policies

Results 126 - 150 of 397Sort Results By: Published Date | Title | Company Name

The 5 Next Big Things in Mobile Security (German)

Published By: VMware     Published Date: Feb 24, 2017
Security for mobile devices, applications, and content is a paramount concern in a mobility management strategy. Whether using a corporate-owned or employee-owned device, employees access corporate data, email, and more from their mobile devices. These user actions require businesses to implement a mobile strategy with strong security policies. This flipbook covers the five next big trends in mobile security.
Tags : 
    
VMware

The 5 Next Big Things in Mobile Security (Spanish)

Published By: VMware     Published Date: Feb 24, 2017
Security for mobile devices, applications, and content is a paramount concern in a mobility management strategy. Whether using a corporate-owned or employee-owned device, employees access corporate data, email, and more from their mobile devices. These user actions require businesses to implement a mobile strategy with strong security policies. This flipbook covers the five next big trends in mobile security.
Tags : 
    
VMware

The 5 Next Big Things in Mobile Security (French)

Published By: VMware     Published Date: Feb 24, 2017
Security for mobile devices, applications, and content is a paramount concern in a mobility management strategy. Whether using a corporate-owned or employee-owned device, employees access corporate data, email, and more from their mobile devices. These user actions require businesses to implement a mobile strategy with strong security policies. This flipbook covers the five next big trends in mobile security.
Tags : 
    
VMware

The 5 Next Big Things in Mobile Security (Italian)

Published By: VMware     Published Date: Feb 24, 2017
Security for mobile devices, applications, and content is a paramount concern in a mobility management strategy. Whether using a corporate-owned or employee-owned device, employees access corporate data, email, and more from their mobile devices. These user actions require businesses to implement a mobile strategy with strong security policies. This flipbook covers the five next big trends in mobile security.
Tags : 
    
VMware

The 5 Next Big Things in Mobile Security (Japanese)

Published By: VMware     Published Date: Feb 24, 2017
Security for mobile devices, applications, and content is a paramount concern in a mobility management strategy. Whether using a corporate-owned or employee-owned device, employees access corporate data, email, and more from their mobile devices. These user actions require businesses to implement a mobile strategy with strong security policies. This flipbook covers the five next big trends in mobile security.
Tags : 
    
VMware

Getting a Grip on Content: Empowered Content Collaboration in the Cloud

Published By: IBM     Published Date: Jan 19, 2017
This ebook takes you on a journey to discover a cloud-based content management solution that provides greater visibility and collaborative control over business content. Meet Mike, an IT Solutions Executive, looking for an innovative way to collaborate that's secure, easy to use, immediate and accessible -- all while meeting strict governance policies.
Tags : 
ibm, analytics, ecm, box, box for it, content, cloud, content management, enterprise applications, business technology
    
IBM

Making intelligent decisions about identities and their access

Published By: IBM     Published Date: Jan 09, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. By aligning governance related policies and rules with all identity management processes, organizations can achieve continuous, sustainable compliance, thereby reducing the need for after the fact fixes and expensive, error prone manual remediation. IBM Security Identity Governance and Intelligence helps organizations effectively, comprehensively manage identities and application access
Tags : 
ibm, security, identity governance and intelligence, identity governance, enterprise applications, business technology
    
IBM

Transforming the Enterprise with Secure Mobility

Published By: Cisco     Published Date: Dec 21, 2016
Employees are mobile because we support everyone with technology and policies that allow them to work flexibly in terms of time, place, and device. We deliver this capability through Cisco products for secure wireless LAN (WLAN) and home and remote access (Cisco Virtual Office and VPN), as well as softphones, Cisco® WebEx®, Cisco Spark™, and extension mobility features. Our bring your own device (BYOD) policies and program allow employees to use their personal mobile devices to access the Cisco network, after the device is registered and confirmed as compliant with our security requirements for making it a secure or trusted device.
Tags : 
    
Cisco

Size Doesn't Matter, Prices Do

Published By: IBM     Published Date: Nov 17, 2016
Read this IBM white paper to learn why all retailers, no matter their size, need the ability to efficiently manage and execute accurate prices, improve their responsiveness to competitor pricing, and ensure compliance with their strategic pricing policies and goals.
Tags : 
ibm, commerce, analytics, retail, merchandising, pricing, intelligent pricing, enterprise applications, business technology
    
IBM

Why Choose Okta vs. ADFS?

Published By: Okta     Published Date: Nov 09, 2016
You're moving towards Office 365 and you want true single sign-on for users. You also want to ensure authentication is directly tied back to the policies and user status in Active Directory. With Okta's lightweight agent, you can minimize your on-prem footprint as you move to the cloud. Zero servers and on-prem software to deploy, update and manage means lower TCO. Download this white paper to learn more!
Tags : 
    
Okta

Top 5 Reasons Why Mobile Will Transform Enterprise Authentication

Published By: Entrust Datacard     Published Date: Oct 24, 2016
The mobile device is part and parcel of daily life. It’s fundamentally changed the way consumers behave, and this influence has spread to the enterprise sector as well. For instance, patron-owned mobile devices have largely helped pave the way for the widespread emergence of bring-your-own-device (BYOD) policies. Ten years ago, the idea of a company employee logging into the enterprise system while they’re on an airplane over the Atlantic would seem far-fetched, but today such behavior is relatively commonplace. Mobility is changing how we shop, work and live our daily lives.
Tags : 
    
Entrust Datacard

THE DEFINITIVE GUIDE TO POLICY MANAGEMENT

Published By: NAVEX Global     Published Date: Oct 18, 2016
If you are looking for a deeper understanding of how to effectively and efficiently manage your organization’s employee handbook, code of conduct, and policies and procedures, The Definitive Guide to Policy Management is your go-to resource.
Tags : 
    
NAVEX Global

Getting a Grip on Content: Empowered Content Collaboration in the Cloud

Published By: IBM     Published Date: Oct 18, 2016
This ebook takes you on a journey to discover a cloud-based content management solution that provides greater visibility and collaborative control over business content. Meet Mike, an IT Solutions Executive, looking for an innovative way to collaborate that's secure, easy to use, immediate and accessible -- all while meeting strict governance policies.
Tags : 
ibm, analytics, ecm, box, box for it, content, cloud, content management, knowledge management, enterprise applications, data management, data center
    
IBM

Choosing the Optimal Data Center Power Density

Published By: Schneider Electric     Published Date: Oct 17, 2016
This white paper analyzes these costs and presents a flexible architecture to accommodate a well-specified density, and discusses the importance of operational policies in enforcing the specification.
Tags : 
    
Schneider Electric

Power and Cooling Guidelines for Deploying IT in Colocation Data Centers

Published By: Schneider Electric     Published Date: Oct 17, 2016
This paper explains some of the causes of stranded power, cooling, and space capacity in colocation data centers and explains how high-density rack power distribution, air containment, and other practices improve availability and efficiency. Examples of acceptable use policies that address these issues are provided.
Tags : 
    
Schneider Electric

Size Doesn't Matter, Prices Do

Published By: IBM     Published Date: Oct 10, 2016
Read this IBM white paper to learn why all retailers, no matter their size, need the ability to efficiently manage and execute accurate prices, improve their responsiveness to competitor pricing, and ensure compliance with their strategic pricing policies and goals.
Tags : 
ibm, commerce, omni-channel, merchandising, retail, retailers, knowledge management, enterprise applications, business technology
    
IBM

A Guide for Evaluating the Value of VCE Converged Infrastructure for Data Center Modernization

Published By: Dell EMC     Published Date: Sep 12, 2016
Cloud computing is transforming IT in terms of how services are delivered, how infrastructure is deployed and managed, and how IT organizations structure themselves. For the purposes of this study, Forrester is defining a cloud solution as having three major characteristics: “self-service access, full automation of processes and policies, and metering and tracking of usage.”1 It then becomes a question of whether you manage your cloud(s) yourself, outsource it, or use a hybrid combination of private and public cloud resources.
Tags : 
    
Dell EMC

Your Risk: The Top Mobile Security Issues Decoded

Published By: Panasonic     Published Date: Aug 04, 2016
Cybersecurity is top of mind for companies with workers using mobile computing devices. Report identifies top field service security risks, why security policies are critical, and includes a security checklist.
Tags : 
cyber risk, security, mobile security, best practices, business management
    
Panasonic

Simplifying Fraud Analytics: 10 Steps to Detect and Prevent Insurance Fraud

Published By: SAS     Published Date: Aug 03, 2016
Insurance fraud has existed wherever insurance policies are written, taking different forms to suit the economic times. Today the magnitude of insurance fraud is not only startling but increasing. Recent studies by the US National Insurance Crime Bureau (NICB) reported a 24 percent rise in questionable claims for the period 2011 to 2013. The full scale of insurance fraud is not known. And if fraudulent behavior is not discovered at the time the claim is submitted, the insurer may never know it occurred. Consequently, an uninvestigated claim can’t be labeled as fraudulent to investigate.
Tags : 
technology, best practices, security, analytics, insurance fraud, business analytics, business technology
    
SAS

Okta Directory Integration – An Architecture Overview

Published By: Okta     Published Date: Jul 27, 2016
For most companies, Active Directory (AD) or LDAP and play the central role in coordinating identity and access management policies. Directory integration typically serves as a "source of truth" for user identities, and it provides access control to on-premises resources such as networks, file servers, and web applications. A byproduct of the transition to cloud applications is the proliferation of separate user stores; each cloud application typically is rolled out independently and therefore has its own unique database of user credentials. Okta's cloud-based identity and access management service solves these problems with a single integration point that provides a highly available solution for all cloud and web-based application Active Directory integrations.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications
    
Okta

Why Choose Okta vs ADFS?

Published By: Okta     Published Date: Jul 27, 2016
You're moving towards Office 365 and you want true single sign-on for users. You also want to ensure authentication is directly tied back to the policies and user status in Active Directory. With Okta's lightweight agent, you can minimize your on-prem footprint as you move to the cloud. Zero servers and on-prem software to deploy, update and manage means lower TCO.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta

Okta Directory Integration – An Architecture Overview

Published By: Okta     Published Date: Jul 25, 2016
For most companies, Active Directory (AD) or LDAP and play the central role in coordinating identity and access management policies. Directory integration typically serves as a "source of truth" for user identities, and it provides access control to on-premises resources such as networks, file servers, and web applications. A byproduct of the transition to cloud applications is the proliferation of separate user stores; each cloud application typically is rolled out independently and therefore has its own unique database of user credentials. Okta's cloud-based identity and access management service solves these problems with a single integration point that provides a highly available solution for all cloud and web-based application Active Directory integrations.
Tags : 
cloud computing, cloud applications, best practices, applications, access management, business analytics, business management, business technology
    
Okta

Mobile Device Management: Looking Beyond BYOD

Published By: Kaspersky     Published Date: Jul 22, 2016
Do you have policies and plans in place to meet your user’s needs while keeping those devices—and your company’s sensitive information—secure?
Tags : 
kaspersky, byod, mobile device management, mobile workers, mobile security, remote security, mobile computing, smart phones, wireless messaging, wireless security, data protection, collaboration, messaging, data loss prevention
    
Kaspersky

Move Traditional Apps to Cloud – Gartner Report

Published By: HPE_OMG_7.16     Published Date: Jul 22, 2016
With many enterprises implementing a hybrid cloud environment to move applications to cloud, IT organizations must establish a decision-making framework for evaluating, deploying, and operating applications in the cloud. Businesses need to be able to deliver applications in the right way and on the right cloud, so IT organizations seek insight into setting policies for the best placement of applications across different cloud options. In this report, Gartner offers analysis and recommendations for moving traditional apps to private cloud and for brokering and managing apps across different private and public cloud options.
Tags : 
technology, best practices, cloud computing, infrastructure, best practices, business intelligence, business management, business process automation, content management system
    
HPE_OMG_7.16

Move Traditional Apps to Cloud – Gartner Report

Published By: Hewlett Packard Enterprise     Published Date: Jul 20, 2016
With many enterprises implementing a hybrid cloud environment to move applications to cloud, IT organizations must establish a decision-making framework for evaluating, deploying, and operating applications in the cloud. Businesses need to be able to deliver applications in the right way and on the right cloud, so IT organizations seek insight into setting policies for the best placement of applications across different cloud options. In this report, Gartner offers analysis and recommendations for moving traditional apps to private cloud and for brokering and managing apps across different private and public cloud options.
Tags : 
technology, best practices, cloud computing, infrastructure, best practices, business intelligence, business management, business technology
    
Hewlett Packard Enterprise
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.