administrators

Results 151 - 175 of 194Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Feb 16, 2016
Data center administrators face a significant challenge: They need to secure the data center without compromising the performance and functionality that new data center environments enable.
Tags : 
data, business practices, data management, data security, software, applications
    
Cisco
Published By: Cisco     Published Date: Apr 04, 2016
This publication is for experienced network administrators who configure and maintain Cisco Mobility Express wireless network.
Tags : 
cisco systems, cisco mobility, mobility express network, conversion, master ap failover, networking, it management, wireless, enterprise applications, data management, business technology
    
Cisco
Published By: Symantec     Published Date: Aug 09, 2013
As virtualization-aware endpoint security solutions continue to evolve, more and more functionality is offloaded from a single VM to its supporting infrastructure in the form of Virtual Appliances (VA). In addition to considering the performance impact of this re- architecting, administrators must also ensure that the protection offered remains fully-functional, even in virtual environments. Learn More.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology, business technology
    
Symantec
Published By: Bitium     Published Date: Dec 09, 2013
As enterprises large and small shift their information to the cloud, an explosion of SaaS tools are making it easier than ever for employees to collaborate and innovate. Much of this sharing is being done across time zones and physical locations, by workers who are telecommuting, working in shared or public spaces, and from open networks. Information is stored on central, third-party servers that are accessible across the company and the world by anyone with an internet connection. As a result, online security is increasingly being pushed to the forefront as a major corporate expense. Yet, 89% of the global information workforce lack clarity on how security applies to the cloud. “Data is suddenly everywhere, and so are the number of people, access points and administrators who can control – or worse, copy – the data." Please download the white paper to learn more.
Tags : 
single sign on, sso, identity as a service, idaas, access and identity management, identity access management, password management, password manager, networking, it management, wireless, knowledge management, enterprise applications, business technology
    
Bitium
Published By: Cisco     Published Date: Dec 23, 2014
Read how cloud technologies can help IT team’s transition from tactical systems administrators to strategic service brokers. In doing so, they can redefine their roles, transform their relationships with business groups, and help move organizational priorities forward.
Tags : 
cloud, cloud computing, role of it, it relationships
    
Cisco
Published By: Hewlett-Packard Company     Published Date: May 15, 2014
Traditional server management and provisioning can create unnecessary burdens for many organizations. Information technology (IT) administrators in today’s business environments need a more streamlined process to manage servers throughout the IT life cycle, including tools to help them diagnose problems and procedures for efficiently resolving errors. This white paper provides an in-depth look at the key capabilities of HP Integrated Lights-Out (iLO) embedded in every ProLiant Gen8 server, the solution’s scalable licensing offerings, and mobile-app features that support IT staff—anywhere, anytime.
Tags : 
server management, ilo, proliant gen8 server, it management, enterprise applications
    
Hewlett-Packard Company
Published By: Bright Computing     Published Date: Mar 08, 2018
This insideHPC guide explores how a powerful scheduling and resource management solution can slot workloads into those idle clusters, thereby gaining maximum value from the hardware and software investment, and rewarding IT administrators with satisfied users.
Tags : 
bright computing, convergence, servers, resource management, hardware, clusters, workload management
    
Bright Computing
Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch
Published By: VMware     Published Date: Feb 24, 2017
Mobility, having permeated our cultural ethos, has subsequently transformed the enterprise. No longer considered a frill, its ripple effect on our workforce can be seen in the way IT handles security and productivity. As IT administrators catch up with their new responsibilities, enterprise mobility management (EMM) solutions flood the market. Explore key questions to ask on your EMM journey, including: - Does this EMM platform address my use case? - Does it support common platforms? - Does it control access to corporate resources? - And more
Tags : 
    
VMware
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
This white paper introduces many of the core services ADCs provide and explains how they benefit both users and application administrators
Tags : 
citrix, adc, applications
    
Citrix Systems, Inc.
Published By: LeftHand Networks, Inc.     Published Date: Jan 15, 2009
Today's Microsoft Exchange environment is growing exponentially.  This white paper explores several ways that administrators can spend less time on day to day Microsoft Exchange Management - all while planning future growth in the process.  Isn't it time to start reducing the stress of managing your exchange environment?
Tags : 
lefthand networks, microsoft exchange, microsoft exchange management, exchange environment, iscsi san
    
LeftHand Networks, Inc.
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Advances in attacks on network security over the last few years have led to many high-profile compromises of enterprise networks and breaches of data security. A new attack is threatening to expand the potential for attackers to compromise enterprise servers and the critical data on them. Solutions are available, and they will require action by company officers and administrators. “SSLStrip” and related attacks were among the highlights of the July 2009 Black Hat show in Las Vegas. Researcher Moxie Marlinspike combined a number of discrete problems, not all related to SSL, to create a credible scenario in which users attempting to work with secure websites were instead sent to malicious fake sites.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: AirDefense     Published Date: Apr 24, 2007
This white paper is designed to guide network administrators and security managers to design, implement, and enforce wireless LAN security policies that enable every organization to fully reap the benefits of wireless LANs without experiencing undue management pains and security holes.
Tags : 
sox, sarbox, sarbanes oxley, sarbanes-oxley, compliance, hipaa, wlan, wlans, wireless security, wireless lan, wireless lans, vulnerability management, security policy, security policies, airdefense
    
AirDefense
Published By: AppSense     Published Date: Aug 21, 2009
Learn how AppSense Application Manager enables IT Administrators to reliably and effectively enforce software licensing policies on client devices, and therefore gain greater control over the deployment of applications in a Windows Terminal Server environment.
Tags : 
windows server, application management, application, application performance management, windows server, windows terminal server, network management, software licensing, software license, compliance, appsense, it management
    
AppSense
Published By: Desktop Sites     Published Date: Aug 21, 2009
Konect is a powerful and cost-effective serverware solution for the growing application deployment and support demands placed on IT administrators in small and mid-size businesses.
Tags : 
application deployment, deploy applications, app deployment, serverware, konect, small business, smb, smbs, it spending, cost control, it management, it administrator, desktopsites, desktop sites
    
Desktop Sites
Published By: Roaring Penguin     Published Date: Aug 21, 2009
This white paper from Roaring Penguin Software reviews the most common approaches to spam management on higher education and K-12 campuses and details how a suitable anti spam solution must address particular challenges for campus IT administrators.
Tags : 
spam, antispam, anti-spam, university, universities, college, colleges, school, education, institution, dormitory, spam management, email security, roaring penguin
    
Roaring Penguin
Published By: Roaring Penguin     Published Date: Aug 21, 2009
This white paper from Roaring Penguin Software reviews the most common approaches to spam management and email filtering in an ISP environment and details how a suitable anti spam solution must address particular challenges for ISP administrators.
Tags : 
spam, anti-spam, antispam, blocking, filtering, email security, isp, spam management, roaring penguin
    
Roaring Penguin
Published By: Sanbolic     Published Date: Dec 03, 2007
Clustered volume manager enables administrators to centrally configure and assign storage assets in a SAN storage environment in Microsoft System Management Server 2003 and Microsoft Operations Manager 2005 environments.
Tags : 
windows, storage, san, nas, sanbolic
    
Sanbolic
Published By: XOsoft     Published Date: Aug 21, 2009
Traditional backup systems provide a critical layer of insurance, but they represent all-or-nothing strategies that do not cover the minute by minute daily data writes to the disk. Continuous data protection fills in this gap by capturing changes to data while users are working. In the event of a data interruption, administrators can automatically reconstitute the data in reverse order to a point before it was corrupted or lost.
Tags : 
disaster plan, disaster recovery, data protection, storage, backup and recovery, backup, recovery, prevent data loss, xosoft
    
XOsoft
Published By: Symantec     Published Date: Nov 02, 2006
IT administrators need to minimize downtime for critical IT services by rapidly recovering entire systems to dissimilar hardware platforms or virtual environments. Symantec Backup Exec System Recovery Server Edition combines the speed and reliability of disk-based, bare-metal Windows system recovery with dissimilar hardware restoration and lights-out operation.
Tags : 
backup, infrastructure, internetworking hardware, networking hardware, network management, high availability, windows server, server, backup and recovery, servers, symantec
    
Symantec
Published By: Indigo Rose Corporation     Published Date: Feb 14, 2007
TrueUpdate 2.0 is a comprehensive solution for software developers, network administrators and IT departments wanting to integrate automated update capabilities into their software applications and business processes. Read through a comprehensive list of features, and learn about the system requirements of TrueUpdate 2.0.
Tags : 
software development, networking, it management, indigo rose
    
Indigo Rose Corporation
Published By: GFI     Published Date: Jan 11, 2008
2008 brings with it new challenges and issues that network and systems administrators should be aware of, particularly vulnerabilities brought on by users. This white paper examines the top concerns which network security professionals should be prepared to face in 2008, and how they can be mitigated.
Tags : 
gfi, employees, employee vulnerability, vulnerability management, vulnerability, vulnerabilities, security concerns, internal threats, internal, spam, gullibility, security holes, human error, pebcac, network security, access control
    
GFI
Published By: Netwrix     Published Date: Apr 22, 2008
At the end of an academic year, many thousands of students may permanently leave a school or university system. Once these users graduate, discontinue their education, or perhaps simply move away, IT administrators are left with a huge number of accounts that must be marked as inactive and then dealt with according to system policies.
Tags : 
netwrix, graduate, graduation, education, college, university, school, inactive accounts, inactive account, password management, identity management, access control
    
Netwrix
Published By: Network Automation     Published Date: Oct 23, 2008
In good economic times, success simply means keeping pace. After all, the market is demanding your company’s products and services, and your responsibility is simple: keep up with the demand no matter what it takes. Most managers, whether they are business managers or technology managers respond to this situation the same way. They hire more people to shoulder the increased load. Sales managers seek out more sales reps. Foremen bring more assembly workers online. Customer service beefs up the call center. And IT managers hire more administrators to maintain the constant flux of demands from users, applications, systems, and networks.
Tags : 
network automation, business, process, automation, processes, tough economy, bad economy, workflow, process improvement, streamline it, strategies, networking
    
Network Automation
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee