user management

Results 276 - 300 of 385Sort Results By: Published Date | Title | Company Name
By: IBM MaaS360     Published Date: Apr 15, 2015
With Mobile Device Management (MDM) iPhones, iPads and the slew of Androids on the market, you can meet the balance of open access for employees while ensuring adherence to regulatory compliance.
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod, financial services
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 15, 2015
With Mobile Device Management (MDM) healthcare can rest easy that staff, doctors and nurses are equipped to deal with all emergencies.
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod, healthcare
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 15, 2015
Manufacturing: The Bring Your Own Device (BYOD) policies that thrive in other industries are gaining momentum in manufacturing as well.
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod, manufacturing
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 15, 2015
With Mobile Device Management (MDM), Retail IT can ensure security of information across iPhones, iPads and Android devices.
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod, retail
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 16, 2015
Android: With each new confectionary code name, Google’s mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.
Tags : fiberlink, android, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 16, 2015
The Gartner Magic Quadrant is one of the most influential research tools that IT buyers use to evaluate enterprise mobility security vendors.
Tags : mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 16, 2015
For a deeper dive into the EMM shift, Aragon sheds light on the need for secure and managed sharing of content to mobile devices.
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 16, 2015
Read about 27 critical criteria of mobile concern, 15 vendors ranked on current offering and strategy, and the 10 providers leading the pack.
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 04, 2016
Learn how to become an enterprise mobility Mowglie. In today’s completely connected mobile jungle, many users and employees are accessing information from multiple devices and from many locations. Enterprise mobile management tools are becoming a must have for most businesses to survive and deliver an optimal experience. The MaaS360 suite from IBM allows for a robust app development platform where users can become mobile Mowglies and increase portability and interoperability. Download this e-book to create a failsafe Enterprise Mobility Survival Guide and build the best mobile environment for your users and employees.
Tags : ibm, mobile, management, guide, app development, networking, it management, data center
     IBM MaaS360
By: IBM     Published Date: Apr 09, 2015
This buyer’s guide can help you select the right identity and access management solution to successfully manage and control user access within, across and between organizations. The guide outlines the most common identity and access management challenges organizations face from the perspective of CSOs, IT operations staff, line-of-business managers and enterprise architects. It then provides a checklist for evaluating solutions and defines the capabilities required to address security complexity, compliance and cost.
Tags : access management solution, ibm, security risk, security compliance, networking, security, it management, data management
     IBM
By: IBM     Published Date: Apr 09, 2015
Managing user identities and user-access privileges is a cornerstone of effective security for organizations. It is vitally important to verify that only the right people can access protected resources and that their activities are sufficiently monitored. However, in order to effectively compete and meet customer expectations, organizations are increasing the number of users—including customers, employees, citizens, partners and suppliers—who are allowed to access information across the web, the cloud and federated environments. This trend makes identity and access management even more challenging and exposes organizations to many potential risks.
Tags : user identities, ibm, user access privileges, customer satisfaction, information access, cloud, security risks, networking, security, it management, data management
     IBM
By: IBM     Published Date: Jul 15, 2015
This whitepaper is about protecting data, enabling mobility and empowering users; unified endpoint management.
Tags : data protection, mobility, endpoint management, governance policies, consumerization, byod, security platforms, enterprise mobility, compliance
     IBM
By: IBM     Published Date: Jul 15, 2015
This paper talks about the importance of adapting to changes in fraud attacks without significant bank involvement or end user disruptions.
Tags : cyber threats, fraud prevention, fraud management, holistic solutions, end user disruptions, defrauding, malware management
     IBM
By: IBM     Published Date: Jan 09, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. By aligning governance related policies and rules with all identity management processes, organizations can achieve continuous, sustainable compliance, thereby reducing the need for after the fact fixes and expensive, error prone manual remediation. IBM Security Identity Governance and Intelligence helps organizations effectively, comprehensively manage identities and application access
Tags : ibm, security, identity governance and intelligence, identity governance, enterprise applications
     IBM
By: Group M_IBM Q418     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the user’s identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
     Group M_IBM Q418
By: Gomez IT     Published Date: May 23, 2011
A Critical Look at Key Technologies to Help Ensure that Your Cloud Investments Work For and Not Against You.
Tags : compuware, enterprise management associates, ema, cloud computing, application delivery, peformance management strategy, cloud services, performance monitoring, user experience management
     Gomez IT
By: IBM     Published Date: May 01, 2017
MaaS360 delivers robust UEM capabilities across all major computing platforms, including iOS, macOS, Android and Windows devices. And where competing solutions offer incomplete support for legacy Microsoft platforms, MaaS360 supports Windows XP SP3, Microsoft Windows Vista, Microsoft Windows 7, Microsoft Windows 8, Windows 10 and Microsoft Windows 10 Mobile. These capabilities include: Identity and access management (IAM) that allows a shift from a device-based context to a more comprehensive, userbased context Application management, including an intuitive, universal application catalog for iOS, macOS, Android and Windows, advanced bundling and promotion features, bulk application purchase and distribution capabilities, and fine-grained data controls Download now to learn more!
Tags : microsoft, ibm, competing solutions, it support, device based, identity access management, universal application, promotion features
     IBM
By: IBM     Published Date: May 01, 2017
Endpoints continue to advance… Employees come and go... And the security landscape is in constant flux. IT leadership must rise to the challenge of managing a disparate and growing number of endpoints, operating systems, and platforms. The only efficient method of managing and securing all endpoints, their users, apps, content, and data is to implement and deploy a unified endpoint management (UEM) solution that changes and adapts with new technology, more skilled users, and increasingly sophisticated attacks by hackers. Read onward to learn why UEM is necessary, how it addresses complex problems encountered in the modern enterprise, and best practices for a successful deployment.
Tags : endpoints, employees, security landscape, security leaders, it security, unified endpoint management
     IBM
By: IBM     Published Date: Apr 04, 2013
SAP users have been slow to adopt cloud computing, but IBM PureFlex Systems offer the potential to transform the server, storage and network infrastructures that support SAP enterprise environments and extend management services to non-SAP applications. Read this executive summary to learn how PureFlex Systems can dramatically reduce costs and cycle times.
Tags : itg summary, value propisition, ibm pureflex systems, ibm systems, costs, cycle times, sap
     IBM
By: IBM     Published Date: Apr 17, 2013
Microsoft Exchange Server 2010 provides a powerful environment for users to conduct business through scheduling their time (calendar), managing their relationships (contacts), and communicating inside and outside their organization (e-mail). The IBM Storwize V7000 Unified storage system, combined with powerful management software from IBM Tivoli, provides an ideal complement to Exchange 2010 deployments by providing a highly virtualized storage infrastructure designed to meet the specific needs of Exchange 2010 environments.
Tags : ibm, microsoft exchange server, powerful, environment, storage, virtualized, infrastructure, organization
     IBM
By: AppSense     Published Date: Nov 26, 2012
This case study demonstrates how AppSense Application Manager is transparent to end-users, unobtrusive for administrators, and requires extremely little administration.
Tags : user experience, end-point users, appsense, application management, application manager, desktop security, end user experience
     AppSense
By: AppSense     Published Date: Nov 26, 2012
Read how AppSense Application Manager provides the only URM solution that dynamically controls end-user rights with surgical precision, providing users with the rights they need while increasing security and reducing IT costs.
Tags : user rights management, appsense, desktop security, windows optimization, it service requests, secure apps, user productivity, rights management
     AppSense
By: IBM     Published Date: Sep 27, 2013
SAP users have been slow to adopt cloud computing, but IBM PureFlex Systems offer the potential to transform the server, storage and network infrastructures that support SAP enterprise environments and extend management services to non-SAP applications. Read this executive summary to learn how PureFlex Systems can dramatically reduce costs and cycle times.
Tags : ibm, ibm pureflex system, sap, cloud, sap enterprise environments, cloud computing, storage, networking, database management, infastructure, it solutions, data management, data center
     IBM
By: IBM     Published Date: Jan 02, 2014
Business users need a simple but powerful way to navigate through data and find the insights to make timely, critical business decisions. Unfortunately, many users have become frustrated at their inability to quickly access and analyze the information they require. This data typically includes a combination of personal and corporate data locked in various enterprise systems. It exists in different formats and can be hard to analyze, change or share — making it difficult for people to get fast answers to business questions.
Tags : ibm, cognos insight guide, navigating data, interactivity, analytic functionality, enterprise analytics, personal analytics, customer service, business users, analytic solution, share data, performance management, supply chain management, customer relationship, cognos insight
     IBM
By: IBM     Published Date: Mar 05, 2014
If you specialize in relational database management technology, you’ve probably heard a lot about “big data” and the open source Apache Hadoop project. Perhaps you’ve also heard about IBM’s new Big SQL technology, which enables IBM® InfoSphere® BigInsights™ users to query Hadoop data using industry-standard SQL. Curious? This paper introduces you to Big SQL, answering many of the common questions that relational database management system (DBMS) users have about this IBM technology.
Tags : ibm, big data, ibm big sql, sql, database management, database management technology, software, tables, queries, data platform, big sql architecture, programming language, relational database management system, rdbms
     IBM
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com