access management

Results 226 - 250 of 490Sort Results By: Published Date | Title | Company Name
By: Box     Published Date: May 31, 2012
Here's how some of the nation's most progressive corporations are meeting the many needs of their mobile workers - without overwhelming their IT departments - with the help of Box.
Tags : mobile, mobile worker, communication devices, free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace, wireless
     Box
By: Box     Published Date: May 31, 2012
Read how one company's continuing consolidation of file sharing technologies reaped benefits that any organization may derive by undertaking that effort.
Tags : sharing, dow, free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace, knowledge management
     Box
By: Box     Published Date: May 31, 2012
This Gilbane Group Beacon examines how large-­scale trends are changing enterprise collaboration and content sharing expectations. It defines Cloud Content Management, an emerging set of content management practices.
Tags : cloud, content management, active control, collaboration, sharing, content sharing, free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management
     Box
By: Box     Published Date: May 31, 2012
This IDC Vendor Profile analyzes Box, a company playing in the public cloud advanced storage services market and the content management and collaboration market, and reviews key success factors, highlighting market information tailored to investment.
Tags : content, cloud, collboration, enterprises, free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace
     Box
By: Box     Published Date: May 31, 2012
Read how organizations are realizing massive productivity gains by transitioning their content management solutions to cloud-based models.
Tags : free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace, networking, knowledge management
     Box
By: Box     Published Date: Jun 04, 2012
Enter Box. Our partner integrations and robust security suite ensure employees get any-device, on-the-go content sharing and collaboration... while IT retains control and visibility of all user accounts. Get Your FREE Box IT Strategy Kit!
Tags : free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace, security, enterprise applications
     Box
By: Box     Published Date: Jun 07, 2012
Read how Box let companies rapidly implement a cost-effective and secure content storage and sharing system that can easily expand to accommodate any size and number of files.
Tags : free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace, networking, storage
     Box
By: Box     Published Date: Jun 11, 2012
This paper examines the market drivers, inhibitors, and top vendors in this segment, including Box, Citrix Sharefile, Dropbox, Egnyte, Nomadesk, Sugarsync, Syncplicity and YouSendIt.
Tags : free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace, wireless, enterprise applications
     Box
By: HP OMG Mobile Workforce     Published Date: Nov 27, 2012
This white paper explains how you can unleash the full potential of mobility - greater productivity, flexibility, and better economics - by unifying secure device access, user authentication, provisioning, and management.
Tags : byod, bring your own device, it infrastructure, mobile workforce, mobility, business technology
     HP OMG Mobile Workforce
By: NETIQ     Published Date: Dec 03, 2013
This white paper discusses how delegating Microsoft Active Directory administration using a directory management solution such as NetIQ® Directory and Resource Administrator™ can help you to achieve a more secure, efficient and compliant organization.
Tags : netiq, microsoft, active directory, complexity, security, identity management solution, directory management solutions, active directory administration, access management, business technology
     NETIQ
By: NETIQ     Published Date: Dec 03, 2013
A poll of CIOs and IT managers reports why departments must defend against complex internal and external threats while mitigating regulatory and compliance concerns. The results provide data about how enterprises view compliance.
Tags : security compliance, users access management, it management compliance
     NETIQ
By: NETIQ     Published Date: Jun 20, 2014
Having identity and access management solutions is a must these days. But what happens when someone gets around your solution?
Tags : netiq, api, hijacking, cyberthreats, insider credentials, security, it management
     NETIQ
By: BMC Software     Published Date: Mar 17, 2014
Your people and business can do amazing things when technology runs at its best. The new ITSM experience helps organizations achieve greatness in today’s mobile, social and user-centric reality. Discover a better way for users to access service and support anywhere, anytime. Explore enhanced productivity for IT staff, and seamless integration across IT operation management systems. Download now.
Tags : bmc, itsm solutions, changing business, cloud, cios, software, it organizations, saas, mobile, social, on demand solutions, networking, it management, data management, data center
     BMC Software
By: Bitium     Published Date: Jan 22, 2014
Selecting the right single sign-on solution (SSO) for your organization can be a daunting task. Competing solutions offer varying levels of application support, management overhead, and potentially confusing (and counter- productive) cost structures. But the upside in terms of improved security, manageability and user productivity enhancements provided by the right SSO solution can be dramatic. The questions contained within are intended to help you collect and organize the critical information you need to make a well-informed decision for your organization. Please use them as a guide during your due diligence and vendor selection process. Please download the white paper to learn more.
Tags : single sign on, sso, identity as a service, idaas, access and identity management, identity access management, password management, password manager, it management, enterprise applications, business technology
     Bitium
By: RSA     Published Date: Aug 28, 2014
A major shift has occurred with Identity and Access Management (IAM) in the past few years. Organizations have realized that the traditional approach to IAM doesn't work. It doesn't work because IT doesn't have the context to make the decisions around access. It's the lines of business that have the intelligence and business context to make decisions about Identity and Access Management.
