data assets

Results 101 - 125 of 129Sort Results By: Published Date | Title | Company Name
Published By: Telx     Published Date: Dec 09, 2014
CIOs are on a constant quest to understand what infrastructure will provide the best fit, at the lowest risk and cost. In today’s evolving data center, defining the proper use of data center assets, and how cloud-based platforms may or may not fit into the mix is critical to business success. With the abundance of cloud offerings in the market place, physical infrastructure is no longer an enterprise IT requirement. Cloud has established itself as an excellent option for infrastructure outsourcing.
Tags : 
telx, data center, network architecture, infrastructure, storage, data center costs, power and cooling, energy
    
Telx
Published By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are essential, considering vulnerability data in a vacuum greatly limits your ability to prioritize your action plan in an effective way. Without the context of which vulnerabilities are the most severe, which are actively being targeted, which are on critical assets, etc, you may waste time checking things off the list without actually improving security. Join us for this session to learn how to integrate threat intelligence into your vulnerability management strategy.
Tags : 
alienvault, threat intelligence, vulnerability assessments, vulnerability data, security, it management, knowledge management
    
AlienVault
Published By: IBM     Published Date: Sep 10, 2013
This white paper will discuss how big data analytics, coupled with the right facilities and asset management software, can provide next-generation opportunities to improve facilities and asset management processes and reutnrs. It will examine how different organizations successfully use big data generated by their facilities and assets to help increase revenue, power operational efficiency, ensure service availability and mitigate risk. Most importantly, this white paper will reveal how your organization can leverage big data analytics to achieve similar benefits and transform the management of your organization's facilities and assets-and ultimately, your business.
Tags : 
big data, smarter infrastructures, big data, ibm, power operational, leverage big data, analytics, harnessing the power of data, security, enterprise applications, data management
    
IBM
Published By: AlienVault     Published Date: Oct 20, 2017
Maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be both difficult and expensive. For most small to medium sized organizations, it doesn’t have to be as long as you have the right plan and tools in place. In this paper you’ll learn five steps to implement and maintain PCI DSS compliance at your organization by: • Determining your true business requirements • Inventorying locations and assets • Segmenting environments • Operationalizing controls • Automating controls and control reporting Demonstrating compliance with PCI DSS is far from a trivial exercise. This checklist will help you on your quest to achieve and maintain PCI DSS compliance.
Tags : 
    
AlienVault
Published By: HP     Published Date: Jul 08, 2009
This guide provides a comprehensive look at a complete data protection and recovery solution, with valuable information to help you choose the solution that best fits your business requirements and budget, and get the assurance you need - knowing your assets are protected. Learn more today!
Tags : 
storageworks, disk to disk, d2d, data protection, recovery, server, rack, storage, roi, hp services, rdx removable disk backup, disaster recovery, dat tape, tape, tape library, capacity, lto, linear tape open, one-button disaster recovery, obdr
    
HP
Published By: Quocirca     Published Date: Apr 23, 2007
Information management, which includes both data and content management, is an essential building block for Service-Oriented Architecture (SOA).  By taking a service oriented approach to information, you can achieve much greater value from your information assets.
Tags : 
information management, service oriented architecture, service-oriented architecture, soa, data management, mdm, master data management, content management, content management system, information integration, quocirca
    
Quocirca
Published By: Quocirca     Published Date: Sep 07, 2007
Mid-sized organizations have similar issues to large organizations when it comes to the storage and management of information and data, yet they often have limited capability to attract, retain and maintain the skills that large organizations will use in managing their data assets.  There is a strong need for more effective tools that will enable mid-sized organizations to manage their data assets and gain the greatest value from them.
Tags : 
smb, smbs, storage, data management, information management, storage management, san, sans, storage area network, quocirca
    
Quocirca
Published By: Quocirca     Published Date: Jan 11, 2008
Small and medium-sized businesses (SMBs) can benefit from the expansive use of information technology (IT) just as much as their larger counterparts. Indeed, in many cases they have to, because to trade they need to interact with business partners of all sizes and IT failure affects not just internal users but those of third parties.
Tags : 
insight report, quocirca, smb, small business, soho, mid-sized business, smbs, data security, network security, small business it, it networks, securing data, networking, security, data management, database security
    
