Skip to main content
 

operational management

Results 1 - 25 of 162Sort Results By: Published Date | Title | Company Name
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Multinational companies (MNCs) are facing a unique combination of escalating customer, competitive and operational pressures which are forcing them to fundamentally change the way they do business and manage their IT infrastructures supporting network, security and mobility needs. Lack of IT resources, limited capex and more complex global implementations are driving an increasing proportion of MNCs to offload, or 'out-task', various aspects of their day-to-day management responsibilities to skilled third-parties that can help perform these functions well.
Tags : 
health, global management service, cloud services, technology
    
Virtela Communications, Inc.
Published By: Recorded Future     Published Date: Feb 13, 2019
There are plenty of misconceptions about what threat intelligence is. The most common (but slightly misguided) assumptions risk leading many security pros to believe that threat intelligence doesn’t have an advantage to bring into their particular role. In this white paper, explore how threat intelligence can be operationalized in a variety of roles, demonstrating the central part it can play in a proactive security strategy. You’ll also uncover: • Key threat intelligence attributes to power vulnerability management • 4 major challenges for incident response teams • 3 threat intelligent commandments • 4 pain points identified by security leaders And more
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Feb 13, 2019
There are plenty of misconceptions about what threat intelligence is. The most common (but slightly misguided) assumptions risk leading many security pros to believe that threat intelligence doesn’t have an advantage to bring into their particular role. In this white paper, explore how threat intelligence can be operationalized in a variety of roles, demonstrating the central part it can play in a proactive security strategy. You’ll also uncover: • Key threat intelligence attributes to power vulnerability management • 4 major challenges for incident response teams • 3 threat intelligent commandments • 4 pain points identified by security leaders And more
Tags : 
    
Recorded Future
Published By: Viavi Solutions     Published Date: Feb 19, 2019
Network performance management tools can drive operational efficiency and improve network uptime, but many network managers haven’t adopted such tools. The potential benefits of a performance management tool are substantial, but network managers must make a business case for such investment. This white paper reveals why network operations teams should invest in network performance management solutions, and how they can justify to IT management and CIOs that the tool will deliver a substantial return on investment, along with improving IT’s ability to support business goals.
Tags : 
    
Viavi Solutions
Published By: VMware     Published Date: Feb 24, 2017
The pace of business is faster than ever before. Due to the rapid adoption of cloud and mobile computing, driven by consumerization, operational needs, and security requirements, ESG believes that Identity and Access Management (IAM) is undergoing a profound transition. Download this ESG whitepaper to learn why organizations should combine Identity and Access Management (IAM) and Enterprise Mobility Management (EMM) solutions to adapt to the influx of workforce mobility without interfering with user experience or compromising security.
Tags : 
    
VMware
Published By: Dell EMC     Published Date: Nov 04, 2016
According to recent ESG research, 70% of IT respondents indicated they plan to invest in HCI over the next 24 months. IT planners are increasingly turning toward HyperConverged Infrastructure (HCI) solutions to simplify and speed up infrastructure deployments, ease day-to-day operational management, reduce costs, and increase IT speed and agility. HCI consists of a nodal-based architecture whereby all the required virtualized compute, storage, and networking assets are self-contained inside individual nodes. These nodes are, in effect, discrete virtualized computing resources “in a box.” However, they are typically grouped together to provide resiliency, high performance, and flexible resource pooling. And since HCI appliances can scale out to large configurations over time, these systems can provide businesses with investment protection and a simpler, more agile, and cost-effective way to deploy virtualized computing infrastructure. Read this paper to learn more.
Tags : 
data, software-defined, hyper-convergence, hdd, sddc
    
Dell EMC
Published By: Dell EMC     Published Date: Oct 08, 2015
Download this whitepaper to learn more about how to capture, analyze and manage a tidal wave of structured and unstructured data, turn this data into operational intelligence, And how to overcome the limitations of databases and data management tools that weren’t designed for a world of big data with Dell.
Tags : 
    
