user management

Results 176 - 200 of 378Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: May 14, 2015
To leapfrog the competition, businesses must act immediately to capitalize on mobility.
Tags : 
mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod, cisco
    
Cisco
Published By: OnBase by Hyland     Published Date: Jun 29, 2015
Unstructured content annoys clinicians and staff. They have to find it. They have to wait for it. They have to worry about whether it’s been lost or misplaced. Turn that source of annoyance into a point of efficiency with enterprise content management (ECM) technology. Learn how to find your unstructured content, capture it and make it work for you.
Tags : 
user experience, enterprise content management, productivity, security, compliance
    
OnBase by Hyland
Published By: FICO     Published Date: Aug 14, 2015
To create a centralized and standardized, user-friendly system that enables internal and independent insurance agents to make precise and consistent policy quotes and uniform underwriting decisions, ACG adopted FICO's Blaze Advisor decision rules management system.
Tags : 
fico, analytics, solutions, decision management, rules management.
    
FICO
Published By: FICO     Published Date: Nov 10, 2015
"ACG Michigan, a large auto insurance underwriter in the US state of Michigan, needed a user-friendly system that would enable its agents (internal and independent) to churn out precise and consistent policy quotes and underwriting decisions. They turned to FICO Blaze Advisor decision rules management system to create an enterprise decision management framework to execute decisions. Learn more on how FICO Blaze Advisor helped ACG Michigan automate its underwriting About FICO FICO (NYSE: FICO), formerly known as Fair Isaac, is a leading analytics software company, helping businesses in 90+ countries make better decisions that drive higher levels of growth, profitability and customer satisfaction. The company's groundbreaking use of Big Data and mathematical algorithms to predict consumer behavior has transformed entire industries. FICO provides analytics software and tools used across multiple industries to manage risk, fight fraud, build more profitable customer relationships, optimiz
Tags : 
decision analytics, optimization, profitability
    
FICO
Published By: FICO     Published Date: Nov 10, 2015
ACG Michigan, a large auto insurance underwriter in the US state of Michigan, needed a user-friendly system that would enable its agents (internal and independent) to churn out precise and consistent policy quotes and underwriting decisions. They turned to FICO Blaze Advisor decision rules management system to create an enterprise decision management framework to execute decisions.
Tags : 
auto, insurance, underwriting
    
FICO
Published By: VMware     Published Date: Feb 24, 2017
As enterprises embrace adoption of Microsoft Office 365 to drive business and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between identity management and user experience is often difficult. In this white paper, discover how VMware AirWatch® Enterprise Mobility Management (EMM) can easily integrate with Office 365 APIs, VMware Identity Manager, and an enterprise’s existing cloud, or on-premise, identity management solution to optimize user experience and ensure data is secure across all devices and platforms.
Tags : 
    
VMware
Published By: VMware     Published Date: Aug 16, 2019
It can be stressful to be at the heart of your organization's digital transformation initiatives. You're the IT pro everyone is trusting to balance two top business priorities: maximizing end-user productivity and minimizing threats. Modern management ensures you can do both. Download this customer experience to learn how two IT leaders describe how they are improving employee productivity and addressing complex management issues head-on with a modern approach to management.
Tags : 
    
VMware
Published By: Equinix APAC     Published Date: Feb 25, 2019
Security and Resilience in Cloud, Hybrid and Multicloud Deployments This white paper describes the challenges and motivations facing cloud, hybrid and multicloud users as they consider how to deliver traditional levels of security and robustness, while maintaining the API-enabled virtues of flexibility and short lead-times of cloud-enabled IT. Key Highlights: • Critical considerations associated with cryptographic key management for multicloud users • Implement solutions that are capable of maintaining an always-on service
Tags : 
    
Equinix APAC
Published By: Oracle     Published Date: Nov 16, 2017
Two trends are pushing all lines of business—across all industries—toward cloud IT. First, IT is being stretched more than ever. IT organizations are expected to expand services and meet tighter SLAs while having fewer resources, personnel, and skills to work with. With the IT queue growing longer than ever, both IT and LOB leaders are interested in using the cloud to quickly deploy the services users need. For most IT organizations, the current way of doing business does not map to growth or enable the flexibility to compete in the digital age. Rigid and periodic hardware-refresh cycles cannot adequately scale, and applications built for on-premises resources using traditional development and management tools are no longer flexible enough to deliver the agility businesses need to grow or compete.
Tags : 
    
