Skip to main content
 

control

Results 251 - 275 of 2322Sort Results By: Published Date | Title | Company Name
Published By: ForeScout     Published Date: Aug 14, 2012
In a BYOD world, companies can choose to secure and manage the entire mobile device user pool or secure portions of that community. Either way, steps must be taken to prevent unauthorized access to network resources and data loss. Enterprises should consider solutions that allow policies to be applied based on user, device, network, application, and data leakage risks.
Tags : 
archetecting, flexible, strategy, for securing, enterprise, bring, device, byod
    
ForeScout
Published By: Dome9     Published Date: Apr 25, 2018
AWS provides powerful controls to manage the security of software-defined infrastructure and cloud workloads, including virtual networks for segmentation, DDoS mitigation, data encryption, and identity and access control. Because AWS enables rapid and elastic scalability, the key to securing cloud environments is using security automation and orchestration to effectively implement consistent protection across your AWS environment. The following eBook will discuss Dome9 best practices for using AWS controls to establish a strict security posture that addresses your unique business needs, and maintaining consistency across regions, accounts, and Virtual Private Clouds (VPCs) as your environment grows.
Tags : 
    
Dome9
Published By: Riverbed     Published Date: Nov 02, 2016
This eBook on hybrid enterprise and performance management talks about the three key challenges of performance management in today's hybrid enterprise: 1) lack of visibility 2) poor performance 3) limited control. It also suggests ways to regain control of the hybrid enterprise.
Tags : 
    
Riverbed
Published By: MasterControl     Published Date: Oct 08, 2019
If you started a business today, how would you set it up?
Tags : 
    
MasterControl
Published By: LogMeIn     Published Date: Feb 27, 2018
LogMeIn offers consistently reliable service to its Bold360 customers and is vigilant in efforts to provide services that are not only robust and scalable, but also secure. This document describes how we achieve reliable scalability and the measures taken by LogMeIn to protect Bold360 customer data.
Tags : 
industry, network, service, operations, scalability, data, encryption
    
LogMeIn
Published By: Aerohive     Published Date: Oct 23, 2014
This analysis is designed to provide potential customers with a comprehensive picture of the direct and indirect costs and benefits they should consider when evaluating Aerohive or any other wireless connectivity solutions.
Tags : 
wireless connectivity, aerohive, controlle-less, benefits of wirelesss connectivity
    
Aerohive
Published By: Cisco EMEA     Published Date: Jun 01, 2018
Digital transformation has arrived, and it’s creating unprecedented opportunities for companies of all sizes to become market leaders through the evolution of business processes and the creation of new products and services. Organizations that master digital transformation will see a dramatic increase in revenues and profitability by converging people, processes and technologies; those that do not will struggle to survive. Evidence of this is clear to see by looking at the churn in the biggest companies in the world. For example, a Capgemini study found that since 2000, 52% of the Fortune 500 has disappeared through acquisitions or bankruptcies. The study also found that digital organizations control 70% of market share in all industries today. Therefore, making the shift to a digital business must be a top initiative for IT and business leaders. Download this whitepaper to see how Cisco has become the Market Share Leader in Online Meetings.
Tags : 
cisco, digital transformation, collabaration
    
Cisco EMEA
Published By: Dell Software     Published Date: May 10, 2013
Active Directory is critical to your IT infrastructure, but, if you’re relying on native tools and PowerShell scripts, it may be costing you much more than you think. Learn about how the right tools can put you back in control, making AD management easy and cost effective.
Tags : 
native tools, powershell scripts
    
Dell Software
Published By: Staples     Published Date: Jun 11, 2019
YOU HEAR, SEE AND FEEL IT ALL AT THE OFFICE: FROM THE INTERN’S ROOMMATE HORROR STORIES TO THE CEO’S TOP SECRET DEALMAKING. YOU’RE A BUSINESS COACH, RELATIONSHIP THERAPIST, GUARDIAN AND CHIEF OF STAFF. YOU’RE GROUND CONTROL. HERE’S HOW TO KEEP THINGS IN CHECK WHEN YOU SEE, HEAR AND FEEL IT ALL.
Tags : 
    
Staples
Published By: Infoblox     Published Date: Nov 07, 2013
According to the Ponemon Institute, the annual cost of malware breaches averaged $8.4 million. Read this white paper to gain insights into critical information to safeguard against DNS security threats and disrupt malware communications to your DNS servers.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox
Published By: Ariba     Published Date: Oct 07, 2010
Read more about why top organizations of every size, across industries and in every region around the globe use Ariba Solutions and Services to control costs and improve performance.
Tags : 
ariba commerce cloud, trading, business commerce, collaboration, supply chain cost, financial performance
    
Ariba
Published By: Group M_IBM Q119     Published Date: Mar 05, 2019
In this digital world, fast and reliable movement of digital data, including massive sizes over global distances, is becoming vital to business success across virtually every industry. The Transmission Control Protocol (TCP) that has traditionally been the engine of this data movement, however, has inherent bottlenecks in performance (Figure 1), especially for networks with high, round-trip time (RTT) and packet loss, and most pronounced on high-bandwidth networks. It is well understood that these inherent “soft” bottlenecks arcaused by TCP’s AdditiveIncrease-Multiplicative-Decrease (AIMD) congestion avoidance algorithm, which slowly probes the available bandwidth of the network, increasing the transmission rate until packet loss is detected and then exponentially reducing the transmission rate. However, it is less understood that other sources of packet loss, such as losses due to the physical network media, not associated with network congestion equally reduce the transmission rate.
Tags : 
    
Group M_IBM Q119
Published By: Microsoft Dynamics     Published Date: Jul 11, 2007
Until recently, many high-tech manufacturers – especially small and medium-sized businesses – have been able to survive by applying 80% of their operational focus to 20% or less of their critical customers and suppliers. That was then. The new mandate from channel masters is for more intense, collaborative relationships with fewer suppliers.
Tags : 
industry directions, oem, manufacturing, manufacturer, scm, supply chain, ems, electronics manufacturing
    
Microsoft Dynamics
Published By: NetIQ Corporation     Published Date: Sep 04, 2007
Learn how Secure Configuration Manager can help with compliance requirements in the IT controls areas of entitlement reporting & segregation of duties. Discover how to make your compliance program more sustainable & repeatable, while gaining visibility into sources of vulnerability & risk exposure.
Tags : 
compliance, netiq, net iq, policy management, configuration management, unix, risk management, change management
    
NetIQ Corporation
Published By: Veeam '18     Published Date: Oct 10, 2019
60% dei dati cloud sensibili è conservato all'interno di documenti Office e per il 75% di questi dati NON viene eseguito un backup! In questo breve e semplice report, gli analisti di 451 Research spiegano perché è importante eseguire il backup dei dati di Office 365. I risultati più importanti includono: I dati di Office 365 sono i nuovi dati aziendali d’importanza critica Il fatto che i dati SaaS siano intrinsecamente sicuri è un luogo comune Ripristini e governance stanno diventando tanto importanti quanto il backup dei dati La protezione dei dati sarà sempre più legata alle problematiche legali e di conformità.
Tags : 
    
Veeam '18
Published By: Veeam '18     Published Date: Oct 10, 2019
60% dei dati cloud sensibili è conservato all'interno di documenti Office e per il 75% di questi dati NON viene eseguito un backup! In questo breve e semplice report, gli analisti di 451 Research spiegano perché è importante eseguire il backup dei dati di Office 365. I risultati più importanti includono: I dati di Office 365 sono i nuovi dati aziendali d’importanza critica Il fatto che i dati SaaS siano intrinsecamente sicuri è un luogo comune Ripristini e governance stanno diventando tanto importanti quanto il backup dei dati La protezione dei dati sarà sempre più legata alle problematiche legali e di conformità.
Tags : 
    
Veeam '18
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
Does your network bandwidth usage align with business goals?  This white paper highlights the challenges of ensuring SaaS application access and performance. It discusses the pros and cons of popular approaches and explains how you can control, prioritize and optimize traffic so that business-critical applications have the performance users need.
Tags : 
network, bandwidth, saas, application, optimize traffic, performance, technology, cloud
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Does your network bandwidth usage align with business goals?  This white paper highlights the challenges of ensuring SaaS application access and performance. It discusses the pros and cons of popular approaches and explains how you can control, prioritize and optimize traffic so that business-critical applications have the performance users need.     
Tags : 
cloud, applications, network, bandwith, saas
    
Blue Coat Systems
Published By: Astaro     Published Date: Aug 10, 2009
The Cisco PIX firewall appliance at Devine Millimet, Attorneys at Law, needed replacement.
Tags : 
astaro, integrated security solution, surfcontrol, pix, cisco, firewall, internet security, devine millimet
    
Astaro
Published By: Digital Realty     Published Date: Feb 25, 2015
Atlantic Health Systems, a nonprofit health care organization had a growing patient base and an evolving IT infrastructure that needed a scalable, flexible data center with world-class operations support that could be set up today to accommodate your needs tomorrow. Find out why they turned to Digital Realty.
Tags : 
data center, infrastructure management, access control, physical security
    
Digital Realty
Published By: Panasonic     Published Date: Apr 23, 2019
Mobility is critical to government productivity, but mobile data and devices present attractive targets to cybercriminals seeking to exploit vulnerabilities across the spectrum. Federal agencies are no strangers to cybersecurity attacks, and several recent high-profile breaches involving mobile devices demonstrate ongoing vulnerabilities in government’s expanding network of endpoints. This issue brief describes what can be done to protect devices, data and networks, including multi-factor authentication to authorization controls and user education.
Tags : 
    
Panasonic
Published By: Netwrix     Published Date: Apr 22, 2008
At the end of an academic year, many thousands of students may permanently leave a school or university system. Once these users graduate, discontinue their education, or perhaps simply move away, IT administrators are left with a huge number of accounts that must be marked as inactive and then dealt with according to system policies.
Tags : 
netwrix, graduate, graduation, education, college, university, school, inactive accounts
    
Netwrix
Published By: Aomega     Published Date: Nov 06, 2006
Recent regulatory additions require that companies take proactive measures like penetration testing to enforce data privacy and integrity.  By deploying a distributed model companies can execute testing from different security levels which is important in challenging posture based on level of access.
Tags : 
regulatory compliance, compliance, data privacy, pci, data privacy, data protection, access control, security testing
    
Aomega
Published By: rPath     Published Date: Dec 10, 2010
This white paper introduces rPath intelligent system automation as a way to bring consistency, control and scale to .NET production environments. In particular, it describes three scenarios for using rPath within .NET environments.
Tags : 
rpath, automation, sccm
    
rPath
Published By: Tidal Software     Published Date: Sep 03, 2008
Businesses can gain greater value from their BI investment by improving the way in which data flows to the BI system are managed. Many problems result when the ETL process is handled by a patchwork of scripting, custom coding, and various built-in schedulers that are part of existing ETL solutions, because these systems do not provide end-to-end execution, monitoring, and control of the ETL process.
Tags : 
business intelligence, data warehousing, data management, data integration, etl, extract–transform-load, bi operations, bi management
    
Tidal Software
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.