infrastructure management

Results 176 - 200 of 655Sort Results By: Published Date | Title | Company Name
Published By: Sungard Availability Services     Published Date: Sep 23, 2016
Digital transformation-using digital technologies to change and accelerate everything we do-has generated a deluge of new digital tools.
Tags : 
digital transformation, digital technologies, digital tools, it infrastructure, it management
    
Sungard Availability Services
Published By: Sungard Availability Services     Published Date: Sep 23, 2016
Challenging to control, prone to outbursts of disruption - but, ultimately, a powerful force that when hamessed correctly, can be game changing for any organization.
Tags : 
digital tools, digital transformation, it management, it infrastructure, infrastructure, employee management
    
Sungard Availability Services
Published By: HP Inc.     Published Date: Mar 04, 2016
IT complexity leads to wasted effort, time, or expense. Drive up productivity with HP ProLiant Gen9 servers for small and midsize businesses to simplify your infrastructure, resulting in better performance and scalability with easier management.
Tags : 
    
HP Inc.
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
Au cours de ces dernières années, la gestion des accès à forts privilèges, un processus englobant différentes fonctionnalités de contrôle, de supervision et d’audit visant à réduire les risques associés aux utilisateurs, aux comptes et aux identifiants à forts privilèges, est devenue une priorité majeure pour les entreprises et organisations de tous secteurs. Cet intérêt accru est motivé par différents facteurs.
Tags : 
identification à forts privilèges, activités à forts privilèges, sécurité, entreprise, violations de données, menaces internes, infrastructure de l’entreprise, privileged user access, privileged access management, security, privileged credentials, secure it
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 23, 2017
Les organisations engagées dans un processus de transformation numérique sont davantage préoccupées par des questions liées au risque et à la sécurité, ce qui n’a rien de surprenant. Les initiatives de transformation numérique entraînent inévitablement une augmentation du nombre de points d’accès à l’infrastructure de l’entreprise qui se situent en dehors des contrôles existants et sont accessibles par des identités plus nombreuses et plus variées qui prolifèrent à l’intérieur d’une infrastructure distribuée et dynamique.
Tags : 
identification à forts privilèges, activités à forts privilèges, sécurité, entreprise, violations de données, menaces internes, infrastructure de l’entreprise, privileged user access, privileged access management, security, privileged credentials, secure it
    
CA Technologies EMEA
Published By: IBM     Published Date: Oct 26, 2017
Web applications are often the most vulnerable part of a company’s infrastructure and yet are typically given direct paths to the internet, thus leaving these vulnerabilities exposed. IBM commissioned Tolly to evaluate IBM Security Access Manager for its Web protection effectiveness and performance as well as its identity federation, risk management and mobile one-time password capabilities. Tolly found that IBM Security Access Manager provided effective, high-performance threat protection while conveniently providing identity federation features and flexible risk-based access options.
Tags : 
access manager, identity federation, risk management, authentication capabilities, threat protection
    
IBM
Published By: NetApp     Published Date: Feb 22, 2010
This paper addresses the many Exchange, SQL Server, and SharePoint implementations running on inefficient storage infrastructures, limiting scalability and complicating what should be fairly simple storage management tasks.
Tags : 
netapp, storage efficiency, microsoft application environment, exchange, sql server, sharepoint, storage management, tco, server virtualization, server operating system, data protection
    
NetApp
Published By: Avocent     Published Date: Aug 22, 2011
By enabling services for controlling access to the infrastructure and monitoring for activity, management decisions can be made to improve data center services.
Tags : 
avocent, data center services, infrastructure, ema, data center operations control, controlled data center infrastructure, data center
    
Avocent
Published By: CDW     Published Date: Nov 12, 2012
This white paper will explain DCIM as well as provide technology advice on teh tools and practices for its implementation and use, and how to take advantage of DCIM to improve energy efficiency and effectiveness in the data center.
Tags : 
data center, infrastructure, business technology
    
CDW
Published By: CDW     Published Date: Nov 12, 2012
Data center priorities have been consistent for some time: Improve efficiency, increase uptime and meet compliance regulations are IT mantras.
Tags : 
data centers, infrastructure, it infrastructure, data center convergence, business technology
    
