Softcat is a leading provider of software licensing, hardware, security and related IT services based in London. Softcat's managed service business runs from two datacentres in London and Manchester; this includes their cloud service platform: Cloud Softcat. They have also recently invested in their Network Operations Centres in Marlow and Manchester.
Check out this informative on-demand webcast about our Advanced Authentication Framework if you’re “Thinking Twice About Your Hard Tokens”.
Identity Manager Home is a new end user interface for Identity Manager. This demo guides you through the simple steps an average end user can use to find a resource that they need to do their job, initiate a request for access to those resources and see what they already have and the status of their requests. It also outlines how end users' management can review and approve those requests.
The Hastings & Prince Edward Counties Health Unit had to migrate the workloads of 40 virtual servers to a new data center with a minimum of downtime. After looking at various server migration tools, the Health Unit decided to do the server migration with PlateSpin Migrate, because of the real-time block level replication and the possibility to do live migrations.
As a result the Health Unit migrated the workloads of 40 servers with only 2-3 minutes downtime per server. "With PlateSpin Migrate the data center migration project went quickly, efficiently and most importantly successfully" said Tom Lockhart, IT Systems Manager from Hastings & Prince Edward Counties Health Unit.
Today’s IT world is complex. An enterprise has hundreds, if not thousands, of critical components needed to deliver the services the business relies on. The job of IT professionals is to make sure it’s all up and running, performing as expected, and delivering critical IT and business services. AppManager is the monitoring tool that meets all your monitoring needs, as well as easily expands to include UC/VoIP monitoring, IT process automation, and more!
PlateSpin Protect is a disaster recovery software product that uses virtual infrastructure capacity to protect both physical and virtual workloads. It can deliver mirroring-like RTO and RPO performance at a price point approaching tape.
Join Mike Robinson, Joseph Rogers and Michael Reid in this webcast as they discuss Disaster Recovery.
Your IT environment is constantly changing. You need good ways to understand and report on its behaviors to understand trends and predict when you'll need more storage, bandwidth, memory or processing power. Additionally, because your IT environment is in flux—you should be able to recognize it's normal and expected behaviors so you only get alerted about anomalous or unexpected situations—making alerts more meaningful. The AppManager Reporting and Analytics Add-on can help!
You rely on AppManager for monitoring business-critical applications and systems. So when it's time to upgrade, you want to know that it will be done right.
AppManager provides monitoring for many technologies, but not every application or device has an available module to monitor it. So what's the easiest way to monitor something without a module?
Join AppManager expert Joe Hargrave to find out how to:
Analysis Center 2.7 automatically collects and stores metrics in a data warehouse and distributes pre-defined reports on schedule or on demand. Now is the time to take advantage of the full cost-savings benefits of Analysis Center by migrating to this latest version.
In this webcast, "Deploying AppManager in the Real World" you will learn how to maintain accurate monitoring so that information gaps do not develop, while making it easier to collect the events and data you need to keep your IT systems and applications performing at their best.
Using Identity Manager and Access Manager, Novacoast works with a variety of customers to help solve complex identity management issues.
Identity and Access Management solutions provide corporations the ability to give users self-service capabilities for managing access, passwords and information.
Sam's boss, the CIO, wants to transition to Microsoft Office 365. But, he doesn't realize how the complexity it introduces to their environment impacts their user's single sign on experience. Sam, the IT Admin, has to figure it out -- and she does. Sam discovers CloudAccess and how it makes single sign on easy; especially compared to implementing and maintaining Microsoft's Active Directory Federation Services.
See some of the challenges the cloud presents, and how CloudAccess solves those challenges, using Microsoft Office 365 as an example.
Softcat is a leading provider of software licensing, hardware, security and related IT services based in London. Softcat's managed service business runs from two datacentres in London and Manchester; this includes their cloud service platform: Cloud Softcat. They have also recently invested in their Network Operations Centres in Marlow and Manchester.
Recorded live at BrainShare 2013 with speaker Carolyn McClain. Cloud Security Services is a series of product offerings designed with multi-tenant management and per-tenant usage-based billing. Cloud Security Services fits comfortably in a public cloud and has the ability to support a mix of cloud and enterprise deployment schemes. During this session you will see the latest service offerings, review deployment scenarios and have the opportunity to hear cloud service provider experiences.
