Skip to main content
 

control

Results 76 - 100 of 2227Sort Results By: Published Date | Title | Company Name
Published By: Gigamon     Published Date: Oct 19, 2017
Register for the Enterprise Strategy Group’s Research Insights Paper, Understanding the State of Network Security Today to learn more about the challenges, changes, best practices and solution requirements for network security operations and tools. See why ESG recommends improving network visibility and reducing security vulnerabilities by consolidating tools through a platform-based approach to visibility in which data, analytics and reports from multiple tools are aggregated and consumed in one control panel. Download to learn more.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Oct 19, 2017
The IDC Technology Spotlight, The Growing Need for New Technology and a Business Model in Network Monitoring, examines the stresses in today's mobile network planning and operations requiring a new model that incorporates a realistic approach toward cloudification. The paper also looks at the Gigamon solution for visibility in today’s mobile network, which facilitates efforts toward cloudification. This architecture provides maximum, centralized control to the mobile operator’s network planning and operations teams. Read to learn more.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Oct 25, 2017
Read Gartner’s research note, Top 10 Strategic Technology Trends for 2017: Adaptive Security Architecture, to improve visibility and control over your organization’s exposure to risk with a continuous, contextual and coordinated approach to security. Comprehensive protection now requires an adaptive process to predict, prevent, detect and respond to security breaches that includes DevSecOps, IoT Security, and Intelligent Security. This note walks you through key planning assumptions, analysis, best practices and specific recommendations.
Tags : 
    
Gigamon
Published By: Dell EMC & Intel     Published Date: Mar 16, 2018
Today’s businesses are rapidly transforming to prepare for the changes taking place in the global economy. Companies of all sizes can benefit from tools that automate the deployment and ongoing maintenance of server environments. Put another way, in today’s digital economy, where users need access to intelligible data faster, IT organizations must employ tools that automate the delivery of IT as a Service (ITaaS). Dell EMC’s Intelligent Automation simplifies the management and maintenance of its PowerEdge server hardware. Designed to drive down the cost and resources associated with server lifecycle management, Intelligent Automation relies on integrated Dell Remote Access Controller(iDRAC) and OpenManage server management software to deliver reliable and efficient automation to PowerEdge Servers. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: Dell EMC & Intel     Published Date: Mar 16, 2018
A new industrial revolution is barreling ahead, fueled by the Internet of Everything, social media, and cloud computing - bringing about fundamental changes in the way that we live and act. CIOs today are in a unique position to utilize technology to create business value and opportunity. This requires a careful balance of the traditional skills of the CIO, managing the data center infrastructure while driving business strategy and impacting the customer experience. The Dell EMC PowerEdge server systems are the CIO’s key tools in this transformation. They are the bedrock of the modern data center – providing scalable system architectures that ensures control of the IT lifecycle while delivering a cyber-resilient environment. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: Dome9     Published Date: Apr 25, 2018
AWS provides powerful controls to manage the security of software-defined infrastructure and cloud workloads, including virtual networks for segmentation, DDoS mitigation, data encryption, and identity and access control. Because AWS enables rapid and elastic scalability, the key to securing cloud environments is using security automation and orchestration to effectively implement consistent protection across your AWS environment. The following eBook will discuss Dome9 best practices for using AWS controls to establish a strict security posture that addresses your unique business needs, and maintaining consistency across regions, accounts, and Virtual Private Clouds (VPCs) as your environment grows.
Tags : 
    
Dome9
Published By: insightsoftware     Published Date: Oct 19, 2018
Today, organizations are squeezing their finance and accounting functions like never before. Expectations are at an all-time high, yet resources are increasingly scarce. They must maintain controls, compliance, and keep up with complex accounting rules — all while meeting business demands for faster turnaround and lower costs.
Tags : 
    
insightsoftware
Published By: Preempt     Published Date: Nov 02, 2018
In our 2018 Trends in Information Security report, we outlined a concept we referred to as the ‘identity-aware perimeter.’ The essential idea is that as new architectures such as cloud, containers, mobility and IoT take hold, controlling access to resources will increasingly need to rely on identity as an alternative to purely network-based approaches focused more on ‘where’ you are than ‘who’ you are. By combining identity with user and entity behavior and risk scoring to gate access, Preempt fits squarely within this trend, which we think could be one of the most interesting and powerful to hit the infosec market in years. Preempt has few direct competitors, and its initial challenge will be finding ways to distinguish itself from vendors in adjacent categories such as adaptive multi-factor authentication (MFA), advanced threat protection, user and entity behavior analytics (UEBA) and cloud access security brokers (CASB), to name a few. Forging a new security category is never easy,
Tags : 
    
Preempt
Published By: Preempt     Published Date: Nov 02, 2018
Attackers and malware are increasingly relying on a common set of tools to compromise identities and spread within a network. Tools like Mimikatz accompanied with common administrator tools like PsExec and WMI have become a standard part of an attacker’s arsenal to turn a single machine compromise into a full network breach. In this webinar we will take a look at why some of these tools are traditionally difficult to control, and introduce new countermeasures that let you fight back. In this webinar we will cover: - An analysis of recent malware and attacks and the tools they used to spread through the network. - A closer look at the underlying protocols supporting these tools, and the traditional challenges to controlling them. - Introduce new controls that allow organizations to control NTLM in real-time, block pass-the-hash techniques, and adaptively control the use of NTLM in the network. - How to gain visibility into PsExec, WMI, and RPC in general and how to create controls t
Tags : 
    
Preempt
Published By: Dell EMC EMEA     Published Date: Nov 26, 2018
In December 2017, Dell commissioned Forrester Consulting to conduct a study to determine how enterprise organizations are structured from an IT departmental perspective. The study explored two types of IT: digital controllers and digital transformers; and the trends and challenges seen in PC provisioning. Digital controllers are often associated with top-down approach, linear structure, and emphasize security and accuracy. In contrast, digital transformers focus on innovation, employee-and customer-centricity, and prioritize speed and flexibility. By understanding the two groups, enterprises can overcome challenges that arise from PC life-cycle management. By investing in existing PC management tools and partnering with a company that specializes in PC deployment and management, firms can empower employees to better serve customers Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Nov 26, 2018
Im Dezember 2017 beauftragte Dell Forrester Consulting mit der Durchführung einer Fortsetzungsstudie, in der ermittelt werdensollte, wie die IT-Abteilungen von Unternehmen strukturiert sind. In der Studie wurden zwei Arten von IT-Konzepten untersucht: Digital Controller und Digital Transformer. Außerdem beleuchtete die Studie Trends und Herausforderungen, die die Vertreter beider Konzepte bei der PC-Bereitstellung sehen. Mit Digital Controllern assoziiert man häufig einen Top-down-Ansatz und eine lineare Struktur. Sie messen Sicherheit und Genauigkeit hohe Bedeutung bei. Digital Transformer hingegen legen den Schwerpunkt auf Innovationen sowie Mitarbeiter-und Kundenorientierung; für sie stehen Geschwindigkeit und Flexibilität an erster Stelle. Wenn Unternehmen mehr Verständnis für die Vertreter beider Ansätze entwickeln, können sie mit Problemen im Zusammenhang mit dem PC-Lifecycle-Management besser umgehen. Durch Investitionen in bestehende PC-Management-Tools und die Zusammenarbeit m
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
As diverse organizations seek to implement data-driven strategies, the personal computer in all its varieties remains the key workforce productivity tool. IT leaders must guide PC management across the entire PC lifecycle to enable users to work most effectively. Today, IT leaders address the PC lifecycle across a continuum from control to transformation. Control is geared to optimization, while transformation focuses on the business impact of technology. Download this white paper to learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
In un contesto in cui diverse organizzazioni cercano di implementare strategie basate sui dati, il personal computer in tutte le sue varietà rimane lo strumento chiave per la produttività della forza lavoro. I leader IT devono guidare la gestione dei PC attraverso l'intero ciclo di vita dei PC per consentire agli utenti di lavorare nel modo più efficace. Oggi, i leader IT affrontano il ciclo di vita dei PC attraverso un continuum che va dal controllo alla trasformazione. Il controllo è orientato all'ottimizzazione, mentre la trasformazione si concentra sull'impatto aziendale della tecnologia. Scarica questo white paper per ulteriori informazioni sulle soluzioni Dell con tecnologia Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Mar 29, 2019
En diciembre de 2017, Dell encargó a Forrester Consulting que elaborara un estudio para determinar cómo se estructuraban las organizaciones empresariales desde la perspectiva de los departamentos de TI. El estudio exploró dos tipos de organizaciones de TI, los controladores digitales y los transformadores digitales, y las tendencias y los retos del aprovisionamiento de los PC. A menudo, los controladores digitales se asocian con el enfoque en sentido descendente y la estructura lineal, y enfatizan la seguridad y la precisión. Por el contrario, los transformadores digitales se enfocan en la innovación y en la centralidad de los empleados y los clientes, y priorizan la velocidad y la flexibilidad. Mediante la comprensión de los dos grupos, las empresas pueden superar los retos que surgen de la gestión del ciclo de vida de los PC. Al invertir en las herramientas de gestión de PC existentes y asociarse con una empresa especializada en la implementación y la gestión de ordenadores, las comp
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Mar 29, 2019
Mientras las diversas organizaciones buscan implementar estrategias impulsadas por los datos, el ordenador personal en todas sus variantes sigue siendo la herramienta de productividad clave para el personal. Los líderes de TI deben orientar la gestión de los PC durante todo su ciclo de vida para que los usuarios trabajen de la manera más eficaz. En la actualidad, los líderes de TI abordan el ciclo de vida de los PC en un ciclo continuo, desde el control hasta la transformación. El control está orientado hacia la optimización, mientras que la transformación se centra en el impacto de la tecnología en el negocio. Descargue este documento técnico para obtener más información acerca de las soluciones Dell con tecnología Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: May 08, 2019
Im Dezember 2017 beauftragte Dell Forrester Consulting mit der Durchführung einer Fortsetzungsstudie, in der ermittelt werdensollte, wie die IT-Abteilungen von Unternehmen strukturiert sind. In der Studie wurden zwei Arten von IT-Konzepten untersucht: Digital Controller und Digital Transformer. Außerdem beleuchtete die Studie Trends und Herausforderungen, die die Vertreter beider Konzepte bei der PC-Bereitstellung sehen. Mit Digital Controllern assoziiert man häufig einen Top-down-Ansatz und eine lineare Struktur. Sie messen Sicherheit und Genauigkeit hohe Bedeutung bei. Digital Transformer hingegen legen den Schwerpunkt auf Innovationen sowie Mitarbeiter-und Kundenorientierung; für sie stehen Geschwindigkeit und Flexibilität an erster Stelle. Wenn Unternehmen mehr Verständnis für die Vertreter beider Ansätze entwickeln, können sie mit Problemen im Zusammenhang mit dem PC-Lifecycle-Management besser umgehen. Durch Investitionen in bestehende PC-Management-Tools und die Zusammenarbeit m
Tags : 
    
Dell EMC EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Companies are increasingly moving data and applications to public cloud platforms. Sometimes these transitions happen with IT’s approval and guidance; sometimes they don’t. Regardless, a company that stores data and uses applications in multiple public clouds creates a challenging environment for the security architect. It’s difficult to gain visibility and control of the security posture when the organization relies on an assortment of disparate cloud platforms that all take different approaches to security and offer different tools. And it’s hard for a small security staff to stay on top of disparate solutions that fail to integrate.
Tags : 
    
Fortinet EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Endpoint devices continue to be one of the favorite targets for cyberattacks. A successfully compromised laptop provides a foothold for a threat to move laterally and infect other endpoints within the organization. To address this critical vulnerability, security leaders must integrate endpoint security into their broader network security architecture. A deep connection between endpoint and network security offers key improvements to holistic enterprise protection. It provides risk-based visibility of all endpoint devices, establishes policy-based access controls, enables real-time threat intelligence sharing, and automates security responses and workflows for effective and efficient protection that conserves time and money.
Tags : 
    
Fortinet EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
If your organization is one of the 95% of enterprises that operate in the cloud, you are already grappling with cloud security. And if your organization is one of the 85% of companies that use multiple Infrastructureas-a-Service (IaaS) and Software-as-a-Service (SaaS) clouds, you have additional issues to consider. Compared to the days when organizations managed everything on-premises or only had a handful of cloud deployments, this new multi-cloud world exacerbates the expansion of the attack surface and makes threat containment and accountability more difficult. Further, pressure on security teams to protect everything in the multi-cloud environment is leading to reactive and expensive threat management. If you are a security leader tasked with meeting the challenges of a multi-cloud environment, eventually you’ll find that siloed cloud security strategies fall short of the mark. But don’t wait. Now is the time to consider a holistic security approach that reclaims control from dispa
Tags : 
    
Fortinet EMEA
Published By: Unit4     Published Date: Feb 18, 2019
Want to help your project teams hit revenue and margin targets? And keep hitting them? The top five percent of professional services organizations (PSOs) are growing faster, earning more revenue, and reaping higher project profits than their competitors. All because of greater real-time visibility and control over their project plans, schedules, costs, and budgets. Download this eGuide to learn how to drive the efficiencies and repeatable processes market leaders rely on.
Tags : 
professional services organizations, erp, enterprise resource planning, projects
    
Unit4
Published By: Unit4     Published Date: Feb 18, 2019
Trying to meet evolving donor expectations? Ensure optimum use of funding? Neither is possible if you’re underestimating your direct and indirect overhead costs. Learn four steps to true cost allocation for not-for-profit organizations, and the accountability and transparency benefits a modern cost allocation system can deliver.
Tags : 
nonprofit, ngo, erp, cost allocation, financial control
    
Unit4
Published By: Unit4     Published Date: Feb 18, 2019
Are you under pressure from donors to improve transparency and accountability? Your non-profit can't maintain full financial control over your operations if you don't have access to the right insight. Discover the best methods for building trust with your donors, and key strategies for empowering greater financial control, transparency, and accountability.
Tags : 
nonprofit, ngo, erp, financial transparency, accountability, social impact
    
Unit4
Published By: Unit4     Published Date: Feb 18, 2019
Are you under pressure from donors to improve transparency and accountability? Your non-profit can't maintain full financial control over your operations if you don't have access to the right insight. Discover the best methods for building trust with your donors, and key strategies for empowering greater financial control, transparency, and accountability.
Tags : 
    
Unit4
Published By: 3D Systems     Published Date: Mar 07, 2019
To stay competitive, manufacturers have to meet the rapidly changing needs of customers while retaining high quality products, at the same time as controlling costs. Product lifetimes are shrinking and customers are expecting more customization and innovation. Agility is the key to staying ahead of the competition and meeting the needs of customers. The FabPro 1000 entry-level industrial 3D printer delivers production-grade parts, at high speed, with six sigma repeatability, and can be used across a distributed manufacturing and engineering enterprise. With a low cost of entry, FabPro 1000 enables agile manufacturing operations to meet customer needs rapidly and effectively empowers engineers to deliver more value and quality in the product development process. To find out more download this whitepaper today!
Tags : 
    
3D Systems
Published By: Lenovo UK     Published Date: May 15, 2019
L'aumento della mobilità sta causando mal di testa a tutti i team IT, con potenziali aumenti di costi e rischi. Ma con ThinkPad basato su processori Intel® Core™ i7 vPro™, ottieni sicurezza a 360, durata affidabile e produttività senza compromessi in tutti i dispositivi. Scopri di più nel nostro white paper. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, il logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, il logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside e Intel Optane sono marchi di Intel Corporation o di società controllate da Intel negli Stati Uniti e/o in altri Paesi.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, sicurezza, produttività, mobilità, lenovo x1, mobilità della forza lavoro
    
Lenovo UK
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.