centralized management

Results 26 - 50 of 69Sort Results By: Published Date | Title | Company Name
By: Okta     Published Date: Jan 06, 2012
In this paper, EMA explores this question and examines Okta as an example of centralized, multi-tenant identity and access management that offers new
Tags : okta, authentication, single sign on, sign-on, sign on, cloud, cloud application, cloud, password
     Okta
By: OKTA     Published Date: Sep 26, 2017
Traditional web applications pre-date modern standards like SAML and OpenIDConnect, so they often use legacy authentication methods to grant end users access. Historically, providing Single Sign-On and centralized access management for end users across these legacy applications required a Web Access Management, or WAM, product. These on-premises software tools could be expensive to maintain and complex to deploy. Now, modern identity providers like Okta in conjunction with best-of-breed network management technologies offer a better way. This white paper describes how web applications that lack modern standard support can be integrated into a cloud-based Identity-as-a-service architecture.
Tags : 
     OKTA
By: SQAD     Published Date: May 28, 2019
Marketers have more complexity than ever to manage. It's time to adjust and improve legacy business models. To learn more about modern media management for brand advertisers, download the whitepaper and click the link at the end of the PDF to access a short video.
Tags : 
     SQAD
By: HP     Published Date: Jul 29, 2008
Connect to this special web event to hear from Forrester Research and HP on how to address key vulnerabilities in the storage network, receive tips and recommendations on selecting and implementing data storage encryption solutions and details on how to achieve centralized key management and data encryption where it matters most.
Tags : mission critical, security, datacenter, data center, storage security, storage
     HP
By: Entrust Datacard     Published Date: May 15, 2014
Managing the purchase, deployment, renewal and expiry of digital certificates for multiple Web servers, purposes and users — sometimes in many different locations — can be time-consuming and costly. Entrust IdentityGuard Cloud Services SSL is a self-service application designed to streamline certificate management while providing secure certificates from a trusted brand in online security.
Tags : entrust, ssl, ecommerce, extended validation, digital certificates, web servers, identityguard, cloud, networking, it management
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 21, 2014
Managing the purchase, deployment, renewal and expiry of digital certificates for multiple Web servers, purposes and users — sometimes in many different locations — can be time-consuming and costly.
Tags : identity guard, cloud service, ssl, management, digital certification, multiple web servers, self-service, security
     Entrust Datacard
By: Oracle Primavera     Published Date: Apr 17, 2015
Learn how top performers select and execute transformative projects due to the centralized information and automated processes that Project Portfolio Management (PPM) solutions provide.
Tags : ppm, oracle, transformative projects, project portfolio management, it management, knowledge management
     Oracle Primavera
By: FICO     Published Date: Aug 14, 2015
To create a centralized and standardized, user-friendly system that enables internal and independent insurance agents to make precise and consistent policy quotes and uniform underwriting decisions, ACG adopted FICO's Blaze Advisor decision rules management system.
Tags : fico, analytics, solutions, decision management, rules management., business technology
     FICO
By: Dell Windows Server     Published Date: Jan 16, 2009
Windows Server 2008 includes the Hyper-V role, which is a hypervisor that enables server virtualization. This new virtualization hypervisor enables a Windows Server 2008 system to host many VMs or child partitions that run directly on the hypervisor layer. Hyper-V servers and VMs can be centrally managed by System Center Virtual Machine Manager (SCVMM) to enable centralized management and advanced features. This demo video shows Hyper-V and System Center Virtual Machine Manager (SCVMM).
Tags : dell, hyper-v, scvmm cloning, windows server 2008, virtualization hypervisor, system center virtual machine manager, platforms
     Dell Windows Server
By: Kaseya     Published Date: Mar 12, 2015
Fighting Cyber Crime with Automated, Centralized Management
Tags : cyber crime, automation management systems, network security, software applications, network infrastructure
     Kaseya
By: Red Hat     Published Date: Mar 16, 2015
With Red Hat® Satellite, you can instantly see the status of your systems and if any are missing important patches or configuration changes.Not only does Red Hat Satellite improve security, it lets you easily measure and report on the patch level of systems in your company. Your security posture is improved through: • A single, centralized management tool. • Secure connection policies for remote administration. • Standardized machine configurations. • Digitally signed content.
