Data Management

Oceans of data are generated every day by businesses and enterprises, and all of it must be prioritized, analyzed, and safeguarded with the right architecture, tools, polices, and procedures. TechRepublic provides the resources you need.

  • White Papers // Feb 2014

    Real-world Identity and Access Management (IAM) for Unix-based Systems

    Explore the most common identity and access management (IAM) challenges facing Unix-based organizations, and learn about some easily implemented practices and technologies that can help you increase security, achieve compliance and improve operational efficiency. Read the white paper to learn how to: Use an Active Directory (AD) bridge solution...

    Sponsored By Dell Software

  • White Papers // Feb 2014

    Who, What, When, Where and Why: Tracking the 5 Ws of Change in Active Directory, SharePoint, SQL Server, Exchange and VMware

    Many organizations rely on IT to prevent and detect tampering, unauthorized access or errors within their key enterprise technologies. Learn the limitations and capabilities of native auditing tools and how a third-party solution can help protect your system, data, productivity and bottom line.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    Managing Risk in an Active Directory Integrated Virtualized Environment

    Explore the interdependent and combined security issues of Active Directory (AD) and virtualization, as well as how to identify and manage these risks. Gain insight into the native audit capabilities of these technologies and learn how they provide centralized visibility into your IT environment.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    Enterprise Best Practices for Real Time Auditing and Event Archival

    With data being generated at a record-setting pace, it’s never been more critical for your organization to properly manage it. Learn how the insights in this white paper can help transform your IT organization and help them intelligently collect, organize and store data.

    Sponsored By Dell Software

  • White Papers // Jan 2014

    White Paper: Manage IT services efficiently. Serve business effectively.

    Aiming to manage your IT services efficiently and serve the business more effectively? Adapting to a constantly changing IT environment—while also meeting the needs of business and end users— requires a new approach to managing operations. The methodology that has emerged to fill this vacuum is called business service management...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Jan 2014

    Prepare, Pinpoint, Predict

    As your IT organization adopts new technologies like cloud and virtualization, physical and virtual machine sprawl grows. This is exacerbated with the explosion of mobility, a vast choice of user devices, sensors and readers of many types that now have internet connectivity, and the hundreds of new technologies that are...

    Sponsored By Hewlett-Packard (HP)

  • eBooks // Jan 2014

    6 Ways to Expand Your Managed Services Offering and Boost Revenue

    By offering your clients all the IT services they need under one roof, you’ll not only increase revenues, but you’ll also improve client retention. It’s time to think bigger by adding new services to your offering that complement the managed services you already provide. In this eBook, we introduce you...

    Sponsored By LabTech Software

  • White Papers // Jan 2014

    Specification of Modular Data Center Architecture

    There is a growing consensus that conventional legacy data center design will be superseded by modular scalable data center designs. Reduced total cost of ownership, increased flexibility, reduced deployment time, and improved efficiency are all claimed benefits of modular scalable designs. Yet the term “modular”, when and where modularity is...

    Sponsored By APC by Schneider Electric

  • White Papers // Jan 2014

    How Monitoring Systems Reduce Human Error in Distributed Server Rooms and Remote Wiring Closets

    Surprise incidences of downtime in server rooms and remote wiring closets lead to sleepless nights for many IT managers. Most can recount horror stories about how bad luck, human error, or just simple incompetence brought their server rooms down. This paper analyzes several of these incidents and makes recommendations for...

    Sponsored By APC by Schneider Electric

  • White Papers // Jan 2014

    Data Center Projects: Growth Model

    Long term data center or network room capacity planning may seem impossible in the face of evolving IT technology and business requirements. Nevertheless, data center facilities have a lifetime that may span many generations of IT equipment, so planning – or lack of planning – can have a large impact...

    Sponsored By APC by Schneider Electric

  • Downloads // Jan 2014

    Top 5 Reasons to Choose SolarWinds Log & Event Manager (LEM)

    Real-Time, In-Memory, Event Log Correlation: Troubleshoot performance problems by understanding the relationship between different activities using multiple event correlations Out-of-the-Box Security and Compliance Reporting Templates: Quickly & easily generate and schedule compliance reports using over 300 audit-proven templates USB Defense: Protect against endpoint data loss &...

    Sponsored By SolarWinds

  • Videos // Jan 2014

    ExtremeZ-IP Product Video

    With over a decade of experience and more than 7,000 organizations worldwide, ExtremeZ-IP has become the industry standard for seamlessly integrating Macs into enterprise environments. ExtremeZ-IP is the solution of choice for thousands of production workflows and is the only Windows AFP server product being actively maintained and supported since...

