permission management

Results 1 - 10 of 10Sort Results By: Published Date | Title | Company Name

How to Use Content-based Webinars to Generate Leads and ROI

Published By: Thomson Reuters     Published Date: Aug 27, 2010
In a time when consumers are in control of their content consumption, marketers need to integrate permission-based initiatives into their strategies. Learn how marketers are delivering original content through webinar programs to drive lead generation and customer relationship management.
Tags : 
tanberg
    
Thomson Reuters

Managing Risk for Effective Access Governance

Published By: Aveksa     Published Date: Feb 04, 2008
User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.
Tags : 
access control, user access, access, permissions, risk, risk management, compliance, governance, aveksa, corporate governance
    
Aveksa

Revolutionize Your Permissions Management

Published By: Varonis     Published Date: Feb 05, 2014
Revolutionize Your Permissions Management
Tags : 
varonis, data, data migration, permissions management, access control, it management
    
Varonis

A Five Phase Approach to Email Marketing

Published By: AcquireWeb     Published Date: Jan 22, 2007
This article addresses one of the biggest challenges associated with e-mail marketing programs – establishing meaningful contact with customer targets in order to increase sales, while protecting and enhancing your brand. It illustrates that successful e-mail marketing designed to drive sales and build brands requires adopting a methodology that includes more precise prospect targeting, better permission-based models, a better overall consumer experience and better quality lists.
Tags : 
email marketing, best practices, permission marketing, brand management, direct marketing, newsletter design, acquireweb, integrated marketing, e-mail, acquisition e-mail, lead generation, e-mail marketing, e-mail appending, acquirelocal, local marketing, local store marketing, restaurant marketing, franchise marketing, acquisition marketing
    
AcquireWeb

IBM SmartBusiness Demos Intuit

Published By: IBM Smart Business     Published Date: May 29, 2009
This demo shows how Intuit Quickbooks Enterprise Solutions enabled by IBM Smart Business offers a smarter way to acquire, use and support business applications. Find out how you can use this software solution for your business to simplify inventory, purchasing, sales, and payroll, enabling you to cut costs and complexity. 
Tags : 
ibm, smart business, intuit, quickbooks, enterprise solutions, cost-cutting, purchasing, sales, payroll, dashboard, enterprise, business software solutions, smart market, smart cube, smart desk, smart support, finance, accounting, erp, smb
    
IBM Smart Business

Nightmare on Delegation Street with Native Active Directory Tools

Published By: Dell Software     Published Date: Oct 01, 2012
While the pre-packaged set of permissions in Active Directory seems to make delegation easy, actually maintaining, customizing, and auditing delegation can be a real nightmare. But there is a better way. Read how the right tools can help you to automate and take control of your AD delegation.
Tags : 
active directory permissions, active directory tools, delegation, automation, active directory management, delegation management
    
Dell Software

Cloud For Dummies E-Book

Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the user’s identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
    
Group M_IBM Q418

Email Newsletters: Implied Permission

Published By: Infacta     Published Date: Jan 22, 2007
The lines of permission marketing are not as grey as many would suggest. It’s pretty clear cut. You either have someone’s permission to send them commerical email or you don’t. Listen to this podcast to learn more.
Tags : 
permission based email, list management, subscriber management, email marketing
    
Infacta

Global Trust / Securing the Enterprise

Published By: Okiok     Published Date: Aug 21, 2009
Global Trust is a comprehensive Permission Management Infrastructure that centrally controls and manages user access Permissions to Web-based resources, servlets, Beans or any external application. Download this white paper and learn how the Global Trust solution enforces your policy consistently across your e-business and associates according to the planned security model (delegation, user's type, roles, policies, etc).
Tags : 
password management, access control, network access control, nac, permissions management, security management, okiok, identity management
    
Okiok

Discovering What Your Users Have Access to

Published By: Dell Software     Published Date: May 10, 2013
If you've ever had to determine the extent an employee’s access, you know how tedious, time-consuming and error-prone a thorough manual research can be. It can take a week using Windows native tools But this is a better way. Learn about a solution that makes permission management easy.
Tags : 
dell quest, access, permission management
    
Dell Software
Search      

Add Research

Get your company's research in the hands of targeted business professionals.