access management

Results 176 - 200 of 490Sort Results By: Published Date | Title | Company Name
By: Okta     Published Date: Jan 30, 2013
Okta commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying Okta On-Demand Identity and Access Management service. Download to learn more.
Tags : forrester totam economic impact, okta, identity management service, study, okta identity management, security, knowledge management, enterprise applications, data management, business technology, data center
     Okta
By: Okta     Published Date: Jan 31, 2013
This technical whitepaper will provide an overview of the software and operational architecture that enables Okta to run a scalable, highly available, on demand identity and access management service.
Tags : cloud services, okta high availability, architecture, cloud service, high availability architecture, knowledge management, enterprise applications, data management, business technology, data center
     Okta
By: Okta     Published Date: Jan 31, 2013
Okta’s cloud-based identity and access management service solves the issue of user identities on multiple networks with a highly available solution for all cloud based and web based application AD integrations. Learn how Okta can help you.
Tags : okta, active directory, integration, architecture, okta, knowledge management, enterprise applications, data management, business technology
     Okta
By: ForeScout     Published Date: Feb 18, 2014
Commissioned by ForeScout and conducted by The Tolly Group, one of the world’s leading independent product testing labs, the competitive analysis covers 34 criteria points across key functional categories: deployment, interoperability, guest management, endpoint compliance, enforcement, remediation and scalability. Before spending considerable time and resources to perform your POC, download this in-depth, 24-page report.
Tags : forescout, counteract, network access control, nac, deployment, interoperability, guest management, endpoint compliance, enforcement, remediation & scalability, networking, it management, knowledge management, enterprise applications, business technology
     ForeScout
By: ForeScout     Published Date: Feb 18, 2014
Find out how companies with hundreds to thousands of devices and distributed networks are managing security risks, enabling BYOD adoption, and supporting IT-GRC framework specifications. Download the Frost & Sullivan: Continuous Compliance and Next Generation NAC report. Click to download the report.
Tags : forescout, frost & sullivan, network access control, nac, deployment, interoperability, guest management, endpoint compliance, enforcement, remediation & scalability, byod, grc, networking, it management, knowledge management, enterprise applications
     ForeScout
By: Enterprise Mobile     Published Date: Jul 09, 2013
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. It’s time to move beyond mobile device management to a more holistic management method.
Tags : mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management, device management, enterprise mobile devices
     Enterprise Mobile
By: CA Technologies     Published Date: Mar 12, 2015
Learn 5 OAuth Essentials for API Access Control and see how these tips will allow you to successfully manage your API management infrastructure.
Tags : oauth, api, ca tehnologies, twitter, resource server, authorization, it management
     CA Technologies
By: Gigya     Published Date: Jun 08, 2015
Download this guide to get a grasp of the latest trends in user data management.
Tags : user data management, big data, identity and access management, compliance, mobilizing identity data, enterprise applications
     Gigya
By: Gigya     Published Date: Jun 08, 2015
The rise of eCommerce, social networks, mobile and connected devices has surfaced SAML as a key solution to develop a customer identity access management (cIAM) strategy to keep up with the flood of cross-channel consumer data.
Tags : ecommerce, social networks, mobile devices, customer identity access management, cross-channel consumer data, it management
     Gigya
By: Ruckus Wireless     Published Date: Aug 08, 2016
Minooka School District serves 4,500 pre-K through 8th-grade students. Challenge: Difficulty troubleshooting legacy Aironet infrastructure and supporting increased network demands. Solution: Ruckus Cloud Wi-Fi for distributed site network management.
Tags : cloud based access point, cloud based wifi, cloud managed wifi, cloud wifi, cloud based wifi management, cloud wifi controller, cloud managed wireless, cloud managed wireless access point, wifi for schools
     Ruckus Wireless
By: Ruckus Wireless     Published Date: Aug 08, 2016
Ruckus Cloud Wi-Fi is WLAN Management-as-a-Service that enables schools and small and medium businesses with limited IT resources to easily set-up, monitor, and manage a high-performance network, without compromising on Wi-Fi performance.
Tags : cloud based access point, cloud based wifi, cloud managed wifi, cloud wifi, cloud based wifi management, cloud wifi controller, cloud managed wireless, cloud managed wireless access point
     Ruckus Wireless
By: Ruckus Wireless     Published Date: Aug 08, 2016
Belleville Township High School District 201 serves 4,700 students. Challenge: Legacy Ubiquiti infrastructure was unable to support more than 30 clients per AP. Solution: 11ac APs provided superior WiFi performance and network reliability.
Tags : cloud based access point, cloud based wifi, cloud managed wifi, cloud wifi, cloud based wifi management, cloud wifi controller, cloud managed wireless, cloud managed wireless access point, wifi for schools
     Ruckus Wireless
By: Okta     Published Date: Nov 09, 2015
Gartner has named Okta as the only leader in its 2015 Identity & Access Management as a Service (IDaaS) Magic Quadrant. Access your complimentary Gartner report today.
Tags : okta, gartner, magic quadrant, identity and management, idaas, it management, data management, business technology
     Okta
By: Okta     Published Date: Nov 09, 2015
Enterprise mobility management and identity and access management offerings are moving toward meaningful integration. IAM and mobility leaders must take advantage to gain convenience, security and efficiency benefits. Read this report to learn more.
Tags : okta, enterprise mobility, mobility management, access management, mobility leaders, efficiency, efficiency benefits, security, knowledge management, data management, business technology
     Okta
By: Okta     Published Date: Nov 09, 2015
This Forrester report outlines the future IT environment for security and risk (S&R) executives working on building an identity and access management strategy for the extended enterprise. Read this report to learn more.
Tags : okta, forrester, identity and access management, it environment, security and risk, security, it management, data management
     Okta
By: Dassault Systèmes     Published Date: Aug 08, 2017
Midsize Aerospace and Aviation manufacturers need to choose a system that quickly delivers the core capabilities they need to streamline product development but also gives them room to grow value over time. Product Lifecycle Management (PLM) software can help. It drives better product development performance by managing product-related data, processes and projects. While smaller companies may be able to control, access and share product data with relatively simple Product Data Management (PDM) tools, larger manufacturers rely on full featured PLM systems that help automate processes and share data across global Aerospace and Aviation companies.
Tags : aerospace, aviation, manufacturing, product development, plm, product lifecycle management, automation, data
     Dassault Systèmes
By: Dassault Systèmes     Published Date: Aug 08, 2017
Industrial Equipment Manufacturers have to connect closely with customers and introduce new products quickly and efficiently to meet their needs. While smaller Industrial Equipment Manufacturers may be able to control, access, and share product data with relatively simple Product Data Management (PDM) tools, larger Industrial Equipment Manufacturers rely on full-featured PLM systems that help automate processes and share data across global supply chains. Industrial Equipment Manufacturer companies may find themselves in-between because: • Product and organizational complexity drive them beyond basic PDM capabilities • A full-featured PLM implementation may feel out of reach They need to choose a system that quickly delivers the core capabilities they need to streamline product development but also gives them room to grow value over time. What’s the right size PLM to fit an Industrial Equipment Manufacturer? Let’s take a look.
Tags : pdm, product data management, industrial, equipment manufacturers, plm, dassault
     Dassault Systèmes
By: CA Technologies EMEA     Published Date: May 25, 2018
As cycles accelerate and timelines shorten, projects are being recognized—by necessity— as the delivery arm for strategy. In this environment, anything less than real-time access to real-time project data is too slow, because businesses need to know where they’re heading, not just where they’ve been. CA Project & Portfolio Management (CA PPM 15.3) has added new capabilities to support project, financial and resource management across individual initiatives and entire portfolios. We’ve also built new, embedded BI capabilities that make powerful data and insights more accessible to everyone.
