Roles MaintainWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Roles Maintain returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Policies
 •   Network Security
 •   Virtualization
 •   Business Process Management (BPM)
 •   Access Control
 •   Data Center Management
 •   Mobile Device Management
 •   Application Servers
 •   Backup Systems and Services

Related Searches
 •   Automate Roles
 •   Consults Roles Maintain
 •   Processing Roles Maintain
 •   Review Roles
 •   Roles Maintain Indian
 •   Roles Maintain Packages
 •   Roles Maintain Pricing
 •   Roles Maintain Requirement
 •   Roles Maintain Strategic
 •   Roles North Dakota
Advertisement

ALL RESULTS
1 - 25 of 462 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

E-Book: Best Practices - How to implement and maintain enterprise user roles by CA Technologies

June 29, 2010 - (Free Research)
Effective enterprise role management is essential for properly managing user access rights and enforcing access policies, but the implementation process can be challenging. To be successful, organisations should implement and maintain enterprise roles using 3 Best Practices described by our expert Andras Cser. 
(EBOOK) READ ABSTRACT |

E-Guide: Achieving compliance through IAM by SearchSecurity.com

December 22, 2011 - (Free Research)
Read this expert E-Guide to learn the best practices for using role management as a tool to meet compliance regulations. 
(EGUIDE) READ ABSTRACT |

Gartner research report on Cloud Services Brokerages by Intel

September 26, 2011 - (Free Research)
A cloud services brokerage (CSB) is a type of service provider that plays an intermediary role in cloud computing. This research defines CSBs and outlines the capabilities that are needed to successfully intermediate cloud services. 
(WHITE PAPER) READ ABSTRACT |

Intelligent Role Management for Improved Security and Compliance by IBM

July 31, 2012 - (Free Research)
Uncover why managing user access entitlements and activities is so crucial and learn about an identity and access management solution that will help you improve both security and compliance in your organization. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Technical Guide on Managing Identities and Access Control by CA Technologies

December 23, 2010 - (Free Research)
SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles. 
(EBOOK)

Managing Identities and Access Control by SearchSecurity.com

February 24, 2010 - (Free Research)
SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles. 
(EBOOK) READ ABSTRACT |

The Role of Integrated Requirements Management in Software Delivery by IBM

October 01, 2007 - (Free Research)
This paper is about the critical role that integrated requirements management can play in helping to ensure that your business goals and IT investment are continuously aligned. 
(WHITE PAPER) READ ABSTRACT |

Eguide: Tape’s Reincarnation in the Cloud by Iron Mountain

February 21, 2012 - (Free Research)
Check out this E-Guide to learn whether or not tape can play a role in cloud backup and data protection operations. Discover the changing requirements of a cloud-based infrastructure, and learn how tape technology may be on track to help administrators maintain cost-effective backups. 
(EGUIDE) READ ABSTRACT |

IT Innovation as a Priority by Cisco Systems, Inc.

March 23, 2011 - (Free Research)
Today as a CIO, not only is maintaining operational excellence part of your role, but driving innovation is also high on the priority list. In this video, VP IT and Administration at Hearst Television, Inc., shares how he was able to maintain operational excellence and create an innovative virtualization solution. 
(VIDEO)

Best Practices for Implementing 2048-Bit SSL by Citrix

December 31, 2011 - (Free Research)
The role of secure sockets layer (SSL) technology is no longer a luxury, it is now a crucial part of all networking systems. This guide explores some best practices for implementing 2048-bit SSL and how it can benefit your network infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Cloud Compliance, Secure Backup, and Successful Information Management by SearchSecurity.com

July 11, 2013 - (Free Research)
This E-Guide explores the keys to maintaining control over increasingly large data sets from a compliance, backup and information management perspective. 
(EGUIDE) READ ABSTRACT |

Incorporating Wireless into the Business Continuity Plan by AT&T Corp

October 13, 2010 - (Free Research)
Increasingly WAN-centric enterprises make mobile equipment and services more important for business continuity. To determine the role wireless should play in an organization’s business continuity plan, IT should consider a mix of factors including type of business, physical locations and applications. 
(WHITE PAPER)

Computer Weekly - 19 June 2012: How to succeed at desktop virtualisation by ComputerWeekly.com

June 19, 2012 - (Free Research)
In this week’s Computer Weekly, our latest Buyer's Guide examines best practice in desktop virtualisation. We ask if a six-year-old technology could be a key to tackling IT security threats. And we look at how universities are dealing with their IT challenges as they await the first intake of students at new higher tuition fees. Read the issue now. 
(EZINE) READ ABSTRACT |

The Role of Identity & Access Management in Achieving Continuous Compliance by CA Technologies.

