access management

Results 176 - 200 of 523Sort Results By: Published Date | Title | Company Name

5 Important Buying Criteria to Enable a totally Mobile Workforce

Published By: VMware     Published Date: May 10, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: • Seamless, secure end-user access to applications and files • Easy-to-use enterprise app store • Management security • Fully integrated infrastructure stack • Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware

Mobility Quandary: Balancing Mobile Workforce Productivity with Security

Published By: VMware     Published Date: May 10, 2017
The pace of business is faster than ever before. Due to the rapid adoption of cloud and mobile computing, driven by consumerization, operational needs, and security requirements, ESG believes that Identity and Access Management (IAM) is undergoing a profound transition. Download this ESG whitepaper to learn why organizations should combine Identity and Access Management (IAM) and Enterprise Mobility Management (EMM) solutions to adapt to the influx of workforce mobility without interfering with user experience or compromising security.
Tags : 
    
VMware

Creating The Workspace of the Future – Today

Published By: VMware     Published Date: May 10, 2017
What is a digital workspace and what does it take to create one? If we break it down, the workspace is a portal for end users into all of their apps and online services that they canseamlessly and securely access across devices and locations. But what makes the workspace of today different from the desktop or mobile device of the past? And how can you move forward with delivering a digital workspace? Download this solution brief to learn how VMware® Workspace™ ONE™is designed to deliver a digital workspace that integrates device management, application delivery, and identity management into a single platform on your terms, via your data center, in the cloud, or through a combination of the two. This workspace can be accessed by your end users across devices and locations and be centrally secured and supported to streamline management and improve the quality of services you deliver across the entire organization.
Tags : 
    
VMware

Education Technology Mistakes to Avoid: App Deployment Mayhem

Published By: Jamf     Published Date: Nov 05, 2018
Let’s take a look at the “who needs access to what and when” scenario that often leaves schools wondering what to do with the apps once a student graduates or drops a class, or how to get new students the resources they need the minute they turn on their device. If you’ve ever wanted a tutorial on best practices for app management, download this e-book for guidance on quickly going from app purchase to deployment.
Tags : 
    
Jamf

Bringing it All Together Achieving ERP Agility Within the Enterprise

Published By: Insight Software     Published Date: May 22, 2018
Don’t settle. Forward-thinking finance professionals know that there is a better way. Though BI tools have provided visibility to data, they have in fact failed to provide direct access to enterprise information. However, evolution does not stop there: Next-gen corporate performance management solutions are among us and promise to deliver interconnected, flexible, and realtime data access. Agility achieved.
Tags : 
erp, enterprise, finance, evolution, performance
    
Insight Software

The Forrester Wave™: Big Data NoSQL, Q3 2016

Published By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
The demand for databases is on the rise as organizations build next-generation business applications. NoSQL offers enterprise architecture (EA) pros new choices to store, process, and access new data formats, deliver extreme web-scale, and lower data management costs. Forrester’s 26-criteria evaluation of 15 big data NoSQL solutions will help EA pros understand the choices available and recommend the best for their organization. This report details our findings about how each vendor fulfills our criteria and where they stand in relation to each other to help EA.
Tags : 
nosql, market, industries, strategy, presence, vendor
    
AstuteIT_ABM_EMEA

What You Need to Know About Operationalizing Your AWS Transit Hub

Published By: Aviatrix     Published Date: Jun 11, 2018
Once you've designed and secured your Global Transit Network, are you done? Are you ready to hand day-to-day responsibility over to an operations team? Or, are there other elements you need to ensure that the day-to-day operation of your transit hub is efficient and effective? As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, demonstrate the best practices they've gleaned from working with operations teams, all who require: • Visibility: Do you have a way to centrally view your network, see performance bottlenecks, control security policies, and set other configuration details? • Deep Analytics: Can you easily gather performance and audit data and export it to Splunk, DataDog, or other advanced reporting tools? • Monitoring and Troubleshooting: Do you have a real-time view of network health, and how easily can you access the data needed to locate and fix issues? • Alert Management: When issues do occur, what r
Tags : 
aws, aws vpc, aws global transit network, aws transit vpc, cisco csr, csr 1000v
    
Aviatrix

Ten Innovative Financial Services Applications Powered by Data Virtualization

Published By: TIBCO Software     Published Date: Feb 26, 2019
Every financial services firm understands the importance of data. More is better. Sooner is better. Accessing it, understanding it, and taking advantage of it before the competition is better. In the mid-2000s, Financial Services was the first industry to strongly adopt data virtualization as a disruptive, new technology for accessing and integrating more data, faster and more easily than ever before. Buy and sell side groups at the largest institutions led the charge, followed soon after by risk management and compliance units. The leading mutual fund providers, along with hedge funds, led the next wave of adoption. In recent years, commercial banks and insurers have accelerated their use of data virtualization. And today, analyst firms such as Gartner, Inc. and Forrester project continued data virtualization adoption for both first-time use at new firms and expanded deployments at existing sites. This whitepaper provides 10 examples of TIBCO Data Virtualization enabled applications f
Tags : 
    
TIBCO Software

Tools And Technology: The Identity And Access Management Playbook

Published By: SailPoint Technologies     Published Date: May 08, 2019
In our 26-criterion evaluation of identity management and governance (IMG) providers, we identified the nine most significant ones — CA Technologies, IBM, Ivanti, Micro Focus, Omada, One Identity, RSA Security, SailPoint Technologies, Saviynt — and researched, analyzed, and scored them. This report shows how each provider measures up and helps security and risk (S&R) professionals make the right choice.
Tags : 
    
SailPoint Technologies

The Best Way to Secure Your Cloud, IoT and Mobile Data

Published By: SailPoint Technologies     Published Date: Sep 05, 2019
Short Description (1000 characters max) Want the strongest cybersecurity possible? Download this brief to find out how Identity governance, combined with privileged access management, will give you the information you need to quickly identify and respond to security risks.
Tags : 
    
SailPoint Technologies

Five Ways to Exceed Client Expectations for Your Consulting Firm

Published By: Deltek     Published Date: Jul 10, 2019
Having real-time access to engagement information via a cloud-based, integrated, information infrastructure is critical in delivering high-value, on time engagements that always delight clients. So why do so many consulting firms fail in this area, that they constantly advise clients on? Enjoy a complimentary copy of ProjectManagement.com’s new white paper on how an effective information infrastructure will ensure client excellence. Author Andy Jordan, consulting firm owner and industry expert, reveals the 5 ways to exceed client expectations and how consulting firms can leverage technology to achieve client excellence. Download the white paper today!
Tags : 
    
Deltek

Network Intelligence – A New Approach to Network and Device Management

Published By: BlueCat     Published Date: Aug 20, 2013
To enable always-on application access and business connectivity, you need a rock-solid network foundation. The increasingly complex, dynamic and fluid relationship between networks and devices requires a new approach to IP Address Management (IPAM) – one that unifies mobile security, address management, automation and self-service to provide actionable network intelligence and a broad span of control. This paper discusses the critical role of IPAM in providing a smarter way to connect mobile devices, applications, virtual environments and clouds.
Tags : 
device management, ipam, ip address management, ip management, dns management, dhcp management, network security, network management
    
BlueCat

5 Ways Excel Accelerates Your Return On SAP FICO Business Processes

Published By: Winshuttle     Published Date: Apr 18, 2017
How can a finance and/or controller professional access SAP FICO data leveraging Microsoft Excel in a highly usable and interoperable fashion while respecting all of the SAP core security and governance controls? In order to fully explore this question, this white paper highlights five valuable ways to leverage Microsoft Excel to reduce Finance & Controller operational costs while making your SAP FICO systems implementation, management and maintenance life easier.
Tags : 
    
Winshuttle

The Centrify Suite enables you to extend Active Directory to your non-Microsoft platforms

Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the compelling business and technical case for centralizing administration in Microsoft's Active Directory, describes how Centrify's integrated architecture enables you to extend Active Directory to your non-Microsoft platforms, and describes the Centrify Suite's unique benefits.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance
    
Centrify Corporation

PCI: Using Microsoft Active Directory to Address PCI Requirements in Heterogeneous Environments

Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the compelling business and technical case for centralizing administration in Microsoft's Active Directory, using Centrify's DirectControl to extend Active Directory authentication and access control to your UNIX, Linux and Mac OS systems and applications, and using Centrify's DirectAudit to log user activity to provide you a clear picture of end user actions on all UNIX and Linux systems.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance
    
Centrify Corporation

Strengthen Security and Improve IT Efficiency by Replacing NIS with Active Directory

Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the challenges of migrating NIS deployments to a central repository, and explains in detail how a combination of Microsoft Active Directory and Centrify DirectControl can deliver a cost-effective solution that strengthens security while improving IT efficiency.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance
    
Centrify Corporation

Top Eight Identity & Access Management Challenges with SaaS Applications

Published By: Okta     Published Date: Oct 12, 2010
This white paper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : 
okta, identity and access management, saas applications, iam, password fatigue, compliance, application integration, identity management
    
Okta

Automating User Management and Single Sign-on for Salesforce.com

Published By: Okta     Published Date: Dec 15, 2010
This paper focuses on the challenges of integrating Salesforce.com logins for single sign-on (SSO) and automating provisioning/de-provisioning from on-premise directories like Active Directory.
Tags : 
okta, user management automation, single sign-on, salesforce.com, active directory, access management, application administrator, application integration
    
Okta

Cloud Management Begins with Identity

Published By: Okta     Published Date: Jan 06, 2012
In this paper, EMA explores this question and examines Okta as an example of centralized, multi-tenant identity and access management that offers new
Tags : 
okta, authentication, single sign on, sign-on, sign on, cloud, cloud application, cloud
    
Okta

Identity Management for Customer and Partner Portals

Published By: Okta     Published Date: Jul 05, 2012
For many organizations, portals are an increasingly important way of providing critical application access to partners and/or customers. Assembled from multiple web applications, portals introduce unique identity management challenges, because unlike internal employees, users from customers or partners aren't typically stored in the corporate directory. This forces administrators to maintain multiple user-stores and end-users to register, and manage logins for, each app individually.
Tags : 
okta, partner portals, enterprises, target applications, it management
    
Okta

Top 8 Identity & Access Management Challenges with Your Saas Applications

Published By: Okta     Published Date: Jan 30, 2013
This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : 
top 8, access management, challenges, saas applications, okta, it management, data management, business technology
    
Okta

Forrester Total Economic Impact™ Study: Okta Identity Management Service

Published By: Okta     Published Date: Jan 30, 2013
Okta commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying Okta On-Demand Identity and Access Management service. Download to learn more.
Tags : 
forrester totam economic impact, okta, identity management service, study, okta identity management, security, knowledge management, enterprise applications
    
Okta

Not All Cloud Services Are Built Alike: Okta's High Availability Architecture

Published By: Okta     Published Date: Jan 31, 2013
This technical whitepaper will provide an overview of the software and operational architecture that enables Okta to run a scalable, highly available, on demand identity and access management service.
Tags : 
cloud services, okta high availability, architecture, cloud service, high availability architecture, knowledge management, enterprise applications, data management
    
Okta

Okta Active Directory Integration - An Architecture Overview

Published By: Okta     Published Date: Jan 31, 2013
Okta’s cloud-based identity and access management service solves the issue of user identities on multiple networks with a highly available solution for all cloud based and web based application AD integrations. Learn how Okta can help you.
Tags : 
okta, active directory, integration, architecture, okta, knowledge management, enterprise applications, data management
    
Okta

Tolly Report: Comparative NAC: ForeScout, Bradford, Cisco & Juniper

Published By: ForeScout     Published Date: Feb 18, 2014
Commissioned by ForeScout and conducted by The Tolly Group, one of the world’s leading independent product testing labs, the competitive analysis covers 34 criteria points across key functional categories: deployment, interoperability, guest management, endpoint compliance, enforcement, remediation and scalability. Before spending considerable time and resources to perform your POC, download this in-depth, 24-page report.
Tags : 
forescout, counteract, network access control, nac, deployment, interoperability, guest management, endpoint compliance
    
ForeScout
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.