control

Results 1951 - 1975 of 2105Sort Results By: Published Date | Title | Company Name
Published By: e-DMZ Security LLC     Published Date: Sep 27, 2010
This white paper discusses key issues and offers innovative solutions to support granting access to production resources.
Tags : 
e-dmz security. emergency access, production access, access control, compliance, developer access, mission-critical, business-critical, datacenter security
    
e-DMZ Security LLC
Published By: Okta     Published Date: May 07, 2015
Bring Your Own Device (BYOD) can be a very polarizing topic for IT. Some view it as a solution that can save money, improve end user satisfaction, and enable remote employees. For others, BYOD represents risk of data leakage, loss of control, and signing up to support an endless ecosystem of unknown devices. No matter what your opinion on BYOD is, the impact on IT policy cannot be overstated. Through 2017, Gartner reports that 90% of organizations will support some aspect of BYOD. Read this eGuide and learn how you can address several new BYOD challenges facing IT.
Tags : 
byod, okta, mobility, safety, dad, mobility management
    
Okta
Published By: Okta     Published Date: Jul 01, 2015
To manage and control how the airport's employees make use of these cloud-computing services, Gatwick has turned to the cloud-based identity management service from Okta, which lets the security manager centrally manage, provision and de-provision single sign-on access to cloud services for Gatwick's staff. Watch this short video to see Gatwick's story.
Tags : 
    
Okta
Published By: Ariba     Published Date: Mar 30, 2011
Read this e-book to learn how the Ariba Commerce Cloud can help companies transform their results by controlling and optimizing business relationships for maximum efficiency and effective financial performance.
Tags : 
ariba, commerce cloud, success stories
    
Ariba
Published By: Lumension     Published Date: Mar 28, 2011
Learn three strategies to effectively take control of organizational endpoints and mitigate the rising risk from application viruses in this whitepaper.
Tags : 
lumension, organizational endpoint, risk mitigation, application virus, operating system, microsoft
    
Lumension
Published By: Lumension     Published Date: Jan 22, 2013
Keeping track of 10,000+ of anything is a management nightmare. With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control
    
Lumension
Published By: QFilter.com     Published Date: Nov 23, 2010
The dangers posed by industrial Dust Explosions can affect a wide range of different industries. This article examines the topic, and gives recommendations on how to prevents such incidents from occurring.
Tags : 
dust explosions, dust control, dust safety, dust hazards, dust collection
    
QFilter.com
Published By: WIN Enterprises     Published Date: Dec 01, 2010
Brief white paper to help people understand the definition of the embedded industry
Tags : 
embedded, motherboards, single board computers, sbc, mobile computing, industrial control
    
WIN Enterprises
Published By: AVIDwireless     Published Date: Dec 10, 2010
A look at environmental monitoring in a Connected World, using wireless remote monitoring and control
Tags : 
wireless environmental monitoring, m2m, connected world, wireless sensors, wireless m2m, wireless remote monitoring and control
    
AVIDwireless
Published By: Red Hat     Published Date: Jan 21, 2011
Daniel Walsh - Principal Software Engineer, Red Hat In this session, Daniel Walsh will show attendees new SELinux features and explain how to use them in Red Hat Enterprise Linux 6. He will cover several SELinux topics, including: * Confining users * Securing your virtual environment * Securing the desktop * Controlling grid jobs * Sandboxing: putting the power into the hands of the administrator * Building and shipping your own SELinux policy
Tags : 
red hat virtual tradeshow, live event, enterprise linux 6, security, desktop, selinux, virtual environment
    
Red Hat
Published By: Intacct Corporation     Published Date: Nov 21, 2011
If you need improved functionality and automation, tighter internal controls, and greater visibility, it may be time to switch to a new accounting system. How can you be sure?
Tags : 
quickbooks, functionality, automation controls, visibility, accounting, financials
    
Intacct Corporation
Published By: HMS SOftware     Published Date: Jan 17, 2011
How to maximize your R & D tax benefits by using TimeControl, a project timesheet system
Tags : 
timesheet, research and documentation, r&d timesheet, r&d tax credit, r&d software
    
HMS SOftware
Published By: BP Logix     Published Date: Jan 17, 2011
This white paper covers how time is the critical element of the planning, oversight, and improvement of business processes. Learn how business users can gain ultimate control making processes more effective.
Tags : 
bpm, business process management, process management, worklfow
    
BP Logix
Published By: e-LYNXX Corporation     Published Date: Feb 25, 2011
AVS Technology's automated vendor selection procedure creates a competitive bidding environment that encourages bidders to reduce their pricing by 25% to 50% to fill production gaps.
Tags : 
avs technology, new procurement process
    
e-LYNXX Corporation
Published By: NavAscend     Published Date: Mar 02, 2011
Introducing Sequoia ITSM: A better way to manage a technology organization end-to-end, control of work load and work flow at your finger tips, with creditable business intelligence, in real time.
Tags : 
itsm, itil, bpm, bpm, lombardi, sequoia, navascend, ibm, vmc, catalog, dashboard, scorecard, services, slm, incident, problem, change, task, request, self help
    
NavAscend
Published By: Radiant Logic, Inc     Published Date: Mar 21, 2011
How Virtualization Addresses the Challenges of Authentication and Authorization Across Disparate User Directories.
Tags : 
access control, active directory, authentication, directory services, ldap, security policies, sso, systems management, virtualization security, web services management, radiantone, virtual directories, sun directory substitution
    
Radiant Logic, Inc
Published By: DiJiPOP     Published Date: Mar 22, 2011
A 1-sheet detailing our offer to online retailers.
Tags : 
digital shopper marketing, ecommerce media
    
DiJiPOP
Published By: Qualys     Published Date: Apr 05, 2011
This guide explains how QualysGuard PC automates the "C" in GRCM by automatically scanning all assets, collecting operating system configuration and application access controls, mapping these to IT policy, and documenting compliance.
Tags : 
it data collection, it compliance, grcm controls, qualys, qualysguard pc, gcc, automated general computer control, legacy, it risk, policy editor, saas
    
Qualys
Published By: Avocent     Published Date: Aug 22, 2011
Enterprise Management Associates® (EMAT) analysts explore a pragmatic view of data center management in order to deliver the best practices in real-world data centers for over-arching management solutions.
Tags : 
avocent, data center manangement control, centralized data center manageability, ema™, enterprise management associates ®, effective it managementm, interoperability, availability, kpis, data center
    
Avocent
Published By: Avocent     Published Date: Aug 22, 2011
Download this whitepaper to learn how to achieve secure access to any server or network device from a single interface.
Tags : 
avocent, centralized management software, best practices, data center control, secure access, remote maintenance, kvm server management, full remote access, power management, data center
    
Avocent
Published By: dvsAnalytics     Published Date: Apr 20, 2011
Due to increasingly strict federal, state, and industry regulations aimed at protecting health & financial information, an understanding of the required rules and standards and how they relate to call recording is critical
Tags : 
hipaa, pci dss, nacha, audit logs, call recording, data encryption, user access controls, ephi, phi
    
dvsAnalytics
Published By: Spend Radar     Published Date: Apr 21, 2011
This white paper provides ten tips written by Brian Daniels and Rod True, both industry experts.
Tags : 
spend analysis, spend management, spend intelligence, spend optimization, spend audit, spend control
    
Spend Radar
Start   Previous    71 72 73 74 75 76 77 78 79 80 81 82 83 84 85    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.