Skip to content
 

iam

Results 26 - 50 of 238Sort Results By: Published Date | Title | Company Name
Published By: Netsuite DWASF Leads Display Q1 2015     Published Date: Jun 10, 2015
Download this white paper on how cloud ERP can help IT meet rapidly evolving business needs. Discover the core characteristics of the modern enterprise, and the new ERP strategies adopted by rapidly growing enterprises like Williams-Sonoma and Knowledge Universe to support their growth.
Tags : 
business management software, cloud erp, erp, business software, accounting software, business accounting software, cloud financials, small business software, enterprise software, saas, cloud, integrated software solutions, cloud computing, business software solutions, integration platform, business growth, international expansion, integrated platform, business management suite
    
Netsuite DWASF Leads Display Q1 2015
Published By: SAP SME     Published Date: Apr 10, 2018
La industria se ve cada vez más influenciada por productores especializados más pequeños que están en la delantera de una demanda emergente. Como la especificidad de la aplicación química crece, la industria se está moviendo de series de producción a gran escala hacia el incremento de la diversidad de pequeñas series de producción orientadas a lotes. Las ventas dependen del rendimiento de la sustancia, y no solo de la innovación de la sustancia propiamente dicha.
Tags : 
    
SAP SME
Published By: Okta     Published Date: Mar 10, 2016
The Forrester Wave report identifies the six most significant solution providers in the market, evaluating the strengths and weaknesses of each vendor against 15 criteria, including current offering, strategy and market presence. Access your complimentary Forrester Wave report and learn why Okta is named a leader in the space.
Tags : 
    
Okta
Published By: Dell PC Lifecycle     Published Date: Feb 13, 2018
IDC, agenzia di intelligence del mercato IT, ha condotto uno studio globale su oltre 3.500 leader IT in tutto il mondo e ha riscontrato che le aziende di tutti i livelli stanno considerando i modelli PC as a Service per ridurre i costi, accorciare i cicli di aggiornamento e offrire apparecchiature migliori per i propri dipendenti. Dell PC as a Service (PCaaS) unisce hardware, software, servizi e finanziamento per l’intero ciclo di vita in un'unica soluzione onnicomprensiva, a cui affanca un prezzo mensile per postazione unico e prevedibile offerto da Dell Financial Services. Scopri di più sulle soluzioni Dell in collaborazione con Intel®.
Tags : 
idc, service, guadagna, adozione, dell, intel
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: Feb 20, 2018
Abbiamo individuato tre diversi tipi di dipendenti che rappresentano la forza lavoro moderna. Ciascun tipo ha esigenze specifiche in termini di hardware. In un contesto in cui il lavoro da remoto sta diventando un aspetto quotidiano del business moderno, il rischio che dati critici vengano compromessi aumenta notevolmente. La perdita dei dati può essere paralizzante, determinando perdita di opportunità di business, danneggiamento della reputazione e anche sanzioni punitive. Scopri di più sulle soluzioni Dell in collaborazione con Intel®.
Tags : 
risparmia, tempo, denaro, dell
    
Dell PC Lifecycle
Published By: NetIQ     Published Date: Jun 12, 2012
This report outlines the future look of Forrester's solution for security and risk (S&R) executives working on building an identity and access management strategy for the extended enterprise.
Tags : 
netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs, identity, identity-as-a-service, authentication, authorization, open web, iam, saml, oauth, openid, scim, spml, xacml
    
NetIQ
Published By: CA Technologies     Published Date: Sep 29, 2011
CA Content-Aware IAM helps you respond to the key IT drivers above. It helps to automate identity-based security processes (such as user provisioning, entitlement certification, etc.), which increases efficiency and reduces IT costs.
Tags : 
technology, drivers, security, reduce risk, applications, online service, business, confidentiality
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 29, 2011
The identity and access management challenges that exist in the physical world - identity management, application security, access control, managing sensitive data, user activity logging, and compliance reporting - are even more critical in the virtual environments that are growing in use as IT seeks to streamline its operations and reduce operating costs. However, security risks are increased due to the nature of the virtualization environment and IT should seek to extend their security solutions from the physical server environment to the virtualization environment as seamlessly as possible. Continue reading this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Tags : 
technology, virtual, identity management, access control, security, protection
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Un numero sempre crescente di aziende ricorre alla containerizzazione delle applicazioni per aumentare l'efficienza e la velocità dello sviluppo. Grazie ai container, gli sviluppatori possono inserire in un pacchetto, inviare ed eseguire qualunque applicazione sotto forma di container leggero e autosufficiente, eseguibile praticamente ovunque, per garantire la portabilità istantanea dell'applicazione. Per comprendere più chiaramente lo stato del monitoraggio dei container, abbiamo intervistato 100 executive e identificato i principali trend per i container. In questo eBook viene esaminato ogni singolo trend, quindi vengono forniti indicazioni concrete e passi successivi da compiere per garantire il controllo completo del monitoraggio dell'ambiente container.
Tags : 
    
CA Technologies EMEA
Published By: IBM     Published Date: Jan 09, 2017
In today’s complex and distributed IT environments, identity and access management (IAM) programs do much more than simply manage user identities and grant access. This paper provides four key steps that can move you toward a more mature solution now.
Tags : 
ibm, security, services operations, iam programs
    
IBM
Published By: CA Technologies     Published Date: Jan 08, 2014
Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.
Tags : 
ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security, cloud security, applications, on premise
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.
Tags : 
ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security, cloud security, applications, on premise
    
CA Technologies
Published By: Oracle     Published Date: May 05, 2017
I cambiamenti portati dal mondo digitale stanno impattando qualsiasi aspetto del business moderno.
Tags : 
    
Oracle
Published By: Okta     Published Date: May 09, 2016
Hear how Okta automates employee onboarding and offboarding through deep integration between Workday, Medallia’s human resources information system, and Active Directory.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications
    
Okta
Published By: RelayHealth     Published Date: Apr 01, 2013
RelayHealth's Vice President, Business Analytics, Jason Williams examines how healthcare organizations can better set strategies by focusing on key decision points and adding data from real-time sources to what they have already collected.
Tags : 
ecosystem, healthcare, real-time data, data, analysis, decision making, business analytics
    
RelayHealth
Published By: Oracle     Published Date: Jan 09, 2017
Udostepniajac wnioski z badan restauratorom z calego swiata, dzial Oracle Hospitality dazy do wykazania, ze zarzadzanie kadrami i zaopatrzeniem oraz zapobieganie stratom sa globalnymi wyzwaniami, które mozna pokonac poprzez uczynienie technologii kontroli kosztów fundamentem dzialalnosci.
Tags : 
hospitality, hotels, hotel management, millennials, customer experience, mobility
    
Oracle
Published By: IBM     Published Date: Oct 26, 2017
Firms face loss of Intellectual property (IP) and breaches of sensitive data as a result of account takeover (ATO). Risk-based authentication RBA plays an important role in the identity and access management (IAM) and risk mitigation of ATO across a variety of user populations (employee-facing [B2E] users, partners, clients, and consumer/citizen-facing users).
Tags : 
risk based authentication, account takeover, intellectual property, sensitive data, identity management
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
In today’s complex and distributed IT environments, identity and access management (IAM) programs do much more than simply manage user identities and grant access. They are at the core of achieving critical business objectives that are relevant to every high-performing organization. As a result, there are few IT or security initiatives that demand as much deliberation and scrutiny.
Tags : 
identity management, access management, it environments, data security, business performance
    
IBM
Published By: Vocia     Published Date: Aug 24, 2011
Traditional overhead paging technology has evolved into advanced network-based paging systems. Examine industry trends that drive the need for a future-proof, critical paging system for today's healthcare facilities.
Tags : 
vocia, hospital sound systems, hospital paging systems, network-based paging, hcfm, network media systems, hospital paging infrastructure, biamp systems, health it, ehr, unified communications
    
Vocia
Published By: Oracle     Published Date: Mar 09, 2017
In questo white paper, IDC prenderà in esame le difficoltà legate agli schemi di backup tradizionali e al continuo cambiamento delle dinamiche nelle strategie di protezione dei dati.
Tags : 
    
Oracle
Published By: Okta     Published Date: Jul 19, 2016
Part of a strong foundation for cloud-first, mobile-first IT includes supporting BYOD. BYOD can improve end user satisfaction and enable employees to work anywhere from any device. To really get these benefits though, the end-user experience must provide seamless access to the applications end-users want and need. Accomplishing this starts with extending app provisioning to mobile devices, and automatically deprovisioning mobile access as part of the identity lifecycle. For the best user experience, you’ll want automatic configuration of native mobile applications with mobile SSO, security settings and app settings like usernames, URLs and tenant IDs.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta
Published By: Okta     Published Date: Jul 19, 2016
With a secure foundation in place to manage internal IT, many IT leaders are thinking about a foundation for the entire business. In the new world of mobile apps, cloud services, and the Internet of Everything, people, processes, data, and devices are all converging to reshape how day-to-day business is done. Companies are reaching out to customers and partners—and even intelligent objects like connected cars and monitoring systems—and modifying the products and services they bring to market as a result. To an unprecedented degree, the future of an enterprise lies in the hands of the CIO and her IT staff who orchestrate these connections and act on the benefits they bring. IT leaders are finding new opportunities in an era of digital disruption. This executive brief provides a quick overview of how they are driving growth and increasing efficiency by securely connecting the digital enterprise with customers, partners, suppliers and distributors.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications
    
Okta
Published By: Okta     Published Date: Jul 19, 2016
77 Energy uses Okta to automate provisioning and deprovisioning tasks, so IT can focus on identifying and deploying business solutions, rather than worrying about whether or not users can access them. Hear Chris Dodds share how IT staff help people work efficiently and keep the company free of legacy business practices.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications
    
Okta
Published By: Okta     Published Date: Jul 19, 2016
Within 6 months of starting to use Okta, customers on average will connect more than 10 applications for single sign-on. Once single-sign-on is tackled, cloud-first IT organizations can start to tackle the next set of problems. These next challenges are all about how you manage identities across all connected systems, how to determine who has access to what, and how you maintain control over user access. Some of the largest organizations in the world spend millions of dollars building out complex workflow systems to manage these processes. Even then, they depend heavily on manual work to actually get the job done. With Okta, there is a better way to do this, and it’s accessible to organizations of all sizes. Okta Provisioning gives you a foundation for cloud-first IT that brings sanity to your IT processes and enables you to encourage business groups to keep adopting more applications and users to bring the devices of their choice to work. App management, mobility management, and authe
Tags : 
best practices, business optimization, business management, productivity, cloud services, mobile, identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta
Published By: Okta     Published Date: Jul 19, 2016
Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace. This paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration and build a solid foundation for future cloud-first, mobile-first IT.
Tags : 
best practices, business optimization, business management, productivity, cloud services, mobile, identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Find Research

Add Research

Get your company's research in the hands of targeted business professionals.