Quocirca
Published By: Quocirca     Published Date: Jul 03, 2008
Small and medium sized organizations have similar issues to large companies when it comes to the processing and storage of information and data, yet often have little capability to attract, retain and maintain the skills for managing their data assets compared to large organizations.  Blade systems offer an effective way to address the specific challenges faced by smaller organizations in managing their IT assets, and allows then to gain greater value from them.
Tags : 
storage, blade, blade systems, small business, smb, smbs, mid-sized business, quocirca
    
Quocirca
Published By: Quocirca     Published Date: Jan 13, 2009
Given today’s economic climate, businesses are, more than ever, looking to create additional value through the reduction of risk and by saving costs. For many, the economic downturn is seen as the best time to optimise the infrastructure that they already have in place, to look at ways to trim unnecessary expenditure and to use existing resources more effectively. As organisations are increasingly reliant on data networks that encompass an ever-growing range and number of internet protocol (IP) enabled devices and applications, they need to more effectively administer and manage these assets—they can no longer take the management of their IP networks for granted.
Tags : 
quocirca, ipam, dynamic host configuration protocol, domain name system, radio frequency identification, voice over ip, enterprise applications
    
Quocirca
Published By: Quocirca     Published Date: Dec 03, 2009
Taking steps towards meeting the legal challenge of carbon reduction within data centres in a sensible, cost effective and sustainable manner.
Tags : 
quocirca, carbon reduction management, data centre asset, energy saving incentive, roi, carbon footprint
    
Quocirca
Published By: Asentria Corporation     Published Date: Sep 04, 2007
More than ever before, IT managers need to secure equipment and facilities against a variety of intrusive conditions that could cripple critical operations, resulting in system malfunctions, loss of data or intellectual property, damage to mission critical hardware or even theft of valuable physical assets. Such conditions often include environmental events, failure of air conditioning systems, power outages, and untoward human actions.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: ZSL Inc.     Published Date: Jul 20, 2009
Organizations have implemented enterprise applications such as ERP and CRM for business process execution but have failed to address the key enterprise asset: data. In the current economic environment, enterprises that fail to capitalize on their data assets jeopardize their cost structures and their earnings potential. It is vital for organizations to leverage their data assets to measure their business performance, identify the weak poles and strategic improvement spots to scale their business to new heights. Business Intelligence (BI), the recent innovation in IT, has emerged to be a potential hope for the organizations to build a strong business milieu without any new asset investments and utilizing the existing key assets of the organizations.
Tags : 
business intelligence, zsl, erp, crm, enterprise application, enterprises, investments, business transformation, olap, dashboards, metrics, business monitoring, enterprise applications
    
ZSL Inc.
Published By: Enroute Networks     Published Date: Mar 23, 2011
A look at the data center choices available in today's business climate.
Tags : 
data center, cloud computing, cio, real estate assets, virtualization, infrastructure, design and facilities, power and cooling, green computing
    
Enroute Networks
Published By: Real Asset Management Inc.     Published Date: Jun 24, 2011
This white paper will identify the Top 7 issues which businesses using spreadsheets to manage their fixed asset data are failing to address.
Tags : 
real asset management, ram, spreadsheets, fixed assets control, fixed asset management system, corporate governance, data integrity, depreciation, audit trail, security, parent/child assets, asset splits, batch disposals, forecasting, multi-book capabilities
    
Real Asset Management Inc.
Published By: CDW     Published Date: Feb 27, 2015
The real test of any SAM system goes beyond creating a one-time Effective Licensing Position (ELP) for a given software publisher. To be truly valuable, the SAM solution has to have the ability to manage change. Being able to work from a dependable list of software that has been approved by, and which also serves the business, means that finite IT & SAM resources are not wasted through the support of legacy software that might be deemed redundant, and should keep a company on track technically by not becoming dependent on aging software. This 10 –Minute Guide from SAM experts at Snow Software will show how to establish and maintain a Software Catalog for the purpose of ensuring that your software estate remains relevant and fit for its business purpose.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management, snow, bank of ireland, assets, it management
    
