system configuration

Results 1 - 25 of 91Sort Results By: Published Date | Title | Company Name
Published By: Clarus Systems     Published Date: Mar 18, 2008
In this document, you'll learn to enable the successful execution and completion of IPT Deployment projects through a standardized set of processes and methodologies based upon Information Technology Infrastructure Library (ITIL) standards.
Tags : 
itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices, voice engineering, pdioo, strategies, deployment, operations, day 1, day 2, clarusipc, automated testing, business intelligence, performance management, configuration management
    
Clarus Systems
Published By: Lumension     Published Date: Nov 18, 2010
No longer is it simply OK to focus on Microsoft products - organizations must extend their protection to all of their third-party extensions.
Tags : 
lumension, endpoint, risk management, server operating system, third-party application, protection, anti virus, malware, configuration management
    
Lumension
Published By: Quest Software     Published Date: Apr 19, 2012
In this Quest white paper, get best practices for leveraging native Active Directory (AD) auditing from Microsoft MVP Darren Mar-Elia - and see what auditors are looking for! He also explores third-party solutions that can enhance native AD auditing.
Tags : 
scriptlogic, software asset management, software license, tracking, automation, system center configuration manager, sccm, virtual application
    
Quest Software
Published By: SecureAuth     Published Date: Nov 13, 2017
A penetration test, or pen-test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. These vulnerabilities may exist in operating systems, services and application flaws, improper configurations or risky end-user behavior. Such assessments are also useful in validating the efficacy of defensive mechanisms, as well as, end-user adherence to security policies. This eBook provides a simple guide to explain both penetration testing's purpose and a basic guide to getting you there. Download now and start testing your network today.
Tags : 
    
SecureAuth
Published By: Shavlik Technologies     Published Date: Apr 14, 2011
This paper will look at ways federal government agencies can maintain a strong and effective patch management program by seamlessly integrating third party patch management solutions into existing SCCM infrastructure.
Tags : 
shavlik, patch management, sccm, vulnerability management, security, patch detection, compliance, network security
    
Shavlik Technologies
Published By: HP     Published Date: Jul 25, 2008
This paper outlines a ready-made solution that delivers comprehensive infrastructure optimization in accordance with Microsoft’s APO model. Using HP PolyServe software in conjunction with HP BladeSystem c-Class products and Microsoft SQL Server Enterprise Edition, organizations can attain Dynamic Infrastructure capabilities while reducing server counts by 50%, decreasing configuration and management time by up to 75%, and providing high availability to all servers and SQL Server-based applications.
Tags : 
sql, sql server, migration, infrastructure, server migration, apo, polyserve
    
HP
Published By: rPath     Published Date: Dec 10, 2010
This white paper introduces rPath intelligent system automation as a way to bring consistency, control and scale to .NET production environments. In particular, it describes three scenarios for using rPath within .NET environments.
Tags : 
rpath, automation, sccm
    
rPath
Published By: Qualys     Published Date: Apr 05, 2011
This guide explains how QualysGuard PC automates the "C" in GRCM by automatically scanning all assets, collecting operating system configuration and application access controls, mapping these to IT policy, and documenting compliance.
Tags : 
it data collection, it compliance, grcm controls, qualys, qualysguard pc, gcc, automated general computer control, legacy, it risk, policy editor, saas
    
Qualys
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Challenge Some SAP systems can take up to 10 days to complete a SAP system copy. That’s 10 days of unproductive time. Why? SAP does not provide the necessary tools out-of-the-box to automate and handle the process efficiently. This means you must use highly skilled SAP BASIS staff to manage the process. Manual steps, along with hundreds of configuration settings, can take days to complete—and like many organizations, you have also experienced too many delays, causing non-production systems to be unavailable, which stalls development, testing and training activities. Opportunity So you’ve concluded your SAP system copy process is hindering innovation and productivity. You’re considering automating the process to ensure system copies are available for all environments on time, every time. Benefits What are the key capabilities you actually need to address SAP system copy inefficiency once and for all?
Tags : 
    
CA Technologies_Business_Automation
Published By: Tripwire     Published Date: Mar 31, 2009
How do organizations pass their PCI DSS audits yet still suffer security breaches? Paying attention to PCI DSS checklists only partially secures the cardholder environment. Learn the next steps for fully securing your data.
Tags : 
tripwire, pci checklist, security, cardholder security, enhanced file integrity monitoring, pci dss audits, security breaches, compliance, regulation, configuration assessment, it security, global payment system, risk, risk management, firewall, data protection, cis, disa, sans, routers
    
Tripwire
Published By: Cisco     Published Date: Jan 29, 2009
Small business telephone systems are available in a variety of configurations, offering an ever-growing range of features and benefits. The most advanced small business telephone systems today run on Internet Protocol (IP) networks—the same network many small businesses use to connect employees, devices and information resources.
Tags : 
cisco, small business phone systems, ip networks, internet protocol, videoconferencing, unified messaging, mobile softphones, automated attendant, paging and intercom, crm
    
Cisco
Published By: IBM     Published Date: Jul 07, 2016
In this webinar, you will learn about the availability of SAP HANA across the entire IBM Power Systems line with pre-sized IBM POWER8 configurations that are optimised for SAP HANA, highly available/disaster recovery options for SAP HANA on Power Systems deployments, and systems management solutions to maintain the SAP HANA systems. You will also hear client use cases on why they chose to implement their SAP HANA solution on IBM Power Systems..
Tags : 
ibm, sap, sap hana, suse, ibm power systems
    
IBM
Published By: Cisco     Published Date: Dec 20, 2018
Intent-based networking is the difference between a network that needs continuous attention and one that simply understands what your organization needs and makes it happen. It’s the difference between doing thousands of tasks manually and having an automated system that helps you focus on business goals. Cisco® Digital Network Architecture (Cisco DNA™) is your team’s bridge to an intentbased network. It is an open, extensible, software-driven architecture that accelerates and simplifies your enterprise network operations, while lowering costs and reducing your risk. Only Cisco provides a single network fabric that is powered by deep intelligence and integrated security to deliver automation and assurance across your entire organization at scale. Cisco DNA gives IT time back from time-consuming, repetitive network configuration tasks so you can focus on the innovation your business needs. Cisco DNA automation and assurance are built on a Software-Defined Networking (SDN) controller, ri
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 27, 2017
Miercom was engaged by Cisco Systems to independently configure, operate and then assess aspects of competitive campus-network infrastructures from Cisco Systems and Huawei Technologies. The products of each vendor were configured and deployed strictly according to the vendors' recommended designs, and using their respective software for campus-wide network management, control, configuration and monitoring.
Tags : 
    
Cisco
Published By: Clarus Systems     Published Date: Mar 18, 2008
Clarus Systems, Inc. answers the demands of the market by providing enterprises, systems integrators and managed service providers with scaleable IP Communications solutions that maximize ongoing operations and ensure increased end user confidence and efficiency. Learn more about Clarus Systems and how they can help your business in this data sheet.
Tags : 
itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices, voice engineering, pdioo, strategies, deployment, operations, day 1, day 2, clarusipc, automated testing, business intelligence, performance management, configuration management
    
Clarus Systems
Published By: Clarus Systems     Published Date: Mar 18, 2008
Enterprise networks are going through massive change, and the convergence of voice and data including Communication deployments, upgrades, transformations and ongoing management remain a top priority. According industry analysts at Aberdeen Group, 61% are planning for Communications in the next two years. In order to get the most from their Unified Communications investment at the time of deployment and beyond, enterprises must leverage both active testing and configuration analysis techniques to certify and validate that environments are configured as designed.
Tags : 
itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices, voice engineering, pdioo, strategies, deployment, operations, day 1, day 2, clarusipc, automated testing, business intelligence, performance management, configuration management
    
