Privileged User Management

  • Source: Quocirca Ltd
  • Written By:
  • Published:
  • (Originally Published On:) )
IT managers feel overwhelmed with the rising tide of security threats they have to deal with in the face of an increasing regulatory burden. But they tend to overlook one particular area of IT security—the privileged access that they grant themselves or their colleagues in order to do their jobs. Learn how to make sure your IT systems are not impacted by the inadvertent or malicious actions of privileged users.

Featured Software Research:

Case Study: IBM's Adoption of Sugar: A Lesson in Global Implementation

  • Source: Ovum
  • Written By:
  • Published:
IBM leveraged SugarCRM's user-focused customer relationship management (CRM) to transform its global sales organization, deploying a new system for reps that manage millions of opportunities worldwide. Read an analysis of how IBM completed this task. Read More

Guide to IT Best Practices in Application-Aware Network Performance Management

Businesses are constantly striving to do more with fewer resources, and information technology (IT) departments are subject to the same pressures. They must contend with a growing number of applications and an increasingly complex infrastructure. The IT department’s arsenal includes tools for monitoring network, application, server, database, and end user performance, but typically they are not integrated with each other. That means that it’s end users who are detecting poor application performance,... Read More

You may also be interested in these related documents:

How to Reduce Business Risk through Secure User Access for SAP

Unencrypted communication between users’ workstations and the backend SAP servers is a significant vulnerability to your SAP environment. This can put the confidential data inside your SAP systems and your entire business activity at risk—and have a negative impact on your customers. Find out how to reduce business risks and improve audit results through encrypted communication and two-factor user authentication for SAP. Read More

Microsoft Office Fluent User Interface: IT Decision-maker Perception

This white paper presents the results of a commissioned study conducted by Forrester Consulting on behalf of Microsoft Corporation to help IT organizations considering adopting the 2007 Microsoft® Office system anticipate the impact of the new Microsoft Office Fluent™ user interface on their end users. The results are based on an online survey of 749 IT decision makers from companies piloting or deploying the 2007 Office system. Read More

But, I Thought the ERP System Was Going to Help Us with That!

Here's an all-too typical scenario. Management at a multinational company decides to implement a standardized enterprise resource planning (ERP) solution. Everyone expects to cut costs and improve core end-to-end processes. But 13 months later, vital key performance indicators (KPIs) don’t improve as planned. Discover how a company focused on user performance to bring its ERP reality back into alignment with its vision. Read More
 
comments powered by Disqus