visibility control

Results 126 - 150 of 180Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Mar 31, 2017
As the cloud continues to be adopted for a wide range of applications and data, it is critical to mitigate risks, increase visibility and implement control over all cloud offerings through an integrated security solution. To learn more, download this infographic.
Tags : 
cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security, cloud data protection, cloud access security broker, cloud survey, cloud usage data, cloud malware, aws security
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The relentless march of end user organizations toward cloud services continued during the past 12 months, according to a new SANS survey, despite long-standing fears about information security, the lack of visibility into cloud provider security controls and the shortcomings of controls available to those who utilize cloud services. One big difference since the 2015 SANS cloud security survey:1 Information security professionals appear to have accepted that the cloud is here to stay and are, sometimes unenthusiastically, doing what they can to make the frontier secure.
Tags : 
cloud security, cloud data center, sans survey
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
As trust grows, cloud use accelerates. IT struggles to safeguard sensitive data as Shadow IT hinders visibility and control. Read “Building Trust in a Cloudy Sky.”
Tags : 
cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security, cloud data protection, cloud access security broker, cloud survey, cloud usage data, cloud malware, aws security
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
As trust grows, cloud use accelerates. IT struggles to safeguard sensitive data as Shadow IT hinders visibility and control. Read “Building Trust in a Cloudy Sky.”
Tags : 
cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security, cloud data protection, cloud access security broker, cloud survey, cloud usage data, cloud malware, aws security
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
As the cloud continues to be adopted for a wide range of applications and data, it is critical to mitigate risks, increase visibility and implement control over all cloud offerings through an integrated security solution. To learn more, download this infographic.
Tags : 
cloud, cloud usage, cloud security
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The relentless march of end user organizations toward cloud services continued during the past 12 months, according to a new SANS survey, despite long-standing fears about information security, the lack of visibility into cloud provider security controls and the shortcomings of controls available to those who utilize cloud services. One big difference since the 2015 SANS cloud security survey:1 Information security professionals appear to have accepted that the cloud is here to stay and are, sometimes unenthusiastically, doing what they can to make the frontier secure.
Tags : 
cloud security, cloud data center, sans survey
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
As trust grows, cloud use accelerates. IT struggles to safeguard sensitive data as Shadow IT hinders visibility and control. Read “Building Trust in a Cloudy Sky.”
Tags : 
cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security, cloud data protection, cloud access security broker, cloud survey, cloud usage data, cloud malware, aws security
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The relentless march of end user organizations toward cloud services continued during the past 12 months, according to a new SANS survey, despite long-standing fears about information security, the lack of visibility into cloud provider security controls and the shortcomings of controls available to those who utilize cloud services. One big difference since last year’s SANS cloud security survey, “Information security professionals appear to have accepted that the cloud is here to stay and are, sometimes unenthusiastically, doing what they can to make the frontier secure.” To learn more, get the full SANS report.
Tags : 
cloud security, cloud data center, sans survey
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
Data Protection is no longer just a problem that resides at the endpoint. This ebook takes you through the top use cases, ranging from visibility and control of sanctioned/unsanctioned cloud applications to demonstrating compliance across cloud environments.
Tags : 
data protection, cloud data protection, cloud applications, visibility of data, unauthorized sharing data, device proliferation, data protection strategy, cloud visibility, shadow it, compliance
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
As trust grows, cloud use accelerates. IT struggles to safeguard sensitive data as Shadow IT hinders visibility and control. Read “Building Trust in a Cloudy Sky.”
Tags : 
cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security, cloud data protection, cloud access security broker, cloud survey, cloud usage data, cloud malware, aws security
    
McAfee
Published By: Medius     Published Date: Oct 01, 2019
AP automation is often described as low hanging fruit in the garden of digital transformation. And for a good reason – the barrier to entry is impressively low in terms of both cost and effort needed to get up and running, particularly in comparison to the implementation projects for other business applications. Despite that fact, the value provided from AP automation is comparably high. For such an easy implementation, the benefits reach throughout an organization, beyond the walls of the AP department, and are near-immediate from day one of using the solution. Standard benefits include: - Immediate value from day one with an expected ROI within the first year - Up to 95% truly touchless invoice processing with access to real-time cloud data for benchmarking and reporting - Easy access to financial data, such as cash flow & accrual reporting, with full visibility and control of the AP process This guide will help you kick-start your AP automation project by defining the 6 steps to build a solid business case and gain the internal approvals needed to get started.
Tags : 
ap automation, invoice processing, invoice automation, accounts payable automation, accounting software, accounting automation, microsoft dynamics automation
    
Medius
Published By: Medius     Published Date: Oct 01, 2019
Only a best-of-breed AP automation solution can offer the high levels of fully automated, touchless, invoice processing that your organization needs to scale your business operations.MediusFlow is the leading cloudbased solution for Dynamics users that automates the entire accounts payable process, enabling increased efficiency, touchless invoice processing as well as better financial visibility and control. This guide will help you understand... • What AP automation is • The different options available • What to consider when selecting a solution • How to evaluate solutions
Tags : 
ap automation, invoice processing, invoice automation, accounts payable automation, accounting software, accounting automation, microsoft dynamics automation
    
Medius
Published By: NetApp     Published Date: Mar 05, 2018
For your hybrid cloud, you need visibility and actionable intelligence across both on-premises infrastructure and multiple cloud services. Learn how the right analytics software will help you gain new insights into your IT Infrastructure and improve control of your data in the hybrid cloud.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: NetApp     Published Date: Mar 05, 2018
NetApp® Data Fabric enabled solutions empower organizations to use data to make intelligent decisions about how to optimize their business and get the most out of their IT infrastructure. They provide essential data services for data visibility and insight, data access and control, and data protection and security. 
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: NETIQ     Published Date: Sep 09, 2013
This paper contains three simple steps for maintaining visibility and control when moving to the cloud and explains how NetIQ can help with each.
Tags : 
netiq, cloud infrastructure, cloud computing, security risks, regulations, information security, compliance management, public cloud, private cloud, hybrid cloud, cloud security, cloud, data security, it security, cloud service, cloud technology, cloud solution, security management, security
    
NETIQ
Published By: NETIQ     Published Date: Jun 20, 2014
On the one hand, you have the increased productivity that goes along with BYOD. On the other hand, you have all the security risks and users’ concerns about giving IT visibility or control of a personal device. Learn how to solve this puzzle.
Tags : 
netiq, byod, mobile access, autonomy, privacy, security, it management
    
NETIQ
Published By: Netwrix     Published Date: Aug 01, 2013
Netwrix Auditor takes a holistic approach to IT infrastructure auditing, providing the visibility, intelligence, security and control you need to keep your business up and running, minimize troubleshooting, meet regulatory compliance standards and make sure your critical IT assets are secure - and stay that way
Tags : 
netwrix, free trial, netwrix auditor, it infrastructure, configuration, it systems, configuration auditing, active directory auditing, systems monitoring, software development, it management
    
Netwrix
Published By: Optymyze     Published Date: Feb 05, 2018
Do you want to increase visibility across your global business, reduce risk, and boost sales performance? Find out how a Sales Operations Center of Excellence can help you achieve all this and more: • Lower costs by standardizing processes. • Gain more control over operational performance. • Create standards for collecting, storing, and managing data. • Identify which factors determine harmonization, and how it can benefit your entity. • Ensure global compliance through enterprise standards. • Provide expertise and support to boost sales performance across all business units. Get your free copy now!
Tags : 
sales operations, sales performance, sales performance management, sales processes
    
Optymyze
Published By: Oracle     Published Date: Jul 05, 2017
The fast-evolving digital landscape is changing the game for all organizations. The way we consume content, conduct research, consume video and music, and drive efficiency in our work environment is raising the bar for digital experience. Organizations that rely on the internet to reach customers and drive revenue increasingly turn to cloud-based infrastructure and content delivery networks (CDNs) to achieve the reach and global footprint needed to keep up with customer demands. Delivering these services with high availability and performance across an unpredictable internet over which you have very little visibility and control is a major challenge.
Tags : 
it infrastructure, operations professionals, digital experience, time to resolution, cloud, dns
    
Oracle
Published By: Oracle Primavera     Published Date: Oct 09, 2015
With budgets in the billions, timelines spanning years, and life cycles extending over decades, oil and gas projects present enormous management challenges for the organizations sponsoring them. Oracle helps oil and gas companies rise to these challenges – and reap the corresponding rewards – by providing an enterprise project portfolio management (EPPM) solution that gives them visibility into and control over every aspect of their operations.
Tags : 
oil, gas, oil and gas industry, eppm, oracle, operations management, project management, project portfolio, management, pmo, finance
    
Oracle Primavera
Published By: Preempt     Published Date: Nov 02, 2018
Attackers and malware are increasingly relying on a common set of tools to compromise identities and spread within a network. Tools like Mimikatz accompanied with common administrator tools like PsExec and WMI have become a standard part of an attacker’s arsenal to turn a single machine compromise into a full network breach. In this webinar we will take a look at why some of these tools are traditionally difficult to control, and introduce new countermeasures that let you fight back. In this webinar we will cover: - An analysis of recent malware and attacks and the tools they used to spread through the network. - A closer look at the underlying protocols supporting these tools, and the traditional challenges to controlling them. - Introduce new controls that allow organizations to control NTLM in real-time, block pass-the-hash techniques, and adaptively control the use of NTLM in the network. - How to gain visibility into PsExec, WMI, and RPC in general and how to create controls t
Tags : 
    
Preempt
Published By: Progress Software     Published Date: Sep 27, 2010
What are the top strategies to expand visibility of all business operations? How can you reduce your time-to-value? If you're looking for a better, timelier way to respond to the changing conditions and events that impact your business, register for Your Business Moves Faster When You're at the Controls.
Tags : 
progress, cto, business operations, webcast, idc, improvements, application performance management, business activity monitoring, business integration, business management, middleware
    
Progress Software
Published By: Rapid7     Published Date: Mar 19, 2014
This paper discusses reasons why visibility is so essential, and outlines how you can use visibility beyond and within the firewall to develop policies and processes that protect what you can’t control.
Tags : 
rapid7, security, cloud security, firewall, mobile applications, social applications, social media, protection, network security, firewalls, intrusion prevention, data protection, vulnerability management
    
Rapid7
Published By: Red Hat     Published Date: May 05, 2015
It's time to manage all your VMware machines through 1 tool. Red Hat® CloudForms gives you visibility and control throughout your whole infrastructure—from individual VMware machines to your entire cloud and virtualization infrastructure. Download the technology brief to learn more.
Tags : 
redhat, cloud management, vmware environments, virtualization infrastructure, visibility, it management, knowledge management, data management, data center
    
Red Hat
Published By: Riverbed     Published Date: Oct 16, 2012
As enterprises continue to grow, tools for collaboration are becoming more interactive. Read this to learn how to examine the need for acceleration, application control and visibility to improve and solve problems effectively for the future.
Tags : 
riverbed, wan optimization, wan, network management, enterprise application, networking, electronics
    
Riverbed
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.