user management

Results 351 - 375 of 385Sort Results By: Published Date | Title | Company Name
By: CDW     Published Date: Mar 18, 2016
Client virtualization technologies are redefining the way IT resources are delivered to end users, and creating exciting new opportunities for IT organizations as they work to streamline and improve operations. By abstracting applications and operating systems from client hardware, virtualization enables client assets to be stored on central servers and delivered to client endpoints. The implications are profound. End users can log on to any networkconnected computing device and access their custom operating system and application environment. For IT departments, central management of client virtual machine (VM) images brings efficiencies in everything from routine maintenance and updating to operating system upgrades.
Tags : 
     CDW
By: Sponsored by HP and Intel®     Published Date: Mar 05, 2013
This white paper explains how you can unleash the full potential of mobility-greater productivity, flexibility, and better economics-by unifying secure device access, user authentication, provisioning, and management.
Tags : holistic approach, byod, business advantage, intel, convenience, it infrastructure, byod, bring your own device
     Sponsored by HP and Intel®
By: NETIQ     Published Date: Mar 12, 2013
Organizations struggle to meet PCI DSS compliance. By investing in the proper standardization tools and automation software, organizations can thrive while shifting resources freed up by a simpler.
Tags : pci dss, compliance, saas, data security, user activity monitoring, it security, security, it management
     NETIQ
By: NETIQ     Published Date: Mar 12, 2013
As your business users consume software-as-a-service applications, they are introducing new risks to your organization.
Tags : cloud computing, access control, saas, software-as-a-service, security, compliance, user access management, security risks
     NETIQ
By: NETIQ     Published Date: Mar 12, 2013
A poll of CIOs and IT managers reports why departments must defend against complex internal and external threats while mitigating regulatory and compliance concerns. The results provide data about how enterprises view compliance.
Tags : security compliance, users access management, it management compliance
     NETIQ
By: NETIQ     Published Date: Sep 09, 2013
As your business users consume software-as-a-service applications, they are introducing new risks to your organization. Why settle for a solution that’s incomplete, unsecure and requires manual intervention— when what the business really needs is a complete, secure and automated solution?
Tags : cloud computing, access control, saas, software-as-a-service, security, compliance, user access management, security risks
     NETIQ
By: Dell Software     Published Date: Apr 17, 2013
Learn more about User Experience Monitoring and the need for advanced real-time predictive analytics to capture information and identify trends. Download this paper today and discover vital recommendations, including the need for better dialogue between IT and business and knowledge of end-user customer behavior.
Tags : user experience management, business impact, cornerstone, it transformation, end-user customer behavior, dell
     Dell Software
By: Dell Software     Published Date: Apr 17, 2013
This white paper includes interviews with three diverse companies using User Experience Monitoring (UEM). It underscores UEM’s diverse appeal, its values to IT, and Dell’s versatility in UEM. The paper shows how Dell is combining critical insights into business outcomes and user behaviors with performance and application design.
Tags : foglight, user experience, user experience management, cast studies, dell, quest software
     Dell Software
By: Gigya     Published Date: May 14, 2014
This guide takes an in-depth look at 3 of the main hurdles facing IT today and the solutions that can be used to better navigate this new identity ecosystem.
Tags : social login, gamification, social plugin, rating and review software, user management tool, social user management software, social customer tool, social consumer data
     Gigya
By: Gigya     Published Date: May 14, 2014
In this guide, we’ve outlined some strategies that integrate Pinterest’s value offering to boost conversions and user engagement.
Tags : social login, gamification, social plugin, rating and review software, user management tool, social user management software, social customer tool, social consumer data
     Gigya
By: Gigya     Published Date: May 14, 2014
Learn 3 keys to gaining an actionable view of consumer identity that facilitates data-driven decision making, provides measurable results and drives unique KPIs.
Tags : social login, gamification, social plugin, rating and review software, user management tool, social user management software, social customer tool, social consumer data
     Gigya
By: AlienVault     Published Date: Aug 11, 2015
This webinar talks about common browser vulnerabilities used to execute attacks, what attackers do next to take control of the system, and how to catch it before the attacker moves further into your network
Tags : end-user protection, cyberattacks, browser vulnerabilities, security management, modern threats, threat sharing, security products, firewall
     AlienVault
By: JumpCloud     Published Date: Jan 21, 2015
Learn how innovative IT and ops teams are leveraging hosted LDAP solutions to minimize hassles.
Tags : ldap, active directory, user management, idaas, iam, ssh access, linux, hosted ldap
     JumpCloud
By: JumpCloud     Published Date: Jan 21, 2015
Learn how innovative IT and ops teams leverage LDAP and Active Directory for their IaaS.
Tags : ldap, active directory bridge, user management, idaas, iam, ssh access, linux, hosted ldap
     JumpCloud
By: IBM MaaS360     Published Date: Feb 05, 2015
Before you take that fatal next step in allowing mobility, security, BYOD and user flexibility, carefully read these top 10 reasons why you don't need mobile device management.
Tags : 
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 15, 2015
Mobile device Management was just the beginning of enterprise security needs for iOS, Android, Windows and the ever expanding universe of devices. Data, Apps and access are what will send businesses into a new galaxy of great performance. Get there at safely light-speed with Enterprise Mobility Management.
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 15, 2015
Tired of hearing all the ways you need to go “mobile” and all the ”things” it can do for your business. Don’t buy the hype, here’s a list of perfectly valid reasons fast and secure mobile deployment and management is a bunch of hullabaloo and poppycock.
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 16, 2015
See where Ovum places the focus on EMM for 2015 and the vendors with the vision and executional ability to deliver.
Tags : fiberlink, deliverability, mobile users, strategy, app enabled, scalability, security, device management
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 16, 2015
The Aragon Globe delivers an eighteen-vendor comparison on EMM strengths and weaknesses for mobile devices, content and BYOD readiness.
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
     IBM MaaS360
By: Workforce Software     Published Date: Nov 23, 2015
In order to see the most benefit, organizations must lead with workforce management and they must do so with an eye toward three key issues: Ease-of-use and user adoption Specialization versus standardization Business alignment This paper will explore all three of these areas, and how organizations are leveraging the deep capabilities of modern workforce management technology as the first step of their HCM transformation.
Tags : workforce management technology, business alignment, workforce management software
     Workforce Software
By: VMware AirWatch     Published Date: Dec 13, 2016
As enterprises embrace adoption of Microsoft Office 365 to drive productivity by using the latest mobile applications and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between security and user experience is often difficult. In this 60-minute webinar, discover how VMware AirWatch® Enterprise Mobility Management (EMM) easily integrates with both Office 365 and VMware Identity Manager to optimize user experience and ensure data is secure across all devices and platforms. An AirWatch expert will give an in-depth demonstration of the advantages of deploying Office 365 with AirWatch by VMware, as well as conduct a Q&A session.
Tags : 
     VMware AirWatch
By: VMware AirWatch     Published Date: Dec 13, 2016
In this 60-minute webinar, discover how VMware AirWatch, the world’s leader in Enterprise Mobility Management, enables end users with a digital workspace and empowers IT with a unified and secure mobility platform. Recently recognized as the leader in the 2016 Gartner Magic Quadrant for Enterprise Mobility Management for the sixth consecutive year, AirWatch is at the forefront of the Enterprise Mobility Management space. Watch now to learn more about our comprehensive Enterprise Mobility Management platform and the VMware AirWatch solutions.
Tags : 
     VMware AirWatch
By: VMware AirWatch     Published Date: Jul 20, 2017
Take a look at our cloud-first, modern Windows management and security solution that fundamentally changes how IT approaches PC lifecycle management. Join us to learn how unified endpoint management helps organizations lower the cost of managing Windows deployments; streamlines securing endpoints, apps and data on any network; and delivers peak user experience across any Windows device. • Consolidate your Windows management across devices on or off the domain • Deliver and install Win32 software more reliably and quickly • Deploy security patches instantly and remediate vulnerabilities faster • Unify your endpoint management functions across desktops and mobile • First look at how organizations are using UEM for Windows 10
Tags : 
     VMware AirWatch
By: Okta     Published Date: Jul 27, 2016
The shift to the cloud is changing how companies think about their IT infrastructure and what they must do to manage it. The on-demand applications and services that comprise a cloud services network enable companies to rapidly deploy powerful capabilities to a broad set of users at very low costs. However, they also introduce challenges associated with securing and controlling users and access, simplifying adoption and scaling of these applications, and providing insight into utilization to ensure the business is optimizing its cloud investments. Okta’s on-demand identity management service enables companies to address these challenges head-on by being designed from the ground up as a scalable, secure, multi-tenant service that protects your data through centralized access control. This whitepaper details Okta’s focus on security and reliability, how Okta enhances security and how Okta itself stays secure.
Tags : identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
     Okta
By: Coupa     Published Date: Mar 07, 2016
User adoption of automated business processes for procurement, invoicing and expense management still hovers around 20-40%. Coupa’s modern, easy-to-use, easy-to-configure platform can change that. Coupa helps extend the reach of your Oracle ERP system, by plugging seamlessly into your established framework.
Tags : 
     Coupa
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com