Skip to main content
 

central control

Results 1 - 25 of 54Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Nov 07, 2013
Honda uses Adobe Social to effectively engage European fans of cars, motorcycles, robots, jets, and other inventive products through a single, coordinated effort
Tags : 
adobe, honda motor, social media, brand governance, aodbe social, inventive products, coordinated effort, social communities, targeted experiences, using resources effectively, coordinate marketing campaigns, social media management platform, localized apps, international blockade, global campaign coordination, social analytics, local marketers, digital marketing, targeting publishing, social media quality
    
Adobe
Published By: Avalere     Published Date: Apr 02, 2007
Sensitive documents, files and intellectual property are extracted from a central repository such as a database, records management system, or document management system to complete daily tasks, however, extracting this information can lead to a security breach.  Avalere provides the tools you need to control the proliferation of sensitive information throughout your organization.
Tags : 
security, security management, database admin, dba, records management, database management, document management, data security, document security, avalere
    
Avalere
Published By: Aviatrix     Published Date: Jun 11, 2018
Once you've designed and secured your Global Transit Network, are you done? Are you ready to hand day-to-day responsibility over to an operations team? Or, are there other elements you need to ensure that the day-to-day operation of your transit hub is efficient and effective? As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, demonstrate the best practices they've gleaned from working with operations teams, all who require: • Visibility: Do you have a way to centrally view your network, see performance bottlenecks, control security policies, and set other configuration details? • Deep Analytics: Can you easily gather performance and audit data and export it to Splunk, DataDog, or other advanced reporting tools? • Monitoring and Troubleshooting: Do you have a real-time view of network health, and how easily can you access the data needed to locate and fix issues? • Alert Management: When issues do occur, what r
Tags : 
aws, aws vpc, aws global transit network, aws transit vpc, cisco csr, csr 1000v
    
Aviatrix
Published By: Avocent     Published Date: Aug 22, 2011
Download this whitepaper to learn how to achieve secure access to any server or network device from a single interface.
Tags : 
avocent, centralized management software, best practices, data center control, secure access, remote maintenance, kvm server management, full remote access, power management
    
Avocent
Published By: Bitium     Published Date: Dec 09, 2013
As enterprises large and small shift their information to the cloud, an explosion of SaaS tools are making it easier than ever for employees to collaborate and innovate. Much of this sharing is being done across time zones and physical locations, by workers who are telecommuting, working in shared or public spaces, and from open networks. Information is stored on central, third-party servers that are accessible across the company and the world by anyone with an internet connection. As a result, online security is increasingly being pushed to the forefront as a major corporate expense. Yet, 89% of the global information workforce lack clarity on how security applies to the cloud. “Data is suddenly everywhere, and so are the number of people, access points and administrators who can control – or worse, copy – the data." Please download the white paper to learn more.
Tags : 
single sign on, sso, identity as a service, idaas, access and identity management, identity access management, password management, password manager
    
Bitium
Published By: CA Technologies     Published Date: Apr 06, 2017
CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network devices and applications.
Tags : 
security information, security management, event management, system security, system management, risk management, security infrastructure, it infrastructure, privilege management, system authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network devices and applications.
Tags : 
    
CA Technologies
Published By: CA WA     Published Date: May 12, 2008
CA Workload Automation brings a central point of control and visibility to help assure efficient, reliable and secure business process management. It enables business workload design across platforms and operating systems, offering advanced monitoring and automated responses to changes and exceptions.
Tags : 
web services, bpm, business process, ca wa, workload automation
    
CA WA
Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the compelling business and technical case for centralizing administration in Microsoft's Active Directory, using Centrify's DirectControl to extend Active Directory authentication and access control to your UNIX, Linux and Mac OS systems and applications, and using Centrify's DirectAudit to log user activity to provide you a clear picture of end user actions on all UNIX and Linux systems.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance, pci, pci dss, payment card industry, cross-platform, auditing, logging, security, rbac, entitlements, privilege management, least access, unix
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the challenges of migrating NIS deployments to a central repository, and explains in detail how a combination of Microsoft Active Directory and Centrify DirectControl can deliver a cost-effective solution that strengthens security while improving IT efficiency.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance, cross-platform, auditing, logging, security, rbac, entitlements, privilege management, least access, unix, linux, mac, nis
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Nov 12, 2014
Centrify provides Red Hat Linux integration with Active Directory. The Centrify Suite centrally secures and manages Red Hat Linux systems — along with 450 other versions of Linux and Unix — by integrating them with your existing Microsoft Active Directory services. Centrify provides Active Directory Group Policy-based configuration to control the security settings of Red Hat systems and provides IT with the benefit of leveraging a familiar tool. Learn more about why you need Centrify for Red Hat.
Tags : 
security, management, integration, it benefits, configuration
    
Centrify Corporation
Published By: Cisco     Published Date: Jan 05, 2015
The Cisco UCS solution provides all management and configuration services at the centrally located Fabric Interconnects, so you can manage large-scale deployments from a single location. This method lets you consolidate hardware and streamline management. The IBM Flex System solution uses a distributed management model with chassis-level control. This method adds to the complexity to the hardware configuration, which can increase management needs.
Tags : 
datacenter, data management, collaborations, business capabilities
    
