Role ManagingWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Role Managing returned the following results.
RSS What is RSS?
Related Categories

 •   Access Control
 •   Security Policies
 •   Business Intelligence Solutions
 •   Business Process Management (BPM)
 •   Identity Management/ User Provisioning
 •   Security Monitoring
 •   Network Security
 •   Operational BI
 •   Authentication / Password Management
 •   Virtualization

Related Searches
 •   Hr Role Managing
 •   Import Role
 •   Knowledge Role Managing
 •   Measurement Role Managing
 •   Role Billing
 •   Role Managing Best
 •   Role Managing Chart
 •   Role Managing Construction
 •   Role Managing Metrics
 •   Role Strategies
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Wave Methodology- A Practical Guide to Defining Roles for Access Control by Oracle Corporation

June 10, 2011 - (Free Research)
As the number and type of users who require access to organizations’ computer-based resources increase, the traditional method of managing user access on a case-by-case basis has quickly become antiquated. This paper explores a 7-step process which has proven to be an effective method for administrators to identify user roles for access control. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Best Practices - How to implement and maintain enterprise user roles by CA Technologies

June 29, 2010 - (Free Research)
Effective enterprise role management is essential for properly managing user access rights and enforcing access policies, but the implementation process can be challenging. To be successful, organisations should implement and maintain enterprise roles using 3 Best Practices described by our expert Andras Cser. 
(EBOOK) READ ABSTRACT |

Role Based Access Control and Entitlement Management by FoxT

September 30, 2009 - (Free Research)
The new Role-Based Access Control utilities enforce entitlements down to the data and device level. The ability to effectively provision and audit these fine-grained controls across diverse technology domains is still a challenge. Read this transcript for practical guidance on how to implement a unified policy management infrastructure for RBAC. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory by Oracle Corporation

August 01, 2008 - (Free Research)
This paper illustrates how you can now centrally administer database users and role memberships leveraging your existing LDAP directories. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Achieving compliance through IAM by SearchSecurity.com

December 22, 2011 - (Free Research)
Read this expert E-Guide to learn the best practices for using role management as a tool to meet compliance regulations. 
(EGUIDE) READ ABSTRACT |

Managing Identities and Access Control by SearchSecurity.com

February 24, 2010 - (Free Research)
SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles. 
(EBOOK) READ ABSTRACT |

Gartner: Five Roles for Government in Cloud Computing by ComputerWeekly.com

August 02, 2010 - (Free Research)
As a consequence of tightening budgets and increasing uncertainties, government organizations are looking at how to leverage cloud computing as a model to ensure greater flexibility, lower costs, more-rapid provisioning and greater focus on areas that are more domain-specific. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Technical Guide on Managing Identities and Access Control by CA Technologies

December 23, 2010 - (Free Research)
SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles. 
(EBOOK)

Best Practices in Creating a Strategic Finance Function by SAP America, Inc.

January 23, 2009 - (Free Research)
the following article will share the results of SAP research as well as APQC's Open Standards Benchmarking Collaborative (OSBC) research. The OSBC research is the first global set of common standards for business processes and data, giving organizations an independent, authoritative resource for evaluating and improving business practices. 
(WHITE PAPER) READ ABSTRACT |

Borderless Applications and the Changing Face of Application Performance Management by Compuware Corporation

April 12, 2011 - (Free Research)
This paper discusses the shift in application performance management by IT operations and it provides insight into how best to ensure applications spanning across all boundaries of enterprise and the Internet can successfully be monitored and managed to meet the needs of the business. 
(WHITE PAPER) READ ABSTRACT |

Unified Communications: Strategic Value, Benefits and the Role of System Integrators by Hewlett-Packard Company

August 29, 2008 - (Free Research)
This white paper shows how current economic and technological trends increase the importance of efficient communication and collaboration processes for enterprises. Further, it demonstrates how unified communications (UC) can help companies to address these challenges. 
(WHITE PAPER) READ ABSTRACT |

Gartner research report on Cloud Services Brokerages by Intel

September 26, 2011 - (Free Research)
A cloud services brokerage (CSB) is a type of service provider that plays an intermediary role in cloud computing. This research defines CSBs and outlines the capabilities that are needed to successfully intermediate cloud services. 
(WHITE PAPER) READ ABSTRACT |

