access management

Results 276 - 300 of 526Sort Results By: Published Date | Title | Company Name
Published By: Aveksa     Published Date: Dec 07, 2007
Every large enterprise has employees who need some level of access to its critical information resources, and many also provide a wide variety of types and levels of access to contractors, partners, vendors, and customers. Each of these points of access represents a source of potential business and compliance risk.
Tags : 
access control, access certification, compliant, certification, rules, compliance, governance, risk management
    
Aveksa
Published By: Aveksa     Published Date: Feb 04, 2008
User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.
Tags : 
access control, user access, access, permissions, risk, risk management, compliance, governance
    
Aveksa
Published By: IDology     Published Date: Feb 11, 2008
There is a new automated technology available now that is helping businesses combat identity theft and prevent fraud. It is called identity proofing and it is specifically designed to verify consumer identities online. With all the fraud prevention solutions available in the market today you are probably wondering, does my company really need to use an identity proofing solution?
Tags : 
identity management, iam, access management, iam, risk management, identity theft, hackers, fraud
    
IDology
Published By: LockLizard     Published Date: Dec 08, 2008
This paper covers the development of PDF security from simple password protection mechanisms to access controls and DRM.  It discusses lifecycle management, PKI and digital certificates, PDF password security, PDF encryption, PDF DRM, Adobe livecycle / policy server, PDF control, and third party systems and standards for protecting PDF files. Normal 0 false false false EN-US X-NONE X-NONE
Tags : 
pdf security, pdf passwords, pdf drm, adobe pdf security, security, application security, encryption, password management
    
LockLizard
Published By: Intuit, Inc     Published Date: Jun 16, 2009
Nearly every business person regardless of their role – be it marketer, salesperson, consultant, engineer, or business owner – has acquired a second responsibility: project manager. In their desire to move quickly and keep costs low, many of these business people turn to the ubiquitous spreadsheet for help. Using a spreadsheet to track, update, and consolidate project information means spending valuable time on project administration – sending, receiving, and finding e-mails; cutting, pasting, consolidating, and reporting information; and reformatting, saving, and e-mailing spreadsheets.
Tags : 
intuit, quickbase, project management, available, familiar, inexpensive, immediate, spreadsheets
    
Intuit, Inc
Published By: Catapult     Published Date: Apr 23, 2009
Software-as-a-Service is changing the way companies purchase technology solutions. Rather than securing large capital budgets and tying up IT labor for months, business executives can now address mission critical initiatives with subscription-based software solutions that scale with their business and can be implemented in little to no time.
Tags : 
saas, software-as-a-setvice, on-demand, catapult, on-premise application, management solution, vpn, version lock‐in
    
Catapult
Published By: Catapult.     Published Date: Apr 23, 2009
As a software provider for a product information management solution, we were experiencing a myriad of problems supporting and servicing our on premise application – too many versions to maintain, test, install and upgrade. It was becoming increasingly difficult to support our existing customers, let alone sell to new customers.  The following information is a compilation of our research.
Tags : 
saas, software-as-a-setvice, on-demand, catapult, on-premise application, management solution, vpn, version lock‐in
    
Catapult.
Published By: EMC Corporation     Published Date: Jun 14, 2013
Transform your Microsoft Application environment with simple, efficient, and flexible virtualization solutions. EMC VSPEX Private Cloud solutions improve accessibility, centralize management, and increase performance for mission critical Microsoft Applications.
Tags : 
servers, accessibility, centralization, microsoft application, virtulization solution, cloud, networking, security
    
EMC Corporation
Published By: NetIQ     Published Date: Jul 27, 2011
Listen in as Andras Cser, Principal Analyst at Forrester Research, speaks about trends he is seeing in the Identity & Access Management (IAM) market, and specifically about the challenges and benefits of user provisioning.
Tags : 
active directory, ad administration, netiq, compliance, active directory administration, user provisioning, reduce administrative priviledge, itpa
    
NetIQ
Published By: IBM Corporation     Published Date: Jun 28, 2011
The internal staff at Ptak, Noel & Associates determined that their ability to deliver services was highly dependent upon their capability to operate with highly reliable and efficient IT operations. The changes described in this case study explain how Service Desk Management help them to achieve that goal.
Tags : 
service desk management, problem management, incident and access management, incident management process, incident management software, ptak noel & associates, it operations, service desk management
    
IBM Corporation
Published By: SAP     Published Date: Jul 17, 2012
As the "bring your own device" (BYOD) trend sweeps across the business world, it raises a huge management challenge for many companies. It changes who within an organization gets access to mobility. It also affects the way a business operates, with implications that go far beyond simply IT. BYOD presents new, fundamental questions about security, liability, and cost. Answers depend on two aspects of mobility management: device management policy and the technology used to fulfill and enforce a policy.
Tags : 
sap, mobile, managing, business, mobility, technology, mobile computing, mobile data systems
    
SAP
Published By: CDW     Published Date: Apr 04, 2016
Data Fabric is NetApps vision for the future of data management. A data fabric seamlessly connects different data management environments across disparate clouds into a cohesive, integrated whole. A Data Fabric enabled by NetApp helps organizations maintain control and choice in how they manage, secure, protect, and access their data across the hybrid cloud, no matter where it is. Although the data fabric is constantly evolving, organizations can start taking advantage of it today using NetApp technologies that enable data management and seamless data movement across the hybrid cloud.
Tags : 
data, application performance, data protection, performance optimization, cloud management, application integration, business intelligence, virtualization
    
CDW
Published By: Sage     Published Date: Jan 30, 2015
As organizations look for more ways to increase productivity and profitability, human resources departments are being asked to provide more strategic input to executives. Doing so requires tools that improve access to timely, accurate information for enhanced business decision making. If you dont have a human resource management system (HRMS), HR can end up spending too much time on repetitive day-to-day tasks like paperwork while struggling to deliver meaningful workforce insights. The right HR management software can help the HR team increase control over employee data, optimize productivity, and take employee engagement to the next level, so you can deliver the future workforce your organization needs to succeed. This white paper discusses the five areas to keep in mind when evaluating solutions to find an HRMS thats a good fit for your business.
Tags : 
sage, hr management, hr software, hrms, hr team, evaluating solutions
    
Sage
Published By: NETIQ     Published Date: Jan 12, 2017
Businesses have to elevate their view of personalization and start thinking about how to make every interaction truly personal to customers.
Tags : 
    
NETIQ
Published By: NETIQ     Published Date: Jan 12, 2017
Our analysis of the survey findings indicates that as enterprise organizations attempt to respond to the need to provide more access to more information online, the ability to govern that access is being strained to a breaking point.
Tags : 
    
NETIQ
Published By: Enterprise Mobile     Published Date: Jul 14, 2014
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. Its time to move beyond mobile device management to a more holistic management method.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management
    
Enterprise Mobile
Published By: Box     Published Date: Jan 16, 2015
Looking for the right Flash Array for you? Tired of all data being treated the same but want to save time and budget? Flash storage is helping to address the latency inherent with disk drives, enabling you to virtualize more, and reduce application response times. It's an inescapable fact that the $/GB of flash is much higher than disk drives. So why do the majority of storage vendors indiscriminately accelerate all data, regardless of its value to your business? All-flash arrays waste money by storing non-critical data in flash, and hybrid arrays can't control whether mission-critical or non-critical data accesses flash, leading to unpredictable performance. So what do you do to find a solution that addresses both of these issues? Download now and see NexGen's approach to value-driven data management. Make it simple to control what data is stored in flash and affordably tailor application performance to match your organizations priorities now!
Tags : 
nexgen, hybrid, flash, cisco, nexus, vmware, software development, it management
    
Box
Published By: HP     Published Date: Oct 01, 2014
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. At the time this definition was published, cloud was already part of industry parlance, and was beginning to take root in the general lexicon. Additionally, global business spending for infrastructure and services related to the cloud had topped $78 billion. This year, enterprise spending on the cloud will reach an estimated $174 billion, and is expected to climb to $235 billion by 2017.2 Inevitably, as both business IT and consumer mindsets evolve toward the cloud in coming years, we will continue to witness dramatic growth in IT products in some areas, and significant reductions in other areasresulting in a reshaping of the industry as a whole.
Tags : 
cloud, computing, on-demand, management, interaction, network, access, configurable
    
