iam

Results 151 - 175 of 257Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Apr 16, 2018
O gerenciamento de banco de dados é caro e complicado. Conforme aumenta o número de aplicativos e bancos de dados, os custos e complicações podem multiplicar-se. Uma solução, seria um sistema de hardware e software projetado especificamente para que o software de banco de dados otimize as operações de banco de dados, tanto para o desempenho quanto para a simplificação administrativa. O Oracle Exadata é a única plataforma que proporciona desempenho ideal do banco de dados e eficiência para dados mistos, análises e cargas de trabalho OLTP. Com uma gama completa de opções de implantação, ele permite que você execute seu banco de dados Oracle e cargas de trabalho de dados onde e como desejar — on-premise, na nuvem da Oracle, na nuvem do Cliente em seu data center ou em qualquer combinação desses modelos.
Tags : 
executar, banco, dados, oracle, exadata
    
Oracle
Published By: Forcepoint     Published Date: Apr 19, 2016
As consequências financeiras e jurídicas dos ciberincidentes de alta visibilidade ocorridos no passado enviam uma mensagem incontestável: o furto de dados é importante demais para que o conselho de administração não se envolva. O relatório "Cibersegurança e Prevenção contra Furto de Dados" fornece uma visão geral não técnica que todo conselho de administração pode usar para avaliar a abordagem de segurança da organização.
Tags : 
    
Forcepoint
Published By: Zebra Technologies     Published Date: Jun 07, 2017
A Zebra Technologies analisou o estado da indústria de hospitalidade e conduziu dois estudos de pesquisa. O primeiro estudo foi voltado para a indústria de hotéis/resorts e avaliou as visões de executivos seniores, líderes de TI, atendimento aos hóspedes e marketing sobre as necessidades dos hóspedes, sua tecnologia estratégica e planos de serviço, e sua visão para o futuro. O segundo estudo do consumidor avaliou as preferências, requisitos de tecnologia e opiniões dos viajantes sobre os fatores que influenciam sua satisfação geral com hotéis e resorts. Os resultados deste estudo são compartilhados no Estudo de Visão de Hospitalidade 2016.
Tags : 
    
Zebra Technologies
Published By: Zebra Technologies     Published Date: Jul 06, 2017
Mantenha-se à frente dos riscos inerentes à conectividade moderna, à integração móvel e à segurança das impressoras térmicas de código de barras. Este documento ajuda você a aproveitar seu know-how de TI, avaliando riscos comuns de segurança e aumentando o controle com sistemas de gerenciamento remoto de dispositivos.
Tags : 
printer intelligence, industrial printers, desktop printers, mobile printers, highly durable printers, improving warehouse, manufacturing productivity, shipping accuracy, inventory accuracy, price management accuracy
    
Zebra Technologies
Published By: Zebra Technologies     Published Date: Jul 06, 2017
Gerencie sem esforço sua frota de impressoras de código de barras térmicas para maior controle e melhores resultados. Este documento aborda desafios como provisionamento problemático, dores de cabeça de segurança e monitoramento confuso.
Tags : 
printer intelligence, industrial printers, desktop printers, mobile printers, highly durable printers, improving warehouse, manufacturing productivity, shipping accuracy, inventory accuracy, price management accuracy
    
Zebra Technologies
Published By: Zebra Technologies     Published Date: Oct 04, 2017
Como evitar a escolha do dispositivo errado para sua aplicação. Para uma visão mais completa de cada consideração, faça download do nosso documento técnico. Ele destaca razões para escolher os dispositivos de nível empresarial em vez de dispositivos de consumo, incluindo: • As principais considerações sobre desempenho de digitalização • A importância do gerenciamento de energia e dos acessórios certos • A importância da conectividade e porque nem todos os dispositivos são feitos da mesma maneira
Tags : 
mobile technologies, machine to machine communication, automation increase, accurate data capture, team collaboration, tc56, mc67, tc55, tc75, mobility dna software, traceability, field operations, industrial facilities, mobile solutions, enterprise productivity, choosing the right technology, enterprise grade technology, field applications, high battery capacity, rugged handheld computers
    
Zebra Technologies
Published By: Zebra Technologies     Published Date: Oct 04, 2017
Como evitar a escolha do dispositivo errado para sua aplicação. Para uma visão mais completa de cada consideração, faça download do nosso documento técnico. Ele destaca razões para escolher os dispositivos de nível empresarial em vez de dispositivos de consumo, incluindo: • As principais considerações sobre desempenho de digitalização • A importância do gerenciamento de energia e dos acessórios certos • A importância da conectividade e porque nem todos os dispositivos são feitos da mesma maneira
Tags : 
mobile technologies, machine to machine communication, automation increase, accurate data capture, team collaboration, tc56, mc67, tc55, tc75, mobility dna software, traceability, field operations, industrial facilities, mobile solutions, enterprise productivity, choosing the right technology, enterprise grade technology, field applications, high battery capacity, rugged handheld computers
    
