Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

it management software

Results 376 - 400 of 471Sort Results By: Published Date | Title | Company Name
Published By: Schneider Electric     Published Date: Jun 07, 2019
New digital technology now makes it feasible to integrate process control and SIF within a common automation infrastructure. While this can provide productivity and asset management benefits, if not done correctly, it can also compromise the safety and security of an industrial operation. Cybersecurity and sabotage vulnerability further accentuate the need for securing the safety instrumented system (SIS). Certainly, a common platform approach using similar hardware and software dedicated for control and safety functions, respectively, can provide the potential for cost savings. However, it is widely acknowledged that utilizing separate, independent, and diverse hardware/software for safety and control is the optimal way to protect against potentially catastrophic common cause and systematic design and application errors. Different vendors offer varied degrees of integration and solutions. The question is: how to provide an integrated control and safety solution with advanced functionality and productivity without compromising safety and security? And, where do users draw the line? A third-party (e.g., T‹V) certification of the hardware/software systems to IEC 61508 specifications carries significant advantages, but should this be the only criterion? How does a third-party certificate extend to the plantís overall assignment of risk reduction credits for all independent protection layers (IPL)? Control system embedded safety logic solvers may actually increase the SIL requirements of the SIF if no credit is allowed for the distributed control system (DCS) as an IPL. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability
    
Schneider Electric
Published By: ScriptLogic     Published Date: Aug 30, 2010
Organizations need a comprehensive solution to cope with the many challenges present in managing Windows desktops. Desktop Authority enables organizations to centrally configure, manage, secure and support desktops from a simple, easy to use interface. It provides the most flexible and granular control over desktops and user settings in the market today no product can offer.
Tags : 
scriptlogic, desktop authority, computer-based management, desktop management tool, validation logic, software deployment, reporting, remote support
    
ScriptLogic
Published By: ScriptLogic     Published Date: Oct 12, 2010
According to Gartner Research and IBM, software applications traditionally require maintenance agreements costing 10 to 30% of the license cost per year. Understanding these costs, and having the tools to manage them is the basis of Software Asset Management. ScriptLogic Asset Manager is a complete and cost-saving software asset management solution for effectively managing total software costs and utilization.
Tags : 
scriptlogic, software asset management, software license, tracking, automation, system center configuration manager, sccm, virtual application
    
ScriptLogic
Published By: ScriptLogic     Published Date: Nov 14, 2011
Security Explorer provides IT administrators with one platform to completely manage access controls and security across a Windows network environment.
Tags : 
scriptlogic, desktop authority, computer-based management, desktop management tool, validation logic, software deployment, reporting, remote support
    
ScriptLogic
Published By: ScriptLogic     Published Date: Mar 30, 2012
Desktop Authority reduces the cost of owning Windows desktops by enabling you to proactively configure, secure and support desktops and servers from a central location.
Tags : 
scriptlogic, desktop management, desktop authority, windows, software asset management, software license, tracking, automation
    
ScriptLogic
Published By: ScriptLogic     Published Date: Mar 30, 2012
Desktop Authority helps you achieve secure, protected and centrally managed desktops when migrating to Windows 7.
Tags : 
scriptlogic, desktop management, desktop authority, windows, software asset management, software license, tracking, automation
    
ScriptLogic
Published By: ScriptLogic     Published Date: Mar 30, 2012
Help Desk Authority offers a complete help desk solution for small and medium size businesses that can help efficiently track, identify, and resolve issues as quickly as possible. Try It For Free Today!
Tags : 
scriptlogic, desktop management, desktop authority, windows, software asset management, software license, tracking, automation
    
ScriptLogic
Published By: ScriptLogic     Published Date: Mar 30, 2012
Help Desk Authority offers a complete help desk solution for small and medium size businesses that can help efficiently track, identify, and resolve issues as quickly as possible.
Tags : 
scriptlogic, desktop management, desktop authority, windows, software asset management, software license, tracking, automation
    
ScriptLogic
Published By: ScriptLogic     Published Date: Mar 30, 2012
Help Desk Authority offers a complete help desk solution for small and medium size businesses that can help efficiently track, identify, and resolve issues quickly.
Tags : 
help desk, tracking, tickets, help desk management, active directory, auditing, native tools, centralized
    
ScriptLogic
Published By: SDL Web Content Management Solutions     Published Date: Jul 26, 2010
It's hard to believe, but some enterprises still use custom-coded Web content management (WCM)solutions. However, consumer demands have forced firms to shift from just managing and publishing Web sites to the daunting complexities of multichannel customer engagement, and it has becomeuntenable to build and maintain the required tools. With few exceptions, any firm with a custom-coded WCM platform should begin transitioning to a commercial or open source solution. For some firms,open source products offer the attractions of custom-coding with lesser software development and maintenance burdens.
Tags : 
wcm, web content management, multichannel, sdl, custom code, engagement
    
SDL Web Content Management Solutions
Published By: SDL Web Content Management Solutions     Published Date: Jul 26, 2010
It's hard to believe, but some enterprises still use custom-coded Web content management (WCM)solutions. However, consumer demands have forced firms to shift from just managing and publishing Web sites to the daunting complexities of multichannel customer engagement, and it has becomeuntenable to build and maintain the required tools. With few exceptions, any firm with a custom-coded WCM platform should begin transitioning to a commercial or open source solution. For some firms,open source products offer the attractions of custom-coding with lesser software development and maintenance burdens.
Tags : 
wcm, web content management, multichannel, sdl, custom code, engagement
    
SDL Web Content Management Solutions
Published By: Seagate Technology     Published Date: Apr 14, 2015
Upgrading security systems to meet both current and future needs is no small feat. So when a Texas-based surveillance system integrator began work with a large national nonprofit foundation on its 20,000 square foot park-like property, existing infrastructure and future system deployment were primary considerations. With the objective to update the nonprofitís Virtual Management Software (VMS) while leveraging existing analog and IP cameras, the system integrator needed a cost-effective solution to meet their current needs with the ability to scale for rapid growth. Download this case study to learn more about how the system integrator engaged with NUUO, a leading NVR and VMS manufacturer known for seamless integration of 3rd party cameras to build a customized system that would suit the nonprofitís needs.
Tags : 
surveillance, security system, virtual management software, cameras, network performance management
    
Seagate Technology
Published By: Secunia     Published Date: Oct 12, 2011
This paper discusses the limitations of security and highlights how cybercriminals can achieve their goals without administrative access.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
    
Secunia
Published By: Secunia     Published Date: Oct 12, 2011
Measurements within this white paper demonstrate that an intelligent patching strategy is an effective approach for reducing vulnerability risks.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
    
Secunia
Published By: Secunia     Published Date: Oct 12, 2011
This paper discusses the vulnerable components of SCADA systems based on analysis from Secunia while verifying the reported reported vulnerabilities.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
    
Secunia
Published By: Secunia     Published Date: Oct 12, 2011
This study identifies the 3rd party program vulnerabilities and the threat they represent.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
    
Secunia
Published By: Secure Computing     Published Date: Feb 27, 2007
All merchants and service providers that handle, transmit, store, or process information concerning credit cards are required to be compliant with the Payment Card Industry Data Security Standards requirements (PCI), or face contract penalties or even termination by the credit card issuers. This paper discusses the 12 requirements of PCI, and how Secure Computing's portfolio of security solutions can help enterprises meet and exceed them.
Tags : 
security, compliance, data protection, database security, pci, credit cards, privacy, consumer protection
    
Secure Computing
Published By: SERENA Software, Inc     Published Date: Jun 23, 2009
Learn what you can do to unify development processes, drive down development costs and improve productivity and coordination across distributed teams. Leverage existing investments in tools, systems and methodologies to increase visibility, control and effectiveness with your application development processes.
Tags : 
process management, visibility, control, application development, unified development, serena software, best practices, serena
    
SERENA Software, Inc
Published By: ServiceNow     Published Date: Dec 17, 2010
Hear traditional IT service management companies tell it, and you'd think buying their software or application service is a budget-smart choice. You'd be wrong.
Tags : 
service-now.com, saas economics, it service management, software enterprise, application service, legacy itsm solution, total-cost-of-ownership, tco
    
ServiceNow
Published By: ServiceNow     Published Date: Nov 05, 2012
You can make your life simpler when you automate your entire IT Asset Management (ITAM) lifecycle and Software Asset Management (SAM) in one system of record. You'll also reduce costs, eliminate wasted resources, improve compliance, mitigate security risks, and drive standardization.
Tags : 
itam, servicenow, it asset management, software asset management, sam, security, drive standardization, it management
    
ServiceNow
Published By: ServiceNow     Published Date: Jul 24, 2013
You can make your life simpler when you automate your entire IT Asset Management (ITAM) lifecycle and Software Asset Management (SAM) in one system of record. You'll also reduce costs, eliminate wasted resources, improve compliance, mitigate security risks, and drive standardization.
Tags : 
asset management, technology, software asset management, compliance, mitigation of security risks, automation, security, it management
    
ServiceNow
Published By: ServiceNow     Published Date: Nov 22, 2013
A modern ITAM solution allows organizations to consolidate legacy systems into one system of record and automate the asset lifecycle.
Tags : 
servicenow, enterprise it, asset management, software asset management, itam, itsm, service management, software-as-a-service
    
ServiceNow
Published By: ServiceNow     Published Date: Oct 13, 2015
IT service support management tools help infrastructure and operations organizations manage the consumption of IT services.
Tags : 
service support, management tools, software
    
ServiceNow
Published By: SilverSky     Published Date: May 09, 2014
This white paper explores the problems with traditional network setups and ways to address these issues in a budget friendly manner.
Tags : 
silversky, fortune 500, business security, network security, it management, security products, security systems, log data
    
SilverSky
Published By: Sitecore     Published Date: Aug 21, 2013
How to Choose the Best Web Content Management System for Customer Experience Management
Tags : 
sitecore, cms, customer experience management, global software, content management, it management
    
Sitecore
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.