Dell EMC
Published By: ExtraHop     Published Date: Apr 03, 2013
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers. Get yours today!
Tags : 
it operational intelligence, application performance management, application performance monitoring, application monitoring, network performance management, network performance monitoring, network monitoring, infrastructure performance monitoring, network monitoring, infrastructure performance monitoring, infrastructure monitoring, business transaction management, end-user experience monitoring, end-user monitoring, real-user monitoring, operations analytics, cloud performance monitoring, web performance monitoring, database performance monitoring, citrix performance monitoring
    
ExtraHop
Published By: Canon Business Process Services     Published Date: Aug 27, 2013
Be confident that you are measurably improving operational efficiency and reducing costs for your business by initiating a best-practices document performance management system with proven methodologies and tools
Tags : 
records management, records management compliance, records retention, records retention schedule, electronic documents, electronic records management, document imaging, document and print management, document management services, managed print services, document processing center, document workflows, business management, business imaging
    
Canon Business Process Services
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged credentials have served as a major attack vector in the successful execution of many breaches. Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. CA Privileged Access Management helps drive IT security and compliance risk reduction and improves operational efficiency by enabling privileged access defense in depth—providing broad and consistent protection of sensitive administrative credentials, management of privileged identity access and control of administrator activity.
Tags : 
it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits, user authentication
    
CA Technologies
Published By: IBM     Published Date: Feb 23, 2012
Built on IBM's market-leading business rules management system and enhanced with capabilities for detecting time-based events, this offering drives more responsive actions to business opportunities or risk conditions, increasing the value of each customer, partner and internal interaction.
Tags : 
ibm, technology, information technology, it management, data management, data center
    
IBM
Published By: Microsoft     Published Date: Oct 06, 2017
After rapid expansion of vendors and features, players in the operational DBMS market continue converging toward feature parity. Data and analytics leaders will be interested in the lack of Visionaries, competition in the Challengers quadrant and the maturing cloud capabilities among these vendors.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Microsoft
Published By: CA Technologies     Published Date: Aug 21, 2017
To manage IT like a business, you need tools to proactively ensure IT service reliability while simultaneously boosting operational agility. This requires a new approach to IT infrastructure management, including the selection of an infrastructure management vendor that can meet modern IT and business requirements.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 21, 2017
To manage IT like a business, you need tools to proactively ensure IT service reliability while simultaneously boosting operational agility. This requires a new approach to IT infrastructure management, including the selection of an infrastructure management vendor that can meet modern IT and business requirements.
Tags : 
    
CA Technologies
Published By: IBM     Published Date: Jul 26, 2017
To compete in today’s fast-paced business climate, enterprises need accurate and frequent sales and customer reports to make real-time operational decisions about pricing, merchandising and inventory management. They also require greater agility to respond to business events as they happen, and more visibility into business activities so information and systems are optimized for peak efficiency and performance. By making use of data capture and business intelligence to integrate and apply data across the enterprise, organizations can capitalize on emerging opportunities and build a competitive advantage. The IBM® data replication portfolio is designed to address these issues through a highly flexible one-stop shop for high-volume, robust, secure information replication across heterogeneous data stores. The portfolio leverages real-time data replication to support high availability, database migration, application consolidation, dynamic warehousing, master data management (MDM), service
Tags : 
ibm, infosphere, data replication, security, data storage
    
IBM
Published By: New Relic     Published Date: Apr 07, 2015
It’s all too easy for CIOs and technology management to build a strategy around any new technology area that is focused on delivering lower technology costs and greater operational efficiency. However, to get your cloud strategy right, you have to learn to move away from measuring the success of change against technology management care-abouts and focus on the priorities of the business. Forrester’s Business Technographics® surveys show a stark disconnect between technology management’s and the business’ desired outcomes from cloud computing; embracing the shift to cloud services means driving and measuring its success against metrics defined by the business before those of IT. This report outlines the strategic plan of Forrester’s solution for CIOs working on cloud computing. This report is designed to help you onboard the business to your cloud strategy.
Tags : 
    
New Relic
Published By: Oracle     Published Date: Sep 13, 2017
5 Ways to Boost Growth By Improving the Finance Team’s Effectiveness
Tags : 
operational agility, innovation, risk management, decision making, finance, smb growth
    
Oracle
Published By: Lenovo     Published Date: Jul 07, 2015
Lenovo® Flex System™ — powered by Intel® Xeon® processors — is the newest blade infrastructure design with the attributes that support soft ware-defi ned infrastructure and virtualization better than any competitor. It delivers key benefits better than any competitor: • Reduces capital and operational costs with consistent hardware/software deployment and the ability to simply scale workloads with the highest VM capacity and performance. • Increases agility with simplified rapid deployment and ongoing management to add, change, or move workloads with their associated resources. • Improves efficiency and increases space, power, and cooling with the leading compute, storage, and network density. Download Now! Sponsored by Lenovo® and Intel®"
Tags : 
lenovo, flex system, network density, operational costs, software deployment
    
Lenovo
Published By: CA Technologies     Published Date: Jul 20, 2017
e-book which lays out the case for machine learning and artificial intelligence for mainframe operational analytics. The mainframe is now part of a highly complex connected ecosystem driving trillions of mobile and web transactions critical to the functioning of the application economy. The emergence of new workloads and apps on the mainframe means that the status quo isn’t enough when it comes to Mainframe management. IT professionals alone – whether mainframe skilled or not – simply can’t keep up with the onslaught of performance alerts, false alarms. Machine learning deliver mainframe intelligence a more proactive and automated approach to handle this challenge.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Privileged credentials have served as a major attack vector in the successful execution of many breaches. Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. CA Privileged Access Management helps drive IT security and compliance risk reduction and improves operational efficiency by enabling privileged access defense in depth—providing broad and consistent protection of sensitive administrative credentials, management of privileged identity access and control of administrator activity.
Tags : 
    
CA Technologies
Published By: Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017     Published Date: Jul 12, 2017
Good supply chain management is essential to your operational efficiency, customer centricity, compliance, carbon footprint, and ultimately, your overall success. If handled correctly, your supply chain should improve customer service—along with the reputation of your brand—and boost your bottom line. But, as with many areas of business, the rules of the game are changing. What’s changing? Well, everything. New regulations, increased buyer expectations, shorter product lifecycles, fluctuations in demand, new market entrants, more ethical supplier management, poor visibility of globalized supply chains—all these things, and more, are testing the limits of the traditional supply chain model. The simple truth is that the way things used to be done, and the solutions that enabled it, are no longer up to the job.
Tags : 
cloud, supply chain management, scm, cloud computing
    
Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017
Published By: Elementum     Published Date: Sep 03, 2018
While everyone is scrambling to make sure their income statements reflect a profitable year by squeezing procurement costs, it’s actually the balance sheet that tells the full story of long term financial health.
Tags : 
elementum, operational costs, supply chain, balance sheet, bottom line, financial management, business management, inventory
    
Elementum
Published By: Taleo     Published Date: Mar 10, 2011
Finding talented candidates can be challenging. Automating recruiting can improve candidate quality and increase efficiency. This paper outlines how to reduce time to hire by 50%, reduce cost per hire by 70%, and hire quality people.
Tags : 
recruiting costs, operational costs, savings, talent management, saas, best practices, recruitment
    
Taleo
Published By: RSA Security     Published Date: Nov 18, 2013
This paper will explain how to achieve a balance between risk and business agility through a comprehensive approach to Operational Risk Management.
Tags : 
archer, rsa, operational risk, security, technology, business agility, comprehensive approach
    
RSA Security
Published By: McAfee     Published Date: Sep 15, 2014
The need for robust network security is growing, but IT security teams, resources, and budgets are shrinking at many organizations. That doesn’t mean you have to scale down your growth or skimp on key IT security areas, but it does mean you need to optimize your resources, starting with your network firewall team. Resource optimization involves the automation and streamlining of operational processes and management workflows so that your IT team members can be freed up to focus their time, skills, and expertise on priority projects. Furthermore, optimizing your resources helps preserve your budget while eliminating budgetary conflicts and slashing administrative costs.
Tags : 
network security, it security, firewall, resource optimization, security management
    
McAfee
Start   Previous   1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.