centralized management

Results 1 - 25 of 69Sort Results By: Published Date | Title | Company Name
By: AlienVault     Published Date: Oct 20, 2017
In this report, you'll read 451 Research's review of AlienVault USM Anywhere. USM Anywhere is AlienVault's offering of centralized security information and event management for resource-constrained organizations embracing Amazon and Microsoft cloud architectures. The report covers the following areas: • 451's overview of AlienVault USM Anywhere • A brief look at the history of AlienVault • How USM Anywhere compares to competitors • A SWOT analysis of USM Anywhere Download the report now to learn more about AlienVault's unique approach to threat detection in cloud and hybrid cloud environments
Tags : 
     AlienVault
By: Avocent     Published Date: Aug 22, 2011
Challenges and solutions for centralized remote office management.
Tags : avocent, branch infrastructure management, srmi, remote office management, centralized it staff, remote office solutions, centralized it management, data center
     Avocent
By: Avocent     Published Date: Aug 22, 2011
Enterprise Management Associates® (EMAT) analysts explore a pragmatic view of data center management in order to deliver the best practices in real-world data centers for over-arching management solutions.
Tags : avocent, data center manangement control, centralized data center manageability, ema™, enterprise management associates ®, effective it managementm, interoperability, availability, kpis, data center
     Avocent
By: Avocent     Published Date: Aug 22, 2011
Download this whitepaper to learn how to achieve secure access to any server or network device from a single interface.
Tags : avocent, centralized management software, best practices, data center control, secure access, remote maintenance, kvm server management, full remote access, power management, data center
     Avocent
By: BeyondTrust     Published Date: Apr 04, 2019
Unix and Linux build the foundation for most business-critical systems. Thus, these present target-rich environments for cyber-attackers. Privileged Access Management (PAM) helps to mitigate such risks. To succeed, organizations must follow an integrated approach, covering both privilege elevation and centralized management of shared account credentials.
Tags : 
     BeyondTrust
By: Black Box Network Services     Published Date: Sep 09, 2010
Increase your data center capabilities while keeping expenses low.
Tags : kvm, data center, server managment
     Black Box Network Services
By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
     CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
     CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
     CA Technologies
By: CA Technologies     Published Date: Apr 06, 2017
CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network devices and applications.
Tags : security information, security management, event management, system security, system management, risk management, security infrastructure, it infrastructure, privilege management, system authentication
     CA Technologies
By: CA Technologies     Published Date: Jun 01, 2018
CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network devices and applications.
Tags : 
     CA Technologies
By: CDW     Published Date: Apr 04, 2016
A critical step in moving from a shared virtualized environment toward a private cloud is the transition from infrastructure optimization to service optimization. NetApp’s design approach, technologies, and ecosystem integration build upon our storage efficiencies to deliver service-level efficiencies using centralized, policy-based management and automation. With NetApp® OnCommand® Workflow Automation, an efficient service-oriented approach can be implemented that enables storage provisioning, data protection, and operational processes to be integrated and automated. As a result, enterprises can meet workload service-level requirements while greatly reducing management costs and improving business agility.
Tags : cloud management, cloud services, cloud management, it infrastructure, cloud application, cloud computing, infrastructure, technology, data management
     CDW
By: CDW - NetApp     Published Date: Apr 07, 2016
A critical step in moving from a shared virtualized environment toward a private cloud is the transition from infrastructure optimization to service optimization. NetApp’s design approach, technologies, and ecosystem integration build upon our storage efficiencies to deliver service-level efficiencies using centralized, policy-based management and automation. With NetApp® OnCommand® Workflow Automation, an efficient service-oriented approach can be implemented that enables storage provisioning, data protection, and operational processes to be integrated and automated. As a result, enterprises can meet workload service-level requirements while greatly reducing management costs and improving business agility.
Tags : cloud management, cloud services, cloud management, it infrastructure, cloud application, cloud computing, infrastructure, technology, it management, data management, business technology
     CDW - NetApp
By: Cisco     Published Date: Jun 24, 2015
This paper explores the main benefits of Cisco ACI Security.
