access management

Results 351 - 375 of 519Sort Results By: Published Date | Title | Company Name

PC Lifecycle Management Interactive eGuide

Published By: Dell     Published Date: May 09, 2017
Dell’s approach to PC Lifecycle management is designed to help customers make the change from IT maintenance to innovation all while controlling their PC infrastructure costs. With this eGuide IT professionals will learn how to deploy, secure, and support PCs with unparalleled efficiency leveraging Dell’s industry-leading hardware, services, and security solutions. Access the eGuide from Dell and Intel® and you will learn: • Why IT needs to take a different approach PC lifecycle management • The four critical stages of the PC lifecycle (Plan, Deploy, Manage, and Retire) • How to partner with Dell to strategically migrate to Windows 10 • What solutions can help in each phase to reduce costs and increase IT productivity • The latest security solutions to protect data and employees
Tags : 
it maintenance, pc lifecycle, pc infrastructure, pc support, pc lifecycle management
    
Dell

PC Lifecycle Management Interactive eGuide

Published By: Dell     Published Date: Nov 09, 2017
Dell’s approach to PC Lifecycle management is designed to help customers make the change from IT maintenance to innovation all while controlling their PC infrastructure costs. With this eGuide IT professionals will learn how to deploy, secure, and support PCs with unparalleled efficiency leveraging Dell’s industry-leading hardware, services, and security solutions. Access the eGuide from Dell and Intel® and you will learn: • Why IT needs to take a different approach PC lifecycle management • The four critical stages of the PC lifecycle (Plan, Deploy, Manage, and Retire) • How to partner with Dell to strategically migrate to Windows 10 • What solutions can help in each phase to reduce costs and increase IT productivity • The latest security solutions to protect data and employees Intel Inside®. Powerful Productivity Outside. Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell

PC Lifecycle Management Interactive eGuide

Published By: Dell EMC     Published Date: May 09, 2018
Dell’s approach to PC Lifecycle management is designed to help customers make the change from IT maintenance to innovation all while controlling their PC infrastructure costs. With this eGuide IT professionals will learn how to deploy, secure, and support PCs with unparalleled efficiency leveraging Dell’s industry-leading hardware, services, and security solutions. Access the eGuide from Dell and Intel® and you will learn: • Why IT needs to take a different approach PC lifecycle management • The four critical stages of the PC lifecycle (Plan, Deploy, Manage, and Retire) • How to partner with Dell to strategically migrate to Windows 10 • What solutions can help in each phase to reduce costs and increase IT productivity • The latest security solutions to protect data and employees
Tags : 
    
Dell EMC

PCI DSS v2.0 requires full control, audit and monitoring of privileged users and their access.

Published By: e-DMZ Security LLC     Published Date: Nov 16, 2010
This whitepaper discusses how e-DMZ Security's Total Privileged Access Management enhances host controls to deliver PCI compliance.
Tags : 
e-dmz security, pci compliance, compliance, pci dss, access control, password management, privileged users, security management
    
e-DMZ Security LLC

PCI: Using Microsoft Active Directory to Address PCI Requirements in Heterogeneous Environments

Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the compelling business and technical case for centralizing administration in Microsoft's Active Directory, using Centrify's DirectControl to extend Active Directory authentication and access control to your UNIX, Linux and Mac OS systems and applications, and using Centrify's DirectAudit to log user activity to provide you a clear picture of end user actions on all UNIX and Linux systems.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance
    
Centrify Corporation

PDF security - a brief history of development

Published By: LockLizard     Published Date: Dec 08, 2008
This paper covers the development of PDF security from simple password protection mechanisms to access controls and DRM.  It discusses lifecycle management, PKI and digital certificates, PDF password security, PDF encryption, PDF DRM, Adobe livecycle / policy server, PDF control, and third party systems and standards for protecting PDF files. Normal 0 false false false EN-US X-NONE X-NONE
Tags : 
pdf security, pdf passwords, pdf drm, adobe pdf security, security, application security, encryption, password management
    
LockLizard

Performance Management: Managing Key Performance Indicators

Published By: Clarus Systems     Published Date: Mar 18, 2008
Accessible through a web-based, interactive dashboard, the latest version of the ClarusIPC Plus+ solution integrates performance management capabilities that create real-world "What-if" scenarios to predict capacity issues before they have a chance to impact end users. By monitoring KPI's such as server health, gateway capacity, media resources and device registration, you consistently maintain the ability to estimate future bandwidth needs.
Tags : 
itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices
    
Clarus Systems

Plugging the Holes in a Telecom Network

Published By: Asentria Corporation     Published Date: Sep 04, 2007
Telecom operations typically have sophisticated network and systems management (NSM) software in place to monitor their servers, workstations and routers. Such systems often utilize Simple Network Management Protocol (SNMP) as a means of transmitting and receiving network monitoring information. Great - if you run only modern equipment. 
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation

Powering Transformation

Published By: ServiceNow     Published Date: Feb 07, 2012
Download the white paper to find out more about next-gen IT solutions - and how IT in the cloud will help your organization not only keep up with today's complex IT ecosystem, but manage it more efficiently than ever before!
Tags : 
powering, transformation, cloud, investments, integration, access data, performance, revolution
    
ServiceNow

Privileged Access Management

Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
For organizations with additional security requirements for high value servers hosting business-critical assets, CA Privileged Access Manager Server Control provides localized, fine-grained access control and protection over operating system-level access and application-level access. Agent-based, kernel-level protection is available for individual files, folders and specific commands based on policy and/or finedgrained controls on specific hosts.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA

Privileged Access Management

Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
Das Privileged Access Management umfasst Funktionen für Kontrolle, Monitoring und Auditing, mit denen die Risiken im Zusammenhang mit privilegierten Anwendern, Accounts und Anmeldeinformationen gemindert werden sollen. In den letzten Jahren hat sich herausgestellt, dass diese Aufgabe für Unternehmen aller Arten hohe Priorität hat. Diesem Anstieg an Interesse und Aufmerksamkeit liegen mehrere Faktoren zugrunde:
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it, datensicherheit, privilegierter accounts, privilegierte anwender
    
CA Technologies EMEA

Privileged access management maturity model per la digital transformation

Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
La sfida Come ci si può aspettare, le aziende che intraprendono un percorso di digital transformation devono affrontare maggiori problemi correlati a rischi e sicurezza. Le iniziative di digital transformation aumentano inevitabilmente il numero dei punti di accesso all'infrastruttura aziendale che sfuggono ai controlli esistenti, sono accessibili a un numero superiore di set di identità diversi e proliferano all'interno di un'infrastruttura distribuita e dinamica. L'opportunità Conoscere i propri utenti con privilegi significa conoscere i rischi. Di per sé, gli strumenti di privileged access management devono essere in grado di supportare l'automazione nel processo di autorizzazione e garantire la scalabilità attraverso il supporto di operations dinamiche e infrastrutture effimere, come gli account amministrativi Amazon Web Services (AWS) per le identità umane.
Tags : 
    
CA Technologies EMEA

Privileged Access Management: A Roadmap to Calculating Total Cost of Ownership

Published By: CA Technologies     Published Date: Jun 26, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies

Privileged Access Management: A Roadmap to Calculating Total Cost of Ownership

Published By: CA Technologies     Published Date: Aug 22, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies

Privileged Access Management: A Roadmap to Calculating Total Cost of Ownership

Published By: CA Technologies     Published Date: Jun 01, 2018
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies

Privileged Access Management: The Key To Protecting Your Business Amid Cybercrime's Current Boom

Published By: CA Technologies     Published Date: Sep 25, 2017
Available as a rack-mounted, hardened hardware appliance, an Open Virtualization Format (OVF) Virtual Appliance or an Amazon Machine Instance (AMI), CA Privileged Access Manager enhances security by protecting sensitive administrative credentials, such as root and administrator passwords, controlling privileged user access and proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.
Tags : 
cloud applications, infrastructure, optimization, automation tools, administrative power, ca technologies
    
CA Technologies

Privileged Access Management: The Key To Protecting Your Business Amid Cybercrime’s Current Boom

Published By: CA Technologies     Published Date: Apr 06, 2017
Available as a rack-mounted, hardened hardware appliance, an Open Virtualization Format (OVF) Virtual Appliance or an Amazon Machine Instance (AMI), CA Privileged Access Manager enhances security by protecting sensitive administrative credentials, such as root and administrator passwords, controlling privileged user access and proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.
Tags : 
cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
    
