RSS feed Get our RSS feed

News by Topic

user access control

Results 1 - 25 of 46Sort Results By: Published Date | Title | Company Name
By: Acronis EMEA     Published Date: May 19, 2015
This paper provides information on how Acronis Access Advanced enables enterprise IT to provide their users using any device to securely access, sync and share corporate content while maintaining control over security and compliance.
Tags : security, security content, mobile enterprise, mobility, acronis, acronis access advanced, security access, compliance
     Acronis EMEA
By: Aruba Networks     Published Date: Nov 15, 2013
Microsoft Lync is not only changing the cost structure of enterprise telephony, but also ushering in a new user experience in which every communication is transformed into a more collaborative, engaging interaction.
Tags : just media, aruba networks, deploying lync, mobile devices, microsoft lync, cost structure, user experience, engaging interaction
     Aruba Networks
By: Aruba Networks     Published Date: Nov 15, 2013
L’application Microsoft Lync modifie en profondeur la structure des coûts de la téléphonie d’entreprise et plonge l’utilisateur dans une nouvelle expérience où chaque communication devient plus captivante et plus conviviale. Voici 10 conseils pour garantir le bon fonctionnement de Lync sur les appareils mobiles de votre réseau.
Tags : just media, aruba networks, deploying lync, mobile devices, microsoft lync, cost structure, user experience, engaging interaction
     Aruba Networks
By: Aruba Networks     Published Date: Nov 15, 2013
Microsoft Lync optimiert nicht nur die Kostenstruktur für die Unternehmenstelefonie, sondern schafft auch ein völlig neues Benutzererlebnis, fördert den Austausch und stärkt die Zusammenarbeit im Unternehmen. Um die Vorteile von Lync umfassend ausschöpfen zu können, muss die zugrunde liegende Infrastruktur optimal genutzt werden. Da die Zahl an Laptops, Smartphones und Tablets langfristig die Zahl der Desktops übertreffen wird, benötigen Unternehmen sichere und zuverlässige Wireless-Infrastrukturen. Mit nur geringem Aufwand können Sie die Qualität und die Zuverlässigkeit multimedialer Kommunikation in Ihrem WiFi-Netzwerk verbessern. Wir haben die Top-10-Tipps für Sie, wie Sie von den Vorteilen von Lync auf mobilen Endgeräten in Ihrem Netzwerk profitieren können…
Tags : just media, aruba networks, deploying lync, mobile devices, microsoft lync, cost structure, user experience, engaging interaction
     Aruba Networks
By: Aruba Networks     Published Date: Nov 15, 2013
Microsoft Lync está cambiando la estructura de costes en la telefonía empresarial y está marcando una nueva experiencia para sus usuarios en la cual cada comunicación se convierte en una interacción cada vez más colaborativa y atractiva. Aquí tiene 10 consejos para asegurarse de que Lync funciona bien en los dispositivos móviles en la red. Microsoft Lync no sólo está cambiando la estructura de costes en la telefonía empresarial sino que, además, está marcando una nueva experiencia para sus usuarios en la cual cada comunicación se convierte en una interacción cada vez más colaborativa y atractiva.
Tags : just media, aruba networks, deploying lync, mobile devices, microsoft lync, cost structure, user experience, engaging interaction
     Aruba Networks
By: Aruba Networks     Published Date: Nov 15, 2013
Microsoft Lync cambia la struttura dei costi della telefonia aziendale e apre la strada ad una nuova esperienza per il cliente, in cui ogni comunicazione si trasforma in un'interazione più collaborativa e coinvolgente. Ecco 10 consigli per garantire il corretto funzionamento di Lync sui dispositivi mobili della vostra rete.
Tags : just media, aruba networks, deploying lync, mobile devices, microsoft lync, cost structure, user experience, engaging interaction
     Aruba Networks
By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
     CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
     CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
     CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
     CA Technologies
By: CA Technologies     Published Date: Jun 01, 2018
Challenge Businesses today must reduce the risk of security breaches to protect the valuable data within their organizations. At the same time, IT auditors are increasingly enforcing ever more stringent requirements on the business. The bottom line is that privileged accounts and privileged access are being targeted by hackers as a new attack surface and focused on by auditors who are insisting on greater controls around privileged accounts. Opportunity The right privileged access management solution provides comprehensive protection for your missioncritical servers with powerful, fine-grained controls over operating system-level access and privileged user actions. Capable of enforcing access controls on powerful native Superuser accounts—like the UNIX® and Linux® root and Microsoft® Windows® administrator—this system-level, host-based privileged access management solution controls, monitors and audits privileged user activity, improving security and simplifying audit and compliance. B
Tags : 
     CA Technologies
By: CA Technologies EMEA     Published Date: Sep 14, 2018
The misuse or takeover of privileged accounts constitutes the most common source of breaches today. CA Threat Analytics for PAM provides a continuous, intelligent monitoring capability that helps enterprises detect and stop hackers and malicious insiders before they cause damage. The software integrates a powerful set of user behavior analytics and machine learning algorithms with the trusted controls provided by CA Privileged Access Manager (CA PAM). The result is a solution that continuously analyzes the activity of individual users, accurately detects malicious and high-risk activities and automatically triggers mitigating controls to limit damage to the enterprise.
Tags : 
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Sep 14, 2018
Data security risk caused by third parties is a pervasive problem. Yet, many organizations granting remote privileged access to third-party users leave gaps that represent significant security risks. If you’re like most organizations today, you frequently grant vendors, contractors and other non-staff members access to internal networks and systems. These privileged users remotely administer your operating systems, databases or applications using their own endpoint devices. Download the eBook to learn the five best practices to control security risk brought on by third parties.
Tags : 
     CA Technologies EMEA
By: CDW     Published Date: Oct 10, 2013
A team approach and careful consideration of operational and security issues will pave the way for effective guidance. The drivers are many, but big draws include the potential for greater productivity — giving people anywhere, anytime access to information via devices they’re comfortable with.
Tags : mobile device policy, mobile data policy, mobility goals, byod, user profile, device security, mobile applications, app availability
     CDW
By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Your users, especially when working outside of the office, no longer need to always connect to the corporate network to get work done. They often connect directly to SaaS apps. And, let’s face it, employees also don’t turn on the VPN if they’re using their work laptop for personal use — which means they’re left with very little security protection. Plus, many organizations are now using direct internet connections at branch offices, which means employees and guest users don’t get the protection of your traditional security stack. Not only are more offices connecting directly to the internet — it’s estimated that 70% of branch offices already have some direct internet access — but attackers recognize these weak points in their targets and have started exploiting them more. To solve these new challenges, security controls must also shift to the cloud. This in-depth white paper describes how security must evolve to protect users anywhere they access the internet.
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
The average company uses more than 50 security vendors. Firewalls, Web proxies, SIEM, Appliances & Third-party intelligence. The list goes on — and sometimes you still find your stack coming up short when it comes to securing users anywhere they access the internet. Strengthening your security stack doesn’t mean a massive overhaul or a loss of customization and control. Check out these 6 ways to amplify and extend your stack with cloud security from Cisco Umbrella.
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
"Cloud applications provide scale and cost benefits over legacy on-premises solutions. With more users going direct-to-internet from any device, the risk increases when users bypass security controls. We can help you reduce this risk across all of your cloud and on-premises applications with a zero-trust strategy that validates devices and domains, not just user credentials. See why thousands of customers rely on Duo and Cisco Umbrella to reduce the risks of data breaches and improve security. Don’t miss this best-practices discussion focused on the key role DNS and access control play in your zero-trust security strategy. Attendees will learn how to: ? Reduce the risk of phishing attacks and compromised credentials ? Improve speed-to-security across all your cloud applications ? Extend security on and off-network without sacrificing usability"
Tags : 
     Cisco Umbrella EMEA
By: Citrix Systems     Published Date: Jul 25, 2016
For many enterprises, the solution is a centralized single sign-on (SSO) infrastructure that leverages the enterprise directory with federation, multifactor authentication and centralized access control to give users one URL and login to access all their enterprise applications and services--without having to type in another URL or enter credentials a second time. At the same time, it provides IT with a single identity, access control and management infrastructure, closing the inevitable security and management gaps inherent in juggling multiple gateway solutions. Such a solution would offer the best of all worlds, combining enhanced user productivity with IT efficiency, cost effectiveness, security and compliance.
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Feb 14, 2019
"Now that 72.3% of cloud users have a mix of on-prem/off-prem clouds, the networking game has changed. Traditional app delivery solutions can’t ensure reliable, secure access in a SaaS, multi-device, hybrid, and multi-cloud world.  Get this solution brief to learn why a holistic strategy innately reduces complexities that otherwise would prohitib visibility and control in distributed architectures. The brief also explains: - The Citrix Networking approach to delivering reliability and a high-quality experience - How to ensure reliable access to apps at branch and remote locations while keeping costs low - How to provide full visibility and analytics for your network, applications, users, and data"
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Jun 04, 2019
As companies scale, they add solutions leaving employees having to deal with multiple gateways or access points to get to their applications, apps, and data. It creates a poor user experience, slows productivity, and opens organizations to security risks. With Citrix Workspace, IT is able to simplify connections with remote access while maintaining security and control. Download our e-book and find out how we can: Provide users with one access point and single sign-on (SSO) Ensure secure access to apps in the data center, cloud, or delivered as SaaS applications across any device Help IT reduce complexity and meet compliance and security policies
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Jun 04, 2019
Now that 72.3% of cloud users have a mix of on-prem/off-prem clouds, the networking game has changed. Traditional app delivery solutions can’t ensure reliable, secure access in a SaaS, multi-device, hybrid, and multi-cloud world. Get this solution brief to learn why a holistic strategy innately reduces complexities that otherwise would prohibit visibility and control in distributed architectures. The brief also explains: The Citrix Networking approach to delivering reliability and a high-quality experience How to ensure reliable access to apps at branch and remote locations while keeping costs low How to provide full visibility and analytics for your network, applications, users, and data
Tags : 
     Citrix Systems
By: Dell EMC & Intel     Published Date: Mar 16, 2018
Today’s businesses are rapidly transforming to prepare for the changes taking place in the global economy. Companies of all sizes can benefit from tools that automate the deployment and ongoing maintenance of server environments. Put another way, in today’s digital economy, where users need access to intelligible data faster, IT organizations must employ tools that automate the delivery of IT as a Service (ITaaS). Dell EMC’s Intelligent Automation simplifies the management and maintenance of its PowerEdge server hardware. Designed to drive down the cost and resources associated with server lifecycle management, Intelligent Automation relies on integrated Dell Remote Access Controller(iDRAC) and OpenManage server management software to deliver reliable and efficient automation to PowerEdge Servers. Intel Inside®. New Possibilities Outside.
Tags : 
     Dell EMC & Intel
By: Dell EMC & Intel     Published Date: Apr 13, 2018
Today’s businesses are rapidly transforming to prepare for the changes taking place in the global economy. Companies of all sizes can benefit from tools that automate the deployment and ongoing maintenance of server environments. Put another way, in today’s digital economy, where users need access to intelligible data faster, IT organizations must employ tools that automate the delivery of IT as a Service (ITaaS). Dell EMC’s Intelligent Automation powered by Intel® Xeon® Platinum processor simplifies the management and maintenance of its PowerEdge server hardware. Designed to drive down the cost and resources associated with server lifecycle management, Intelligent Automation relies on integrated Dell Remote Access Controller(iDRAC) and OpenManage server management software to deliver reliable and efficient automation to PowerEdge Servers. Intel Inside®. New Possibilities Outside.
Tags : 
     Dell EMC & Intel
By: Dell EMC & Intel     Published Date: Apr 13, 2018
Today’s businesses are rapidly transforming to prepare for the changes taking place in the global economy. Companies of all sizes can benefit from tools that automate the deployment and ongoing maintenance of server environments. Put another way, in today’s digital economy, where users need access to intelligible data faster, IT organizations must employ tools that automate the delivery of IT as a Service (ITaaS). Dell EMC’s Intelligent Automation powered by Intel® Xeon® Platinum processor simplifies the management and maintenance of its PowerEdge server hardware. Designed to drive down the cost and resources associated with server lifecycle management, Intelligent Automation relies on integrated Dell Remote Access Controller(iDRAC) and OpenManage server management software to deliver reliable and efficient automation to PowerEdge Servers. Intel Inside®. New Possibilities Outside.
Tags : 
     Dell EMC & Intel
By: Dell Software     Published Date: Jul 24, 2012
Quest Workspacetm Privilege Manager lets IT administrators grant selected privileges to users so they can update their own PCs, reducing help desk calls while maintaining a secure network. Elevate and manage user rights quickly and precisely with our Validation Logic targeting technology. Use privilege elevation rules from the Privilege Authority Community Edition, or create your own rules and allow administrator-level access to only the applications, Windows processes and ActiveX controls you deem safe.
Tags : user access, network security, verify files, elevate activex, setup.exe, setup.msi, elevate applications, target workstations
     Dell Software
Previous   1 2    Next    
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics