access management

Results 301 - 325 of 520Sort Results By: Published Date | Title | Company Name
Published By: Ring Central     Published Date: Nov 08, 2013
In this info graphic, you will learn how the workplace has developed over time. The hours, ways and means employees work has become increasingly flexible. Stay ahead of evolving business needs with communications that enable people to work the way they want.
Tags : 
ring central, workforce, workforce management, remote access, working remotely, employee performance, productivity, flexibility
    
Ring Central
Published By: IBM     Published Date: Jul 09, 2009
Value-driven product management is a repeatable process based on industry best practices that uses subjective and objective criteria to deliver successful products. This paper explains how assessment, alignment, achievability, accessibility, agility and accountability, the six key concepts of value-driven product management, can be applied to create a repeatable process for developing successful products.
Tags : 
ibm, telelogic, product success, value-driven, product management, assessment, alignment, achievability
    
IBM
Published By: Aerohive     Published Date: Oct 12, 2011
Virtualization, cloud computing, and wireless technology are fundamentally changing enterprise computing, providing revolutionary gains in productivity and cost savings. Powerful enterprise applications can now be delivered to almost any device, anywhere, at any time.
Tags : 
aerohive, virtualization, cloud computing, wireless technology, access points, mobile internet devices, wi-fi devices, routing
    
Aerohive
Published By: Marketo, INC.     Published Date: Sep 25, 2008
In this free marketing Webcast, learn how two very different companies used lead management technology to significantly increase conversion rates—by as much as 500 percent!  Discover: key criteria for selecting a lead management solution... how to get up and running quickly, while avoiding needless costs... how to achieve the marketing results you want—and make it easy to access those numbers anytime.  Find out what lead management can do for your company. View this free Webcast now.
Tags : 
lead management, marketo, conversion, knowledge management, contact management
    
Marketo, INC.
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml
    
Ping Identity
Published By: Ping Identity     Published Date: May 05, 2009
With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise’s security domain to outsourced services, including business process outsourcing (BPO) and software as a service (SaaS) providers, and trading partners, as well as within the enterprise to affiliates and subsidiaries. Learn more today!
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml
    
Ping Identity
Published By: Quark, Inc.     Published Date: Apr 28, 2011
Download this white paper to learn how to deal with the challenge of delivering high-quality information and how to overcome the inherent limitations of traditional publishing techniques.
Tags : 
quark, compliance, high-quality, accessibility, traditional publishing, data integration, collaboration, personalization
    
Quark, Inc.
Published By: Quark, Inc.     Published Date: Apr 28, 2011
Download this white paper to learn how to deal with the challenge of delivering high-quality information and how to overcome the inherent limitations of traditional publishing techniques.
Tags : 
quark, compliance, high-quality, accessibility, traditional publishing, data integration, collaboration, personalization
    
Quark, Inc.
Published By: Intralinks     Published Date: Oct 30, 2014
Are you struggling with finding an enterprise collaboration solution thats both easy to use and secure enough for your organization to share information outside the firewall? With the infiltration of consumer devices and applications into the enterprise, its even more difficult to control access to confidential data while enabling employees to get work done. This 16-page Buyers Guide to Enterprise Collaboration addresses the three key drivers of the selection process: Risk management strategy Accelerating business productivity Improving IT efficiency Even if you are already in an RFP process, or just starting to figure out your requirements, this Buyers Guide provides insight into the factors you should be considering, keepi
Tags : 
enterprise collaboration, firewall, risk management strategy, business productivity, it efficiency, security, enterprise applications
    
Intralinks
Published By: Dropbox for Business     Published Date: May 07, 2015
Discusses the challenges organizations face when evaluating Enterprise File Sync and Share solutions
Tags : 
efss, accessibility, cloud storage, content management, mobility, virtualization, storage management, storage virtualization
    
Dropbox for Business
Published By: AtTask     Published Date: Jul 17, 2014
When it comes to project management, we tend to talk about the tacticalthe assignments, the tasks, the approvals, and so on. But business is evolving, and many project teams are now being asked to lead change, instead of just timelines and milestones. This evolution is accelerating and is driven by fresh thinking and business necessity supported by advanced technologies that are highly accessible to a much broader range of contributors. Effectively managing work is no longer just the role of a few specialists. In this Whitepaper you will learn lessons from 40 PPM experts on making the transition from project management to project leadership.
Tags : 
at task, it organizations, work requests, technology changes, project updates, status reports, project management, knowledge management
    
AtTask
Published By: Soonr     Published Date: Sep 03, 2014
Business happens at the speed of right now across departmental, physical, geographical and organizational lines. Secure, anywhere, anytime access to the most up-to-minute business content ensures that employees, partners and customers can do business faster. Neither remote VPN access nor cloud-only sharing solutions provide the flexibility, security, and universal access required to support todays business. Whats needed is a solution that offers the benefits of cloud-based file access along with the control and manageability of local file systems. Discover the Soonr Hybrid Cloud Sync and Share Solution that preserves existing file server infrastructure, while delivering complete mobile file sharing and collaboration capabilities.
Tags : 
soonr, cloud, sync and share, security, solutions, business support, vpn access, cloud sharingsoonr
    
Soonr
Published By: VMware AirWatch     Published Date: Dec 08, 2016
Todays workforce accesses corporate content from the office, home, and everywhere in between. They utilize non-Windows devices including iOS, Android and Mac, and demand that IT support the specialized apps they need to get the job done. Savvy organizations have embraced desktop and application virtualization to meet these demands. Download this asset to learn how Horizon Cloud with on-premises infrastructure represents a new approach to building, delivering and managing virtual workspaces. This radically simple and scalable service unifies the management of on-premises virtual workspace services (desktops and applications) through a centralized cloud control plane, enabling delivery of virtual desktops and apps for as little as $0.50/user.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Dec 09, 2016
The average organization owns about 2,500 apps - making a secure, seamless, scalable virtual workspace strategy easier said than architected. Businesses find themselves scrambling to deploy virtual workspace solutions that meet both mobile end-users' and IT's demands. In this white paper, you'll find five key criteria you must implement in order to effectively execute your mobile workspace plans. Get details on how to offer: A single point of access for productivity and tools Easy app navigation and management Personalization and customization And more
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of todays mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any devicemobile or laptopat any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of todays mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any devicemobile or laptopat any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of todays mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any devicemobile or laptopat any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of todays mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any devicemobile or laptopat any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of todays mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any devicemobile or laptopat any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch
Published By: Okta     Published Date: May 12, 2017
This report describes how security and risk professionals (S&R pros) can apply risk concepts across the entire iAM process portfolio and use behavior-based trending methods to reduce security exposure, ease the burden of iAM policy management, and improve the user experience.
Tags : 
    
Okta
Published By: Rackspace     Published Date: Mar 08, 2016
Why you should care about Identity-as-a-Service (IDaaS): An Experts perspective
Tags : 
organization, identity solutions, cloud management, access management, best practices, content management
    
Rackspace
Published By: AWS     Published Date: Oct 02, 2019
As organizations expand their cloud footprints, they need to reevaluate and consider who has access to their infrastructure at any given time. This can often be a large undertaking and lead to complex, sprawling network security interfaces across applications, workloads, and containers. Aporeto on Amazon Web Services (AWS) enables security administrators to unify their security management and visibility to create consistent policies across all their instances and containerized environments. Join the upcoming webinar to learn how Informatica leveraged Aporeto to create secure, keyless access for all their users.
Tags : 
    
AWS
Published By: SAP     Published Date: Feb 11, 2011
Read this Aberdeen Group research report, "Access Management: Efficiency, Confidence and Control" and learn how top performers protect access to information assets at lower cost while staying on top of compliance.
Tags : 
sap, access management, efficiency, confidence, control, auditors, access control, information management
    
SAP
Published By: SAP     Published Date: Nov 22, 2011
Newell Rubbermaid sought to reduce time and effort to access information. They wanted to simplify access to global sales data and financial metrics. They also wanted to accelerate report query performance and improve decision making. SAP was selected because they are a comprehensive software program from a single vendor. Read to find out more.
Tags : 
sap, newell rubbermaid, data access, information management, technology, software, whitepaper, sales data
    
SAP
Published By: SAP     Published Date: Nov 22, 2011
Today's competitive and fast-paced business environment requires that more people have access to real-time performance and status information, so they can make quick and intelligent decisions. The need for timely and succinct business intelligence continues to grow as executives demand critical information to seize opportunities faster than competitors and to address potential problems in the making. C-level executives and upper management aren't the only staff needing access to business intelligence. Business unit managers and rank-and-file personnel increasingly must also have updated information to do their jobs. This white paper discusses the features and benefits of next generation dashboards.
Tags : 
ziff davis enterprise, dashboards, business intelligence, technology, business trends, bi solutions, analytical applications, data protection
    
SAP
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.