Oracle
Published By: Dell Software     Published Date: Jul 24, 2012
Quest Workspacetm Help Desk is a robust help desk solution for small to medium-sized businesses with complex network environments. It provides a powerful combination of management features integrated with a best-of-breed IT help desk platform. Use the help desk software to manage the ticket system workflows, dashboards, reporting and end-user self-service portals. Use the embedded management features within the help desk platform to proactively manage network events, desktops, servers and applications as well as resolve issues faster and more effectively.
Tags : 
help desk, active directory, resolve issues, reports, windows, iphone, priorituze requests, auto escalation, organizational data, customize reports, cuztomize dashboards, data fields, scriptlogic, quest software, itil, service levels, proactive event management
    
Dell Software
Published By: Dell Software     Published Date: Jul 24, 2012
Quest Workspacetm Privilege Manager lets IT administrators grant selected privileges to users so they can update their own PCs, reducing help desk calls while maintaining a secure network. Elevate and manage user rights quickly and precisely with our Validation Logic targeting technology. Use privilege elevation rules from the Privilege Authority Community Edition, or create your own rules and allow administrator-level access to only the applications, Windows processes and ActiveX controls you deem safe.
Tags : 
user access, network security, verify files, elevate activex, setup.exe, setup.msi, elevate applications, target workstations, target validation logic, delegate privilege management, access phone support, access email support, digital certificate verification, windows, activex
    
Dell Software
Published By: Dell Software     Published Date: Jul 25, 2012
Customization is the toughest part of maintaining an environment that keeps users productive. You have to make every desktop, whether physical or virtual, exactly right for each user without crushing IT administration resources that are already stretched to the limit.Quest Workspacetm Desktop Authority ®-part of Quest's User Workspace Management solution-gives you a single console to configure, manage, secure and support each user's unique workspace-including the most targeted mix possible of resources, security requirements, applications, peripherals and even Outlook settings-wherever that user logs in. Desktop Authority complements traditional desktop management-focused on software deployment and asset tracking-with true user environment management for companies of all sizes and all infrastructures.
Tags : 
desktop management, environment management, desktop authority, microsoft, web-based management, expertassist, user environment configuration, device security, real-time targetin engine, service packs, it infrastructure, patching, auditing
    
Dell Software
Published By: Dell Software     Published Date: Oct 23, 2012
Join Greg Shields of Concentrated Technology and Robert Crosley of Dell as they discuss some of the new approaches in integrating best-in-class user environment management solutions with whatever you already use to collect inventory.
Tags : 
user environment management, user-experience, inventory management
    
Dell Software
Published By: Okta     Published Date: Feb 24, 2015
With the exploding adoption of software-as-a-service (SaaS) applications, enterprise IT is fundamentally changing. While on-demand services provide tremendous ROI, they also introduce new challenges that must be overcome to truly capitalize on their potential. Identity management problems such as controlling who is granted access to which applications and data and how to control access to these applications leveraging on premise directories such as Active Directory, have become increasingly important. Single Sign-On and user management solutions that are optimized for the cloud are necessary to help address these challenges. This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : 
identity and access management, saas applications, single sign-on, active directory, management solutions
    
Okta
Published By: HP OMG Mobile Workforce     Published Date: Nov 27, 2012
This white paper explains how you can unleash the full potential of mobility - greater productivity, flexibility, and better economics - by unifying secure device access, user authentication, provisioning, and management.
Tags : 
byod, bring your own device, it infrastructure, mobile workforce, mobility
    
HP OMG Mobile Workforce
Published By: Kaseya     Published Date: Mar 12, 2015
From dealing with manual maintenance to user disruptions, Kaseya presents solutions to common IT systems management pain points in the healthcare industry.
Tags : 
healthcare, daily operations, health record system, practice management, coding software, health statistics, prescribing systems, healthcare providers
    