Zebra Technologies
Published By: Zebra Technologies     Published Date: Oct 04, 2017
Os dispositivos da Zebra com Android oferecem aos clientes experiências de compras consistentes e gratificantes que criam fidelidade, enquanto os associados se beneficiam de maneiras muito mais eficientes de se comunicar e gerenciar o estoque.
Tags : 
mobile technologies, machine to machine communication, automation increase, accurate data capture, team collaboration, tc56, mc67, tc55, tc75, mobility dna software, traceability, field operations, industrial facilities, mobile solutions, enterprise productivity, choosing the right technology, enterprise grade technology, field applications, high battery capacity, rugged handheld computers
    
Zebra Technologies
Published By: Symantec     Published Date: Jun 13, 2018
O cenário atual é uma corrida desenfreada. Funcionários e organizações adotam aplicativos e serviços na nuvem em um ritmo acelerado devido à produtividade, colaboração e conveniência que oferecem. E por que agiriam de forma diferente? Se você tem um problema, provavelmente há um aplicativo na nuvem que pode resolvê-lo. Além disso, o movimento a nível corporativo que se distancia de licenças de software tradicionais para plataformas na nuvem como o Office 365, G Suite, Salesforce, etc., oferece o benefício adicional de um modelo financeiro de Opex ao invés de Capex para seus custos de software.
Tags : 
    
Symantec
Published By: Equinix APAC     Published Date: May 22, 2019
According to IDC, almost half of IT spending will be cloud-based in 2018, reaching 60% of all IT infrastructure and 60-70% of all software, services and technology spending by 2020. Today’s top-performing organizations are benefiting from hybrid and multi cloud scenarios. Industry thought leaders share their perspectives and insights on how enterprises across the region are reshaping their cloud strategies to stay ahead. • Industry Trends - William Lee, Research Director at IDC • Industry Best Practices - Alex Wehle, Cloud Infrastructure Lead, Microsoft • End User Perspective - T C Chao, Senior Manager, Ricoh • Industry Insights - Tejaswini Tilak, Sr. Director, APAC, Equinix Watch the webinar broadcast and a copy of the latest IDC cloud research report in addition.
Tags : 
    
Equinix APAC
Published By: Courion     Published Date: Nov 05, 2012
Learn how to identify, quantify and manage access risk by taking a revealing, visually guided tour of the industry's premier access intelligence solution, Access Insight, via actual screenshots from a customer implementation.
Tags : 
courion, intelligence solution, access insight, iam, security risk, security insight, security, data management, business technology, data center
    
Courion
Published By: Okta     Published Date: Feb 24, 2015
Gartner recently released the Magic Quadrant for Identity and Access Management as a Service (IDaaS) and has named Okta a leader in the space. This Magic Quadrant evaluates vendors on their abilities to be global, general purpose identity and access management (IAM) service providers for multiple use cases.
Tags : 
identity and access management, idaas, service providers, multiple use, vendor evaluation
    
Okta
Published By: Okta     Published Date: Feb 24, 2015
This report outlines the future look of Forrester’s solution for security and risk (S&R) executives working on building an identity and access management strategy for the extended enterprise. We designed this report to help you understand and navigate the major business and IT trends affecting identity and access management (IAM) during the next five years. IAM in 2015 has become a tool not just for security but also for business agility. Competitive challenges push businesses into the cloud and encourage mobile device use even without full-fledged access controls in place.
Tags : 
identity and access management, security and risk, extended enterprise, it trends, business agility
    
Okta
Published By: Okta     Published Date: Feb 24, 2015
With the exploding adoption of software-as-a-service (SaaS) applications, enterprise IT is fundamentally changing. While on-demand services provide tremendous ROI, they also introduce new challenges that must be overcome to truly capitalize on their potential. Identity management problems such as controlling who is granted access to which applications and data and how to control access to these applications leveraging on premise directories such as Active Directory, have become increasingly important. Single Sign-On and user management solutions that are optimized for the cloud are necessary to help address these challenges. This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : 
identity and access management, saas applications, single sign-on, active directory, management solutions
    
Okta
Published By: Okta     Published Date: Aug 12, 2015
With the exploding adoption of software-as-a-service (SaaS) applications, enterprise IT is fundamentally changing. While on-demand services provide tremendous ROI, they also introduce new challenges that must be overcome to truly capitalize on their potential. Read this report to learn the 8 most common IAM challenges.
Tags : 
    
Okta
Published By: Okta     Published Date: Aug 12, 2015
The Forrester Wave report identifies the six most significant identity solution providers in the market, evaluating the strengths and weaknesses of each vendor against 15 criteria, including current offering, strategy and market presence. Access your complimentary Forrester Wave report and learn why Okta is named a leader in the space.
Tags : 
    
Okta
Published By: EMC Corporation     Published Date: Mar 20, 2014
The top five questions to ask regarding Identity and Access Management.
Tags : 
emc, iam, strategic solutions, access reviews, access request, identity management
    
EMC Corporation
Published By: EMC Corporation     Published Date: Mar 20, 2014
An infographic showcasing the differences in the lives of Managers with RSA's Averska IAM and without IAM.
Tags : 
emc, rsa averska, iam, strategic solutions, access reviews, access request, identity management
    
EMC Corporation
Published By: EMC Corporation     Published Date: Mar 20, 2014
An infographic showing the benefits of an RSA Averska IAM Solution.
Tags : 
emc, rsa averska, iam, strategic solutions, access reviews, access request, identity management
    
EMC Corporation
Published By: RSA     Published Date: Aug 28, 2014
A major shift has occurred with Identity and Access Management (IAM) in the past few years. Organizations have realized that the traditional approach to IAM doesn't work. It doesn't work because IT doesn't have the context to make the decisions around access. It's the lines of business that have the intelligence and business context to make decisions about Identity and Access Management.
Tags : 
access management, iam, intelligence, business context, identity, security, data management
    
RSA
Published By: Netsuite DWASF Leads Display Q1 2015     Published Date: Nov 19, 2015
Download this white paper on how cloud ERP can help IT meet rapidly evolving business needs. As an IT leader, a lot is being asked of you: drive transformational change, get the most out of your current IT investments with even higher performance, and be the strategic advisor to your business partners. What if you could transform your company's future by increasing the flexibility and agility of your IT infrastructure to support the rapidly evolving needs of your business? Read this paper to discover how modern enterprises like Williams-Sonoma and Knowledge Universe have adopted new ERP strategies to support their growth. In this paper you will learn: The challenges facing IT and how to evolve your IT architecture to support the modern business. A new strategy for the enterprise involving ERP that increases the flexibility and agility required to add new business models, integrate acquisitions and support innovation. Answers to frequently asked questions when modernizing IT.
Tags : 
innovation through new products, information technology, customer-enabling, supply chain capabilities, enterprise applications
    
Netsuite DWASF Leads Display Q1 2015
Published By: LeadGenius     Published Date: Dec 22, 2016
Effective Account Based Marketing (ABM) requires messaging to a decision making panel -- meeting the needs and concerns of different players at your target accounts. In this whiteboard video, Ryan Williams, VP of Sales at LeadGenius, illustrated hows marketing and sales leaders can build a foundation for highly-personalized account-based messaging at scale.
Tags : 
b2b sales, b2b marketing, sales leads, lead targets, lead generation, online marketing, sales pipeline, goal setting, target revenue goals, outbound sales, outbound marketing, demand generation, buying process, marketing productivity, sales productivity, b2b marketing, demand generation, outbound marketing, outbound sales, sales development team
    
LeadGenius
Published By: Okta     Published Date: Apr 29, 2015
Enterprise mobility management and identity and access management offerings are moving toward meaningful integration. IAM and mobility leaders must take advantage to gain convenience, security and efficiency benefits. Read this report to learn why.
Tags : 
identity, iam, management, mobile, security, it management
    
Okta
Published By: Secure Computing     Published Date: Jan 25, 2008
This paper discusses the value of two-factor authentication systems that provide vital access security for today's mobile workforces, who can now be productive from numerous remote locations: the home office, the airport, hotels, and customer sites. Moreover, the ubiquitous nature of mobile phones has now given rise to a new, convenient form factor for the software-based authenticator that resides right on the mobile phone/device.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing
    
Secure Computing
Published By: Secure Computing     Published Date: Jan 25, 2008
Enterprises are increasingly opening up their networks to a greater constituency of remote users, but they often do not take into consideration the protection of user identity as a critical component of their strategy. The mobile workforce can now work productively from a remote location such as a home office, the airport, a hotel, or a customer site.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing, remote access
    
Secure Computing
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee