access management

Results 351 - 375 of 518Sort Results By: Published Date | Title | Company Name

Network Intelligence – A New Approach to Network and Device Management

Published By: BlueCat     Published Date: Aug 20, 2013
To enable always-on application access and business connectivity, you need a rock-solid network foundation. The increasingly complex, dynamic and fluid relationship between networks and devices requires a new approach to IP Address Management (IPAM) – one that unifies mobile security, address management, automation and self-service to provide actionable network intelligence and a broad span of control. This paper discusses the critical role of IPAM in providing a smarter way to connect mobile devices, applications, virtual environments and clouds.
Tags : 
device management, ipam, ip address management, ip management, dns management, dhcp management, network security, network management, network intelligence, ip networks, network management, infrastructure, local area networking, network performance management, service management
    
BlueCat

Dell PowerEdge 12G Servers with Windows Server 2012: The time to migrate is now

Published By: Dell & Microsoft     Published Date: Aug 14, 2013
With the arrival of Dell 12th generation servers (12G) and Microsoft Windows Server 2012, your organization can now significantly simplify Windows Server deployment. Window Server 2012 delivers a number of new enhancements and features over your current Windows Server 2003 or Windows Server 2008 infrastructure. With Windows Server 2012, your organization can benefit from improved virtualization, identity and access control management, graphical interface, storage and networking, and Web and application hosting. Dell 12G servers provide a powerful platform for Windows Server 2012 and its advanced features, giving your organization better performance, reliability and management, all of which improve return on investment (ROI) and your bottom line. For more information on powering Dell servers with Windows Server 2012, see www.dell.com/ws2012.
Tags : 
dell poweredge, 12g servers, windows servers, performance, reliability, control management, graphical interface, storage, networking, web hosting, application hosting
    
Dell & Microsoft

Transforming the Data Center: Dell PowerEdge 12th Generation Servers

Published By: Dell & Microsoft     Published Date: Aug 14, 2013
Organizations everywhere are turning to virtualization, cloud computing, and mobile technologies to support anytime, anywhere access to today’s work load intensive, data-heavy applications. Dell PowerEdge 12th generation servers—built for high performance, 24/7 availability, and uncompromised reliability—can help IT organizations deliver the benefits of these transformative technologies.With cost-saving power, cooling, space, and management efficiencies, Dell’s new servers offer data centers unparalleled performance, efficiency, and reliability for a diverse range of enterprise applications.
Tags : 
data center, dell poweredge 12th generation servers, virtualization, cloud computing, mobile technologies, data-heavy applications, cost-saving power, management efficiencies
    
Dell & Microsoft

Beyond MDM: A Multidimensional Mobility Strategy

Published By: Enterprise Mobile     Published Date: Jul 09, 2013
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. It’s time to move beyond mobile device management to a more holistic management method.
Tags : 
mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management, device management, enterprise mobile devices, mobile computing, mobile device management
    
Enterprise Mobile

Top Reasons Customers Virtualize Desktop Infrastructures With EMC VSPEX

Published By: EMC Corporation     Published Date: Jun 14, 2013
Transform your Microsoft Application environment with simple, efficient, and flexible virtualization solutions. EMC VSPEX Private Cloud solutions improve accessibility, centralize management, and increase performance for mission critical Microsoft Applications.
Tags : 
servers, accessibility, centralization, microsoft application, virtulization solution, cloud, networking, security, enterprise applications, storage, business technology
    
EMC Corporation

Discovering What Your Users Have Access to

Published By: Dell Software     Published Date: May 10, 2013
If you've ever had to determine the extent an employee’s access, you know how tedious, time-consuming and error-prone a thorough manual research can be. It can take a week using Windows native tools But this is a better way. Learn about a solution that makes permission management easy.
Tags : 
dell quest, access, permission management
    
Dell Software

New Whitepaper: Identity & Access Management for Mobile Is Here

Published By: Good Technology Corporation     Published Date: Apr 29, 2013
Extend desktop-level security to mobile users. This whitepaper—Effective Identity and Access Management in a Mobile World—covers how to harness your IAM infrastructure to balance the freedom mobile users want with the security IT needs. Read it now.
Tags : 
mobile security, secure mobile application, mobile device management, identity management, identity and access management, iam
    
Good Technology Corporation

How to Scale Object Storage

Published By: Cleversafe     Published Date: Mar 29, 2013
Scalability has always been an important characteristic of enterprise storage systems, maybe the most important, since the rationale of consolidating storage assumes that the system can easily grow with aggregate demand.
Tags : 
object storage, cloud storage, access nodes, scalability, metadata, storage controller, backup and recovery, network attached storage, raid, storage area networks, storage management, storage virtualization, application integration, application performance management, best practices, data deduplication, business technology
    
Cleversafe

Why It Pays to Take a Business-Centric Approach to Compliance

Published By: NETIQ     Published Date: Mar 12, 2013
A poll of CIOs and IT managers reports why departments must defend against complex internal and external threats while mitigating regulatory and compliance concerns. The results provide data about how enterprises view compliance.
Tags : 
security compliance, users access management, it management compliance, business technology
    
NETIQ

Extending Access Control to the Cloud

Published By: NETIQ     Published Date: Mar 12, 2013
As your business users consume software-as-a-service applications, they are introducing new risks to your organization.
Tags : 
cloud computing, access control, saas, software-as-a-service, security, compliance, user access management, security risks, business technology
    
NETIQ

Navigate the Future of Identity and Access Management

Published By: NETIQ     Published Date: Mar 12, 2013
Forrester’s solution for security and risk executives working on building an identity and access management strategy for the extended enterprise that includes BYOD and cloud apps. It will help you understand and navigate the business and IT trends aff
Tags : 
netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs, identity, identity as a service, authentication, authorization, open web, iam, saml, oauth, opened, scim, spml, xacml
    
NETIQ

Security and Compliance in the Cloud

Published By: NETIQ     Published Date: Mar 12, 2013
NetIQ’s Identity, Access and Security Management solutions integrate seamlessly to help you control access to cloud services and data, reduce your risk of data breaches in mixed environments.
Tags : 
security and compliance in the cloud, business technology
    
NETIQ

Identity and Access Governance: Bringing Business and IT Together

Published By: NETIQ     Published Date: Mar 12, 2013
IT professionals and executives who use identity management and access governance systems typically have different objectives and technology backgrounds. Converging the systems makes sense.
Tags : 
iag, identity and access governance, identity management, compliance, security, it management, business technology
    
NETIQ

Deliver Unparalleled Business Advantage With BYOD - A Holistic Approach

Published By: Sponsored by HP and Intel®     Published Date: Mar 05, 2013
This white paper explains how you can unleash the full potential of mobility-greater productivity, flexibility, and better economics-by unifying secure device access, user authentication, provisioning, and management.
Tags : 
holistic approach, byod, business advantage, intel, convenience, it infrastructure, byod, bring your own device, it management, enterprise applications, data management, business technology, data center
    
Sponsored by HP and Intel®

Okta Active Directory Integration - An Architecture Overview

Published By: Okta     Published Date: Jan 31, 2013
Okta’s cloud-based identity and access management service solves the issue of user identities on multiple networks with a highly available solution for all cloud based and web based application AD integrations. Learn how Okta can help you.
Tags : 
okta, active directory, integration, architecture, okta, knowledge management, enterprise applications, data management, business technology
    
Okta

Not All Cloud Services Are Built Alike: Okta's High Availability Architecture

Published By: Okta     Published Date: Jan 31, 2013
This technical whitepaper will provide an overview of the software and operational architecture that enables Okta to run a scalable, highly available, on demand identity and access management service.
Tags : 
cloud services, okta high availability, architecture, cloud service, high availability architecture, knowledge management, enterprise applications, data management, business technology, data center
    
Okta

Forrester Total Economic Impact™ Study: Okta Identity Management Service

Published By: Okta     Published Date: Jan 30, 2013
Okta commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying Okta On-Demand Identity and Access Management service. Download to learn more.
Tags : 
forrester totam economic impact, okta, identity management service, study, okta identity management, security, knowledge management, enterprise applications, data management, business technology, data center
    
Okta

Top 8 Identity & Access Management Challenges with Your Saas Applications

Published By: Okta     Published Date: Jan 30, 2013
This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : 
top 8, access management, challenges, saas applications, okta, it management, data management, business technology, data center
    
Okta

Better Identity and Access Management in the Age of Cloud Computing

Published By: Ping Identity     Published Date: Jan 29, 2013
Corporate security compliance requirements are driving new demands/requirements for identity and access management (IAM). Learn how you can extend your enterprise beyond the perimeter with stronger security, less risk and higher efficiency.
Tags : 
access management, age of cloud computing, cloud, ping, iam, enterprise security, security, knowledge management, data management, business technology, data center
    
Ping Identity

How Does IBM Deliver Cloud Security?

Published By: IBM     Published Date: Jan 25, 2013
IBM has written this paper to enable discussion around the new security challenges that the cloud introduces.
Tags : 
security, cloud, ibm, access management, identity management, governance, risk management, compliance, access control, anti spam, anti spyware, anti virus, application security, business continuity, disaster recovery, encryption, firewalls, hacker detection, internet security, intrusion detection
    
IBM

Gartner Magic Quadrant for Network Access Control

Published By: ForeScout     Published Date: Jan 24, 2013
ForeScout is a leader in the 2012 Magic Quadrant for Network Access Control. Read this magic quadrant report, which is based on the assessment based on vendor's completeness of vision, including market understanding, product and more.
Tags : 
gartner magic quadrant, network access control, forescout, leader in network access control, nac, overall viability, it management, knowledge management, enterprise applications, data management, business technology, data center
    
ForeScout

Deliver Unparalleled Business Advantage with BYOD

Published By: HP OMG Mobile Workforce     Published Date: Nov 27, 2012
This white paper explains how you can unleash the full potential of mobility - greater productivity, flexibility, and better economics - by unifying secure device access, user authentication, provisioning, and management.
Tags : 
byod, bring your own device, it infrastructure, mobile workforce, mobility, business technology
    
HP OMG Mobile Workforce

Magic Quadrant for User Administration/Provisioning

Published By: NetIQ     Published Date: Nov 05, 2012
User administration solutions manage identities and their attributes across systems, applications and resources. Buyers seek to demonstrate regulatory compliance while reducing project deployment times and costs.
Tags : 
iam, identity and access management, iam initiatives, security compliance, security, business technology, research
    
NetIQ

Learn how you can manage access risk in your organization

Published By: Courion     Published Date: Nov 05, 2012
In today's mobile, always-on, cloud-based business environment open is not a choice, it's a requirement. With openness comes access risk, does your organization have a strategy to identify, quantify and manage this risk? Learn more today!
Tags : 
courion, access risk management, cloud based environment, mobile, data loss prevention, security, data management, data center
    
Courion
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.