Kaseya
Published By: NETIQ     Published Date: Dec 03, 2013
A poll of CIOs and IT managers reports why departments must defend against complex internal and external threats while mitigating regulatory and compliance concerns. The results provide data about how enterprises view compliance.
Tags : 
security compliance, users access management, it management compliance
    
NETIQ
Published By: BMC Software     Published Date: Mar 17, 2014
Your people and business can do amazing things when technology runs at its best. The new ITSM experience helps organizations achieve greatness in today’s mobile, social and user-centric reality. Discover a better way for users to access service and support anywhere, anytime. Explore enhanced productivity for IT staff, and seamless integration across IT operation management systems. Download now.
Tags : 
bmc, itsm solutions, changing business, cloud, cios, software, it organizations, saas, mobile, social, on demand solutions
    
BMC Software
Published By: Wyng     Published Date: Jan 13, 2016
The explosion of User Generated Content, or UGC, has drastically shifted the way people interact with brands. And as brands turn to UGC in place of their brand produced content, there are new risks that come with the rewards. To help mitigate these potential legal issues, we have developed a guide with everything you need to know about rights management.
Tags : 
search marketing, email marketing, website development, emerging marketing, social media, advertising agencies, internet marketing, crm & customer care, e-commerce, traditional marketing, sales
    
Wyng
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jan 10, 2017
Mobile is the new normal for users to connect and consume content, you need to consider apps, mobile integration,security, analytics, development tools, life-cycle management, various mobile stakeholders, and the overall enterprise mobile ecosystem.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Adobe     Published Date: Sep 23, 2019
IDC surveyed users of Adobe Experience Manager Sites and found substantial ROI WHY SHOULD THE TARGET AUDIENCE CARE? A modern digital experience management platform is essential for any organization hoping to make digital experience delivery a core competency. SUPPORTING CONCEPTS: According to IDC's analysis, AEM Sites enables organizations to realize on average annual business value of $3.92 million per organization over three years and a 348% three-year ROI by: — Making the creation and delivery of digital experiences more consistent and streamlined and accelerating time to market for new experiences — Empowering - and increasing the productivity of - employees responsible for digital experiences — Improving the digital customer experiences organizations deliver, thereby increasing engagement levels and generating additional business
Tags : 
    
Adobe
Published By: IBM     Published Date: Sep 10, 2009
IDC studied 14 mobile and fixed-line service providers that implemented Tivoli Netcool and found that IBM Tivoli Netcool can help in big ways. It reduces costs by improving operational efficiencies and still allows you to deliver a high-quality custom management.
Tags : 
ibm, tivoli, netcool, roi, future proofing, data integration, operations productivity, cost reduction, user productivity, business value analysis, performance management, service quality management, and network fault management, cost efficiencies from consolidation, operations staff productivity, integrated solution
    
IBM
Published By: IBM     Published Date: Sep 11, 2009
Discover the hidden dangers posed by privileged users and the damages they have caused. This webcast features two senior analysts from Burton Group Identity and Privacy Strategies, as well as IBM identity and access management solutions address this security and compliance challenge.
Tags : 
ibm, access management solutions, christopher bauseman, ibm tivoli software, lori rowland, senior analyst, mark diodati
    
IBM
Published By: Stratus Technologies     Published Date: Jun 16, 2009
"Time is money. You can't do business if you can't access your applications. I won't settle for anything less than 99.99% application availability." Steven Sommer, veteran CIO/CTO There is no aspect more critical to a business than the ability of its end users, customers, business partners and suppliers to have high availability access the corporate applications. If applications are unavailable, business ceases. And corporations know it.
Tags : 
c-level, stratus, itic, end users, customers, partners, high availability, corporate applications, service oriented architecture, soa, web based applications, afcom, uptime, continuous availability, servers, downtime, big iron, return on investment, roi, slas
    
Stratus Technologies
Published By: Aveksa     Published Date: Feb 04, 2008
User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.
Tags : 
access control, user access, access, permissions, risk, risk management, compliance, governance, aveksa
    
Aveksa
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.