access management

Results 1 - 25 of 513Sort Results By: Published Date | Title | Company Name
Published By: SAP Concur     Published Date: Aug 07, 2019
"Companies need to provide a seamless experience for their road warriors who are traversing the globe in search of new clients, attending conferences, exploring new business opportunities and checking on projects. The goal of automating the T&E function isn’t just to save the company time and money, although that is a significant consideration. With policies in place, companies can ensure that business travelers are adhering to allowances for meals, hotels and other travel-related expenses. Companies that establish clear policies for how employees can book and pay for travel — and which vendors to use — can negotiate discounts and rewards with hotels, rental car agencies and airlines. In addition to the financial benefits of an expense management policy, employee satisfaction is also at stake. Creating a realistic travel policy that is clear, simple and easily accessible makes employees happy. A quick and hassle-free travel expense management process reduces traveler stress, enabling
Tags : 
    
SAP Concur
Published By: BeyondTrust     Published Date: Jul 29, 2019
What It is & Why Now Is The Time To Implement It
Tags : 
    
BeyondTrust
Published By: Akamai Technologies     Published Date: Jul 25, 2019
Treue- und Prämienprogramme sind effektive Mittel, mit denen Marken die Interaktion, Akquise und Treue von Mitgliedern steigern können. Erfahren Sie, warum führende Marken auf moderne CIAM-Lösungen (Customer Identity and Access Management) setzen und damit ihre Treueprogramme skalieren, das Nutzererlebnis verbessern und den ROI maximieren. In diesem Whitepaper erfahren Sie, welche Herausforderungen Sie bei der Transformation, Erweiterung und Skalierung von Kundenbindungs- und Prämienprogrammen und damit verbundenen Mitgliedschaftsinitiativen meistern müssen. Darüber hinaus stellen wir Ihnen Lösungen vor, die auf tiefgehenden Einblicken in vier praxisnahe Fallstudien basieren. Wir untersuchen die Anforderungen an eine unternehmensweite CIAM-Lösung und sprechen verwandte Themen wie „Entwicklung oder Kauf“ und „CIAM vs. IAM“ an. Anhand von vier verschiedenen Fallstudien – und den daraus resultierenden Identitätsmanagement-Lösungen, die durch das jeweilige Unternehmen implementiert wurde
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jul 25, 2019
Das Customer Identity and Access Management (CIAM) spielt für Marken, die ihren anspruchsvollen Kunden ein nahtloses, sicheres digitales Erlebnis bieten wollen, eine immer größere Rolle. Als Teil des Identity and Access Management Playbook bietet Forrester Research Unterstützung beim Aufbau eines kundenorientierten IAM-Teams, das über die nötigen technischen Fähigkeiten, Geschäftspraktiken und zwischenmenschlichen Eigenschaften verfügt, um eine CIAM-Strategie zu entwerfen und sie über verschiedene Funktionsgruppen hinweg zu implementieren. Lesen Sie den vollständigen Bericht, um zu erfahren, was Sie bei der effektiven Gestaltung eines CIAM-Teams berücksichtigen sollten. Die Kernpunkte des Berichts: ? Vier wichtige Rollen für Ihr CIAM-Team ? Warum die gemeinsame Nutzung und Integration von Kundendaten über Unternehmensgrenzen hinweg entscheidend für den Erfolg ist ? Die wichtigsten technischen, geschäftlichen und zwischenmenschlichen Fähigkeiten, die die Mitglieder Ihres CIAM-Teams mit
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jul 25, 2019
Heutzutage zählen die Identität der Kunden und die damit verbundenen persönlichen Daten zu den wichtigsten und wertvollsten Ressourcen jedes Unternehmens. Die Verwaltung dieser digitalen Identitäten (von der ersten Registrierung und Anmeldung bis zu den späteren Phasen der Kundenbeziehung) und die Verwertung der dazugehörigen Daten sind komplexe Aufgaben, die häufig als CIAM (Customer Identity and Access Management) bezeichnet werden. Wenn Unternehmen ein System zur Erfassung, Verwaltung und Nutzung von Daten zu digitalen Identitäten und Kunden implementieren, haben sie grundsätzlich zwei Möglichkeiten: Sie können ein eigenes Produkt entwickeln oder eine dedizierte Lösung von einem auf CIAM spezialisierten Anbieter kaufen. In diesem Whitepaper finden Sie eine detaillierte Analyse der CIAM-Implementierungsoptionen, darunter Folgendes: ? die wichtigsten Voraussetzungen für ein erfolgreiches CIAM-System für Unternehmen ? Vor- und Nachteile verschiedener Varianten der CIAM-Implementierun
Tags : 
    
Akamai Technologies
Published By: Simba by Magnitude     Published Date: Jul 12, 2019
Today’s C-level executives expect data and analytics to provide them with speed and agility to deliver competitive advantage and to disrupt new markets. But, in today’s complex data environment exists a near paradox between these expectations, that companies will be able to rapidly deliver value using data and analytics--and the complexities of the data landscape, making it more difficult to find, govern, connect to and access the data needed to deliver that value. Once thing is clear: if management expectation is to be met, simplifying connectivity is a must.In this white paper, veteran analyst Mike Ferguson, Managing Director of Intelligent Business Strategies explores how simplifying data access –connectivity –aligns expectations with data realities thus decreasing time to value.
Tags : 
    
Simba by Magnitude
Published By: Deltek     Published Date: Jul 10, 2019
Having real-time access to engagement information via a cloud-based, integrated, information infrastructure is critical in delivering high-value, on time engagements that always delight clients. So why do so many consulting firms fail in this area, that they constantly advise clients on? Enjoy a complimentary copy of ProjectManagement.com’s new white paper on how an effective information infrastructure will ensure client excellence. Author Andy Jordan, consulting firm owner and industry expert, reveals the 5 ways to exceed client expectations and how consulting firms can leverage technology to achieve client excellence. Download the white paper today!
Tags : 
    
Deltek
Published By: Akamai Technologies     Published Date: Jul 02, 2019
Loyalty and rewards programs are powerful tools for brands to boost member engagement, acquisition, and retention. Learn why leading brands are turning to modern customer identity and access management (CIAM) solutions to scale their loyalty programs, improve user experience, and maximize ROI. In this paper, we identify the challenges associated with transforming, expanding, and scaling customer loyalty and rewards programs and related membership initiatives, and present solutions based on real-world case studies from four industries. We explore the requirements for an enterprise-grade CIAM solution and address related issues such as build vs. buy and CIAM vs. IAM. By examining four diverse case studies — and the resulting identity management solutions that were implemented by the respective companies — this paper provides valuable insight for any enterprise wishing to expand or uplift its customer loyalty program to meet membership needs in the age of the consumer.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jul 02, 2019
In today’s markets, customer identities and the personal data associated with them are among the most critical and valuable assets of any enterprise. Managing these digital identities — from first registration and login to the later stages of the customer relationship — and extracting business value from the associated data are complex tasks, commonly referred to as customer identity and access management (CIAM). When implementing a system to collect, manage, and utilize digital identity and customer data, companies have two basic choices: in-house development or buying a dedicated solution from a vendor specialized in CIAM (i.e., build vs. buy). Read this white paper for an in-depth analysis of CIAM implementation options, including: ? Must-haves for a successful, enterprise-grade CIAM system ? Pros and cons of implementation options, ranging from in-house software development to commercial off-the-shelf solutions ? A real-world case study that illustrates the ROI of an effective CI
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jul 02, 2019
Customer identity and access management (CIAM) is increasingly important for brands to deliver the seamless, secure digital experiences demanded by empowered consumers. As part of its Identity and Access Management Playbook, Forrester Research provides guidance to build a customer-obsessed IAM team that has the technical skills, business influence, and interpersonal attributes to architect a CIAM strategy and roll it out across functional groups. Read the full report to learn critical considerations to make your CIAM team effective. Report highlights: ? Four essential roles for your CIAM team ? Why sharing and integrating customer data across organization barriers is critical for success ? The most important technical, business, and interpersonal skills to look for in CIAM candidates
Tags : 
    
Akamai Technologies
Published By: Group M_IBM Q2'19     Published Date: Jul 01, 2019
This white paper considers the pressures that enterprises face as the volume, variety, and velocity of relevant data mount and the time to insight seems unacceptably long. Most IT environments seeking to leverage statistical data in a useful way for analysis that can power decision making must glean that data from many sources, put it together in a relational database that requires special configuration and tuning, and only then make it available for data scientists to build models that are useful for business analysts. The complexity of all this is further compounded by the need to collect and analyze data that may reside in a classic datacenter on the premises as well as in private and public cloud systems. This need demands that the configuration support a hybrid cloud environment. After describing these issues, we consider the usefulness of a purpose-built database system that can accelerate access to and management of relevant data and is designed to deliver high performance for t
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q3'19     Published Date: Jul 01, 2019
This white paper considers the pressures that enterprises face as the volume, variety, and velocity of relevant data mount and the time to insight seems unacceptably long. Most IT environments seeking to leverage statistical data in a useful way for analysis that can power decision making must glean that data from many sources, put it together in a relational database that requires special configuration and tuning, and only then make it available for data scientists to build models that are useful for business analysts. The complexity of all this is further compounded by the need to collect and analyze data that may reside in a classic datacenter on the premises as well as in private and public cloud systems. This need demands that the configuration support a hybrid cloud environment. After describing these issues, we consider the usefulness of a purpose-built database system that can accelerate access to and management of relevant data and is designed to deliver high performance for t
Tags : 
    
