Home
 > search for

Featured Documents related to »  identity


Identity-based NAC: Using Identity to Put the “Control” in Network Access Control
Access control is more than just checking devices for malware before admitting them to a network. Identity-based network access control (NAC) looks at the

identity  based NAC: Using Identity to Put the “Control” in Network Access Control Identity-Driven Access Gateways manufactured by Caymas Systems allow organizations to identify, authorize, protect and audit everyone that accesses corporate data and applications.Caymas Systems was founded in 2002 by Terence Brown and Robert Bortolotto, and ceased its operations in late 2007. Source: Caymas Systems Resources Related to Identity-based NAC: Using Identity to Put the Control in Network Access Control : N Read More

Business Intelligence (BI)
Business intelligence (BI) and performance management applications enable real-time, interactive access, analysis, and manipulation of mission-critical corporate information. These applications pro...
Start evaluating software now
Country:
 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » identity


Turn Identity into a Business Enabler, Not an IT Bottleneck
This paper will examine identity and context as they relate to your identity management (IdM) infrastructure, and it will also look at how delivering identity

identity  Identity into a Business Enabler, Not an IT Bottleneck This paper will examine identity and context as they relate to your identity management (IdM) infrastructure, and it will also look at how delivering identity and context as a service can help jumpstart—or extend—your identity management efforts, offering you actionable insight into your most valuable resource: your employees, partners, and customers. Read More
Identity-based Policy Enforcement: A LAN Security Best Practices Whitepaper
Disappearing network perimeters highlight the need for identity-based security. Open networks, mobile systems, and unmanaged endpoints have become overwhelming

identity  enforcement layer identity-aware—build user identity knowledge directly into your network fabric. Read More
Case Study: Ping Identity
Ping Identity provides software for the computer security and identity management industry. Ping wanted to facilitate rapid, high-end development and accelerate

identity  Study: Ping Identity Ping Identity provides software for the computer security and identity management industry. Ping wanted to facilitate rapid, high-end development and accelerate time to market for its leading Web security product. When its first outsourcing choice didn’t offer enough Agile development expertise, Ping found another solution that helped reduce costs by 46 percent and doubled in-house performance in key areas. Learn more. Read More
Centrify Introduces New Cloud-based Identity Management Offering
Centrify has introduced a new Windows Azure cloud-based offering for identity management—Centrify DirectControl for SaaS. The product goes beyond identity

identity  Introduces New Cloud-based Identity Management Offering Centrify has introduced a new Windows Azure cloud-based offering for identity management—Centrify DirectControl for SaaS. The product goes beyond identity management solutions and provides comprehensive unified identity services across an organization’s mobile, cloud, and data center infrastructures. The product leverages existing Microsoft Active Directory investments and allows a company to extend the management across a broad range of Read More
Season's Greetings with Helpful Links from TEC
Free Software Evaluations and Reports Top 25 Most Popular White Papers. Follow Us on Twitter. Choose from over 40 different software categories, 1,000 solutions

identity  s Greetings with Helpful Links from TEC Season's Greetings with Helpful Links from TEC   TEC is pleased to have helped over 270,000 organizations with their software selection in 2010 Dear John Doe, For almost two decades, TEC's mission has been to empower you with the tools, research and expertise to help you make the best decision for your enterprise software needs. In 2011 we will surprise you with even better tools and resources. We look forward to providing you with more efficient and Read More
How Effective Project Management Leadership Enabled the Logistics Industry to Reap Large Rewards
Just one generation ago, the courier industry was essentially nonexistent. Today, in 2008, it is one of the largest means of transporting daily shipments for

identity  Effective Project Management Leadership Enabled the Logistics Industry to Reap Large Rewards Just one generation ago, the courier industry was essentially nonexistent. Today, in 2008, it is one of the largest means of transporting daily shipments for all industry sectors. According to the US Department of Commerce statistics, air freight accounted for nearly 40 percent of all international trade merchandise in 2007, equaling about $4.8 trillion (US), with express delivery accounting for 20 percent (or Read More
Small Business VoIP Service Providers Buyer’s Guide
Small-business users of voice over Internet protocol (VoIP) have very different needs. But all users have similar concerns when it comes to cost, the range of

identity  Business VoIP Service Providers Buyer’s Guide Hosted PBX systems provide an easy way for small to medium (and even some large) businesses to move to VoIP and get a wide range of new features and capabilities for their phone systems. In this buyer's guide you will find details on what to look for, how to buy, what you can expect to pay, and how to get the most out of your investment in VoIP. Source: VoIP-News Resources Related to Small Business VoIP Service Providers Buyer's Guide : Voice over Read More
TEC's Talent Management Research Model-What End Users Need to Know
Over the past few months, analysts at Technology Evaluation Centers (TEC) have been working on a new research space for talent management. I’m happy to announce

identity  s Talent Management Research Model-What End Users Need to Know Over the past few months, analysts at Technology Evaluation Centers (TEC)  have been working on a new research space for talent management. I’m happy to announce that the Talent Management  research space for talent management systems is now online and available to the public. Talent Management: What’s In It? TEC’s new Talent Management research space is geared toward end users looking for solutions to manage their business Read More
TEC Helps Corona, a Global Ceramics Leader, Simplify Its ERP Selection in Record Time
Corona, one of the largest conglomerates in South America, specializing in ceramic and tile products, recently engaged the services of Technology Evaluation

identity  Helps Corona, a Global Ceramics Leader, Simplify Its ERP Selection in Record Time TEC Helps Corona, a Global Ceramics Leader, Simplify Its ERP Selection in Record Time Corona solves problem of multiple ERPs through objective software evaluation and selection methodology Montreal, QC, July 14, 2009 - Corona, one of the largest conglomerates in South America, specializing in ceramic and tile products, recently engaged the services of Technology Evaluation Centers Inc. (TEC), the leading resource for Read More
Technology Evaluation Centers presents
Technology Evaluation Centers Inc. (TEC), the leading resource for impartial enterprise software selection, announced today that it will be holding a session at

identity  Evaluation Centers presents How to Select ERP Systems at the MSCI Financial Executives Conference. Technology Evaluation Centers presents How to Select ERP Systems at the MSCI Financial Executives Conference. MSCI members can leverage TEC's Best Practice Methodology for Software Selection. Montreal, Quebec, June 23, 2008- Technology Evaluation Centers Inc. (TEC) , the leading resource for impartial enterprise software selection, announced today that it will be holding a session at the Read More
NIST Certification for AES Encryption
The National Institute of Standards and Technology (NIST) defines the standard for Advanced Encryption Standard (AES) encryption, and provides a rigorous

identity  Certification for AES Encryption The National Institute of Standards and Technology (NIST) defines the standard for AES encryption, and provides a rigorous testing process for software vendors. The certification process is carried out by independent testing labs who report the results to NIST for validation. The AES certification process tests every aspect of encryption and involves millions of encryption and decryption operations. Only the most dedicated security vendors are able to pass the tests Read More
Competency Management: the Compass for Strategic Talent Management
This white paper examines how to use a competency-based approach to build behaviors, skills, and knowledge. It explains how to integrate competencies into all

identity  Management: the Compass for Strategic Talent Management Plateau delivers a best-of-breed talent management solution with deep functionality for learning management, performance management, compensation management and career and succession planning. This allows organizations to take a unified approach to develop, manage, reward and optimize their talent. Superior best-in-class talent management solutions can be deployed individually or together, enabling current and prospective customer to future Read More
TEC Presents Its 2009 Business Intelligence State of the Market Report
Technology Evaluation Centers Inc. (TEC), the leading resource for enterprise software selection, has released a new business intelligence (BI) market report

identity  Presents Its 2009 Business Intelligence State of the Market Report TEC Presents Its 2009 Business Intelligence State of the Market Report A business intelligence report highlighting the solution's benefits Montreal , QC , April 15, 2009 - Technology Evaluation Centers Inc. (TEC) , the leading resource for enterprise software selection, has released a new business intelligence (BI) market report that discusses the advantages of BI 2.0.   This informative report details how BI 2.0 can provide real Read More
These are the Times of CRM Vindication and Validation - Part 3
Part 1 of this series analyzed two white papers entitled “Customer Relationship Management: The Winning Strategy in a Challenging Economy” and “Maximizing CRM

identity  are the Times of CRM Vindication and Validation - Part 3 Part 1 of this series  analyzed two white papers entitled  “Customer Relationship Management: The Winning Strategy in a Challenging Economy”  and  “Maximizing CRM Effectiveness During Lean Times”  and authored by  Microsoft Dynamics CRM  and  Oracle CRM , respectively. The blog post made the case for forward-looking enterprises to leverage  customer relationship management (CRM)  solutions to help them both weather the Read More

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others