Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

configuration

Results 351 - 375 of 541Sort Results By: Published Date | Title | Company Name
Published By: AWS     Published Date: Oct 07, 2019
Securing cloud environments is different from securing traditional data centers and endpoints. The dynamic nature of the cloud requires continuous assessment and automation to avoid misconfigurations, compromises, and breaches. It can also be difficult to gain complete visibility across dynamic and rapidly changing cloud environments — limiting your ability to enforce security at scale. On top of these challenges, cloud governance is critical to maintain compliance with regulatory requirements and security policies as they evolve. Because cloud deployments are not just implemented once and left untouched, organizations need to consider how to integrate security into their CI/CD pipeline and software development lifecycle. Implementing a security solution that addresses cloud challenges requires deep security and cloud expertise that organizations often do not have. Once in the cloud, organizations manage and create environments via automation, adapt their workloads to changes by automa
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
Application owners and DevOps teams want to build in AWS without compromising security, but often lack the tools to keep sensitive data secure. During Pacific Dental’s move to Amazon Web Services (AWS), the company sought to enhance and operationalize its security measures to match the speed and scale of the cloud, using a cloud access security broker (CASB) to proactively address misconfiguration and risk to their data.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
Poor visibility into cloud deployments makes it difficult for organizations to enforce security and compliance across their cloud environment. Check Point CloudGuard Dome9 on Amazon Web Services (AWS) can help you gain deeper visibility of your traffic and configurations with automated assessments that strengthen your security posture and help you fulfill your part of the Shared Responsibility Model. Join the upcoming webinar with Check Point, Veracode, and AWS. Learn how Veracode improved their security posture using Check Point CloudGuard Dome9 on AWS.
Tags : 
    
AWS
Published By: SAP     Published Date: Jun 30, 2011
This white paper will outline possible mobile device security threats and review how IT can effectively manage and secure a fleet of devices, whether they are personally owned or corporate owned. By following the strategies outlined in this paper, IT managers will learn what the greatest security risks are for mobile devices and how to effectively protect end users, their devices, and the network infrastructure from attack, harm, or lost data.
Tags : 
sap, security, smartphones, tablets, productivity, mobility, security configuration, security enforcement
    
SAP
Published By: Centrify Corporation     Published Date: Nov 12, 2014
Centrify provides Red Hat Linux integration with Active Directory. The Centrify Suite centrally secures and manages Red Hat Linux systems — along with 450 other versions of Linux and Unix — by integrating them with your existing Microsoft Active Directory services. Centrify provides Active Directory Group Policy-based configuration to control the security settings of Red Hat systems and provides IT with the benefit of leveraging a familiar tool. Learn more about why you need Centrify for Red Hat.
Tags : 
security, management, integration, it benefits, configuration, enterprise applications
    
Centrify Corporation
Published By: OKTA     Published Date: Mar 30, 2018
"The enterprise cloud revolution is here. IT organizations everywhere, from small and mid-sized to Fortune 500 companies, are moving from on-premises software to on-demand, cloud-based services. As enterprise IT makes this transition to a new hybrid on-demand/on-premises configuration, controlling access to applications becomes increasingly important. CIOs and their teams have a whole new set of identity management challenges; their role is also fundamentally changing. As the steward of these new services, IT must provide insight and advice about Software-as-a-Service (SaaS) products to ensure the company gets the highest business value of their investments. Read this eBook to learn eight main identity and access management (IAM) challenges of adopting and deploying cloud applications. And, most importantly, best practices for addressing each of them."
Tags : 
    
OKTA
Published By: SERENA Software, Inc     Published Date: Jun 23, 2009
Learn how you can simplify compliance and automate the transition from development to production with complete traceability.  Benefit from process definition and enforcement, and automatic generation of audit trails.  Add consolidation to single, global repository where you move code into a single software change and configuration management instance that works globally, but performs as if everything were local.  Result: savings and productivity.
Tags : 
serena, compliance, traceability, enforment, software, single software, alm, collaboration
    
SERENA Software, Inc
Published By: SERENA Software, Inc     Published Date: Jun 23, 2009
Learn what you can do to unify development processes, drive down development costs and improve productivity and coordination across distributed teams. Leverage existing investments in tools, systems and methodologies to increase visibility, control and effectiveness with your application development processes.
Tags : 
process management, visibility, control, application development, unified development, serena software, best practices, serena
    
SERENA Software, Inc
Published By: Numara Software     Published Date: Jul 09, 2009
In this informative webinar, you will learn about the challenges of implementing configuration management along with suggestions on how to get started, and best practices to ensure success. You will also learn how Numara® FootPrints® Configuration Management, with its fast implementation, practical approach to implementing configuration management and automated integration to auto-discovery tools, takes the pain and time out of creating and maintaining a functional CMDB. Learn more today!
Tags : 
configuration management, cmdb, numara, footprints, auto-discovery tools, hardware, itil, service management
    
Numara Software
Published By: Pillar Data Systems     Published Date: Apr 20, 2010
The most critical component of an Exchange deployment is the storage subsystem where the data is held. Download this white paper to learn best practices in storage sizing and deployment.
Tags : 
pillar data systems, microsoft exchange best practices, storage size, exchange deployment, virtualization, storage configuration, data priority
    
Pillar Data Systems
Published By: IBM Corporation     Published Date: Sep 20, 2010
IBM Software Group performed a study that compared the performance of several WebSphere deployment configurations on Intel hypervisor environments.
Tags : 
ibm caching and cloud, test environment, websphere virtual enterprise, static cluster, wve, cloud computing
    
IBM Corporation
Published By: Microsoft Corporation     Published Date: Oct 19, 2010
Interested in the getting a close look at Microsoft® Online Services in action? If so, please join us for the Microsoft-led webinar, Microsoft Online Services.
Tags : 
microsoft online services, end-user experiences, administration, migration, configuration, sharepoint
    
Microsoft Corporation
Published By: Port25 Solutions     Published Date: Mar 09, 2012
The PowerMTA Management Console (PMC), v1.0, is a newly released web based enterprise and a scalable software solution. PMC allows for the centralized configuration, monitoring, and reporting of multiple PowerMTAT installations.
Tags : 
smtp server, mta, email server, mail server, email infrastructure, enterprise software, email delivery, email reporting
    
Port25 Solutions
Published By: Port25 Solutions     Published Date: Mar 27, 2012
Prioritized Email Delivery Streams, large queue management and Email Delivery monitoring configuration and reputation.
Tags : 
    
Port25 Solutions
Published By: Tribold.com     Published Date: Jun 12, 2013
Tribold CPQ is a Configure Price Quote (CPQ) services engine that powers the front end of the Quoting and Order Capture process providing the backbone to intelligently guide users in selecting relevant products for requirements.
Tags : 
tribold, cpq, configure price quote, quote validation, product configuration, it management
    
Tribold.com
Published By: Amazon Web Services, Inc     Published Date: Sep 24, 2013
Amazon Web Services (AWS) provides a secure and dependable environment for deploying Microsoft Exchange Server 2010. Customers can use their existing Windows Server applications licenses, such as MS Exchange or SharePoint, on AWS without paying additional licensing fees. Take advantage of the pay-as-you-go-pricing, scalability, and data integrity of the AWS Cloud to run your Exchange Server workloads today. Download the Planning and Implementation Guide to learn more. This guide discusses planning topics, architectural considerations, and configuration steps to run a high-availability and site-resilient Exchange architecture. This guide is designed for Microsoft Exchange Server administrators, architects, and engineers. In the guide, we also provide a sample AWS CloudFormation template that is designed to help you easily provision the necessary AWS resources and update them in an orderly and predictable fashion. Learn more today!
Tags : 
aws, ms exchange, windows server, share point, pay as you go pricing, scalability, data integrity, cloud
    
Amazon Web Services, Inc
Published By: Exablox     Published Date: Jan 27, 2015
Traditional storage management can be complex, confusing, and and configuration involved can be overwhelming. Scaling and replication can often be time consuming and frustrating, if not practically impossible. The time and complexity required can drive small and midsize businesses to engage expert consultants just to manage their data storage solution and optimize it for their application requests. You’ve got more on your plate to manage than just storage. In this third of a series of informative e-books from Exablox, we take a look at the difficulties of traditional storage approaches, and offer simple, practical ways to make your data storage easier to manage.
Tags : 
data management, data storage solution, new storage approach, storage management, simple data storage management, exablox, oneblox
    
Exablox
Published By: Citrix Online     Published Date: Aug 09, 2010
This series takes you through the many issues that plague the modern help desk, and states the case for implementing user-centric remote support.
Tags : 
citrix, gotoassist, remote support, help desk, configuration, service delivery, return on investment, roi
    
Citrix Online
Published By: Tripwire     Published Date: Jul 05, 2007
Discover how high-performing IT organizations are able to create a culture that supports and uses change management to their advantage, facilitating enterprise business goals.
Tags : 
cmdb, configuration management, auditing, risk management, audit, risk audit, risk control, configuration control
    
Tripwire
Published By: Tripwire     Published Date: Jul 05, 2007
Find out about the requirements and issues addressed in corporate governance Bill 198, Canada's version of Sarbanes-Oxley, for internal controls for technology and how IT configuration auditing brings compliance.
Tags : 
sox, sarbanes-oxley, bill 198, canada, canadian financial, canadian sox, financial controls, compliance
    
Tripwire
Published By: Tripwire     Published Date: Jul 13, 2007
In this whitepaper, you will learn how configuration audit and control can be used effectively to ensure system management productivity, and help reduce costs and sustain configuration viability within the bounds of operational, security and regulatory standards.
Tags : 
change management models, auditing, configuration management, security, change management, network security, efficiency, productivity
    
Tripwire
Published By: Tripwire     Published Date: Jan 30, 2008
Learn from industry analysts how IT organizations are using configuration management to meet compliance requirements and instill best practices. Find out how these organizations are applying the resulting processes to enhance security and improve operational efficiency in order to increase their level of service delivery.
Tags : 
cmdb, change management, configuration management, risk management, compliance, idg, tripwire, lifecycle management
    
Tripwire
Published By: Tripwire     Published Date: Feb 25, 2008
Find out how to maintain the same level of stability and security across both virtual and physical environments, using the same software and approach.
Tags : 
virtual machine, virtual, virtualize, virtualized, virtualization, virtual server, configuration, configuration management
    
Tripwire
Published By: Tripwire     Published Date: Apr 28, 2008
Learn more about the security risks and vulnerabilities faced by organizations, and the elements of a proactive security approach. Then find out how Tripwire helps organizations attain and maintain a good security posture using industry-leading configuration assessment and change auditing to harden systems against security breaches, automate compliance with security standards and policies, identify configuration changes, and resolve vulnerabilities.
Tags : 
tripwire, security, risk management, configuration management, change management, change audit, change auditing, security policies
    
Tripwire
Published By: Tripwire     Published Date: Jul 08, 2008
The Tripwire Enterprise solution provides organizations with powerful configuration control through its configuration assessment and change auditing capabilities. In this white paper, learn how with Tripwire Enterprise, organizations can quickly achieve IT configuration integrity by proactively assessing how their current configurations measure up to specifications as given in ISO 27001. This provides immediate visibility into the state of their systems, and through automating the process, saves time and effort over a manual efforts.
Tags : 
tripwire, iso, iso 27001, security, compliance, comply, isms, information security
    
Tripwire
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.