user data management

Results 26 - 50 of 60Sort Results By: Published Date | Title | Company Name
Published By: Tripp Lite     Published Date: May 15, 2018
A Practical Guide to IDF/MDF Infrastructure Implementation Once relegated to early adopters and casual home users, VoIP (voice over Internet protocol) has matured. An essential element of any unified communications (UC) system, it is now the standard method of voice communication in business, education, government and healthcare. If your organization has not already migrated to VoIP, the question is not so much if it will, but when. Cost is the primary driver, since the data network performs double duty by carrying voice traffic as well. VoIP also offers capabilities that far exceed traditional phone systems, with unified communication platforms promising to integrate messaging, mobility, collaboration, relationship management, zoned security, intelligent call routing, disaster recovery, video, teleconferencing, status updates and other advanced features. The transition to VoIP presents a number of challenges, including assessing the ability of your network to handle not only additio
Tags : 
    
Tripp Lite
Published By: Gigya     Published Date: Jun 08, 2015
Download this guide to get a grasp of the latest trends in user data management.
Tags : 
user data management, big data, identity and access management, compliance, mobilizing identity data
    
Gigya
Published By: Pivotal CRM     Published Date: Dec 21, 2007
In this paper, learn how with the right CRM solution, information workers can increase productivity, improve customer service, and boost collaboration, while the business simplifies complex processes, increases sales, and reduces costs.
Tags : 
information worker, crm, microsoft, office, customer relationship management, user adoption, information management, data management, information overload, productivity, integration, pivotal, pivotal crm, quinstreet
    
Pivotal CRM
Published By: McAfee     Published Date: Oct 28, 2014
Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Vendors are improving threat intelligence and security analytics. Read this report from leading analyst firm Gartner, to learn why they have placed McAfee as a Leader in the Magic Quadrant for Security Information and Event Management.
Tags : 
siem, mcafee enterprise security manager, gartner, magic quadrant, threat management, collect, store, forensics and regulatory compliance
    
McAfee
Published By: Intuit, Inc     Published Date: Jun 16, 2009
Nearly every business person regardless of their role – be it marketer, salesperson, consultant, engineer, or business owner – has acquired a second responsibility: project manager. In their desire to move quickly and keep costs low, many of these business people turn to the ubiquitous spreadsheet for help. Using a spreadsheet to track, update, and consolidate project information means spending valuable time on project administration – sending, receiving, and finding e-mails; cutting, pasting, consolidating, and reporting information; and reformatting, saving, and e-mailing spreadsheets.
Tags : 
intuit, quickbase, project management, available, familiar, inexpensive, immediate, spreadsheets, certification, data management, data consolidation, data, workflow, multi-user access, scalable, data integrity, document management, security, audit, compliance
    
Intuit, Inc
Published By: NetIQ     Published Date: Jul 27, 2011
Listen in as Andras Cser, Principal Analyst at Forrester Research, speaks about trends he is seeing in the Identity & Access Management (IAM) market, and specifically about the challenges and benefits of user provisioning.
Tags : 
active directory, ad administration, netiq, compliance, active directory administration, user provisioning, reduce administrative priviledge, itpa, it process automation, security, active directory management, data protection, information security, identity management, identity and access management, staffing, provisioning, threat, iam, privilege delegation
    
NetIQ
Published By: VMware     Published Date: Oct 04, 2011
This eBook looks at the challenges involved in delivering and managing desktops, today and in the future. Its goal is to demonstrate how VMware desktop virtualization can deliver a solution to address the requirements of IT and end-users without compromise.
Tags : 
desktop management, technology, vmware, end-user, virtualization, data management
    
VMware
Published By: Dyn     Published Date: Feb 06, 2015
Whether you’re serving customers, partners, or internal users through two data centers or twenty, you want all users to have the best experience. Global load balancing (GLB) is the effective management and balancing of the Internet traffic to and from your data centers and cloud service providers and has become critical to growing enterprise ecommerce revenue, serving customers and empowering employee productivity.
Tags : 
glb, internet traffic, ecommerce revenue, employee productivity, cloud-based services
    
