RSS feed Get our RSS feed

News by Topic

it manager

Results 26 - 50 of 926Sort Results By: Published Date | Title | Company Name
By: ADP     Published Date: Aug 28, 2017
Many small businesses rely on owners and other employees to take on HR responsibilities in addition to their “day jobs,” a role we call the ad hoc HR manager (aHRM). Although a common practice, using an aHRM can present unforeseen risks. Read the complete guide to risky ad hoc HR management to find out more.
Tags : 
     ADP
By: Aerohive     Published Date: May 13, 2015
A paper on enabling cloud networking to lower IT costs & boost IT productivity.
Tags : benefits of cloud networking, advantages of cloud networking, cloud, networking, cloud networking, aerohive networks, hivemanager, cloud computing
     Aerohive
By: Aerohive     Published Date: May 19, 2015
The Rimi chain of supermarkets started out in Norway in 1977 as ”RIMI 500”, and was acquired by the Swedish ICA supermarket chain in 1992.
Tags : wireless network, network management system, workforce mobility, improvements in stock management, retail, aerohive networks solution, stores with aerohive networks, mobility
     Aerohive
By: Ahead     Published Date: Feb 05, 2018
There’s a lot of noise these days about hyper-convergence. IT managers are facing internal pressure to adopt hyper-converged infrastructure (HCI) solutions to make their departments more efficient and “cloud-like” as well as external pressure from vendors fighting for market share in an increasingly crowded space. While an HCI solution could bring your organization significant benefits, it’s not necessarily simple to implement, nor is it the optimal solution for every use case. To determine if HCI is right for you, first we need a clear definition of what it is and what it does.
Tags : availability, scalability, operation, maintenance, support, ahead
     Ahead
By: AirDefense     Published Date: Apr 24, 2007
This document outlines how hackers are exploiting vulnerabilities in 802.11 wireless LANs and describes the widely available hacking tools. As a collection of already published risks to wireless LANs, this white paper is written to inform IT security managers of what they are up against.
Tags : hackers, hacker, hacker detection, intrusion prevention, wireless security, wlan, wlans, 802.11
     AirDefense
By: AirDefense     Published Date: Apr 24, 2007
This white paper is designed to guide network administrators and security managers to design, implement, and enforce wireless LAN security policies that enable every organization to fully reap the benefits of wireless LANs without experiencing undue management pains and security holes.
Tags : sox, sarbox, sarbanes oxley, sarbanes-oxley, compliance, hipaa, wlan, wlans
     AirDefense
By: Akamai     Published Date: Apr 10, 2015
Enterprise network architectures are evolving as a result of the growth of public cloud, proliferation of mobile devices, and organizational requirement to collaborate with global users. In this on-demand webinar, Gartner Research VP and Distinguished Analyst Mark Fabbi and Akamai Technologies' Enterprise Web Experience Product Manager, Greg Lord, will provide insight into this new trend.
Tags : akamai, web performance, cloud services, network management, cloud networking, digital enterprise
     Akamai
By: Akamai Technologies     Published Date: Mar 09, 2017
For many financial institutions, traffic from bots (aggregators, scrapers, crawlers) can account for up to 40-60% of their overall website traffic — from good bots engaged in essential business tasks to bad bots performing harmful activities. Banks, traders, asset managers, and insurers might know how much of their traffic is from bots, but what they may not know is the impact those bots may be having on their business. Read the report to learn more about: • Managing Financial Data Aggregators • How Bots Affect the Digital Experience • What a good bot looks like?
Tags : financial services, financial data, bots, bot management, website traffic, the digital experience
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 31, 2017
Before organizations can address their bot challenges, they need the ability to detect the many types of bots interacting with their websites and web applications on a daily basis. Bots come in many shapes and sizes, ranging from simple scripts to sophisticated automation tools, and continuously evolve over time. As detection technologies improve, so too do the technologies available to bot operators as they update their bots to evade the latest detection mechanisms. When evaluating a bot management solution, organizations should consider its detection technologies and their effectiveness against the current and future bot landscape, while maintaining the lowest possible level of false positives and negatives.
Tags : bot manager, bot interaction bot detection
     Akamai Technologies
By: Akamai Technologies     Published Date: Apr 25, 2018
This asset is in Japanese.
Tags : case, study, rice, force, akamai, image, manager
     Akamai Technologies
By: Alacritech     Published Date: Aug 21, 2009
IP storage using Internet SCSI (iSCSI) provides opportunity for many organizations looking to extend existing Fibre Channel SANs to stranded servers, or looking to deploy Ethernet-based SANs. It can reduce costs by allowing IT managers to take advantage of existing, familiar Ethernet networks. Often the biggest complaint white new technology like iSCSI is its ability to provide more than simple functionality and connectivity.
Tags : internet scsi, ip storage, ip networks, fiber channel, fibre channel, san, storage area networks, iscsi
     Alacritech
By: Alacritech     Published Date: Aug 21, 2009
Customers are increasingly constrained by large transfers of data backup, long backup times to storage devices, and less efficient use of server resources as a result. System and database availability is heavily impacted during backup periods, and with the rapid growth of storage and the need to archive customer data, IT managers are actively seeking solutions for their backup problems.
Tags : data backup, backup and recovery, storage, database availability, backup, recovery, servers, backup server
     Alacritech
By: Alert Logic     Published Date: Jun 12, 2014
New security threats are emerging all the time, from new forms of malware and web application exploits that target code vulnerabilities to attacks that rely on social engineering. Defending against these risks is an ongoing battle. Download to learn more!
Tags : cloud security, vulnerability management, vulnerabilities, patching, patch management, security
     Alert Logic
By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts,risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.
Tags : alert logic, rackspace, pci, pci dss, payment security, compliance, cloud pci, security
     Alert Logic and Rackspace
By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts, risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.
Tags : alert logic, sungard, pci, pci dss, payment security, compliance, cloud pci, security
     Alert Logic and Sungard Availability Services
By: AlienVault     Published Date: Oct 20, 2017
Transitioning from MSP to MSSP is a well-trodden path and there are a lot of best practices to increase chances of success. Success is due to people, processes, and tech in equal proportions. Generally, new MSSPs should pick a core set of competencies and branch outward from there. In this white paper, Garrett Gross, Director of Field Enablement, AlienVault and Tim Foley, Sr. Manager of Information Security, Dataprise discuss the current state of the market for MSSPs and best practices for new MSSPs.
Tags : 
     AlienVault
By: Alteryx, Inc.     Published Date: Apr 21, 2017
Data Analytics has become critical for many business decision makers. However, many of these managers and data analysts still rely on spreadsheets and other legacy-era tools that fall far short of current needs. As a result, they also rely heavily on a virtual army of data specialists and scientists, working under the auspices of a centralized analytics group, to prepare, blend, analyze, and even report on the critical data they need for decision making. Download this new paper to get the details behind self-service data analytics, and how it lets business analysts: Take charge of the entire analytical process, instead of relying on other departments Overcome limitations of legacy tools to save time and prevent errors Make more comprehensive and insightful business decisions at speed
Tags : 
     Alteryx, Inc.
By: AMD     Published Date: Oct 08, 2012
Business agility be defined as a company's ability to respond to changes in business conditions quickly enough to benefit from them. To support business agility, IT managers generally want to be able to execute projects quickly and efficiently,
Tags : amd, business agility, cloud computing, cloud, data, data management, infrastructure, virtualization
     AMD
By: Anaplan     Published Date: Apr 06, 2016
A Harvard Business Review Analytics Services White Paper Finance is constantly tested to keep pace in today’s business environment. To keep up, planning needs to become a continuous process that spans departmental boundaries and enables managers to collectively realign resources to respond to market changes. Organizations must streamline disparate sales and operational planning with traditional financial planning and analysis by using technology to connect people, data, and processes across the organization. Download this white paper to discover the three steps to moving towards finance-led integrated business planning recommended by the Harvard Business Review.
Tags : analytics, planning, cfo, operations, business practices, revenue, growth, enterprise business
     Anaplan
By: APC by Schneider Electric     Published Date: Feb 09, 2011
In the broadening data center cost-saving and energy efficiency discussion, data center physical infrastructure preventive maintenance (PM) is sometimes neglected as an important tool for controlling TCO and downtime. PM is performed specifically to prevent faults from occurring. IT and facilities managers can improve systems uptime through a better understanding of PM best practices.
Tags : absolute, data protection, maitenance, ups, physical infrastructure, infrastructure, data loss protection, dlp
     APC by Schneider Electric
By: AppDynamics     Published Date: Aug 25, 2015
In collaboration with Enterprise Management Associates (EMA), AppDynamics has conducted a survey of application management professionals and managers to determine exactly what IT organizations want and need from APM providers. Here are some key findings from the research: • Only 30% of companies currently have application-specific solutions to monitor apps • 50% or fewer of the tools companies have purchased are actively being used to monitor apps • 27% of application-related problems are detected by monitoring tools • A “unified monitoring platform” is the top choice in a feature of an APM solution Download the full report to review the findings and understand the key challenges and “must haves” associated with APM solutions voiced by IT professionals themselves.
Tags : business technology, digital, customer service, efficiency, operations, infrastructure, business intelligence, business management
     AppDynamics
By: AppDynamics     Published Date: Nov 02, 2017
Microservices are a type of software architecture where large applications are made up of small, self-contained units working together through APIs that are not dependent on a specific language. Each service has a limited scope, concentrates on a particular task and is highly independent. This setup allows IT managers and developers to build systems in a modular way. In his book, “Building Microservices,” Sam Newman said microservices are small, focused components built to do a single thing very well.
Tags : 
     AppDynamics
By: AppZen     Published Date: Jul 17, 2019
Learn how Intuit’s CFO Melanie Gallagher used the findings from AppZen to save hundreds of thousands of dollars in T&E leakage. She went step further to join force with managers and Human Resources across the organization to create standardized policies relating to expense report conduct.
Tags : 
     AppZen
By: Arbor     Published Date: Sep 20, 2013
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Tags : distributed denial of services, ddos attack, ddos detection, ddos mitigation, security, advanced targeted attacks, mitigation, detection
     Arbor
By: Aruba Networks     Published Date: Sep 18, 2013
In this whitepaper Gartner explores smartphones and tablet devices, and their applications, which are increasingly at risk of malware. IT security planners and operations managers can thwart serious malware threats for the time being with these best practices. Read this whitepaper for more information.
Tags : smartphones, tablet devices, malware, best practices, security planners, risk, applications, technology
     Aruba Networks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics