RSS feed Get our RSS feed

News by Topic

ca technologies

Results 126 - 150 of 1780Sort Results By: Published Date | Title | Company Name
By: Brother     Published Date: Nov 23, 2015
The Center for Digital Education (CDE) surveyed over 130 K-12 decision-makers on the classroom use of printer and scanner technologies in September 2014 and found scanning materials for digital use in the classroom is a key concern, with ease of use, cost containment and flexible deployment among the most critical needs. In the context of this study, this white paper will build a case for the use of scanners to revolutionize K-12 teaching, learning and administration.
Tags : scanners, brother, scanning solution, digital learning, touchscreen, education technology
     Brother
By: CA Mainframe     Published Date: Sep 12, 2008
Increased regulatory scrutiny on the protection levels afforded sensitive information by those that transact and process it is causing enterprises to improve mainframe security strategies. This entails proactively investigating exposures and implementing appropriate policies, processes and technologies, including those for data z/OS tape encryption. Read this Technology Brief created by CA to learn how to identify exposure points and through the use of Tape Encryption.
Tags : tape library, tape backup, tape encryption, backup, encryption, best practices, ca mainframe, mainframe
     CA Mainframe
By: CA Mainframe     Published Date: Sep 12, 2008
The CA Performance Management Handbook for DB2 for z/OS by renowned tuning experts Susan Lawson and Dan Luksetich of YL&A covers information to enhance your skills and raise awareness for databases performance management issues and tuning strategies. This supplement to the CA Performance Management Handbook provides specific information on which technologies apply to which issues and how CA Database Management addresses your most pressing database performance management challenges.
Tags : ca mainframe, mainframe, apm, application performance management
     CA Mainframe
By: CA Service Assurance     Published Date: May 23, 2011
IDG Research Services recently conducted a study via the CIO Forum on LinkedIn. The results found that CIOs and IT leaders recognize the business impact of web application performance. It's all about the end user: ensuring customer satisfaction, increasing employee productivity, and lowering IT costs.
Tags : web application performance, cio, end user, idg research services, linkedin, it leaders, ca technologies, customer satisfaction
     CA Service Assurance
By: CA Service Assurance     Published Date: Sep 16, 2010
CA Technologies Newsletter featuring Gartner Research. This publication, enhanced by Gartner research, reveals how to take a proactive IT approach which ensures visibility and control during the adoption of virtualization and cloud environments.
Tags : apm, application performance, ca technologies, service delivery, application delivery, user experience, gartner, business services
     CA Service Assurance
By: CA Tech     Published Date: Jan 04, 2016
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of CA APM on their organisations.
Tags : application performance management, apm, ca technologies, finance, roi, ca apm, customer experience, reduce costs
     CA Tech
By: CA Technologies     Published Date: Jul 06, 2011
The concept of cloud computing implies that the cloud computing platform is "mist" - ethereal and simple. In reality, it requires a complex infrastructure and sophisticated processes to make the illusion a reality
Tags : cloud-computing. ca, cloud, private-cloud, cloud computing, white paper, whitepaper, whitepapers, white papers
     CA Technologies
By: CA Technologies     Published Date: Jul 06, 2011
Written by Malcolm Fry, this whitepaper is based on the service life cycle approach to service management and it provides a great foundation to organisations who want to reduce risk and gain maximum benefit from cloud computing.
Tags : ca. service management, it service management, cloud-computing, cloud, servicedesk, itsm, private-cloud, cloud computing
     CA Technologies
By: CA Technologies     Published Date: Sep 29, 2011
Organizations must confront the reality that insider attacks are a significant threat and increasing in complexity. Given that so much of an organization's assets and information are online and accessible, organizations must take a proactive approach to defending against the insider attack. This proactive attack should involve a range of solutions that address identity and access management and information protection. Nothing can completely prevent all insider attacks, but those who adopt an aggressive proactive approach can help reduce risk, improve compliance, and enable the IT organization to better support business initiatives.
Tags : risk, attack, security, business
     CA Technologies
By: CA Technologies     Published Date: Sep 29, 2011
CA Content-Aware IAM helps you respond to the key IT drivers above. It helps to automate identity-based security processes (such as user provisioning, entitlement certification, etc.), which increases efficiency and reduces IT costs.
Tags : technology, drivers, security, reduce risk, applications, online service, business, confidentiality
     CA Technologies
By: CA Technologies     Published Date: Sep 29, 2011
The identity and access management challenges that exist in the physical world - identity management, application security, access control, managing sensitive data, user activity logging, and compliance reporting - are even more critical in the virtual environments that are growing in use as IT seeks to streamline its operations and reduce operating costs. However, security risks are increased due to the nature of the virtualization environment and IT should seek to extend their security solutions from the physical server environment to the virtualization environment as seamlessly as possible. Continue reading this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Tags : technology, virtual, identity management, access control, security, protection
     CA Technologies
By: CA Technologies     Published Date: Dec 27, 2011
In this executive Q&A, Cloud Luminary and DonorsChoose.org CTO Oliver Hurst-Hiller discusses the importance of being able to seamlessly and quickly switch to a cloud service, the benefits of having all aspects of your company moved to the cloud, and more.
Tags : cloud, technology, donors choose, cloud computing, cloud service, data management
     CA Technologies
By: CA Technologies     Published Date: Dec 27, 2011
The study finds that enterprises are active in the cloud, and their virtualization efforts are contributing to broader "cloud thinking." As a result, the cloud is coming of age within large organizations and aligning IT decision makers and implementers around a cloud computing platform.
Tags : technology, cloud, cloud computing, ca technologies, data management, data center
     CA Technologies
By: CA Technologies     Published Date: Dec 27, 2011
In this executive Q&A, Cloud Luminary and PGi CTO David Guthrie discusses how the cloud computing platform helped his company scale up immediately by getting his applications running efficiently in a matter of days, rather than months.
Tags : ca technologies, cloud computing, applications, computing platform, technology
     CA Technologies
By: CA Technologies     Published Date: Dec 27, 2011
In this executive Q&A, Cloud Accelerator and Bird Hosting CEO Michael Wallace discusses how a turn-key private cloud platform has transformed his business, how Bird Hosting has improved its environmental footprint, and more.
Tags : ca technologies, cloud computing, bird hosting, data management
     CA Technologies
By: CA Technologies     Published Date: Dec 27, 2011
This whitepaper looks at the need for IT to develop a new model for communicating with the business, how IT dollars are being spent, and how unnecessary IT costs can be avoided.
Tags : ca technologies, technology, applications, costs, business services
     CA Technologies
By: CA Technologies     Published Date: Jan 06, 2014
As most European organisations open up their applications for external users, Identity Access Management (IAM) is becoming ever more critical to drive business growth.
Tags : mediacom, byoid, identity access management, iam, business growth, directories of identities, it professionals, external business users
     CA Technologies
By: CA Technologies     Published Date: Jan 06, 2014
Why should organizations take insider threats seriously? Because the stakes have never been higher, especially given the value enterprises place on intellectual capital and trade secrets.
Tags : mediacom, insider threats, substantial threats, bladley manning, edward snowden, malicious insiders, exploited insiders, sensitive information
     CA Technologies
By: CA Technologies     Published Date: Jan 06, 2014
This report presents new research into the use and benefits of IAM and the relationship it has with these three drivers. The research is based on over three hundred interviews with senior IT managers in medium sized to large organisations in a range of business sectors across Europe. The report should be of interest to anyone wanting to better serve all types of users, whilst still keeping control over applications and data.
Tags : mediacom, digital identities, open business, business growth, access management, identity management, iam, open interaction
     CA Technologies
By: CA Technologies     Published Date: Jan 06, 2014
This report examines the issues around the adoption of cloud-based services and looks at the security technology that is being deployed by enthusiasts and why the avoiders are holding back.
Tags : mediacom, cloud-based services, adopt the cloud, security of data, effective security, security technology, sensitive data, cloud avoiders
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.
Tags : ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
     CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics