access control

Results 1 - 25 of 330Sort Results By: Published Date | Title | Company Name
By: CA Technologies EMEA     Published Date: Sep 14, 2018
At A Glance The misuse or takeover of privileged accounts constitutes the most common source of breaches today. CA Threat Analytics for PAM provides a continuous, intelligent monitoring capability that helps enterprises detect and stop hackers and malicious insiders before they cause damage. The software integrates a powerful set of user behavior analytics and machine learning algorithms with the trusted controls provided by CA Privileged Access Manager (CA PAM). The result is a solution that continuously analyzes the activity of individual users, accurately detects malicious and high-risk activities and automatically triggers mitigating controls to limit damage to the enterprise.
Tags : 
     CA Technologies EMEA
By: SafetyCulture     Published Date: Aug 14, 2018
Consistency and customer experience are key to quality and profitability in retail. Manual reporting processes can be unwieldy and time-consuming, but bringing together all compliance procedures under one digital platform means fast, consistent and easy-to-access performance data. Using real-time insights into best practice improves the reporting of quality control, stock loss prevention, inspection processes, logistics and more – saving time, increasing efficiency and boosting customer satisfaction. Benefits include better branding through monitoring rollouts with uploaded photos and videos, protection against shrinkage through improved inspection processes and audits, and clearer visibility of issues which means a speedier response.
Tags : 
     SafetyCulture
By: Dell Server     Published Date: Aug 08, 2018
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance. Superior business outcomes require businesses to consider IT a core competency. For IT, an agile, elastic, and scalable IT infrastructure forms the crucial underpinning for a superior service delivery model. Dell EMC’s Intelligent Automation powered by Intel® Xeon® Platinum processor simplifies the management and maintenance of its PowerEdge server hardware. Designed to drive down the cost and resources associated with server lifecycle management, Intelligent Automation relies on integrated Dell Remote Access Controller(iDRAC) and OpenManage server management soft
Tags : 
     Dell Server
By: Ruckus Wireless     Published Date: Jul 11, 2018
Is your WLAN under increasing pressure from more users, more types of connected devices, and more bandwidth-intensive applications? It’s time to consider a better solution. With Ruckus Cloud Wi-Fi you get simple, centralized cloud-based management and the best performing Wi-Fi access points for high-density environments. Your job gets easier and your Wi-Fi gets better. Get visibility and control of your distributed Wi-Fi network with bandwidth to spare.
Tags : 
     Ruckus Wireless
By: Symantec     Published Date: Jun 13, 2018
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices desktops, laptops, tablets, and smartphones with various operating systems to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. In the wake of this disruption, vendors offered myriad point products that solve only a portion of the security problem. These products usually require costly custom integrations and high management overhead to boot. Making matters worse, traditional security approaches can’t address an evolving threat landscape that includes ransomware, stealthy attacks that dwell in a customer’s environment for months, and threats targeting iOS and Android devices. In fact, the mobile workforce is more vulnerable than ever before.
Tags : 
     Symantec
By: U.S. Cellular     Published Date: Jun 04, 2018
Mobile Device Management (MDM) is a must for any business with employees who have access to company data via mobile devices. This free whitepaper will inform you on the basics of MDM technology and how it can give you more control over Smartphones, Tablets and laptops used by your employees—like being able to remotely lock and wipe lost or stolen devices
Tags : 
     U.S. Cellular
By: CA Technologies     Published Date: Jun 01, 2018
Challenge Businesses today must reduce the risk of security breaches to protect the valuable data within their organizations. At the same time, IT auditors are increasingly enforcing ever more stringent requirements on the business. The bottom line is that privileged accounts and privileged access are being targeted by hackers as a new attack surface and focused on by auditors who are insisting on greater controls around privileged accounts. Opportunity The right privileged access management solution provides comprehensive protection for your missioncritical servers with powerful, fine-grained controls over operating system-level access and privileged user actions. Capable of enforcing access controls on powerful native Superuser accounts—like the UNIX® and Linux® root and Microsoft® Windows® administrator—this system-level, host-based privileged access management solution controls, monitors and audits privileged user activity, improving security and simplifying audit and compliance. B
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Jun 01, 2018
Privileged credentials have served as a major attack vector in the successful execution of many breaches. Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. CA Privileged Access Management helps drive IT security and compliance risk reduction and improves operational efficiency by enabling privileged access defense in depth—providing broad and consistent protection of sensitive administrative credentials, management of privileged identity access and control of administrator activity.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Jun 01, 2018
CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network devices and applications.
Tags : 
     CA Technologies
By: Dome9     Published Date: Apr 25, 2018
AWS provides powerful controls to manage the security of software-defined infrastructure and cloud workloads, including virtual networks for segmentation, DDoS mitigation, data encryption, and identity and access control. Because AWS enables rapid and elastic scalability, the key to securing cloud environments is using security automation and orchestration to effectively implement consistent protection across your AWS environment. The following eBook will discuss Dome9 best practices for using AWS controls to establish a strict security posture that addresses your unique business needs, and maintaining consistency across regions, accounts, and Virtual Private Clouds (VPCs) as your environment grows.
Tags : 
     Dome9
By: Dell EMC & Intel     Published Date: Apr 13, 2018
Today’s businesses are rapidly transforming to prepare for the changes taking place in the global economy. Companies of all sizes can benefit from tools that automate the deployment and ongoing maintenance of server environments. Put another way, in today’s digital economy, where users need access to intelligible data faster, IT organizations must employ tools that automate the delivery of IT as a Service (ITaaS). Dell EMC’s Intelligent Automation powered by Intel® Xeon® Platinum processor simplifies the management and maintenance of its PowerEdge server hardware. Designed to drive down the cost and resources associated with server lifecycle management, Intelligent Automation relies on integrated Dell Remote Access Controller(iDRAC) and OpenManage server management software to deliver reliable and efficient automation to PowerEdge Servers. Intel Inside®. New Possibilities Outside.
Tags : 
     Dell EMC & Intel
By: Dell EMC & Intel     Published Date: Apr 13, 2018
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance. Superior business outcomes require businesses to consider IT a core competency. For IT, an agile, elastic, and scalable IT infrastructure forms the crucial underpinning for a superior service delivery model. Dell EMC’s Intelligent Automation powered by Intel® Xeon® Platinum processor simplifies the management and maintenance of its PowerEdge server hardware. Designed to drive down the cost and resources associated with server lifecycle management, Intelligent Automation relies on integrated Dell Remote Access Controller(iDRAC) and OpenManage server management soft
Tags : 
     Dell EMC & Intel
By: Dell EMC & Intel     Published Date: Apr 13, 2018
Today’s businesses are rapidly transforming to prepare for the changes taking place in the global economy. Companies of all sizes can benefit from tools that automate the deployment and ongoing maintenance of server environments. Put another way, in today’s digital economy, where users need access to intelligible data faster, IT organizations must employ tools that automate the delivery of IT as a Service (ITaaS). Dell EMC’s Intelligent Automation powered by Intel® Xeon® Platinum processor simplifies the management and maintenance of its PowerEdge server hardware. Designed to drive down the cost and resources associated with server lifecycle management, Intelligent Automation relies on integrated Dell Remote Access Controller(iDRAC) and OpenManage server management software to deliver reliable and efficient automation to PowerEdge Servers. Intel Inside®. New Possibilities Outside.
Tags : 
     Dell EMC & Intel
By: MobileIron     Published Date: Apr 11, 2018
MobileIron unified endpoint management (UEM) enables your employees to enjoy seamless access to business apps and data through secure mobile devices, desktops, and cloud services while still maintaining complete control over their privacy. Harness the power of secure modern devices, apps and cloud services to enable business innovation. With one app, enterprises can protect company data by detecting and remediating known and zero-day threats on the mobile device, and no need for users to take any action.
Tags : byod, strategy, endpoint, management, uem, business, applications, data, mobile, device
     MobileIron
By: CA Technologies EMEA     Published Date: Apr 10, 2018
Challenge Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure. Opportunity Knowing your privileged users is knowing your risk. Privileged access management tools themselves must be able to support automation in the authorization process and enable scalability through support for both dynamic operations and ephemeral infrastructure. Benefits Better pinpointing attacks exploiting credential theft isn’t simply a question of accumulating more data but involves incorporating better data about privileged user behaviour, which can identify significant changes that represent real risk.
Tags : 
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Apr 10, 2018
La sfida Come ci si può aspettare, le aziende che intraprendono un percorso di digital transformation devono affrontare maggiori problemi correlati a rischi e sicurezza. Le iniziative di digital transformation aumentano inevitabilmente il numero dei punti di accesso all'infrastruttura aziendale che sfuggono ai controlli esistenti, sono accessibili a un numero superiore di set di identità diversi e proliferano all'interno di un'infrastruttura distribuita e dinamica. L'opportunità Conoscere i propri utenti con privilegi significa conoscere i rischi. Di per sé, gli strumenti di privileged access management devono essere in grado di supportare l'automazione nel processo di autorizzazione e garantire la scalabilità attraverso il supporto di operations dinamiche e infrastrutture effimere, come gli account amministrativi Amazon Web Services (AWS) per le identità umane.
Tags : 
     CA Technologies EMEA
By: Outreach.io     Published Date: Apr 09, 2018
Modern business-to-business (B2B) buyers have unprecedented access to information to support their buying process and, as a result, have become more self-reliant in the evaluation process. This has made B2B sellers’ jobs harder; not only do they have less control in earlier stages of the sales cycle, but they have to work harder to connect and engage with buyers, turning prospects into customers. Sales technologies have helped modernize how sellers and sales leaders manage their pipelines and execute contracts, but technology gaps around engagement persist, making it difficult for sellers to keep pace with, connect with, and support buyer engagement. The common outcome: Sellers become slaves to their CRM systems, focused more on updating reports and logging their activities than they are in driving business results.
Tags : 
     Outreach.io
By: Hewlett Packard Enterprise     Published Date: Mar 26, 2018
Today’s data centers are expected to deploy, manage, and report on different tiers of business applications, databases, virtual workloads, home directories, and file sharing simultaneously. They also need to co-locate multiple systems while sharing power and energy. This is true for large as well as small environments. The trend in modern IT is to consolidate as much as possible to minimize cost and maximize efficiency of data centers and branch offices. HPE 3PAR StoreServ is highly efficient, flash-optimized storage engineered for the true convergence of block, file, and object access to help consolidate diverse workloads efficiently. HPE 3PAR OS and converged controllers incorporate multiprotocol support into the heart of the system architecture
Tags : 
     Hewlett Packard Enterprise
By: Dell EMC & Intel     Published Date: Mar 16, 2018
Today’s businesses are rapidly transforming to prepare for the changes taking place in the global economy. Companies of all sizes can benefit from tools that automate the deployment and ongoing maintenance of server environments. Put another way, in today’s digital economy, where users need access to intelligible data faster, IT organizations must employ tools that automate the delivery of IT as a Service (ITaaS). Dell EMC’s Intelligent Automation simplifies the management and maintenance of its PowerEdge server hardware. Designed to drive down the cost and resources associated with server lifecycle management, Intelligent Automation relies on integrated Dell Remote Access Controller(iDRAC) and OpenManage server management software to deliver reliable and efficient automation to PowerEdge Servers. Intel Inside®. New Possibilities Outside.
Tags : 
     Dell EMC & Intel
By: NetApp     Published Date: Mar 05, 2018
NetApp® Data Fabric enabled solutions empower organizations to use data to make intelligent decisions about how to optimize their business and get the most out of their IT infrastructure. They provide essential data services for data visibility and insight, data access and control, and data protection and security. 
Tags : netapp, database performance, flash storage, data management, cost challenges
     NetApp
By: Cisco     Published Date: Jan 02, 2018
Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Cisco TrustSec software-defined segmentation. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco on their organizations. To better understand the benefits, costs, and risks associated with TrustSec, Forrester interviewed four customers that had deployed TrustSec. The TrustSec software-defined segmentation solution simplifies the provisioning and management of highly secure access to network services and applications. Unlike access control mechanisms that work on network topology, TrustSec policies use logical grouping. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks. A more detailed description of TrustSec is available on the Cisco TrustSec Overview page in this document.
Tags : 
     Cisco
By: Symantec     Published Date: Dec 13, 2017
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices – desktops, laptops, tablets, and smartphones with various operating systems – to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. SymantecTM provides a complete endpoint solution powered by the world’s largest civilian Global Intelligence Network (GIN) to help organizations secure their enterprise and mobile workforce across traditional and modern OS devices used over any network and from any location. Read this white paper to find out more.
Tags : security, defense, cloud, threats, attack, symantec, enterprise, endpoint, solutions, global, intelligence, network, devices, mobile, workforce
     Symantec
By: Symantec     Published Date: Dec 13, 2017
Enterprise’s are increasingly under threat from sophisticated attacks. In fact, research has found that threats dwell in a customer’s environment an average of 190 days1. These Advanced Persistent Threats use stealthy techniques to evade detection and bypass traditional security defenses. Once an advanced attack gains access to a customer environment the attacker has many tools to evade detection and begin to exploit valuable resources and data. Security teams face multiple challenges when attempting to detect and fully expose the extent of an advanced attack including manual searches through large and disparate data sources, lack of visibility into critical control points, alert fatigue from false positives, and difficulty identifying and fixing impacted endpoints.
Tags : investigation, exposure, attacks, endpoints, network, email, cloud, security, symantec
     Symantec
By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
According to many market research analysts, the global wireless access point (WAP) market is anticipated to continue its upward trajectory and to grow at an impressive compound annual growth rate (CAGR) of approximately 8% through 2020. Many enterprises are utilizing cloudcomputing technology for cost-cutting purposes, eliminating investments required for storage hardware and other physical infrastructures. With significant growth expected in Internet usage, particularly bandwidth consuming video traffic, WAP vendors need to enable their customers to monitor and improve device performance, improve end user experience, and enhance security. These customers include general enterprises that offer Internet access to patrons like airports, hotels, retail / shopping centers and so on. These external Internet access providers can differentiate themselves by offering optimum service through advanced network analytics, traffic shaping, application control, security capabilities and more.
Tags : utilization, challenges, dpi, benefits, airport, public, wifi, qoe, qos, security
     Rohde & Schwarz Cybersecurity
By: MobileIron     Published Date: Nov 14, 2017
This paper covers some of the critical security gaps today’s mobile-cloud enterprises must address: • Unsecured devices. Unsecured devices allow users to easily access business data from mobile apps or cloud services simply by entering their credentials into an app or browser on the device. Once on the device, data can be easily compromised or shared with unauthorized, external sources. • Unmanaged apps. These typically include business apps, such as Office 365 productivity apps, that the user has downloaded from a personal app store instead of the enterprise app store. As a result, these apps are not under IT control but can still be used to access business content once the user enters his or her credentials. • Unsanctioned cloud services. Most enterprise cloud services have associated ecosystems of apps and services that integrate using APIs. While the enterprise cloud service might be sanctioned, apps and services from its ecosystem might not be.
Tags : 
     MobileIron
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com