application management

Results 551 - 575 of 1122Sort Results By: Published Date | Title | Company Name
Published By: EMC Converged Platforms     Published Date: May 26, 2016
Land Rover BAR has sharpened its competitive edge with VCE VxRail Hyper-converged Infrastructure Appliance incorporating VMware virtualization and EMC VNX storage and Isilon, to accelerate collaboration on boat development and honing sailing tactics.
Tags : 
infrastructure management, business management, best practices, application performance, application management, network management, network performance, network performance management, productivity, project management, software compliance
    
EMC Converged Platforms
Published By: Dell Software     Published Date: Jul 24, 2012
Quest Workspacetm Privilege Manager lets IT administrators grant selected privileges to users so they can update their own PCs, reducing help desk calls while maintaining a secure network. Elevate and manage user rights quickly and precisely with our Validation Logic targeting technology. Use privilege elevation rules from the Privilege Authority Community Edition, or create your own rules and allow administrator-level access to only the applications, Windows processes and ActiveX controls you deem safe.
Tags : 
user access, network security, verify files, elevate activex, setup.exe, setup.msi, elevate applications, target workstations, target validation logic, delegate privilege management, access phone support, access email support, digital certificate verification, windows, activex, knowledge management, data management, productivity, project management, desktop management
    
Dell Software
Published By: Dell Software     Published Date: Jul 25, 2012
Customization is the toughest part of maintaining an environment that keeps users productive. You have to make every desktop, whether physical or virtual, exactly right for each user without crushing IT administration resources that are already stretched to the limit.Quest Workspacetm Desktop Authority -part of Quest's User Workspace Management solution-gives you a single console to configure, manage, secure and support each user's unique workspace-including the most targeted mix possible of resources, security requirements, applications, peripherals and even Outlook settings-wherever that user logs in. Desktop Authority complements traditional desktop management-focused on software deployment and asset tracking-with true user environment management for companies of all sizes and all infrastructures.
Tags : 
desktop management, environment management, desktop authority, microsoft, web-based management, expertassist, user environment configuration, device security, real-time targetin engine, service packs, it infrastructure, patching, auditing, it management, data center
    
Dell Software
Published By: Motorola     Published Date: Feb 06, 2008
Mobile Messaging—a standards-based, wireless messaging application and management system that connects mobile workers to enterprise e-mail, contacts, calendar, notes and more. All with a messaging architecture that incorporates end-to-end encryption of all data.
Tags : 
mobile, wireless, mobile messaging, wireless messaging, motorola, motorola good, wireless communications
    
Motorola
Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
Read this white paper to find out how WatchGuard Application Control lets you take back control of your network by keeping more than 1,500 applications in check, including IM, P2P, Facebook, Skype, YouTube, and many more.
Tags : 
watchguard application control, network app, p2p applications, network security appliance, watchguard xtm, firewall, threat management, application security, firewalls, intrusion detection, intrusion prevention
    
WatchGuard Technologies
Published By: Marketo     Published Date: Jun 08, 2017
Its an exciting, albeit challenging time for marketersnew channels, strategies, and technologies have empowered us to engage our buyers like never before. At the same time, due to the abundance of available information, buyer expectations have increased, leaving marketers to fight for their attention as we showcase our products and services. In response, organizations are implementing an account-based marketing (ABM) strategy. Account-based marketing offers organizations a significant return on investment (ROI) as they are faced with the need to acquire, retain, and grow high-value accounts. This comprehensive, 100+ page guide includes checklists, worksheets, examples, and advice from over 12 industry thought leaders to help marketers at any level, from beginners to experts, create and implement an effective account-based marketing strategy. Download The Definitive Guide to Account-Based Marketing to learn: How to create a solid ABM strategy to meet your goals What stakeholders to involve across the organization How to identify, prioritize, and profile the right accounts What content you need to support an ABM strategy Which channels to leverage and how to coordinate them How to measure the effectiveness of your ABM strategy
Tags : 
access management, security information, abm, database security, application development, risk management, endpoint management, next generation intrusion protection
    