    Sponsored By Acronis

  • White Papers // Jan 2014

    Analytic Databases for Big Data

    Organizations are contemplating a replacement of their analytic databases, data warehouses, and similar platforms to keep pace with new and intensifying requirements for advanced analytics in a "big data" world. As user organizations make such platform replacements -- or add additional platforms to their expanding data warehouse architectures -- they...

    Sponsored By SAP

  • White Papers // Jan 2014

    Big Data Gets Personal: Business Report

    Big data and personal data are converging to shape the Internet's most surprising consumer products. They'll predict your needs and store your memories -- if you let them. Fast-developing methods for collecting and analyzing these types of "big data" promise valuable insights to retailers, urban planners, and for individuals. This...

    Sponsored By SAP

  • White Papers // Jan 2014

    Five Ways Box Makes SharePoint Better

    Businesses around the world have made significant investments in Microsoft SharePoint for content management. However, these same companies are struggling with making the transition to a more mobile, more collaborative workplace. The biggest barriers to making this shift are the lack of strong mobile support in SharePoint, a lack of...

    Sponsored By Box

  • Webcasts // Jan 2014

    Webcast: 3 Steps to Content Sharing and Collaboration ft. Forrester Research

    Consumer sync and share tools help people access and send personal files, but smart IT leaders know that businesses require more than just ease-of-use. Strong security, mobile support, and deployment architecture are just a few of the many important factors to consider when evaluating vendors for a company-wide solution. Where...

    Sponsored By Box

  • White Papers // Dec 2013

    Cloud Federation for Identity and Access Security

    The shift to a cloud-based enterprise IT architecture is a foregone conclusion for organizations across a wide range of company sizes and verticals. However, many organizations are still approaching this shift with trepidation because security and compliance concerns can slow or block many enterprise cloud initiatives in terms of both...

    Sponsored By F5

  • White Papers // Nov 2013

    Best Practices Guide for IT Governance & Compliance

    Federal regulations require businesses to know exactly what changes are made to structured and unstructured data within their corporate networks. Learn how the best practices for implementing a compliance solution in this white paper can help you minimize stress during your next IT compliance audit.

    Sponsored By Dell Software

  • White Papers // Nov 2013

    The Essential Guide to IT Transformation

    Enterprises are transforming IT by adopting service automation tools and processes, making teams more innovative and efficient. By consolidating fragmented and redundant service systems, standardizing operational processes and by creating a single system of record for IT, CIOs can shift their attention from maintenance to service, effectively changing enterprise IT.

    Sponsored By ServiceNow

  • White Papers // Nov 2013

    Boost IT Visibility and Value with Service Catalog

    Many CIOs are being pressured to demonstrate IT value. A service catalog can help you promote your services in a way the business can easily understand. It will become your service management foundation that can boost IT visibility and constantly demonstrate IT value to the business.

    Sponsored By ServiceNow

  • White Papers // Nov 2013

    Consolidation: The Foundation for IT Business Transformation

    This white paper explores how to consolidate legacy, redundant IT services and shows how consolidation can accelerate growth while cutting costs and reducing complexities and enhance competitiveness.

    Sponsored By ServiceNow

  • Webcasts // Nov 2013

    Product Preview: Big Data Analytics

    Ready for strategic real-time answers to your most critical business questions? Want the ability to make decisions based on predictive data-driven insights and not just intuition? See how Workday Big Data Analytics allows managers and executives to gain insight into information that was previously too difficult or time-consuming to obtain.

    Sponsored By Workday

  • eBooks // Oct 2013

    Set Your IT Business Up For Success: Achieving Client Satisfaction in the First 30 Days

    The key to achieving client satisfaction and building long-term client relationships is starting off on the right foot. It is important that the groundwork be laid in advance to ensure a smooth onboarding process, as this is the time when new clients are most critical of the work being performed....

    Sponsored By LabTech Software

  • eBooks // Oct 2013

    Top Ten Considerations for Selecting the Right RMM Solution

    Remote monitoring and management (RMM) is an important part of your IT services offering. RMM tools enable service delivery and provide a number of benefits, including increased customer service levels, time and money savings, and ultimately a more effective and profitable business. Read this eBook for tips to ensure you...

    Sponsored By LabTech Software

  • eBooks // Oct 2013

    5 Technology Trends you Need to Follow

    Mobile devices, social business apps, and business analytics are converging with the Cloud to create the most substantial changes in technology since the Internet revolution. Businesses have to change the way they think and operate, and with rising budgets for technology, they need someone to provide the services that will...

    Sponsored By ConnectWise

  • eBooks // Oct 2013

    3 Compelling Reasons to Consider Desktop Virtualization

    If you have already experienced the benefits of server virtualization, it is time to find out what you can gain by extending virtualization to your desktops. In this eBook, find out how other VMware customers have extended their virtualization deployment to end-user computing and have uncovered significant benefits, such as...

    Sponsored By VMware

  • White Papers // Oct 2013

    The Evolution and Value of Purpose-Built Backup Appliances

    This White Paper explores the increased use and adoption patterns of Purpose-Built Backup Appliances (PBBAs), both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to...

    Sponsored By Symantec

  • White Papers // Sep 2013

    Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems

    As the number and severity of cyber-crimes continues to grow, it’s important to understand the steps cyber-criminals take to attack your network, the types of malware they use, and the tools you need to stop them.

    Sponsored By Dell Software

  • White Papers // Aug 2013

    The Promises and Pitfalls of BYOD

    Find out how to let employees use personal smartphones, tablets and laptops for work purposes while protecting your network from malware, data theft and unauthorized access.

    Sponsored By Dell Software

  • White Papers // Aug 2013

    Effective Security in a BYOD Environment: Arming Your Organization Against the Unknown

    Learn how to get ahead of threats and develop a pragmatic strategy to secure data and assets from malware and theft — without impeding the flexibility, agility and efficiency BYOD can deliver for your enterprise.

    Sponsored By Dell Software

  • White Papers // Aug 2013

    EMC IT - Leading The Transformation

    After enduring several years of global economic uncertainty, organizations large and small are beginning to increase IT spending. The pressures, although by no means gone, have begun to recede. ESG research indicates that for both enterprise and midmarket organizations, just reducing costs—while still important—is no longer the top priority. This...

    Sponsored By EMC

  • White Papers // Aug 2013

    Controlling and Managing Superuser Access

    Every business needs privileged account users. Unfortunately, most operating systems offer all-or-nothing solutions. This white paper explores the risks associated with privileged accounts, and explains how Dell solutions can mitigate those risks. Download the white paper today to learn more.

    Sponsored By Dell Software

  • White Papers // Jul 2013

    Creating the Ultimate Security Platform

    It may sound counterintuitive, but business security challenges aren’t always only about security. Sure, keeping the bad guys out is the ultimate goal. But the challenges an organization faces every day are just as likely to be about the cost of providing security or the administrative hassles of ensuring regulatory...

    Sponsored By IBM

  • White Papers // Jul 2013

    Identity and Access Management Buyer's Guide

    This buyer's guide provides assistance in evaluating identity and access management solutions. It describes common identity and access management challenges and the capabilities required to address them, and it includes checklists for assessing vendors and their products.

    Sponsored By IBM

  • White Papers // Jul 2013

    Tech Tips: VMware Horizon View

    Straight from our experts at VMware®, follow these technical tips for a successful and smooth implementation of VMware Horizon View™. From application requirements to end user expectations, reference these tips as you move to a virtual desktop infrastructure.

    Sponsored By VMware

  • White Papers // May 2013

    Virtualizing Your Infrastructure with a Path to the Cloud: 5 Reasons Why Your IT Infrastructure Should Run on Blade Servers

    Blades allow for small hardware footprints, eliminate the cable clutter typically found in data centers, and streamline setup and maintenance over the server’s life cycle. They are designed to enable IT organizations to scale out the infrastructure for efficient service provisioning and to meet fluctuating demand levels. This whitepaper...

    Sponsored By HP & Intel® Xeon® Processor

  • White Papers // May 2013

    The Keys to the Kingdom: Limiting Active Directory Administrators

    Many organizations have come to rely heavily on the information stored directly within Active Directory (AD) with other applications using AD for authentication. However, the manual processes used to update Active Directory (AD) can leave organizations vulnerable, and lead to missing, inaccurate or inconsistent information. Learn how the technical considerations...

    Sponsored By Dell Software

  • White Papers // Apr 2013

    Impact of Hot and Cold Aisle Containment on Data Center Temperature and Efficiency

    Both hot-air and cold-air containment can improve the predictability and efficiency of traditional data center cooling systems. While both approaches minimize the mixing of hot and cold air, there are practical differences in implementation and operation that have significant consequences on work environment conditions, PUE, and economizer mode hours. The...

    Sponsored By APC by Schneider Electric

  • White Papers // Apr 2013

    Mobile Content, Collaboration & IDC's 3rd IT Platform: The Next Frontier for the Mobile Enterprise

    IDC focuses this article on talks about the new IT platform. This 3rd IT Platform will be the new wave for the about the next 25 years, so they urge all current companies to embrace it themselves. They also talk about how mobile is a huge part of this...

    Sponsored By Box

  • White Papers // Feb 2013

    Top 10 Reasons to Move to HP Blade Servers

    Enterprise and midsize businesses are increasingly turning to blade servers as the platform of choice to deliver the next generation of virtualized applications. Blade servers can yield significant cost efficiencies over rack servers - while taking up a smaller footprint, consuming less power and providing significant advantages in terms of...

    Sponsored By HP & Intel® Xeon® Processor