Tags : cisco aci security, csico, virtualization, integration, security, application integration, data center, ynified
     Cisco
By: Cisco EMEA     Published Date: Nov 13, 2017
Cisco has recently unveiled its new intent-based networking strategy, called "The Network. Intuitive." The goal of intent-based networking is to allow greater levels of automation, security integration, and centralized manageability within a software subscription orientation. Intent-based networking is underpinned by Software-Defined Access (SDA), Cisco's automation engine built upon the company's Digital Network Architecture (DNA), which automates network segmentation, policy enforcement, and troubleshooting. Other core components of the announcement include a refresh of Cisco Catalyst switches, a new licensing model for infrastructure, and an all-in-one management console called DNA Center.
Tags : centralized operations, management, intelligent systems, multi vendor support, cloud, cisco
     Cisco EMEA
By: Citrix Systems     Published Date: Jul 25, 2016
For many enterprises, the solution is a centralized single sign-on (SSO) infrastructure that leverages the enterprise directory with federation, multifactor authentication and centralized access control to give users one URL and login to access all their enterprise applications and services--without having to type in another URL or enter credentials a second time. At the same time, it provides IT with a single identity, access control and management infrastructure, closing the inevitable security and management gaps inherent in juggling multiple gateway solutions. Such a solution would offer the best of all worlds, combining enhanced user productivity with IT efficiency, cost effectiveness, security and compliance.
Tags : 
     Citrix Systems
By: Data Guard Systems     Published Date: Aug 21, 2009
The best way to take control of employee management is to automate human resource (HR) processes, including time tracking, schedules, and payroll calculation. This document addresses the key points that cellular retailers, wholesalers, and master agents need to know about implementing and using CellularManager's centralized web-based HR management system.
Tags : human resource, cell phone, cellular retailer, human resources, cellularmanager, cellular manager, data guard, data guard systems
     Data Guard Systems
By: Datastax     Published Date: May 14, 2018
The data management practices of old will no longer work. If you’re still trying to use a centralized approach, you are probably finding it difficult to keep up with the real-time demands of the Right-Now Economy. This special Gartner report describes the main drivers for modernizing data management — operational efficiency and analytics — and explains why balancing connecting data with collecting data will be a fundamental requirement for modern data management moving forward.
Tags : 
     Datastax
By: Dell Storage     Published Date: Jan 16, 2009
Although hardware storage prices have come down, storage administration and software expenses still run about seven times the cost of storage hardware. Storage consolidation provides a partial solution by expanding device connectivity and reducing points of management. However, once storage is consolidated, the job is only half done. You still need a centralized, flexible method of management that masks the complexity of the storage environment and reduces administrative overhead. That’s where virtualization fits in.
Tags : dell, storage virtualization, hardware storage, storage administration, software expenses, storage consolidation, storage environment, virtualization, it management, storage
     Dell Storage
By: Dell Windows Server     Published Date: Jan 16, 2009
Windows Server 2008 includes the Hyper-V role, which is a hypervisor that enables server virtualization. This new virtualization hypervisor enables a Windows Server 2008 system to host many VMs or child partitions that run directly on the hypervisor layer. Hyper-V servers and VMs can be centrally managed by System Center Virtual Machine Manager (SCVMM) to enable centralized management and advanced features. This demo video shows Hyper-V and System Center Virtual Machine Manager (SCVMM).
Tags : dell, hyper-v, scvmm cloning, windows server 2008, virtualization hypervisor, system center virtual machine manager, platforms
     Dell Windows Server
By: Eaton     Published Date: Jan 26, 2016
When designing a power protection scheme for their data center, IT and facilities managers must ask themselves whether a distributed or centralized backup strategy makes more sense. Unfortunately, there is no easy answer to that question. Companies must weigh each architecture’s advantages and disadvantages against their financial constraints, availability needs and management capabilities before deciding which one to employ. This white paper will simplify the decision-making process and lessen the potential weaknesses of whichever strategy you ultimately select.
Tags : eaton, distributed backup strategy, centralized backup strategy, facility managers, data center solutions, it management, knowledge management, enterprise applications
     Eaton
By: Entrust Datacard     Published Date: May 15, 2014
Managing the purchase, deployment, renewal and expiry of digital certificates for multiple Web servers, purposes and users — sometimes in many different locations — can be time-consuming and costly. Entrust IdentityGuard Cloud Services SSL is a self-service application designed to streamline certificate management while providing secure certificates from a trusted brand in online security.
Tags : entrust, ssl, ecommerce, extended validation, digital certificates, web servers, identityguard, cloud, networking, it management
     Entrust Datacard
Start   Previous   1 2 3    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com