configuration

Results 326 - 350 of 535Sort Results By: Published Date | Title | Company Name
Published By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerabilities
    
Qualys
Published By: Dell Software     Published Date: Jul 18, 2012
Paper: Make Group Policies Do Mor
Tags : 
group policy, white paper, technology, customer, desktop, configuration, gpos, wmi, business technology
    
Dell Software
Published By: Cast Iron Systems     Published Date: Feb 14, 2008
Discover how to complete more application integration projects by delivering in days what used to take months of custom programming.  Find out how an appliance-based approach to application integration uses “configuration, not coding” to dramatically simplify and accelerate integration projects, while cutting costs by up to 80%.
Tags : 
erp, crm, integration, data integration, application integration, castiron, cast iron, scm, supply chain, customer relationship management
    
Cast Iron Systems
Published By: Cast Iron Systems     Published Date: Feb 14, 2008
Discover why traditional software and custom coding solutions are obsolete when solving integration problems in a SaaS environment and how they’re rapidly being replaced by Integration Appliances that use “configuration, not coding” to quickly integrate your SaaS applications with your business-critical data.
Tags : 
saas, software as a service, erp, scm, crm, data integration, application integration, marketing automation, sales automation, castiron, cast iron
    
Cast Iron Systems
Published By: Cast Iron Systems     Published Date: Feb 14, 2008
Traditionally companies had just two choices for their integration needs, complex and expensive platforms like EAI or write custom code. Learn about the "hidden costs" of custom code and discover five reasons why companies are switching to Integration Appliances that use a simple “configuration, not coding” approach to integration.
Tags : 
integration, enterprise application integration, eai, application integration, castiron, cast iron, enterprise applications
    
Cast Iron Systems
Published By: Cast Iron Systems     Published Date: Feb 14, 2008
Traditionally companies had only two choices for integrating SAP solutions, complex and expensive platforms like EAI or write custom code. Integration Appliances offer companies a third option, one that dramatically simplifies and accelerates SAP integration by using a “configuration, not coding” approach to rapidly connect SAP applications with a wide variety of applications, without burdening specialist resources.
Tags : 
eai, sap, castiron, cast iron, enterprise resource planning, erp, crm systems
    
Cast Iron Systems
Published By: NetApp     Published Date: Dec 01, 2009
This technical report (TR) provides guidelines and best practices for integrated architectures and implementations of Microsoft® Hyper-V with NetApp® storage solutions.
Tags : 
netapp, storage, microsoft virtualization, technical report, integrated architectures, hyper-v, cluster network, configuration, back up and recovery, disaster recovery
    
NetApp
Published By: Lumension     Published Date: Sep 18, 2012
Beyond Compliance: Combating Threats with Endpoint Configuration Management
Tags : 
suite, endpoint configuration, threats, compliance, lumension
    
Lumension
Published By: rPath     Published Date: Dec 10, 2010
This white paper introduces rPath intelligent system automation as a way to bring consistency, control and scale to .NET production environments. In particular, it describes three scenarios for using rPath within .NET environments.
Tags : 
rpath, automation, sccm
    
rPath
Published By: McAfee     Published Date: Nov 12, 2014
This white paper guides you through the pros and cons of direct vs. transparent proxies and makes recommendations that will help you secure your company and your users more effectively.
Tags : 
secure web gateway, direct or transparent proxy, security, it management
    
McAfee
Published By: Lumension     Published Date: Jun 03, 2015
Microsoft's System Center Configuration Manager doesn't handle every aspect of Linux/UNIX and third-party application security. Here's how to augment and leverage SCCM to close the gaps.
Tags : 
it security, data center, patch, software, application
    
Lumension
Published By: HP     Published Date: Mar 31, 2015
No business is immune to the threat of IT downtime caused by natural and manmade disasters. Natural disasters—such as earthquakes, tsunamis, hurricanes, fires, and floods—can happen with little to no advanced warning. But the bigger risk is often human-induced events—from simple IT configuration errors to significant data center problems. If you lack a rock-solid disaster recovery (DR) plan, any of these unpredictable events—natural or manmade—could bring your business and its revenue streams to a halt. Yet many organizations are not well prepared for the unknown. The randomness of such events lulls people into a sense of false security—“That’s not likely to happen here.” While you can hope to avoid events that threaten the continuity of your business, the reality remains unchanged: Disasters happen—so you need to prepare for them. Are you prepared? Please download this eBook to find out!
Tags : 
disaster recovery, natural disasters, data center, hackers, hardware failure, software failure, planning, disaster readiness, security, it management, data management
    
HP
Published By: MobileForce Software     Published Date: Nov 19, 2014
GigaOm is seeing a new breed of services that promise to accelerate the mobilization of existing enterprise applications and business processes. Early mobile-application development solutions (MADP) were resource-intensive, requiring custom client code for each supported platform, as well as an on-premise middleware layer to connect mobile clients to enterprise backend systems. In this new model, code-free, configuration solutions - aimed at business analysts and lines of business- are revolutionizing the landscape, consolidating tools and services to simplify cross-platform enablement, and reducing time to deploy and cost tremendously. This report describes mobile-application configuration (MAC) tools, articulates their business value and suggests conditions under which they may be a good choice for an organization.
Tags : 
mobilization, enterprise applications, business processes, development solution, resource-intensive, client code, platform, middleware, backend system, cross-platform, costs, development, wireless
    
MobileForce Software
Published By: VMware SD-WAN by VeloCloud     Published Date: Dec 19, 2014
Delivering combination of real time voice, video, and data is bandwidth intensive and requires complex network configuration to ensure the delivery of these time sensitive applications. Download this paper to learn the recent WAN technology trends to enable companies to roll out and support UC without the cost and complexity of traditional WAN.
Tags : 
velocloud, cloud-delivered, wan, real time video, bandwith, software development
    
VMware SD-WAN by VeloCloud
Published By: Lumension     Published Date: Jun 05, 2015
Microsoft's System Center Configuration Manager doesn't handle every aspect of Linux/UNIX and third-party application security. Here's how to augment and leverage SCCM to close the gaps.
Tags : 
it security, data center, patch, software, application, analytical applications, database development, database security, employee performance, productivity
    
Lumension
Published By: AWS     Published Date: Oct 07, 2019
Securing cloud environments is different from securing traditional data centers and endpoints. The dynamic nature of the cloud requires continuous assessment and automation to avoid misconfigurations, compromises, and breaches. It can also be difficult to gain complete visibility across dynamic and rapidly changing cloud environments — limiting your ability to enforce security at scale. On top of these challenges, cloud governance is critical to maintain compliance with regulatory requirements and security policies as they evolve. Because cloud deployments are not just implemented once and left untouched, organizations need to consider how to integrate security into their CI/CD pipeline and software development lifecycle. Implementing a security solution that addresses cloud challenges requires deep security and cloud expertise that organizations often do not have. Once in the cloud, organizations manage and create environments via automation, adapt their workloads to changes by automa
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
Application owners and DevOps teams want to build in AWS without compromising security, but often lack the tools to keep sensitive data secure. During Pacific Dental’s move to Amazon Web Services (AWS), the company sought to enhance and operationalize its security measures to match the speed and scale of the cloud, using a cloud access security broker (CASB) to proactively address misconfiguration and risk to their data.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
Poor visibility into cloud deployments makes it difficult for organizations to enforce security and compliance across their cloud environment. Check Point CloudGuard Dome9 on Amazon Web Services (AWS) can help you gain deeper visibility of your traffic and configurations with automated assessments that strengthen your security posture and help you fulfill your part of the Shared Responsibility Model. Join the upcoming webinar with Check Point, Veracode, and AWS. Learn how Veracode improved their security posture using Check Point CloudGuard Dome9 on AWS.
Tags : 
    
AWS
Published By: SAP     Published Date: Jun 30, 2011
This white paper will outline possible mobile device security threats and review how IT can effectively manage and secure a fleet of devices, whether they are personally owned or corporate owned. By following the strategies outlined in this paper, IT managers will learn what the greatest security risks are for mobile devices and how to effectively protect end users, their devices, and the network infrastructure from attack, harm, or lost data.
Tags : 
sap, security, smartphones, tablets, productivity, mobility, security configuration, security enforcement, secure apps, mobile management
    
SAP
Published By: Centrify Corporation     Published Date: Nov 12, 2014
Centrify provides Red Hat Linux integration with Active Directory. The Centrify Suite centrally secures and manages Red Hat Linux systems — along with 450 other versions of Linux and Unix — by integrating them with your existing Microsoft Active Directory services. Centrify provides Active Directory Group Policy-based configuration to control the security settings of Red Hat systems and provides IT with the benefit of leveraging a familiar tool. Learn more about why you need Centrify for Red Hat.
Tags : 
security, management, integration, it benefits, configuration, enterprise applications
    
Centrify Corporation
Published By: OKTA     Published Date: Mar 30, 2018
"The enterprise cloud revolution is here. IT organizations everywhere, from small and mid-sized to Fortune 500 companies, are moving from on-premises software to on-demand, cloud-based services. As enterprise IT makes this transition to a new hybrid on-demand/on-premises configuration, controlling access to applications becomes increasingly important. CIOs and their teams have a whole new set of identity management challenges; their role is also fundamentally changing. As the steward of these new services, IT must provide insight and advice about Software-as-a-Service (SaaS) products to ensure the company gets the highest business value of their investments. Read this eBook to learn eight main identity and access management (IAM) challenges of adopting and deploying cloud applications. And, most importantly, best practices for addressing each of them."
Tags : 
    
OKTA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.