control

Results 1726 - 1750 of 2111Sort Results By: Published Date | Title | Company Name
Published By: AlienVault     Published Date: Oct 20, 2017
The security-oriented rule of the Health Insurance Portability and Accountability Act (HIPAA) is designed to ensure the confidentiality, integrity, and security of ‘electronic protected health information’ (ePHI). However, to comply with the Security Rule and to demonstrate that security controls are in place and working is no easy task, especially for today’s resource-constrained IT security teams. AlienVault® Unified Security Management™ (USM) helps you to accelerate your path to HIPAA compliance and simplifies maintaining your HIPAA certification thereafter. With multiple essential security capabilities together into a single platform, AlienVault USM gives you an affordable and easy-to-use solution to satisfy the HIPAA Security Rule, and provides highly customizable, predefined HIPAA compliance reports out of the box, making it fast and simple to get the visibility you need to maintain your organization’s security posture.
Tags : 
    
AlienVault
Published By: IBM     Published Date: Feb 18, 2015
UrbanCode Deploy provides extensive capabilities for configuring WebSphere Application Server (WAS) through plug-ins: Application Deployment for WebSphere - which enables the auto-discovery of WAS cells; and Middleware Configuration for WebSphere - which allows for management of WAS configurations. When combined, UrbanCode Deploy and these plug-ins enable a rapid, controlled method for continuous delivery to WebSphere Application Servers.
Tags : 
application delivery, websphere, ibm, urbancode, application server, it management, knowledge management
    
IBM
Published By: Act-On     Published Date: Jan 08, 2015
Learn Facebook’s Rules of Engagement so you can make your content more sharable and searchable – and avoid violating the terms of service. This eBook will give you a thorough understanding of Facebook principles, and the general rules that apply to content and behavior.
Tags : 
act-on, facebook, social, media, rules, engagement, b2b, marketing, search, tags, post, data, feed, news, algorithm, branding, control
    
Act-On
Published By: AirDefense     Published Date: Apr 24, 2007
This paper outlines the specific elements of wireless LAN security (perimeter control, access control, date protection, and monitoring) and WLAN management (configuration, fault diagnostics, network usage, and policy enforcement). Reader will gain a keen understanding of how to effectively lockdown a wireless LAN and manage it for peak performance.
Tags : 
wireless security, wlan, wlans, wlan security, wireless lan, access control, wireless access control, data protection, monitoring, wlan management, security policies, airdefense
    
AirDefense
Published By: A10 Networks     Published Date: Apr 14, 2006
Download this white paper to learn how IAM projects can be practical, affordable and provide quick ROI for companies of all sizes.
Tags : 
access control, identity management, access management, authentication, roi, return on investment, a10, a10 networks
    
A10 Networks
Published By: A10 Networks     Published Date: Aug 21, 2009
Compliance with SOX and other new corporate reporting requirements is costly and challenging for many companies to implement, as the SOX act covers many different areas of business practices for internal controls and financial reporting. Get this whitepaper now and see the impact the Sarbanes-Oxley Act has on Information Technology.
Tags : 
compliance, sarbanes oxley, sox, identity management, finance, regulatory compliance, financial reporting, a10, a10 networks, sox compliance, it management
    
A10 Networks
Published By: A10 Networks     Published Date: Aug 21, 2009
This white paper highlights the complex nature of traditional authentication and identity management practices and shows how A10 Networks unified identity and access management solutions simplify the convergence of network, security, and identity resources for proper deployment.
Tags : 
identity management, authentication, access control, anti spam, anti spyware, anti virus, a10, a10 networks
    
A10 Networks
Published By: Applix     Published Date: Mar 13, 2007
This whitepaper will help organizations understand how driver based planning and control activities can be transformed into the proactive management function that add greater value through faster decision making.
Tags : 
productivity, best practices, business process management, bpm, business management, erp, enterprise resource planning, applix
    
Applix
Published By: AppSense     Published Date: Aug 21, 2009
Learn how AppSense Application Manager enables IT Administrators to reliably and effectively enforce software licensing policies on client devices, and therefore gain greater control over the deployment of applications in a Windows Terminal Server environment.
Tags : 
windows server, application management, application, application performance management, windows server, windows terminal server, network management, software licensing, software license, compliance, appsense, it management
    
AppSense
Published By: Aventail     Published Date: Aug 21, 2009
This white paper summarizes the capabilities of Aventail End Point Control and explains the range of features that increase IT control and data protection by giving users access that's finely tuned to the risks of their environment.
Tags : 
vpn, access control, ssl, network security, data protection, wireless security, aventail
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
Today's office is now anywhere that a user can get an Internet connection, a PC on a business partner's network, a handheld at a WiFi hotspot, an airport kiosk, or a computer on a home WiFi network. But secure access is not the only driving business factor remote access must be easy to use and administer as well.
Tags : 
secure remote access, remote access, wireless security, secure wifi, wifi security, wi-fi security, wifi, wi-fi, ssl, vpn, secure access, aventail, networking
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
Network Access Control (NAC) solutions has arrived, with the support of some of the largest vendors in the IT/networking world, its own consortium, the excitement of users at organizations of all types and sizes, real available solutions, and significant revenue generated. Learn more in this white paper.
Tags : 
vpn, ssl, nac, network access control, access control, remote access, remote access security, aventail, ssl vpn
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
NAC is a multifaceted framework to thoroughly control who and what gets access to network resources, and help keep malware from entering the enterprise. Today, there are huge challenges to implementing as-yet immature NAC solutions on an enterprise-wide basis, including convoluted integration requirements, inadequate inspection capabilities, and weak policy management.
Tags : 
vpn, access control, security management, ssl, network access control, nac, policy management, security policies, malware, intrusion prevention, ssl, secure socket layer, vpn, virtual private network, vpns, virtual private networks, aventail
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
By 2008, SSL VPNs are expected to be the primary access method for more than two-thirds of business employees who work remotely. This white paper and companion ROI calculator worksheet, provide a working methodology and real-world scenarios to help you determine annual ROI from replacing your existing IPSec VPN with an Aventail SSL VPN.
Tags : 
ssl, vpn, ssl vpn, ipsec, ipsec vpn, roi, return on investment, secure remote access, remote access security, employee productivity, productivity, cost control, aventail
    
Aventail
Published By: Clearvale by BroadVision     Published Date: Aug 21, 2009
The benefits of moving manual processes to the web are well understood. But very few organizations have web-enabled product returns, bill disputes or other complex business processes. This paper discusses requirements for web-enabling complex processes.
Tags : 
self-service, self service, online processes, cost control, automation, broadvision, software development
    
Clearvale by BroadVision
Published By: Clearvale by BroadVision     Published Date: Aug 21, 2009
The move towards self-service is clearly about mitigating costs. But self-service models can also deliver significant benefits to users when they combine the best of online convenience with the insight and personal touch of an experienced sales or service rep.
Tags : 
self service, customer service, customer relationship management, crm, live support, online help, online support, cost control, self-service, call center, call center management, broadvision
    
Clearvale by BroadVision
Published By: ClearNova     Published Date: Aug 21, 2009
In the 1990s, client/server was the predominant architecture used to build business applications. The applications had rich functionality, were responsive, and satisfied users' needs. Client/server worked in a time where the only networks were the ones owned and controlled by the enterprise and the only user base was internal.
Tags : 
internet apps, web applications, web application, web application development, j2ee, open source, ajax, web architecture, clearnova, clear nova
    
ClearNova
Published By: Creekpath     Published Date: Aug 21, 2009
Supply chain storage management has become universally accepted in the marketplace as the umbrella term for the processes, methodologies and metrics that enable an enterprise to manage and monitor the results of its business activities. Can IT Operations Storage Management utilize the lessons of Supply Chain Management to realize business benefit?
Tags : 
supply chain, storage management, storage, storage operations management, storage infrastructure, cost control, creekpath
    
Creekpath
Published By: DataSynapse     Published Date: Feb 26, 2007
This brief examines how application virtualization can compress the development and test cycle, accelerating time-to-market, while reducing risk and complexity.  This brief highlights the impact of centralized command and control of application deployment and execution.
Tags : 
software development, quality assurance, software testing, return on investment, project management, data synapse, datasynapse
    
DataSynapse
Published By: DataSynapse     Published Date: Feb 26, 2007
This technical white paper reviews the principal tenets of application virtualization; freeing application configurations from OS and infrastructure; gaining centralized command and control over system resources; and dynamically allocating resources to applications based on demand. 
Tags : 
infrastructure, interoperability, load balancing, utility computing, business continuity, enterprise applications, application integration, data synapse, datasynapse
    
DataSynapse
Published By: Desktop Sites     Published Date: Aug 21, 2009
Konect is a powerful and cost-effective serverware solution for the growing application deployment and support demands placed on IT administrators in small and mid-size businesses.
Tags : 
application deployment, deploy applications, app deployment, serverware, konect, small business, smb, smbs, it spending, cost control, it management, it administrator, desktopsites, desktop sites
    
Desktop Sites
Published By: Data Guard Systems     Published Date: Aug 21, 2009
The best way to take control of employee management is to automate human resource (HR) processes, including time tracking, schedules, and payroll calculation. This document addresses the key points that cellular retailers, wholesalers, and master agents need to know about implementing and using CellularManager's centralized web-based HR management system.
Tags : 
human resource, cell phone, cellular retailer, human resources, cellularmanager, cellular manager, data guard, data guard systems
    
Data Guard Systems
Published By: FRx Software     Published Date: Aug 21, 2009
Ultimately, it all adds up to one thing: lack of control. You need more control over the amount of time it takes to put the budget together, more control over how long it takes to make a change in the budget whenever it's needed, more control over the accuracy of the data, and more control over who can access that data.
Tags : 
budgeting, budget, excel, accounting, finance, frx software, enterprise resource planning, erp, frx
    
FRx Software
Published By: Groundwork Open Source     Published Date: Aug 21, 2009
GroundWork has integrated best of breed open source tools, including Nagios 2.0, RRDtool, and MySQL with GroundWork-developed open source projects into a comprehensive suite for monitoring your entire IT infrastructure including servers, applications, and network devices. Download this white paper to learn more.
Tags : 
open source, open view, openview, network monitoring, infrastructure monitoring, monitoring, infrastructure, linux, unix, groundwork, groundwork open source
    
Groundwork Open Source
Published By: IBM     Published Date: Feb 08, 2008
Point of service is the key to every retail operation. But with e-mail marketing, in-store/self-service kiosks and more, the definition of point of service is changing. These changes create a unique opportunity to utilize advanced technologies to improve the customer experience. The IBM Retail Environment for SUSE LINUX (IRES) is designed to help retailers do just this -- while generating higher profits.
Tags : 
pos, point of service, tco, marketing, customer experience, increase sales, profitability, retail, cost control, ibm
    
IBM
Start   Previous    63 64 65 66 67 68 69 70 71 72 73 74 75 76 77    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.