Tags : budgets, project, cash, flows, finance, project, management
     CA Technologies EMEA
By: OKTA     Published Date: Sep 26, 2017
Cyberbreaches aren’t just in the news—they are the news. Yet headlines rarely mention the No. 1 source of those breaches: weak or stolen passwords. Whether they involve malware, hacking, phishing, or social engineering, the vast majority of breaches begin with account compromise and credential theft, followed by dormant lateral network movement and data exfiltration. In fact, weak or stolen passwords account for a staggering 81% of breaches, according to the Verizon 2017 Data Breach Investigations Report. Not surprisingly, a new Okta-sponsored IDG survey finds that identity access management (IAM) is a top priority for nearly three-quarters (74%) of IT and security leaders. Yet the same survey uncovers widespread concern that their current IAM implementations are falling short. Just one worrisome example: Fewer than one-third (30%) of respondents report a good or better ability to detect a compromise of credentials. The following report explores the gap between respondents’ aspiratio
Tags : 
     OKTA
By: OKTA     Published Date: Sep 26, 2017
Traditional web applications pre-date modern standards like SAML and OpenIDConnect, so they often use legacy authentication methods to grant end users access. Historically, providing Single Sign-On and centralized access management for end users across these legacy applications required a Web Access Management, or WAM, product. These on-premises software tools could be expensive to maintain and complex to deploy. Now, modern identity providers like Okta in conjunction with best-of-breed network management technologies offer a better way. This white paper describes how web applications that lack modern standard support can be integrated into a cloud-based Identity-as-a-service architecture.
Tags : 
     OKTA
By: CA Technologies EMEA     Published Date: Apr 10, 2018
Challenge Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure. Opportunity Knowing your privileged users is knowing your risk. Privileged access management tools themselves must be able to support automation in the authorization process and enable scalability through support for both dynamic operations and ephemeral infrastructure. Benefits Better pinpointing attacks exploiting credential theft isn’t simply a question of accumulating more data but involves incorporating better data about privileged user behaviour, which can identify significant changes that represent real risk.
Tags : 
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Apr 10, 2018
La sfida Come ci si può aspettare, le aziende che intraprendono un percorso di digital transformation devono affrontare maggiori problemi correlati a rischi e sicurezza. Le iniziative di digital transformation aumentano inevitabilmente il numero dei punti di accesso all'infrastruttura aziendale che sfuggono ai controlli esistenti, sono accessibili a un numero superiore di set di identità diversi e proliferano all'interno di un'infrastruttura distribuita e dinamica. L'opportunità Conoscere i propri utenti con privilegi significa conoscere i rischi. Di per sé, gli strumenti di privileged access management devono essere in grado di supportare l'automazione nel processo di autorizzazione e garantire la scalabilità attraverso il supporto di operations dinamiche e infrastrutture effimere, come gli account amministrativi Amazon Web Services (AWS) per le identità umane.
Tags : 
     CA Technologies EMEA
By: F5 Networks Inc     Published Date: Jan 03, 2014
Today, the shift to a cloud-based enterprise IT architecture is a foregone conclusion for a variety of organizations. As a result, cloud-based security has become a top priority. Read this whitepaper to learn about the challenges of cloud-based security and identity and access management as well as how your business can overcome these challenges with best-in-class solutions.
Tags : idc, cloud, cloud federation, identity and access management, iam, security, silos, deployment
     F5 Networks Inc
By: F5 Networks Inc     Published Date: Jan 03, 2014
In today's cloud-based, mobile IT world, the need for security is rapidly growing. As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what is also growing. This Technology Spotlight discusses the challenges of cloud identity access management and provides guidance on which IAM architectural solutions would benefit your business.
Tags : security, cloud, application delivery, authentication, access control, application security, silos, password fatigue, iam
     F5 Networks Inc
By: Burton Group     Published Date: Jul 07, 2008
The identity federation market enjoys an exceptional supply of products. With well over a dozen products available to enterprise customers, most architects have more choices than time will allow for evaluation. This abundance of products is partly the result of the inherent difficulty of developing a truly multipurpose federation server. Although federation products are similar in name, each has its own personality and idiosyncrasies that make it suitable for certain environments but insufficient in others.
Tags : fim, federated identity management, identity federation, access control, identity management, passport, burton group, networking
     Burton Group
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com