Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

it structure

Results 301 - 325 of 3494Sort Results By: Published Date | Title | Company Name
Published By: CA Mainframe     Published Date: Sep 12, 2008
Business and IT executives should not have to choose between their desire to innovate for future growth and the desire to avoid disrupting current operations. Enterprise innovation that embraces and extends existing infrastructure and applications is possible through modern software architectures such as web services and SOA – as long as those investments perform competitively when measured against alternative platforms and they are able to be modernized to participate in these architectures.
Tags : 
ca mainframe, mainframe, infrastructure, architecture, platforms, network architecture, network management
    
CA Mainframe
Published By: CA Mainframe     Published Date: Sep 12, 2008
This white paper describes the trends that are not only keeping the mainframe market alive but are supporting its growth. The growing complexity of IT makes consolidation and simplification of IT asset management essential. At the same time, increases in energy costs and concern about the environment are also impacting markets. Mainframes are uniquely positioned to provide the automation and virtualization today's complex infrastructures require while using less energy.
Tags : 
ca mainframe, mainframe, network management, server hardware, servers
    
CA Mainframe
Published By: CA Service Assurance     Published Date: May 15, 2011
Evolving to the next level of IT effectiveness requires a new level of integration and analysis of cross-silo management information. This involves linking application status and root-cause information with infrastructure status and relating that to impact on IT service quality. Read this brief to learn how this approach to IT management can benefit your organization.
Tags : 
it operational efficiency, cross-silo, infrastructure status, it service quality, it management, business service analytics, reporting
    
CA Service Assurance
Published By: CA Service Assurance     Published Date: Jul 29, 2011
Many organizations are breaking down on the traditional IT silos to look at applications, infrastructure, and management as one organization working together to provide a real-time model of what is happening across the enterprise. Read this eBook from a recent IT executive panel to learn how industry experts are addressing these challenges.
Tags : 
application lifecycle, cloud, cloud computing, application management, application delivery, critical services, virtualized, virtualization.
    
CA Service Assurance
Published By: CA SM     Published Date: Jun 02, 2008
IT Asset Management (ITAM) is a cornerstone of IT Service Management (ITSM) yet is often omitted from existing ITSM implementations or initiatives. Version 3 of the Information Technology Infrastructure Library (ITIL) expands the processes, functions and roles in the service life cycle. However, it still does not provide enough details on key process and functional integration points for ITAM.
Tags : 
ca service management, service management, asset management, it asset management, itil
    
CA SM
Published By: CA Technologies     Published Date: Jul 06, 2011
The concept of cloud computing implies that the cloud computing platform is "mist" - ethereal and simple. In reality, it requires a complex infrastructure and sophisticated processes to make the illusion a reality
Tags : 
cloud-computing. ca, cloud, private-cloud, cloud computing, white paper, whitepaper, whitepapers, white papers, public cloud, technology white paper, analyst report, private cloud, service catalogue.
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 07, 2014
Guide pratique à l’attention des responsables métier et IT sur les actions à entreprendre dès MAINTENANT pour gérer la mobilité future de l’entreprise.
Tags : 
enterprise mobility, delivering a mobile strategy, flexible and secure infrastructures, byod, adopting mobility strategies, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 12, 2014
This paper by CA outlines the challenges experienced on a daily basis in the IT department
Tags : 
complete it visualization, it operations visibility, application visibility, infrastructure management, uim, it management, enterprise applications
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 12, 2014
This paper outlines the benefits of CA Unified Infrastructure Management and how it can have a positive impact on your business
Tags : 
complete it visualization, it operations visibility, application visibility, infrastructure management, uim, it management, enterprise applications
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 12, 2014
This white paper examines why unified IT monitoring is an important enabling technology for both enterprises and management service providers, including both the organizational and strategic impacts as well as the business case surrounding it. It goes further to examine CA Unified Infrastructure Management as an example of unified IT monitoring, and reviews three case studies where the solution has been deployed for active use in a unified manner.
Tags : 
complete it visualization, it operations visibility, application visibility, infrastructure management, uim, enterprise applications
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 12, 2014
This paper explains how CA Unified Infrastructure Management can have an important impact on your business.
Tags : 
complete it visualization, it operations visibility, application visibility, infrastructure management, uim, it management, enterprise applications
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 12, 2014
This info-graph explains the challenges and potential problems caused by the monitoring of multiple tools and devices and provides a complete unified visualization to help provide you with a single view in one architecture.
Tags : 
complete it visualization, it operations visibility, application visibility, infrastructure management, uim
    
CA Technologies
Published By: CA Technologies     Published Date: Feb 09, 2015
This white paper examines why unified IT monitoring is an important enabling technology for both enterprises and management service providers.
Tags : 
complete it visualization, it operations visibility, application visibility, infrastructure management, uim, it management, enterprise applications
    
CA Technologies
Published By: CA Technologies     Published Date: Feb 09, 2015
This paper provides information on how CA Unified Infrastructure Management (CA UIM) delivers the essential capabilities needed to help you proactively monitor and manage alarms, performance and SLAs across even the most dynamic and complex environments.
Tags : 
ca uim, it monitoring, client mobility, cloud services, ca unified infrastructure management, it infrastructure and services, monitoring
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 19, 2014
As demands on the data center increase, IT and facilities departments need to be able to increase and sustain high availability, maximize efficiency and minimize costs. Data Center Infrastructure Management (DCIM) provides an integrated platform for monitoring and measuring consumption, capacity and performance of both IT and facilities resources in the data center.
Tags : 
ca technologies, dcim, data center, data center operations, infrastructure, data center design and management
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 26, 2016
Many breaches happen because of compromised privileged user accounts. Risks spread like wildfire in the dynamic traditional, virtualized and cloud environments common in enterprises today. One improperly authorized privileged account can cause widespread and irreparable damage to an organization’s infrastructure, intellectual property and brand equity, leading to sudden drops in market value, broad organizational disruption and costly compliance penalties. Effectively managing privileged access across your hybrid enterprise is an imperative to reducing security and compliance risks.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solutions that are available to deal with these issues. It compares their technology, the market position each vendor has achieved, their ability to execute, and the overall maturity of each offering.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged credentials have served as a major attack vector in the successful execution of many breaches. Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. CA Privileged Access Management helps drive IT security and compliance risk reduction and improves operational efficiency by enabling privileged access defense in depth—providing broad and consistent protection of sensitive administrative credentials, management of privileged identity access and control of administrator activity.
Tags : 
it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits, user authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against today’s external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Managing and protecting privileged credentials is essential to reducing risk and addressing compliance requirements. Organizations need to evaluate privileged password management solutions for the depth of controls, scope of coverage and degree of cloud alignment they provide. CA Privileged Access Manager delivers against all three of these dimensions, providing a next-generation solution for privileged credential management that drives IT risk reduction, improves operational efficiency and protects an organization’s investment by supporting traditional, virtualized and hybrid-cloud infrastructure alike.
Tags : 
cloud security, cloud management, it protection, api integration, credential verification, security efficiency
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network devices and applications.
Tags : 
security information, security management, event management, system security, system management, risk management, security infrastructure, it infrastructure, privilege management, system authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 21, 2017
Lured by opportunities to speed innovation, reduce costs and enhance agility, many business executives are opting to move their organization’s applications into public cloud environments. Whether or not organizations realize these advantages to the fullest extent possible will in part be dictated by the monitoring capabilities in place. This paper offers a detailed look at the monitoring challenges cloud environments can pose, and it examines the key approaches = organizations need to take to foster maximum service levels, efficiency and agility in the cloud.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 21, 2017
By necessity, every company is now a software company. By 2017, two-thirds of customer service transactions will no longer require the support of a human intermediary. That means that if you haven’t already done so, you must adapt your business model to meet the needs of online customers. Failure to do so will put you at a severe competitive disadvantage. And chief among those demands is that you provide an exceptional user experience. App speed, reliability and ease of use are the new currency in this fast-changing landscape. In fact, app characteristics such as convenience and the ability to save users time can enhance brand loyalty by 60 percent or more.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 21, 2017
If you’ve seen recent car ads, you know they’re as likely to promote applications and connections as they are styling and horsepower. But manufacturers aren’t the only ones pushing apps these days. Banks, airlines, restaurants—you name it—all are using them to attract and engage customers. This is the application economy; where every company is in the software business and user experience is the new survival of the fittest.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 21, 2017
To manage IT like a business, you need tools to proactively ensure IT service reliability while simultaneously boosting operational agility. This requires a new approach to IT infrastructure management, including the selection of an infrastructure management vendor that can meet modern IT and business requirements.
Tags : 
    
CA Technologies
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.