User ManagedWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: User Managed returned the following results.
RSS What is RSS?
Related Categories

 •   Identity Management/ User Provisioning
 •   Access Control
 •   Security Policies
 •   Authentication / Password Management
 •   Virtualization
 •   Application Management and Maintenance
 •   Storage Management
 •   Usage Management and Monitoring
 •   Data Security
 •   Disk-based Backup & Storage/ RAID

Related Searches
 •   Code User Managed
 •   Standard User
 •   User Compare
 •   User Managed Arkansas
 •   User Managed Budgets
 •   User Managed Sales
 •   User Managed Statement
 •   User Providers
 •   Video User Managed
 •   Web User Managed
Advertisement

ALL RESULTS
1 - 25 of 459 | Next Page

Defining Identity Management by Hitachi ID Systems, Inc.

June 02, 2010 - (Free Research)
This document defines the components of identity management, starting with the underlying business challenges of managing user identities and entitlements across multiple systems and applications. Identity management functions are defined in the context of these challenges. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: 3 Steps to Securing Private Data in the Public Cloud by Sophos, Inc.

June 12, 2012 - (Free Research)
Public cloud storage services enable users to easily share and store data, but they also introduce new security challenges that often clash with exiting IT policies. In this presentation transcript, learn how IT managers can help their users manage access to the public cloud without placing your data or business at risk. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Reducing Risks through Flexible and Automatic Oracle Data Protection by BakBone

January 17, 2008 - (Free Research)
For Oracle administrators, backup and recovery can be a daunting challenge. Read this white paper to learn about automated tools for Oracle databases that combat these problems by ensuring the highest levels of data protection, availability and retention. 
(WHITE PAPER) READ ABSTRACT |

eBook-- Defining an Email-Archiving Policy by Symantec Corporation

July 09, 2009 - (Free Research)
Read this chapter of the e-book Email Archiving Planning: Policies and Product Selection to learn how to create and implement a comprehensive policy on email archiving that will enforce how users manage and retain email messages. 
(EBOOK) READ ABSTRACT |

CW+: Special Report on CA Technologies by ComputerWeekly.com

January 01, 2011 - (Free Research)
CA Technologies is one of the world’s largest independent software companies with revenues of $4.4bn (£2.7bn). The IT infrastructure supplier specialises in software products that help users manage their mainframes and distributed computing environments. 
(WHITE PAPER) READ ABSTRACT |

Best Practices in Performance Management: Monitor, Measure and Manage the End User Experience by Knoa Software

September 2008 - (Free Research)
This report is the result of a study taken by 87% of IT executives on the best way to manage the service of business critical applications to measure performance at the end-user level. Read this to learn the best practices in performance management. 
(WHITE PAPER) READ ABSTRACT |

Access Control in Virtual Environments by FoxT

June 2008 - (Free Research)
The growth in use of virtual servers is heralded by many as a positive development because it is seen to save companies money and resources. 
(WHITE PAPER) READ ABSTRACT |

User Directed Storage Management: How To Make Users Accountable For Responsible Storage Usage by Northern Parklife

February 2009 - (Free Research)
The accelerated pace of doing business in today's world puts organizations under tremendous pressure. They need to be fleet and flexible, able to rapidly respond to opportunities, make decisions, and deploy resources. Critical to this is the way information is managed and stored. 
(WHITE PAPER) READ ABSTRACT |

Wave Methodology- A Practical Guide to Defining Roles for Access Control by Oracle Corporation

June 2011 - (Free Research)
As the number and type of users who require access to organizations’ computer-based resources increase, the traditional method of managing user access on a case-by-case basis has quickly become antiquated. This paper explores a 7-step process which has proven to be an effective method for administrators to identify user roles for access control. 
(WHITE PAPER) READ ABSTRACT |

VMware ACE 2 Enterprise Edition: Desktop Virtualization Solution by AMD and VMware, Inc (E-mail this company)

VMware ACE 2 Enterprise Edition delivers desktop virtualization solutions for enterprise users. Use VMware ACE 2 to deploy an ACE virtual machine as an IT managed “virtual laptop” to remote workers, provision controlled desktop images as sandbox environments or run legacy operating systems & applications on an existing PC as you migrate to Vista. 
(SOFTWARE PRODUCT)

Managing Identities and Access Control by SearchSecurity.com

February 2010 - (Free Research)
SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles. 
(EBOOK) READ ABSTRACT |

LiveWire Mobile Brings Music to Your Ears with Insight from Business Objects by SAP America, Inc.

June 2008 - (Free Research)
Read this case study and see how Business Objects helped Livewire manage their royalty stream for end-user downloads, measuring performance and the end-user experience, and analyzing trends quickly and accurately. 
(CASE STUDY) READ ABSTRACT |

Borderless Applications and the Changing Face of Application Performance Management by Compuware Corporation

April 2011 - (Free Research)
This paper discusses the shift in application performance management by IT operations and it provides insight into how best to ensure applications spanning across all boundaries of enterprise and the Internet can successfully be monitored and managed to meet the needs of the business. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Technical Guide on Managing Identities and Access Control by CA Technologies

December 2010 - (Free Research)
SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles. 
(EBOOK)

N-able’s RMM solution is now better than ever! by N-able Technologies

October 2013 - (Free Research)
This helpful video takes a look at a solution that is designed specifically to help MSPs provide high-quality services efficiently and effectively while proactively managing the users' IT environments. 
(WEBCAST) READ ABSTRACT |

How to Simplify Migrations with Virtualization by AppSense

May 2013 - (Free Research)
This informative white paper takes an in-depth look at user virtualization, which allows for the management of user-specific information independent of the desktop – thus minimizing the complexity of any desktop operating system migration. 
(WHITE PAPER) READ ABSTRACT |

Controlling and Managing Superuser Access by Dell Software

December 2011 - (Free Research)
"Super users" – those people with greater access and rights – is a necessary part of IT. However, privileged accounts carry implicit security risks, so securing them – while preserving access and ease of use – is vital. Discover the risks associated with privileged accounts and how to mitigate them. Read "Controlling and Managing Super User Access" 
(WHITE PAPER) READ ABSTRACT |

Mobile Virtualization and Remote Access on Windows Mobile Smartphones by Celio Corp / REDFLY Mobile Companion

August 2008 - (Free Research)
Remote access and virtualization on the smartphone is a secure and efficient way to provide the mobile workforce access to robust applications and desktop features. 
(WHITE PAPER) READ ABSTRACT |

Archive Attender™ for Exchange - Affordable Email Archiving by Sherpa Software

Archive Attender is a solution designed to move or copy messages from mailboxes, PST files and public folders. Administrators search indexed archives and view reports for storage and compliance. No SQL database or proprietary hardware required. Offers flexible archiving architecture. Free Trial available. 
(SOFTWARE PRODUCT)

The Benefits of User Directed Email Archiving by EMC Corporation

March 2008 - (Free Research)
Email archiving solutions enhance a company's ability to comply with regulatory and internal standards for data retention and the ability to find data when needed, either for internal use or for legal discovery. 
(WHITE PAPER) READ ABSTRACT |

Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory by Oracle Corporation

August 2008 - (Free Research)
This paper illustrates how you can now centrally administer database users and role memberships leveraging your existing LDAP directories. 
(WHITE PAPER) READ ABSTRACT |

End-User Monitoring: Gaining Visibility into Hidden Business Risks by CA Technologies.

August 2008 - (Free Research)
This white paper explores how to implement effective end-user transaction monitoring and management to attain greater visibility into the user experience. 
(WHITE PAPER) READ ABSTRACT |

Provergent Suite - Telecom Order & Inventory Software by Digital Fairway, Inc.

The Provergent Communication Asset Management Suite helps to manage the planning, procuring, provisioning, auditing & delivering of communications services. Provergent allows you to build accurate & easy to manage centralized inventories, backed up by automated provisioning processes to manage all moves, adds, changes & deletes in the inventory. 
(SOFTWARE PRODUCT)

Mobility - Aironet 1100 Series by Cisco Systems

The Cisco Aironet® 1100 Series delivers an affordable and upgradable 802.11b wireless LAN (WLAN) solution, setting the enterprise standard for high performance, secure, manageable, and reliable WLANs. 
(HARDWARE PRODUCT)

CW+ Quocirca report: Privileged user management by ComputerWeekly.com

October 2010 - (Free Research)
IT managers everywhere feel overwhelmed with the rising tide of security threats they have to deal with in the face of an increasing regulatory burden. It is not surprising then that they tend to overlook one particular area of IT security, which is the privileged access that they grant themselves and/or their colleagues in order to do their jobs. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 459 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts