HIT Consultant Insightful coverage of healthcare innovation
 

user management

Results 126 - 150 of 366Sort Results By: Published Date | Title | Company Name
Published By: Brainloop     Published Date: Nov 09, 2011
Business users are a key part of a company\'s security, and even the most conscientious employees can introduce serious breaches of security policy. IT can do everything in its power to secure the company\'s confidential documents--provide first-class security infrastructure, develop reasonable security policies and engage in extensive communication and training--yet still people fail to comply. The solution is to provide security that helps people do their jobs more efficiently, thereby inducing users to follow best security practices without even knowing it.
Tags : 
brainloop, technology, security, user compliance, indentity management
    
Brainloop
Published By: Dynatrace     Published Date: May 21, 2019
Dynatrace™ is a full stack solution that covers application performance management, digital experience management, infrastructure monitoring and AIOps. Dynatrace commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Dynatrace™. This study provides readers with a framework to evaluate the potential financial impact of Dynatrace™ on their organizations and how it can affect business operations and users of all types when moving from prior-generation application performance management (APM) toolsets.
Tags : 
    
Dynatrace
Published By: SAP Inc.     Published Date: Jul 28, 2009
Learn from today's sales leaders who have benefited from building a sales strategy based on a position of deep customer knowledge.
Tags : 
sap, sales organization, best-run, sales opportunity, sales strategy, customer database, crm, customer relationship management, actionable intelligence, business intelligence, sales cycle, americas’ sap users’ group, asug, talent, price and margin management, pmm
    
SAP Inc.
Published By: Okta     Published Date: Dec 15, 2010
This paper focuses on the challenges of integrating Salesforce.com logins for single sign-on (SSO) and automating provisioning/de-provisioning from on-premise directories like Active Directory.
Tags : 
okta, user management automation, single sign-on, salesforce.com, active directory, access management, application administrator, application integration
    
Okta
Published By: Riverbed     Published Date: Apr 26, 2012
This CIO article discusses how WAN optimization solutions, like those Riverbed Technology offers, can accelerate private cloud implementations and enable users to be productive, while helping to deliver the cost and management efficiencies businesses require. Read the informational story now and learn why companies like MasterBrand Cabinets chose Steelhead WAN optimization appliances for superior performance.
Tags : 
riverbed, wan, cloud, private cloud, business technology, wan optimization
    
Riverbed
Published By: Tripp Lite     Published Date: May 15, 2018
A Practical Guide to IDF/MDF Infrastructure Implementation Once relegated to early adopters and casual home users, VoIP (voice over Internet protocol) has matured. An essential element of any unified communications (UC) system, it is now the standard method of voice communication in business, education, government and healthcare. If your organization has not already migrated to VoIP, the question is not so much if it will, but when. Cost is the primary driver, since the data network performs double duty by carrying voice traffic as well. VoIP also offers capabilities that far exceed traditional phone systems, with unified communication platforms promising to integrate messaging, mobility, collaboration, relationship management, zoned security, intelligent call routing, disaster recovery, video, teleconferencing, status updates and other advanced features. The transition to VoIP presents a number of challenges, including assessing the ability of your network to handle not only additio
Tags : 
    
Tripp Lite
Published By: Adobe     Published Date: Apr 17, 2017
The ideal customer experience is everything today, and it starts with a modern digital foundation. You can’t give customers the timely and relevant experiences they expect with outdated solutions that are cobbled together. Read The Blueprint Redefined to see how a modern digital foundation can get you there. You’ll learn: How a unified platform lets you easily manage and refine customer experiences Three steps to deliver great digital experiences on all devices The roles of personalization, analytics, and asset management
Tags : 
customer experience, modern solutions, modern digital foundation, streamlined technology, user friendly interface, personalization, asset management
    
Adobe
Published By: Riverbed     Published Date: Feb 15, 2018
To stay ahead in today's hybrid network, you need a lens into the end user's experience as well as an understanding of the dependencies between your applications and network. With this approach, you are alerted to issues before the business is impacted and problems are resolved faster. This eBook details what you need to know to select a best of breed network performance management solution and outlines the critical capabilities required for deep application visibility across virtualized, hybrid and cloud networks no matter where a user is located. Read this book and: Discover best practices - for proactive network monitoring and fast troubleshooting Learn how to stay ahead of application performance issues with increased visibility Increase productivity and a higher ROI - with automatic discovery, end-to-end monitoring, reporting, analytics and faster MTTR Ensure your approach is a proactive mode Study the evaluation checklist - select the best solution for your needs
Tags : 
    
Riverbed
Published By: Gigya     Published Date: Jun 08, 2015
Download this guide to get a grasp of the latest trends in user data management.
Tags : 
user data management, big data, identity and access management, compliance, mobilizing identity data
    
Gigya
Published By: PeopleFluent     Published Date: Oct 07, 2015
This report includes analysis of the types of customers (company sizes, industries etc.) that use PeopleFluent, a discussion of its key use cases, what companies and users like most about the product, and areas for improvement, as well as comparisons that show how PeopleFluent stacks up against other leading talent management products. It also includes independent research and an interview with the vendor.
Tags : 
peoplefluent, talent management, business software, talent management product, user interface
    
PeopleFluent
Published By: Flexera     Published Date: Jun 14, 2016
How much does your organization know about the software vulnerabilities that put data and users at risk? Chances are it is less than you think. Software vulnerability management can significantly reduce enterprise risk, and this paper offers a risk reduction plan, demonstrates why vulnerability management is important today, and offers eye-opening statistics as to the nature and breadth of the issue. It is not surprising that keeping data secure and keeping users safe continues to challenge organizations of every size and type. There has been an explosion in the number of applications used to conduct business in recent years. This multidimensional expansion includes continued growth in mobile devices and enterprise application spending exposing new attack surfaces that malware can prey upon.
Tags : 
software, vulnerability, intelligence, data, statistics, application, attacks, action strategy, risk, management
    
Flexera
Published By: VMware     Published Date: Sep 06, 2017
"Today’s IT organizations simply cannot afford to continue to manage the end user environment with an out-of-date PC-centric approach to systems management. The cloud, mobility and multiplatform environments render that approach ineffective. It’s time to take another look at virtual application and desktop virtualization technologies. Download this whitepaper to look at VMware Horizon, the most complete solution for delivering, managing and protecting Windows desktops, applications and online services across devices, locations, media and connections, making it ideal for systems management transformation. "
Tags : 
    
VMware
Published By: VMware     Published Date: Sep 06, 2017
"Mobile and cloud deployment issues are dominating the concerns of organizations today. End-user mobility and flexibility versus IT control and visibility are the opposing requirements challenging even the most nimble of environments. Organizations are searching for several key capabilities to address this dichotomy: • Infrastructure that is optimized for end users to drive down costs, simplify acquisition, upgrade easily, and support policy management • Flexibility in delivering workspaces to users—on-premises, cloud, and offline—all within a unified workspace with single sign-on • Management capabilities encompassing the entire ecosystem and providing security, compliance, and management of day-to-day end-user environments Download this asset to learn how VMware addresses these needs more effectively than Citrix with the VMware mobile-cloud architect."
Tags : 
vmware, vmware horizon, mobile, cloud
    
VMware
Published By: OKTA     Published Date: Sep 26, 2017
Traditional web applications pre-date modern standards like SAML and OpenIDConnect, so they often use legacy authentication methods to grant end users access. Historically, providing Single Sign-On and centralized access management for end users across these legacy applications required a Web Access Management, or WAM, product. These on-premises software tools could be expensive to maintain and complex to deploy. Now, modern identity providers like Okta in conjunction with best-of-breed network management technologies offer a better way. This white paper describes how web applications that lack modern standard support can be integrated into a cloud-based Identity-as-a-service architecture.
Tags : 
    
OKTA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Challenge Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure. Opportunity Knowing your privileged users is knowing your risk. Privileged access management tools themselves must be able to support automation in the authorization process and enable scalability through support for both dynamic operations and ephemeral infrastructure. Benefits Better pinpointing attacks exploiting credential theft isn’t simply a question of accumulating more data but involves incorporating better data about privileged user behaviour, which can identify significant changes that represent real risk.
Tags : 
    
CA Technologies EMEA
Published By: Riverbed     Published Date: Feb 26, 2015
The Riverbed SteelCentral network performance management suite of products provides considerable advantages over those of JDSU Network Instruments because of its breadth, depth and ease of use to quickly understand and pinpoint the root cause of performance problems.
Tags : 
network performance management, performance issues, performance management, end-user experience management, cloud computing, mobile device
    
Riverbed
Published By: Arcserve     Published Date: Jul 26, 2010
Using the CA Wily Application Performance Management (APM) solution consisting of CA Wily Introscope® and CA Wily Customer Experience Manager™, JN Data better manages Web applications through faster diagnosis of problem root causes in its customers' heterogeneous environments.
Tags : 
ca technologies, jn data, web application management, ca wily, application performance management, apm, customer experience manager, virtual server network, application development time
    
Arcserve
Published By: Pivotal CRM     Published Date: Dec 21, 2007
In this paper, learn how with the right CRM solution, information workers can increase productivity, improve customer service, and boost collaboration, while the business simplifies complex processes, increases sales, and reduces costs.
Tags : 
information worker, crm, microsoft, office, customer relationship management, user adoption, information management, data management, information overload, productivity, integration, pivotal, pivotal crm, quinstreet
    
Pivotal CRM
Published By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : 
entrust, enterprise authentication, security, identity security
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : 
entrust, identitityguard, enterprise security
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 15, 2014
Managing the purchase, deployment, renewal and expiry of digital certificates for multiple Web servers, purposes and users — sometimes in many different locations — can be time-consuming and costly. Entrust IdentityGuard Cloud Services SSL is a self-service application designed to streamline certificate management while providing secure certificates from a trusted brand in online security.
Tags : 
entrust, ssl, ecommerce, extended validation, digital certificates, web servers, identityguard, cloud
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Sep 14, 2018
Digital is changing the face of business, and your security needs are evolving along with it. The widespread adoption of technologies and applications like mobile, VPN and Office 365 have enabled your users a more frictionless work experience. But how can you ensure those experiences are also secure? Forrester recently surveyed 100 IT and security executives to understand their current approaches to user authentication and access management. Check out the 2018 Forrester Opportunity Snapshot — Modern Authentication Methods Protect and Enable study to learn what authentication methods other companies are using and which of these methods are most effective.
Tags : 
authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
    
Entrust Datacard
Published By: Aternity     Published Date: Aug 26, 2011
This whitepaper provides insight, best practices, and recommendations for monitoring the end user experience within Virtual Desktop Infrastructures (VDI).
Tags : 
aternity, vdi, real end user experience, fpi, frontline performance intelligence, virtual desktop infrastructure, application performance, user productivity, user-centric proactive it management, slas
    
Aternity
Published By: Aternity     Published Date: Sep 29, 2011
Published by Aternity, the paper includes 8 real-world cases detailing how Aternity empowers SAP customers with a user-centric approach to proactive IT management.
Tags : 
aternity, sap, application performance, it management, training, real-time
    
Aternity
Published By: Aternity     Published Date: Dec 30, 2011
EMA provides research and analysis of today's End User Experience (EUE) and Application Performance Management (APM) technologies along with a thoughtful presentation on the Top 10 Myths to dispel before purchasing any monitoring tool. Guest speakers include Julie Craig, EMA Research Director, and Trevor Matz, President and CEO of Aternity.
Tags : 
technology, aternity, eue, user experience, apm, application performance, application management
    
Aternity
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.