Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

flexible

Results 326 - 350 of 684Sort Results By: Published Date | Title | Company Name
Published By: HP     Published Date: Jul 29, 2008
This white paper describes critical steps IT executives must take to prepare for change and manage an ITSM implementation to maximize its value and ensure that it achieves the full transformation effect it is capable of delivering. IT Service Management (ITSM) is a proven and effective framework for helping IT organizations become more adaptive, flexible, cost effective, and service oriented.
Tags : 
itsm, it service management, service management, itil, mission critical, change management, it management
    
HP
Published By: HP     Published Date: Jul 29, 2008
This white paper explores the advantages of Operational ITSM- through incremental and continual improvement of service management practices on an ongoing basis. IT organizations must evolve into trusted service providers that adapt quickly, offer cost-effective, reliable, and flexible services to meet today's business initiatives. This evolution is not easy. It requires that the IT organization adopt an IT Service Management (ITSM) framework. Operational ITSM provides an incremental approach for companies that may not have the resources to finance and staff a large ITSM project.
Tags : 
itsm, service management, service level, service-level, itil, mission critical, it management
    
HP
Published By: Entrust Datacard     Published Date: May 15, 2014
Entrust IdentityGuard Cloud Services PKI establishes and manages certificate-based security across an organization through a reliable, customizable and flexible hosted public key infrastructure (PKI). Entrust’s cloud-based PKI service eliminates up-front capital investment and significantly reduces on-going operation cost associated with in-house PKI software, provides built-in maintenance capabilities and speeds deployment time.
Tags : 
entrust, identityguard, pki, certificate based security, security, pki software, cloud, networking, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
Entrust IdentityGuard Cloud Services PKI establishes and manages certificate-based security across an organization through a reliable, customizable and flexible hosted public key infrastructure (PKI).
Tags : 
identity guard, cloud services, pki, secure, mobile identities, devices, security
    
Entrust Datacard
Published By: F5 Networks Inc     Published Date: Jul 08, 2009
iControl provides the means by which F5's BIG-IP platform can be automated, integrated, and flexible such that it can adapt in real-time to changing network and application infrastructure conditions inside and outside the data center. Whether you are building out a new infrastructure or adapting to new technology, using iControl can enable unprecedented levels of control over and visibility into the application delivery process.
Tags : 
enhancement, feature, big-ip, application delivery controller, adaptable, dynamic, device, system, version, management, solution, security, it management, wireless, local area networking
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jul 08, 2009
iControl provides the means by which F5's BIG-IP platform can be automated, integrated, and flexible such that it can adapt in real-time to changing network and application infrastructure conditions inside and outside the data center. Whether you are building out a new infrastructure or adapting to new technology, using iControl can enable unprecedented levels of control over and visibility into the application delivery process.
Tags : 
icontrol, big-ip, application, technology, infrastructure, control, device, system, network, data center, networking, it management, data center design and management
    
F5 Networks Inc
Published By: Dell-Intel     Published Date: Oct 30, 2008
Dell servers have been optimized to help provide strong support for the latest ESX release, VMware ESX 3.5 Update 2, including enhanced performance for virtualized environments based on support for six-core Intel Xeon processors. Organizations that do not approach server virtualization with a clear plan risk developing a chaotic, inflexible infrastructure that wastes energy and resources.
Tags : 
hyper v, dell, intel, it infrastructure, virtualization, server virtualization, esx, tco, total cost of ownership, flexible computing solutions, performance and resource optimization, pro, internet scsi, iscsi, nfs, virtualized, server hardware, servers, data center design and management
    
Dell-Intel
Published By: Symantec.cloud     Published Date: May 11, 2012
Powerful backup and flexible deployment options, including enhanced software, backup appliances, and backup solutions in the cloud, offer flexibility and choice in how you manage backup, allowing you to deploy a modern infrastructure that best suits your IT requirements, business needs, and environment. But how do you know which backup strategy is right for your business? Read this whitepaper to better understand which deployment option could best suit your needs.
Tags : 
symantec, cloud, computing, technology, recovery, backup, solutions
    
Symantec.cloud
Published By: PC Mall     Published Date: Aug 12, 2011
This white paper examines the powerful new features of Microsoft Exchange 2010 and the flexible hosting options that are available through PC Mall Inc
Tags : 
email, exchange, communications, microsoft, mobile communications, collaboration, outlook, pc mall, cloud computing, cloud services, hosted exchange, networking, data center
    
PC Mall
Published By: PC Mall     Published Date: Oct 12, 2011
HP Mobility Traffic Manager enables flexible WLAN traffic distribution models to address diverse applications and business requirements.
Tags : 
wlan, technology, enterprise, mobility traffic manager, pc mall
    
PC Mall
Published By: Layered Tech, Inc.     Published Date: Dec 16, 2010
"WordPress.com does everything possible to ensure ease-of-use when it comes to our systems, but we also do everything possible to be both flexible and stable," said Barry Abrahamson, Systems Wrangler for Automattic, the company behind services including WordPress.com. "Layered Tech's willingness to innovate with us helps keep WordPress.com among the world's most popular sites."
Tags : 
layered tech, wordpress, hosting solution, blogging, web publishing, dedicated hosting, infrastructure, servers, data center design and management, colocation and web hosting
    
Layered Tech, Inc.
Published By: Layered Tech, Inc.     Published Date: Dec 16, 2010
Layered Tech's engineers created a customized package of virtual private data centers (VPDCs), managed services and disaster recovery solutions that support KANA's clients, large and small. Layered Tech tailored the architecture to meet the highest enterprise security requirements, as well as ensuring that each KANA client can deploy applications that scale to ongoing volume fluctuations.
Tags : 
layered tech, kana, virtual private data center, enterprise security, vpdc, disaster recovery, customer interaction, grid computing, servers, cloud computing, colocation and web hosting
    
Layered Tech, Inc.
Published By: Citrix Systems     Published Date: Feb 27, 2014
A highly mobile and complex workforce needs a flexible solution for accessing apps, desktops, and data.
Tags : 
citrix, data, vdi, it challenges, solutions, apps, desktops, it management, data center
    
Citrix Systems
Published By: Citrix Systems     Published Date: Apr 14, 2014
The conversation about VDI has moved from “whether” to “when” and “how.” In today’s fast-moving markets, a centralized approach to desktop and app delivery has become essential to help businesses become more mobile, flexible, agile and productive. Download this white paper to learn more!
Tags : 
vdi, desktop apps, mobile apps, app delivery, tablets, productivity, flexibility, it management
    
Citrix Systems
Published By: Citrix Systems     Published Date: Nov 10, 2014
Virtualization has made compute infrastructure and storage infrastructure an order of magnitude more flexible, yielding huge gains in IT efficiency. However, the network has not achieved the same efficiency gains. Unlike the advancements in compute and storage virtualization, networking has not kept pace, and has become a barrier to achieving the promise of enterprise cloud computing. As enterprise IT continues its transition to the Cloud Era, the data center network is once again taking center stage.
Tags : 
application, deployment, research, enterprise, data center, controller, network, security, cloud, virtualization, platform, performance, scalability
    
Citrix Systems
Published By: IBM     Published Date: Jul 05, 2012
Today's businesses need simpler more efficient and flexible computing models. The IBM PureSystems family is comprised of platform systems and infrastructure systems that include built-in "patterns of expertise" to address complex business and operational tasks for smarter computing.
Tags : 
ibm, technology, it management, business technology, smarter computing, tasks
    
IBM
Published By: CDW Vmware     Published Date: Aug 08, 2013
A flexible and optimized infrastructure requires unshackling computing from physical servers.
Tags : 
cdw, vmware, technology solutions, server virtualization, it management
    
CDW Vmware
Published By: ForeScout     Published Date: Aug 14, 2012
In a BYOD world, companies can choose to secure and manage the entire mobile device user pool or secure portions of that community. Either way, steps must be taken to prevent unauthorized access to network resources and data loss. Enterprises should consider solutions that allow policies to be applied based on user, device, network, application, and data leakage risks.
Tags : 
archetecting, flexible, strategy, for securing, enterprise, bring, device, byod, data, loss, prevention, mobile, security, landscape, data, access, device, mobility, risks, augmenting
    
ForeScout
Published By: ForeScout     Published Date: Aug 14, 2012
Business wants more fluid access to data while IT organizations must maintain security. As the variety of access and multitude of threats to network resources and sensitive information have grown, so has the need for more flexible and automated ways to effectuate security policies, controls and enforcement. Rarely is this need more keenly felt than at the network endpoint, where people, technology, information assets and requirements for security and compliance meet most directly.
Tags : 
pragmatic, path, achieving nac results, essential implementation, process, control, consideration, data, access, it organization, security, protection, network, access, control, nac, interoperability, 802.1x standards, control, options
    
ForeScout
Published By: ForeScout     Published Date: Jan 24, 2013
This IDC study surveyed IT managers about the number of consumer devices on their networks, they underestimated the number by 50%. Whether you are prohibiting, tolerating or embracing BYOD, you need to define policy and security.
Tags : 
bring your own device, byod, idc survey, it managers, devices on network, networking, data center
    
ForeScout
Published By: CDW     Published Date: Aug 07, 2013
In the spring of 2012, IBM® introduced its PureSystems family of intelligent, integrated, powerful and flexible computing systems. At that time, IBM committed to a continuing process of improvement and additions to these systems as technology and innovation evolved.
Tags : 
cdw, ibm, pureflex, datacenter, datacenter management, puresystems, security
    
CDW
Published By: McAfee     Published Date: Feb 06, 2013
The next-generation of hybrid data centers will integrate physical, virtual, and cloud infrastructures to deliver IT services more flexibly, affordably, and adaptively, and require a new generation of flexible security architectures.
Tags : 
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Flexible, top-rated security and high performance for proactive protection across physical and virtual infrastructure.
Tags : 
hybrid data center, data center, data center security, virtualization, virtual data center, virtual machines, cloud computing, virtualized security, virtualization anti virus, hypervisors, virtual desktop security, virtual desktops
    
McAfee
Published By: IBM     Published Date: Mar 22, 2013
This paper shows how the IBM Maximo software solution is the leading asset and service management software in the marketplace, through its highly flexible business components and technology architecture
Tags : 
ibm, ibm maximo, maximo, service management, it management, agile it, client devices, soa, tivoli software, infrastructure
    
IBM
Published By: Symantec Corporation     Published Date: Mar 21, 2014
This paper examines algorithm agility, how it fits into the current and evolving security landscape and how your business can enhance online security through a more flexible, scalable approach to SSL certification.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, software development
    
Symantec Corporation
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.