Cisco
Published By: Cisco     Published Date: Feb 13, 2015
The Enterprise Strategy Group (ESG) characterizes traditional security tactics as a "messy independent array of independent technologies." A decade ago, this could suffice, but it's no match for today's requirements. Read how an integrated, threat-focused approach can help.
Tags : 
network security, enterprise organizations, security threats, security architecture, central command, central control, firewall, distributed enforcement, integrated actionable intelligence
    
Cisco
Published By: Cisco and NVIDIA Corporation     Published Date: Sep 18, 2019
Soar to new heights with the Citrix® virtualization solution for Microsoft® Teams! Centralize control. Ramp-up Security. Maximize investments. This infographic will give you the data and details on the many benefits of optimizing your Microsoft Teams with Citrix virtualization.
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Citrix Systems     Published Date: Sep 17, 2015
Citrix XenApp delivers Windows apps as secure mobile services. With XenApp, IT can mobilize the business - increasing user productivity, while reducing costs by centralizing control and security of intellectual property.
Tags : 
citrix, xenapp, security, windows, app virtualization
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 25, 2016
For many enterprises, the solution is a centralized single sign-on (SSO) infrastructure that leverages the enterprise directory with federation, multifactor authentication and centralized access control to give users one URL and login to access all their enterprise applications and services--without having to type in another URL or enter credentials a second time. At the same time, it provides IT with a single identity, access control and management infrastructure, closing the inevitable security and management gaps inherent in juggling multiple gateway solutions. Such a solution would offer the best of all worlds, combining enhanced user productivity with IT efficiency, cost effectiveness, security and compliance.
Tags : 
    
Citrix Systems
Published By: Dassault Systèmes     Published Date: Aug 08, 2017
Learn how Dassault Systèmes Program Management solutions can help Aerospace and Aviation companies reliably execute on their proposed plans to meet their design, cost and schedule targets. Read this whitepaper and gain insights into new practices in four key areas: • Consolidate all program data in one central data repository to use institutional knowledge and improve design analysis and decision support • Data reuse between organizations to avoid duplicate efforts and misunderstandings • Real-time reporting automation of key data to assess program performance and anticipate risks and opportunities • Program control with real-time, up-to-date, detailed and verifiable information while preserving program and partner IP
Tags : 
dassault, systemes, program management, aerospace and aviation, program data, automation
    
Dassault Systèmes
Published By: DataSynapse     Published Date: Feb 26, 2007
This brief examines how application virtualization can compress the development and test cycle, accelerating time-to-market, while reducing risk and complexity.  This brief highlights the impact of centralized command and control of application deployment and execution.
Tags : 
software development, quality assurance, software testing, return on investment, project management, data synapse, datasynapse
    
DataSynapse
Published By: DataSynapse     Published Date: Feb 26, 2007
This technical white paper reviews the principal tenets of application virtualization; freeing application configurations from OS and infrastructure; gaining centralized command and control over system resources; and dynamically allocating resources to applications based on demand. 
Tags : 
infrastructure, interoperability, load balancing, utility computing, business continuity, enterprise applications, application integration, data synapse, datasynapse
    
DataSynapse
Published By: EMC     Published Date: Apr 18, 2013
See how RSA Archer Risk Management enables you to proactively address risks to your organization with a central GRC management system for identifying risks, evaluating their impact, relating them to mitigating controls, and tracking their resolution.
Tags : 
risk assessment, risk management, it infrastructure, governance, tracking resolution, compliance, grc
    
EMC
Published By: Gigamon     Published Date: Oct 19, 2017
The IDC Technology Spotlight, The Growing Need for New Technology and a Business Model in Network Monitoring, examines the stresses in today's mobile network planning and operations requiring a new model that incorporates a realistic approach toward cloudification. The paper also looks at the Gigamon solution for visibility in today’s mobile network, which facilitates efforts toward cloudification. This architecture provides maximum, centralized control to the mobile operator’s network planning and operations teams. Read to learn more.
Tags : 
    
Gigamon
Published By: Group M_IBM Q3'19     Published Date: Aug 20, 2019
Data Security Portfolio Vendors, Q2 2019, is a key industry report for helping security and risk professionals understand and assess the data security solution landscape, and how these solutions can address their business and technology challenges.Download the report to learn why Forrester believes IBM Security Guardium is a good fit “for buyers seeking to centrally reduce and manage data risks across disparate database environments”.The IBM Security Guardium portfolio empowers organizations to meet critical data security needs by delivering comprehensive visibility, actionable insights and real-time controls throughout the data protection journey.
Tags : 
    
Group M_IBM Q3'19
Published By: Group M_IBM Q4'19     Published Date: Sep 25, 2019
• Simplify business process modeling: Quickly build processes in a straightforward cloud-based interface designed for both IT and business users • Improve process efficiency and accuracy: A central process repository eliminates version control and consistency issues by providing users real-time access to process workflows • Enhance cross-team collaboration: A shared team workspace engages all business process owners, encouraging cross-team participation and continuous process improvement
Tags : 
    
Group M_IBM Q4'19
Start   Previous   1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.