitepaper, you can learn how.
Tags : 
liaison, data integration, data management, it resources, business continuity, systems and processes, autonomous acquisitions, information segregation
    
Liaison Technologies
Published By: TeamQuest     Published Date: Sep 06, 2012
Watch how a global capacity management team managed service levels after multiple bank acquisitions.
Tags : 
capacity management, capacity planning, team quest, information technology, business technology
    
TeamQuest
Published By: TeamQuest     Published Date: Mar 04, 2013
Watch how a global capacity management team managed service levels after multiple bank acquisitions.
Tags : 
performance management, optimization, capacity management, network, managed service
    
TeamQuest
Published By: IBM     Published Date: Jul 02, 2012
Many organizations move a wide variety of sensitive information with file transfer protocol (FTP), and these servers are proving to be easy targets for thieves. Read this paper to learn more about IBM Sterling Managed File Transfer that helps you manage and control the critical information flows in your company's dynamic business networks.
Tags : 
ibm, ftp, secure file transfer, file, business, business network, technology, business technology
    
IBM
Published By: IBM     Published Date: Jul 09, 2012
This white paper offers guidance onhow to build a business case to justify a managed file transfer initiative.
Tags : 
ibm, technology, software, technology, migration factory, storage
    
IBM
Published By: Intel     Published Date: Aug 10, 2012
Managed PKI solutions from Symantec use 3rd generation Intel Core vPro processors to deliver the same level of security as smart card technology.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money
    
Intel
Published By: SunGard     Published Date: Aug 13, 2012
Recovery-as-a-Service (RaaS) has been available for some time, and has leveraged a number of infrastructure options and recovery platforms. Many of these options have provided a recovery solution that is flexible, scalable, and secure. And in some cases, service providers offer fully managed solutions with the expertise to support heterogeneous IT environments.
Tags : 
cloud, recovery-as-a-service, raas, infrastructure, platforms, heterogeneous, networking, storage
    
SunGard
Published By: CDW     Published Date: Mar 18, 2016
The number of mobile devices managed by enterprises increased 72 percent from 2014 to 2015. This onslaught of technology such as notebooks, smartphones, tablets, watches and gadgets has transformed the way users work. These devices provide users in just about every sector with access to the information and tools they need to do their jobs, wherever and whenever they need them. They’re free to work at their desks, in conference rooms, while visiting clients on the road or during a child’s baseball practice. They can input data directly into a medical chart, an order form or an inspection report, rather than doubling their work by transcribing handwritten notes later in the day.
Tags : 
    
CDW
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.