CA Technologies

Privileged User Governance - A Key to Effective Breach Protection

Published By: CA Technologies     Published Date: Sep 25, 2017
Managing privileged users is a continuous and critical process. First, you must discover where your admin accounts are and eliminate improper privileges and orphan accounts. Next, you must enforce your least-privilege policies for these users and eliminate shared accounts—this is called privileged access management (PAM). Lastly, you must govern privileged access to avoid entitlement creep and to ensure that each user still needs any elevated privileges that they have. If any one of these essential capabilities are weak or missing, your overall risk of breach or insider threat rises significantly.
Tags : 
integration, developers, open enterprise, api, business, ca technologies
    
CA Technologies

Project Liberate Whitepaper: An IBM complimentary Consulting Engagement

Published By: IBM     Published Date: Aug 10, 2009
This whitepaper captures the lessons learned from various Project Liberate engagements worldwide and presents best practices from these case studies as well as advice on negotiating strategies. The information is based on publicly available data sources (which are subject to change as offerings change), customer feedback, and IBM’s own experience in dealing with these offerings. Learn more today!
Tags : 
ibm, wibm, consulting engagement, customer experience, microsoft enterprise agreement, microsoft enterprise agreements, cal, core client access license
    
IBM

Protect Users and Critical Data with Advanced Access Security

Published By: IBM     Published Date: Oct 26, 2017
Improper user access to applications can expose an organization to cyber attacks, with wide-ranging financial, social, public relations and legal implications for a compromised enterprise. To address these risks—and to meet regulatory requirements for authentication, data privacy and security—organizations sometimes find themselves wrestling with complex and costly access-management approaches.
Tags : 
critical data, access security, user experience, it strategy, identity federation
    
IBM

Protect Your Private Data with Privileged Account Management

Published By: Lieberman Software     Published Date: Mar 27, 2012
Lieberman Software offers a solution today that helps secure unmanaged privileged accounts in your datacenter and prevent data breaches. Watch how we do it in this brief two minute video.
Tags : 
privileged identity management, enterprise password management, administrator access control, privilege account management, security management, it security audit, enterprise security, security
    
Lieberman Software

Protecting HTTP Traffic: Why Web Filtering Should Be Your First Line of Defense

Published By: Secure Computing     Published Date: Aug 21, 2009
This paper outlines the types of threats that leverage the Internet as a means of delivery and the risks that they pose to your organization. Learn the key drivers of a corporate security policy and how you can protect against HTTP-based threats using Web filtering as part of a multi-layered content security strategy.
Tags : 
security, anti spyware, malware prevention, malware, access control, hacker detection, internet security, security management
    
Secure Computing

Quest Workspace Privilege Manager

Published By: Dell Software     Published Date: Jul 24, 2012
Quest Workspacetm Privilege Manager lets IT administrators grant selected privileges to users so they can update their own PCs, reducing help desk calls while maintaining a secure network. Elevate and manage user rights quickly and precisely with our Validation Logic targeting technology. Use privilege elevation rules from the Privilege Authority Community Edition, or create your own rules and allow administrator-level access to only the applications, Windows processes and ActiveX controls you deem safe.
Tags : 
user access, network security, verify files, elevate activex, setup.exe, setup.msi, elevate applications, target workstations
    
Dell Software

Re-architect Your Network for BYOD

Published By: HPE     Published Date: Mar 23, 2015
If you’ve noticed more employees accessing the corporate network using their personally owned mobile devices, you’re not alone. Many employees are boosting their productivity by using their smartphones and tablets at work. Gone are the days of corporate IT departments dictating the types of mobile devices that could access the network. Bring your own device (BYOD) policies, while increasing employee satisfaction and productivity, are straining corporate networks. This white paper describes the limitations of legacy networks, especially for supporting BYOD. Understanding these limitations can pave the way for a successful BYOD management policy for campus and branch networks.
Tags : 
corporate network, personal devices, smartphone, tablet, legacy networks, byod
    
HPE

Reaping the Benefits of Next Generation Dashboards

Published By: SAP     Published Date: Nov 22, 2011
Today's competitive and fast-paced business environment requires that more people have access to real-time performance and status information, so they can make quick and intelligent decisions. The need for timely and succinct business intelligence continues to grow as executives demand critical information to seize opportunities faster than competitors and to address potential problems in the making. C-level executives and upper management aren't the only staff needing access to business intelligence. Business unit managers and rank-and-file personnel increasingly must also have updated information to do their jobs. This white paper discusses the features and benefits of next generation dashboards.
Tags : 
ziff davis enterprise, dashboards, business intelligence, technology, business trends, bi solutions, analytical applications, data protection
    
SAP
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.