RSS feed Get our RSS feed

News by Topic

control

Results 2001 - 2025 of 2259Sort Results By: Published Date | Title | Company Name
By: Netwrix     Published Date: Oct 10, 2007
This white paper covers account lockout management process and introduces new cost-effective workflows of account lockout resolution, describing significant ROI enterprises can achieve through the use of automated management solutions.
Tags : authentication, account lockout, access control, network security, lockout, user lockout, user authentication, user validation
     Netwrix
By: Netwrix     Published Date: Apr 22, 2008
At the end of an academic year, many thousands of students may permanently leave a school or university system. Once these users graduate, discontinue their education, or perhaps simply move away, IT administrators are left with a huge number of accounts that must be marked as inactive and then dealt with according to system policies.
Tags : netwrix, graduate, graduation, education, college, university, school, inactive accounts
     Netwrix
By: Netwrix     Published Date: Apr 22, 2008
Windows’ newest technology, the User Account Control, found in the Vista operating system has been erroneously called an additional level of security by many computer security professionals. Instead, in the hope to reduce the incidence of malware, unauthorized software installation, and unintentional system changes the User Account Control separates standard user tasks from requiring administrator level password access.
Tags : vista, windows vista, microsoft, microsoft vista, netwrix, security breach, access control, user access control
     Netwrix
By: Netwrix     Published Date: Aug 01, 2013
Netwrix Auditor takes a holistic approach to IT infrastructure auditing, providing the visibility, intelligence, security and control you need to keep your business up and running, minimize troubleshooting, meet regulatory compliance standards and make sure your critical IT assets are secure - and stay that way
Tags : netwrix, free trial, netwrix auditor, it infrastructure, configuration, it systems, configuration auditing, active directory auditing
     Netwrix
By: WiChorus     Published Date: Oct 12, 2007
Wireless technologies are migrating from complex hierarchical voice-oriented architectures to flatter, low latency, all-IP based designs – reducing cost and complexity for service providers while efficiently supporting real time IP services. Coupled with this trend is the migration to higher performance OFDMA air links with MIMO and AAS, providing much greater bandwidth with improved interference characteristics.
Tags : wimax, access controller, asn-gw, gateway, base station, ofdma, edge router, farpoint group
     WiChorus
By: WiChorus     Published Date: Nov 05, 2007
Rising demand for multimedia applications and mobile usage requires new paradigm to shift voice-oriented cellular architecture into data-oriented networks in order to serve bandwidth hungry packet based applications which include but not limited to multimedia gaming, mobiTV, streaming media, P2P, etc. Data oriented network requires 20-fold fatter air link and backhaul as compared to typical voice communication.
Tags : wimax, access controller, asn-gw, gateway, base station, ofdma, edge router, farpoint group
     WiChorus
By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
At the Defcon security conference on August 2007, a hacker and Defcon staffer who goes by the name Zac Franken, showed how a small homemade device he calls "Gecko", which can perform a hack on the type of access card readers used on office doors throughout the country.
Tags : security, security management, access control, identity management, iam, authentication, wiegand, tracking
     Borer Data Systems Ltd.
By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
Purchase price alone is not an accurate measure as to the true costs of a system. When evaluating the products offered by different vendors, the purchaser should take into consideration: purchase cost of equipment and software; cost of installing the infrastructure including data cable and mains power outlet and power cables; cost of installation; cost of maintenance; and more.
Tags : energy, power, energy conservation, cost, cost of operation, tco, total cost of ownership, power management
     Borer Data Systems Ltd.
By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
Swiping a card to gain access to a company building is now a perfectly accepted feature of everyday corporate life. Over the years, we have all grown familiar with the routine and the advantages it brings to access control. But where cards were once used exclusively to open doors, controlling who went where and when in a building, now they can be used for a wide variety of extra functions.
Tags : security, security management, access control, identity management, iam, authentication, tracking, workforce
     Borer Data Systems Ltd.
By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
Developed by Borer in conjunction with AND-Group, the CruSafe software and hardware system provides a state-of-the-art safety system specifically developed to address the key requirement for real-time tracking of personnel. AND CruSafe is a state-of-the-art safety system which has been specifically developed to address the key requirement for real-time tracking of personnel (often known as POB- Personnel On Board). CruSafe has already been proven to reduce muster times by 70%.
Tags : security, security management, access control, identity management, iam, authentication, crusafe, and-group
     Borer Data Systems Ltd.
By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
Clear Image was awarded a contract to supply and fit CCTV and Access control to NISA, one of the largest picking warehouses in Europe. The company runs 3 shifts per day and wanted to allocate lockers to employees. The simple solution would have been to give each employee a locker, but between Borer and Clear Image, a better solution was devised. Thanks to our technology, we can create one to many relationships between our devices. 
Tags : security, security management, access control, identity management, iam, authentication, nisa, physical security
     Borer Data Systems Ltd.
By: Deep Software     Published Date: Nov 14, 2007
With so much of today's commerce being conducted electronically, providing staff with internet access has become a business necessity. The improper use of e-mail and instant messengers can lead to extremely expensive lawsuits, and the proliferation of mobile devices has made it considerably easier for errant employees to steal sensitive information. This white paper will detail the risks to which organizations that do not monitor their employees are exposed and explain the right way for organizations to go about monitoring.
Tags : security, security management, access control, identity management, data protection, email security, iam, authentication
     Deep Software
By: NetSupport     Published Date: Nov 14, 2007
A majority of organizations do not have efficient ways of keeping track of their IT assets. That opens them up to dangers like system downtime from improperly implemented upgrades, potential licensing violations, poor customer service, overpaying on license fees and improper usage of software and the Internet by employees.
Tags : itam, asset management, spend management, cost savings, cost control, risk management, it management, software compliance
     NetSupport
By: ElcomSoft     Published Date: Dec 06, 2007
These days we’re always hearing about the "information age," "information technology," and how "information rules the world." We have come to feel that information is everything. But what does that mean, and is information in itself so important? Not completely. We need information to make decisions – that's what is truly important. A proper decision lights the way to success in any situation. That's why having access to information is a competitive advantage in any business environment.
Tags : passwords, password, password protected, password management, access control, data protection, information management, elcomsoft
     ElcomSoft
By: ElcomSoft     Published Date: Dec 06, 2007
In order to protect important data, we use a large variety of methods and technologies, especially when the data in question is confidential and essential for day-to-day operations of a business and for making important management decisions. "If you have the information, you own the world" has become the basic tenet of our times, where control over data is of the utmost significance. The loss of access to important data can have a very negative impact on the company’s business.
Tags : password, password management, access control, server access, network management, windows, windows management, user access
     ElcomSoft
By: Tideway Systems     Published Date: Dec 11, 2007
IT service providers need to offer services that deliver new business opportunities whilst increasing levels of availability, controlling risks and reducing costs. This paper provides you with practical guidance based on the practices in ITIL® V3 that will help you manage application and infrastructure changes and configurations.
Tags : service management, itil, change management, configuration management, knowledge management, service strategy, service design, tideway
     Tideway Systems
By: TeraCloud     Published Date: Dec 11, 2007
TSF delivers the first Java-enabled enterprise Storage Resource Management (SRM) solution that simplifies the administration and management of distributed and mainframe storage resources across the entire enterprise, from a single point of control. TSF helps you plan more effectively, lower administration costs, and puts you in control of your storage environment.
Tags : storage, srm, storage resource management, storage management, tsf, tsa, teracloud, teracloud storage
     TeraCloud
By: MessageLabs     Published Date: Jan 13, 2009
Uncontrolled internet use brings web-malware, malicious links and Trojans to the corporate network.  Uncover the web security options available to your business.  Choosing the right solution can be complicated. FREE Web-filtering Buyer’s Guide (PDF/40KB)
Tags : messagelabs, web-filtering, web-filtering buyer’s guide, web-malware, malicious links, trojans, web security solution, security
     MessageLabs
By: Intellitactics     Published Date: Feb 28, 2008
Learn how best-in-class organizations are using controls to lower operating costs, support higher scale, reduce security risks, and maintain consistent policies for security and compliance.
Tags : siem, intellitactics
     Intellitactics
By: Intellitactics     Published Date: Feb 28, 2008
Save time and money by sustaining compliance between audits. Aberdeen Group's Derek Brink describes the benefits that best in class companies achieve by taking steps to sustain compliance.
Tags : compliance, log management, security information management, sim, security event management, sem, siem, network behavior analysis
     Intellitactics
By: Identity Engines     Published Date: Mar 24, 2008
For over a decade now, RADIUS servers have been a mainstay of dial-up and VPN access control. The rather inconspicuous RADIUS server, perhaps better known as that beige, general-purpose PC collecting dust in the corner of your data center, has proved sufficient for performing basic duties like validating passwords and granting network access.
Tags : radius, servers, idengines, id engines, identity engines
     Identity Engines
By: Identity Engines     Published Date: Mar 24, 2008
Guests, contractors, vendors, business partners, and other temporary users require and expect certain level of network access within organizations that they visit. Corporate network access has been typically open; internal LAN connections have seldom required authentication. Today however, regulatory and other security concerns demand that organizations adopt a more secure posture towards these short-term users.
Tags : idengines, id engines, identity engines, access control, authentication
     Identity Engines
By: Oce Business Services     Published Date: Jun 24, 2009
In an economic climate that daily seems to underscore nature's law that only the fittest survive, what are some of the actions companies are taking to stay competitive? The majority of survey respondents indicate that the top two moves they are making include reducing operating expenses (51%) and improving cash flow (20%). More effectively controlling and managing document processes, can help meet these objectives.  This survey report investigates how respondents and their organizations are leveraging five document management activities - internal and outsourced - to reduce costs and reach financial goals.
Tags : dpm, oce, document process management, lifecycle, document risks, cash flow, survey, internal
     Oce Business Services
By: Clickatell     Published Date: May 20, 2008
To attract and retain customers, financial institutions today must be able to provide customers with real-time, reliable information about their bank accounts and transactions, no matter where they are located. Anywhere access to actionable account information helps customers control their finances, fight fraud, and conduct their lives more efficiently.
Tags : clickatell, location based services, mobile marketing
     Clickatell
By: Dynapar Corp.     Published Date: Jun 22, 2008
In most drilling applications encoders are used to provide position and speed feedback for proper control of equipment like top drives and pipe racking systems. However, these electronic devices require special attention when used in hazardous environments such as a drilling platform. In this paper, we discuss ways to make encoders suitable for hazardous duty.
Tags : dynapar, encoder, sensor, motion feedback, product design, engineer, engineering, encoder output
     Dynapar Corp.
Start   Previous    74 75 76 77 78 79 80 81 82 83 84 85 86 87 88    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics