RecruitingBlogscom

Follow Us:

 

centralized

Results 1 - 25 of 204Sort Results By: Published Date | Title | Company Name
Published By: OKTA     Published Date: Sep 26, 2017
Traditional web applications pre-date modern standards like SAML and OpenIDConnect, so they often use legacy authentication methods to grant end users access. Historically, providing Single Sign-On and centralized access management for end users across these legacy applications required a Web Access Management, or WAM, product. These on-premises software tools could be expensive to maintain and complex to deploy. Now, modern identity providers like Okta in conjunction with best-of-breed network management technologies offer a better way. This white paper describes how web applications that lack modern standard support can be integrated into a cloud-based Identity-as-a-service architecture.
Tags : 
    
OKTA
Published By: Juniper Networks     Published Date: Oct 02, 2018
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 50% of respondents in India saying they deal with more than 50 alerts each day. Shockingly, for 6% of organizations, that figure rises to between 100 and 1,000 threats a day. The Solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download the Report to find out what else Ovum has discovered about security practices in India.
Tags : 
    
Juniper Networks
Published By: EMC Corporation     Published Date: Jun 14, 2011
Qualitative and quantitative research among AP professionals to gain insights into trends in automated data capture in invoice processing.
Tags : 
emc, accounts payable, automation, paper process, transaction costs, error rates, invoice, centralized, outsourcing, cloud computing, capital budget, costs
    
EMC Corporation
Published By: Digital Realty     Published Date: Jan 23, 2019
Download the new white paper from Digital Realty that explores how to improve cloud performance through a multi-cloud platform, centralized governance, and on-demand networking.
Tags : 
digital realty, cloud, cloud computing, governance, cloud infrastructure, cloud performance
    
Digital Realty
Published By: AlienVault     Published Date: Oct 20, 2017
In this report, you'll read 451 Research's review of AlienVault USM Anywhere. USM Anywhere is AlienVault's offering of centralized security information and event management for resource-constrained organizations embracing Amazon and Microsoft cloud architectures. The report covers the following areas: • 451's overview of AlienVault USM Anywhere • A brief look at the history of AlienVault • How USM Anywhere compares to competitors • A SWOT analysis of USM Anywhere Download the report now to learn more about AlienVault's unique approach to threat detection in cloud and hybrid cloud environments
Tags : 
    
AlienVault
Published By: HP Data Center     Published Date: Apr 16, 2009
This paper examines both the centralized WLAN switch architecture and the optimized WLAN architecture, so that the wireless network choice an organization makes today will protect its investment and allow it to experience the substantial benefits of 802.11 for years to come.
Tags : 
hp data center, 802.11n, architectural evolution, wlan, lan, scalability, collaboration, wireless, wireless networks, high-bandwidth, access points, aps, quality of service, qos, rf configuration, infrastructure, lan backbone, bottleneck, hp procurve, network architecture
    
HP Data Center
Published By: Ruckus Wireless     Published Date: Jul 11, 2018
In an era of "lean IT," the centralized management capabilities of cloud-managed Wi-Fi make it an attractive option to manage and maintain wireless LANs (WLANs) across multiple locations. The decision to move WLAN management to the cloud requires one key assurance: end-to-end security from user devices to the cloud. This means that user data must be protected over the WAN and in the data center. These security measures should not require on-staff WLAN security expertise to manage. And security measures should be largely transparent to users. This paper provides an overview of the security architecture of Ruckus Cloud Wi-Fi, as well as best practices for specific security scenarios.
Tags : 
    
Ruckus Wireless
Published By: IBM     Published Date: Oct 24, 2013
This case study examines a European manufacturer that successfully moved from an ad-hoc workplace organization to a strategic organization over a period of five years, saving $19 million in 2009 in addition to a 400 percent return on investment over five years (from 2004 - 2009). The organization moved from a decentralized siloed group of regional facilities and real estate organizations to a fully-centralized and matrixed organization, enabling close coordination and alignment with the regional business units.
Tags : 
lifecycle management, real estate systems integration, new lease accounting standard, fasb, iasb, workplace management system, iwms, facility management, integrated workplace
    
IBM
Published By: Cisco Umbrella EMEA     Published Date: Feb 08, 2019
As networks become decentralized and users connect directly to SaaS applications, backhauling traffic to apply security policies just isn’t efficient. Plus, backhauling internet bound traffic is expensive, and it adds latency. More and more branch offices are migrating to direct internet access (DIA). Find out how to quickly and easily secure this traffic.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
As networks become decentralized and users connect directly to SaaS applications, backhauling traffic to apply security policies just isn’t efficient. Plus, backhauling internet bound traffic is expensive, and it adds latency. More and more branch offices are migrating to direct internet access (DIA). Find out how to quickly and easily secure this traffic.
Tags : 
    
Cisco Umbrella EMEA
Published By: INT_AstuteIT_ABM_DoubleTouch_BENELUX     Published Date: Feb 23, 2018
In a world of perpetual innovations in technology, brands are continually stuck between slowing down and reinventing the wheel of martech which keeps them going, and staying put with delays in data activation. But they don’t have to settle for either of these approaches. Now is the time for enterprises to reclaim their brand’s independence in agility, innovation and customer obsession, removing all traces of vendor lock-in, slow-down or strategic compromise with a comprehensive, centralized approach to marketing technology which goes beyond DMP: Intelligent Orchestration.
Tags : 
data, brand, scaling, customer, marketing
    
INT_AstuteIT_ABM_DoubleTouch_BENELUX
Published By: Kaseya     Published Date: Mar 01, 2019
The increasing number of endpoints and the growing complexity of IT landscape brings in the need of having a unified method of managing IT. Unified Endpoint Management (UEM) gives organizations a simple, flexible way to manage and secure endpoints from an all-in-one single platform. With capabilities such as centralized discovery and management, automation and remote control, UEM equips enterprises to address complex problems encountered by IT in the current landscape. Download this ebook to learn how to enable your IT teams to eliminate roadblocks and increase productivity and move forward on their way to the digital transformation of the enterprise. Few salient points: -The challenges faced by modern IT teams -How Unified Endpoint Management helps address these challenges -Benefits of Unified Endpoint Management in the enterprise -Kaseya’s approach to UEM
Tags : 
    
Kaseya
Published By: FICO     Published Date: Aug 14, 2015
To create a centralized and standardized, user-friendly system that enables internal and independent insurance agents to make precise and consistent policy quotes and uniform underwriting decisions, ACG adopted FICO's Blaze Advisor decision rules management system.
Tags : 
fico, analytics, solutions, decision management, rules management., business technology
    
FICO
Published By: IBM     Published Date: Mar 11, 2008
Regardless of what department you work in, it is business critical to ensure that your team members have easy and ready access to the latest information and project team members. Whether you work in sales, marketing, human resources, research and development, or any other functional area, you need a centralized virtual place where all of your team members can collaborate in realtime, share ideas and documents and be more productive online.
Tags : 
ibm, corporate portal, portal, portals, ep campaign
    
IBM
Published By: ScriptLogic     Published Date: Nov 14, 2011
This whitepaper discusses the challenges of native tools and the 7 key capabilities that you need so that you can effectively audit Active Directory.
Tags : 
active directory, auditing, native tools, centralized, data, secure, database
    
ScriptLogic
Published By: ScriptLogic     Published Date: Mar 30, 2012
In this whitepaper, we will walk through a couple of recovery scenarios and how you can accomplish this using native tools and how it could be accomplished using Active Administrator.
Tags : 
active directory, active directory recovery, auditing, native tools, centralized, data, secure, database, networking
    
ScriptLogic
Published By: Group M_IBM Q3'19     Published Date: Jun 21, 2019
This paper explores the merits of agile integration architecture--a container-based, decentralized, and microservices-aligned approach for integration solutions that meets the demands of agility, scalability, and resilience required by digital transformation.
Tags : 
    
Group M_IBM Q3'19
Published By: ASG Software Solutions     Published Date: May 27, 2009
Application management requires visibility from multiple vantage points within the IT enterprise, combined with a centralized information store that pulls the technology pieces of the application puzzle into a coherent whole.
Tags : 
asg, cmdb, bsm, itil, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
Published By: Neolane, Inc.     Published Date: Dec 30, 2008
The Hager Group is a $1.5-billion electronics manufacturer. With a distributed global workforce of more than 10,000 employees, Hager has 40 sales subsidiaries and 25 industrial sites worldwide.  Today, with a centralized marketing database and software, Hager can ensure data quality and deliver personalized, targeted communications according to customer and prospect profiles and behavior.  This program allows Hager to capture 1,000 new prospects each month, and achieve a 10 percent conversion rate - resulting in an incremental revenue increase of $42 million per year.
Tags : 
neolane, the hager group, e-marketing program, centralized marketing database, central repository customer data, crm software, custom content, deliverability, e-commerce, email marketing, emerging marketing, international marketing, lead generation, rich media
    
Neolane, Inc.
Published By: MuleSoft     Published Date: Nov 27, 2018
In today’s digitally disrupted economy, organizations across industries face competition at unparalleled heights. As a result, differentiation through business automation has become synonymous with convenience and speed. However, since the technology landscape is changing at an increasing pace, business automation shouldn’t be thought of as a one-time, centralized effort in a discrete process. Rather, organizations should view business automation as a way to decentralize access to systems and enable the broader organization. Download this whitepaper to learn: The value of business automation Why traditional approaches to business automation – such as custom code, implementing standalone solutions, or using point-to-point connections – do not suffice. The benefits of an API-led approach to business automation. How organizations like Wells Fargo, the State of Colorado, Tic:Toc, and Addison Lee achieved business automation success using APIs.
Tags : 
    
MuleSoft
Published By: IBM     Published Date: Oct 06, 2014
While traditional B2B sales channels are still the most influential, the explosive growth of B2B ecommerce is forcing B2B organizations to dedicate resources and budget to the on-line sales channel. While B2B organizations can learn from B2C in terms of user experience, B2B selling is much more complex and requires a centralized commerce platform that fully supports sophisticated workflows, pricing, product configurations, approvals and more. In this paper, we explore the impact of the on-line channel and examine five key components required to achieve B2B commerce effectiveness.
Tags : 
b2b sales channels, b2b ecommerce, user experience, centralized commerce platfrom, emerging marketing
    
IBM
Published By: Eaton     Published Date: Jan 26, 2016
When designing a power protection scheme for their data center, IT and facilities managers must ask themselves whether a distributed or centralized backup strategy makes more sense. Unfortunately, there is no easy answer to that question. Companies must weigh each architecture’s advantages and disadvantages against their financial constraints, availability needs and management capabilities before deciding which one to employ. This white paper will simplify the decision-making process and lessen the potential weaknesses of whichever strategy you ultimately select.
Tags : 
eaton, distributed backup strategy, centralized backup strategy, facility managers, data center solutions, it management, knowledge management, enterprise applications
    
Eaton
Published By: NeoSpire Managed Hosting     Published Date: Sep 01, 2009
When a company creates a custom web application, it also creates a custom challenge. Traditional monitoring does not cover everything, but alerts if something goes wrong with the application are more important than ever. Learn the benefits of custom application monitoring and how NeoSpire can help. . Dramatically reduces the time to troubleshoot a failed web application . Provides complete overview of web transaction and web application performance, to proactively locate and fix bottlenecks in your web system . Improves customer experience and increase customer satisfaction with excellent performance of your web applications and e-business transactions . Eliminates the risk of loss of revenue and credibility . Increases the efficiency of mission-critical e-business operations and web applications
Tags : 
application monitoring, load balancing system, neospire, benefits of testing, hardware monitoring, disk utilization, memory utilization, cpu load, service monitoring, port check (standard and custom ports), number of processes running, specific process monitoring, database monitoring, mysql replication monitoring, oracle rman backup monitoring, vpn monitoring: farend ping test, load-balanced ip monitoring, external url monitoring, centralized ids, logging monitoring
    
NeoSpire Managed Hosting
Published By: Looker     Published Date: Dec 03, 2015
The focus of modern business intelligence has been self-service; pushing data into the hands of end users more quickly with more accessible user interfaces so they can get answers fast and on their own. This has helped alleviate a major BI pain point: centralized, IT-dominated solutions have been too slow and too brittle to serve the business. What has been masked is a lack of innovation in data modeling. Data modeling is a huge, valuable component of BI that has been largely neglected. In this webinar, we discuss Looker’s novel approach to data modeling and how it powers a data exploration environment with unprecedented depth and agility. Topics covered include: • A new architecture beyond direct connect • Language-based, git-integrated data modeling • Abstractions that make SQL more powerful and more efficient
Tags : 
    
Looker
Published By: BlackBerry     Published Date: Apr 13, 2010
The BlackBerry Enterprise Server Express is designed to be a secure, centralized link between an organization's wireless network, communications software, applications, and BlackBerry devices. The BlackBerry Enterprise Server Express integrates with your organization's existing infrastructure, which can include messaging software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources. You can install the BlackBerry Enterprise Server Express on the same server as Microsoft Exchange or Windows Small Business Server, or you can install the BlackBerry Enterprise Server Express on a separate server.
Tags : 
blackberry, server express, microsoft exchange, v5.0.1, administration guide, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Start   Previous   1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top