directories

Results 1 - 19 of 19Sort Results By: Published Date | Title | Company Name
By: Hewlett Packard Enterprise     Published Date: Mar 26, 2018
Today’s data centers are expected to deploy, manage, and report on different tiers of business applications, databases, virtual workloads, home directories, and file sharing simultaneously. They also need to co-locate multiple systems while sharing power and energy. This is true for large as well as small environments. The trend in modern IT is to consolidate as much as possible to minimize cost and maximize efficiency of data centers and branch offices. HPE 3PAR StoreServ is highly efficient, flash-optimized storage engineered for the true convergence of block, file, and object access to help consolidate diverse workloads efficiently. HPE 3PAR OS and converged controllers incorporate multiprotocol support into the heart of the system architecture
Tags : 
     Hewlett Packard Enterprise
By: Group M_IBM Q119     Published Date: Mar 05, 2019
The Aspera FASP high speed transport platform is enabled to provide high-performance secure WAN transport of files, directories, and other large data sets to, from and between a number of leading third-party cloud storage platforms. The implementation is an enhanced transport stack and virtual file system layer in the Aspera server software that allows for direct-to-object-storage transfer over the WAN using the FASP protocol and the native I/O capabilities of the particular third-party file system. The stack is available in all generally available Aspera server software products and supports interoperable transfer with all generally available Aspera client software
Tags : 
     Group M_IBM Q119
By: Location3     Published Date: Feb 07, 2019
Your Local Business Listings are part of the foundation of your online presence. Ensuring that all of your brick-and-mortar business locations are accurately represented on directories like Google My Business, Facebook Places, Bing Places, Apple Maps and more requires a hands-on, managed approach to local data optimization.
Tags : marketing, local marketing, franchise, franchisor, digital marketing, multi-location businesses, local business listings, listing management
     Location3
By: CA Technologies     Published Date: Jan 06, 2014
As most European organisations open up their applications for external users, Identity Access Management (IAM) is becoming ever more critical to drive business growth.
Tags : mediacom, byoid, identity access management, iam, business growth, directories of identities, it professionals, external business users
     CA Technologies
By: CA Technologies     Published Date: Jan 06, 2014
This report presents new research into the use and benefits of IAM and the relationship it has with these three drivers. The research is based on over three hundred interviews with senior IT managers in medium sized to large organisations in a range of business sectors across Europe. The report should be of interest to anyone wanting to better serve all types of users, whilst still keeping control over applications and data.
Tags : mediacom, digital identities, open business, business growth, access management, identity management, iam, open interaction
     CA Technologies
By: Okta     Published Date: Jul 27, 2016
With the exploding adoption of software-as-a-service (SaaS) applications, enterprise IT is fundamentally changing. While on-demand services provide tremendous ROI, they also introduce new challenges that must be overcome to truly capitalize on their potential. Identity management problems such as controlling who is granted access to which applications and data and how to control access to these applications leveraging on premise directories such as Active Directory, have become increasingly important. Single Sign-On and provisioning solutions that are optimized for the cloud are necessary to help address these challenges. This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
     Okta
By: OneLogin     Published Date: Oct 24, 2017
In this ebook, we dive into how identity management streamlines access to the cloud while protecting corporate data. The location of many resources is changing to the cloud, yet companies still need central management of those resources. Trying to maintain security and order in a chaotic free-for-all use of cloud apps and bring-your-own-device culture is like a black hole sucking in IT’s time—time they could be dedicating to other projects. OneLogin’s cloud identity management platform spans the entire application portfolio with secure single sign-on (SSO), multi-factor authentication (MFA), user provisioning, integration with common directory infrastructures such as Active Directory (AD), Lightweight Directory Access Protocol (LDAP), and various cloud directories, and more. We recommend the following: • IT departments leverage OneLogin for all their identity management needs • IT departments educate users about security and safe sharing • App owners enable Security Assertion M
Tags : 
     OneLogin
By: OneLogin     Published Date: Oct 24, 2017
Innovative Identity and Access Management That Actually Makes Life Easier Empower employees, customers and partners with secure access to cloud and company apps on any device. Transform your enterprise security and centralize control of users and apps. OneLogin’s cloud identity management platform provides secure single sign-on, multi-factor authentication, directory integration with AD, LDAP and other external directories, user provisioning, endpoint management and more.
Tags : 
     OneLogin
By: Okta     Published Date: Dec 15, 2010
This paper focuses on the challenges of integrating Salesforce.com logins for single sign-on (SSO) and automating provisioning/de-provisioning from on-premise directories like Active Directory.
Tags : okta, user management automation, single sign-on, salesforce.com, active directory, access management, application administrator, application integration
     Okta
By: Okta     Published Date: Feb 24, 2015
With the exploding adoption of software-as-a-service (SaaS) applications, enterprise IT is fundamentally changing. While on-demand services provide tremendous ROI, they also introduce new challenges that must be overcome to truly capitalize on their potential. Identity management problems such as controlling who is granted access to which applications and data and how to control access to these applications leveraging on premise directories such as Active Directory, have become increasingly important. Single Sign-On and user management solutions that are optimized for the cloud are necessary to help address these challenges. This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : identity and access management, saas applications, single sign-on, active directory, management solutions
     Okta
By: Osterman Research, Inc.     Published Date: Jul 08, 2011
Join Michael Osterman of Osterman Research and GFI Software who will discuss the current state of the dangers of simple Web surfing and what you can do to address these concerns quickly and easily.
Tags : web monitoring, gfi, osterman, messaging, directory, email, e-mail, directories
     Osterman Research, Inc.
By: Yext     Published Date: Apr 15, 2013
The paper will show every small business owner the most common data location problems. It will explain why these problems need to be fixed and then show you the best strategies to fix them.
Tags : advertising, marketing, location, listings, maps, directories, yext, business
     Yext
By: Yext     Published Date: May 21, 2013
The paper will show every dealership the most common data location problems. It will explain why these problems need to be fixed and then show you the best strategies to fix them.
Tags : advertising, marketing, location, listings, maps, directories, yext, business
     Yext
By: Yext     Published Date: May 21, 2013
The paper will show every law firm the most common data location problems. It will explain why these problems need to be fixed and then show you the best strategies to fix them.
Tags : advertising, marketing, location, listings, maps, directories, yext, business
     Yext
By: Yext     Published Date: May 21, 2013
The paper will show every doctors office the most common data location problems. It will explain why these problems need to be fixed and then show you the best strategies to fix them.
Tags : advertising, marketing, location, listings, maps, directories, yext, business
     Yext
By: eGrabber     Published Date: Sep 21, 2009
The Internet has many free sources of leads that you can use to market your product or service. ListGrabber is a powerful sales lead capture tool that allows you to build your own lead or prospect lists from various publicly available sources of free leads on the Internet. You can capture contact lists from online directories (like yellowpages.com, superpages.com, whitepages.com), association websites, membership directories, etc. and enter them into an Excel spreadsheet or any database (ACT!, Outlook, Excel, GoldMine, etc.) This sales and marketing software enables you to: . Capture name, address, email, phone and fax number, etc of likely prospects . Automatically transfer the captured contacts into an Excel spreadsheet or any other database . Complete your online lead generation in seconds . Start your cold calling and email/telemarketing campaigns sooner . Capture contact information found in email signatures, spreadsheets and documents Cost: $249.95 Download your Trial Copy Today.
Tags : lead, listgrabber, act, outlook, excel, goldmine, yellowpages, whitepages
     eGrabber
By: Find White Papers     Published Date: May 07, 2008
Learn how leading vendors in the technology space are reaching IT professionals through dedicated email blasts, contextual email placements, co-branded directories, and contextual placements. Reach millions of IT buyers on a cost per lead basis, paying for only the leads that download your research and that fall within your specified target audience.
Tags : fwp, find white papers, directories, white papers, whitepapers, libraries, research, research library
     Find White Papers
By: Radiant Logic, Inc     Published Date: Mar 21, 2011
How Virtualization Addresses the Challenges of Authentication and Authorization Across Disparate User Directories.
Tags : access control, active directory, authentication, directory services, ldap, security policies, sso, systems management
     Radiant Logic, Inc
By: IBM     Published Date: Sep 30, 2016
See how thinking smartly about identity and access management deployment can make all the difference when it comes to securing your enterprise’s data on the cloud. Learn common mistakes made when attempting to utilize security measures on Office 365, synchronizing data with its directories, and more
Tags : ibm, security, office 365, access management deployment, access management, enterprise data, cloud, security measures
     IBM
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com