CDW
Published By: CDW     Published Date: Feb 27, 2015
In a perfect world, managing the discovery of software assets, the capture of license entitlements and optimization of an organization’s software usage and compliance situation would be a single-click operation. Unfortunately, the world is not perfect and those charged with managing an organization’s software compliance, availability and expenditure face a number of challenges that can easily derail a Software Asset Management (SAM) program. This paper from the SAM experts at Snow Software investigates some of the major challenges facing SAM managers and IT executives and highlights how to build a successful strategy to overcome them, ensuring the SAM program delivers true value to the business.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management, snow, bank of ireland, assets, it management, business technology
    
CDW
Published By: HP and Intel ®     Published Date: May 02, 2013
It is very clear that datacenter managers need, in addition to server virtualization, the virtualization, pooling, and management of all the other resources that interoperate with their VMs. They require virtualized network interconnects and storage. They also need the tools to manage and automate these converged IT assets as an integrated datacenter system. This more agile system is the key to enabling the shift to a cloud-based infrastructure IT delivery model. Solution providers like HP are now addressing the need for more optimized and agile IT solutions. They are delivering virtualized storage, virtual application network (VAN) infrastructure, and the orchestration software to manage and automate all these ingredients as a single system. Read this whitepaper to learn more.
Tags : 
data center, virtualization, data center management, automation, agile, storage, van, virtual application network, infrastructure, cloud computing, infrastructure management
    
HP and Intel ®
Published By: IBM     Published Date: Aug 06, 2014
With IBM analytics for big data with a smart mobile strategy, banks can increase wallet share and assets under management while lowering the organization’s operating ratio by using more efficient channels.
Tags : 
ibm, banking, digital, data, big data, analytics, mobile
    
IBM
Published By: NetApp     Published Date: Mar 05, 2018
Disaster recovery (DR) from remote sites with dedicated servers, storage, and networking gear has long been a best practice for mission-critical applications. However, other applications and data have often gone unprotected due to the costs required for redundant DR assets that are seldom, if ever, utilized. The ability to move DR to the cloud has changed the picture and enabled IT organizations to build more robust DR strategies than had been possible in the past.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: CA Technologies     Published Date: Apr 06, 2017
A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solutions that are available to deal with these issues. It compares their technology, the market position each vendor has achieved, their ability to execute, and the overall maturity of each offering.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Within any organization, the most dangerous users are those with privileged access to the company’s most valuable and sensitive data assets. This includes systems administrators, business managers, partners, suppliers, and service providers, and also takes into account the automated interactions between business machines, systems, and applications. Privileged access has always been a high-risk issue, but for too long, organizations have not understood or have chosen to ignore the risks, preferring instead to rely on the integrity of the individuals and systems involved. A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solution
Tags : 
    
CA Technologies
Published By: IBM     Published Date: Oct 26, 2017
Threats to your digital assets are everywhere. They’re constant. So you build defenses to keep them out. But like a carpenter framing a new addition to a house, you want to regularly step back from working on the details for a full view of your work. Do the enterprise security measures you’ve built do a complete job of protecting against intrusions? Or have you left any gaps that allow bad actors an easy way in? When you check all the possibilities, you might be surprised.
Tags : 
data protection, sensitive data, data security, identity governance, digital assets
    
IBM
Published By: CrowdStrike     Published Date: Aug 01, 2017
The frequency of “mega breaches” continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. This report asserts that many such breaches could be prevented by deploying next-generation endpoint protection technology in concert with an aggressive proactive hunting strategy. This potent combination provides the most effective means to reduce attack surfaces and defend against advanced adversaries.Download the white paper to:?Learn how a proactive hunting strategy protects valuable data assets from a potential mega breach?Get a detailed analysis of how highly skilled human hunters pair with technology to aggressively seek out threat behaviors?Understand why integrating CrowdStrike Falcon Overwatch into an organization’s existing security resources offers the most comprehensive protection against persistent and skilled adversaries?Fi
Tags : 
    
CrowdStrike
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept