user management

Results 226 - 250 of 385Sort Results By: Published Date | Title | Company Name
By: DocuSign     Published Date: Mar 23, 2016
In today’s digital world, paper documents are an obstacle to doing business. Implementing a Digital Transaction Management (DTM) system can help, but financial services firms need solutions that offer bank-level security, regulatory compliance, operational efficiency, and a positive end-user experience. Read the report and discover the top 10 reasons why Financial Services firms choose DocuSign for their Digital Transaction Management and esignature solution.
Tags : 
     DocuSign
By: CDW - NetApp     Published Date: Apr 07, 2016
As organizations evolve from virtualized infrastructures to private clouds, IT management must measure success by the efficiencies of the infrastructure in providing end users with flexible and cost-effective services and service levels. NetApp® OnCommand® Insight storage resource management software provides service analytics that help enterprises manage the complexity of this transition. OnCommand Insight provides a holistic view into complex multivendor and multiprotocol storage services and powerful analytics to help organizations fully leverage the promise of cloud computing.
Tags : cloud management, cloud services, cloud management, it infrastructure, cloud application, analytics, it management, data management, data center
     CDW - NetApp
By: CDW - NetApp     Published Date: Apr 07, 2016
Self-service is an advanced element of private cloud environments that improves management efficiency and business agility, as well as lowering operating expenses. A self-service environment streamlines the interaction between users and the IT department. It empowers internal consumers of IT services to request and receive appropriately configured resources on demand with minimal IT intervention. NetApp® OnCommand® Workflow Automation, the NetApp Management SDK with open APIs, and key ecosystem partnerships enable enterprises to easily integrate their orchestration solutions and custom management tools with the NetApp storage service catalog for automated storage provisioning and protection. Customers can thereby create a self-service, web-based portal that efficiently delivers IT as a service to virtualization administrators, application administrators, and users, while enabling IT staff to focus on higher value activities.
Tags : cloud management, cloud services, cloud management, it infrastructure, cloud application, cloud computing, infrastructure, technology, it management, enterprise applications, data management
     CDW - NetApp
By: AWS     Published Date: Nov 28, 2018
Financial institutions run on data: collecting it, analyzing it, delivering meaningful insights, and taking action in real time. As data volumes increase, organizations demand a scalable analytics platform that can meet the needs of data scientists and business users alike. However, managing an on-premises analytics environment for a large and diverse user base can become time-consuming, costly, and unwieldy. Tableau Server on Amazon Web Services (AWS) is helping major Financial Services organizations shift data visualization and analytics workloads to the cloud. The result is fewer hours spent on manual work and more time to ask deeper questions and launch new data analyses, with easily-scalable support for large numbers of users. In this webinar, you’ll hear how one major asset management company made the shift to cloud data visualization with Tableau Server on AWS. Discover lessons learned, best practices tailored to Financial Services organizations, and starting tactics for scalable analytics on the cloud.
Tags : 
     AWS
By: Brainloop     Published Date: Jan 04, 2012
How can IT provide a way for users to share documents without putting the company at risk? This white paper explores collaboration solutions using your current content management, ERP and security infrastructure, as well as a few new ones that might not be on your radar.
Tags : brainloop, technology, security, security solutions, infrastructure
     Brainloop
By: Janrain, Inc.     Published Date: Apr 25, 2012
A comprehensive user management platform provides the essential tools for improving acquisition, creating engagement and building intelligence. Use this guide when evaluating prospective vendors to select the right user management platform partner.
Tags : janrain, marketing, social media, emerging marketing, internet marketing, website, social networks, interactive, web analytics
     Janrain, Inc.
By: Alcatel Lucent Enterprise     Published Date: Aug 31, 2017
More agile and mobile ways of working need more agile and flexible networks. Wave 2 Wi-Fi, powered by ALE, delivers the capabilities needed to create future-ready organizations. Alcatel-Lucent OmniAccess® Stellar WLAN is optimized for Wave 2 infrastructures, with a distributed intelligence architecture, simplified management and support.
Tags : performance, iot readiness, simplicity, user centricity, analytics capability, unified management
     Alcatel Lucent Enterprise
By: Druva     Published Date: Jan 06, 2016
Compiled from real life use cases, Blue Hill Research examined how organizations are gaining greater value from their archive of user data, converging data availability, archiving and governance to meet their wider data management needs.
Tags : druva, blue hill, enterprise, archive, data, user data, security, enterprise applications
     Druva
By: Mimecast     Published Date: Apr 16, 2009
According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. if not more. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection. In addition to these challenges, IT departments want to know how to control costs of the email environment, while keeping important data accessible for business, legal and regulatory users.
Tags : mimecast, saas, email solutions, email managemeng, archiving, ediscovery, mailbox, compliance
     Mimecast
By: Mimecast     Published Date: Feb 05, 2010
According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection.
Tags : mimecast, saas, software as a service, email archive, medium-size business, esg, storage
     Mimecast
By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
     Ping Identity
By: Ping Identity     Published Date: May 05, 2009
With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise’s security domain to outsourced services, including business process outsourcing (BPO) and software as a service (SaaS) providers, and trading partners, as well as within the enterprise to affiliates and subsidiaries. Learn more today!
Tags : pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
     Ping Identity
By: IBM Smart Business     Published Date: May 29, 2009
This demo shows how Intuit Quickbooks Enterprise Solutions enabled by IBM Smart Business offers a smarter way to acquire, use and support business applications. Find out how you can use this software solution for your business to simplify inventory, purchasing, sales, and payroll, enabling you to cut costs and complexity. 
Tags : ibm, smart business, intuit, quickbooks, enterprise solutions, cost-cutting, purchasing, sales, payroll, dashboard, enterprise, business software solutions, smart market, smart cube, smart desk, smart support, finance, accounting, erp, smb
     IBM Smart Business
By: IBM     Published Date: Oct 01, 2012
Cars.com uses IBM software to gain a 360-degree view into its technology infrastructure and applications, giving the company visibility into the user experience of its consumers, dealers and advertisers.
Tags : case study, cars, user experience, customer experience management, application management
     IBM
By: IBM     Published Date: Oct 01, 2012
CMOs must orchestrate their digital strategy using our connect-the-dots framework. Their objective: Elevate digital to the highest level of business strategy.
Tags : branding, brand experience, user experience, digital branding, digital branded content, content management, content delivery
     IBM
By: Intralinks     Published Date: Jan 16, 2015
The increased mobility of the workforce is changing the way we work. Business users want the flexibility to share and collaborate on content that drives their business while IT needs to ensure the security of that data, no matter where it goes. An effective enterprise collaboration solution must consider people, processes and technologies to be effective, but where to begin? This comprehensive Buyer’s Guide offers guidance on how to develop your organization’s requirements with regard to: Risk management – avoiding data breaches and loss of information that can result in non-compliance Business productivity - allowing for secure collaboration while enabling teams to work anywhere on any device IT efficiency - supporting the full breadth of external business content requirements while integrating with existing applications and protocols This Buyer’s Guide offers a holistic approach for your evaluation process by examining the granular aspects of enterprise file sharing, as well as i
Tags : collaboration solutions, risk management, business productivity, it efficiency, business users, enterprise applications
     Intralinks
By: Gigya     Published Date: Jun 20, 2014
As marketers the world over share conflicting stories of social triumph and trial in the pages of leading industry pubs, rumors run rampant across this largely uncharted marketing territory. We’re busting 5 major social marketing myths that have made their way into mainstream marketing lore, and revealing proven facts and strategies to help guide your social efforts and execution.
Tags : social login, gamification, social plugin, rating and review software, user management tool, social user management software, social customer tool, social consumer data, increase social engagement, consumer data management, permission based identity, single sign on, social consumer insights, big data marketing, data driven marketing , social marketing, social widget, social network plugin vendors, janrain, social annex
     Gigya
By: VMware AirWatch     Published Date: Dec 08, 2016
This white paper illustrates several real-world implementations and day-to-day experiences that demonstrate how IT organizations are embracing a user-centric model for improved management benefits to achieve key performance and business results and stay competitive.
Tags : 
     VMware AirWatch
By: VMware AirWatch     Published Date: Dec 09, 2016
The average organization owns about 2,500 apps - making a secure, seamless, scalable virtual workspace strategy easier said than architected. Businesses find themselves scrambling to deploy virtual workspace solutions that meet both mobile end-users' and IT's demands. In this white paper, you'll find five key criteria you must implement in order to effectively execute your mobile workspace plans. Get details on how to offer: A single point of access for productivity and tools Easy app navigation and management Personalization and customization And more
Tags : 
     VMware AirWatch
By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
     VMware AirWatch
By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
     VMware AirWatch
By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
     VMware AirWatch
By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
     VMware AirWatch
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com