Data Management

Oceans of data are generated every day by businesses and enterprises, and all of it must be prioritized, analyzed, and safeguarded with the right architecture, tools, polices, and procedures. TechRepublic provides the resources you need.

  • White Papers // Oct 2013

    Top Ten Characteristics for Selecting the Right RMM Solution

    Remote monitoring and management (RMM) is an important part of your IT services offering. RMM tools enable service delivery and provide a number of benefits, including increased customer service levels, time and money savings, and ultimately a more effective and profitable business. Read this eBook for tips to ensure you...

    Sponsored By LabTech Software

  • White Papers // May 2014

    Case Study: Heritage Bank improves reliability and productivity with Fuji Xerox MPS

    A case study that discusses on how to improve productivity and service delivery. Explore the benefits of adopting multifunction devices and learn how Heritage Bank significantly improved service quality.

    Sponsored By Fuji Xerox

  • Downloads // Apr 2014

    Comprehensive Virtualization Management - From VM to Spindle

    SolarWinds Virtualization Manager delivers integrated VMware & Microsoft Hyper-V capacity planning, performance monitoring, VM sprawl control, configuration management, & chargeback automation. All in one awesomely affordable product that’s easy to download, deploy, and use. Virtualization Manager auto-discovers the virtual machines in your environment making the creation of your monitoring environment...

    Sponsored By SolarWinds

  • Downloads // Apr 2014

    Dameware - Provide secure remote support to end-users located anywhere in the world.

    With DameWare Remote Support you can: Support end-users and computers located both inside & outside your firewall Remotely control the desktop of Windows®, Mac OS X® and Linux computers Take advantage of extensive security and encryption capabilities, including multiple authentication methods Centrally manage shared host lists, users & administrators,...

    Sponsored By SolarWinds

  • Downloads // Apr 2014

    V3 – Why is the app slow? Download a FREE trial of SolarWinds Application Monitor & find out.

    Why is the app slow? Download a FREE trial of SolarWinds Application Monitor & find out. 3 reasons to consider SolarWinds Server & Application Monitor: Out-of-the-box monitoring for almost everything – servers, virtual infrastructure & 150+ apps. Easy customization for your enterprise needs – customize templates,...

    Sponsored By SolarWinds

  • White Papers // Jul 2014

    Assessing the Business Value of Unified Communications

    Download this white paper to learn how you can measure the benefits of UC from reduced costs, increased availability, and improved IT. Read more...

    Sponsored By HP US

  • Research // Jul 2014

    The State of Support Services: 2014

    2014 has already proven to be an incredibly challenging and exciting year for customer support. With the backdrop of the changes TSIA identified in the new world of B4B, and all the traditional pressures faced by support services organizations, we are witnessing a pace of change that the majority of...

    Sponsored By LogMeIn

  • White Papers // Jul 2014

    Getting Started: With a Zero Trust Approach to Network Security

    Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust. With Zero Trust there is no default trust for any entity—including users, devices, applications, and packets—regardless of what it is and its location on or relative to the corporate...

    Sponsored By Palo Alto Networks

  • White Papers // Mar 2014

    5 Essentials for Protecting Against Advanced Persistent Threats (APTS)

    Advanced persistent threats (APTs) have become a major concern for IT security professionals worldwide, and for good reason. Recent attacks have targeted a multitude of diverse companies. This paper clarifies the nature of APT risks and provides recommendations on how organizations can better protect themselves. Read more...

    Sponsored By Websense

  • White Papers // Mar 2014

    Protecting IP Data from Loss and Theft

    This white paper describes the shortest path to reaching the prevention stage of data loss and data theft incidents without bringing data flows to a grinding halt. The paper presents an expanded view of IP and outlines six steps an organization can take to deploy data security controls. Read more...

    Sponsored By Websense

  • White Papers // Apr 2014

    Cutting the Cost of Application Security

    Web application attacks can result in devastating data breaches and application downtime, costing companies millions of dollars in fines, brand damage, and customer turnover. This white paper illustrates how the Imperva SecureSphere Web Application Firewall provides a Return on Security Investment of 2090% by preventing data breaches and website downtime....

    Sponsored By Imperva

  • Videos // Jul 2014

    Monitor and Protect Critical Web Applications with a Web Application Firewall

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Sponsored By Imperva

  • Videos // Jan 2014

    ExtremeZ-IP Product Video

    With over a decade of experience and more than 7,000 organizations worldwide, ExtremeZ-IP has become the industry standard for seamlessly integrating Macs into enterprise environments. ExtremeZ-IP is the solution of choice for thousands of production workflows and is the only Windows AFP server product being actively maintained and supported since...

    Sponsored By Acronis

  • White Papers // Apr 2014

    U.S. Department of Agriculture Stays at the Forefront of Mobilization with Acronis Access

    The United States Department of Agriculture (USDA) works to support the American agricultural economy to strengthen rural communities; to protect and conserve America’s natural resources; and to provide a safe, sufficient, and nutritious food supply for the American people. The USDA is composed of 17 separate agencies with an additional...

    Sponsored By Acronis

  • Research // Aug 2013

    Research: IaaS impact on data center design and staffing

    The importance of Infrastructure as a Service (IaaS) is evident in the growing number of companies either already implementing, or planning to implement. Underscoring the strength of IaaS is the responses gathered in each of the last two Tech Pro Research surveys on the topic. The first, in April, detailed...

    Sponsored By TechRepublic

  • White Papers // Feb 2013

    Virtualizing disaster recovery using cloud computing

    Given the demands of an around-the-clock world, organizations need to start thinking in terms of application continuity rather than infrequent disasters. With faster recovery time and reduced costs, cloud-based business resilience can provide an attractive alternative to traditional disaster recovery. Read this paper to learn how organizations can use cloud...

    Sponsored By IBM

  • White Papers // Jun 2014

    Whitepaper: Pod Infrastructure, Virtual Infrastructure and Dedicated Infrastructure

    Every organisation has different needs when it comes to Cloud computing. Getting stuck in a rigid contract that doesn’t allow you to consume or scale Cloud services the way your business needs to negates the very purpose of Cloud – the ability to provide flexibility, agility and rapid provisioning.Find out...

    Sponsored By EMC

  • White Papers // Jul 2014

    The Big Data Zoo—Taming the Beasts

    With so much talk about big data and the possibilities it can offer, the truth behind what big data is—and what it can do for businesses—can be hard to determine. However, according to Dr. Barry Devlin of 9sight Consulting, the truth behind all the talk is not hard to see,...

    Sponsored By IBM

  • White Papers // May 2013

    Develop an intelligent disaster recovery solution with cloud technologies

    If you're unhappy with the state of your current disaster recovery operations, IBM is offering a must-read Q and A. In this interview, IBM cloud experts share their insights on how cloud computing can provide nearly instantaneous failover and failback of critical business applications. This type of speedy recovery keeps...

    Sponsored By IBM

  • Case Studies // Feb 2014

    2013 Gartner Magic Quadrant for Security Intelligence & Event Management (SIEM)

    IBM Security QRadar has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for SIEM. In addition to providing a technology that is a good match to current customer requirements, Leaders also show evidence of superior vision and execution for anticipated requirements. Gartner reveals that customers'...

    Sponsored By IBM

  • Case Studies // Feb 2014

    Gartner Critical Capabilities for Security Information and Event Management

    IBM Security QRadar received an "Excellent" product viability rating again by Gartner in its Critical Capabilities for SIEM report. The report assesses 13 SIEM technologies by evaluating the capabilities that are critical for the support of threat management, compliance, and general SIEM deployment use cases. Gartner notes that SIEM...

    Sponsored By IBM

  • White Papers // Jul 2014

    DevOps: Why IT Operations Managers Should Care About the Cloud

    Savvy enterprises are discovering that the cloud holds the power to transform IT processes and support business objectives. IT departments can use the cloud to redefine the continuum of development and operations—a process that is becoming known as DevOps. Download the Executive Brief DevOps: Why IT Operations Managers Should Care...

    Sponsored By IBM

  • White Papers // Jul 2014

    Get more out of cloud with a structured workload analysis

    Adopting cloud technology is a reasonably easy decision. Figuring out when and how to get the most value from cloud computing is the next—often more challenging—step. This white paper shows how a robust analysis of your workloads can help identify candidates for target cloud environments, by asking key questions,...

    Sponsored By IBM

  • White Papers // Jul 2014

    Success in the Cloud:  Why Workloads Matter Observations from IBM's own Cloud Transformation

    As IBM has learned through its own cloud transformation, the actual value cloud computing can deliver depends on the applications you choose for migration. When matched to the right workloads, cloud can deliver game-changing value. When applied to the wrong workloads, cloud’s comparative value can be reduced or even lost...

    Sponsored By IBM

  • White Papers // Jul 2014

    Gartner Magic Quadrant for Enterprise Mobility Management Suites

    The mobile device management market has evolved into the enterprise mobility management suites market. EMM is growing quickly, and the vendor landscape has changed significantly, which will impact IT leaders' choices. Check this Gartner Report Now!

    Sponsored By IBM

  • White Papers // Jul 2014

    Magic Quadrant for Enterprise Mobility Management Suites

    The mobile device management market has evolved into the enterprise mobility management suites market. EMM is growing quickly, and the vendor landscape has changed significantly, which will impact IT leaders' choices. Check this Gartner Report Now!

    Sponsored By IBM

  • White Papers // Jun 2014

    IBM MobileFirst Infrastructure Consulting Services service profile

    Can your existing IT infrastructure support your mobility initiatives? Do you know? Too many businesses are implementing mobility projects piecemeal, with no clear view of the infrastructure needed to support them, or of which initiatives will bring true value to the business. Read this engagement profile to learn how IBM...

    Sponsored By IBM

  • White Papers // Jun 2014

    7 essentials whitepaper

    Making changes to your business strategy can often create new risks. If your business continuity management (BCM) plan is not part of an organization-wide, integrated program, it may not evolve to address these new risks. Understand which practices can be followed to successfully protect your organization’s business operations and reputation...

    Sponsored By IBM

  • White Papers // Jun 2014

    Building the business case for continuity and resiliency

    Now available: the cost data you need to build the business case for improved continuity and resiliency. Based on findings from the largest study of its kind—the IBM Global Study on the Economic Impact of IT Risk—which surveyed 2,136 IT professionals around the world, 1,069 of them business continuity professionals....

    Sponsored By IBM

  • White Papers // Jun 2014

    Cloud-based data backup: a buyer's guide

    Many IT executive view cloud computing as an attractive platform for data backup. They know cloud can help protect business-critical data and provide near-ubiquitous information access. But while having a cloud-based solution is valuable, developing one in-house is tricky. That's why many organizations want to contract with a third-party cloud...

    Sponsored By IBM

  • White Papers // Jun 2014

    IBM MobileFirst Managed Mobility Services service profile

    Now you can cut through the complexity by using Managed Mobility Services as the framework for your mobility efforts, creating new levels of productivity for employees and transforming your business processes. Read the service profile to learn how IBM MobileFirst can help you create a security-rich, flexible technology environment that...

    Sponsored By IBM

  • White Papers // Jun 2014

    The case for cloud-based data backup - IBM SmartCloud Managed Backup offers significant improvement over traditional data backup methods

    Using tape may be appropriate for long-term data storage, but many IT executives find it too expensive, inefficient and unreliable for day-to-day data backup. It is also typically not suitable for backing up data stored on virtualized servers. Learn how IBM SmartCloud Managed Backup cloud services can lower costs while...

    Sponsored By IBM

  • Analyst Briefings // Jun 2014

    The economics of IT risk and reputation: What business continuity and IT security really mean to your organization

    For one of the largest global studies ever conducted of more than 2,000 business continuity and IT security professionals, IBM teamed up with the Ponemon institute to dig deeper into the true economic impact of business continuity and security failures. The groundbreaking study revealed key findings that you’ll want...

    Sponsored By IBM

  • Analyst Briefings // Jun 2014

    The Reputational Impact of IT Risk with Forbes Insight

    This report from Forbes Insights provides valuable information on howSecurity and resilience affect nearly every aspect of your company, including your brand value and reputation.

    Sponsored By IBM

  • White Papers // Jun 2014

    The seven essential practices for effective business continuity management

    Making changes to your business strategy can often create new risks. If your business continuity management (BCM) plan is not part of an organization-wide, integrated program, it may not evolve to address these new risks. The key to successfully protecting your organization’s business operations and reputation is to take a...

    Sponsored By IBM

  • Presentations // Jun 2014

    Tipping point presentation

    Cloud resilience has come of age and the benefits to the IT organization may be obvious. Understand how it may be time for your organization to jump on cloud too. This presentation helps you to make the case for cloud and achieve a higher level of business resilience.

    Sponsored By IBM

  • Webcasts // Jun 2014

    Mind The Gap: Surviving The Technical Security Skills Crisis

    Gain insights from a recent Forrester and IBM study on the global IT security skills crisis Are you having a hard time finding and hiring qualified IT security staff – and retaining them on staff? If so, you are not alone. There is a widespread technical security skills crisis, and...

    Sponsored By IBM

  • White Papers // Jun 2014

    2014 Global Cost of Data Breach Study

    How much can a data breach cost? And are you doing enough to prevent it from happening to you? The 2014 Global Cost of Data Breach Study from Ponemon Institute, sponsored by IBM, provides benchmark data based on actual experiences of more than 300 organizations. Read this critical research to...

    Sponsored By IBM

  • White Papers // Jun 2014

    2014 Ponemon Cost of Data Breach Study

    The 2014 Global Cost of Data Breach Study from Ponemon Institute, sponsored by IBM, Showcases How much could a data breach cost your organization? This report provides benchmark data based on actual experiences of organizations in United States

    Sponsored By IBM

  • Analyst Briefings // Jun 2014

    Critical Data Protection Program by IBM Security Services

    Critical data is the small but most important portion of data vital to business survival and success. It includes sensitive financial and customer data, data that enables critical business processes, and proprietary data such as trade secrets, intellectual property, research and development, and confidential business plans and communications, learn how...

    Sponsored By IBM