it solutions

Results 3326 - 3350 of 3653Sort Results By: Published Date | Title | Company Name
Published By: BMC Control M     Published Date: Jul 16, 2009
Read "A Comprehensive Approach to Practicing ITIL Change Management" a compelling white paper from Enterprise Management Associates, to learn best practices for integrating your batch process automation and change management solutions.
Tags : 
ema, bmc, itil, change, management, enterprise, e-commerce, solution, result, effective, practice, cmdb, problem
    
BMC Control M
Published By: BMC Control M     Published Date: Jul 22, 2009
Read "A Comprehensive Approach to Practicing ITIL Change Management"; a compelling white paper from Enterprise Management Associates, to learn best practices for integrating your batch process automation and change management solutions
Tags : 
ema, bmc, itil, change, management, enterprise, e-commerce, solution, result, effective, practice, cmdb, problem
    
BMC Control M
Published By: BMC ESM     Published Date: Jul 17, 2009
Join us as we talk with Atwell Williams, Solutions Architect for the Office of the CTO at BMC Software. Get insights into where to start when building and managing a CMDB and find out how to define what "done" looks like. Learn whether a bottom-up or a top-down approach will work best for you, hear important tips for training your team, and get some great practical advice from one of BMC's experts.
Tags : 
bmc, software, cto, solutions architect, cmdb, project, team, organization, implementation, successful team, project management, stage 4, configuration management database, it management, data management
    
BMC ESM
Published By: BMC ESM     Published Date: Jul 17, 2009
Are you looking for new inspiration to move forward with ITIL in these tough economic times? Join us as we talk with Erin Casteel, Solutions Architect with BMC Software and draw on Erin's wealth of experience as an ITIL consultant for tips on leading change in the organization. Learn how you can avoid reinventing the wheel, what it really means to sell ITIL in the organization, and why it pays to find opportunities in crises.
Tags : 
itil, bmc, tough times, economy, organization, software, iso, architecture, change, crises, recession, cost cutting, strategy, itil adoption, it infrastructure library
    
BMC ESM
Published By: BMC ESM     Published Date: Jul 22, 2009
Join us as we talk with Atwell Williams, Solutions Architect for the Office of the CTO at BMC Software. Get insights into where to start when building and managing a CMDB and find out how to define what "done" looks like. Learn whether a bottom-up or a top-down approach will work best for you, hear important tips for training your team, and get some great practical advice from one of BMC's experts.
Tags : 
bmc, software, cto, solutions architect, cmdb, project, team, organization, implementation, successful team, project management, stage 4, configuration management database
    
BMC ESM
Published By: Virtela Communications, Inc.     Published Date: Nov 16, 2009
Faced with degrading network performance and the need to drive global expansion, Measurement Specialties partnered with Virtela to design, implement and manage a high-performance, multi-carrier MPLS network across all twelve of their global sites.
Tags : 
virtela, network performance, multi-carrier mpls network, original equipment manufacturers, point-to-point connections, network and security solutions
    
Virtela Communications, Inc.
Published By: Symantec.cloud     Published Date: Jan 26, 2011
Software-as-a-Service (SaaS) continues to gain traction over traditional on-premise software licensing models as organizations aggressively seek more cost-effective, flexible and robust computing solutions. This paper will help you understand and calculate the true costs of SaaS to determine what benefits this important resource-maximizing approach can offer your company now and in the future.
Tags : 
symantec cloud, saas, tco, roi, software-as-a-service, enterprise application software
    
Symantec.cloud
Published By: Focus     Published Date: Feb 09, 2011
Discover the primary vendor solutions and decision factors that must be considered when selecting a Unified Threat Management product to provide network defense.
Tags : 
    
Focus
Published By: Software Security Solutions     Published Date: Jun 28, 2010
Legacy Antivirus Software slowing you down? If you are ready to change, this white paper shows how to choose what's best!
Tags : 
software security, antivirus software, malware
    
Software Security Solutions
Published By: Software Security Solutions     Published Date: Jun 28, 2010
Ready to change Antivirus Software? Read this comparison white paper first!
Tags : 
software security, endpoint security, antivirus software, malware
    
Software Security Solutions
Published By: GoToWebinar     Published Date: Apr 06, 2011
In this eBook, Albee explores the critical role of an online content strategy in increasing the demand for your company's products and solutions.
Tags : 
online content, ardath albee, citrix gotowebinar, marketing content, lead generation
    
GoToWebinar
Published By: Polystar     Published Date: Aug 31, 2010
This article describes the problems of monitoring modern 10Gbps telecom networks and some of the solutions.
Tags : 
polystar, 10gbps, network monitoring
    
Polystar
Published By: Sybase     Published Date: Aug 31, 2010
This whitepaper outlines the new challenges 4G deployments bring to mobile operators and solutions designed to address these challenges.
Tags : 
advanced ip messaging server
    
Sybase
Published By: SalesNexus     Published Date: Sep 23, 2010
Small businesses often minimize the importance of advanced CRM features. It's tempting to select very basic, simple and inexpensive CRM solutions for your small business.
Tags : 
small business crm, web based crm, hosted crm, small business marketing, crm for small business
    
SalesNexus
Published By: e-DMZ Security LLC     Published Date: Sep 27, 2010
This white paper discusses key issues and offers innovative solutions to support granting access to production resources.
Tags : 
e-dmz security. emergency access, production access, access control, compliance, developer access, mission-critical, business-critical, datacenter security
    
e-DMZ Security LLC
Published By: Okta     Published Date: Jun 15, 2015
Microsoft made a massive push to the cloud in 2014, and as a result Office 365 is taking off. Were seeing it in how Okta customers are using Okta to connect to Office 365 in increasing numbers. This eGuide provides some data from the Okta Application Network on the trends we are seeing around Office 365. It also describes the most important things to consider for Identity and Mobility Management during deployment. Office 365 is unlike any other cloud app in its complexity, and it is best for IT to plan and deploy solutions around Identity and Mobility Management in concert with their Office 365 roll-out to get maximum user adoption.
Tags : 
office 365, identity and mobility management, deployment, user adoption, adoption guide, it management
    
Okta
Published By: Okta     Published Date: Jul 01, 2015
Microsoft made a massive push to the cloud in 2014, and as a result Office 365 is taking off. Were seeing it in how Okta customers are using Okta to connect to Office 365 in increasing numbers. This eGuide provides some data from the Okta Application Network on the trends we are seeing around Office 365. It also describes the most important things to consider for Identity and Mobility Management during deployment. Office 365 is unlike any other cloud app in its complexity, and it is best for IT to plan and deploy solutions around Identity and Mobility Management in concert with their Office 365 roll-out to get maximum user adoption.
Tags : 
    
Okta
Published By: vcopious     Published Date: Oct 01, 2010
This paper analyzes the current scenario facing IT departments, where they must focus on maximizing their return from existing IT investments, while also leveraging the best solutions available via a SaaS model.
Tags : 
saas, on-premise, cloud, computing, platform, platforms, virtual
    
vcopious
Published By: VMware     Published Date: May 02, 2011
The cost of downtime and/or lost data can be devastating. For this reason, business continuity and disaster recovery (BC/DR) is becoming a critical mandate. Virtualization can keep your business running through many types of planned and unplanned IT outages. Download this white paper to learn more.
Tags : 
smb, vmware, virtualization, business continuity, disaster re vsphere, downtime, it failure, vms, it managementcovery, bc/dr planning solutions, high availability, taneja group
    
VMware
Published By: Perimeter E-Security     Published Date: Oct 21, 2010
Read our guide to learn more about the popular malware methods cyber criminals are using to compromise internal systems.
Tags : 
malware, malicious website, firewalls, ids/ips, web content filtering, gateway av, network security solutions, host-based ips, mission critical systems, system av, patch management, policy management, layered security, end user security awareness training, strong policies, audited procedures
    
Perimeter E-Security
Published By: iCims     Published Date: Jan 17, 2013
iCIMS has compiled the Top 13 HR Tips for 2013 in order to assist your team in achieving smart, successful recruitment in the upcoming year. Download this educational document now to get a jump-start on updating your recruitment goals.
Tags : 
social recruiting, human resources, recruiting, icims, hr solutions
    
iCims
Published By: iCims     Published Date: Jan 17, 2013
Are you interested in growing your passive talent pools? Bring potential candidates in through a fully branded Social Connect Portal.
Tags : 
recruiting, recruiting solutions, social recruiting, human resources, talent management
    
iCims
Published By: CSC     Published Date: Oct 25, 2010
The whitepaper provides a means to visualize the complexity of cybersecuirty and a way to achieve effective solutions.
Tags : 
cybersecurity, model of cybersecurity, security architecture, cyber, cybersecurity methodology, ict, security integration
    
CSC
Published By: Revinetix, Inc.     Published Date: Nov 12, 2010
Juan Diego Catholic High School, with 500+ networked Apple Mac computers, needed to replace their poor performing tape backup system. They evaluated disk backup appliance solutions and select the Revinetix Sentio.
Tags : 
revinetix, disk backup, tape backup, backup appliance, deduplication, education, netwotk backup, backup solutions, school district, mac backup, apple backup, mac network
    
Revinetix, Inc.
Start   Previous    127 128 129 130 131 132 133 134 135 136 137 138 139 140 141    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.