Topics Related to Your Search
Business Intelligence Solutions
Authentication / Password Management
Business Process Management (BPM)
Identity Management/ User Provisioning
1 - 25 of 274 | Next Page
Too many results? Filter by:
All result types
Services & Resellers
by Global Knowledge Network, Inc.
Train with the Worldwide Leader in Authorized Cisco Training
- (Free Research) Customers rely on us to deliver quality learning products and services featuring superior instruction and training. Cisco trusts Global Knowledge, the world's largest Cisco Learning Solutions Partner, to deliver expert instruction to a worldwide network of learners and to be the primary training provider for their Associate Sales Engineers.
by ROC Software
ROC Maestro for Open Systems
ROC Maestro for Open Systems, a key component of the ROC Enterprise Suite™, provides a very easy method for scheduling and managing workloads, processes, dependencies and events across complex, heterogeneous IT environments.
Top-10 Guide for Protecting Sensitive Data from Malicious Insiders
- (Free Research) For years, organizations have worked diligently to lock down their perimeters only to find out that the most devastating enemy is already inside. Insider threats abound -- both careless mistakes and malicious attacks. This guide will explore the top ten ways to protect sensitive data from the very people that need access to it.
by Excel Meridian Data, Inc.
The DataNAS XP is designed with performance in mind integrating Pentium Technology, Gigabit connectivity and low cost IDE resources to produce a reliable and economical NAS Filer. The DataNAS XP is scalable from 240GB to 2TB of storage capacity and provides unified file data access for your mixed environment clients without expensive licenses.
Intel® Cloud Builders Guide: Cloud Design and Deployment with Intel® Platforms
- (Free Research) Traditional access security models have focused on access control for data, applications and networks. But security requirements for cloud environments have evolved beyond traditional measures. Learn how the authorization domains model can be used to enforce a consistent security policy in your cloud computing applications.
Defining Your Corporate Mobile Policies
- (Free Research) It's important that corporate mobile policies cover everything from what types of devices will be available to users, to how and when they can use them Read this e-guide to learn more about developing appropriate mobile policies for your organization
by Global Knowledge Network, Inc.
Successfully Managing Remote Teams
- (Free Research) Managing remote teams can be difficult for even the best manager. This white paper explains the challenges you will face and how to overcome them.
by Business Objects
crystalreports.com for Salesforce.com: Exception and Sales Reporting
crystalreports.com is a Web-based report-sharing service that allows you to share Crystal Reports with the right people - simply and securely. Create advanced reports from your Salesforce.com data. Dig deeper for answers using graphs with drill down capabilities. View, schedule, refresh, and distribute reports online - inside Salesforce.com.
by Citrix Online Go To Meeting
Building Trust in a Modern Workplace
- (Free Research) Successful organizations are built on a foundation of trust. This resource introduces three ideas that can help you foster trust between managers and employees, and also outlines key tools that are necessary for sustaining this workforce trust.
by Business Objects
crystalreports.com: Web-Based Reporting & Information Sharing
crystalreports.com is a web-based report-sharing service that allows organizations to instantly share crucial business information with the right people - simply and securely. There is nothing to install, and places no additional workload on IT. It improves decision makers’ ability to make key business decisions based on timely and accurate data.
What's New in IBM InfoSphere Information Server 8.7
- (Free Research) IBM InfoSphere Information Server is a data integration platform that enables organizations to meet their trusted information requirements. It helps integrate heterogeneous information from across an organization’s IT environment, making it possible to understand, transform and deliver trusted information for critical business initiatives.
by Cisco Systems, Inc.
Cisco Tidal Enterprise Adapter for Cognos
- (Free Research) Enterprise Adapter for Cognos is an enhancement to Enterprise Scheduler that allows users to schedule relevant Cognos activities graphically in the context of all other enterprise jobs. It puts stored reports and configuration items automatically into the UI. Continue reading this data sheet to learn more.
by ASG Software Solutions
Business-Critical Benefits of Workload Automation Solutions
- (Free Research) Enterprises have struggled with workload automation (WLA) implementation because of its complexities, dependencies, and costs. These obstacles existed primarily because WLA was simply not a mature technology. However, today WLA solutions are widely accessible and achievable. Read this paper to learn about the latest innovations.
by Wave Systems Corp.
Trusted Computing: Establishing Device Authentication
- (Free Research) View this video to learn the secret to better IT security may be at your fingertips. More likely than not, your PC contains a Trusted Platform Module (TPM), security chip on its motherboard.
by Utimaco Safeware
Embedded Security: Trusted Platform Module Technology Comes of Age
- (Free Research) This paper examines the benefits that TPM chips bring to security-conscious businesses, and the ways in which this technology can elevate trusted computing to higher levels, enhancing security while simplifying usability.
We are always striving to improve our customer experience. Please
notify us if there is a company missing that you feel should be in our directory.