Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

control access

Results 76 - 100 of 249Sort Results By: Published Date | Title | Company Name
Published By: Aviatrix     Published Date: Jun 11, 2018
Once you've designed and secured your Global Transit Network, are you done? Are you ready to hand day-to-day responsibility over to an operations team? Or, are there other elements you need to ensure that the day-to-day operation of your transit hub is efficient and effective? As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, demonstrate the best practices they've gleaned from working with operations teams, all who require: • Visibility: Do you have a way to centrally view your network, see performance bottlenecks, control security policies, and set other configuration details? • Deep Analytics: Can you easily gather performance and audit data and export it to Splunk, DataDog, or other advanced reporting tools? • Monitoring and Troubleshooting: Do you have a real-time view of network health, and how easily can you access the data needed to locate and fix issues? • Alert Management: When issues do occur, what r
Tags : 
aws, aws vpc, aws global transit network, aws transit vpc, cisco csr, csr 1000v
    
Aviatrix
Published By: TIBCO Software     Published Date: May 20, 2019
The biggest headache for most payment operations teams is cost control — and a large part of it comes from fraud management: Investigation teams waste large amounts of time just assembling the data needed to make decisions. Detection engines are always playing catchup with the latest fraud patterns. Ever changing regulations increase the time and cost required to reach compliance and meet audit standards. Given their scope and impact, replacing core fraud systems is not an option for most firms. But instead of replacing them, you can improve the investigative process with augmented investigation, and improve the detection process by enhancing current systems. This whitepaper describes three ways financial services firms can use TIBCO solutions to lower the cost of investigations through faster results, reduce fraud losses through better detection, and simplify audit and regulatory compliance through centralized access to information.
Tags : 
compliance, audit, fraud, data, detection, transactions, investigation, cost
    
TIBCO Software
Published By: Magnetrol     Published Date: Nov 05, 2018
Tank overfill is a crucial safety concern in the petroleum industry. Failure to put adequate prevention measures in place has resulted in injuries, loss of life, and billions of dollars worth of damages worldwide. These resources were developed by the level control experts at Magnetrol to help you implement and maintain an effective Overfill Protection Plan for your terminals. Simply click on the downloads below at the Resources section to access this important information.
Tags : 
    
Magnetrol
Published By: SailPoint Technologies     Published Date: Feb 12, 2019
Cyberthreats have shifted from attacking network/IT resources to targeting users. Find out how identity governance protects your users and puts you in control of data access.
Tags : 
identity governance, iam, identity management, user-centric security
    
SailPoint Technologies
Published By: SailPoint Technologies     Published Date: Sep 05, 2019
If you’re not controlling access to documents, spreadsheets, presentations and reports stored in the cloud, your organization is significantly more vulnerable to security breaches and data privacy compliance penalties. Download this white paper to find out why. .
Tags : 
    
SailPoint Technologies
Published By: Winshuttle     Published Date: Apr 18, 2017
How can a finance and/or controller professional access SAP FICO data leveraging Microsoft Excel in a highly usable and interoperable fashion while respecting all of the SAP core security and governance controls? In order to fully explore this question, this white paper highlights five valuable ways to leverage Microsoft Excel to reduce Finance & Controller operational costs while making your SAP FICO systems implementation, management and maintenance life easier.
Tags : 
    
Winshuttle
Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the compelling business and technical case for centralizing administration in Microsoft's Active Directory, describes how Centrify's integrated architecture enables you to extend Active Directory to your non-Microsoft platforms, and describes the Centrify Suite's unique benefits.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the compelling business and technical case for centralizing administration in Microsoft's Active Directory, using Centrify's DirectControl to extend Active Directory authentication and access control to your UNIX, Linux and Mac OS systems and applications, and using Centrify's DirectAudit to log user activity to provide you a clear picture of end user actions on all UNIX and Linux systems.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the challenges of migrating NIS deployments to a central repository, and explains in detail how a combination of Microsoft Active Directory and Centrify DirectControl can deliver a cost-effective solution that strengthens security while improving IT efficiency.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance
    
Centrify Corporation
Published By: Okta     Published Date: Oct 01, 2010
Controlling who is granted secure access to which applications and data becomes a real challenge when users can get access from any browser, at any time, from any place.
Tags : 
okta, cloud area network, scaling saas applications, security, identity management, iam, active directory, google apps
    
Okta
Published By: Intacct Corporation     Published Date: Oct 02, 2015
Like it or not, the accounting function is in the news distribution business. The demand for financial performance information is high and the pressure for more timely information is even higher. A fast close improves the timeliness of information, aids decision making and is a value-enhancing proposition for the business. To continue adding value, the CFO and controller must find ways to speed up their financial close processes and report financial results before they become old news. Download this white paper and learn the "7 Steps to a Faster, Better Close" including how to: • Identify the hidden traps and pitfalls bogging down your accounting processes • Drive process improvement and collaboration within your organization • Gain visibility and timely access to critical financial and operational information through application integration • Utilize modern accounting technology to accelerate your close with automation
Tags : 
    
Intacct Corporation
Published By: ForeScout     Published Date: Feb 18, 2014
Read the new Enterprise Strategy Report (ESG) analyst report. ESG projects that as NAC transforms into EVAS (Endpoint Visibility, Access & Security) it will become even more of a mainstream IT technology.
Tags : 
forescout, network access control, nac, enterprise strategy report, esg, endpoint visibility, access, security
    
ForeScout
Published By: ForeScout     Published Date: Apr 18, 2014
Download your copy of the new eBook entitled “Definitive Guide™ to Next-generation Network Access Control.” This 84-page resource provides security practitioners with key capabilities, implementation considerations, use cases and operational advice for network access control (NAC) and details on how modern NAC platforms can be applied by IT organizations to achieve continuous monitoring and mitigation.
Tags : 
forescout, next generation network access control, implementation considerations, it organizations, security resources, nac platforms, networking, security
    
ForeScout
Published By: Aruba Networks     Published Date: Nov 15, 2013
With more Internet-connected mobile devices than people in the world in 2013, IT must provide seamless connectivity to every class of user — employees, contractors, guests and even customers — appropriate to their role and type of device. Mobility in the workplace isn’t just for user benefit and productivity. The migration to mobility begets several IT benefits.
Tags : 
just media, aruba networks, workplace benefits, wire-like wireless, context-aware security, user experience, automate adds, reduce network costs
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
Le lieu de travail nouvelle génération repose sur la mobilité. À l’heure où le nombre d’appareils mobiles connectés à Internet dépasse la population mondiale, il est essentiel que les services informatiques soient en mesure d’offrir à chaque catégorie d’utilisateurs (employés, entrepreneurs, invités et clients) une connectivité fluide et adaptée à leurs besoins et types d’équipement. Outre les atouts évidents pour les utilisateurs et l’effet bénéfique sur la productivité, la migration vers la mobilité est source de nombreux avantages pour les services informatiques. Téléchargez ce livre blanc pour les découvrir…
Tags : 
just media, aruba networks, workplace benefits, wire-like wireless, context-aware security, user experience, automate adds, reduce network costs
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
Der Next-Generation Workplace steht für Mobilität. Im Jahr 2013 gab es mehr mit dem Internet verbundene Mobilgeräte als Menschen weltweit. Aufgabe der IT ist es, die dafür notwendigen Verbindungen und Netzwerke zu schaffen und dafür zu sorgen, dass diese an die Anforderungen der unterschiedlichen Benutzergruppen, an ihre Aufgaben sowie die eingesetzten mobilen Geräte angepasst sind – sei es für Angestellte, Unternehmer, Gäste oder Kunden. Mobiles Arbeiten steigert die Produktivität und bietet zahlreiche Vorteile für den Anwender – aber auch IT-Verantwortliche können profitieren. Laden Sie unser Whitepaper herunter und überzeugen Sie sich von den Vorteilen...
Tags : 
just media, aruba networks, workplace benefits, wire-like wireless, context-aware security, user experience, automate adds, reduce network costs
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
El lugar de trabajo de la próxima generación se centra totalmente en la movilidad. En este año 2013 hay más dispositivos móviles con conexión a Internet que personas en el planeta, de modo que la tecnología informática debe proporcionar una conectividad sin restricciones a cada tipo de usuario —trabajadores, contratistas, invitados e incluso clientes— apropiada para la función de cada uno y el tipo de dispositivo que utiliza. Se pone de manifiesto que la movilidad en el lugar de trabajo no es sólo para el beneficio propio del usuario y de la productividad. La migración hacia la movilidad genera varias ventajas en TI. Descárguese este documento técnico para descubrir las ventajas....
Tags : 
just media, aruba networks, workplace benefits, wire-like wireless, context-aware security, user experience, automate adds, reduce network costs
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
Il luogo di lavoro di nuova generazione sarà tutto concentrato sulla mobilità. Già nel 2013 nel mondo ci sono più dispositivi mobili che persone, e l'IT deve fornire una connettività senza interruzioni ad ogni tipo di utente — dipendenti, appaltatori, ospiti e persino clienti — che si adatti al loro ruolo e al tipo di dispositivo che utilizzano. E così, la mobilità sul posto di lavoro non giova solo agli utenti e alla produttività. La migrazione verso la mobilità genera numerosi vantaggi informatici. Scaricate questo libro bianco per scoprirli tutti…
Tags : 
just media, aruba networks, workplace benefits, wire-like wireless, context-aware security, user experience, automate adds, reduce network costs
    
Aruba Networks
Published By: Ruckus Wireless     Published Date: Aug 08, 2016
Minooka School District serves 4,500 pre-K through 8th-grade students. Challenge: Difficulty troubleshooting legacy Aironet infrastructure and supporting increased network demands. Solution: Ruckus Cloud Wi-Fi for distributed site network management.
Tags : 
cloud based access point, cloud based wifi, cloud managed wifi, cloud wifi, cloud based wifi management, cloud wifi controller, cloud managed wireless, cloud managed wireless access point
    
Ruckus Wireless
Published By: Ruckus Wireless     Published Date: Aug 08, 2016
Ruckus Cloud Wi-Fi is WLAN Management-as-a-Service that enables schools and small and medium businesses with limited IT resources to easily set-up, monitor, and manage a high-performance network, without compromising on Wi-Fi performance.
Tags : 
cloud based access point, cloud based wifi, cloud managed wifi, cloud wifi, cloud based wifi management, cloud wifi controller, cloud managed wireless, cloud managed wireless access point
    
Ruckus Wireless
Published By: Ruckus Wireless     Published Date: Aug 08, 2016
Belleville Township High School District 201 serves 4,700 students. Challenge: Legacy Ubiquiti infrastructure was unable to support more than 30 clients per AP. Solution: 11ac APs provided superior WiFi performance and network reliability.
Tags : 
cloud based access point, cloud based wifi, cloud managed wifi, cloud wifi, cloud based wifi management, cloud wifi controller, cloud managed wireless, cloud managed wireless access point
    
Ruckus Wireless
Published By: Dassault Systèmes     Published Date: Aug 08, 2017
Midsize Aerospace and Aviation manufacturers need to choose a system that quickly delivers the core capabilities they need to streamline product development but also gives them room to grow value over time. Product Lifecycle Management (PLM) software can help. It drives better product development performance by managing product-related data, processes and projects. While smaller companies may be able to control, access and share product data with relatively simple Product Data Management (PDM) tools, larger manufacturers rely on full featured PLM systems that help automate processes and share data across global Aerospace and Aviation companies.
Tags : 
aerospace, aviation, manufacturing, product development, plm, product lifecycle management, automation, data
    
Dassault Systèmes
Published By: Dassault Systèmes     Published Date: Aug 08, 2017
Industrial Equipment Manufacturers have to connect closely with customers and introduce new products quickly and efficiently to meet their needs. While smaller Industrial Equipment Manufacturers may be able to control, access, and share product data with relatively simple Product Data Management (PDM) tools, larger Industrial Equipment Manufacturers rely on full-featured PLM systems that help automate processes and share data across global supply chains. Industrial Equipment Manufacturer companies may find themselves in-between because: • Product and organizational complexity drive them beyond basic PDM capabilities • A full-featured PLM implementation may feel out of reach They need to choose a system that quickly delivers the core capabilities they need to streamline product development but also gives them room to grow value over time. What’s the right size PLM to fit an Industrial Equipment Manufacturer? Let’s take a look.
Tags : 
pdm, product data management, industrial, equipment manufacturers, plm, dassault
    
Dassault Systèmes
Published By: Forcepoint     Published Date: Jun 06, 2019
Today’s employees demand greater flexibility, productivity, and mobility. And while cloud and BYOD policies have answered that call, they’ve also added unforeseen complexities the way IT manages data security and compliance. How can you balance productivity and risk in SaaS environments? “A Guide to Achieving SaaS Security and Compliance” deconstructs the idea that cloud security and user productivity are mutually exclusive. This whitepaper includes guidance on how to: Select SaaS providers that follow the very same external standards (e.g., PCI DSS) as your organization. Apply the same in-house security, governance, and compliance principles to cloud services. Leverage tools and processes to gain visibility, control access, and protect data in your SaaS environment.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Office 365, Salesforce, and other cloud apps deliver a boost in employee productivity, but this benefit comes at a price. Once data moves outside an enterprise, security teams lose visibility and control into how it’s accessed and used. There is also the risk of unsanctioned apps or Shadow IT – the cloud apps setup and managed outside of IT that they have no visibility of; all this leaves an organization having to manage up to 1,000 cloud apps*.  Deploying a CASB solution can help you discover and assess risk from unsanctioned cloud apps and control sanctioned cloud app use. Through a hands-on evaluation, ESG discovered that Forcepoint CASB: Reduces threat response times Grants visibility and context into user activity Controls user access to cloud apps from different locations/devices Read the ESG evaluation for rare insight into Forcepoint CASB by a respected third-party analyst.
Tags : 
    
Forcepoint
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.