Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

console

Results 1 - 25 of 53Sort Results By: Published Date | Title | Company Name
Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal, mobile, device, use, your, network, nac, guest, networking, byod, bring, your, own, device, endpoint, security
    
ForeScout
Published By: Silver Peak     Published Date: Feb 12, 2013
Silver Peak Systems' new Agility technology initiative gives application owners easy control with point-and-click virtual workload acceleration thanks to tight integration with VMware vCenter and other virtual infrastructure management consoles.
Tags : 
virtualization, data center, network, study, bandwidth management, wide area networks, cloud computing
    
Silver Peak
Published By: Network Automation     Published Date: Dec 02, 2008
AutoMate BPA Server 7 is a revolutionary advance in the automation of systems and applications across multiple-machine networks. No other automation software has the power and range of capabilities offered by AutoMate BPA Server, while also making automation so easy and intuitive.
Tags : 
network automation, automate bpa server 7, server management console, networking, it management, network management, network performance management
    
Network Automation
Published By: Blue Medora     Published Date: Oct 24, 2016
Download this report to learn more about Blue Medora's new SELECTStar platform which provides new levels of visibility into the data tier that multiple tools can utilize.
Tags : 
blue medora, selectstar, data tier, database virtualization, data tier management, vmware, virtual monitoring consoles, data layer platform
    
Blue Medora
Published By: Group M_IBM Q2'19     Published Date: May 03, 2019
"Managing and securing endpoints with conventional mobile device management (MDM) or enterprise mobile management (EMM) solutions is time-consuming and ineffective. For this reason, global IT leaders are turning towards unified endpoint management (UEM) solutions to consolidate their management of smartphones, tablets, laptops and IoT devices into a single management console. To increase operational efficiency, maximize data security and deliver on their digital transformation goals, they’ll need a UEM platform that does more than just promise success. The answer is a smarter solution, built for today, that brings new opportunities, threats, and efficiency improvements to the forefront. With Watson™, IBM® MaaS360® UEM features cognitive insights, contextual analytics, and cloud-sourced benchmarking capabilities. It helps you make sense of daily mobile details while managing your endpoints, users, apps, document, and data from one platform."
Tags : 
    
Group M_IBM Q2'19
Published By: Carbonite     Published Date: Aug 02, 2017
Carbonite Cloud Migration Powered by DoubleTake is an online service that enables migrations from any physical, virtual or cloud-based environment into VMware vSphere, vCloud Director, OpenStack, Amazon Web Services EC2 or Microsoft Azure infrastructure as a service (IaaS) cloud environments. The webbased console provides automated, centralized migration to the cloud. This document provides a detailed technical briefing on the functionality and use of Carbonite Cloud Migration and assumes that the reader will have at least a basic understanding of infrastructure as a service (IaaS).
Tags : 
carbonite, cloud, cloud-based environment, iaas. cloud migration
    
Carbonite
Published By: Citrix Online     Published Date: Nov 17, 2010
This report documents hands-­-on testing of server virtualization technology from Citrix with a focus on manageability, consolidation, and cost effectiveness.
Tags : 
citrix xenserver, enterprise data center, server virtualization, consolidation, cloud computing environment, xencenter management console, cloud computing, data center design and management
    
Citrix Online
Published By: ScriptLogic     Published Date: Jan 11, 2012
Active Administrator is an extensive Active Directory management solution that addresses the auditing, security, recovery and health of Active Directory from one integrated console. This centralizes the management of the most important aspects of Active Directory and Group Policy so that administrators save time and have the most control over their environment.
Tags : 
scriptlogic, active administrator, active directory, security, productivity, security management, auditing, backup and restore, policy management
    
ScriptLogic
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
INDUSTRY Construction BUSINESS CHALLENGE Proactively prevent business disruption as a result of cyberattacks IT ENVIRONMENT Kaspersky antivirus, layered enterprise security SOLUTION Malwarebytes Endpoint Protection RESULTS Detected and eliminated thousands of threats that other solutions missed Delivered visibility into entire installed base of endpoints, regardless of location Saved time and accelerated response via the cloud console Prevented PUPs and exploits from gaining entry
Tags : 
    
MalwareBytes EMEA
Published By: Port25 Solutions     Published Date: Mar 09, 2012
The PowerMTA Management Console (PMC), v1.0, is a newly released web based enterprise and a scalable software solution. PMC allows for the centralized configuration, monitoring, and reporting of multiple PowerMTAT installations.
Tags : 
smtp server, mta, email server, mail server, email infrastructure, enterprise software, email delivery, email reporting, bounce categorization, message transfer agent, it management
    
Port25 Solutions
Published By: Adobe     Published Date: Oct 19, 2012
As consumers access online content on more devices - computers, smartphones, tablets and even gaming consoles - managing and delivering digital content has grown exponentially more complex. Learn how rethinking WCM will help you thrive in complexity.
Tags : 
mobile content management, cms, content management systems, wcm, web content management, mobile content planning, mobile applications, software development
    
Adobe
Published By: LANDesk     Published Date: Feb 12, 2007
This white paper discusses how the new LANDesk® Antivirus solution, available as an add-on to LANDesk® Management Suite and LANDesk® Security Suite, provides a competitively priced, front-line malware and malicious code defense for all network endpoints, including workstations, file servers, mail systems and Internet gateways.
Tags : 
network security, security, anti virus, virus, viruses, antivirus, anti-virus, malware, internet security, web security, endpoint security, end point security, end-point security, intrusion prevention, landesk
    
LANDesk
Published By: IBM     Published Date: Jul 15, 2016
This Market Guide helps CISOs identify emerging data-centric audit and protection tools. IBM is positioned with a centralized management console approach across multiple silos and has coverage of all the key capabilities evaluated by Gartner.
Tags : 
ibm, gartner, data, dcap, data-centric audit protection, security, enterprise applications
    
IBM
Published By: Redstor UK     Published Date: Mar 12, 2018
The General Data Protection Regulation, is a piece of legislation that was approved and put in to place by the European Parliament in April 2016. As European Law, it will fully take effect after a 2-year transition ending May 25th 2018. GDPR, replaces the previous Data Protection Directive (DPD), adopted in 1995, and will in the UK, replace and strengthen the Data Protection Act 1998 (DPA). One of the initial differences between GDPR and DPD, is that GDPR is a regulation not a directive; as a regulation, no additional enabling legislation will have to be passed by governments of member states. Redstor have the ability to give insight into the data organisations have on their networks, advise on best practice to protect data and then implement strategies around backup, archiving and disaster recovery. Data is searchable through an intuitive console making compliance simple and achievable for all organisations protecting data through the Backup Pro Platform.
Tags : 
    
Redstor UK
Published By: Commvault     Published Date: Jul 06, 2016
How do you maintain the security and confidentiality of your organization’s data in a world in which your employees, contractors and partners are now working, file sharing and collaborating on a growing number of mobile devices? Makes you long for the day when data could be kept behind firewalls and employees were, more or less, working on standardized equipment. Now, people literally work on the edge, using various devices and sending often unprotected data to the cloud. This dramatic shift to this diversified way of working has made secure backup, recovery and sharing of data an exponentially more difficult problem to solve. The best approach is to start with a complete solution that can intelligently protect, manage and access data and information across users, heterogeneous devices and infrastructure from a single console - one that can efficiently manage your data for today's mobile environment and that applies rigorous security standards to this function.
Tags : 
commvault, mobile data, file sharing, backup recovery, access, personal cloud approach, data protection, endpoint, end user recovery, control governance, networking, security, it management, enterprise applications
    
Commvault
Published By: IBM     Published Date: Jan 04, 2016
Join Steve Mirman, IBM MobileFirst solution architect, for this deep-dive intro into how you can speed development, simplify deployment and actively manage all of your mobile apps with a single, analytics-based console using our Platform in the cloud.
Tags : 
ibm, mobile, application, development, mobilefirst platform, software development, enterprise applications
    
IBM
Published By: HP     Published Date: Nov 05, 2014
Integrated Computing (IC), also known as Converged Infrastructure, stands to revolutionize everything about IT. IC takes all of virtualization, storage, networking, and compute into a single system and allows total infrastructure oversight through one console. As you can imagine, the improvements in ease of use, agility, and efficiency are quite substantial. This is essential because infrastructure maintenance devours about three-fourths of annual IT budgets. IC changes all of that, delivering high efficiency solutions for the lifecycle of system,reducing costs and freeing up valuable personnel. The evolution of IT awaits.
Tags : 
converged system, business efficiency, integrated systems, integrated management, virtualization, the cloud, big data, mobility, data center, it management
    
HP
Published By: HP     Published Date: Oct 15, 2014
Integrated Computing (IC), also known as Converged Infrastructure, stands to revolutionize everything about IT. IC takes all of virtualization, storage, networking, and compute into a single system and allows total infrastructure oversight through one console. As you can imagine, the improvements in ease of use, agility, and efficiency are quite substantial. This is essential because infrastructure maintenance devours about three-fourths of annual IT budgets. IC changes all of that, delivering high efficiency solutions for the lifecycle of system,reducing costs and freeing up valuable personnel. The evolution of IT awaits.
Tags : 
virtualization, data center, cloud, infrastructure, red hat, integrated, optimization, solution, public, private, business
    
HP
Published By: HP     Published Date: Feb 02, 2015
Integrated Computing (IC), also known as Converged Infrastructure, stands to revolutionize everything about IT. IC takes all of virtualization, storage, networking, and compute into a single system and allows total infrastructure oversight through one console. As you can imagine, the improvements in ease of use, agility, and efficiency are quite substantial. This is essential because infrastructure maintenance devours about three-fourths of annual IT budgets. IC changes all of that, delivering high efficiency solutions for the lifecycle of system,reducing costs and freeing up valuable personnel. The evolution of IT awaits.
Tags : 
    
HP
Published By: HP     Published Date: Feb 20, 2015
Integrated Computing (IC), also known as Converged Infrastructure, stands to revolutionize everything about IT. IC takes all of virtualization, storage, networking, and compute into a single system and allows total infrastructure oversight through one console. As you can imagine, the improvements in ease of use, agility, and efficiency are quite substantial. This is essential because infrastructure maintenance devours about three-fourths of annual IT budgets. IC changes all of that, delivering high efficiency solutions for the lifecycle of system,reducing costs and freeing up valuable personnel. The evolution of IT awaits.
Tags : 
    
HP
Published By: HP     Published Date: Feb 02, 2015
Integrated Computing (IC), also known as Converged Infrastructure, stands to revolutionize everything about IT. IC takes all of virtualization, storage, networking, and compute into a single system and allows total infrastructure oversight through one console. As you can imagine, the improvements in ease of use, agility, and efficiency are quite substantial. This is essential because infrastructure maintenance devours about three-fourths of annual IT budgets. IC changes all of that, delivering high efficiency solutions for the lifecycle of system,reducing costs and freeing up valuable personnel. The evolution of IT awaits.
Tags : 
    
HP
Published By: IBM     Published Date: Mar 22, 2013
Taking a more comprehensive, unified approach to managing data—recovering any data from a single console—can not only reduce your capital and operating costs, but can also provide enhanced application availability for improved IT service levels.
Tags : 
storage, database, mstorage management, recovery, backup, disaster recovery
    
IBM
Published By: IBM     Published Date: Jun 16, 2009
Increase user productivity and security with a proven single sign-on solution.
Tags : 
esso, ibm, enterprise single sign-on, tivoli identity manager, access manager, enterprise, e-business, sign-on provisioning adapter, command line interface, cli, console, server, connector, smart card, pki, kpi, password, cli, mmdg, swg
    
IBM
Published By: Cisco EMEA     Published Date: Nov 13, 2017
Cisco has recently unveiled its new intent-based networking strategy, called "The Network. Intuitive." The goal of intent-based networking is to allow greater levels of automation, security integration, and centralized manageability within a software subscription orientation. Intent-based networking is underpinned by Software-Defined Access (SDA), Cisco's automation engine built upon the company's Digital Network Architecture (DNA), which automates network segmentation, policy enforcement, and troubleshooting. Other core components of the announcement include a refresh of Cisco Catalyst switches, a new licensing model for infrastructure, and an all-in-one management console called DNA Center.
Tags : 
centralized operations, management, intelligent systems, multi vendor support, cloud, cisco
    
Cisco EMEA
Start   Previous   1 2 3    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.