management solution

Results 226 - 250 of 1695Sort Results By: Published Date | Title | Company Name
By: CA Technologies     Published Date: Sep 29, 2011
The identity and access management challenges that exist in the physical world - identity management, application security, access control, managing sensitive data, user activity logging, and compliance reporting - are even more critical in the virtual environments that are growing in use as IT seeks to streamline its operations and reduce operating costs. However, security risks are increased due to the nature of the virtualization environment and IT should seek to extend their security solutions from the physical server environment to the virtualization environment as seamlessly as possible. Continue reading this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Tags : technology, virtual, identity management, access control, security, protection
     CA Technologies
By: VMware     Published Date: Aug 23, 2011
Virtualization is the essential catalyst for enabling the transition to cloud computing. VMware, the fastest growing enterprise software company and virtualization industry leader, builds on virtualization to deliver cloud infrastructure and management solutions that significantly reduce IT complexity.
Tags : vmware, cloud computing, it revolution, virtualization
     VMware
By: IBM     Published Date: Sep 22, 2011
Find and solve performance problems without adding costs IBM InfoSphere Optim puts performance management in the spotlight! Optim solutions are designed to deploy quickly and easily out of the box for immediate benefit. Business-value assessment services are also available to help you design a custom solution - complete with full financial analysis. Either way, you can realize immediate ROI interms of cost and performance if you keep performance-management best practices in mind.
Tags : ibm, data management, dba, productivity, infrastructure, development, productivity
     IBM
By: Allscripts     Published Date: Oct 30, 2015
Download our ebook today to discover how Allscripts Value-based Care Services can help your practice adjust to changing reimbursement trends.
Tags : medicare, value-based reimbursement models, revenue growth, value-based care, allscripts, community care solutions, chronic care management solutions, analytics, aco formation services
     Allscripts
By: GE Healthcare     Published Date: Feb 23, 2015
Given the wide range of technology options available, it's important for healthcare IT executives to pick the right image management technology and approach for a long-term sustainable solution delivering the desired performance and ROI. This whitepaper explores solutions for multi-layered neutrality, a standards-based framework for unifying medical images and clinical documents across the enterprise and community.
Tags : enterprise imaging, advanced visualization, universal viewer, centricity pacs, 3d imaging, radiology imaging solutions, diagnostic medical imaging, radiology medical imaging, medical imaging technology, medical imaging pacs, medical imaging systems, medical imaging services, medical imaging technologies, smart reading protocols, multi-modality reading, unified view of patient images
     GE Healthcare
By: CA Technologies     Published Date: Jan 26, 2015
The ability to apply software to strategic advantage is the de? ning technology theme of this decade. This is not just an IT issue. It is a business imperative. Every business is in the software business. In some industries, the number of software jobs has doubled over the past ? ve years. JP Morgan Chase has more software developers than Google and more technologists than Microsoft. If you think your company isn’t in the software business, you’re wrong. Airlines, oil companies, telecommunications providers all are using applications to attract customers and gain a competitive advantage. With the ubiquitous adoption of mobile devices, a whole new platform for application and content delivery is evolving. With their colorful, interactive, intuitive user interfaces, always-on global connectivity, sensing capabilities such as GPS and device orientation and their ability to connect with users through personalized con? guration options, mobile is truly the de? ning platform of the applicat
Tags : enterprise mobility management, mobile devices, software, competitive advantage, strategic requirement, enterprise applications
     CA Technologies
By: MobileIron     Published Date: Sep 07, 2017
Secure corporate data, drive employee productivity, and enable business innovation in ways you never thought possible. Harness the power of mobile devices with the leading enterprise mobility management (EMM) platform from MobileIron. By providing a modern EMM solution that meets both user demands and IT security requirements, MobileIron enables today’s large enterprises to become truly Mobile First.
Tags : mobileiron, information technology, platform, security, mobile devices
     MobileIron
By: Aternity     Published Date: Feb 24, 2016
Governance, Risk Management, and Compliance (GRC) organizations are always concerned with violations of Acceptable Use Policies, the scenario of the workforce using a network, website, or system to perform inappropriate actions. But insider threats can also result from legitimate work activities that are being done for illegitimate purposes. Read how a leading insurance company leveraged an End User Experience Monitoring solution to identify employees harvesting customer data before leaving the company.
Tags : aternity, grc, risk management, compliance, end user experience, customer data, it management, enterprise applications
     Aternity
By: JBoss Developer     Published Date: Feb 05, 2016
IT organizations are constantly faced with the challenge to produce high-quality solutions with a lower total cost of ownership (TCO). With the growing recognition that open source software provides quality, stable solutions, migrations of existing enterprise applications to products such as JBoss® Enterprise Application Platform have become increasingly popular. JBoss Enterprise Application Platform provides a holistic solution that includes tools for such business challenges as business process management, enterprise application integration, and serviceoriented architectures (SOA), enterprise portals, and data services solutions.
Tags : ibm, websphere, jboss, eap, migration, jboss, red hat, enterprise application platform, it management
     JBoss Developer
By: JBoss Developer     Published Date: Feb 05, 2016
IT organizations are constantly faced with the challenge to produce high-quality solutions with a lower total cost of ownership (TCO). With the growing recognition that open source software provides quality, stable solutions, migrations of existing enterprise applications to products such as JBoss® Enterprise Application Platform have become increasingly popular. JBoss Enterprise Application Platform provides a holistic solution that includes tools for such business challenges as business process management, enterprise application integration, and service-oriented architectures (SOA), enterprise portals, and data services solutions.
Tags : oracle, jboss, redhat, migration, eap, wls, applications, enterprise applications, data management
     JBoss Developer
By: Dynatrace     Published Date: Dec 16, 2015
Deciding which Application Performance Management platform is right for you can be a challenging task. The term Application Performance Management (APM) is thrown around pretty loosely these days and it can be difficult to isolate facts from marketing noise. However, there are some key considerations that will help you shortlist, evaluate, and select the best Application Performance Management solution for your unique needs.
Tags : dynatrace, research, application performance management, apm, platform, software development, enterprise applications
     Dynatrace
By: Microsoft     Published Date: Jul 07, 2016
Before you transform your business with mobility services, you need to consider both the management and security challenges you’ll face from the combination of mobile devices and cloud-based apps. In this IDC report, you’ll examine enterprise mobility management technology—offered through solutions such as the Microsoft Enterprise Mobility Suite—and how it helps manage the security risks of your mobility strategy. Learn about these critical benefits: • Provisioning and configuration devices and users—across platforms • Ensuring only authorized users access data with identity system integration • Ensuring only compliant devices access the corporate network through conditional access policies • Allowing mobile applications to deploy in a more secure, streamline manner with enterprise app stores • Providing security for data at rest, within workflows or over wireless networks, using granular policies around applications
Tags : mobile, cloud, best practices, productivity, technology
     Microsoft
By: CA Technologies     Published Date: Nov 02, 2016
Keeping up with the new pace of change requires building agility into your business to adapt to change faster, while carefully overseeing your investments. The integrated solution of CA Project & Portfolio Management (CA PPM) and CA Agile Central (formerly Rally) helps you effectively balance agility and governance by connecting the work of agile teams to your enterprise portfolio. Supporting an evolutionary approach to adopting agile, the solution lets you continue using traditional methods, while growing agile adoption to deliver on portfolio investments faster—with higher quality and predictable business results. A holistic view across all projects helps portfolio managers optimize budgets and resources for maximum return on investment.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
As the United Kingdom and the rest of Europe prepare for Brexit (Britain’s exit from the European Union), information security experts are left wondering what this would mean to the security and risk management processes that have been put in place in the past and how they need to adjust to the emerging reality. This document discusses the impact of Brexit on privileged access management and what information security professionals may consider as immediate solutions to mitigate risks.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
Today, 75% of Twitter traffic and 65% of Salesforce.com traffic comes through APIs. But APIs are not just for the social Web. According to ProgrammableWeb.com, the number of open APIs being offered publicly over the Internet now exceeds 2000—up from just 32 in 2005. Opening APIs up to outside developers enables many technology start-ups to become platforms, by fostering developer communities tied to their core data or application resources. This translates into new reach (think Twitter’s rapid growth), revenue (think Salesforce.com’s AppExchange) or end user retention (think Facebook).
Tags : 
     CA Technologies
By: Juniper Networks     Published Date: Aug 10, 2017
Ellie Mae processes approximately 30 percent of residential U.S. mortgage applications through their Encompass® all-in-one mortgage management solution.Their customers include major lending institutions. By introducing extensive automation to the residential mortgage process, Ellie Mae has streamlined lenders’ ability to remain competitive, compliant, and efficient.
Tags : security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
     Juniper Networks
By: CA Technologies EMEA     Published Date: Sep 11, 2018
The advent of cloud computing and software-defined data center architectures for modern application delivery has made networking more sensitive than ever before. Applications in the digital age require networks that can expand and contract dynamically based on consumer demand. Enterprises are implementing software-defined networking (SDN) to deliver the automation required by these new environments, but the dynamic nature of SDN makes network management and monitoring fundamentally more challenging. Network infrastructure teams need monitoring tools that can provide visibility into these new and constantly changing networks. This white paper explores the importance of SDN monitoring and examines a leading example of a solution, CA Performance Management with CA Virtual Network Assurance integration.
Tags : 
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Sep 11, 2018
Modern solutions like CA PPM continue to raise the bar above last-generation IT demand management tools, continuously providing new features to ease the burden of the PMO, the financial manager, the resource manager and the product manager. In the last few years, new vendors looking to exploit the large and increasingly influential project and portfolio management (PPM) market have developed modules that “snap” into their SaaS platforms. These vendors claim their tools are easy to install, easy to manage and save customers money. It sounds too good to be true. And for most organizations, it is. Carefully consider whether you need a PPM solution that is only capable of providing low-level functionality for the project manager, or if your organization could benefit from PPM technology that provides 360-degree optics across your organization, delivers actionable business intelligence and enables extensive modeling and forecasting capabilities to make data-driven business decisions.
Tags : 
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Sep 11, 2018
At a Glance Today’s workforce has grown accustomed to using personal technologies that make communication easy and simplify their lives. But many enterprise tools haven’t kept pace. Most current project and portfolio management solutions fail to provide simple ways of performing everyday tasks. They don’t facilitate contextual communication that would help to solve problems, and they lack key functionality: the ability to narrow the focus to relevant data, to drill down for additional information and to efficiently forecast financials and model outcomes. Download this whitepaper now to see how CA PPM brings more value to your business by providing 15 key features that remain unaddressed by other products on the market today.
Tags : 
     CA Technologies EMEA
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com