Tags : centralized management took, security posture, configurations, remote administration, it management
     Red Hat
By: XO Communications     Published Date: Jul 22, 2015
Download this white paper to learn 7 reasons why you should centralize your communications. - Lower fixed costs - Less "stranded" bandwith - Free site-to-site calling - Simplified business continuity planning - Reduced staffing requirements - Consistent feature set across sites - Centralized management
Tags : business communications, phone system, centralization, scalability
     XO Communications
By: Dell Storage     Published Date: Jan 16, 2009
Although hardware storage prices have come down, storage administration and software expenses still run about seven times the cost of storage hardware. Storage consolidation provides a partial solution by expanding device connectivity and reducing points of management. However, once storage is consolidated, the job is only half done. You still need a centralized, flexible method of management that masks the complexity of the storage environment and reduces administrative overhead. That’s where virtualization fits in.
Tags : dell, storage virtualization, hardware storage, storage administration, software expenses, storage consolidation, storage environment, virtualization, it management, storage
     Dell Storage
By: ScriptLogic     Published Date: Mar 30, 2012
Help Desk Authority offers a complete help desk solution for small and medium size businesses that can help efficiently track, identify, and resolve issues quickly.
Tags : help desk, tracking, tickets, help desk management, active directory, auditing, native tools, centralized, data, secure, database, scriptlogic, desktop management, desktop authority, windows, software asset management, software license, tracking, automation, system center configuration manager
     ScriptLogic
By: Zebra     Published Date: Jul 10, 2014
In this paper, Zebra shows how a solid device management solution can provide consistency and visibility into device status to maximize uptime and business efficiencies. Ensuring visibility of all assets whether they are directly on premise or at remote locations is another key benefit-for both IT and finance. Doing so helps maximize productivity where the devices are used, streamlines inventory management and compliance operations, and helps to create a more agile enterprise.
Tags : zebra, device management, centralized device management, finance, compliance operations, agile enterprises, device status, it management, enterprise applications
     Zebra
By: CDW     Published Date: Apr 04, 2016
A critical step in moving from a shared virtualized environment toward a private cloud is the transition from infrastructure optimization to service optimization. NetApp’s design approach, technologies, and ecosystem integration build upon our storage efficiencies to deliver service-level efficiencies using centralized, policy-based management and automation. With NetApp® OnCommand® Workflow Automation, an efficient service-oriented approach can be implemented that enables storage provisioning, data protection, and operational processes to be integrated and automated. As a result, enterprises can meet workload service-level requirements while greatly reducing management costs and improving business agility.
Tags : cloud management, cloud services, cloud management, it infrastructure, cloud application, cloud computing, infrastructure, technology, data management
     CDW
By: Intel Security     Published Date: Jan 20, 2015
Companies of all sizes with multiple remote locations can benefit from plug-and-play next-generation firewalls. Traditional methods can take a long time to implement and can prove expensive. With plug-and-play deployments, on the other hand, you save money, conserve resources, reduce the likelihood of errors, and get single-pane-of-glass centralized management.
Tags : plug-and-play firewall, firewall deployment, easy firewall deployment, ngfw, next generation firewall, firewall roll-out, firewall replacement, firewall upgrade, security
     Intel Security
By: Intel Security     Published Date: Jan 20, 2015
Centralized and accurate network security management is more than a trend—it is quickly establishing itself as the only means of network survival. Old-school point solutions, where each solution served a single purpose at a particular point in the network, are quickly becoming unwieldy, if not impossible, to manage. Larger enterprises may have hundreds of point products throughout their network, and managing them effectively, efficiently, and securely can only be done through a centralized network security management solution. Look for eight key features in your network security management solution to ensure that your network not only survives but thrives.