Clarus Systems
Published By: Cisco     Published Date: Jan 05, 2015
The Cisco UCS solution provides all management and configuration services at the centrally located Fabric Interconnects, so you can manage large-scale deployments from a single location. This method lets you consolidate hardware and streamline management. The IBM Flex System solution uses a distributed management model with chassis-level control. This method adds to the complexity to the hardware configuration, which can increase management needs.
Tags : 
datacenter, data management, collaborations, business capabilities
    
Cisco
Published By: Tripwire     Published Date: Jul 08, 2008
Configuration assessment lets businesses proactively secure their IT infrastructure and achieve compliance with important industry standards and regulations. Learn why configuration assessment is so important, why organizations find it difficult to control system configurations, and what types of configuration assessment solutions are available.
Tags : 
tripwire, configuration, compliance, infrastructure
    
Tripwire
Published By: Tripwire     Published Date: Jul 13, 2007
In this whitepaper, you will learn how configuration audit and control can be used effectively to ensure system management productivity, and help reduce costs and sustain configuration viability within the bounds of operational, security and regulatory standards.
Tags : 
change management models, auditing, configuration management, security, change management, network security, efficiency, productivity, tripwire, cmdb, risk management, audit, risk audit, risk control, configuration control, compliance, tripwire, change control
    
Tripwire
Published By: Clarus Systems     Published Date: Mar 18, 2008
Clarus Systems, Inc. has collaborated with IQ Services to deliver technology independent testing solutions that enhance end-to-end voice process lifecycle management within the contact center. The goal is to ensure a positive customer experience by incorporating voice testing and monitoring into every step of your contact center's life cycle - resulting in confidence that your solution works as designed.
Tags : 
itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices, voice engineering, pdioo, strategies, deployment, operations, day 1, day 2, clarusipc, automated testing, business intelligence, performance management, configuration management
    
Clarus Systems
Published By: IBM     Published Date: Oct 24, 2013
Hear real world examples from service virtualization and mainframe experts about the way service virtualization can enable continuous integration to increase quality, reduce cost, and decrease project risk.
Tags : 
ibm webcast, continuous integration, test virtualization, test automation, execution environment, collaborative development, simplified testing, v2v migrations, improved end-to-end visibility, reduced delivery time, automated test data, region infrastructure, system configurations
    
IBM
Published By: Qualys     Published Date: Jun 02, 2015
This guide describes the need for continuous monitoring and offers a blueprint for creating a continuous security practice. As a result, continuous monitoring will give your organization the most comprehensive view of its global perimeter, and empower you to proactively identify and address potential threats enabled by vulnerabilities in software or weak system configurations.
Tags : 
continuous monitoring, continuous security, potential threat identification, system configurations
    
Qualys
Published By: IBM     Published Date: Jun 08, 2017
This paper presents a cost/benefit case for two leading enterprise database contenders -- IBM DB2 11.1 for Linux, UNIX, and Windows (DB2 11.1 LUW) and Oracle Database 12c -- with regard to delivering effective security capabilities, high-performance OLTP capacity and throughput, and efficient systems configuration and management automation. Comparisons are of database installations in the telecommunications, healthcare, and consumer banking industries. For OLTP workloads in these environments, three-year costs average 32 percent less for use of DB2 11.1 compared to Oracle 12c.
Tags : 
ibm, linux, windows, telecommunications, healthcare, oracle database
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
This paper presents a cost/benefit case for two leading enterprise database contenders -- IBM DB2 11.1 for Linux, UNIX, and Windows (DB2 11.1 LUW) and Oracle Database 12c -- with regard to delivering effective security capabilities, high-performance OLTP capacity and throughput, and efficient systems configuration and management automation. Comparisons are of database installations in the telecommunications, healthcare, and consumer banking industries. For OLTP workloads in these environments, three-year costs average 32 percent less for use of DB2 11.1 compared to Oracle 12c.
Tags : 
ibm, enterprise data, windows, linux, telecommunications, healthcare, consumer banking
    
IBM
Start   Previous   1 2 3 4    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.