Intelligent Role Management for Improved Security and Compliance by IBM

July 31, 2012 - (Free Research)
Uncover why managing user access entitlements and activities is so crucial and learn about an identity and access management solution that will help you improve both security and compliance in your organization. 
(WHITE PAPER) READ ABSTRACT |

Survival Guide to Going Agile by Rally Software

November 14, 2013 - (Free Research)
This Guide provides tips for using Agile approaches to plan, manage, and deliver high-value work. You'll learn more about the differences between traditional project management and Agile, find the Agile role that's best for you, understand the dynamics of Agile teamwork, and get started on the transition to becoming an Agile practitioner. 
(WHITE PAPER) READ ABSTRACT |

Big Data Analytics - Meeting Business Needs and Raising IT’s Profile in the Organization by SAS

March 14, 2013 - (Free Research)
IT has long played a reactionary role in company analytics initiatives, but with new challenges that big data presents, CIOs can lead their company by implementing a strategic, business-enabling technology. Read this resource to learn how CIOs can implement a strategic big data analytics architecture that supports overall business initiatives. 
(WHITE PAPER) READ ABSTRACT |

Using Code Quality Metrics in Management of Outsourced Development and Maintenance by McCabe Software, Inc.

March 13, 2009 - (Free Research)
This paper provides answers to basic questions relating to the management of outsourced development and maintenance. What is the metrics approach to managing sub-contractors? What is the quality of the code expected to be that has been developed by the sub-contractor? Read on for the answers to these and other important considerations. 
(WHITE PAPER) READ ABSTRACT |

The Role of Software-Defined Networks in Cloud Computing by SearchSecurity.com

November 21, 2013 - (Free Research)
This expert guide breaks down the role of software-defined networks on a cloud computing environment. 
(EGUIDE) READ ABSTRACT |

The changing role of tape: A format that still has more to give by Quantum Corporation

October 31, 2009 - (Free Research)
This guide explains how tape continues to play an important role in data storage and how it remains the most cost-effective, energy efficient and resilient means to manage the life cycle of stored data. 
(WHITE PAPER) READ ABSTRACT |

The network’s growing role in securing the cloud by Juniper Networks, Inc.

December 12, 2011 - (Free Research)
Cloud computing is starting to become more the norm than the exception for IT delivery. Learn about the increasing acceptance of the cloud, cloud security, IT control, consumerization, and more! 
(EGUIDE) READ ABSTRACT |

The Role of Technical Computing in IT and Big Data by IBM

November 13, 2013 - (Free Research)
This on-demand webcast examines how technical computing strategies can help you process, manage, and analyze growing data volumes and varieties. Tune in today to uncover the role of technical computing in IT and big data. 
(WEBCAST) READ ABSTRACT |

The Role of Integrated Requirements Management in Software Delivery by IBM

October 01, 2007 - (Free Research)
This paper is about the critical role that integrated requirements management can play in helping to ensure that your business goals and IT investment are continuously aligned. 
(WHITE PAPER) READ ABSTRACT |

The Evolution of the Data Center and the Role of Virtualized Infrastructure and Unified 3D Management by Hitachi Data Systems

January 28, 2011 - (Free Research)
This IDC White Paper examines complementary technologies from Hitachi and explains how they speed the benefits of virtualization and dramatically improve the management of the infrastructure while modernizing the storage architecture. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Recovery Manager for Active Directory by Dell Software

Quest Recovery Manager for Active Directory offers an easy-to-use solution for fast, granular, online recovery of Active Directory (AD) in the event of inadvertent modification of AD due to software failure or human error. 
(ASP & SOFTWARE PRODUCT)

How to Navigate Today's Supply Chain Challenges by Epicor Software Corporation

June 11, 2013 - (Free Research)
Enterprise resource planning (ERP) systems are taking an increasingly prominent role in a variety of business activities. View this resource to find out more about how to modernize the user experience as mobile, analytics, social and the cloud. 
(WHITE PAPER) READ ABSTRACT |

Governance: The CIO's - and the Board's - Business by Compuware Corporation

April 2008 - (Free Research)
This white paper discusses the evolving role of IT governance in the organization. Explore the steps necessary to attain a strong and successful IT governance framework. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts