Enterprise UserWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Enterprise User returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Enterprise Systems Management
 •   Application Management and Maintenance
 •   Business Process Management (BPM)
 •   Identity Management/ User Provisioning
 •   Data Center Management
 •   Data Security
 •   Application Security
 •   Access Control
 •   Network Security

Related Searches
 •   Enterprise Basic
 •   Enterprise Business
 •   Enterprise Review
 •   Enterprise Tools
 •   Enterprise User Activity
 •   Enterprise User Management
 •   Enterprise User Template
 •   Finds Enterprise User
 •   Quality Enterprise User
 •   Systems Enterprise
Advertisement

ALL RESULTS
1 - 25 of 461 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Directory Services Integration with Database Enterprise User Security by Oracle Corporation

April 2008 - (Free Research)
This paper presents the EUS deployment options available using Oracle Internet Directory and Oracle Virtual Directory and the use cases will help determine when one is more appropriate than the other based on customer environment. 
(WHITE PAPER) READ ABSTRACT |

Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory by Oracle Corporation

August 2008 - (Free Research)
This paper illustrates how you can now centrally administer database users and role memberships leveraging your existing LDAP directories. 
(WHITE PAPER) READ ABSTRACT |

An Overview of the Cloud Market Vendor Landscape for Enterprise Users by VMware, Inc.

September 2012 - (Free Research)
This market profile provides an objective review of 11 leading cloud vendors and public cloud service provides and includes key takeaways for IT leaders to consider when selecting a vendor. 
(WHITE PAPER) READ ABSTRACT |

EMA Whitepaper: Enabling Single Sign-On from Desktop to Cloud for the Extended Enterprise by Oracle Corporation

January 2011 - (Free Research)
IT security teams have the challenge of ensuring security while streamlining access to a variety of resources. Learn how Enterprise Single Sign-On can enable your business to effectively balance security and streamlined access. 
(WHITE PAPER) READ ABSTRACT |

Open, Manage, and Accelerate SSL Encrypted Applications by BlueCoat

September 2007 - (Free Research)
Enterprise users and their data have never been further apart. Business pressures that keep employees out of headquarters and close to customers and partners have met head-on with other drivers that are bringing far flung servers back to the datacenter. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Best Practices - How to implement and maintain enterprise user roles by CA Technologies

June 2010 - (Free Research)
Effective enterprise role management is essential for properly managing user access rights and enforcing access policies, but the implementation process can be challenging. To be successful, organisations should implement and maintain enterprise roles using 3 Best Practices described by our expert Andras Cser. 
(EBOOK) READ ABSTRACT |

Enterprise VoIP Security: Potential Threats and Best Practices by Global Knowledge Network, Inc.

March 2006 - (Free Research)
As VoIP usage becomes widespread, enterprise users will become subject to many of the same security risks that have affected data networks. This report highlights some of the potential security problems associated with VoIP and address what measures can be taken to secure enterprise VoIP deployments. 
(WHITE PAPER) READ ABSTRACT |

Protecting Virtualization ROI through Superior Data Connectivity by Progress DataDirect

May 2011 - (Free Research)
This paper discusses both traditional and virtualized server architectures. It details Progress DataDirect technology which gives enterprise architects the power to achieve virtualization targets, ensuring robust application performance for enterprise users. 
(WHITE PAPER) READ ABSTRACT |

Buyer’s Guide for Enterprise Single Sign-On by Oracle Corporation

April 2009 - (Free Research)
This whitepaper offers a thorough checklist that should enable potential ESSO implementers to deploy the right ESSO solution which should help eliminate sign-on problems, reduce helpdesk costs, maximize user productivity, strengthen security, simplify administration and accelerate regulatory compliance. 
(WHITE PAPER) READ ABSTRACT |

Accelerate Windows 7 Deployments, Maximise App-V Adoption and De-risk Virtual Desktop Adoption by AppSense

January 2012 - (Free Research)
Access this resource to learn how user virtualisation technology can help your organisation accelerate Windows 7 deployments, maximise application virtualisation adoption, and ensure successful VDI implementations. 
(WHITE PAPER) READ ABSTRACT |

The best laid plans…Prevent Big Data from derailing your virtualization project by SearchDataCenter.com

March 2013 - (Free Research)
The March issue of the Modern Infrastructure E-Zine addresses the continued breakdown of both (1) IT silos and (2) any remaining divisions between IT and the business. Download your copy today for tips, advice, and news analysis on supporting the business and delivering superior services to users. 
(EZINE) READ ABSTRACT |

SearchBusinessAnalytics Tip Guide: Analysts see room for growth on Hadoop, other 'big data' technologies by Sybase, an SAP company

March 2012 - (Free Research)
Take a few minutes to read this brief expert tip guide from SearchBusinessAnalytics.com and learn valuable tips and advice for reviewing big data technology options. Learn why Hadoop, for all its hype, still has room to grow and accommodate broader enterprise users. 
(EGUIDE) READ ABSTRACT |

Secure Internet Single Sign-On (SSO) 101 by Ping Identity Corporation

June 2009 - (Free Research)
Written for anyone interested in understanding how secure Internet SSO works, this white paper explores the limitations of current SSO implementations outside of a single security domain (including identity and access management systems and open source development) and introduces standalone secure Internet SSO as a solution. 
(WHITE PAPER) READ ABSTRACT |

Software as a Service Dramatically Improves CRM Success by Oracle Corporation

February 2008 - (Free Research)
Explore the results of this Yankee Group study aimed at determining how on-demand technology can be used to improve sales effectiveness. Gain a deeper understanding of the difference between sales administration and sales effectiveness and the role technology plays in driving revenue. 
(WHITE PAPER) READ ABSTRACT |

EMC VNXe Series by EMC Computer Systems (UK) Ltd.

February 2011 - (Free Research)
The EMC VNXe series redefines networked storage for the small business to small enterprise user, delivering an unequaled combination of features, simplicity, and efficiency. This paper takes an in-depth look at the EMC VNXe series hardware and base software solutions. 
(WHITE PAPER) READ ABSTRACT |

CW Buyers Guide: Cloud Storage by ComputerWeekly.com

October 2013 - (Free Research)
Computer Weekly looks at the variety of cloud storage options for the enterprise, their benefits and the potential security risks and opportunity costs they present. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Computer Weekly Buyer's Guide to Cloud Storage by TechTarget

March 2014 - (Free Research)
Cloud storage technologies have triggered various disruptive file-sharing applications which have changed the game in regard to collaboration and creativity, but can be costly. In "A Computer Weekly Buyer's Guide to Cloud Storage," take a look at the risks and opportunity costs different applications present. 
(RESOURCE)

A Smart Strategy for Streamlining and Accelerating Windows 7 Migration by Flexera Software

July 2013 - (Free Research)
This whitepaper will help you learn how to best go about taking on this necessary but overwhelming transition to Windows 7 from older operating systems. Get tips on making the business case, formulating a strategy, and more. 
(WHITE PAPER) READ ABSTRACT |

Optimize Your Network with Dell and Silver Peak and Reap the Benefits by Dell and Microsoft

July 2013 - (Free Research)
This informative paper explores a partnership that addresses today's consolidation, backup, replication and unified communications. Discover how this cost effectively increase network capacity, optimize network quality, and help ensure maximum performance over distance—all while helping to reduce ongoing IT operating costs. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

VMware ACE 2 Enterprise Edition: Desktop Virtualization Solution by AMD and VMware, Inc (E-mail this company)

VMware ACE 2 Enterprise Edition delivers desktop virtualization solutions for enterprise users. Use VMware ACE 2 to deploy an ACE virtual machine as an IT managed “virtual laptop” to remote workers, provision controlled desktop images as sandbox environments or run legacy operating systems & applications on an existing PC as you migrate to Vista. 
(SOFTWARE PRODUCT)

Analyst's take: IBM’s acquisition of SPSS is good news for SAS and SAP customers by ComputerWeekly.com

January 2011 - (Free Research)
IBM’s SPSS acquisition gives SPSS users a broader support network, IBM Cognos users a predictive analytics platform, and more enterprise users one-stop shopping.  Looking to the future, that could mean analytics ― and better predictive decision making ― on every desktop. 
(WHITE PAPER) READ ABSTRACT |

User-ID Linked with Next-Generation Firewalls Improves Network Visibility and Controls by Palo Alto Networks

November 2012 - (Free Research)
This white paper highlights a security solution that integrates existing enterprise directory services with next-generation firewalls so application activity and policies are linked directly with users or groups. Read on to learn how user-based analysis, reporting, and forensics can improve visibility and protection. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Application Delivery: No User Left Behind by BlueCoat

January 2007 - (Free Research)
Blue Coat ProxyClient extends Blue Coat's visionary application delivery infrastructure to include all of these use cases - from any network, any device, and to any application - keeping users productive wherever the business takes them. 
(WHITE PAPER) READ ABSTRACT |

Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security by BlueCoat

September 2010 - (Free Research)
Your business depends on one thing: getting the right information to the right people at the right time. To gain a competitive advantage, improve customer service and access more business intelligence, you have to ensure fast and responsive application delivery to users wherever they are. 
(WHITE PAPER) READ ABSTRACT |

Blue Coat Application Delivery Network Infrastructure by BlueCoat

May 2009 - (Free Research)
IT organizations like yours are under pressure to deliver fast and responsive applications to users wherever they are. But you also have to protect data, systems and applications from malicious threats to ensure all your users can confidently transact business across your distributed network. 
(DATA SHEET) READ ABSTRACT |

1 - 25 of 461 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts