user access

Results 1 - 25 of 301Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Sep 25, 2017
Managing privileged users is a continuous and critical process. First, you must discover where your admin accounts are and eliminate improper privileges and orphan accounts. Next, you must enforce your least-privilege policies for these users and eliminate shared accounts—this is called privileged access management (PAM). Lastly, you must govern privileged access to avoid entitlement creep and to ensure that each user still needs any elevated privileges that they have. If any one of these essential capabilities are weak or missing, your overall risk of breach or insider threat rises significantly.
Tags : 
integration, developers, open enterprise, api, business, ca technologies
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Available as a rack-mounted, hardened hardware appliance, an Open Virtualization Format (OVF) Virtual Appliance or an Amazon Machine Instance (AMI), CA Privileged Access Manager enhances security by protecting sensitive administrative credentials, such as root and administrator passwords, controlling privileged user access and proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.
Tags : 
cloud applications, infrastructure, optimization, automation tools, administrative power, ca technologies
    
CA Technologies
Published By: IBM     Published Date: Oct 26, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. As enterprises rapidly expand their footprints into cloud, mobile and social, they must ensure that the right users have the right access to sensitive data and applications. Strong as well as optimized identities are becoming increasingly important as insider threat and tightened regulations become more prevalent.
Tags : 
identity governance, security threats, user access, cloud security, identity management
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
In today’s complex and distributed IT environments, identity and access management (IAM) programs do much more than simply manage user identities and grant access. They are at the core of achieving critical business objectives that are relevant to every high-performing organization. As a result, there are few IT or security initiatives that demand as much deliberation and scrutiny.
Tags : 
identity management, access management, it environments, data security, business performance
    
IBM
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
As the threat landscape continues to evolve, you need a practical and robust way to protect privileged access in your enterprise. Analytics that detect new threats and automatically mitigate them are a great way to achieve this. By following these four key steps as you build a PAM threat analytics solution, you’ll be able to establish a more comprehensive and effective approach for addressing internal and external security threats.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
Available as a rack-mounted, hardened hardware appliance, an Open Virtualization Format (OVF) Virtual Appliance or an Amazon Machine Instance (AMI), CA Privileged Access Manager enhances security by protecting sensitive administrative credentials, such as root and administrator passwords, controlling privileged user access and proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
For organizations with additional security requirements for high value servers hosting business-critical assets, CA Privileged Access Manager Server Control provides localized, fine-grained access control and protection over operating system-level access and application-level access. Agent-based, kernel-level protection is available for individual files, folders and specific commands based on policy and/or finedgrained controls on specific hosts.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
Understanding, managing and containing risk has become a critical factor for many organizations as they plot their hybrid architecture strategy. Access by an expanding array of privileged identities looms large as a risk concern once organizations look beyond tactically using cloud services for cost and agility efficiencies. Existing approaches developed for static infrastructure can address initial risk concerns, but fall short in providing consistent policy enforcement and continuous visibility for dynamic, distributed infrastructure.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: Oracle Hardware     Published Date: Oct 20, 2017
ESG Lab evaluated the Zero Data Loss Recovery Appliance from Oracle with a focus on its ability to deliver reliable data protection by recovering Oracle databases to any point in time with sub-second RPO in a highly scalable scale-out solution that is easy to use and manage. Year after year, ESG respondents consistently cite improving data backup and recovery among the top IT priorities in our annual spending intentions survey (including 2016’s iteration). Why? Because when unforeseen infrastructure failures or data corruptions occur, the ability to restore not only business-critical information but also application and end-user access to that information become paramount. Lost or prolonged inaccessibility to business-critical data and applications most often means lost revenue and productivity to the business, and possibly the inability to meet regulatory requirements.
Tags : 
    
Oracle Hardware
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Find out how companies have deployed remote access SSL VPNs to increase remote user satisfaction, improve accessibility to corporate resources, support business continuity planning, and reduce overall implementation and ongoing management costs. The white paper also covers how cloud-based SSL VPN services address high availability requirements, support unforeseen spikes in activity and optimize network performance. Lastly, learn how a single SSL VPN platform can support all your mobile access, telecommuting and partner extranet requirements to improve your ROI.
Tags : 
virtela, healthcare, remote user satisfaction, roi
    
Virtela Communications, Inc.
Published By: Coyote Point Systems     Published Date: Sep 07, 2010
If your organization's servers run applications that are critical to your business, chances are that you'd benefit from an application delivery solution. Today's Web applications can be delivered to users anywhere in the world and the devices used to access Web applications have become quite diverse.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking
    
Coyote Point Systems
Published By: Entrust Datacard     Published Date: Mar 20, 2017
As digital business evolves, however, we’re finding that the best form of security and enablement will likely remove any real responsibility from users. They will not be required to carry tokens, recall passwords or execute on any security routines. Leveraging machine learning, artificial intelligence, device identity and other technologies will make security stronger, yet far more transparent. From a security standpoint, this will lead to better outcomes for enterprises in terms of breach prevention and data protection. Just as important, however, it will enable authorized users in new ways. They will be able to access the networks, data and collaboration tools they need without friction, saving time and frustration. More time drives increased employee productivity and frictionless access to critical data leads to business agility. Leveraging cloud, mobile and Internet of Things (IoT) infrastructures, enterprises will be able to transform key metrics such as productivity, profitabilit
Tags : 
    
Entrust Datacard
Published By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017
In the past, desktops, business apps, and critical infrastructure were all located behind the firewall. Today, more and more is happening off-network. More roaming users. More corporate owned laptops accessing the internet from other networks. More cloud apps, mean that users don’t need to be on the corporate network to get work done. And more branch offices connecting directly to the internet.
Tags : 
visibility, protection, deployment, management, platform, integration, cloud, infrastructure
    
Cisco EMEA Tier 3 ABM
Published By: Akamai Technologies     Published Date: Feb 23, 2017
99tests offers a cloud-based, crowd-sourced testing platform where users can be anywhere in the world. Providing secure, simple, and convenient remote access was a key challenge. Read the case study to see how the Akamai helped 99tests provide simple, secure access to their application.
Tags : 
99tests, cloud-based, crowd-sourced, testing, platform, remote access, application
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Feb 23, 2017
BitSight relied on a key piece of software for business. As the number of software users grew, the complexity of deploying, managing, and maintaining a VPN infrastructure became a big, ongoing headache for IT. Read the case study to see how Akamai helped BitSight solve their access issues.
Tags : 
bitsight, software, vpn, infrastructure, access, remote
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Feb 23, 2017
Microsoft’s SharePoint Platform is used by tens of thousands of enterprises worldwide to share information with employees and third parties. Many of these users access Sharepoint remotely, which is cumbersome and put the enterprise at risk. Read this paper to learn three reasons why IT needs a new approach to third-party access to Sharepoint.
Tags : 
third-party, access, sharepoint, platform, remote, enterprise
    
Akamai Technologies
Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
CA Privileged Access Manager améliore la sécurité IT, l’efficacité opérationnelle et la conformité avec la réglementation en protégeant les informations d’identification à forts privilèges, en défendant les ressources à forts privilèges et en supervisant, contrôlant et gérant de façon efficace les activités à forts privilèges.
Tags : 
identifiants administratifs, identification à forts privilèges, activités à forts privilèges, sécurité, entreprise hybride, infrastructure de l’entreprise, violations de données, menaces internes
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
Le présent rapport fournit un schéma directeur permettant de déterminer les coûts directs, indirects et cachés du déploiement d’une telle solution au fil du temps.
Tags : 
identification à forts privilèges, activités à forts privilèges, sécurité, entreprise, violations de données, menaces internes, infrastructure de l’entreprise, privileged user access
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
Au cours de ces dernières années, la gestion des accès à forts privilèges, un processus englobant différentes fonctionnalités de contrôle, de supervision et d’audit visant à réduire les risques associés aux utilisateurs, aux comptes et aux identifiants à forts privilèges, est devenue une priorité majeure pour les entreprises et organisations de tous secteurs. Cet intérêt accru est motivé par différents facteurs.
Tags : 
identification à forts privilèges, activités à forts privilèges, sécurité, entreprise, violations de données, menaces internes, infrastructure de l’entreprise, privileged user access
    
CA Technologies EMEA
Published By: Dell EMC     Published Date: Nov 04, 2016
Abstract: Dell EMC VxRail, powered by Intel® Xeon® processors, is the only fully integrated VMware hyper-converged infrastructure appliance, delivering a turnkey solution that simplifies and extends VMware environments. Streamline IT infrastructure, gain new levels of speed and performance to enhance the end-user experience, and spend more time on innovation. Plus, Dell EMC VxRail is more than 30% lower total cost of ownership compared to a build-your-own solution. This report looks at: • Super-fast deployment and scalability • Take on enterprise workloads and deliver a smooth yet powerful user experience • Keep peace of mind with accessibility and immediate issue alerts This report shows how you can streamline IT infrastructure, achieve new levels of speed and performance to improve end-user experiences, and allow extra time for innovation. Learn more, read this brief but interesting infographic.
Tags : 
it infrastructure, hyper-convergence, next-gen, storage, virtual machines, scale-out
    
Dell EMC
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com