Group M_IBM Q3'19
Published By: SAS     Published Date: Jun 27, 2019
The health care world is changing. And data has a role to play in that change. Traditional health care systems are becoming more accessible and convenient, while also offering lower priced options. Proactive care — rather than reactive — is expected, including a shift from disease management to disease prevention. Likewise, a greater emphasis on personalized delivery, including understanding populations, has led to increased precision in holistic care management. Combining conventional data sources with data from previously untapped data sources — such as electronic health records, wearables, social determinants, social media, genetics and diagnostics — creates new possibilities for understanding the patterns, relationships, and predictors of wellness and health. Keep reading this e-book to discover how health care leaders are generating new opportunities for innovation and transforming how care is delivered.
Tags : 
    
SAS
Published By: Motorola Solutions     Published Date: Jun 24, 2019
At Motorola Solutions, our purpose is simple; we create mission-critical communication solutions to help our customers build safer cities and thriving communities. That’s why we recently acquired Avigilon, an industry leader in video, access control and video analytics solutions, in our ongoing effort to provide trusted security solutions to our customers to help them be their best in the moments that matter. In the modern world of utilities, when it comes to providing electricity to light the family kitchen, transporting clean drinking water across many miles to the tap, or delivering the natural gas that heats the oven — everything must follow a process. At the frontline of ensuring these processes remain consistent, is having the ability to instantly know when an incident occurs that can disrupt the critical work that needs to be done. Avigilon access control and video management software is available to help utility operations ensure their critical processes are protected, so servi
Tags : 
    
Motorola Solutions
Published By: Schneider Electric     Published Date: Jun 07, 2019
Because electricity is a key commodity for business it represents significant financial risk. Yet many power management systems remain isolated and separate from the rest of the business enterprise. The result is poor access to incomplete information, with only limited knowledge of risk exposure. An integrated, comprehensive power management system that includes metering, software, and power quality mitigation equipment offers the most holistic, systems-based approach to managing this risk exposure.
Tags : 
financial risk, power management system, quality migration, schneider electric, pms
    
Schneider Electric
Published By: Alert Logic     Published Date: May 23, 2019
In our first cyber security checklist, we provided a security overview and best practices to help organizations prevent an initial compromise from occurring. In this guide, we will help you understand practical steps you can take to mitigate techniques attackers use once they have penetrated your defenses. Once attackers have access to a machine, they can evade detection by using fileless techniques and legitimate system administration tools to do their dirty work. With this checklist, you will have a guide to help mitigate the impact of an attacker. Lastly, we will hep you understand how partnering with a company like Alert Logic can provide better defenses to stop attackers in their tracks. This checklist helps to explain how to: • How to manage and limit PowerShell access • Securing and utilizing Windows Management Instrumentation (WMI) • Ways to apply application controls • Following the principle of least privilege and applying access controls • What to monitor for to help uncover
Tags : 
    
Alert Logic
Published By: SailPoint Technologies     Published Date: May 08, 2019
In our 26-criterion evaluation of identity management and governance (IMG) providers, we identified the nine most significant ones — CA Technologies, IBM, Ivanti, Micro Focus, Omada, One Identity, RSA Security, SailPoint Technologies, Saviynt — and researched, analyzed, and scored them. This report shows how each provider measures up and helps security and risk (S&R) professionals make the right choice.
Tags : 
    
SailPoint Technologies
Published By: BlackBerry Cylance     Published Date: Apr 26, 2019
The Sydney Opera House is one of the world’s busiest performing arts centers and Australia’s number one tourist destination. Each year, it attracts more than 8.2 million visitors on site and stages more than 2,000 performances attended by over 1.5 million people. Since opening its doors in 1973, the Opera House has become the symbol of modern Australia and the country’s premier tourist destination, with an iconic national-identity value that Deloitte Access Economics has estimated at $4.6 billion. On the Opera House’s 40th anniversary, it embarked on a Decade of Renewal, a series of projects to prepare the Opera House for future generations of artists, audiences, and visitors. Because renewal isn’t just about the building and the arts; it’s also about renewing technology and systems. This enabled the Opera House to engage VMtech and BlackBerry Cylance to modernize its IT server and network infrastructure, as well as information management, privacy, and cybersecurity.
Tags : 
    
