access

Results 301 - 325 of 2582Sort Results By: Published Date | Title | Company Name

Best Practices for a BI and Analytics Strategy

Published By: SAP     Published Date: Jul 17, 2012
Although IDC is expecting worldwide spending on business analytics software to be $33 billion in 2012, technology is only part of the story. The growing demand for faster response and deeper business insight is forcing companies to adopt a more pervasive approach to business intelligence (BI) that supports evidence-based decision making. Higher BI and analytics competency and pervasiveness are achieved when organizational culture, business processes, and technologies are designed and implemented with the goal of improving or automating all strategic, operational, and tactical decision making capabilities of all stakeholders. Access this paper to learn essential best practices for creating a solid BI and analytics strategy.
Tags : 
sap, best practices, business intelligence, analytics strategy, technology, business management, business technology
    
SAP

Best Practices for Authenticating Mobile Workers and Securing Data Access

Published By: Secure Computing     Published Date: Jan 25, 2008
In an environment where business and government databases store ever-increasing amounts of sensitive and confidential data; and where a growing number of employees need to access that data remotely, password security alone is insufficient to ensure user authentication. Two-factor authentication requires two measures for users to verify their identities and access data.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing, password, password management, passcode, best practices, remote access
    
Secure Computing

Best Practices for Database Privileged User Access Control

Published By: Oracle Corp.     Published Date: Oct 15, 2012
During this webcast Kamal Tbeileh, Sr. Principal Product Manager at Oracle, will discuss database access control best practices for all database users, including highly privileged users using Oracle Database Vault.
Tags : 
database, database access control, database security, database consolidation, compliance, oracle
    
Oracle Corp.

Best Practices for Deploying an Exchange 2007 Environment Using VMware ESX 3.5

Published By: HP Virtualization     Published Date: Mar 22, 2010
This white paper describes a set of best practices to deploy a 1,500-user virtualized Exchange 2007 environment using VMware® ESXT 3.5. Specifically, this project demonstrates how to configure and deploy the Exchange 2007 Mailbox, Hub Transport, and Client Access server roles onto individual VMware virtual machines (VMs), which in turn are deployed onto a single VMware ESX Server. The environment includes HP ProLiant c-Class Blade servers connected to an HP StorageWorks 4400 Enterprise Virtual Array (EVA4400) Disk Array.
Tags : 
exchange 2007, vmware, esx 3.5, virtualized exchange 2007, blade servers, storage virtualization, application integration, best practices, business integration, microsoft exchange, windows, windows server
    
HP Virtualization

Best Practices for Deploying LAN Security and NAC

Published By: Nevis Networks     Published Date: Sep 04, 2007
Companies are yearning for a solution to guard their network from security risks such as external or untrusted users, and unmanaged endpoints on their internal LAN. NAC technology works well, but a strategic solution is required to fully address the problem of the dissolving network perimeter.
Tags : 
lan, local area networking, nac, access control, network security, infrastructure, lan security, nevis, nevis networks, precision prospects
    
Nevis Networks

Best Practices for Justifying Identity and Access Management Initiatives

Published By: NetIQ     Published Date: Nov 05, 2012
An analysis of the annual Gartner survey of CIOs' most urgent priorities identifies the business and technology concerns where identity and access management has business-relevant impacts.
Tags : 
gartner, iam, identity and access management, cio, business priorities, iam initiatives, security, business technology, research
    
NetIQ

Best Practices for Mobile Content Access & File Sharing

Published By: Box     Published Date: Jul 15, 2013
File Sharing: Risk or Remedy? Info-Tech whitepaper about best practices and solution providers for mobile content access and file sharing.
Tags : 
best practices, solution, mobile content access, mobile, file sharing, mobile computing, mobile workers, wireless security, data integration, web service management, content management system, corporate portals, business technology, cloud computing
    
Box

Best Practices for Remote Replication for Oracle 10g Using XP Continuous Access

Published By: HP     Published Date: Jun 23, 2008
This paper provides a comprehensive set of test-proven best practices for properly configuring, deploying, and operating an Oracle 10g database on an HP StorageWorks XP12000 Disk Array (XP12000) in an HP-UX environment using HP StorageWorks XP Continuous Access Software as the remote copy infrastructure.
Tags : 
replication, remote replication, storageworks, hp disaster proof, disaster proof, disaster-proof, oracle, storage, remote network management, storage management, business continuity, high availability, best practices, data replication, data center design and management
    
HP

Best Practices for Securing Virtual and Cloud Environments

Published By: HP     Published Date: Jan 12, 2012
Once the cloud migration begins, finalizing SLAs with third parties, locking down the security of virtualized environments and investing in identity management, access control and reporting tools to support the new cloud business models will be essential steps to success.
Tags : 
cloud computing, cloud environment, virtualization, technology, application integration, application performance management
    
HP

Best Practices for Securing Your Enterprise LAN

Published By: AirTight Networks     Published Date: Nov 30, 1999
Making corporate data accessible through Wi-Fi networks means intruders and other unwanted visitors can easily access such networks if proper precautions and tools aren't used to protect them. This paper will discuss best practices in all five areas to secure the enterprise network, whether wired or wireless.
Tags : 
wireless, best practices, enterprise security, wi-fi, wireless security, network security, intrusion prevention, lan, local area network, local area networking, hacker detection, airtight, airtight networks, wlan, vulnerability management
    
AirTight Networks

Best Practices for Using Electronic Communications In The Public Sector

Published By: Actiance, Inc.     Published Date: Jan 15, 2015
Government and public sector agencies are just beginning to realize how social networks can improve business results. With access to real-time communication, collaboration, and social networking platforms, agencies can improve internal process efficiencies that help them provide better services to their constituents. But first, these agencies have to consider regulatory requirements like the Freedom of Information Act (FOIA) which require compliant use of these networks and the content people create on them. Read this paper to gain an understanding of: What the regulatory landscape of the public sector looks like What concerns you should be aware of from a legal perspective
Tags : 
electronic communications, public sector, social networking platforms, compliance, real-time communication, it management, enterprise applications
    
Actiance, Inc.

Best Practices: LAN Security and 802.1X

Published By: Nevis Networks     Published Date: Sep 04, 2007
While 802.1X has a growing presence, it's still immature and may not provide all the policy enforcement features commonly required in most organizations. This white paper focuses on the 802.1X standard for authentication and access control and how it compares to the Nevis approach for LAN security.
Tags : 
security policies, policy management, authentication, access control, lan, lan security, 802.1x, nevis, nevis networks, precision prospects, local area networking, network security, 802.11, wireless security
    
Nevis Networks

Best Practices: Stream Operational Data to Cloud Data Lakes for Better Business Outcomes

Published By: Attunity     Published Date: Feb 12, 2019
This technical whitepaper by Radiant Advisors covers key findings from their work with a network of Fortune 1000 companies and clients from various industries. It assesses the major trends and tips to gain access to and optimize data streaming for more valuable insights. Read this report to learn from real-world successes in modern data integration, and better understand how to maximize the use of streaming data. You will also learn about the value of populating a cloud data lake with streaming operational data, leveraging database replication, automation and other key modern data integration techniques. Download this whitepaper today for about the latest approaches on modern data integration and streaming data technologies.
Tags : 
streaming data, cloud data lakes, cloud data lake, data lake, cloud, data lakes, streaming data, change data capture, cloud computing, modern data integration, data integration, data analytics, cloud-based data lake, enterprise data, self-service data
    
Attunity

Better Access to Relevant Technical Information with Digital Libraries Drives Faster Implementation

Published By: Safari Books Online     Published Date: Feb 12, 2009
This white paper explores how this 'always on' eLearning resource can facilitate technology professionals' ability to increase productivity, pursue professional certifications, and improve collaborations and communication.
Tags : 
safari books online, digital libraries, elearning resources, professional certifications, e-reference evangelists, education, it management, knowledge management, information management, productivity, project management, elearning
    
Safari Books Online

Better Business Outcomes with Business Analytics

Published By: IBM Software     Published Date: Jan 25, 2012
Business analytics is the means by which organizations optimize business outcomes. Using insights that can be accessed, shared and acted on by employees at every level, organizations can increase profits, reduce costs, manage risk and make more accurate predictions to prepare for future outcomes. Learn why analytics-driven organizations outperform their peers.
Tags : 
ibm, cognos, business intelligence, technology, analytics, business analytics, application integration, analytical applications, data integration, data quality
    
IBM Software

Better Decision to Grow, Protect and Optimize Your Business

Published By: FICO     Published Date: Feb 06, 2018
The FICO® Enterprise Security Score measures the likelihood that you will suffer a data breach in the coming 12 months. To deliver the FICO Enterprise Security Score, we access billions of external data points at internet scale and apply our analytics to give you an empirically derived score. You can measure the cybersecurity risk of your organization, or any organization you want to work with, to see the risk you are inheriting from your supply chain. We provide the information behind your cybersecurity score so you can see where you need to take action, and you can measure the effect of improvements on your overall cybersecurity posture.
Tags : 
grow, optimize, business, enterprise, security, data, breach
    
FICO

Better Identity and Access Management in the Age of Cloud Computing

Published By: Ping Identity     Published Date: Jan 29, 2013
Corporate security compliance requirements are driving new demands/requirements for identity and access management (IAM). Learn how you can extend your enterprise beyond the perimeter with stronger security, less risk and higher efficiency.
Tags : 
access management, age of cloud computing, cloud, ping, iam, enterprise security, security, knowledge management, data management, business technology, data center
    
Ping Identity

Better Search Experiences with Unified Information Access

Published By: Lucidworks     Published Date: Aug 24, 2016
This white paper discusses the imperative demand faced by organizations to create satisfying and relevant search experiences for their users. Executives who read this white paper will learn what it means to the overall organization to provide unified information access; the impact and benefits of and challenges to pursuing a strategy to unite information across an organization; and the strategies and examples of organizations that have effectively utilized tools to support unified information access in the pursuit of delivering a superior and more relevant search experience for their users.
Tags : 
search experience, unified information access, lucidworks, information strategy, relevant search, ecommerce search
    
Lucidworks

BETTER SHIPPING IN JUST 5 STEPS.

Published By: Staples     Published Date: Jan 29, 2018
As a Staples Business Advantage® customer, exclusive content is just one of the perks you can access any time. In this white paper, we’ll share five ways you can create efficiencies and cut costs in the short and long term. For instance, vendors who aren’t looking for better efficiencies aren’t looking out for you. Get your copy today.
Tags : 
shipping, efficiency, staples business advantage
    
Staples

Beyond Data Discovery - The Value Unlocked by Modern Data Modeling

Published By: Looker     Published Date: Dec 03, 2015
The focus of modern business intelligence has been self-service; pushing data into the hands of end users more quickly with more accessible user interfaces so they can get answers fast and on their own. This has helped alleviate a major BI pain point: centralized, IT-dominated solutions have been too slow and too brittle to serve the business. What has been masked is a lack of innovation in data modeling. Data modeling is a huge, valuable component of BI that has been largely neglected. In this webinar, we discuss Looker’s novel approach to data modeling and how it powers a data exploration environment with unprecedented depth and agility. Topics covered include: • A new architecture beyond direct connect • Language-based, git-integrated data modeling • Abstractions that make SQL more powerful and more efficient
Tags : 
    
Looker

Beyond MDM: A Multidimensional Mobility Strategy

Published By: Enterprise Mobile     Published Date: Jul 09, 2013
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. It’s time to move beyond mobile device management to a more holistic management method.
Tags : 
mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management, device management, enterprise mobile devices, mobile computing, mobile device management
    
Enterprise Mobile

Beyond MDM: A Multidimensional Mobility Strategy

Published By: Enterprise Mobile     Published Date: Jul 14, 2014
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. It’s time to move beyond mobile device management to a more holistic management method.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management, device management, enterprise mobile devices, wireless, business technology
    
Enterprise Mobile

Beyond MDM: A Multidimensional Mobility Strategy

Published By: Enterprise Mobile     Published Date: Dec 11, 2014
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. It’s time to move beyond mobile device management to a more holistic management method.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management, device management, enterprise mobile devices, wireless, business technology
    
Enterprise Mobile

Beyond Passwords & Outdated Physical Access Systems

Published By: Entrust Datacard     Published Date: Oct 31, 2013
Smart credentials are the best bet for strong physical and logical access security.
Tags : 
entrust, security, smart credentials, multifunction access, password authentication, software development
    
Entrust Datacard

Beyond Passwords & Outdated Physical Access Systems

Published By: Entrust Datacard     Published Date: Jan 24, 2014
Smart credentials are the best bet for strong physical and logical access security
Tags : 
entrust, security, cloud access, digital security, security software
    
Entrust Datacard
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.