access control

Results 326 - 344 of 344Sort Results By: Published Date | Title | Company Name
By: Qualys     Published Date: Apr 05, 2011
This guide explains how QualysGuard PC automates the "C" in GRCM by automatically scanning all assets, collecting operating system configuration and application access controls, mapping these to IT policy, and documenting compliance.
Tags : it data collection, it compliance, grcm controls, qualys, qualysguard pc, gcc, automated general computer control, legacy, it risk, policy editor, saas
     Qualys
By: dvsAnalytics     Published Date: Apr 20, 2011
Due to increasingly strict federal, state, and industry regulations aimed at protecting health & financial information, an understanding of the required rules and standards and how they relate to call recording is critical
Tags : hipaa, pci dss, nacha, audit logs, call recording, data encryption, user access controls, ephi, phi
     dvsAnalytics
By: Blue Coat Systems     Published Date: Oct 25, 2011
Blue Coat WebFilter is best-in-class for web threat protection, but content filtering databases have another key role to play: control of Internet use
Tags : blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway, application performance monitoring
     Blue Coat Systems
By: NETIQ     Published Date: Mar 12, 2013
NetIQ’s Identity, Access and Security Management solutions integrate seamlessly to help you control access to cloud services and data, reduce your risk of data breaches in mixed environments.
Tags : security and compliance in the cloud
     NETIQ
By: NETIQ     Published Date: Mar 12, 2013
As your business users consume software-as-a-service applications, they are introducing new risks to your organization.
Tags : cloud computing, access control, saas, software-as-a-service, security, compliance, user access management, security risks
     NETIQ
By: NETIQ     Published Date: Sep 09, 2013
As your business users consume software-as-a-service applications, they are introducing new risks to your organization. Why settle for a solution that’s incomplete, unsecure and requires manual intervention— when what the business really needs is a complete, secure and automated solution?
Tags : cloud computing, access control, saas, software-as-a-service, security, compliance, user access management, security risks
     NETIQ
By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the way in which enterprise mobility has both increased employee productivity and decreased the security of corporate networks. The paper discusses the challenges IT managers have with controlling the "Bring Your Own Device" (BYOD) trend to allow mobile users to have access to the corporate network. Explained in the paper is the limit to visibility and control of file transfers when employees use ad hoc methods, and that educating employees on proper data access is not enough to protect the corporate network. The paper concludes by describing how Globalscape's EFT™ and Tappin™ can provide mobile access, without compromising security and controls over file sharing.
Tags : mobile, mobile access, remote access, byod, smartphones, tablets, laptops, ad hoc, file sharing, on-premises control, eft, tappin, sma, secure mobile access, mft
     Globalscape
By: NetApp     Published Date: Mar 05, 2018
NetApp® Data Fabric enabled solutions empower organizations to use data to make intelligent decisions about how to optimize their business and get the most out of their IT infrastructure. They provide essential data services for data visibility and insight, data access and control, and data protection and security. 
Tags : netapp, database performance, flash storage, data management, cost challenges
     NetApp
By: IBM     Published Date: Jan 07, 2016
This buyer’s guide can help you select the right identity and access management solution to successfully manage and control user access within, across and between organizations.
Tags : ibm, identity, access assurance, identity, security
     IBM
By: Okta     Published Date: Jul 27, 2016
The shift to the cloud is changing how companies think about their IT infrastructure and what they must do to manage it. The on-demand applications and services that comprise a cloud services network enable companies to rapidly deploy powerful capabilities to a broad set of users at very low costs. However, they also introduce challenges associated with securing and controlling users and access, simplifying adoption and scaling of these applications, and providing insight into utilization to ensure the business is optimizing its cloud investments. Okta’s on-demand identity management service enables companies to address these challenges head-on by being designed from the ground up as a scalable, secure, multi-tenant service that protects your data through centralized access control. This whitepaper details Okta’s focus on security and reliability, how Okta enhances security and how Okta itself stays secure.
Tags : identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
     Okta
By: U.S. Cellular     Published Date: Jun 04, 2018
Mobile Device Management (MDM) is a must for any business with employees who have access to company data via mobile devices. This free whitepaper will inform you on the basics of MDM technology and how it can give you more control over Smartphones, Tablets and laptops used by your employees—like being able to remotely lock and wipe lost or stolen devices
Tags : 
     U.S. Cellular
By: IBM     Published Date: Jul 14, 2016
How are some companies decreasing audit fees in the face of pressure to increase them? In this follow-up report to the 2015 Audit Fee Survey, Financial Executives Research Foundation interviewed several senior-level financial executives and audit partners. These interviews revealed best practices in mitigating increases in audit fees and how to work more efficiently and effectively with auditors. Access this report to learn the reasons for increased audit fees and the impact of PCAOB inspections. You'll also discover how to review current audit focus areas, improve internal controls, automate processes, and review audit hours and fees.
Tags : best practices, audit, finance, efficiency, productivity
     IBM
By: CA Technologies     Published Date: Jun 01, 2018
CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network devices and applications.
Tags : 
     CA Technologies
By: Kronos     Published Date: Sep 20, 2018
If you’ve tried managing your retail operation’s labor performance without reliable, real-time data, you know the costly shortcomings of this approach. Tap into clear, easy-to-access workforce data — a single view of all elements of your workforce that empowers you to make effective decisions and protect your bottom line. Workforce Analytics for Retail transforms labor and sales data into meaningful business intelligence. Learn how managers can make data-driven decisions that optimize workforce utilization, control labor costs, and drive continuous improvement.
Tags : 
     Kronos
By: Dell Server     Published Date: Aug 08, 2018
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance. Superior business outcomes require businesses to consider IT a core competency. For IT, an agile, elastic, and scalable IT infrastructure forms the crucial underpinning for a superior service delivery model. Dell EMC’s Intelligent Automation powered by Intel® Xeon® Platinum processor simplifies the management and maintenance of its PowerEdge server hardware. Designed to drive down the cost and resources associated with server lifecycle management, Intelligent Automation relies on integrated Dell Remote Access Controller(iDRAC) and OpenManage server management soft
Tags : 
     Dell Server
By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
The average company uses more than 50 security vendors. Firewalls, Web proxies, SIEM, Appliances & Third-party intelligence. The list goes on — and sometimes you still find your stack coming up short when it comes to securing users anywhere they access the internet. Strengthening your security stack doesn’t mean a massive overhaul or a loss of customization and control. Check out these 6 ways to amplify and extend your stack with cloud security from Cisco Umbrella.
Tags : 
     Cisco Umbrella EMEA
By: Unit4     Published Date: Feb 18, 2019
Are you under pressure from donors to improve transparency and accountability? Your non-profit can't maintain full financial control over your operations if you don't have access to the right insight. Discover the best methods for building trust with your donors, and key strategies for empowering greater financial control, transparency, and accountability.
Tags : 
     Unit4
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14     Next   End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com