Tags : network security, network management, firewall management, enterprise firewall, ngfw, next generation firewall, firewall automation, security
     Intel Security
By: Intel Security     Published Date: Jan 20, 2015
It's important to identify the right features for your enterprise when evaluating next generation firewalls. Key points include ease of use, centralized management, integrated VPN, high availability, and the ability to stop advanced, sophisticated attacks. Read this latest SANS report as they look in depth at the McAfee Next Generation Firewall as see how it stacks up against demanding enterprise requirements.
Tags : sans, ngfw, next generation firewall, firewall product review, mcafee next generation firewall, security
     Intel Security
By: CDW - NetApp     Published Date: Apr 07, 2016
A critical step in moving from a shared virtualized environment toward a private cloud is the transition from infrastructure optimization to service optimization. NetApp’s design approach, technologies, and ecosystem integration build upon our storage efficiencies to deliver service-level efficiencies using centralized, policy-based management and automation. With NetApp® OnCommand® Workflow Automation, an efficient service-oriented approach can be implemented that enables storage provisioning, data protection, and operational processes to be integrated and automated. As a result, enterprises can meet workload service-level requirements while greatly reducing management costs and improving business agility.
Tags : cloud management, cloud services, cloud management, it infrastructure, cloud application, cloud computing, infrastructure, technology, it management, data management, business technology
     CDW - NetApp
By: Eaton     Published Date: Jan 26, 2016
When designing a power protection scheme for their data center, IT and facilities managers must ask themselves whether a distributed or centralized backup strategy makes more sense. Unfortunately, there is no easy answer to that question. Companies must weigh each architecture’s advantages and disadvantages against their financial constraints, availability needs and management capabilities before deciding which one to employ. This white paper will simplify the decision-making process and lessen the potential weaknesses of whichever strategy you ultimately select.
Tags : eaton, distributed backup strategy, centralized backup strategy, facility managers, data center solutions, it management, knowledge management, enterprise applications
     Eaton
By: IBM     Published Date: Jul 15, 2016
This Market Guide helps CISOs identify emerging data-centric audit and protection tools. IBM is positioned with a centralized management console approach across multiple silos and has coverage of all the key capabilities evaluated by Gartner.
Tags : ibm, gartner, data, dcap, data-centric audit protection, security, knowledge management, enterprise applications, data management
     IBM
By: VMware AirWatch     Published Date: May 18, 2016
VMware AirWatch gives enterprises identity, productivity and collaboration solutions through enterprise mobility management. The VMware AirWatch platform gives end users a seamless digital workspace, so they can be more effective on the go. A future-proof mobility platform enables IT to support business initiatives now and in the future with features: • Broadest OS and device support with same-day updates • Unified identity management framework across solutions • Suite of integrated productivity and collaboration apps • Centralized content management and collaboration • Global scalability with multi-tenant framework AirWatch offers a unique vision for identity, mobile, network and Infrastructure that is trusted by more than 16,000+ organizations, including 500 of the Global 2000, and has been positioned as a leader by Gartner in the 2015 Magic Quadrant for Enterprise
Tags : productivity, best practices, business intelligence, business management, information technology, device support, device management, content management
     VMware AirWatch
By: Tippit, CRM     Published Date: May 15, 2009
Today's Customer Relationship Management (CRM) solutions aim to recapture the personalized customer service provided by local mom-and-pop shops of yore – except with high-tech-analytics capabilities, collaborative platforms and automated processes. By gathering information from multiple data sources and storing it in a centralized location, a hosted CRM solution provides a holistic view of a customer in real time. Armed with this insight, a company’s management, sales and service people can better generate leads, target top customers, manage marketing campaigns, drive sales and boost customer satisfaction.
Tags : tippit, marketing, analytics, sales force automation, crm, onyx software, rightnow technologies, enterprise applications
     Tippit, CRM
By: Q1 Labs     Published Date: Feb 02, 2012
A leading retailer with stores worldwide was seeking a more innovative tool to protect customer privacy and intellectual property. PCI compliance mandated log collection, but a vast number of different tools generated an overwhelming amount of log data, making it difficult for the small security team to review it effectively. The solution the company chose had to fit into a diverse network, provide intelligent reporting and offer a centralized management console.
Tags : siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, pci compliance, log management, log data, log management solution
     Q1 Labs
Start   Previous    1 2 3    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com