user management

Results 326 - 350 of 385Sort Results By: Published Date | Title | Company Name
By: VMware     Published Date: Feb 24, 2017
With Windows 10, Microsoft introduces a consolidated operating system (OS) platform that changes how organizations treat the management of End-User Computing (EUC) environments. This new way of managing Windows is more closely aligned to the enterprise mobile management (EMM) based approaches found in mobile management tools today. This whitepaper provides an overview of how Windows management evolved from a rigid and disruptive PC-centric approach to one offering a flexible and light-touch model. It will also delve into the specific management technologies that Windows 10 introduces, as well as leveraging conventional Windows management tools that are in use today.
Tags : 
     VMware
By: VMware     Published Date: Feb 24, 2017
Windows 10, a mobile and cloud-ready operating system (OS), is poised to significantly impact on organizations' end user computing (EUC) strategy, with a unified platform for building apps and extending the organization's core processes to end users using any Windows 10-powered device. However, enterprise-wide execution of this business mobility vision comes with its own set of challenges. Read this whitepaper to learn how a unified endpoint management solution can enable organizations to fully capitalize on their mobility initiatives and IT departments to redefine themselves as true business enablers.
Tags : 
     VMware
By: VMware     Published Date: Feb 24, 2017
As enterprises embrace adoption of Microsoft Office 365 to drive business and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between identity management and user experience is often difficult. In this white paper, discover how VMware AirWatch® Enterprise Mobility Management (EMM) can easily integrate with Office 365 APIs, VMware Identity Manager, and an enterprise’s existing cloud, or on-premise, identity management solution to optimize user experience and ensure data is secure across all devices and platforms.
Tags : 
     VMware
By: VMware     Published Date: Feb 24, 2017
The economy isn't standing still. For your business to succeed, your employees shouldn't either. With your network infrastructure as a strong pair of legs, the right combination of a seamless user experience and a secure workspace will give users -- and your organization -- the ability to move forward with mobility. This eBook relays the importance of unifying your infrastructure to deliver apps effectively across multiple devices. Learn how to stay on top of security and consistency with enterprise mobility management.
Tags : 
     VMware
By: VMware     Published Date: Feb 24, 2017
As the volume and variety of mobile devices surge, so do expectations among end users and business leaders to put these devices to work—as tools for productivity and a competitive advantage for the enterprise. With the goal of striking a balance between opportunity and control, increasing numbers of IT decision makers are adopting enterprise mobility management (EMM) solutions. So, how do you know if your organization is ready to make the move? Read this white paper to determine if now is the right time to adopt EMM, especially if your organization experiences: - Increased need for security and compliance - Device expansion - Rapid growth - And more
Tags : 
     VMware
By: VMware     Published Date: Feb 24, 2017
End users expect to be able to work anywhere, at any time, and from any device. Additionally, they expect a similar experience for accessing work apps and data across all their devices—desktop, laptop, tablet, and smartphone. Meeting these expectations is becoming more and more complex for IT teams that continue to use multiple disconnected tools to manage mobile and desktop devices. A unified endpoint management (UEM) solution provides a holistic and user-centric approach to managing all endpoints. VMware AirWatch® Unified Endpoint Management™ provides IT with a comprehensive view of asset inventory and full lifecycle management of endpoints across the organization. Read more to learn why leading organizations around the world rely on VMware AirWatch unified endpoint management for their enterprise mobility solution.
Tags : 
     VMware
By: VMware     Published Date: Feb 24, 2017
Windows 10, a mobile and cloud-ready operating system (OS), is poised to significantly impact on organizations' end user computing (EUC) strategy, with a unified platform for building apps and extending the organization's core processes to end users using any Windows 10-powered device. However, enterprise-wide execution of this business mobility vision comes with its own set of challenges. Read this whitepaper to learn how a unified endpoint management solution can enable organizations to fully capitalize on their mobility initiatives and IT departments to redefine themselves as true business enablers.
Tags : 
     VMware
By: Symantec     Published Date: Dec 04, 2014
SSL Certificates have been in use for almost 15 years, and they continue to serve a vital role in protecting data as it travels across the Internet and other networks. From online financial transactions to e-commerce to product development, SSL Certificates make it possible for users around the world to communicate sensitive information with the confidence that it is safe from malicious hackers. The Internet has evolved in innumerable ways over the past decade and a half; so why do SSL Certificates continue to instill trust? Simply put, SSL Certificates are very effective in protecting data in transit. Yet, customers transacting on websites and systems that are protected by SSL security still face serious threats . One key reason for this danger: poor SSL Certificate management. Enterprises with hundreds of SSL Certificates from several different providers could lose track of certificates in their environment. This white paper will present the pitfalls associated with poor SSL Certificate management, why they are potentially dangerous to the enterprise, and how enterprises can keep track of SSL Certificates effectively.
Tags : ssl, ssl certificates, business continuity, breach protection, protection, e-commerce, malicious hackers, security
     Symantec
By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a foundational cyber security technology. However, a properly executed SIEM strategy is difficult to execute even in static network environments with limited assets, much less for companies that have heterogeneous networks, transient end users, and plans of expansion. In this analyst report from Frost & Sullivan, you’ll read about several factors that companies big and small need to consider when purchasing and deploying a SIEM. You’ll also learn about AlienVault’s unified approach to solving for these challenges, with its on-prem appliance (USM Appliance™), and cloud-based SIEM-as-service, (USM Anywhere™). Download this report now to learn more about the changing SIEM market and AlienVault’s unified approach to security information and event management.
Tags : 
     AlienVault
By: JumpCloud     Published Date: Jan 21, 2015
Learn how modern organizations are now easily implementing innovative directory services and the consequences some organizations face by not implementing one.
Tags : ldap, active directory, user management, iam, ssh access, linux, hosted ldap, openldap
     JumpCloud
By: Crownpeak     Published Date: Jun 03, 2015
Enterprises have long personalized their visitor's web experiences, typically through product recommendations or basic user segmentation. However, today's customers demand more real-time, in-the-moment experiences that meet their needs whenever, wherever. The technology behind this level of personalized marketing continues to advance by adding situational, predictive and real-time elements to keep up with customer expectations.
Tags : forrester research, personalization, next generation personalization, personalized experience, customer experience, personalized marketing, digital experience, contextual experience
     Crownpeak
By: Imprivata     Published Date: Nov 27, 2007
Increased pressure for cost-efficient administration, productive work environments and an array of strict government regulations are driving increased demand for integrated user Provisioning/SSO solutions that are affordable, easy to maintain and secure.
Tags : sso, single sign on, user management, authentication, identity management, imprivata, ppi, security
     Imprivata
By: Lumension     Published Date: Oct 17, 2008
Vulnerability management can be a powerful means toward reducing the threat surface within an enterprise IT environment. But because vulnerability management technology has been around in some form or another for so long there has been plenty of time for the din of marketing-speak from various vendors to confuse users about the true nature of vulnerability management tools and practices.
Tags : lumension, it environment
     Lumension
By: F5 Networks Inc     Published Date: Jul 22, 2016
Traditional datacenter perimeters are dissolving as users access applications from a multitude of environments on a variety of devices. Secure, centralized application management throughout the hybrid cloud network will give an enterprise greater agility to succeed in today’s digital world. Read the whitepaper to learn how.
Tags : f5 big-ip platform, performance, applications, application delivery, integrated systems, networking, it management, enterprise applications
     F5 Networks Inc
By: Subrago     Published Date: Apr 30, 2009
The key objective of this white paper is to highlight the key issues and discuss processes and controls required to build a high performing IT support organization.
Tags : it support, subrago, it costs, customer transaction, high performing it support, it dependency, tolerance level, production services
     Subrago
By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml
     Ping Identity
By: Symantec.cloud     Published Date: Jan 26, 2011
Growing businesses face real difficulties in protecting their users, especially remote workers, while keeping management costs down.Understand the challenges of delivering endpoint security in an increasingly mobile environment.
Tags : symantec cloud, endpoint security, remote worker, mobile environment, spyware, intrusion
     Symantec.cloud
By: IBM Software     Published Date: Oct 05, 2010
Using enterprise reporting, an organization can progressively address immediate reporting needs, use BI capabilities to acquire greater insight, extend BI to more users and prepare a platform for the future that includes the implementation of performance management.
Tags : ibm cognos, business analytics, business intelligence, bi investment, enterprise reporting, performance management
     IBM Software
By: Aternity     Published Date: Aug 20, 2010
Application Performance Management & End User Experience Monitoring Platform for Fortune 500/Global 2000
Tags : application performance management, end user experience, frontline performance intelligence, desktop virtualization
     Aternity
By: Aternity     Published Date: Aug 20, 2010
View an on-demand webinar on "Improve End User Experience With Proactive Application Performance Management" and download Aberdeen's latest research on Application Performance Management.
Tags : application performance management, desktop virtualization, end user experience
     Aternity
By: Aternity     Published Date: Sep 01, 2010
Join Aternity, A Gartner Cool Vendor in IT Operations for a live demo on how Fortune 500 companies are leveraging our award-winning platform to deliver a user-centric approach to Proactive IT Management.
Tags : end user experience, application performance management, proactive it management, desktop virtualization, cloud computing
     Aternity
By: Hitachi ID Systems, Inc.     Published Date: Oct 20, 2010
This document defines the components of identity management
Tags : identity management, user provisioning, entitlements, password management, rbac
     Hitachi ID Systems, Inc.
By: Adobe     Published Date: Feb 20, 2014
Adobe positioned highest in Ability to Execute and Completeness of Vision in Gartner’s Magic Quadrant for Web Content Management. Gartner’s evaluation is based on Adobe Experience Manager, part of the Adobe Marketing Cloud. Adobe is named a Leader and is positioned highest in both Ability to Execute and Completeness of Vision.
Tags : gartner, adobe, adobe social, digital asset management, web content management, adobe experience manager, aem, internet marketing
     Adobe
By: Mimecast     Published Date: Apr 04, 2013
User Satisfaction in Cloud-Based E-mail Management with Mimecast
Tags : saas, cloud, email, email management, email provider
     Mimecast
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com