Dyn
Published By: Microsoft Azure     Published Date: Apr 11, 2018
When you extend the global reach of your enterprise, you’ll find new markets for your products and services. That means reaching more potential customers, bigger growth potential, and higher ROI. But to tap into those emerging markets, you need to provide the best, most consistent user experience. Now, it’s possible for you to build, deploy, and manage modern apps at scale with a globally-distributed database—without the hassles associated with hosting in your data center. Read the e-book Build Modern Apps with Big Data at a Global Scale and learn how Azure Cosmos DB, a globally-distributed turnkey database service, is transforming the world of modern data management. Keep access to your data available, consistent, and safe—with industry-leading, enterprise-grade security and compliance. Start developing the best app experience for your users based on five well-defined consistency models: Strong: Favors data consistency. Ideal for banks, e-commerce processing, and online booking. Boun
Tags : 
    
Microsoft Azure
Published By: AWS     Published Date: Nov 28, 2018
Financial institutions run on data: collecting it, analyzing it, delivering meaningful insights, and taking action in real time. As data volumes increase, organizations demand a scalable analytics platform that can meet the needs of data scientists and business users alike. However, managing an on-premises analytics environment for a large and diverse user base can become time-consuming, costly, and unwieldy. Tableau Server on Amazon Web Services (AWS) is helping major Financial Services organizations shift data visualization and analytics workloads to the cloud. The result is fewer hours spent on manual work and more time to ask deeper questions and launch new data analyses, with easily-scalable support for large numbers of users. In this webinar, you’ll hear how one major asset management company made the shift to cloud data visualization with Tableau Server on AWS. Discover lessons learned, best practices tailored to Financial Services organizations, and starting tactics for scalable analytics on the cloud.
Tags : 
    
AWS
Published By: Druva     Published Date: Jan 06, 2016
Compiled from real life use cases, Blue Hill Research examined how organizations are gaining greater value from their archive of user data, converging data availability, archiving and governance to meet their wider data management needs.
Tags : 
druva, blue hill, enterprise, archive, data, user data
    
Druva
Published By: Mimecast     Published Date: Apr 16, 2009
According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. if not more. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection. In addition to these challenges, IT departments want to know how to control costs of the email environment, while keeping important data accessible for business, legal and regulatory users.
Tags : 
mimecast, saas, email solutions, email managemeng, archiving, ediscovery, mailbox, compliance
    
Mimecast
Published By: Mimecast     Published Date: Feb 05, 2010
According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection.
Tags : 
mimecast, saas, software as a service, email archive, medium-size business, esg, storage
    
Mimecast
Published By: Intralinks     Published Date: Jan 16, 2015
The increased mobility of the workforce is changing the way we work. Business users want the flexibility to share and collaborate on content that drives their business while IT needs to ensure the security of that data, no matter where it goes. An effective enterprise collaboration solution must consider people, processes and technologies to be effective, but where to begin? This comprehensive Buyer’s Guide offers guidance on how to develop your organization’s requirements with regard to: Risk management – avoiding data breaches and loss of information that can result in non-compliance Business productivity - allowing for secure collaboration while enabling teams to work anywhere on any device IT efficiency - supporting the full breadth of external business content requirements while integrating with existing applications and protocols This Buyer’s Guide offers a holistic approach for your evaluation process by examining the granular aspects of enterprise file sharing, as well as i
Tags : 
collaboration solutions, risk management, business productivity, it efficiency, business users
    
Intralinks
Published By: Gigya     Published Date: Jun 20, 2014
As marketers the world over share conflicting stories of social triumph and trial in the pages of leading industry pubs, rumors run rampant across this largely uncharted marketing territory. We’re busting 5 major social marketing myths that have made their way into mainstream marketing lore, and revealing proven facts and strategies to help guide your social efforts and execution.
Tags : 
social login, gamification, social plugin, rating and review software, user management tool, social user management software, social customer tool, social consumer data, increase social engagement, consumer data management, permission based identity, single sign on, social consumer insights, big data marketing, data driven marketing , social marketing, social widget, social network plugin vendors, janrain, social annex
    
Gigya
Published By: SAS     Published Date: Sep 13, 2013
If businesses are recognizing the need for a dial-tone approach to establishing “data utility” services for meeting user expectations for data accessibility, availability and quality, it is incumbent upon the information management practitioners to ensure that the organization is properly prepared, from both a policy/process level and a technology level.
Tags : 
sas, cio, chief information officer, data utility, information management
    
SAS
Published By: ForgeRock     Published Date: Mar 10, 2015
In the modern age, customers are in control of when, where, and how they consume information. In this environment, customer-focused companies strive to make their content available to an ever-growing number of connected users and devices on a much larger scale than ever before, and to gather as much data and insight from these interactions as possible. To achieve this securely, companies need identity and access management (IAM) platforms that are adaptable, scalable, responsive, and high velocity— not typical characteristics of employee-facing IAM, but all too typical of other systems of engagement. This species of solution is worthy of a unique name: identity relationship management (IRM).
Tags : 
iam, irm, forrester, forgerock, platforms, relationship management
    
ForgeRock
Published By: IBM     Published Date: Jan 09, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. By aligning governance related policies and rules with all identity management processes, organizations can achieve continuous, sustainable compliance, thereby reducing the need for after the fact fixes and expensive, error prone manual remediation. IBM Security Identity Governance and Intelligence helps organizations effectively, comprehensively manage identities and application access
Tags : 
ibm, security, identity governance and intelligence, identity governance
    
IBM
Published By: IBM     Published Date: May 01, 2017
Endpoints continue to advance… Employees come and go... And the security landscape is in constant flux. IT leadership must rise to the challenge of managing a disparate and growing number of endpoints, operating systems, and platforms. The only efficient method of managing and securing all endpoints, their users, apps, content, and data is to implement and deploy a unified endpoint management (UEM) solution that changes and adapts with new technology, more skilled users, and increasingly sophisticated attacks by hackers. Read onward to learn why UEM is necessary, how it addresses complex problems encountered in the modern enterprise, and best practices for a successful deployment.
Tags : 
endpoints, employees, security landscape, security leaders, it security, unified endpoint management
    
IBM
Published By: nlyte Software     Published Date: Sep 30, 2014
This new Gartner report reviews 17 vendors of Data Center Infrastructure Management (DCIM) solutions. Based on its own expert analysis and backed up by in-depth interviews with users in the space, Gartner has just published the Magic Quadrant for Data Center Infrastructure Management Tools for the first time.
Tags : 
nlyte software, nlyte, data center, data center infrastructure, gartner report, infrastructure management
    
nlyte Software
Published By: IBM     Published Date: Jan 02, 2014
Business users need a simple but powerful way to navigate through data and find the insights to make timely, critical business decisions. Unfortunately, many users have become frustrated at their inability to quickly access and analyze the information they require. This data typically includes a combination of personal and corporate data locked in various enterprise systems. It exists in different formats and can be hard to analyze, change or share — making it difficult for people to get fast answers to business questions.
Tags : 
ibm, cognos insight guide, navigating data, interactivity, analytic functionality, enterprise analytics, personal analytics, customer service, business users, analytic solution, share data, performance management, supply chain management, customer relationship, cognos insight
    
IBM
Published By: IBM     Published Date: Mar 05, 2014
If you specialize in relational database management technology, you’ve probably heard a lot about “big data” and the open source Apache Hadoop project. Perhaps you’ve also heard about IBM’s new Big SQL technology, which enables IBM® InfoSphere® BigInsights™ users to query Hadoop data using industry-standard SQL. Curious? This paper introduces you to Big SQL, answering many of the common questions that relational database management system (DBMS) users have about this IBM technology.
Tags : 
ibm, big data, ibm big sql, sql, database management, database management technology, software, tables, queries, data platform, big sql architecture, programming language, relational database management system, rdbms
    
IBM
Published By: IBM     Published Date: Jul 13, 2015
This paper discusses how InfoSphere capabilities can be used to create comprehensive and accurate 3600 views of your customers from internal and external sources.
Tags : 
crm cloud solution, salesforce, user productivity, data enrichment, security, data quality, customer data search, customer relationship management, internet marketing, crm & customer care, e-commerce, sales
    
IBM
Published By: VMware     Published Date: Dec 27, 2016
With Windows 10, Microsoft brings to market a mobile and cloud-ready OS that is poised to have a significant impact on organizations’ end user computing (EUC) strategy. The modern OS offers a unified platform for building apps and extending the organization’s core processes to end users anywhere and using any Windows 10-powered device. However, enterprise wide execution of this business mobility vision comes with its own set of challenges. A 2015 VMware study involving 1,000+ IT decision makers identified the following top concerns for adoption of mobility initiatives: Reduce the overall cost and complexity of management Ensure security and control of devices at all times Minimize the risk of corporate data loss With a unified endpoint management vision, VMware AirWatch® is strategically positioned to address these challenges. AirWatch's EUC solution enables organizations to fully capitalize on their mobility initiatives and IT departments to redefine themselves as true business enab
Tags : 
    
VMware
Start   Previous    1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.