BlackBerry Cylance
Published By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
This report describes the results from a groundbreaking global study by Thycotic that reveals major risk and compliance gaps in how organizations manage and secure their privileged accounts and access to sensitive systems, infrastructure and data. The 2018 Global State of Privileged Access Management (PAM) Risk & Compliance report highlights where many organizations are failing to fully put security controls in place to protect their most critical information assets.
Tags : 
    
Group M_IBM Q2'19
Published By: Illusive Networks     Published Date: Apr 10, 2019
Attack Surface Manager (ASM) gives security teams unprecedented power to easily implement a cyber hygiene program to harden their networks against malicious lateral movement of cyberattackers. This paper provides an overview of common ways that Illusive's customers are using Attack Surface Manager, including fortifying PAM/PIM solutions, detecting insider threats and malicious insider activity, and providing powerful, automated Red Team functions.
Tags : 
attack surface, cyber hygiene, vulnerability management, vulnerabilities, network vulnerability, threat management, vulnerability assessment, network security, privileged access management, identity access management, pam/pim solutions, illusive networks
    
Illusive Networks
Published By: Illusive Networks     Published Date: Apr 10, 2019
Do you know how attackers can move once they’re inside your network? The access footprint changes constantly as users log on and off, restart systems, change roles, and access resources. Until now, these conditions have only been visible when skilled analysts inspect individual systems. Attack Surface Manager reveals hidden credentials and paths to critical systems so you can continuously impede attacker movement—without impeding the business.
Tags : 
attack surface, cyber hygiene, vulnerability management, vulnerabilities, network vulnerability, threat management, vulnerability assessment, network security, privileged access management, identity access management, illusive networks
    
Illusive Networks
Published By: BeyondTrust     Published Date: Apr 04, 2019
Unix and Linux build the foundation for most business-critical systems. Thus, these present target-rich environments for cyber-attackers. Privileged Access Management (PAM) helps to mitigate such risks. To succeed, organizations must follow an integrated approach, covering both privilege elevation and centralized management of shared account credentials.
Tags : 
    
BeyondTrust
Published By: CheckMarx     Published Date: Apr 03, 2019
In the early years of software development, you would often design it, build it, and only then think about how to secure it. This was arguably fine in the days of monolithic applications and closed networks, when good perimeter-based protection and effective identity and access management would get you a long way towards minimising the risk. In today’s highly connected, API-driven application environments, however, any given software component or service can be invoked and potentially abused in so many different ways. Add to this the increasing pace of change through iterative ‘DevOps-style’ delivery and ever-faster release cycles, and many understandably assert that security management and assurance nowadays needs to be an ongoing and embedded part of the development and delivery process.
Tags : 
    
CheckMarx
Published By: Schneider Electric     Published Date: Mar 28, 2019
Because electricity is a key commodity for business it represents significant financial risk. Yet many power management systems remain isolated and separate from the rest of the business enterprise. The result is poor access to incomplete information, with only limited knowledge of risk exposure. An integrated, comprehensive power management system that includes metering, software, and power quality mitigation equipment offers the most holistic, systems-based approach to managing this risk exposure.
Tags : 
financial risk, power management system, quality migration, schneider electric, pms
    
Schneider Electric
Published By: TIBCO Software     Published Date: Feb 26, 2019
Every financial services firm understands the importance of data. More is better. Sooner is better. Accessing it, understanding it, and taking advantage of it before the competition is better. In the mid-2000s, Financial Services was the first industry to strongly adopt data virtualization as a disruptive, new technology for accessing and integrating more data, faster and more easily than ever before. Buy and sell side groups at the largest institutions led the charge, followed soon after by risk management and compliance units. The leading mutual fund providers, along with hedge funds, led the next wave of adoption. In recent years, commercial banks and insurers have accelerated their use of data virtualization. And today, analyst firms such as Gartner, Inc. and Forrester project continued data virtualization adoption for both first-time use at new firms and expanded deployments at existing sites. This whitepaper provides 10 examples of TIBCO Data Virtualization enabled applications f
Tags : 
    
TIBCO Software
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.