HP
Published By: bigtincan     Published Date: Oct 10, 2014
These days, business productivity depends largely on the ability to securely access and interact with a wide range of information over mobile devices, such as tablets and smartphones. From sales executives to field technicians, the demand for accessing corporate content securely on mobile devices is growing exponentially. In the past, implementing security measures to protect corporate content has involved VPNs, intranets, firewalls and passwords. However the increasing uptake of mobile devices in corporate settings means security measures must be implemented over a plethora of networks and devices. bigtincan has created a powerful solution with BigTinCan hub. An application for mobile devices, it allows for the distribution, management and governance of a range of content, including documents and rich media content, with enterprise-grade security.
Tags : 
mobile apps, mobile content, mobile security, corporate content
    
bigtincan
Published By: Enterprise Mobile     Published Date: Dec 11, 2014
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. Its time to move beyond mobile device management to a more holistic management method.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management
    
Enterprise Mobile
Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
With thorough planning and the help of basic access control measures as well as innovative technologies, a more secure school campus can be achieved.
Tags : 
tyco, security, access control, visitor management
    
Tyco Integrated Security
Published By: Equinix     Published Date: Mar 26, 2015
Enterprises grapple with a host of challenges that are spurring the creation of hybrid clouds: collections of computing infrastructure spread across multiple data centers and multiple cloud providers. This new concept often provokes uncertainty, which must be addressed head on. As more applications and computing resources move to the cloud, enterprises will become more dependent on cloud vendors, whether the issue is access, hosting, management, or any number of other services. Cloud consumers want to avoid vendor lock-inhaving only one cloud provider. They want to know that they will have visibility into data and systems across multiple platforms and providers. They want to be able to move servers and storage around without a negative impact on application availability. The good news is that more solutions become available every day, but with a learning curve and numerous management challenges and considerations. This CITO Research paper provides advice for managers about how to c
Tags : 
hybrid cloud, computing infrastructure, enterprises, storage, application availability, it management, data center
    
Equinix
Published By: CDW - NetApp     Published Date: Apr 07, 2016
Data Fabric is NetApps vision for the future of data management. A data fabric seamlessly connects different data management environments across disparate clouds into a cohesive, integrated whole. A Data Fabric enabled by NetApp helps organizations maintain control and choice in how they manage, secure, protect, and access their data across the hybrid cloud, no matter where it is. Although the data fabric is constantly evolving, organizations can start taking advantage of it today using NetApp technologies that enable data management and seamless data movement across the hybrid cloud.
Tags : 
data, application performance, data protection, performance optimization, cloud management, it management, enterprise applications, data management
    
CDW - NetApp
Published By: Zebra Technologies     Published Date: Jul 19, 2017
Whether youre in retail, manufacturing, warehouse management, transportation or healthcare, a mobility solution is a great way to empower your employees to do more. But maximizing the value and success of your mobility solution hinges on one critical decision: choosing the right mobile devices. This white paper takes a look at how choosing the TC51/TC56 for a mobility solution can have a significant impact on the overall success of your initiative.
Tags : 
device selection, staff collaboration, loyal shopper, delivery driver, mobility solution, device function, operating systems, os security services
    
Zebra Technologies
Published By: Google - SAP     Published Date: Nov 01, 2019
"SAP: Named a Leader in Forrester Wave for Digital Experience Platforms Experience Matters. A digital experience platform (dxP) can help you close the experience gap and deliver on customer expectations. Learn why SAP has been recognized as a leader. Get a complimentary copy of The Forrester Wave: Digital Experience Platforms, Q3 2019 report today! The analysisevaluates 10 DXP vendors side-by-side and provides detailed assessments of the product portfolio and integrations that define a strong digital experience platform. According to the report: ""SAP has unified its experience portfolio to tie the front and back office together"". ""SAP is especially strong in B2C and B2B commerce, customer identity and access management, and API management versus its peers. The companys strategy resonates, especially when it articulates its X plus O vision, and continues to have a world-class partner network"". This valuable resource is your guide for creating connected digita
Tags : 
    
Google - SAP
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.