downtime

Results 301 - 325 of 380Sort Results By: Published Date | Title | Company Name
Published By: uptime software     Published Date: Dec 06, 2007
You’ll learn what the 12 pitfalls of IT Systems Management really are, as well as the bridges you need to cross them. Learn what the big framework solutions don't want you to know, and why they might not be the answer for your IT Department. Learn to leverage what you have and your limited budget to get you the Systems Management tools and Solutions you need.
Tags : 
high availability, systems management, server management, network management, server, servers, it management, spending, cost, cost effective, agent, agentless, monitoring, uptime, uptime software, downtime
    
uptime software
Published By: Vision Solutions     Published Date: Dec 31, 2007
Downtime and data loss pose intolerable risks to every business today. From IT departments to the Board Room, managers have seen the importance of business uptime and data protection to continued success, productivity and profitability.
Tags : 
aix, data protection, continuous data protection, cdp, high availability, disaster recovery, disk backup, tape backup, recovery, backup, mimix, vision, vision solutions, platforms
    
Vision Solutions
Published By: VMware     Published Date: May 03, 2011
The VMware SMB Survey is designed to help small and midsize businesses understand the benefits their peers are achieving with virtualization.
Tags : 
vmware, virtualization, smbs, bc/dr, application availability, backup and data protection, downtime, disaster preparedness
    
VMware
Published By: Hewlett Packard Enterprise     Published Date: Aug 15, 2016
Download this white paper to learn more about these notable findings from IDC's study of HP DC Service customers. HP Datacenter Care Service can reduce the costs of delivering mission-critical business processes by 23%. HP's Datacenter Care Service solution is able to reduce downtime by 88%, adding five hours of uptime annually to each internal user and $835,000 in revenue to each organization. Increasingly, x86 servers will need a higher level of operational support. On average, companies in this study were able to recognize an average ROI of 456% and pay back the initial investment in HP DC Service in six months.
Tags : 
    
Hewlett Packard Enterprise
Published By: Red Hat     Published Date: Oct 23, 2014
The business case for standardizing on Red Hat infrastructure solutions Read this IDC whitepaper to discover the quantifiable business benefits that standardizing on Red Hat® infrastructure has delivered organizations like yours. You'll learn how customers using Red Hat Enterprise Linux® and Red Hat's system management product, Red Hat Satellite: • Quickly recover up-front subscription costs. • Experience higher ratios of servers and users per administrator. • Significantly reduce annual downtime.
Tags : 
quantifiable benefits, infrastructure, management product, higher ratios, reduce annual downtime, networking, it management, enterprise applications
    
Red Hat
Published By: HP - Intel® Xeon® processors     Published Date: May 06, 2013
This IDC white paper describes the challenges associated with managing the growing complexity of IT infrastructures, with a focus on support services for the enterprise. It highlights the important role of support services in maximizing system performance and minimizing downtime. The paper also examines the HP Insight Online, HP Insight Remote Support, and HP Proactive Care service offerings, specifically for HP ProLiant Gen8 servers featuring Intel Xeon technologies — including an analysis of the return on investment (ROI) from these programs for existing HP customers.
Tags : 
it infrastructure, roi, enterprise, performance management, downtime, remote support, support
    
HP - Intel® Xeon® processors
Published By: HP and Intel ®     Published Date: May 06, 2013
This IDC white paper describes the challenges associated with managing the growing complexity of IT infrastructures, with a focus on support services for the enterprise. It highlights the important role of support services in maximizing system performance and minimizing downtime. The paper also examines the HP Insight Online, HP Insight Remote Support, and HP Proactive Care service offerings, specifically for HP ProLiant Gen8 servers featuring Intel Xeon technologies — including an analysis of the return on investment (ROI) from these programs for existing HP customers.
Tags : 
it infrastructure, roi, enterprise, performance management, downtime, remote support, support, business technology
    
HP and Intel ®
Published By: IBM     Published Date: Oct 10, 2013
Today, your company's digital presence is your reputation and your brand. But websites and other IT assets are vulnerable to security breaches, downtime and data loss—all of which can negatively affect your reputation and competitive position. Read this paper, commissioned by IBM with leading analyst Forrester to learn how IT security decision makers across the globe are doing more with less by outsourcing key security tasks.
Tags : 
reputational risk, it outsourcing, it security, security, risk, security breach, digital presence, it assets, protection, safeguarding, outsourcing, risk management, data loss, data loss prevention, global it solutions
    
IBM
Published By: Akamai Technologies     Published Date: Nov 10, 2017
Ponemon Institute surveyed 569 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. According to respondents, these attacks cause costly application downtime, loss of customers, and involvement of IT security that can result in a cost of millions of dollars. The survey highlights the challenges in identifying who is accessing their websites using stolen credentials, as well as the difficulty in preventing and remediating these attacks.
Tags : 
poneman, credential stuffing, it security, damage mitigation, research report
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Shell     Published Date: Aug 15, 2018
While simple fixes may cost a few thousand dollars, lost revenue from equipment failures can run into the millions of dollars in lost productivity and replacement costs. There can be longer-term impacts, too, if the downtime inhibits a manufacturer’s ability to meet customer needs. That’s why it is important for companies to think about lubrication and equipment maintenance holistically, recognizing that short term cost savings may be leading to bigger, preventable expenses over the long term. Cheaper oil, for example, may save money initially, but it requires more frequent changes and provides less protection to the equipment, which could shorten component life. For many companies, the short-term savings simply aren’t worth the longterm cost risk. “Some companies don’t realize that they may be able to reduce their overall maintenance costs significantly by spending more up front on better quality lubricants,” Saffell says. “Their equipment may last longer and they are likely to see
Tags : 
cost, reduction, equipment, shell, manufacturing, maintenance, reliability, contamination control
    
Shell
Published By: Shell     Published Date: Aug 27, 2018
While simple fixes may cost a few thousand dollars, lost revenue from equipment failures can run into the millions of dollars in lost productivity and replacement costs. There can be longer-term impacts, too, if the downtime inhibits a manufacturer’s ability to meet customer needs. That’s why it is important for companies to think about lubrication and equipment maintenance holistically, recognizing that short term cost savings may be leading to bigger, preventable expenses over the long term. By adopting a total cost of ownership (TCO) program, companies can find efficiencies they didn’t even know existed and reap benefits they didn’t realize were possible. Download our white paper, “The Cost Reduction Game,” to learn more about how a TCO program can help increase equipment reliability, extend equipment life, and lower energy costs.
Tags : 
cost, reduction, equipment, shell, manufacturing, maintenance, reliability, contamination control
    
Shell
Published By: Avaya     Published Date: Mar 04, 2016
Avoid the high cost of network outages More than a third of all network outages could be avoided by using industry-leading outage prevention practices. And those practices are surprisingly simple to implement and sustain. Learn how to reduce costly downtime in this report >
Tags : 
network management, network secuirty, network optimization, prevention practices, networking
    
Avaya
Published By: Vision Solutions     Published Date: Dec 31, 2007
This white paper provides a basic understanding of the building blocks of IT and business continuity—from understanding the concepts of disaster recovery and information availability to calculating the business impact of downtime and selecting the right software solution.
Tags : 
disaster recovery, business continuity, disk backup, tape backup, data backup, data replication, disaster, high availability, uptime, maximizing uptime, downtime, minimizing downtime, vision, vision solutions, platforms
    
Vision Solutions
Published By: Carbonite     Published Date: Oct 05, 2017
Not long ago, the biggest concern for IT decision makers considering moving workloads to the cloud was security. That’s no longer the case. Today, the main obstacle to cloud adoption is different but familiar: the pain of migrating data. Traditional data migration causes major headaches: • Hours or days of downtime while servers replicate and stakeholders verify functionality • Data loss and migration failures due to inadequate tools and inability to test • Key internal resources diverted from strategic initiatives
Tags : 
data migration, cloud security, carbonite, data security, cloud platform, cloud adoption
    
Carbonite
Published By: IBM     Published Date: Oct 13, 2009
The disaster that seemed daunting in good economic times can be insurmountable when the economy takes a turn. This essential article outlines the "Five elements of business recovery," which can help you reduce the risk of lost revenue that downtime of any kind represents.
Tags : 
business recovery, data protection, networking, recovery plans, facilities, business continuity, ibm
    
IBM
Published By: Sage EMEA     Published Date: Jun 25, 2019
Digital transformation is now in the rearview for today’s top-performing manufacturers. Industry 4.0 is the next phase of the journey toward “perfect production,” where the aim is minimal downtime, neglect, waste, and inefficiency. Industry 4.0 is where factory managers, financial experts and executives use cutting-edge technology to understand data and production – reaching the pinnacle of technology and manufacturing development.
Tags : 
    
Sage EMEA
Published By: DigiCert     Published Date: Jun 19, 2018
Your organization’s websites are some of its most valuable assets. But they are vulnerable to security issues and criminal attacks. Fortunately, many of these problems are preventable with effective, integrated website security management. For ecommerce sites, you can calculate the cost of downtime in terms of lost revenue. You can add to this the considerable cost of remediation, and beyond this, the damage to customer confidence and trust that may be intangible but will be significant. Even when there are no security issues, inefficient processes result in deployment of additional resource that drives up cost. This article explains why in comparison to the above costs, investing in security management, particularly across SSL/TLS Certificate management, can be a highly efficient and cost effective measure to take.
Tags : 
    
DigiCert
Published By: Mimecast     Published Date: Oct 17, 2013
This white paper discusses the important issues related to email and Office 365 continuity and offers recommendations for decision makers to consider as they develop their continuity plans. The paper also provides a brief overview of Mimecast, the sponsor of this paper, as well as their relevant solutions.
Tags : 
mimecast, unified email management, osterman research, business continuity, office 265 environments, email reliability, email downtime prevention, growth of office 365, extensive use of email, primary file transport, content management systems, reduced employee productivity, extended productivity loss, it disruption, security management risks, content management risks
    
Mimecast
Published By: Mimecast     Published Date: May 15, 2014
A report into the downtime in email systems, its impacts and the relevant solutions.
Tags : 
email continuity, microsoft office 365, mimecast, continuity plans, email downtime
    
Mimecast
Published By: Mimecast     Published Date: Jun 22, 2015
Moving to an Office 365 environment can open the door to a wide range of business benefits. But what about continuity?
Tags : 
email continuity, microsoft office 365, mimecast, continuity plans, email downtime, business technology
    
Mimecast
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee