Skip to main content
 

control

Results 226 - 250 of 2131Sort Results By: Published Date | Title | Company Name
Published By: Dell Software     Published Date: May 10, 2013
Active Directory is critical to your IT infrastructure, but, if you’re relying on native tools and PowerShell scripts, it may be costing you much more than you think. Learn about how the right tools can put you back in control, making AD management easy and cost effective.
Tags : 
native tools, powershell scripts
    
Dell Software
Published By: Infoblox     Published Date: Nov 07, 2013
According to the Ponemon Institute, the annual cost of malware breaches averaged $8.4 million. Read this white paper to gain insights into critical information to safeguard against DNS security threats and disrupt malware communications to your DNS servers.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc, infoblox_dnssec, infoblox_dns_security_extension, infoblox_ddos, infoblox_denial_of_service, infoblox_distributed_denial_of_service, dns_security, dns_server, dns_firewall, apt, advanced_persistent_threat, malware, malicious_software
    
Infoblox
Published By: Ariba     Published Date: Oct 07, 2010
Read more about why top organizations of every size, across industries and in every region around the globe use Ariba Solutions and Services to control costs and improve performance.
Tags : 
ariba commerce cloud, trading, business commerce, collaboration, supply chain cost, financial performance
    
Ariba
Published By: Group M_IBM Q119     Published Date: Mar 05, 2019
In this digital world, fast and reliable movement of digital data, including massive sizes over global distances, is becoming vital to business success across virtually every industry. The Transmission Control Protocol (TCP) that has traditionally been the engine of this data movement, however, has inherent bottlenecks in performance (Figure 1), especially for networks with high, round-trip time (RTT) and packet loss, and most pronounced on high-bandwidth networks. It is well understood that these inherent “soft” bottlenecks arcaused by TCP’s AdditiveIncrease-Multiplicative-Decrease (AIMD) congestion avoidance algorithm, which slowly probes the available bandwidth of the network, increasing the transmission rate until packet loss is detected and then exponentially reducing the transmission rate. However, it is less understood that other sources of packet loss, such as losses due to the physical network media, not associated with network congestion equally reduce the transmission rate.
Tags : 
    
Group M_IBM Q119
Published By: Microsoft Dynamics     Published Date: Jul 11, 2007
Until recently, many high-tech manufacturers – especially small and medium-sized businesses – have been able to survive by applying 80% of their operational focus to 20% or less of their critical customers and suppliers. That was then. The new mandate from channel masters is for more intense, collaborative relationships with fewer suppliers.
Tags : 
industry directions, oem, manufacturing, manufacturer, scm, supply chain, ems, electronics manufacturing, productivity, plm, product lifecycle management, cost control, r&d, r & d, enterprise resource, erm, erp, microsoft dynamics
    
Microsoft Dynamics
Published By: NetIQ Corporation     Published Date: Sep 04, 2007
Learn how Secure Configuration Manager can help with compliance requirements in the IT controls areas of entitlement reporting & segregation of duties. Discover how to make your compliance program more sustainable & repeatable, while gaining visibility into sources of vulnerability & risk exposure.
Tags : 
compliance, netiq, net iq, policy management, configuration management, unix, risk management, change management, hipaa, hipaa compliance, vulnerability, vulnerabilities
    
NetIQ Corporation
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
Does your network bandwidth usage align with business goals?  This white paper highlights the challenges of ensuring SaaS application access and performance. It discusses the pros and cons of popular approaches and explains how you can control, prioritize and optimize traffic so that business-critical applications have the performance users need.
Tags : 
network, bandwidth, saas, application, optimize traffic, performance, technology, cloud
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Does your network bandwidth usage align with business goals?  This white paper highlights the challenges of ensuring SaaS application access and performance. It discusses the pros and cons of popular approaches and explains how you can control, prioritize and optimize traffic so that business-critical applications have the performance users need.     
Tags : 
cloud, applications, network, bandwith, saas
    
Blue Coat Systems
Published By: Astaro     Published Date: Aug 10, 2009
The Cisco PIX firewall appliance at Devine Millimet, Attorneys at Law, needed replacement.
Tags : 
astaro, integrated security solution, surfcontrol, pix, cisco, firewall, internet security, devine millimet, failover, ssl, vpn, intrusion, web filtering, anti-malware
    
Astaro
Published By: Digital Realty     Published Date: Feb 25, 2015
Atlantic Health Systems, a nonprofit health care organization had a growing patient base and an evolving IT infrastructure that needed a scalable, flexible data center with world-class operations support that could be set up today to accommodate your needs tomorrow. Find out why they turned to Digital Realty.
Tags : 
data center, infrastructure management, access control, physical security
    
Digital Realty
Published By: Netwrix     Published Date: Apr 22, 2008
At the end of an academic year, many thousands of students may permanently leave a school or university system. Once these users graduate, discontinue their education, or perhaps simply move away, IT administrators are left with a huge number of accounts that must be marked as inactive and then dealt with according to system policies.
Tags : 
netwrix, graduate, graduation, education, college, university, school, inactive accounts, inactive account, password management, identity management, access control
    
Netwrix
Published By: Aomega     Published Date: Nov 06, 2006
Recent regulatory additions require that companies take proactive measures like penetration testing to enforce data privacy and integrity.  By deploying a distributed model companies can execute testing from different security levels which is important in challenging posture based on level of access.
Tags : 
regulatory compliance, compliance, data privacy, pci, data privacy, data protection, access control, security testing, security audit, glba, hipaa compliance, aomega
    
