autho

Results 351 - 375 of 380Sort Results By: Published Date | Title | Company Name

ITSM Tooling Uncovered Whitepaper

Published By: Axios Systems     Published Date: Sep 16, 2010
Choosing a Service Desk or ITSM solution? Read this whitepaper first - authored by Sharon Taylor, Chief Architect of ITIL V3.
Tags : 
itil whitepaper, choosing itil tools, itil toolsets, it service catalog, itsm tool upgrade, service management systems, business management, itil
    
Axios Systems

Authority-based Marketing: How to Cut Through the Clutter and Connect with Clients

Published By: Greenleaf Book Group     Published Date: Oct 26, 2010
Authority-based marketing is an easy, effective, and manageable way to market across all mediums.
Tags : 
authority-based marketing, marketing startegies, expert positioning
    
Greenleaf Book Group

eFront - Financial Software Company solves publishing challenges

Published By: Author-it     Published Date: Dec 21, 2010
The strategy adopted with regards to documentation production was to create a set of documents on customer request for each specific project and such documents were created by the relevant project consultants themselves.
Tags : 
content authoring, content publishing, publishing, authoring, content management, financial services
    
Author-it

How to win customers and build trust online

Published By: VeriSign     Published Date: Feb 10, 2011
What smart companies are doing to build trust and use it to create competitive advantage online.
Tags : 
verisign, trust online, website, loyalty, ev ssl, certificate management, secure sockets layer, certificate authority
    
VeriSign

Estate and Gift Tax Planning Under the 2010 Tax Relief Act

Published By: Manning Fulton & Skinner, P.A.     Published Date: Mar 18, 2011
Key points of the Unemployment Insurance Reauthorization and Job Creation Act of 2010 and how it impacts individual income tax and estate and gift tax
Tags : 
estate planning, income tax, gift tax, alternative minimum tax, financial planning, finance, tax
    
Manning Fulton & Skinner, P.A.

From AD to LDAP Through Virtualization

Published By: Radiant Logic, Inc     Published Date: Mar 21, 2011
How Virtualization Addresses the Challenges of Authentication and Authorization Across Disparate User Directories.
Tags : 
access control, active directory, authentication, directory services, ldap, security policies, sso, systems management
    
Radiant Logic, Inc

Finance 2011 | Time to Build the "Last Mile" Whitepaper

Published By: IBM Business Analytics     Published Date: Jun 23, 2011
David Axson, author of The Management Mythbuster, explains how insightful analytics and a systematic approach to risk management can drive dramatic improvements in the quality and value that finance organizations deliver.
Tags : 
ibm business analytics, david axson, enterprise risk management, erp, enterprise resource planning, insightful analytics, finance function, business analytics
    
IBM Business Analytics

Field Service Mobility-Warranty Management

Published By: Tavant Technologies     Published Date: Jun 09, 2011
In this white paper, the author discusses the real-life challenges faced by field technicians and how they can be empowered with mobility solutions to improve field productivity, increase accuracy of diagnostics, reduce warranty and invoicing cycle times, enhance service revenues, and most importantly, improve customer experience to make service excellence a strong selling point.
Tags : 
field service mobility
    
Tavant Technologies

Software Asset Management

Published By: ServiceNow     Published Date: Apr 19, 2013
Unauthorized software, painful software license compliance audits, long fulfillment times, limited visibility, unaccountability... if these issues sound familiar, you are not alone. These are real challenges faced by many IT organizations - with serious consequences if not properly addressed. During our Software Asset Management webinar you will learn how having asset, configuration and other service management processes together in one system of record provides the control and visibility you need to overcome these challenges.
Tags : 
software, lincense, compliance, software asset management, service management, application integration, application performance management, business activity monitoring
    
ServiceNow

How DDoS Detection and Mitigation can Fight Advanced Targeted Attacks

Published By: Arbor     Published Date: Sep 20, 2013
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Tags : 
distributed denial of services, ddos attack, ddos detection, ddos mitigation, security, advanced targeted attacks, mitigation, detection
    
Arbor

Navigate the Future of Identity and Access Management

Published By: NETIQ     Published Date: Mar 12, 2013
Forrester’s solution for security and risk executives working on building an identity and access management strategy for the extended enterprise that includes BYOD and cloud apps. It will help you understand and navigate the business and IT trends aff
Tags : 
netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs
    
NETIQ

Choosing a Cloud Hosting Provider with Confidence

Published By: Thawte     Published Date: Dec 29, 2015
The goal of this white paper is to help enterprises make pragmatic decisions about where and when to use cloud solutions by outlining specific issues that enterprises should raise with hosting providers before selecting a vendor, and by highlighting the ways in which SSL from a trusted Certificate Authority (CA) can help enterprises conduct business in the cloud with confidence.
Tags : 
best practices, business management, cloud computing, infrastructure, infrastructure management
    
Thawte

ESG Brief – It’s Time for Enterprise to Secure Mac Computers

Published By: Symantec     Published Date: Oct 07, 2014
Last year, Mac malware increased by 66% with a single, high-profile attack infecting over 600,000 machines. Malware authors are targeting unsuspecting Mac users and gaining access to organization's data. Still wondering whether Macs need protection? See what advice a senior strategic analyst at ESG has to share.
Tags : 
enterprise, mac security, cybercrime, malware, data, high-profile attack, infection, security
    
Symantec

Webinar: Erika Brookes and Paul Gillin author of Attack of the Customers

Published By: Oracle     Published Date: Jan 07, 2014
38 minute webcast discussing the rise of the empowered consumer and how consumers have changed the B2C relationship forever.
Tags : 
customer experience, customer insight, cmo and cio relationship, marketing and technology collaboration, cmo and cio collaboration, socially enabled enterprise, social business, social listening
    
Oracle

DevOps Perspectives: IT luminaries discuss the major issues impacting DevOps today

Published By: CA Technologies     Published Date: Jun 04, 2015
Industry leaders share insights on DevOps and big data, ITIL, testing and more. Once again, we have spent time talking to leading community figures such as Dave Farley (“Continuous Delivery” author) to discuss the major issues impacting DevOps today. This latest issue features comments from 10 experts and covers many hot topics such as: - Enterprise DevOps transformation - DevOps and big data - DevOps and ITIL - Shadow IT vs DevOps - 6 Habits of Effective DevOps Practitioners - DevOps and Testing
Tags : 
    
CA Technologies

Stop Unauthorised Privileged Access

Published By: Venafi     Published Date: Aug 07, 2015
Read this paper and discover how to reduce risk of SSH key misuse and develop a strategy to manage and secure SSH keys.
Tags : 
ssh, security, reduce risk, authentication, secure ssh keys, security application, anti spam, anti spyware
    
Venafi

How Informatica Enabled Secure, Keyless SSH Access with Aporeto

Published By: AWS     Published Date: Oct 01, 2019
Trying to keep up with the growing number of instances and containers, Informatica would spin up new security policies with shared key access. This led to a sprawling, complex network of multiple security interfaces that were difficult to manage. Informatica began working with Aporeto to track, block, and audit users through their environment, and eventually implemented keyless SSH access to their Amazon Elastic Compute Cloud (Amazon EC2) instances. Read our case study to learn how Aporeto saved Informatica hundreds of development hours with automated authentication and authorization policies across their environment.
Tags : 
    
AWS

Think Beyond File Storage to Accelerate Business Efficiency

Published By: Citrix ShareFile     Published Date: Oct 04, 2019
Your employees want easy and quick access to files from any device—but if you don’t provide this flexibility, they will go around you and upload company data to unauthorized cloud services. It’s time to prevent data leakage with a file sharing solution that combines security and convenience. In this white paper, you’ll learn how file sharing goes beyond storage to accelerate your business with: • Flexible access to files from any device and any location • Streamlined security and access control • Choice of private and public cloud storage
Tags : 
    
Citrix ShareFile

For Better Access Governance, Look Beyond Roles to Entitlements

Published By: IBM     Published Date: Oct 26, 2017
Not long ago, job roles were relatively easy to define and control. A person was an “accountant” or a “graphic designer” or a “business partner.” But as organizations grew and business software became more sophisticated, new roles were added. “Accountant, New York” might require different access to applications and data than “Accountant, Chicago.” The challenge comes from the recent explosion in the numbers and types of business roles.
Tags : 
identity governance, entitlements, authorized users, orphan accounts, business activities
    
IBM

Extend Your Access Management Regime to Microsoft Office 365

Published By: IBM     Published Date: Oct 26, 2017
Identity and access management exists for one critical reason—security. Organizations need to make certain the right people have access to the right resources to do their jobs—and that people without proper authorization can’t get in. In an era the IBM X-Force security team recently described as experiencing “an ever-upward trend of more attacks, more leaked records and more varied threats,” security is a critical function for business as well as IT.
Tags : 
access manager, security, cloud service, microsoft office 365, it strategies
    
IBM

Upgrade Your Security with Mobile Multi-factor Authentication

Published By: IBM     Published Date: Oct 26, 2017
Authentication is the beating heart of security. The most fundamental action in all of IT is to identify “who you are”—and authentication is the building block that answers that question. Now more than ever, IT teams must do everything they can to ensure that users are who they say they are, and that their credentials have not been stolen. IT is in state of crisis, with hundreds of millions of identities stolen annually. For system administrators, it’s crucial to know which users have the right to access a given resource, and whether unauthorized users have tried to get in.
Tags : 
user authentication, mobile multi factor authentication, data flows, security, it strategies
    
IBM

Achieving Advance Security and Data Compliance with DSE

Published By: Datastax     Published Date: Aug 15, 2018
"True data protection and compliance starts at the data layer. When enterprises think of how best to protect their data and meet ever stricter and more complex compliance requirements, they should first and foremost be considering their data management solution. Read this white paper to learn how DataStax Enterprise Advanced Security allows enterprises to protect their data via features such as authentication, authorization, and data auditing, and also meet regulatory compliance requirements by leveraging advanced security features in accordance with best practices."
Tags : 
    
Datastax

Barracuda Firewalls Rely on R&S Pace 2

Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When Barracuda first engaged with Rohde & Schwarz Cybersecurity in 2007, enterprises were more concerned about the unauthorized use of Skype, other P2P applications and instant messaging. Although the need for application control and awareness remains, enterprise concerns are shifting to securing enterprise applications hosted in private and public clouds, protecting east-west data center traffic and preventing unwanted traffic and malware on the corporate network.
Tags : 
firewall, r&s, visibility, application, network, secure, cloud, business applications
    
Rohde & Schwarz Cybersecurity

IBM SPSS Academic New Deal Overview

Published By: Group M_IBM Q1'18     Published Date: Feb 14, 2018
The SPSS Statistics Campus Edition offers maximum flexibility and scalability for schools to provide unlimited access to authorized users
Tags : 
spss, statistics, spss education, academic software
    
Group M_IBM Q1'18

Threat Hunting for Dummies

Published By: Carbon Black     Published Date: Apr 10, 2018
A dversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to “go on the hunt.” Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able t
Tags : 
    
Carbon Black
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.