A demo of Social Access and application that lets you login to corporate applications using Facebook or other social credentials as well as a LDAP username and password.
Demonstration of how MobileAccess can help enterprises deploy secure applications even when it is not their device.
Demonstration that shows the turn key integration between Access Governance Suite and Identity Manager.
Identity Manager Home allows your average end users to find a resource that they need to do their job, initiate a request for access to those resources and see what they already have and the status of their requests. The end users' management is able to review and approve those requests.
A demonstration of the biometric and one time password advanced authentication capabilities of SecureLogin, as well as other major enhancements in SecureLogin 8.
Learn how we can help reduce complexity in today's world of cloud, compliance, bring your own device and even bring your own identity.
Review the concepts of multi-factor authentication and explore various authentication methods and the pros and cons of each one.
Hastings and Prince Edward Counties chose PlateSpin Forge because it was available as a fully configured hardware appliance, ready to do the data protection that they needed. It took just half an hour to get PlateSpin Forge up and running. They have had to use their Disaster Recovery solution twice, and both times it worked perfectly.
Learn about multi-factor authentication using tokens and one-time passwords (OTPs). See how to authenticate with a token, and learn more about when this technology is appropriate.
Justin Taylor talks to Jon Hardman about CloudAccess and what differentiates it. Jon demos how CloudAccess looks to the end-user, plus installing, adding a new service, and rolling that service out to users.
Explore multi-factor authentication with a flash drive. See how to authenticate with a flash drive, and review the characteristics of this technology.
Learn about multi-factor authentication with Proximity Cards. Watch a demo of how to authenticate with a Proximity Card, and review the characteristics and common uses of this technology.
Tieto, a leading European IT service company, has chosen our technology as the basis of its cloud-based data centre services. As a result of this partnership, Tieto offers a full Cloud Services portfolio—delivered at the speed and flexibility of the public cloud—that can meet the unique needs of its growing northern European customer base with the consistent and integrated service customers have come to expect.
Explore multi-factor authentication with a fingerprint reader. Watch a demo of how to authenticate with a fingerprint reader, and review key characteristics and common use cases of this technology.
Most enterprises focus their security strategies-and their security monitoring practices-on the risks posed by end users, customers, and/or business partners. But such strategies may overlook one huge source of risk: the IT department itself. Every day, IT staffers make changes to systems access controls, firewall settings, router port configurations, and many other administrative tools that may impact the security posture of the organization. How can enterprises be certain that these everyday changes don't leave their systems and data open to attack? In this webcast, a top expert in security research and administration will discuss the common mistakes enterprises make in change and configuration management, and how to ensure that these mistakes don't lead to unexpected security compromises.
In this video we provide a high level discussion of various multi-factor authentication methods, their typical use and the pros and cons of each method type.
This ChalkTalk covers key concepts that are important when talking to a customer about disaster recovery.
Mike Reid demonstrates how organizations can protect both physical and virtual machines in the same appliance, PlateSpin Forge.
This auditing and compliance session provides tips to improve your security and compliance efforts.
The Central Denmark Region (Region Midtjylland / MIDT) is one of five administrative regions in Denmark. The administration's main responsibility is providing healthcare services to the region's 1.2 million inhabitants.
Community Health Systems, Inc. (CHS) is one of the USA’s leading operators of general acute care hospitals; operating 158 hospitals in 22 states with approximately 27,000 licensed beds. They needed to manage and secure digital identities for 280,000 users in their ever-changing and growing healthcare environment, without compromising patient care. Working with GCA Technology Solutions they deployed NetIQ Identity Manager to create a robust and secure automated user provisioning and single sign-on environment.
Explore multi-factor authentication with a fingerprint reader. Watch a demo of how to authenticate with a fingerprint reader, and review key characteristics and common use cases of this technology.
Mike Robinson, Senior Product Marketing Manager, shares how PlateSpin Migrate and Recon from we can help you virtualize workloads faster and more efficiently.
Learn how to effectively drive the business value delivered by IT.
Operations Center helps you measure the performance of your IT systems against agreed Business Service Levels.
See how the Role Mapping Administrator can make your business more agile by giving Business Managers the ability to set their own teams' access levels.