Marketo
Published By: Tidal Software     Published Date: Sep 03, 2008
With 50+ percent of all business processes leveraging batch operations, it is essential to keep your batch production running smoothly in order to keep your business running smoothly. Whether you are consolidating datacenter operations, moving apps to more cost-effective platforms, or transitioning from customized to packaged applications, learn how you can simplify and lower the cost of batch management with a single interface to all batch processes across platforms and applications and more.
Tags : 
datacenter consolidation, application consolidation, application standardization, tidal, tidal software, network architecture, business process automation, enterprise resource planning, project management, human resources services, time and attendance software, workforce management software, employee monitoring software, employee performance management
    
Tidal Software
Published By: HP SAS     Published Date: Oct 15, 2008
SAS Grid Computing delivers enterprise-class capabilities that enable SAS applications to automatically leverage grid computing, run faster and takes optimal advantage of computing resources. With grid computing as an automatic capability, it is easier and more cost-effective to allocate compute-intensive applications appropriately across computing systems. SAS Grid Manager helps automate the management of SAS Computing Grids with dynamic load balancing, resource assignment and monitoring, and job priority and termination management.
Tags : 
grid computing, sas grid computing, increase compute hardware, it infrastructure, enterprise computing infrastructure, data integration, grid monitoring, grid management, networking, it management, data management, data mining
    
HP SAS
Published By: Dell Windows Server     Published Date: Jan 16, 2009
Migrating data associated with Microsoft operating systems, applications, and other software can be a challenge administrators overlook when planning system upgrades. Del™ PowerVault™ and Dell EqualLogic™ storage and CommVault® Simpana® data management software enable flexible data migration and transparent, release-specific data object recovery and backup to help simplify upgrades in enterprise environments.
Tags : 
dell, commvault simpana, microsoft windows server 2008, data migration, microsoft operating systems, data management software, platforms, data management, windows, windows server
    
Dell Windows Server
Published By: Compuware     Published Date: May 10, 2010
If one of your servers went down today, would you know about it? Probably. But if an obscure service on a small server that is part of a much larger solution started transacting at a slower rate than normal, would you? Perhaps not. If that obscure service is responsible for a critical activity in your business, its slight reduction in performance might be a big deal that you need to know about!
Tags : 
compuware, cloud, computing, borderless applications, diversity chain, on-demand, virtualization, apm, application performance management, infrastructure, servers, application integration
    
Compuware
Published By: Okta     Published Date: Feb 24, 2015
Microsoft made a massive push to the cloud in 2014, and as a result Office 365 is taking off. Were seeing it in how Okta customers are using Okta to connect to Office 365 in increasing numbers. This eGuide provides some data from the Okta Application Network on the trends we are seeing around Office 365. It also describes the most important things to consider for Identity and Mobility Management during deployment. Office 365 is unlike any other cloud app in its complexity, and it is best for IT to plan and deploy solutions around Identity and Mobility Management in concert with their Office 365 roll-out to get maximum user adoption.
Tags : 
identity and mobility management, office 365, cloud, maximum user adoption, identity management
    
Okta
Published By: Okta     Published Date: Feb 24, 2015
With the exploding adoption of software-as-a-service (SaaS) applications, enterprise IT is fundamentally changing. While on-demand services provide tremendous ROI, they also introduce new challenges that must be overcome to truly capitalize on their potential. Identity management problems such as controlling who is granted access to which applications and data and how to control access to these applications leveraging on premise directories such as Active Directory, have become increasingly important. Single Sign-On and user management solutions that are optimized for the cloud are necessary to help address these challenges. This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : 
identity and access management, saas applications, single sign-on, active directory, management solutions, access control, identity management
    
Okta
Published By: Shavlik Technologies     Published Date: Dec 15, 2010
Shavlik Security Suite can patch online and offline virtual machines; works both with an agent-based or agentless approach; supports legacy Windows platforms and a wide range of Microsoft and third-party applications; and furthermore provides strong control of scanning options, and a level of automated remediation that is impressive.
Tags : 
shavlik, security suite, virtual machine, legacy windows platform, third-party application, protection management, automated discovery, scanning, configuration management, infrastructure, network security, compliance, patch management, business process automation, data protection
    
Shavlik Technologies
Published By: Dell     Published Date: Sep 07, 2011
More government agencies are migrating to Windows 7 for highly optimized desktops and security. Find out how.
Tags : 
windows 7, government security, security, microsoft deployment, desktop, inventory applications, windows xp, government management, government deployment, network management, remote network management, firewalls, microsoft exchange, windows, application integration, desktop management
    
Dell
Published By: Dell     Published Date: Sep 07, 2011
Take a dose of this Windows 7 desktop migration strategy. You'll have happy healthcare systems and improve patient care!
Tags : 
windows 7, microsoft deployment, desktop, inventory applications, windows xp, healthcare management, healthcare, public health, compliance, security management, windows, service management, desktop management
    
Dell
Published By: Riverbed     Published Date: Oct 12, 2012
As your business needs become more dynamic, monitoring systems will be key to understanding how applications fulfill business needs and your ability to provide governance will determine the success level of your entire enterprise.
Tags : 
service management, application visibility
    
Riverbed
Published By: Riverbed     Published Date: Oct 12, 2012
Download this paper to learn the ROI and achieved benefits from using Cascade products.
Tags : 
network performance management, network performance, application performance
    
Riverbed
Published By: Riverbed     Published Date: Oct 12, 2012
Riverbed Cascade is an application-aware network performance management solution with built-in application discovery and dependency mapping capabilities. The result is dramatically shortened project times, reduced costs, and improved efficiencies.
Tags : 
application discovery, it planning, data consolidation, virtualization, risk management, infrastructure
    
Riverbed
Published By: Box     Published Date: May 30, 2012
This report analyzes the longer-term, five-year cost of ownership and value for cloud applications across four categories: CRM, ERP, collaboration (including email), and IT service management.
Tags : 
free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace, knowledge management, enterprise applications, backup and recovery, ip storage
    
Box
Published By: Aberdeen-IBM     Published Date: Sep 12, 2012
IBM Tivoli Netcool/OMNIbus is a "manager of managers" provides a "single pane of glass" view into the health and performance of the entire IT and business infrastructure.
Tags : 
business technology, ibm, aberdeen, manager, business infrastructure, it management, application performance management, business intelligence
    
Aberdeen-IBM
Published By: Salesforce.com     Published Date: May 14, 2013
Transforming Your Business with Salesforce. Pull ahead of your competition by learning best practices for incorporating social and mobile technologies.
Tags : 
salesforce, salesforce app, sales application, crm, customer relationship management, saas crm
    
Salesforce.com
Published By: salesforce.com     Published Date: May 30, 2013
At their most basic level, CRM CEC applications handle a wide range of tasks, including engaging customers and prospects across multiple channels, and handling trouble ticketing, order management, case management, advisory services, problem diagnostics and resolution, account management, and returns management.
Tags : 
salesforce, crm, service cloud, cec, customer engagement, engagement center, engaging customers
    
salesforce.com
Published By: BMC Software     Published Date: Jan 31, 2014
Todays mature cloud-based ITSM solutions can give you the flexibility and agility you needwithout sacrificing security, stability or performance. In this THINKstrategies, Inc. white paper, youll learn why businesses are moving to cloud-based ITSM and the advantages theyve achieved. Explore how this innovative approach to IT management might be right for your organization. Please download the whitepaper to learn more.
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications, internal customers, gartner, itssm, saas, itrpm, it service support management tools, cloud-based, thinkstrategies, it management, enterprise applications, mobile computing, mobile workers
    
BMC Software
Start   Previous    16 17 18 19 20 21 22 23 24 25 26 27 28 29 30    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.