Tags : access management, iam, intelligence, business context, identity, security, data management
     RSA
By: Okta     Published Date: Nov 09, 2015
For most companies, Active Directory (AD) or LDAP and play the central role in coordinating identity and access management policies. Read this whitepaper to learn how to eliminate the pitfalls that come with trying to build and manage multiple on-premises Active Directory integrations yourself.
Tags : okta, active directory, ldap, identity and access management, it management, enterprise applications, platforms, data management, business technology, data center
     Okta
By: Okta     Published Date: Apr 29, 2015
Enterprise mobility management and identity and access management offerings are moving toward meaningful integration. IAM and mobility leaders must take advantage to gain convenience, security and efficiency benefits. Read this report to learn why.
Tags : identity, iam, management, mobile, security, it management
     Okta
By: IBM     Published Date: Jun 16, 2009
As products go to market quicker, employees, customers, and business partners need the ability to collaborate and access business data—when, where, and how ever they choose. Watch this illustrated demo to see how IBM offers a smarter, business-driven approach to Identity and Access Management. And how IBM’s extensive integration capabilities can enhance productivity without compromising security.
Tags : identity, access management, secure, ibm, mmdg, enterprise single sign on, user data, security, threats, vulnerabilities, silo data, business processes, business users, security, swg
     IBM
By: IBM     Published Date: Aug 10, 2009
This whitepaper captures the lessons learned from various Project Liberate engagements worldwide and presents best practices from these case studies as well as advice on negotiating strategies. The information is based on publicly available data sources (which are subject to change as offerings change), customer feedback, and IBM’s own experience in dealing with these offerings. Learn more today!
Tags : ibm, wibm, consulting engagement, customer experience, microsoft enterprise agreement, microsoft enterprise agreements, cal, core client access license, sms, moss, configuration management, mui, product deployment, epp, employee purchase program, epp, hup, enterprise applications
     IBM
By: IBM     Published Date: Sep 11, 2009
Discover the hidden dangers posed by privileged users and the damages they have caused. This webcast features two senior analysts from Burton Group Identity and Privacy Strategies, as well as IBM identity and access management solutions address this security and compliance challenge.
Tags : ibm, access management solutions, christopher bauseman, ibm tivoli software, lori rowland, senior analyst, mark diodati
     IBM
By: Secure Computing     Published Date: Jan 25, 2008
In an environment where business and government databases store ever-increasing amounts of sensitive and confidential data; and where a growing number of employees need to access that data remotely, password security alone is insufficient to ensure user authentication. Two-factor authentication requires two measures for users to verify their identities and access data.
Tags : cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing, password, password management, passcode, best practices, remote access
     Secure Computing
By: Axeda Corporation     Published Date: Sep 06, 2007
Enabling IT equipment vendors to perform remote service on your data centers helps maximize uptime and lower TCO—but at what risk? Dial-up modems and VPNs introduce security vulnerabilities and lack sufficient auditing capabilities—making it virtually impossible to track external access and maintain data center security. Download this white paper to learn how you can manage security risks, lower service-related costs, achieve regulatory and internal compliance, and more.
Tags : remote, remote access, remote network, network management, network security, data center, datacenter, data center management, datacenter management, axeda, high availability, spend management, security
     Axeda Corporation
By: Axeda Corporation     Published Date: Nov 14, 2007
How secure are the VPNs and modems that your vendors and partners use to access your data center? Can you confidently track all activity to meet SOX, PCI, and HIPAA compliance requirements? Learn how Axeda ServiceLink for Data Centers empowers you to provide your vendors and partners with secure and auditable access to your mission-critical data center.
Tags : remote, remote access, remote network, network management, network security, hipaa, hippa, sox, sarbox, sarbanes oxley, sarbanes-oxley, pci, pci-dss, pci dss, compliance, auditing, audit, security audit, axeda, security
     Axeda Corporation
By: NexGen     Published Date: Feb 09, 2015
Looking for the right Flash Array for you? Tired of all data being treated the same but want to save time and budget? Flash storage is helping to address the latency inherent with disk drives, enabling you to virtualize more, and reduce application response times. It's an inescapable fact that the $/GB of flash is much higher than disk drives. So why do the majority of storage vendors indiscriminately accelerate all data, regardless of its value to your business? All-flash arrays waste money by storing non-critical data in flash, and hybrid arrays can't control whether mission-critical or non-critical data accesses flash, leading to unpredictable performance. So what do you do to find a solution that addresses both of these issues? Download now and see NexGen's approach to value-driven data management. Make it simple to control what data is stored in flash and affordably tailor application performance to match your organizations priorities now! - See more at: http://www.findwhitep
Tags : nexgen, hybrid, flash, cisco, nexus, vmware, software development, it management
     NexGen
By: Aveksa     Published Date: Nov 26, 2007
Although roles-based access control (RBAC) has been the subject of much interest in the past, experience with it has been mostly disappointing. The challenge of discovering established roles, defining new roles according to business need, connecting roles properly to the IT infrastructure, ensuring that they meet all compliance requirements, and managing roles through their natural lifecycles has, until now, proved to be too complicated and cumbersome to be practical.
Tags : access control, rules, compliance, governance, risk management, rbac, iam, identity management, access management, identity & access management, identity and access management, aveksa
     Aveksa
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com