access management

Results 401 - 425 of 518Sort Results By: Published Date | Title | Company Name

The Definitive Guide to Account-Based Marketing

Published By: Marketo     Published Date: Jul 12, 2017
It’s an exciting, albeit challenging time for marketers—new channels, strategies, and technologies have empowered us to engage our buyers like never before. At the same time, due to the abundance of available information, buyer expectations have increased, leaving marketers to fight for their attention as we showcase our products and services. In response, organizations are implementing an account-based marketing (ABM) strategy. Account-based marketing offers organizations a significant return on investment (ROI) as they are faced with the need to acquire, retain, and grow high-value accounts. This comprehensive, 100+ page guide includes checklists, worksheets, examples, and advice from over 12 industry thought leaders to help marketers at any level, from beginners to experts, create and implement an effective account-based marketing strategy. Download The Definitive Guide to Account-Based Marketing to learn: How to create a solid ABM strategy to meet your goals What stakeholders
Tags : 
access management, security information, abm, database security, application development, risk management, endpoint management, next generation intrusion protection
    
Marketo

Making the Most of Your CRM: How Best-in-Class Sales Teams Maximize Revenue and Customer Experience

Published By: Oracle     Published Date: Mar 18, 2014
Customer relationship management (CRM) deployments are most effective when they legitimately support all three words that make up the acronym itself. Customers of the modern business-to-business (B2B) enterprise benefit when they purchase goods and services from companies who are focused on the buyer’s experience. Internal relationships within the selling organization are more effectively maintained when all customer-facing stakeholders have access to the rich data contained in a well-maintained CRM. And the management of the enterprise providing solutions can run their business like a finely-tuned machine when the maximum levels of visibility into customers and accounts are clear and accurate. This Research Brief combines research from a number of Aberdeen Sales Effectiveness research data sets, to create a holistic view of the most effectively deployed CRM systems.
Tags : 
oracle, customer relationship management, crm, b2b, internal relationships, sales effectiveness, sales teams, sales strategy, buyer experience, data management, research
    
Oracle

Get Free Pay Per Click Management Price Quotes

Published By: VendorSeek     Published Date: Feb 22, 2010
When you register, you will have access to Purchasing Tips and Pay Per Click Management Advice so get your free price quotes today!
Tags : 
vendorseek
    
VendorSeek

How to Simplify PCI DSS Compliance with AlienVault USM

Published By: AlienVault     Published Date: Mar 30, 2016
Demonstrating compliance with PCI DSS is far from a trivial exercise. Those 12 requirements often translate into a lot of manual and labor-intensive tasks, along with the need to access data and reports from many different systems and tools. Watch this technical demo to learn how AlienVault can simplify PCI DSS compliance and improve your overall security posture. You'll learn: • Common PCI DSS compliance challenges • Questions to ask as you plan and prepare • Core capabilities needed to demonstrate compliance • How AlienVault Unified Security Management simplifies compliance
Tags : 
    
AlienVault

No User Directory? No Problem. Directory-as-a-Service™

Published By: JumpCloud     Published Date: Jan 21, 2015
Learn how modern organizations are now easily implementing innovative directory services and the consequences some organizations face by not implementing one.
Tags : 
ldap, active directory, user management, iam, ssh access, linux, hosted ldap, openldap, linux useradd, identity management, sso, configure ldap, aws, cloud servers, iaas, user directory, it management, knowledge management, enterprise applications, business technology
    
JumpCloud

3 Steps for Bullet-Proof Wireless LAN Security & Management

Published By: AirDefense     Published Date: Apr 24, 2007
This paper outlines the specific elements of wireless LAN security (perimeter control, access control, date protection, and monitoring) and WLAN management (configuration, fault diagnostics, network usage, and policy enforcement). Reader will gain a keen understanding of how to effectively lockdown a wireless LAN and manage it for peak performance.
Tags : 
wireless security, wlan, wlans, wlan security, wireless lan, access control, wireless access control, data protection, monitoring, wlan management, security policies, airdefense
    
AirDefense

The Benefits of Identity & Access Management

Published By: A10 Networks     Published Date: Apr 14, 2006
Download this white paper to learn how IAM projects can be practical, affordable and provide quick ROI for companies of all sizes.
Tags : 
access control, identity management, access management, authentication, roi, return on investment, a10, a10 networks, security, network management, network security, remote access, application security, password management, security management, single sign on
    
A10 Networks

SIEM and IAM Solutions: A10 Networks Solves Complexities

Published By: A10 Networks     Published Date: Aug 21, 2009
This white paper highlights the complex nature of traditional authentication and identity management practices and shows how A10 Networks unified identity and access management solutions simplify the convergence of network, security, and identity resources for proper deployment.
Tags : 
identity management, authentication, access control, anti spam, anti spyware, anti virus, a10, a10 networks
    
A10 Networks

Aladdin eSafe Clientless Spyware Neutralizer

Published By: Aladdin     Published Date: Aug 21, 2009
The Spyware Neutralizer is a clientless add-on tool for the eSafe content security solution from Aladdin Knowledge Systems. Client-side software installation and without the need to implement, manage, or update any client-side software or agents.
Tags : 
phishing, security management, anti spyware, malware, security software, network management, remote access, remote network management, aladdin
    
Aladdin

Mitigating Risk Using Power Management System

Published By: Schneider Electric     Published Date: Jun 07, 2019
Because electricity is a key commodity for business it represents significant financial risk. Yet many power management systems remain isolated and separate from the rest of the business enterprise. The result is poor access to incomplete information, with only limited knowledge of risk exposure. An integrated, comprehensive power management system that includes metering, software, and power quality mitigation equipment offers the most holistic, systems-based approach to managing this risk exposure.
Tags : 
financial risk, power management system, quality migration, schneider electric, pms
    
Schneider Electric

The SSL VPN Buyer's Guide

Published By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Buyer's Guide describes the 20 most important purchase requirements and 37 crucial questions you should ask before choosing an SSL VPN vendor.
Tags : 
buying guide, buyers guide, vpn purchase, ssl, vpn, ssl vpn, secure remote access, policy management, aventail, network security, remote access, remote network management, tunneling, ipsec
    
Aventail

Achieving NAC Now and in the Future: The Role of SSL VPNs

Published By: Aventail     Published Date: Aug 21, 2009
NAC is a multifaceted framework to thoroughly control who and what gets access to network resources, and help keep malware from entering the enterprise. Today, there are huge challenges to implementing as-yet immature NAC solutions on an enterprise-wide basis, including convoluted integration requirements, inadequate inspection capabilities, and weak policy management.
Tags : 
vpn, access control, security management, ssl, network access control, nac, policy management, security policies, malware, intrusion prevention, ssl, secure socket layer, vpn, virtual private network, vpns, virtual private networks, aventail
    
Aventail

Turbulent times call for an agile application foundation.

Published By: IBM     Published Date: Oct 09, 2009
Does your IT change as fast as the market? A service-oriented architecture (SOA) provides a foundation that enables agility and aligns IT to business goals. This interactive presentation from IBM will show you how to provide fast, flexible, reliable access to information, business-wide. It also covers methods to ensure trust, management and security across business applications.
Tags : 
application foundation, ibm, service-oriented architecture, soa, websphere, point-to-point connectivity, esb messaging, esb enrichment, web sphere, application integration, service oriented architecture
    
IBM

Methodology for Identity Management Projects

Published By: IDFocus     Published Date: Aug 21, 2009
This whitepaper describes our unique approach and methodology for delivering an enterprise-wide Identity and Access Management solution. Our methodology, IDMology, offers pre-defined solutions to repeatable problems occurring during the lifecycle of an Identity Management project.
Tags : 
identity management, access management, iam, identity and access maangement, idmology, idfocus, project management, project lifecycle management, roi, return on investment, security management
    
IDFocus

Password Management vs. Single Sign-On

Published By: IDFocus     Published Date: Aug 21, 2009
In the Identity Management space, there are 3 leading applications: Web access control, single sign-on, and password management. The document also describes two alternative approaches to combining these solutions.
Tags : 
password management, identity management, access management, iam, identity and access management, single sign on, single sign-on, access control, idfocus
    
IDFocus

Global Trust / Securing the Enterprise

Published By: Okiok     Published Date: Aug 21, 2009
Global Trust is a comprehensive Permission Management Infrastructure that centrally controls and manages user access Permissions to Web-based resources, servlets, Beans or any external application. Download this white paper and learn how the Global Trust solution enforces your policy consistently across your e-business and associates according to the planned security model (delegation, user's type, roles, policies, etc).
Tags : 
password management, access control, network access control, nac, permissions management, security management, okiok, identity management
    
Okiok

Enterprise Security for Mobile Computing Devices

Published By: Pointsec     Published Date: Aug 21, 2009
This paper will help security officers and staff of large organizations seeking to protect sensitive data on mobile computing devices.
Tags : 
wireless security, network security, laptop security, mobile computing, secure mobile, data protection, access control, vulnerability management, pointsec, security management
    
Pointsec

Protecting HTTP Traffic: Why Web Filtering Should Be Your First Line of Defense

Published By: Secure Computing     Published Date: Aug 21, 2009
This paper outlines the types of threats that leverage the Internet as a means of delivery and the risks that they pose to your organization. Learn the key drivers of a corporate security policy and how you can protect against HTTP-based threats using Web filtering as part of a multi-layered content security strategy.
Tags : 
security, anti spyware, malware prevention, malware, access control, hacker detection, internet security, security management, web service security, secure computing, securecomputing, network security
    
Secure Computing

An IT-Friendly Approach to Secure Messaging

Published By: Sigaba     Published Date: Aug 21, 2009
This white paper describes how Sigaba's secure email solutions minimize the burden on IT organizations through a combination of easy integration with existing enterprise systems and simple maintenance.
Tags : 
access control, email security, security management, security policies, secure instant messaging, intranets, messaging, sigaba, security
    
Sigaba

The Business Case for Secure Messaging in the Banking Industry

Published By: Sigaba     Published Date: Aug 21, 2009
This paper presents the business case for secure messaging, which extends far beyond compliance issues. In fact, choices about when to implement secure messaging affect every aspect of banking.
Tags : 
financial, bank, access control, email security, security management, security policies, secure instant messaging, intranets, messaging, sigaba, compliance
    
Sigaba

Remote Management: Critical to a New Generation of Digital Service Providers

Published By: Texas Instruments     Published Date: Nov 06, 2006
Download this free whitepapers to learn how Remote Management can transform this challenge into an opportunity to stand apart from other service providers in a very competitive market.
Tags : 
access control, remote access, remote management, remote support, service provider, service providers, ip networks, ip tv, customer service, customer satisfaction, texas instruments, remote network management, service management
    
Texas Instruments

Tokens Aren't Always the Answer: 4 Cases for Identity-Based Solutions

Published By: Trusted Network Tech     Published Date: Aug 21, 2009
Authentication technologies such as tokens and smart cards help meet the challenges of protecting sensitive data and securing application access. This white paper presents four cases in which an identity-based solution provides a compelling, low-cost alternative or complement to strong authentication technologies.
Tags : 
network management, network security, access control, nac, network access control, identity management, security management, authentication, smart card, token, trusted network tech, security, security policies, single sign on
    
Trusted Network Tech

NAC NAC: Who’s Really There? (And What Are They Bringing Inside)

Published By: Trusted Network Tech     Published Date: Nov 06, 2006
This paper addresses several issues organizations should consider when analyzing the efficacy and costs of NAC solutions and looks at a complementary alternative technology based on TNT’s Identity™, which helps address and overcome some limitations of NAC solutions.
Tags : 
access control, nac, network, identity management, network access control, security, internet security, trusted network tech, local area networking, network security
    
Trusted Network Tech

Secure Remote Control for IT Organizations

Published By: Symantec     Published Date: Nov 02, 2006
Remote control software has proven to be a cost-effective way of providing remote support. This paper examines how these products provide a cost-effective help desk tool and defines necessary security requirements.
Tags : 
remote control, help desk, remote access, remote network management, remote support, network security, symantec, networking, network management, call center software, customer interaction service, productivity
    
Symantec
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.