February 01, 2012 - (Free Research)
A common requirement in many of today’s compliance mandates relate to the concept of knowing who users are, what applications and resource they have access to, and when they access them. In this paper, uncover how to maintain continuous compliance though a centralized and integrated identity and access management (IAM) platform. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 13 September 2011: Download this week's issue of the UK's leading technology publication, with our analysis of the latest news, trends and IT management issues by ComputerWeekly.com

September 13, 2011 - (Free Research)
In this week's Computer Weekly, we talk to the man tasked with bringing public services into the digital age. The second installment of our Buyer's Guide to business intelligence reviews two low-cost alternatives to the big suppliers; and we go behind the scenes of the IT preparations for the London 2012 Olympic Games. 
(EZINE)

Maximizing the Benefits of Virtualization: Windows Server® 2008 Hyper-V™ and the Intel® Xeon® Processor 5500 Series by Dell and Microsoft

March 01, 2009 - (Free Research)
Together, Windows Server 2008 Hyper-V and servers based on the Intel Xeon processor 5500 series provide a highly efficient foundation for virtualization with improved performance and energy efficiency, increased flexibility, higher reliability and lower TCO. Read this paper to learn about the features and business benefits of these solutions. 
(WHITE PAPER) READ ABSTRACT |

Precision Cooling for High-Density Data Center Environments by Dell, Inc. and Intel®

December 01, 2009 - (Free Research)
As rack densities rise, cooling systems play an increasingly critical role in protecting sensitive IT systems and maintaining system availability. Using precision cooling and the SmartAisle containment system from Emerson Network Power can help IT organizations efficiently handle heat loads and create a cost-effective data center infrastructure. 
(ARTICLE) READ ABSTRACT |

Improving Help Desk Efficiency: Asset Management and Help Desk Optimization by TechExcel

August 2008 - (Free Research)
This paper explains how asset discovery, and AssetWise Discovery software, plays a vital role in raising help desk efficiency while maintaining customer satisfaction and resolving problems effectively. 
(WHITE PAPER) READ ABSTRACT |

Right from the Start: SOA Lifecycle Governance by Oracle Corporation

June 2008 - (Free Research)
This paper presents an overview of strategies and practices for governing the transformation to, and the evolution of, SOA. In particular, it explores the role of governance throughout the SOA lifecycle as well as the technology enablers that help organizations develop and maintain an SOA that delivers measurable, sustainable business value. 
(WHITE PAPER) READ ABSTRACT |

Recovery Manager for Active Directory by Dell Software

Quest Recovery Manager for Active Directory offers an easy-to-use solution for fast, granular, online recovery of Active Directory (AD) in the event of inadvertent modification of AD due to software failure or human error. 
(ASP & SOFTWARE PRODUCT)

Getting a better grip on mobile devices by IBM

August 2013 - (Free Research)
This exclusive resource examines how your organization can best adapt to the expanding role of smartphones and tables within the enterprise.  Discover best in class strategies for empowering employees' efficiency and productivity, while also maintaining a positive security posture. 
(WHITE PAPER) READ ABSTRACT |

From Servers to Services: Charting Your Future in the Cloud Era by Hewlett-Packard Company

August 2013 - (Free Research)
This informative white paper details how to adopt a service-centric approach to IT in order to maintain competitive advantage. Discover five key principles of the journey from servers to services. 
(WHITE PAPER) READ ABSTRACT |

Your Business May Be Part of a Network - But Is It Truly Connected? by Crossgate

April 2010 - (Free Research)
Business networks are key to competitive advantage. How businesses connect and communicate with partners in their business networks is important in this global economy. This article offers suggestions and examples of how to avoid getting bogged down in maintaining a business partner network and instead focuses on a business’s key differentiators. 
(WHITE PAPER) READ ABSTRACT |

IDC Report "Backup and Recovery: The Open Source Option Comes of Age" by Zmanda Inc.

May 2008 - (Free Research)
Read the IDC Vendor Spotlight on Zmanda. Learn the latest user requirements, market trends and the unique role of Zmanda in bringing enterprise-scale open source backup & recovery solution to the market. 
(WHITE PAPER) READ ABSTRACT |

SAP GRC Access Control Solution by HCL Technologies Ltd.

May 2008 - (Free Research)
This white paper discusses how SAP Governance, Risk, and Compliance (GRC) Access Control allow organizations to collaboratively define and oversee SoD enforcement, role management and compliant provisioning. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 462 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts