RSS feed Get our RSS feed

News by Topic

control

Results 2151 - 2175 of 2260Sort Results By: Published Date | Title | Company Name
By: NETIQ     Published Date: Sep 09, 2013
As your business users consume software-as-a-service applications, they are introducing new risks to your organization. Why settle for a solution that’s incomplete, unsecure and requires manual intervention— when what the business really needs is a complete, secure and automated solution?
Tags : cloud computing, access control, saas, software-as-a-service, security, compliance, user access management, security risks
     NETIQ
By: Juniper Networks     Published Date: Sep 10, 2014
Discover how a dynamic, intelligent firewall can improve your security with our Webinar. Learn about the dynamic, intelligent protection and active defense and management of resources you can get from a Next-Generation Firewall.
Tags : next generation firewall, intelligent firewall, security, intelligent protection, active defense, active management
     Juniper Networks
By: BMC Software     Published Date: May 28, 2014
See what analyst 451 Research has to say about Control-M and how it is continuing to modernize with the addition of Workload Change Manager, which aims to make creating and verifying batch jobs and workflows easier for developers.
Tags : 
     BMC Software
By: Thawte     Published Date: Dec 29, 2015
This guide provides five simple steps for IT professionals to take control of SSL certificates across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these certificates throughout their lifecycle.
Tags : 
     Thawte
By: IBM     Published Date: Sep 10, 2013
There is no fail-safe in today's digital world. Incidents will occur, both unintentional and malicious. To mitigate damage and organizational impact, the agile organization will respond quickly. To mitigate risks before damage occurs, an organization can maintain a continuous high state of security, ensure that all computing endpoints are in compliance, automate actions to shorten response time and enact measures to control infections with quarantine and until remediation is complete. Read this whitepaper to learn how IBM Endpoint Manager helps organizations respond quickly to today's threats.
Tags : proactive response, ibm, advanced persistent threats, agile organization, compliance, computing endpoints, digital world, endpoint management
     IBM
By: Oracle     Published Date: Jul 05, 2017
The fast-evolving digital landscape is changing the game for all organizations. The way we consume content, conduct research, consume video and music, and drive efficiency in our work environment is raising the bar for digital experience. Organizations that rely on the internet to reach customers and drive revenue increasingly turn to cloud-based infrastructure and content delivery networks (CDNs) to achieve the reach and global footprint needed to keep up with customer demands. Delivering these services with high availability and performance across an unpredictable internet over which you have very little visibility and control is a major challenge.
Tags : it infrastructure, operations professionals, digital experience, time to resolution, cloud, dns
     Oracle
By: IBM     Published Date: Jan 09, 2014
For IT personnel looking to manage cross-platform workloads, IBM VMControl can provide an advanced solution. Read the white paper and learn why this technology beats the competition in terms of automated provisioning, systems integration and resource pooling. Also see how this environment offers advanced image management and higher resilience.
Tags : vmware, ibm, virtualization, director vmcontrol, clabby analytics, platform virtualization, system director, multi-platform
     IBM
By: IBM     Published Date: Jan 09, 2014
IBM Systems Director 6.3 has just been released. Read the white paper and see how this new revision can improve usability with a more logical interface, as well as simplify installation for the program and associated plug-ins. Also learn how its extended functionality enhances control over physical systems, virtualized resources and storage devices.
Tags : system director 6.3, system director, virtual machine, installability functionality, energy management, ibm systems, ibm
     IBM
By: IBM     Published Date: Apr 22, 2014
Read this ebook from Aberdeen to learn why leading organizations are moving away from the chaos of multiple methods to a single managed file transfer platform, and get best practices for developing a secure, best-in-class file transfer process of your own. 
Tags : ibm, file transfer, mft, ftp, managed file transfer, mature file transfer process, mft platform, content management
     IBM
By: Cisco     Published Date: Aug 27, 2015
Learn how IoT can help you improve business efficiency, control intelligence from a wide range of equipment, enhance operations, and increase customer satisfaction.
Tags : iot, internet of things, data management, business efficiency, manufacturing process, customer satisfaction, business intelligence, automation
     Cisco
By: Cisco     Published Date: Sep 15, 2015
In a recent Enterprise Strategy Group (ESG) paper1, senior analyst Mark Bowker listed several requirements and best practices for building a private cloud. High levels of availability and scalability, policy-based automation and application control, workload portability, and unified visibility and management across infrastructures and applications were all cited as desirable attributes.
Tags : enterprise, policy-based, infrastructure, cloud, visibility, scalability
     Cisco
By: Dyn     Published Date: Mar 30, 2016
New cloud-based Internet performance management (IPM) services are changing the way organizations monitor, control and optimize their online infrastructures. They fill the gap APM and NPM tools leave behind by providing valuable insights into the dynamics of the Internet so you can make better informed network planning and partnering decisions. The results, you deliver a consistent and reliable customer experience, protecting your brand and your revenue.
Tags : dyn, cloud, ipm, apm, npm
     Dyn
By: Dyn     Published Date: Mar 30, 2016
Most organizations today are moving at least some of their infrastructure to the cloud. A cloud or hybrid cloud approach often requires constant monitoring, planning, testing and optimizing to keep a consistent, reliable, always available web experience. Read this O’Reilly report to learn the latest rules and recommendations to architecting your cloud instance, debunk the common fears to cloud adoption and discover how to gain back control in areas you didn’t realize you could.
Tags : dyn, cloud, performance optimization, cdn, rum
     Dyn
By: NAVEX Global     Published Date: Jan 11, 2018
Il est essentiel de connaître les étapes permettant à votre entreprise d’être attentive à la corruption. Une entreprise dont les politiques, la formation et le risque posé par les tiers en matière de lutte contre la corruption sont cohérents permet à ses employés d’identifier, de signaler et finalement d’éradiquer la corruption. Nos spécialistes peuvent vous aider à faire face aux grands défis posés par la corruption et à mieux protéger votre entreprise. Contactez-nous pour planifier une consultation dès aujourd’hui à l'adresse suivante : info@navexglobal.com.
Tags : politiques, l'evaluation, risques, mesures, correctives, formation, communication, culture
     NAVEX Global
By: FireEye     Published Date: Feb 28, 2014
Organizations need much more than fundamental security tools. Do you know why? Learn more in this whitepaper.
Tags : fireeye, gartner research, cyber attacks, security posture, system exploitation, advanced attacks, malware download, control established
     FireEye
By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the way in which enterprise mobility has both increased employee productivity and decreased the security of corporate networks. The paper discusses the challenges IT managers have with controlling the "Bring Your Own Device" (BYOD) trend to allow mobile users to have access to the corporate network. Explained in the paper is the limit to visibility and control of file transfers when employees use ad hoc methods, and that educating employees on proper data access is not enough to protect the corporate network. The paper concludes by describing how Globalscape's EFT™ and Tappin™ can provide mobile access, without compromising security and controls over file sharing.
Tags : mobile, mobile access, remote access, byod, smartphones, tablets, laptops, ad hoc
     Globalscape
By: EMC     Published Date: Dec 16, 2014
In this White Paper, IDC examines the evolution of storage controllers, from traditional HDD controllers to "hybrid array" (i.e., traditional storage arrays that can accommodate flash drives) controllers capable of optimizing flash media and multi- core CPUs.
Tags : flash, mcx, idc, emc, storage
     EMC
By: AlienVault     Published Date: Aug 11, 2015
This webinar talks about common browser vulnerabilities used to execute attacks, what attackers do next to take control of the system, and how to catch it before the attacker moves further into your network
Tags : end-user protection, cyberattacks, browser vulnerabilities, security management, modern threats, threat sharing, security products, firewall
     AlienVault
By: AlienVault     Published Date: Jul 22, 2016
you’ll learn five steps to implement and maintain PCI DSS compliance at your organization by: Determining your true business requirements Inventorying locations and assets Segmenting environments Operationalizing controls Automating controls and control reporting Demonstrating compliance with PCI DSS is far from a trivial exercise.
Tags : 
     AlienVault
By: Intel Security     Published Date: Oct 20, 2015
Companies are well aware of the benefits of virtualization and cloud computing, but many are reluctant to embrace the public clould because they don't have a way to assess and ensure security. This 36 page report highlights some of the many ways that security technologies and services - from silicon to sign-on are evolving to provide the visibility and control needed to deploy workloads flexibility in the evolving datacenter, which spans both private and public clouds.
Tags : aberddeen, data center, datacenter, cloud, server security
     Intel Security
By: Workforce Software     Published Date: Nov 23, 2015
Download this complimentary white paper to learn how automated scheduling can reduce overtime costs related to: Unpopular shifts Peak vacation times Unplanned absences Unavailability
Tags : overtime pay, scheduling automation, peak vacation times, absences, employee scheduling, overtime
     Workforce Software
By: Great Bay Software     Published Date: Jan 04, 2018
IoT device capabilities are constantly evolving and enterprise adoption is increasing at a rapid pace. As adoption grows, these connected devices provide additional entry points for external threats, thus broadening the organizations' attack surface. The enterprise must now look for solutions to address an increasingly complex problem: how to detect, monitor and control unmanaged devices that are connecting to the network and may lack consistent security protocols, putting critical business data at risk.
Tags : iot, iot security, iot endpoint security
     Great Bay Software
By: Great Bay Software     Published Date: Jan 09, 2019
"Only 51% of device makers follow guidance from the FDA to mitigate or reduce inherent security risks. See how hospitals can harness the benefits of connected medical devices to achieve operational efficiencies, provide better patient care and reduce the overall risk to patient safety. Watch this on-demand webinar to discover: • Emerging issues and trends that are risky to healthcare IT systems and can directly affect patient safety, violate their trust and impact revenue • Best practices for shoring up network security blind spots with real-time asset inventory, network authentication and automated enforcement controls • Why real-time endpoint visibility is the key to achieving an effective and proactive cybersecurity strategy"
Tags : 
     Great Bay Software
By: NetApp     Published Date: Mar 05, 2018
NetApp® Data Fabric enabled solutions empower organizations to use data to make intelligent decisions about how to optimize their business and get the most out of their IT infrastructure. They provide essential data services for data visibility and insight, data access and control, and data protection and security. 
Tags : netapp, database performance, flash storage, data management, cost challenges
     NetApp
By: NetApp     Published Date: Mar 05, 2018
Read the ebook Hybrid Cloud & Data Fabric for Dummies to learn how a Data Fabric can ease data management challenges within a hybrid cloud and help you maximize the control of your data – from anywhere at any time.
Tags : netapp, database performance, flash storage, data management, cost challenges
     NetApp
Start   Previous    77 78 79 80 81 82 83 84 85 86 87 88 89 90 91    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics