RSS feed Get our RSS feed

News by Topic

it manager

Results 376 - 400 of 918Sort Results By: Published Date | Title | Company Name
By: F5 Networks Inc     Published Date: Jan 22, 2009
The focus of this report is performance testing of the core services of an OCS Enterprise Edition Consolidated Configuration and as deployed on an HP BladeSystem and HP StorageWorks solution. One requirement for any solution deploying more than one server in a pool is a hardware load balancer. In this solution a F5 BIG-IP Local Traffic Manager is used.
Tags : hp bladesystem, hp storageworks, server deployment, microsoft office communications server, storage
     F5 Networks Inc
By: NetApp     Published Date: Jun 09, 2009
Nothing is scarier than the prospect of having to recover an entire site after a disaster. VMware® Site Recovery Manager (SRM) is designed to simplify and accelerate disaster recovery. This article discusses the challenges of DR planning and how VMware SRM—in conjunction with NetApp storage functionality—can simplify DR for virtual infrastructure.
Tags : netapp, vmware, disaster recovery, site recovery manager, srm, storage
     NetApp
By: NetApp     Published Date: Jun 09, 2009
This paper focuses generally on optimal storage and storage management for SharePoint and specifically evaluates NetApp's approach, detailing how the capabilities in NetApp's DataONTAP and SnapManager for SharePoint Server offerings help to drive storage efficiency, reduce cost, and exclude complexity in a comprehensive SharePoint implementation. It is not so much a "how to" guide, but rather a "why to" explanation. Learn more today!
Tags : netapp, microsoft, sharepoint, networked storage, snapmanager, dataontap, direct attached storage, das
     NetApp
By: HP Data Center     Published Date: Mar 25, 2009
The need for reliable data centers is growing, especially in the small to medium sized business market.  So too is the price of data centers -- both in terms of initial cost and Total Cost of Ownership (TCO) -- as equipment, service and utility costs continue to escalate.  How is a data center manager going to support an IT-based business strategy that hinges on high availability, at a reasonable business cost?  Insource? Outsource? Build? Lease? This presentation looks at the factors driving data centers costs, their impact, how they can be controlled, and how to justify the data center you need.
Tags : data center costs, hp data center, tco, total cost of ownership, price of data centers, it spending, it architecture, insource
     HP Data Center
By: PC Mall     Published Date: Oct 12, 2011
HP Mobility Traffic Manager enables flexible WLAN traffic distribution models to address diverse applications and business requirements.
Tags : wlan, technology, enterprise, mobility traffic manager, pc mall
     PC Mall
By: Virgin Pulse     Published Date: Mar 13, 2014
A new survey of more than 1,000 full-time U.S. employees by Virgin Pulse reveals that, while employees love their companies, they're not always feeling appreciated. Begin to turn that sentiment around by supporting employees' Total Quality of Life - including physical, emotional, social, and financial health - and fostering the employee/manager relationship with open conversations highlighting employees' achievements and recognizing a job well done.
Tags : 
     Virgin Pulse
By: McAfee     Published Date: Nov 01, 2010
IT managers in mid-size organizations need servers to be reliable. Read this white paper to find out more.
Tags : mcafee, server security, vulnerability
     McAfee
By: M86 Security     Published Date: Feb 09, 2011
This paper is intended for IT decision makers, HR managers and executives responsible for adopting and enforcing email and Web Acceptable Use Policies (AUPs) within an organization.
Tags : m86 security, social media policy, web acceptable use policies, aups, email and web security
     M86 Security
By: YouSendIt     Published Date: Feb 04, 2012
Download this complimentary report and learn about the overwhelming number of business managers using an application or service that is not sanctioned by IT.
Tags : yousendit, manufacturing, email maketing, ecommerce, healthcare, business managers, email, marketing
     YouSendIt
By: YouSendIt     Published Date: Apr 19, 2012
This white paper provides a brief overview of the trend toward consumerized IT and Osterman Research's recommendations for addressing it.
Tags : yousendit, manufacturing, email maketing, ecommerce, healthcare, business managers, email, marketing
     YouSendIt
By: IBM US Smarter Buildings     Published Date: Dec 20, 2011
This high-level Flash video provides an overview of how the IBM Smarter Planet campaign can help improve facilities management. By using IBM Maximo Asset Management, facilities managers are enabled to create smart buildings that reduce overall energy use and are operationally efficient.
Tags : ibm, asset management, maximo, flash video, smarter planet, energy, efficiency
     IBM US Smarter Buildings
By: Oracle Global Marketing     Published Date: Jul 13, 2012
As the amount and importance of corporate data grows, companies of all sizes are finding that they increasingly need to deploy high-availability database solutions to support their business-critical applications.
Tags : data, database, oracle database appliance, choosing hardware. storage, internal networking, memory, cpu, verify patch compatibility
     Oracle Global Marketing
By: ForeScout     Published Date: Jan 24, 2013
This IDC study surveyed IT managers about the number of consumer devices on their networks, they underestimated the number by 50%. Whether you are prohibiting, tolerating or embracing BYOD, you need to define policy and security.
Tags : bring your own device, byod, idc survey, it managers, devices on network
     ForeScout
By: Heroix     Published Date: Jan 23, 2013
IT managers can increase their likelihood of cloud computing success by applying some simple lessons from the past.
Tags : virtualization, cloud computing, network
     Heroix
By: McAfee     Published Date: Jan 23, 2013
Discover. Evaluate. Act. Reduce risk with real-time identification, assessment. This white paper discusses a new approach to protecting your network through a combination of active and passive network discovery and monitoring, in real-time.
Tags : mcafee vulnerability manager, mcafee asset manager, continuous monitoring, risk-based assessments, mcafee epo, vulnerability management, mcafee global threat intelligence, security
     McAfee
By: McAfee     Published Date: Jan 23, 2013
As long as there is software, there will be software vulnerabilities and you will find malware and cybercriminals. This paper will examine that risk and provide a step by step process to protect your companies critical assets.
Tags : virtual patching, change management, mcafee network security platform, mcafee vulnerability manager, mcafee global threat intelligence, mcafee risk advisor, mcafee epo, security
     McAfee
By: McAfee     Published Date: Jan 23, 2013
Some IT and Security teams wonder if automated vulnerability management is important given the many pressing demands. The purpose of this paper is to help these IT and Security professionals evaluate their security posture and risk.
Tags : mcafee vulnerability manager, vulnerability management, mcafee labs, mcafee epolicy orchestrator, mcafee epo, mcafee epolicy orchestrator, patch tuesdays, mcafee policy auditor
     McAfee
By: McAfee     Published Date: Jan 23, 2013
Vulnerability assessment vendors compete on management features, configuration assessment, price and more, with other security products. Buyers must consider how VA will fit into their vulnerability management process when evaluating VA products,
Tags : vulnerability management, network scanning, strong positive, mcafee vulnerability manager, mvm, mcafee epolicy orchestrator, epo, nitro siem
     McAfee
By: McAfee     Published Date: Jan 23, 2013
Threats and vulnerabilities are a way of life for IT admins. This paper focuses on how McAfee's Vulnerability Manager and McAfee e Policy Orchestrator provide IT Admins with powerful and effective tool for identifying and re-mediating systems.
Tags : mcafee vulnerability manager, s3kur3, tom bradley, mcafee epolicy orchestrator, mcafee vulnerability scanner, mcafee epolicy orchestrator, mcafee global threat intelligence, vulnerability scan
     McAfee
By: McAfee     Published Date: Jan 24, 2013
This paper reports on the findings when testing McAfee's Risk Management solution from a holistic risk management and vulnerability life-cycle management perspective. Download this white paper to learn more.
Tags : miercom lab test report, mcafee risk management, vulnerability life cycle management, security and compliance, mcafee epolicy orchestrator, mcafee global threat intelligence, mcafee labs, malware
     McAfee
By: McAfee     Published Date: Feb 06, 2013
This survey shows how organizations leverage strategic risk management and mitigation solutions such as risk analysis, security information event management (SIEM), and vulnerability scanning as part of their overall risk and compliance programs.
Tags : risk and compliance, patch management, siem, policy compliance and configuration, database security, mcafee vulnerability manager, mcafee risk advisor, mcafee policy auditor
     McAfee
By: McAfee     Published Date: Mar 07, 2013
HIPAA and HITECH require individually identifiable protected health information (PHI) be secured. The unfortunate reality for IT professionals is that these acts of Congress aren't prescriptive regarding what needs to be done about computer systems.
Tags : best database security solution, database activity monitoring, hipaa compliance, hitech compliance, phi, ephi, vulnerability manager for databases
     McAfee
By: McAfee     Published Date: Mar 07, 2013
Recent surveys of IT managers revealed two commonly held beliefs: database regulations are the most challenging to comply with, and of all regulatory standards, the Payment Card Industry Data Security Standard (PCI DSS) the toughest.
Tags : pci dss compliance, best database security, pci security standards council, pci dss requirements, database activity monitoring, vulnerability manager for databases
     McAfee
By: McAfee     Published Date: Mar 08, 2013
McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : database security, database vulnerability manager, database compliance, mysql security, database password security, sql injection, buffer overflow, insecure sql code
     McAfee
By: McAfee     Published Date: Mar 11, 2013
McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities
     McAfee
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics