federation

Results 1 - 25 of 43Sort Results By: Published Date | Title | Company Name
Published By: ASG Software Solutions     Published Date: Jul 20, 2009
Managing service delivery in todayís complex and dynamic business environments demands new and different approaches from IT. The explosive growth and the rate of change of information has brought particularly daunting challenges for IT that have contributed to incredibly complex underlying infrastructures. To get a true picture of all of the components necessary to support an IT or Business Service, you must access and bring together data that resides in disparate data silos throughout the enterprise.
Tags : 
asg, sla, cmdb, bsm, metadata, itsm, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization
    
ASG Software Solutions
Published By: HPE     Published Date: Jan 04, 2016
EMC to 3PAR Online Import Utility leverages storage federation and Peer Motion to migrate data from EMC Clariion CX4 and VNX systems to HP 3PAR StoreServ. In this ChalkTalk, HPStorageGuy Calvin Zito gives an overview.
Tags : 
    
HPE
Published By: SAS     Published Date: Jan 17, 2018
Executives, managers and information workers have all come to respect the role that data management plays in the success of their organizations. But organizations don’t always do a good job of communicating and encouraging better ways of managing information. In this e-book you will find easy to digest resources on the value and importance of data preparation, data governance, data integration, data quality, data federation, streaming data, and master data management.
Tags : 
    
SAS
Published By: Citrix     Published Date: Sep 28, 2016
Enterprises looking to simplify and reduce the costs and risks associated with user remote access to Internal and cloud enterprise applications can achieve their goals via the single sign- on capabilities of NetScaler 11.0’s Unified Gateway.
Tags : 
security, security application, security access, netscaler unified gateway
    
Citrix
Published By: Citrix     Published Date: Sep 30, 2016
Today’s users expect to access their apps and data from anywhere and on any device.
Tags : 
unified gateway, app, data, netscaler unified gateway, security, security management
    
Citrix
Published By: Dell EMC     Published Date: Nov 02, 2015
The Federation Enterprise Hybrid Cloud Solution presents organizations with a best-of-breed, converged solution, which ensures ease of integration and support, IT operational excellence, and faster time to value.
Tags : 
emc, esg, hybrid cloud, data, enterprise, it management, data management, business technology, data center, data visualization
    
Dell EMC
Published By: Juniper Networks     Published Date: Aug 10, 2017
To maximize the benefits of its next-generation systems and successfully execute its information strategy, CU had to overcome its aging network. Most of CU’s network infrastructure, which was built from solutions by another vendor, was introduced in 2007, when its computing center was first built. Over time, the equipment began to fail, affecting the stability of applications which relied on network connectivity. Technical support also became a major issue as the equipment faced obsolescence and maintenance contracts with vendors expired.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Juniper Networks
Published By: IBM     Published Date: Oct 26, 2017
Web applications are often the most vulnerable part of a company’s infrastructure and yet are typically given direct paths to the internet, thus leaving these vulnerabilities exposed. IBM commissioned Tolly to evaluate IBM Security Access Manager for its Web protection effectiveness and performance as well as its identity federation, risk management and mobile one-time password capabilities. Tolly found that IBM Security Access Manager provided effective, high-performance threat protection while conveniently providing identity federation features and flexible risk-based access options.
Tags : 
access manager, identity federation, risk management, authentication capabilities, threat protection
    
IBM
Published By: Citrix Systems     Published Date: Jul 25, 2016
For many enterprises, the solution is a centralized single sign-on (SSO) infrastructure that leverages the enterprise directory with federation, multifactor authentication and centralized access control to give users one URL and login to access all their enterprise applications and services--without having to type in another URL or enter credentials a second time. At the same time, it provides IT with a single identity, access control and management infrastructure, closing the inevitable security and management gaps inherent in juggling multiple gateway solutions. Such a solution would offer the best of all worlds, combining enhanced user productivity with IT efficiency, cost effectiveness, security and compliance.
Tags : 
    
Citrix Systems
Published By: Diligent     Published Date: Jul 10, 2017
The Corporate Secretaries International Association (CSIA) is a Geneva-registered global organisation whose mission is ‘‘to develop and grow the study and practice of Secretaryship, to improve professional standards, the quality of governance practice and organisational performance.’’ CSIA was established in 2010 as a not-for-profit organisation committed to improving the recognition and understanding of the practice of corporate secretaryship and the role of the corporate secretary. Its structure as an international federation of professional bodies enables it to effectively represent those practitioners who work at the frontline of governance.
Tags : 
communication, client-agency relationships, budgeting, digital marketing, personal relation improvement, resource management
    
Diligent
Published By: SAS     Published Date: Sep 19, 2018
We are offering this second edition resource as a business oriented, working guide to core data management practices. In this ebook you will find easy to digest resources on the value and importance of data preparation, data governance, data integration, data quality, data federation, streaming data, and master data management.
Tags : 
    
SAS
Published By: F5 Networks Inc     Published Date: Jan 03, 2014
Today, the shift to a cloud-based enterprise IT architecture is a foregone conclusion for a variety of organizations. As a result, cloud-based security has become a top priority. Read this whitepaper to learn about the challenges of cloud-based security and identity and access management as well as how your business can overcome these challenges with best-in-class solutions.
Tags : 
idc, cloud, cloud federation, identity and access management, iam, security, silos, deployment
    