CDW
Published By: Dell Software     Published Date: Oct 03, 2013
Download Transaction-Centric vs. Infrastructure Centric Application Performance Management from TRAC Research to examine the major differences between the two approaches, the pros and cons of both in difference use cases, and finally which technology better fits your organization.
Tags : 
transaction, dell foglight, apm, infrastructure, technology, application performance management, best practices, knowledge management, enterprise applications, data management
    
Dell Software
Published By: ServiceNow     Published Date: Nov 22, 2013
An effective service catalog enables IT to deliver business services that are more customer and service focused, which results in higher customer satisfaction, provides standardization and consistency and increases IT visibility across the organization.
Tags : 
servicenow, enterprise it, boost visibility, business value, service catalog, service management, infrastructure library, budget effectiveness, customer-focused services, business critical asset, customer requirements, service level management, it management
    
ServiceNow
Published By: AppDynamics     Published Date: Aug 25, 2015
In collaboration with Enterprise Management Associates (EMA), AppDynamics has conducted a survey of application management professionals and managers to determine exactly what IT organizations want and need from APM providers. Here are some key findings from the research: • Only 30% of companies currently have application-specific solutions to monitor apps • 50% or fewer of the tools companies have purchased are actively being used to monitor apps • 27% of application-related problems are detected by monitoring tools • A “unified monitoring platform” is the top choice in a feature of an APM solution Download the full report to review the findings and understand the key challenges and “must haves” associated with APM solutions voiced by IT professionals themselves.
Tags : 
business technology, digital, customer service, efficiency, operations, infrastructure, business intelligence, business management, productivity
    
AppDynamics
Published By: Dell EMC     Published Date: Aug 04, 2015
Understand how Vidant Health System transforms health IT strategy and accelerates meaningful use of Epic EHR with EMC XtremIO
Tags : 
vidant health system, multiple emc solutions, business operations, it storage infrastructure, storage transformation, it initiatives, storage management
    
Dell EMC
Published By: VMware AirWatch     Published Date: Feb 21, 2017
"Mobile and cloud deployment issues are dominating the concerns of organizations today. End-user mobility and flexibility versus IT control and visibility are the opposing requirements challenging even the most nimble of environments. Organizations are searching for several key capabilities to address this dichotomy: • Infrastructure that is optimized for end users to drive down costs, simplify acquisition, upgrade easily, and support policy management • Flexibility in delivering workspaces to users—on-premises, cloud, and offline—all within a unified workspace with single sign-on • Management capabilities encompassing the entire ecosystem and providing security, compliance, and management of day-to-day end-user environments Download this asset to learn how VMware addresses these needs more effectively than Citrix with the VMware mobile-cloud architect."
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Feb 21, 2017
This white paper provides guidance for adding support for hosted applications and desktop sessions to your VMware Horizon infrastructure. Whether the goal is to integrate an existing RDS environment for combined management with VMware Horizon with View™ virtual desktops or deploy hosted applications or desktop sessions for the first time, Horizon provides the technology required and a simple path forward.
Tags : 
    
VMware AirWatch
Published By: Rackspace     Published Date: Mar 28, 2018
Many businesses want to realize the power of Google Cloud Platform (GCP) without having to incur the challenge and expense of managing it themselves. Some businesses lack the technical expertise or capacity to operate cloud infrastructure, tools and applications while others may have the ability but choose to maintain focus on their core business. Many larger businesses are on a multi-phased journey to the cloud, requiring transition and management services that can adapt to an evolving set of needs. Rackspace Managed Services for Google Cloud Platform is the answer for businesses facing these challenges. As Google’s first Premier Managed Services Partner, Rackspace blends technology and automation plus human expertise to deliver ongoing architecture, security and 24x7x365 operations backed by GCP-certified engineers and architects.
Tags : 
    
Rackspace
Published By: IBM Watson Health     Published Date: Nov 30, 2015
Download the whitepaper to learn more, including estimates of how much organizations can earn or save by creating an IT infrastructure for population health management.
Tags : 
ibm, watson health, phytel, finance, healthcare, value-based, health management, software development
    
IBM Watson Health
Published By: Splunk     Published Date: Sep 10, 2018
The financial services industry has unique challenges that often prevent it from achieving its strategic goals. The keys to solving these issues are hidden in machine data—the largest category of big data—which is both untapped and full of potential. Download this white paper to learn: *How organizations can answer critical questions that have been impeding business success *How the financial services industry can make great strides in security, compliance and IT *Common machine data sources in financial services firms
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk
Published By: Splunk     Published Date: Sep 10, 2018
collectd is an open source daemon that collects system and application performance metrics. With this data, collectd then has the ability to work alongside other tools to help identify trends, issues and relationships not easily observable. Read this e-book to get a deep dive into what collectd is and how you can begin incorporating it into your organization’s environment.
Tags : 
it event management, it event management tool, event logs, aiops platform, what is aiops, aiops vendor, market guide for aiops platforms, guide for aiops platforms, monitor end to end, itoa, aiops, predictive analysis, machine learning, event correlation, event management, it operations analytics, it analytics, ibm watson, hp monitoring, hp operations manager
    
Splunk
Published By: Splunk     Published Date: Sep 10, 2018
One of the biggest challenges IT ops teams face is the lack of visibility across its infrastructure — physical, virtual and in the cloud. Making things even more complex, any infrastructure monitoring solution needs to not only meet the IT team’s needs, but also the needs of other stakeholders including line of business (LOB) owners and application developers. For companies already using a monitoring platform like Splunk, monitoring blindspots arise from the need to prioritize across multiple departments. This report outlines a four-step approach for an effective IT operations monitoring (ITOM) strategy. Download this report to learn: How to reduce monitoring blind spots when creating an ITOM strategy How to address ITOM requirements across IT and non-IT groups Distinct layers across ITOM Potential functionality gaps with domain-specific products
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk
Published By: F5     Published Date: May 12, 2016
This white paper illustrates the benefits of implementing F5.
Tags : 
it infrastructure, infrastructure, security, application security management, security application
    
F5
Published By: F5     Published Date: May 12, 2016
This white paper reveals the results of implementing F5 were it provided intelligent and agile Infrastructure, highly available and secure application services and manage applications in the hybrid environment.
Tags : 
it infrastructure, infrastructure, security, application security management, security application
    
F5
Published By: Pure Storage     Published Date: Mar 15, 2018
Managing technology refreshes is not a popular task among enterprise storage administrators, although it is a necessary task for successful businesses. As a business evolves, managing more data and adding new applications in the process, enterprise storage infrastructure inevitably needs to grow in performance and capacity. Enterprise storage solutions have traditionally imposed limitations in terms of their ability to easily accommodate technology refreshes that keep infrastructure current and operating reliably and most cost effectively. In 2015, Pure Storage introduced a new technology refresh model that has driven strong change in the enterprise storage industry by addressing the major pain points of legacy models and provided overall a much more cost-effective life-cycle management approach. In conjunction with other aspects of Pure Storage's enterprise storage product and services offerings, the company's "Evergreen Storage" technology refresh model has contributed to this all-f
Tags : 
    
Pure Storage
Published By: Google Apigee     Published Date: Jun 08, 2018
A must-read for IT professionals that provides a comprehensive analysis of the API management marketplace and evaluates 22 vendors across 15 essential criteria. APIs are the de-facto standard for building and connecting modern applications. But securely delivering, managing and analyzing APIs, data and services, both inside and outside an organization, is complex. And it’s getting even more challenging as enterprise IT environments grow dependent on combinations of public, private and hybrid cloud infrastructures. Choosing the right APIs can be critical to a platform’s success. Likewise, full lifecycle API management can be a key ingredient in running a successful API-based program. Tools like Gartner’s Magic Quadrant for Full Life Cycle API Management help enterprises evaluate these platforms so they can find the right one to fit their strategy and planning. Apigee is pleased to offer you a complimentary copy of the Gartner report. Access in-depth evaluations of API managemen
Tags : 
    
Google Apigee
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.