Aomega
Published By: rPath     Published Date: Dec 10, 2010
This white paper introduces rPath intelligent system automation as a way to bring consistency, control and scale to .NET production environments. In particular, it describes three scenarios for using rPath within .NET environments.
Tags : 
rpath, automation, sccm
    
rPath
Published By: Tidal Software     Published Date: Sep 03, 2008
Businesses can gain greater value from their BI investment by improving the way in which data flows to the BI system are managed. Many problems result when the ETL process is handled by a patchwork of scripting, custom coding, and various built-in schedulers that are part of existing ETL solutions, because these systems do not provide end-to-end execution, monitoring, and control of the ETL process.
Tags : 
business intelligence, data warehousing, data management, data integration, etl, extract–transform-load, bi operations, bi management, informatica, cognos, ibm datastage, sas, business objects, crystal enterprise, tidal, tidal software
    
Tidal Software
Published By: Esker     Published Date: Jan 06, 2014
How to Bring Speed, Visibility and Accuracy to Every Phase of Order Processing
Tags : 
esker, fax and email, automation, erp systems, electronic data interchange, automation solutions, cost savings, process efficiencies, electronic processing, visibility control, order-to-cash cycle, order management
    
Esker
Published By: Tripwire     Published Date: Jun 30, 2009
Learn how Tripwire can help you deploy a comprehensive configuration assessment and control solution that: a) reduces the time and resources required to verify compliance and prepare for audits; and b) maintains continuous compliance by allowing IT to immediately identify any exceptions and trigger remediation of configurations that do not conform to policy.
Tags : 
tripwire, automate, fisma, compliance, configuration, assessment, solution, audit, policy, electronic systems, infrastructure, security, management, control, documentation
    
Tripwire
Published By: Qualys     Published Date: Apr 05, 2011
This guide explains how QualysGuard PC automates the "C" in GRCM by automatically scanning all assets, collecting operating system configuration and application access controls, mapping these to IT policy, and documenting compliance.
Tags : 
it data collection, it compliance, grcm controls, qualys, qualysguard pc, gcc, automated general computer control, legacy, it risk, policy editor, saas
    
Qualys
Published By: Qualys     Published Date: Nov 05, 2013
The SANS 20 Critical Security Controls are known for driving effective security programs across government agencies, establishing guidelines for security professionals to ensure the confidentiality, integrity and availability of information technology assets. This paper describes how automating these controls using QualysGuard can protect your organization with continuous security while drastically lowering costs.
Tags : 
automation, cyber security, critical controls, malware defense, application software security, data recovery, compliance applications, qualysguard
    
Qualys
Published By: Qualys     Published Date: Feb 17, 2016
It’s not easy being today’s CISO or CIO. With the advent of cloud computing, Shadow IT, and mobility, the risk surface area for enterprises has increased dramatically, while IT budgets have shrunk and skilled cyber security talent is virtually impossible to find. Thankfully, the CIS Top 20 Critical Controls provides a pragmatic approach, offering prioritized guidance on the important steps for implementing basic cyber hygiene practices. With the CIS Top 20 Critical Security Controls, CISOs now have a blueprint for reducing risk and managing compliance. By automating each of these controls, CISOs enable their information security teams to do much more with less, essentially operationalizing good cyber hygiene.
Tags : 
qualys, cis, critical security, cloud computing, cyber security
    
Qualys
Published By: Qualys     Published Date: Jan 11, 2017
It’s not easy being today’s CISO or CIO. With the advent of cloud computing, Shadow IT, and mobility, the risk surface area for enterprises has increased dramatically, while IT budgets have shrunk and skilled cyber security talent is virtually impossible to find.
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys
Published By: Schneider Electric     Published Date: Nov 21, 2017
When effectively applied in a cement plant, automation and control technologies can significantly reduce energy expenses, while helping to increase production and reduce waste.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, cement, cement plant
    
Schneider Electric
Published By: VMware     Published Date: Nov 04, 2016
This 11-page whitepaper discusses the agility needs of today’s business, how IT is choosing a hybrid cloud approach to meet demand, and how hybrid cloud brings more agility but also increases management complexity in an environment that encompasses traditional architectures, private clouds, and public clouds. The paper outlines the role of a cloud management platform with vRealize® Suite for enabling faster and secure provisioning with monitoring and policy-driven controls. It highlights the 3 use cases (Intelligent Ops, Automated IT to Iaas, DevOps-Ready IT), the need for Day 1 and Day 2 capabilities, and how vRealize Suite helps automate IT.
Tags : 
    
VMware
Published By: Plex Systems     Published Date: Feb 21, 2014
No more upgrades and patches. Plex Cloud ERP replaced more than a dozen separate systems for preventive maintenance, production, gages, problem controls & reporting. And Plex is completely integrated.
Tags : 
cloud, plex, erp, cloud computing, manufacturing, management, best practices, productivity, high level production
    
Plex Systems
Published By: Aventail     Published Date: Aug 21, 2009
Today's office is now anywhere that a user can get an Internet connection, a PC on a business partner's network, a handheld at a WiFi hotspot, an airport kiosk, or a computer on a home WiFi network. But secure access is not the only driving business factor remote access must be easy to use and administer as well.
Tags : 
secure remote access, remote access, wireless security, secure wifi, wifi security, wi-fi security, wifi, wi-fi, ssl, vpn, secure access, aventail
    
Aventail
Published By: IBM     Published Date: Apr 09, 2015
IBM Security Privileged Identity Manager helps organizations to securely manage and track the activities of privileged users, thereby reducing the risk of breaches, improving compliance and ensuring accountability. The IBM white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.
Tags : 
ibm, user access, enhanced security, security risk
    
IBM
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.