nis

Results 1576 - 1600 of 1922Sort Results By: Published Date | Title | Company Name
Published By: ScriptLogic     Published Date: Mar 30, 2012
In this whitepaper, we will walk through a couple of recovery scenarios and how you can accomplish this using native tools and how it could be accomplished using Active Administrator.
Tags : 
active directory, active directory recovery, auditing, native tools, centralized, data, secure, database, networking
    
ScriptLogic
Published By: ScriptLogic     Published Date: Mar 30, 2012
So given the tough economic times, what else can IT do to deliver more value to the business? Are there potential blind spots within the IT organization that could destroy a carefully planned budget? Does your company have an active SAM program?
Tags : 
scriptlogic, software asset management, software license, tracking, automation, system center configuration manager, sccm, virtual application
    
ScriptLogic
Published By: Idera     Published Date: Jul 30, 2013
Immediate notifications, deep diagnostics and complete monitoring of SQL server health from a single dashboard.
Tags : 
idera, sql, server monitoring, case study, vce, vblock systems, software development
    
Idera
Published By: Eaton     Published Date: Jun 01, 2012
Server virtualization empowers businesses to lower hardware spending, simplify administration and boost availability. For IT and facilities managers, however, it introduces challenges and opportunities.
Tags : 
power management, server virtualization, business continuity, data center, virtual machines, server utilization, business technology
    
Eaton
Published By: Symantec     Published Date: Aug 09, 2013
Anti-virus software is a crucial piece of any organization’s security strategy. However, sifting through the marketing hype and finding the product that truly delivers the best security can be challenging. This independent research report on enterprise anti-virus protection tests five of today’s best-known anti-malware products to help your organization evaluate which would work best in your enterprise. View now to uncover who came out on top when tested upon accuracy, protection, false positives, and more.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology, business technology
    
Symantec
Published By: Symantec     Published Date: Aug 09, 2013
As virtualization-aware endpoint security solutions continue to evolve, more and more functionality is offloaded from a single VM to its supporting infrastructure in the form of Virtual Appliances (VA). In addition to considering the performance impact of this re- architecting, administrators must also ensure that the protection offered remains fully-functional, even in virtual environments. Learn More.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology, business technology
    
Symantec
Published By: AvePoint     Published Date: Mar 07, 2013
AvePoint is your avenue to SharePoint 2013 success. Read this white paper to see how AvePoint supports migration, protection and administration of your data in SharePoint 2013.
Tags : 
avenue to microsoft sharepoint, 2013, avepoint, migration of sharepoint 2013, knowledge management, data center
    
AvePoint
Published By: Business Software     Published Date: Apr 04, 2013
As today’s global marketplace becomes more sophisticated, the number and complexity of mission-critical financial transactions that companies conduct on a day-to-day basis continues to grow exponentially. Even small and mid-sized businesses are plagued by a rapidly increasing volume of financial processes that are highly intricate and multi-faceted. These activities, while important, are administrative in nature and often distract staff from more strategic planning initiatives that directly impact company prosperity and growth. Additionally, as legislative pressures continue to grow, and the rules imposed by Sarbanes Oxley, BASEL II, and other regulations become more stringent, businesses need to find better ways to ensure compliance by effectively logging, tracking, auditing, and reporting their financial data.
Tags : 
various types of business transactions, cost effectiveness, business-software.com, revealed
    
Business Software
Published By: Business Software     Published Date: Apr 04, 2013
SCM is a combination of science and software that encompasses all operations within the supply chain, including the sourcing, acquisition, and storage of raw materials; the scheduling and management of work-in process; and the warehousing and distribution of finished products. With SCM solutions, businesses can streamline and automate the planning, execution, and control of these key activities.
Tags : 
supply chain management, software, business-software.com, vendors, revealed, scm solutions, control of key activities, management, work-in processes, knowledge management
    
Business Software
Published By: Oracle     Published Date: Nov 01, 2013
Two dominant trends are potentially reshaping the role of the HR function in the corporate world. The first relates to the rapid growth of the knowledge economy. In this environment, a committed, appropriately skilled and prudently deployed workforce is critical in order to develop new products and outstrip the competition. Second, many administrative functions that were formerly handled by HR departments, such as payroll and pensions, have now been farmed out to third parties. Indeed, research reveals that more than two-thirds of companies outsource a portion of their HR functions. This report by the Economist Intelligence Unit investigates whether the HR function is forging a close and robust relationship with the CEO. It also explores the nature of these working relationships, how they have been affected by the economic downturn and how they vary across industries and regions.
Tags : 
zenithoptimedia, oracle, ceo perspectives, hr department drives growth, economist intelligence unit, ibm, hr and organizational strategy, strategic influence of hr, ceo and cfo, team management, best practices for chros, bottom line, economic constraints, unique and special strategies, senior managers, recruitment responsibility
    
Oracle
Published By: Centrify     Published Date: Nov 10, 2013
Leveraging the cloud to bring cost effectiveness and efficiency to an organisation must always be coupled with advanced security measures. Learn how Centrify, through its wide range of products, is able to provide firms both basic and advanced identity access management solutions - making fully integrated security possible.
Tags : 
centrify, iam, identity management, access management, identity and access management, security, cloud solutions, cloud security, saas, saas security
    
Centrify
Published By: Bitium     Published Date: Dec 09, 2013
As enterprises large and small shift their information to the cloud, an explosion of SaaS tools are making it easier than ever for employees to collaborate and innovate. Much of this sharing is being done across time zones and physical locations, by workers who are telecommuting, working in shared or public spaces, and from open networks. Information is stored on central, third-party servers that are accessible across the company and the world by anyone with an internet connection. As a result, online security is increasingly being pushed to the forefront as a major corporate expense. Yet, 89% of the global information workforce lack clarity on how security applies to the cloud. “Data is suddenly everywhere, and so are the number of people, access points and administrators who can control – or worse, copy – the data." Please download the white paper to learn more.
Tags : 
single sign on, sso, identity as a service, idaas, access and identity management, identity access management, password management, password manager, networking, it management, knowledge management, business technology
    
Bitium
Published By: Cisco     Published Date: Dec 23, 2014
Read how cloud technologies can help IT team’s transition from tactical systems administrators to strategic service brokers. In doing so, they can redefine their roles, transform their relationships with business groups, and help move organizational priorities forward.
Tags : 
cloud, cloud computing, role of it, it relationships
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
The discussion spotlights the innovative FlexPod for Microsoft Private Cloud. Details include: • What to expect on your journey and what you shouldn't overlook • How to make organizations truly agile and opportunistic in today's market • What organizations fail to consider and how it will affect them even after deployment
Tags : 
solution guide, integrate, infrastructure, solutions, applications, it management, data management
    
Cisco
Published By: Cisco     Published Date: Jan 15, 2015
In today’s dynamic network environment, point-in-time solutions lack the visibility and control you need to implement an effective security policy that will accelerate threat detection and response. And disparate solutions only add to capital and operating costs and administrative complexity.
Tags : 
operating costs, capital, threat detection, visibility, networks, computing, cloud, innovation, enterprise, datacenter, social, analytics, data management
    
Cisco
Published By: HP     Published Date: Aug 08, 2014
Although ESG continues to see the vast majority of IT organizations living within a disk-plus-tape world, no one can argue against the idea that the cloud is becoming a viable and attractive component of any data protection architecture. Modern disk and tape solutions have overwhelming benefits for ROI, but those benefits can often be expanded by leveraging the economics and additional agility capabilities of a cloud tier. And all of those tiers would benefit from smarter data protection and preservation mechanisms through the combination of both backups and archiving.
Tags : 
disk plus tape, esg, cloud, roi, economics, agility, archiving, backup, recovery solutions, lower costs, speed recovery, infrastructure, risk, simplified management, performance, connectivity
    
HP
Published By: HP     Published Date: Aug 08, 2014
Although modern backup solutions can offer significant recovery agility, backup as an IT process is generally less than “enough” for the data protection goals that IT is being asked to deliver. As IT is embracing snapshots, replication, archiving, and availability mechanisms to enhance business continuity/disaster recovery (BC/DR) preparedness, it is important to realize that there is a better way than piecemealing each component, and then wondering why CapEx and OpEx are so out of line.
Tags : 
vendor, backup, recovery solutions, lower costs, speed recovery, infrastructure, risk, simplified management, performance, connectivity
    
HP
Published By: HP     Published Date: Sep 04, 2014
Data Intensity is an enterprise cloud services provider focusing on Oracle applications. Founded in 2001, it currently has 240 employees and operates two data centers with about 1,200 virtual servers. They needed a flexible storage platform to handle growth of individual customer applications, such as Oracle ERP, with minimal downtime with low operating costs. Testing included storage systems from five different vendors to find a solution that was easy to administer and provides thin provisioning, snapshots, and rapid provisioning.
Tags : 
3par, storage, data, cloud, oracle, data intensity, virtual, solution, data management, business technology
    
HP
Published By: Hewlett-Packard Company     Published Date: May 15, 2014
Traditional server management and provisioning can create unnecessary burdens for many organizations. Information technology (IT) administrators in today’s business environments need a more streamlined process to manage servers throughout the IT life cycle, including tools to help them diagnose problems and procedures for efficiently resolving errors. This white paper provides an in-depth look at the key capabilities of HP Integrated Lights-Out (iLO) embedded in every ProLiant Gen8 server, the solution’s scalable licensing offerings, and mobile-app features that support IT staff—anywhere, anytime.
Tags : 
server management, ilo, proliant gen8 server, it management
    
Hewlett-Packard Company
Published By: AlienVault     Published Date: Oct 21, 2014
When dealing with ransomware threats like CryptoWall, which encrypt your data and demand payment to unlock it, spotting infections quickly is critical in order to limit the damage. AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the command and control server. Watch this demo on-demand to see how AlienVault USM detects these threats quickly, saving you valuable clean-up time and limiting the damage from the attack.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: Bright Computing     Published Date: Mar 08, 2018
This insideHPC guide explores how a powerful scheduling and resource management solution can slot workloads into those idle clusters, thereby gaining maximum value from the hardware and software investment, and rewarding IT administrators with satisfied users.
Tags : 
bright computing, convergence, servers, resource management, hardware, clusters, workload management
    
Bright Computing
Published By: Riverbed     Published Date: Aug 19, 2014
Recent EMA research revealed that top drivers for embracing and deploying VDI include easier management, improved data security/control, and reduced physical desktop capital and administrative costs.
Tags : 
networking, it management
    
Riverbed
Published By: HP     Published Date: Aug 25, 2014
This document identifies the configuration considerations and optimizations for running Microsoft Exchange Server 2013 on the HP ConvergedSystem 700x for Microsoft, which provides highly available, flexible email and collaboration services to an organizational private cloud. The HP ConvergedSystem 700x for Microsoft saves a tremendous amount of time and administrative effort associated with such tasks as system planning, design and equipment procurement. However, organizations new to virtualization technologies, yet wanting to establish a private, public or hybrid cloud infrastructure, need to determine how to best deploy applications to reap the associated benefits and savings. Read this techical whitepaper to learn more.
Tags : 
virtualization, data center, cloud, infrastructure, red hat, integrated, optimization, solution, public, private, business, cloud, converged-systems, system planning, design, equipment, benefits, savings, storage
    
HP
Published By: TheMarketingScope     Published Date: Sep 29, 2015
If you are in the process of putting together a webcast and want to add video, you need to know the best practices. These tips will guide you from start to finish as you create a presentation that will make an impact on your viewers.
Tags : 
themarketingscope, webcast, webcasting, web video, content marketing, video promotion
    
TheMarketingScope
Start   Previous    57 58 59 60 61 62 63 64 65 66 67 68 69 70 71    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.