HIT Consultant Insightful coverage of healthcare innovation
 

user management

Results 326 - 350 of 366Sort Results By: Published Date | Title | Company Name
Published By: Aternity     Published Date: Aug 20, 2010
Application Performance Management & End User Experience Monitoring Platform for Fortune 500/Global 2000
Tags : 
application performance management, end user experience, frontline performance intelligence, desktop virtualization
    
Aternity
Published By: Aternity     Published Date: Aug 20, 2010
View an on-demand webinar on "Improve End User Experience With Proactive Application Performance Management" and download Aberdeen's latest research on Application Performance Management.
Tags : 
application performance management, desktop virtualization, end user experience
    
Aternity
Published By: Aternity     Published Date: Sep 01, 2010
Join Aternity, A Gartner Cool Vendor in IT Operations for a live demo on how Fortune 500 companies are leveraging our award-winning platform to deliver a user-centric approach to Proactive IT Management.
Tags : 
end user experience, application performance management, proactive it management, desktop virtualization, cloud computing
    
Aternity
Published By: Hitachi ID Systems, Inc.     Published Date: Oct 20, 2010
This document defines the components of identity management
Tags : 
identity management, user provisioning, entitlements, password management, rbac
    
Hitachi ID Systems, Inc.
Published By: Adobe     Published Date: Feb 20, 2014
Adobe positioned highest in Ability to Execute and Completeness of Vision in Gartner’s Magic Quadrant for Web Content Management. Gartner’s evaluation is based on Adobe Experience Manager, part of the Adobe Marketing Cloud. Adobe is named a Leader and is positioned highest in both Ability to Execute and Completeness of Vision.
Tags : 
gartner, adobe, adobe social, digital asset management, web content management, adobe experience manager, aem, internet marketing, marketing, customer engagement, user experience, mobile applications, content management
    
Adobe
Published By: Mimecast     Published Date: Apr 04, 2013
User Satisfaction in Cloud-Based E-mail Management with Mimecast
Tags : 
saas, cloud, email, email management, email provider
    
Mimecast
Published By: CDW     Published Date: Mar 18, 2016
Client virtualization technologies are redefining the way IT resources are delivered to end users, and creating exciting new opportunities for IT organizations as they work to streamline and improve operations. By abstracting applications and operating systems from client hardware, virtualization enables client assets to be stored on central servers and delivered to client endpoints. The implications are profound. End users can log on to any networkconnected computing device and access their custom operating system and application environment. For IT departments, central management of client virtual machine (VM) images brings efficiencies in everything from routine maintenance and updating to operating system upgrades.
Tags : 
    
CDW
Published By: Sponsored by HP and Intel®     Published Date: Mar 05, 2013
This white paper explains how you can unleash the full potential of mobility-greater productivity, flexibility, and better economics-by unifying secure device access, user authentication, provisioning, and management.
Tags : 
holistic approach, byod, business advantage, intel, convenience, it infrastructure, byod, bring your own device
    
Sponsored by HP and Intel®
Published By: NETIQ     Published Date: Mar 12, 2013
Organizations struggle to meet PCI DSS compliance. By investing in the proper standardization tools and automation software, organizations can thrive while shifting resources freed up by a simpler.
Tags : 
pci dss, compliance, saas, data security, user activity monitoring, it security, security, it management
    
NETIQ
Published By: NETIQ     Published Date: Mar 12, 2013
As your business users consume software-as-a-service applications, they are introducing new risks to your organization.
Tags : 
cloud computing, access control, saas, software-as-a-service, security, compliance, user access management, security risks
    
NETIQ
Published By: NETIQ     Published Date: Mar 12, 2013
A poll of CIOs and IT managers reports why departments must defend against complex internal and external threats while mitigating regulatory and compliance concerns. The results provide data about how enterprises view compliance.
Tags : 
security compliance, users access management, it management compliance
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
As your business users consume software-as-a-service applications, they are introducing new risks to your organization. Why settle for a solution that’s incomplete, unsecure and requires manual intervention— when what the business really needs is a complete, secure and automated solution?
Tags : 
cloud computing, access control, saas, software-as-a-service, security, compliance, user access management, security risks
    
NETIQ
Published By: Dell Software     Published Date: Apr 17, 2013
Learn more about User Experience Monitoring and the need for advanced real-time predictive analytics to capture information and identify trends. Download this paper today and discover vital recommendations, including the need for better dialogue between IT and business and knowledge of end-user customer behavior.
Tags : 
user experience management, business impact, cornerstone, it transformation, end-user customer behavior, dell
    
Dell Software
Published By: Dell Software     Published Date: Apr 17, 2013
This white paper includes interviews with three diverse companies using User Experience Monitoring (UEM). It underscores UEM’s diverse appeal, its values to IT, and Dell’s versatility in UEM. The paper shows how Dell is combining critical insights into business outcomes and user behaviors with performance and application design.
Tags : 
foglight, user experience, user experience management, cast studies, dell, quest software
    
Dell Software
Published By: AlienVault     Published Date: Aug 11, 2015
This webinar talks about common browser vulnerabilities used to execute attacks, what attackers do next to take control of the system, and how to catch it before the attacker moves further into your network
Tags : 
end-user protection, cyberattacks, browser vulnerabilities, security management, modern threats, threat sharing, security products, firewall, anti-virus, network intrusion detection, vulnerability management
    
AlienVault
Published By: JumpCloud     Published Date: Jan 21, 2015
Learn how innovative IT and ops teams are leveraging hosted LDAP solutions to minimize hassles.
Tags : 
ldap, active directory, user management, idaas, iam, ssh access, linux, hosted ldap, openldap, linux useradd, identity, sso, configure ldap, hosted directory service, identity management
    
JumpCloud
Published By: JumpCloud     Published Date: Jan 21, 2015
Learn how innovative IT and ops teams leverage LDAP and Active Directory for their IaaS.
Tags : 
ldap, active directory bridge, user management, idaas, iam, ssh access, linux, hosted ldap, openldap, linux useradd, identity, sso, configure ldap, aws, cloud servers, iaas
    
JumpCloud
Published By: IBM MaaS360     Published Date: Feb 05, 2015
Before you take that fatal next step in allowing mobility, security, BYOD and user flexibility, carefully read these top 10 reasons why you don't need mobile device management.
Tags : 
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Mobile device Management was just the beginning of enterprise security needs for iOS, Android, Windows and the ever expanding universe of devices. Data, Apps and access are what will send businesses into a new galaxy of great performance. Get there at safely light-speed with Enterprise Mobility Management.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Tired of hearing all the ways you need to go “mobile” and all the ”things” it can do for your business. Don’t buy the hype, here’s a list of perfectly valid reasons fast and secure mobile deployment and management is a bunch of hullabaloo and poppycock.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 16, 2015
See where Ovum places the focus on EMM for 2015 and the vendors with the vision and executional ability to deliver.
Tags : 
fiberlink, deliverability, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 16, 2015
The Aragon Globe delivers an eighteen-vendor comparison on EMM strengths and weaknesses for mobile devices, content and BYOD readiness.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
IBM MaaS360
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.