Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

configuration

Results 1 - 25 of 541Sort Results By: Published Date | Title | Company Name
Published By: Cherwell Software     Published Date: Oct 28, 2019
To keep up with the growing needs of students, faculty and staff, higher ed IT departments must deliver a modern and seamless digital experience—often despite significant budget and staffing hurdles. In this peer report, IT leaders at four different universities share how they’re using Cherwell’s IT service management (ITSM) solution to tackle common challenges and create extraordinary results in three key areas: efficiency, campus-wide user experience and enterprise-level innovation. What they’ve accomplished is only the start: • Halving customization and configuration time while boosting user satisfaction • Improving service delivery and enabling campus-wide collaboration • Helping departments beyond IT to pursue their own automation initiatives By replacing legacy systems, automating manual workflows, enabling self-help and much more, IT pros are making radically new realities possible with a streamlined and customizable approach to ITSM. Download the report to read their stor
Tags : 
    
Cherwell Software
Published By: Cherwell Software     Published Date: Oct 28, 2019
: Today’s learning environments would be unrecognizable to past generations. Professors distribute and issue syllabi and assignments online. Students collaborate on group projects using Google Docs, Doodle and other technologies. Password reset requests alone could keep an entire IT team busy. To face this onslaught of technological demands without breaking the budget, campuses need a powerful, flexible and affordable ITSM platform. Read this eBook to learn how eight different colleges and universities are using Cherwell ITSM to achieve: • A higher level of productivity (for example, implementing a self-service portal for password resets that slashed service requests by 65 percent) • Faster service delivery (for example, cutting the global computer refresh cycle from three years to seven months) • Less configuration time (for example, one school reduced configuration time by 74 percent). To learn more about how leading campuses have easily and affordably improved their operational
Tags : 
    
Cherwell Software
Published By: ServiceNow     Published Date: Oct 24, 2019
Achieving complete visibility into your infrastructure requires reliable configuration data. With a solid plan, you can have a healthy CMDB and provide a foundation for implementing automated discovery. Learn the 4 stages to achieve complete visibility of your infrastructure with reliable data in your CMDB.
Tags : 
servicenow, cmdb, stages, foundation, infrastructure
    
ServiceNow
Published By: ServiceNow     Published Date: Oct 24, 2019
Behind every successful CMDB deployment is a detailed configuration management plan for implementing, designing, and sustaining a configuration management capability. Learn the 4 key stages to deploying a healthy CMDB with this ebook including real-life examples that you can put into practice today.
Tags : 
servicenow, cmdb, deployment, management
    
ServiceNow
Published By: ServiceNow     Published Date: Oct 24, 2019
Most organizations face challenges when implementing a configuration management capability. In this book, you will learn basics of configuration management, how to build and maintain an effective configuration management capability for your organization, use cases, and key milestones on your journey.
Tags : 
servicenow, management, cmdb, organization
    
ServiceNow
Published By: ServiceNow     Published Date: Oct 23, 2019
The quality of data that your Configuration Management Database (CMDB) relies on is critical to helping you track the software assets coming into an organization from the point of inception to the point of disposition. That’s where Software Asset Management (SAM) can help.Download this whitepaper to understand how to use SAM to build a CMDB that helps you track the value of IT services, improve compliance, and scale to meet changing service demands.
Tags : 
    
ServiceNow
Published By: ServiceNow     Published Date: Oct 23, 2019
IT faces the challenge of consolidating, maintaining, and understanding complex configuration data and often this data is found in many different repositories. But there’s a better way to solve these challenges. The configuration management database (CMDB) consolidates disparate IT management systems into a single system of action. This ipaper provides you with the fundamentals to help ensure your configuration data management project with CMDB is a success.
Tags : 
servicenow, it management, data management
    
ServiceNow
Published By: AWS     Published Date: Oct 09, 2019
Application owners and DevOps teams want to build in AWS without compromising security, but often lack the tools to keep sensitive data secure. During Pacific Dental’s move to Amazon Web Services (AWS), the company sought to enhance and operationalize its security measures to match the speed and scale of the cloud, using a cloud access security broker (CASB) to proactively address misconfiguration and risk to their data.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
Poor visibility into cloud deployments makes it difficult for organizations to enforce security and compliance across their cloud environment. Check Point CloudGuard Dome9 on Amazon Web Services (AWS) can help you gain deeper visibility of your traffic and configurations with automated assessments that strengthen your security posture and help you fulfill your part of the Shared Responsibility Model. Join the upcoming webinar with Check Point, Veracode, and AWS. Learn how Veracode improved their security posture using Check Point CloudGuard Dome9 on AWS.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
Application owners and DevOps teams want to build in AWS without compromising security, but often lack the tools to keep sensitive data secure. During Pacific Dental’s move to Amazon Web Services (AWS), the company sought to enhance and operationalize its security measures to match the speed and scale of the cloud, using a cloud access security broker (CASB) to proactively address misconfiguration and risk to their data. Register for our webinar to learn how Pacific Dental leveraged McAfee’s CASB solution, McAfee MVISION Cloud, to address these challenges and fulfill their security responsibility.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
Securing cloud environments is different from securing traditional data centers and endpoints. The dynamic nature of the cloud requires continuous assessment and automation to avoid misconfigurations, compromises, and breaches. It can also be difficult to gain complete visibility across dynamic and rapidly changing cloud environments — limiting your ability to enforce security at scale. On top of these challenges, cloud governance is critical to maintain compliance with regulatory requirements and security policies as they evolve. Because cloud deployments are not just implemented once and left untouched, organizations need to consider how to integrate security into their CI/CD pipeline and software development lifecycle. Implementing a security solution that addresses cloud challenges requires deep security and cloud expertise that organizations often do not have. Once in the cloud, organizations manage and create environments via automation, adapt their workloads to changes by automa
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
Poor visibility into cloud deployments makes it difficult for organizations to enforce security and compliance across their cloud environment. Check Point CloudGuard Dome9 on Amazon Web Services (AWS) can help you gain deeper visibility of your traffic and configurations with automated assessments that strengthen your security posture and help you fulfill your part of the Shared Responsibility Model. Join the upcoming webinar with Check Point, Veracode, and AWS. Learn how Veracode improved their security posture using Check Point CloudGuard Dome9 on AWS.
Tags : 
    
AWS
Published By: CloudHealth by VMware     Published Date: Sep 05, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
    
CloudHealth by VMware
Published By: Group M_IBM Q3'19     Published Date: Sep 04, 2019
This white paper considers the pressures that enterprises face as the volume, variety, and velocity of relevant data mount and the time to insight seems unacceptably long. Most IT environments seeking to leverage statistical data in a useful way for analysis that can power decision making must glean that data from many sources, put it together in a relational database that requires special configuration and tuning, and only then make it available for data scientists to build models that are useful for business analysts. The complexity of all this is further compounded by the need to collect and analyze data that may reside in a classic datacenter on the premises as well as in private and public cloud systems. This need demands that the configuration support a hybrid cloud environment. After describing these issues, we consider the usefulness of a purpose-built database system that can accelerate access to and management of relevant data and is designed to deliver high performance for t
Tags : 
    
Group M_IBM Q3'19
Published By: Group M_IBM Q3'19     Published Date: Aug 29, 2019
Today’s software and systems engineers are being challenged to balance speed of delivery with improving quality, reducing cost and minimizing risk. Managing changes to code and configurations through development, staging, user acceptance and production environments can be challenging. Having more “production-like” environments that can be controlled and serviced by the development team can add value, eliminate waste and speed delivery. Creating such environments can eliminate risk because more errors can be found well ahead of production deployment when they are less costly to fix. IBM can help you adopt agile methods improve your execution and deliver high-quality software for better business results
Tags : 
    
Group M_IBM Q3'19
Published By: igus     Published Date: Aug 28, 2019
Cable carriers, sometimes referred to as cat tracks, drag chains or energy chains, can be manufactured in many ways. They can be made with different materials, such as steel or plastic, and they can have simple lightweight designs or complex multi-axis configurations. But how do you know which carrier is best for your application? Choosing the right energy chain is crucial because it offers the following benefits: Longer service life for cables and hoses Improved machine safety Reduced operating costs Read this basics guide to discover a range of cable carrier design and material options, as well as tips for selecting the ideal energy chain. You can also review installation guidelines for maximizing the service life of your cable carrier and the energy supply system it protects.
Tags : 
    
igus
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
    
CloudHealth by VMware
Published By: Apstra     Published Date: Aug 19, 2019
AOS delivers powerful, intent-driven automation of network services in vendor-agnostic environments by delivering it as an easily consumable service in response to consumer-specified intent. Network devices serve packets, AOS services serve application workloads. According to numerous studies, 70-80% of outages are due to configuration change applied to a living system, and not due to initial deployment. Initial, one-time deployment can be seen as sort of a “hello world” application; the real complexities arise as the system evolves. With AOS, configuration, telemetry, and expectations are derived from the single source of truth - the intent - in an idempotent fashion, and as such there is no implementation difference between initial deployment or change management.
Tags : 
    
Apstra
Published By: Google     Published Date: Aug 05, 2019
Moving existing enterprise workloads to the cloud has always been challenging as companies struggle to adapt and migrate applications to run in a cloud environment. IT managers must understand application dependencies, change drivers and networking configurations, and learn new management interfaces. This white paper will provide a deeper understanding of Migrate for Compute Engine's technology for mass migrations into GCP unique technology and architecture, and will explore how these capabilities improve current mass migration practices.
Tags : 
cloud applications, cloud as a service, velostrata, migration, google cloud
    
Google
Published By: Indegy     Published Date: Jul 29, 2019
The Indegy Industrial Cybersecurity Suite protects industrial networks from cyber threats, malicious insiders, and human error. From threat detection and mitigation to asset tracking, vulnerability management, configuration control and device integrity checks, our Industrial Control System (ICS) security capabilities maximize the safety and reliability of your operational environment. Deployed as a network or virtual appliance, Indegy’s agent-less solution offers comprehensive security tools and reports for IT security personnel and OT engineers. The Indegy Suite delivers crystal clear situational awareness across all sites and their respective OT assets - from Windows Servers to PLC backplanes - in a single pane of glass.
Tags : 
    
Indegy
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Jul 11, 2019
US-based multinational financial services corporation was facing a longer time-to-market due to hampering of digital transformation across business lines, thereby affecting the developer productivity due to global manual build and deployment processes. LTI’s approach of providing end-to-end implementation of DevOps, with quality control gates, helped establish a role-based governance dashboard for real-time health KPIs of programs, projects, and tracking server positioning and the configuration status. Download full case study
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Group M_IBM Q2'19     Published Date: Jul 01, 2019
This white paper considers the pressures that enterprises face as the volume, variety, and velocity of relevant data mount and the time to insight seems unacceptably long. Most IT environments seeking to leverage statistical data in a useful way for analysis that can power decision making must glean that data from many sources, put it together in a relational database that requires special configuration and tuning, and only then make it available for data scientists to build models that are useful for business analysts. The complexity of all this is further compounded by the need to collect and analyze data that may reside in a classic datacenter on the premises as well as in private and public cloud systems. This need demands that the configuration support a hybrid cloud environment. After describing these issues, we consider the usefulness of a purpose-built database system that can accelerate access to and management of relevant data and is designed to deliver high performance for t
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q3'19     Published Date: Jul 01, 2019
This white paper considers the pressures that enterprises face as the volume, variety, and velocity of relevant data mount and the time to insight seems unacceptably long. Most IT environments seeking to leverage statistical data in a useful way for analysis that can power decision making must glean that data from many sources, put it together in a relational database that requires special configuration and tuning, and only then make it available for data scientists to build models that are useful for business analysts. The complexity of all this is further compounded by the need to collect and analyze data that may reside in a classic datacenter on the premises as well as in private and public cloud systems. This need demands that the configuration support a hybrid cloud environment. After describing these issues, we consider the usefulness of a purpose-built database system that can accelerate access to and management of relevant data and is designed to deliver high performance for t
Tags : 
    
Group M_IBM Q3'19
Published By: MuleSoft     Published Date: Jun 27, 2019
A connected, agile IT landscape serves as the foundation for a successful business. SAP integration requires the right technology, a strategic approach to connect SAP and third-party systems, and a means of enabling your organization to achieve success. Learn how MuleSoft’s Anypoint Platform and MuleSoft Catalyst enable you to unlock SAP across the domains of people, process, and technology to drive innovation and change the clock speed of your business. Download this whitepaper to learn about: The top 3 challenges to SAP integration. How Anypoint Platform connects SAP to any app, data, or device. Abstracting configuration complexity with an API-led approach. How MuleSoft Catalyst empowers your teams to scale innovation.
Tags : 
    
MuleSoft
Published By: Indegy     Published Date: Jun 17, 2019
The Indegy Industrial Cybersecurity Suite protects industrial networks from cyber threats, malicious insiders, and human error. From threat detection and mitigation to asset tracking, vulnerability management, configuration control and device integrity checks, our Industrial Control System (ICS) security capabilities maximize the safety and reliability of your operational environment. Deployed as a network or virtual appliance, Indegy’s agent-less solution offers comprehensive security tools and reports for IT security personnel and OT engineers. The Indegy Suite delivers crystal clear situational awareness across all sites and their respective OT assets - from Windows Servers to PLC backplanes - in a single pane of glass.
Tags : 
cybersecurity, industrial networks, security capabilities, indegy
    
Indegy
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.