Network Provisioning White Papers

The Provisioning process monitors access rights and privileges to ensure the security of an enterprise's resources and user privacy. As a secondary responsibility, it ensures compliance and minimizes the vulnerability of systems to penetration and abuse. As a tertiary responsibliity, it tries to reduce the amount of custom configuration using boot image control and other methods that radically reduce the number of different configurations involved.
Results 1 - 25 of 58Sort Results By: Published Date | Title | Company Name
By: CA Technologies     Published Date: Jan 08, 2014

Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.

Tags : ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security
    
By: CA Technologies     Published Date: Jan 08, 2014

Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.

Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
By: CA Technologies     Published Date: Jan 08, 2014

Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.

Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
By: CA Technologies     Published Date: Jan 08, 2014

Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.

Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
By: CA Technologies     Published Date: Jan 08, 2014

Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.

Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
By: CA Technologies     Published Date: Jan 08, 2014

Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.

Tags : ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security
    
By: CA Technologies     Published Date: Jan 08, 2014

Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.

Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
By: CA Technologies     Published Date: Jan 08, 2014

Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.

Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
By: CA Technologies     Published Date: Jan 08, 2014

Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.

Tags : ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security
    
By: TIBCO     Published Date: May 15, 2013

This informative webinar focuses on the impact that mobile brings to your enterprise- to your enterprise architecture, changes in development, and how you can use mobile as a driver for change moving forward. Continue for an analysis of the challenges surrounding enterprise mobility.

Tags : mobile, enterprise architecture, development, enterprise, change management, network architecture, network management, network performance
    
By: Wolfe     Published Date: Apr 18, 2013

Cloud services create a compelling case to move application processing and storage out of the data center and onto the network.

Tags : ethernet, cloud, application processing, storage, data center, network, voip, unified communications
    
By: SunGard     Published Date: Aug 13, 2012

Today's IT organizations are faced with the daunting task of optimizing all aspects of their departments, including people, processes and technology. Optimizing and streamlining server utilization through virtualization represents one particularly exciting example. We found that one of the most popular usage models for virtualization is to drive down server procurements in development, test and production environments. When this model is followed, future server purchases are avoided; instead, new workloads are established on existing systems.

Tags : leveraging, visualization, optimizing, processes, technology, optimizing, server utlization, storage
    
By: SunGard     Published Date: Aug 13, 2012

Unicous marketing improves reliability and flexibility, reduces costs, and increases performance with SunGard Enterprise Cloud Services.

Tags : unicous marketing, sungrad, cloud, services, improve performance, efficiency, enterprise applications, infrastructure
    
By: Box     Published Date: Jun 04, 2012

Enter Box. Our partner integrations and robust security suite ensure employees get any-device, on-the-go content sharing and collaboration... while IT retains control and visibility of all user accounts. Get Your FREE Box IT Strategy Kit!

Tags : free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools
    
By: Palo Alto Networks     Published Date: May 09, 2012

In this on-demand video broadcast, hear Nir Zuk, CTO and co-founder of Palo Alto Networks and Rich Mogull, Analyst and CEO of Securosis, provide insights and recommendations on how to handle consumerization and the proliferation of devices.

Tags : palo alto, palo alto networks, consumerization, proliferations, applications, mobile, mobile devices, controls
    
By: Box     Published Date: Mar 14, 2012

Let's take a look at the emerging trends shaping business today, trends that are driving us to rethink and retool response.

Tags : sharing, cloud, content management, emerging trends, enterprise, ecm, demand, software
    
By: PC Mall     Published Date: Mar 03, 2012

With impressive performance scalability, the HP ProLiant DL385 G7 and ProLiant BL465c G7 attained outstanding results for two-processor platforms on the two-tier SAP® Sales and Distribution (SD) standard application benchmark.

Tags : servers, server, hp servers, hp server, scalability, servers, giant, proliant
    
By: HP & Intel     Published Date: Feb 18, 2012

This guide provides practical information to help you prepare your data center for the cloud with Unified Networking, scaled-out storage, trusted server pools, and intelligent power management.

Tags : convergence, infrastructure, network architecture, network provisioning, storage virtualization, configuration management, data integration, data protection
    
By: CyrusOne     Published Date: Jan 19, 2012

This paper explores issues that arise when planning for growth of Information Technology infrastructure and explains how colocation of data centers can provide scalability, enabling users to modify capacity quickly to meet fluctuating demand.

Tags : colocation, cloud, infrastructure, data centers, data center planning, cyrusone, cyrus one, data center
    
By: Aerohive     Published Date: Jan 04, 2012

In today's virtual enterprise, access to corporate resources must be secure, reliable, and manageable, with consistently enforced policy while simultaneously allowing access from anywhere at any time. This is why access network strategies are critical to business growth.

Tags : aerohive, branch office, cloud computing, remote networks, vpn, cloud enabled networking, distributed enterprise, cloud security services
    
By: NetIQ     Published Date: Dec 08, 2011

"Stop the Breach before It Happens: Easy, Smart, and Powerful Security Management Solutions" presented by Garve Hays:

Tags : security, breach, management, security management, event, infrastructure, threat, threat detection
    
By: Sponsored by HP and Intel®     Published Date: Dec 08, 2011

This book will help you understand why infrastructure convergence has been widely accepted as the optimal approach for your IT resources.

Tags : converged infrastructure, infrastructure, mobile, interactive, demand, services, delivery, deliver services
    
By: CenturyLink     Published Date: Nov 18, 2011

Read this IDC Executive Brief to see how MPLS facilitates cost-effective and converged wide area networking with a high level of security and flexibility

Tags : centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles
    
By: ZScaler     Published Date: Nov 18, 2011

Read this informative whitepaper to learn how, as a Blue Coat customer, you can reap the benefits of Zscaler's comprehensive cloud security solution. Learn how enterprises with legacy proxy appliances-such as Blue Coat ProxySG-will further enhance their security with our unmatched advanced threat protection.

Tags : blue coat, proxy sg, url filtering, web 2.0, cloud security, proxy av, xss, vpn
    
By: HP     Published Date: Nov 14, 2011

This white paper examines seven core network management requirements and evaluates how one integrated management solution measures up.

Tags : integrated network, network management, integrated network management, cost-effective, infrastructure, interoperability, local area networking, monitoring
    
Start   Previous   1 2 3    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.