F5 Networks Inc
Published By: Burton Group     Published Date: Jul 07, 2008
The identity federation market enjoys an exceptional supply of products. With well over a dozen products available to enterprise customers, most architects have more choices than time will allow for evaluation. This abundance of products is partly the result of the inherent difficulty of developing a truly multipurpose federation server. Although federation products are similar in name, each has its own personality and idiosyncrasies that make it suitable for certain environments but insufficient in others.
Tags : 
fim, federated identity management, identity federation, access control, identity management, passport, burton group, networking
    
Burton Group
Published By: Gigya     Published Date: Jun 08, 2015
As channels fragment and consumer identities multiply, businesses are struggling to achieve a single customer view. This guide provides actionable strategies to achieve this “holy grail” to better understand your audience, build relevant experiences and grow customer relationships. Get tactics and examples to help you: Identify your customers across channels and devices Manage today's volume and variety of customer data Integrate and apply data across marketing campaigns Build more personalized customer journeys
Tags : 
customer data management, single customer view, cross channel, marketing segmentation, sso, federation, registration as a service, social login, first-party data, integrations, identity compliance and security
    
Gigya
Published By: Gigya     Published Date: Jun 08, 2015
Marketers are struggling to connect with consumers across all available outlets while still providing an aligned customer experience. The white paper examines three key ways to create a successful omni-channel experience while establishing cohesive brand and customer identities. Learn how to: Develop an interactive mobile strategy Streamline physical and digital interactions Engage customers across channels
Tags : 
customer data management, single customer view, cross channel, marketing segmentation, sso, federation, registration as a service, social login, first-party data, integrations, identity compliance and security
    
Gigya
Published By: Okta     Published Date: Mar 09, 2015
Many companies believe Active Directory Federation Services (AD FS) is the best choice for applications to integrate with AD. After all, both Active Directory and AD FS are from Microsoft and AD FS is 'free,' so that should be the best choice, right? Not quite. it’s important to realize that not all Active Directory integration solutions are created equal, and IT departments should examine all aspects of implementation when considering a solution. Read this whitepaper and learn what to examine when integrating cloud applications to AD via AD FS.
Tags : 
active directory federation services, integration, it departments, cloud-based identity, access management service, web-based application integrations, it management
    
Okta
Published By: EMC Corporation     Published Date: Dec 01, 2014
The Solution Guide provides an introduction to data protection through continuous availability. The guide enables you to begin the planning and design of continuous availability for a Federation Software-Defined Center solution.
Tags : 
software-defined data center, data protection, planning and design, continuous availability, data center
    
EMC Corporation
Published By: HP and Intel® Xeon® processor     Published Date: Feb 10, 2012
This white paper sponsored by HP + Intel evaluates a solution that aims to enable the movement of data without physical limitations. Read now and see how this could enable agility and efficiency.
Tags : 
intel, storage, 2.0, infrastructure, trends, storage, flexibility, drivers, market dynamics, trends, converged, custom requirement, deduplication, tiering, protocol, foundation, supply chain, integrated strategy, archival storage
    
HP and Intel® Xeon® processor
Published By: Okta     Published Date: Nov 09, 2015
Many companies believe Active Directory Federation Services (ADFS) is the best choice for applications to integrate with AD. After all, both Active Directory and ADFS are from Microsoft and ADFS is 'free,' so that should be the best choice, right? Not quite. Read this whitepaper and learn what to examine when integrating cloud applications to AD via ADFS.
Tags : 
okta, adfs, microsoft, active directory, hidden costs, security, knowledge management, data management, business technology
    
Okta
Published By: IBM     Published Date: Feb 08, 2008
Empower consumers. Increase productivity. Profitably compete in a saturated market. Today, mid-sized retailers need powerful tools to conquer a turbulent environment. IBM can help with tailored solutions. Click for information and a complimentary copy of National Retail Federations's report, Deeper Customer Insight - an in-depth look at five retail megatrends of 2010.
Tags : 
market trends, market, sales, sales trends, trends, intelligence, retail, retailing, ibm
    
IBM
Published By: Agile IT     Published Date: May 13, 2014
The American Federation of Government Employees (AFGE) is the largest federal labor union, representing close to 650,000 federal government employees. Since the organization was looking for a cost-effective solution to upgrade its mail system and communication environment, and its users were already familiar with Microsoft programs, the organization looked to migrate to Microsoft Office 365 with the help of Agile IT.
Tags : 
federal labor union, office 365, agile it, networking, it management, knowledge management, enterprise applications, platforms, business technology
    
Agile IT
Published By: Dell EMC     Published Date: May 29, 2015
This paper covers key areas in which enterprises can further extend the value of their Federation Enterprise Hybrid Cloud solution—and how IT can leverage it as they take the next steps toward a more comprehensive IT as a Service model.
Tags : 
hybrid cloud, hardware, software, hardware, service center
    
Dell EMC
Published By: Dell EMC     Published Date: Jul 27, 2015
This paper covers key areas in which enterprises can further extend the value of their Federation Enterprise Hybrid Cloud solution—and how IT can leverage it as they take the next steps toward a more comprehensive IT as a Service model.
Tags : 
hybrid cloud solutions, it solutions, itaas, public cloud services
    
Dell EMC
Published By: Ping Identity     Published Date: May 05, 2009
This white paper, intended for a management-level audience, describes why and how any organization can implement secure Internet single sign-on with a federated identity management system. Learn more today!
Tags : 
pingidentity, sso, secure internet, single sign-on, federated identity management system, software as a service, saas, business process outsourcing, bpo, ciso, attack, threats, personally-identifiable information, pii, trojan, virus, proprietary security mechanisms, crypto libraries, security assertion markup language, saml
    
Ping Identity
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Previous   1 2    Next    
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com