access management

Results 201 - 225 of 520Sort Results By: Published Date | Title | Company Name
Published By: Enterprise Mobile     Published Date: Jul 09, 2013
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. Its time to move beyond mobile device management to a more holistic management method.
Tags : 
mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management, device management, enterprise mobile devices, mobile computing
    
Enterprise Mobile
Published By: CA Technologies     Published Date: Mar 12, 2015
Learn 5 OAuth Essentials for API Access Control and see how these tips will allow you to successfully manage your API management infrastructure.
Tags : 
oauth, api, ca tehnologies, twitter, resource server, authorization, it management
    
CA Technologies
Published By: Gigya     Published Date: Jun 08, 2015
Download this guide to get a grasp of the latest trends in user data management.
Tags : 
user data management, big data, identity and access management, compliance, mobilizing identity data, enterprise applications
    
Gigya
Published By: Gigya     Published Date: Jun 08, 2015
The rise of eCommerce, social networks, mobile and connected devices has surfaced SAML as a key solution to develop a customer identity access management (cIAM) strategy to keep up with the flood of cross-channel consumer data.
Tags : 
ecommerce, social networks, mobile devices, customer identity access management, cross-channel consumer data, it management
    
Gigya
Published By: Ruckus Wireless     Published Date: Aug 08, 2016
Minooka School District serves 4,500 pre-K through 8th-grade students. Challenge: Difficulty troubleshooting legacy Aironet infrastructure and supporting increased network demands. Solution: Ruckus Cloud Wi-Fi for distributed site network management.
Tags : 
cloud based access point, cloud based wifi, cloud managed wifi, cloud wifi, cloud based wifi management, cloud wifi controller, cloud managed wireless, cloud managed wireless access point, wifi for schools
    
Ruckus Wireless
Published By: Ruckus Wireless     Published Date: Aug 08, 2016
Ruckus Cloud Wi-Fi is WLAN Management-as-a-Service that enables schools and small and medium businesses with limited IT resources to easily set-up, monitor, and manage a high-performance network, without compromising on Wi-Fi performance.
Tags : 
cloud based access point, cloud based wifi, cloud managed wifi, cloud wifi, cloud based wifi management, cloud wifi controller, cloud managed wireless, cloud managed wireless access point
    
Ruckus Wireless
Published By: Ruckus Wireless     Published Date: Aug 08, 2016
Belleville Township High School District 201 serves 4,700 students. Challenge: Legacy Ubiquiti infrastructure was unable to support more than 30 clients per AP. Solution: 11ac APs provided superior WiFi performance and network reliability.
Tags : 
cloud based access point, cloud based wifi, cloud managed wifi, cloud wifi, cloud based wifi management, cloud wifi controller, cloud managed wireless, cloud managed wireless access point, wifi for schools
    
Ruckus Wireless
Published By: Okta     Published Date: Nov 09, 2015
Gartner has named Okta as the only leader in its 2015 Identity & Access Management as a Service (IDaaS) Magic Quadrant. Access your complimentary Gartner report today.
Tags : 
okta, gartner, magic quadrant, identity and management, idaas, it management, data management
    
Okta
Published By: Okta     Published Date: Nov 09, 2015
Enterprise mobility management and identity and access management offerings are moving toward meaningful integration. IAM and mobility leaders must take advantage to gain convenience, security and efficiency benefits. Read this report to learn more.
Tags : 
okta, enterprise mobility, mobility management, access management, mobility leaders, efficiency, efficiency benefits, security, knowledge management, data management
    
Okta
Published By: Okta     Published Date: Nov 09, 2015
This Forrester report outlines the future IT environment for security and risk (S&R) executives working on building an identity and access management strategy for the extended enterprise. Read this report to learn more.
Tags : 
okta, forrester, identity and access management, it environment, security and risk, security, it management, data management
    
Okta
Published By: Dassault Systmes     Published Date: Aug 08, 2017
Midsize Aerospace and Aviation manufacturers need to choose a system that quickly delivers the core capabilities they need to streamline product development but also gives them room to grow value over time. Product Lifecycle Management (PLM) software can help. It drives better product development performance by managing product-related data, processes and projects. While smaller companies may be able to control, access and share product data with relatively simple Product Data Management (PDM) tools, larger manufacturers rely on full featured PLM systems that help automate processes and share data across global Aerospace and Aviation companies.
Tags : 
aerospace, aviation, manufacturing, product development, plm, product lifecycle management, automation, data
    
Dassault Systmes
Published By: Dassault Systmes     Published Date: Aug 08, 2017
Industrial Equipment Manufacturers have to connect closely with customers and introduce new products quickly and efficiently to meet their needs. While smaller Industrial Equipment Manufacturers may be able to control, access, and share product data with relatively simple Product Data Management (PDM) tools, larger Industrial Equipment Manufacturers rely on full-featured PLM systems that help automate processes and share data across global supply chains. Industrial Equipment Manufacturer companies may find themselves in-between because: Product and organizational complexity drive them beyond basic PDM capabilities A full-featured PLM implementation may feel out of reach They need to choose a system that quickly delivers the core capabilities they need to streamline product development but also gives them room to grow value over time. Whats the right size PLM to fit an Industrial Equipment Manufacturer? Lets take a look.
Tags : 
pdm, product data management, industrial, equipment manufacturers, plm, dassault
    
Dassault Systmes
Published By: CA Technologies EMEA     Published Date: May 25, 2018
As cycles accelerate and timelines shorten, projects are being recognizedby necessity as the delivery arm for strategy. In this environment, anything less than real-time access to real-time project data is too slow, because businesses need to know where theyre heading, not just where theyve been. CA Project & Portfolio Management (CA PPM 15.3) has added new capabilities to support project, financial and resource management across individual initiatives and entire portfolios. Weve also built new, embedded BI capabilities that make powerful data and insights more accessible to everyone.
Tags : 
budgets, project, cash, flows, finance, project, management
    
CA Technologies EMEA
Published By: OKTA     Published Date: Sep 26, 2017
Cyberbreaches arent just in the newsthey are the news. Yet headlines rarely mention the No. 1 source of those breaches: weak or stolen passwords. Whether they involve malware, hacking, phishing, or social engineering, the vast majority of breaches begin with account compromise and credential theft, followed by dormant lateral network movement and data exfiltration. In fact, weak or stolen passwords account for a staggering 81% of breaches, according to the Verizon 2017 Data Breach Investigations Report. Not surprisingly, a new Okta-sponsored IDG survey finds that identity access management (IAM) is a top priority for nearly three-quarters (74%) of IT and security leaders. Yet the same survey uncovers widespread concern that their current IAM implementations are falling short. Just one worrisome example: Fewer than one-third (30%) of respondents report a good or better ability to detect a compromise of credentials. The following report explores the gap between respondents aspiratio
Tags : 
    
OKTA
Published By: OKTA     Published Date: Sep 26, 2017
Traditional web applications pre-date modern standards like SAML and OpenIDConnect, so they often use legacy authentication methods to grant end users access. Historically, providing Single Sign-On and centralized access management for end users across these legacy applications required a Web Access Management, or WAM, product. These on-premises software tools could be expensive to maintain and complex to deploy. Now, modern identity providers like Okta in conjunction with best-of-breed network management technologies offer a better way. This white paper describes how web applications that lack modern standard support can be integrated into a cloud-based Identity-as-a-service architecture.
Tags : 
    
OKTA
Published By: Motorola Solutions     Published Date: Jun 24, 2019
At Motorola Solutions, our purpose is simple; we create mission-critical communication solutions to help our customers build safer cities and thriving communities. Thats why we recently acquired Avigilon, an industry leader in video, access control and video analytics solutions, in our ongoing effort to provide trusted security solutions to our customers to help them be their best in the moments that matter. In the modern world of utilities, when it comes to providing electricity to light the family kitchen, transporting clean drinking water across many miles to the tap, or delivering the natural gas that heats the oven everything must follow a process. At the frontline of ensuring these processes remain consistent, is having the ability to instantly know when an incident occurs that can disrupt the critical work that needs to be done. Avigilon access control and video management software is available to help utility operations ensure their critical processes are protected, so servi
Tags : 
    
Motorola Solutions
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Challenge Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isnt surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure. Opportunity Knowing your privileged users is knowing your risk. Privileged access management tools themselves must be able to support automation in the authorization process and enable scalability through support for both dynamic operations and ephemeral infrastructure. Benefits Better pinpointing attacks exploiting credential theft isnt simply a question of accumulating more data but involves incorporating better data about privileged user behaviour, which can identify significant changes that represent real risk.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
La sfida Come ci si pu aspettare, le aziende che intraprendono un percorso di digital transformation devono affrontare maggiori problemi correlati a rischi e sicurezza. Le iniziative di digital transformation aumentano inevitabilmente il numero dei punti di accesso all'infrastruttura aziendale che sfuggono ai controlli esistenti, sono accessibili a un numero superiore di set di identit diversi e proliferano all'interno di un'infrastruttura distribuita e dinamica. L'opportunit Conoscere i propri utenti con privilegi significa conoscere i rischi. Di per s, gli strumenti di privileged access management devono essere in grado di supportare l'automazione nel processo di autorizzazione e garantire la scalabilit attraverso il supporto di operations dinamiche e infrastrutture effimere, come gli account amministrativi Amazon Web Services (AWS) per le identit umane.
Tags : 
    
CA Technologies EMEA
Published By: F5 Networks Inc     Published Date: Jan 03, 2014
Today, the shift to a cloud-based enterprise IT architecture is a foregone conclusion for a variety of organizations. As a result, cloud-based security has become a top priority. Read this whitepaper to learn about the challenges of cloud-based security and identity and access management as well as how your business can overcome these challenges with best-in-class solutions.
Tags : 
idc, cloud, cloud federation, identity and access management, iam, security, silos, deployment, access control, application security, authentication, identity management, password management, security management, cloud computing
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jan 03, 2014
In today's cloud-based, mobile IT world, the need for security is rapidly growing. As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what is also growing. This Technology Spotlight discusses the challenges of cloud identity access management and provides guidance on which IAM architectural solutions would benefit your business.
Tags : 
security, cloud, application delivery, authentication, access control, application security, silos, password fatigue, iam, identity management, password management, security management, cloud computing
    
F5 Networks Inc
Published By: Burton Group     Published Date: Jul 07, 2008
The identity federation market enjoys an exceptional supply of products. With well over a dozen products available to enterprise customers, most architects have more choices than time will allow for evaluation. This abundance of products is partly the result of the inherent difficulty of developing a truly multipurpose federation server. Although federation products are similar in name, each has its own personality and idiosyncrasies that make it suitable for certain environments but insufficient in others.
Tags : 
fim, federated identity management, identity federation, access control, identity management, passport, burton group, networking, password management
    
Burton Group
Published By: Entrust Datacard     Published Date: Sep 14, 2018
Digital is changing the face of business, and your security needs are evolving along with it. The widespread adoption of technologies and applications like mobile, VPN and Office 365 have enabled your users a more frictionless work experience. But how can you ensure those experiences are also secure? Forrester recently surveyed 100 IT and security executives to understand their current approaches to user authentication and access management. Check out the 2018 Forrester Opportunity Snapshot Modern Authentication Methods Protect and Enable study to learn what authentication methods other companies are using and which of these methods are most effective.
Tags : 
authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
    
Entrust Datacard
Published By: Revinetix, Inc.     Published Date: Nov 03, 2010
Ensuring immediate access to business critical data following a disaster event is a top priority for IT management. More organizations are replicating their backups to remote locations for disaster recovery.
Tags : 
revinetix, disaster recovery, business continuity, remote backup replication, business critical data, disk backup, remote replication, remote access, remote network management, backup and recovery, data protection
    
Revinetix, Inc.
Published By: Quest Software     Published Date: Jul 28, 2011
In this white paper Quest's data protection experts offer five tips for effective backup and recovery to help you avoid the challenges that might keep you from fully protecting your virtual assets and infrastructure.
Tags : 
quest, storage virtualization, it management, systems management solutions, virtualization managemen, windows, database, application, oem, innovation accelerator, smb, recovery, data protection, identity management, development, optimization, access management, migration, consolidation, performance
    
Quest Software
Published By: Citrix Systems     Published Date: Oct 07, 2014
Citrix XenDesktop is the clear choice for mobilizing Windows apps and desktops. Whether you are looking to deliver Windows apps and desktops to mobile users, reduce costs and management through desktop virtualization, or secure intellectual property, XenDesktop is the only solution able to meet all your needs from a single, easy to deploy platform. It quickly and securely delivers mobile access to individual apps or complete desktops while maintaining a high definition user experience.
Tags : 
mobilizing, windows, intellectual property, secure, desktops, virtualization, high definition, user experience, deliver, access, app, cost, management, it management, wireless
    
Citrix Systems
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.