RSS feed Get our RSS feed

News by Topic

control

Results 176 - 200 of 2209Sort Results By: Published Date | Title | Company Name
By: Prophix     Published Date: May 31, 2016
The continual changes in the business climate constantly challenge companies to find more effective business practices. However, common budgeting limitations are preventing companies from moving forward; they have become so universal and accepted in the marketplace that it is becoming more difficult to move ahead and progress the business. Flexibility, accuracy and control over the budgeting process are three prominent factors slowing this progression.
Tags : best practices, budgeting, business efficiency, productivity, competitive advantage
     Prophix
By: Riverbed     Published Date: Jul 17, 2013
How to effectively troubleshoot your VDI deployment Virtual desktop infrastructure has come a long way since the first steps were taken a decade ago to run desktop workloads in the data center. While more pervasive today, VDI technologies are latency-sensitive, and wholly dependent on the network. Complaints of poor end-user experience persist, especially over the WAN at branch offices where bandwidth constraints and latency delays are common. But there is a way to ensure consistent and reliable VDI performance to deliver: Reduced downtime Faster troubleshooting Improved SLAs Enhanced planning and control Read this brief to learn how the Riverbed® Cascade® application-aware network performance management (NPM) solution unlocks VDI visibility.
Tags : virtual desktop, infrastructure, deployments, cascade, riverbed
     Riverbed
By: Workforce Software     Published Date: Jun 04, 2015
This paper helps outline some of the ways to control BYOD risks and outlines other factors that influence your decision to establish a BYOD policy. Like Cloud-based software delivery, BYOD presents such compelling advantages over the traditional approach that its emergence as the dominant mobile strategy appears to be a question of “when” rather than “if.”
Tags : workforce software, byod, enterprise applications, mobile strategy, mobile devices
     Workforce Software
By: EMC     Published Date: Oct 13, 2015
This ebook explores the benefits of using EMC Documentum Capital Projects solution
Tags : document control, document management, managing capital projects, sharing and tracking documents
     EMC
By: EMC     Published Date: Oct 13, 2015
MG Group explains their adoption of EMC Documentum Capital Projects to streamline information control and effective management in the world’s largest PET production plant
Tags : emc documentum capital projects, document management, share information, share documents
     EMC
By: Okta     Published Date: Mar 10, 2016
To manage and control how the airport's employees make use of these cloud-computing services, Gatwick has turned to the cloud-based identity management service from Okta, which lets the security manager centrally manage, provision and de-provision single sign-on access to cloud services for Gatwick's staff.
Tags : 
     Okta
By: Puppet     Published Date: Jul 13, 2016
If you’re new to Puppet on Windows, one of the first things you’ll want to do is start managing users and groups. In this webinar, we’ll demonstrate how to manage both local groups and Active Directory membership. The demo will include: - Managing administrator accounts - Managing local groups - Setting up a domain controller - Managing Active Directory membership Puppet can do a lot, but we always recommend starting small and building on your success. Managing users and groups is a great way to get started. Make 2016 the year you banish manual configuration for good!
Tags : 
     Puppet
By: Puppet     Published Date: Mar 09, 2017
Configuration management can play an incredibly important role in IT security due to its basis in establishing and maintaining a known and consistent state of the physical and software elements at your organization’s disposal. This white paper explores how to leverage configuration management to bolster security and meet compliance regulations. Uncover some of the key benefits, including: • Creation of a Standard Operating Environment (SOE) • Reporting on and control of configuration drift • Enhanced change remediation • Insight into configuration knowledge • And more
Tags : 
     Puppet
By: CloudHealth by VMware     Published Date: Apr 15, 2019
Organisations moving to AWS seek improved performance, increased innovation, and a faster time to market—but the road to cloud maturity, and ultimately cloud success, proves both challenging and expensive. Learn to accelerate your AWS cloud journey with: A checklist for determining if you have clear visibility into your AWS environment Expert tips for developing proper cloud security best practices Real examples of financial, performance, and security management policies for automating your cloud ecosystem Looking to optimise your AWS cloud infrastructure? Use this eBook to regain control over your visibility and cost management, security and compliance, and governance and automation.
Tags : 
     CloudHealth by VMware
By: Pure Storage     Published Date: Oct 09, 2018
Oggi la continuità operativa è fondamentale per qualsiasi azienda. Le imprese sono coinvolte in una trasformazione digitale profonda e si rivolgono all’IT per tutte le attività più mission-critical. I tempi di fermo possono arrivare a paralizzare l’intera organizzazione: le aziende più resilienti sono in grado di gestire i guasti tecnologici e fare in modo che l’azienda resti sempre operativa e funzionante. Garantire la business continuity, infatti, significa garantire maggiore vantaggio competitivo, maggiore coinvolgimento dei clienti e maggiore innovazione. Tuttavia, il raggiungimento di una business continuity di alto livello, con Recovery Point Objective (RPO) e Recovery Time Objective (RTO) pari a zero, è tipica delle imprese di grandi dimensioni che, proprio perché grandi, possono sostenere gli investimenti necessari e gestire la complessità associata. Per la maggior parte delle aziende, i costi di una business continuity di alto livello sono sempre risultati eccessivi. Oggi la s
Tags : 
     Pure Storage
By: CA Technologies     Published Date: Sep 25, 2017
Available as a rack-mounted, hardened hardware appliance, an Open Virtualization Format (OVF) Virtual Appliance or an Amazon Machine Instance (AMI), CA Privileged Access Manager enhances security by protecting sensitive administrative credentials, such as root and administrator passwords, controlling privileged user access and proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.
Tags : cloud applications, infrastructure, optimization, automation tools, administrative power, ca technologies
     CA Technologies
By: Tenable     Published Date: Nov 06, 2018
How are your peers securing the expanding attack surface within and beyond the traditional perimeter? Digital transformation is putting pressure on every organizational function – especially IT security. Whether it’s discovering short-lived assets like containers, assessing the state of cloud environments, or maintaining the security of web applications, accurately understanding and reducing cyber risk across your entire attack surface is a growing challenge. To give you perspective and insights into how other InfoSec leaders are addressing this challenge, join us at 2pm ET, March 15, 2018 for “Panel Webinar: Reducing Cyber Exposure from Cloud to Containers.” Tenable has assembled a panel of experts who will share their experiences and respond to your questions. Topics covered will include: Making the attack surface as small as possible Understanding asset priority and location Expanding visibility and control over assets beyond the perimeter Enhancing basic security practices to ac
Tags : 
     Tenable
By: IBM APAC     Published Date: Mar 06, 2019
Achieve superior control and performance across multicloud environments with IBM Multicloud Manager. With a multicloud strategy, it can become time-consuming, expensive and difficult to manage environments as you contend with scattered visibility, security and workloads across multiple Kubernetes clusters and clouds. IBM Multicloud Manager integrates all your environments in a single view that gives you optimal control over how you see, govern and automate everything.
Tags : 
     IBM APAC
By: Juniper Networks     Published Date: Oct 19, 2015
Next-Generation Firewalls Deliver Better Protection Through Application-Aware Security and User Role-Based Controls.
Tags : juniper, firewall, application, security, protection, data, network
     Juniper Networks
By: Workday Nordics     Published Date: Sep 19, 2018
Auditing shouldn’t take your attention away from driving strategy and profitability. With a single cloud-based system for finance, you get compliance, controls, and audit capabilities all in one place. This streamlines the auditing processes and ensures security. Focus on business and let Workday do the rest.
Tags : workday, workday technology, digital strategy, financial auditing
     Workday Nordics
By: Schneider Electric     Published Date: Jun 07, 2019
Un marco independiente con refrigeración adjunta y una infraestructura de soporte lo convierten en una construcción de centro de datos sin problemas. Una vez que se montó el marco, simplemente coloque en un rack y comience a generar ingresos. Este informe técnico explica cómo puede poner en funcionamiento esta tecnología orientada al futuro para su negocio.
Tags : refrigeración, construcción de centro de datos, colocación
     Schneider Electric
By: Schneider Electric     Published Date: Jun 07, 2019
Consideraciones sobre los sistemas de enfriamiento. A medida que los costos de energía y los problemas ambientales ejercen cada vez más presión en los centros de datos, los sistemas de enfriamiento se vuelven el foco para encontrar eficiencias. Se pueden mitigar muchos problemas con un diseño bien planeado. Este informe técnico explica cómo optimizar el enfriamiento de los centros de datos con sistemas de control eficaces. Descargue su copia para aprender más.
Tags : colocación, enfriamiento, de centro de datos
     Schneider Electric
By: Salesforce     Published Date: Dec 29, 2015
Join specialists from Salesforce and PwC to learn how you can improve security and compliance in the cloud by leveraging the core trust services of Salesforce — and the additional controls from the new Salesforce Shield suite of products.
Tags : salesforce, cloud, security, webinar, best practices
     Salesforce
By: Salesforce     Published Date: Jan 15, 2016
Join specialists from Salesforce and PwC to learn how you can improve security and compliance in the cloud by leveraging the core trust services of Salesforce — and the additional controls from the new Salesforce Shield suite of products.
Tags : salesforce, cloud, security, webinar, best practices
     Salesforce
By: Logrhythm     Published Date: Sep 05, 2017
The traditional approach to cybersecurity has been to use a prevention-centric strategy focused on blocking attacks. While prevention-centric approaches do stop many threats, many of today’s advanced and motivated threat actors are circumventing these defences with creative, stealthy, targeted, and persistent attacks that often go undetected for significant periods of time.
Tags : reconnaissance, initial compromise, command control, lateral movement, target attainment, corruption
     Logrhythm
By: Logrhythm     Published Date: Sep 05, 2017
The purpose of this white paper is to show you how you can successfully build a SOC, even with limited resources. The paper first explains the basics of the Cyber Attack Lifecycle and the need to address it through the Threat Lifecycle Management framework. Next, the paper explains the basics of SOCs, providing details of what SOCs mean in terms of people, processes, and technology. Finally, the paper walks you through a methodology for building a SOC with limited resources, focusing on tactics to make your rollout smooth and successful. After reading this paper, you should be ready to start planning your own SOC.
Tags : reconnaissance, initial compromise, command control, lateral movement, target attainment, corruption
     Logrhythm
By: Workday Nordics     Published Date: Feb 27, 2018
This whitepaper looks into Governance, compliance, control, and audit, and how its been traditionally treated as afterthoughts, or even irritants, in the financial modules of classic “big ERP” software. It has been easy and, unfortunately, typical to ignore this topic when planning, building, and evaluating enterprise business software. Control concepts are not as urgent as transaction processing, as visible as financial reporting, or as exciting as analytics so they are almost always an afterthought. Today we can’t afford for governance to be an afterthought, and from day one Workday was built with that in mind.
Tags : 
     Workday Nordics
By: IBM APAC     Published Date: Aug 22, 2017
While working to maintain tactical control of the mobile environment, IT managers often find themselves drowning in minutiae. Overwhelmed by the number of moving parts, they’re unable to stay abreast of the latest threats, let alone extract meaning from or make decisions based on the mountains of data now being collected. With limited IT resources dedicated to mobile technology tools that facilitate reactive rather than proactive management—and limited visibility into mobile intelligence across the organization—many managers have had to choose between security and productivity as the focus of their efforts.
Tags : security risks, it operations, workforce, advisor, mobile security, mobile metrics, cloud based, benchmarking data
     IBM APAC
By: Workday     Published Date: Mar 20, 2019
Current and former finance practitioners share stories of how they met their daily challenges—from managing internal controls and the financial close to onboarding and reporting—with a single cloud-based system for finance. Watch the video.
Tags : finance, workday, workforce technology, digital strategy
     Workday
By: DellEMC and Intel®     Published Date: Jul 05, 2017
Accelera applicazioni e piano di produzione dell'IT con la velocità, l'efficienza e la convenienza delle soluzioni completamente flash di Dell EMC e Intel®. Esamina la linea di array completamente flash e scopri perché Dell EMC è leader nelle soluzioni completamente flash. Processore Intel® Xeon® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, il logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, il logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi e Xeon Inside sono marchi di Intel Corporation o di società controllate da Intel negli Stati Uniti e/o in altri Paesi
Tags : ultrabook, celeron, celeron inside, core inside, intel, il logo intel, intel atom, intel atom inside
     DellEMC and  Intel®
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics