management

Results 1 - 25 of 10626Sort Results By: Published Date | Title | Company Name
Published By: BigCommerce     Published Date: Oct 16, 2018
Whether your company has been selling online for 20 minutes or 20 years, you are undoubtedly familiar with the PCI DSS (Payment Card Industry Data Security Standard). It requires merchants to create security management policies and procedures for safeguarding customers’ payment data. Originally created by Visa, MasterCard, Discover, and American Express in 2004, the PCI DSS has evolved over the years to ensure online sellers have the systems and processes in place to prevent a data breach.
Tags : 
    
BigCommerce
Published By: Akamai Technologies     Published Date: Nov 02, 2018
Which bot management solution is right for you? Bots are responsible for 30% to 70% of website traffic. They range from good to middling to bad, and from simple to sophisticated. Many bot management vendors say they can solve your bot problem. But can they really? This e-book provides guidance on how to evaluate bot management solutions and understand what the differences mean for you and your customers. We cover the top 10 things to consider when selecting a bot management solution, from accuracy and API protection to flexibility and resilience over time. In viewing this Akamai content, we would like to share your data with Akamai. Click here for more info or to opt out.
Tags : 
    
Akamai Technologies
Published By: Aberdeen     Published Date: Jun 17, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : 
aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state, governmental, decisions, data management
    
Aberdeen
Published By: Dell     Published Date: Nov 12, 2018
IT professionals need tools that make the never-ending log of tasks they face daily, more manageable. While tools like Intel® Active Management Technology (AMT), which is part of the set of Intel vPro™ technologies, can improve management capabilities, learning the software can take time. Download this report today to learn how Dell Client Command Suite can lessen the administrative burden and help your admins maximize their daily productivity.
Tags : 
    
Dell
Published By: Dell     Published Date: Nov 12, 2018
Today, IT leaders address the PC lifecycle across a continuum from control to transformation. Control is geared to optimization, while transformation focuses on the business impact of technology. Though the two approaches differ, they are not in opposition. They strive for the same goals and face similar challenges. As IT leaders provide their workforce with the tools to carry out the corporate mission, they should develop a PC lifecycle strategy that encompasses the key organizational needs of systems management, end-user productivity, business innovation and data-centric security. Read this Dell whitepaper to learn more about the findings of a recent Forrester Consulting study, “Digital Transformers Innovate, Digital Controllers Optimize”. This paper will help clarify the PC lifecycle continuum, from the basics of control to the advanced levels of transformation, so you will be better equipped to determine the needs of your organization on that spectrum.
Tags : 
    
Dell
Published By: Dell     Published Date: Nov 12, 2018
In December 2017, Dell commissioned Forrester Consulting to conduct a study refresh to determine how enterprise organizations are structured from an IT departmental perspective. The study explored two types of IT: digital controllers and digital transformers; and the trends and challenges seen in PC provisioning. Digital controllers are often associated with top-down approach, linear structure, and emphasize security and accuracy. In contrast, digital transformers focus on innovation, employee-and customer-centricity, and prioritize speed and flexibility. By understanding the two groups, enterprises can overcome challenges that arise from PC life-cycle management. By investing in existing PC management tools and partnering with a company that specializes in PC deployment and management, firms can empower employees to better serve customers. Download this Forrester report to learn more about the approach and strategy differences in how these two groups address the dynamic digital demand
Tags : 
    
Dell
Published By: IBM APAC     Published Date: Nov 13, 2018
Expert single-source support across your entire multivendor IT environment, help reduce complexity, decrease costs and ensure availability
Tags : 
    
IBM APAC
Published By: Workday DACH     Published Date: Sep 25, 2018
Sowohl beim Finanz- als auch beim Personalmanagement stehen hinter der Uneinigkeit oft organisatorische Hindernisse, unterschiedliche Systeme und Datenquellen, regulatorische Unsicherheit sowie das Fehlen vollständiger Transparenz im Unternehmen. So beschreibt Joseph Fanutti, CFO von Bill Gosling Outsourcing, die Herausforderungen in seinem eigenen Unternehmen: „Jede Abteilung – Finanzwesen, Personalverwaltung, Operations – agierte isoliert voneinander in eigenen Silos. Es gab keinen einheitlichen Blick auf das Unternehmen. “ Er erinnert sich: „Die Zahlen wurden immer wieder infrage gestellt. Es konnte einfach keine Einigung bezüglich der Kennzahlen und der zu ergreifenden Maßnahmen erzielt werden.“ In diesem White Paper schauen wir uns acht gute Gründe an, die Technologie für Finanz- und Personalmanagement in einer einzigen Lösung zusammenzuführen.
Tags : 
workday, workforce technology, digital strategy
    
Workday DACH
Published By: Workday UK     Published Date: Sep 18, 2018
Looking for a trusted partner in financial management who has what it takes to lead your organisation today and into the future? Get an analysis of the market, key recommendations for evaluating vendors, and more. Download your complimentary copy of Gartner Magic Quadrant for Cloud Core Financial Management Suites.
Tags : 
    
Workday UK
Published By: Workday UK     Published Date: Sep 18, 2018
Get key takeaways for large enterprises from this February 2018 Workday-commissioned study conducted by Forrester Consulting. Learn what’s driving the need for a more frequent performance review cycle and how technology can help.
Tags : 
    
Workday UK
Published By: Workday UK     Published Date: Sep 18, 2018
The annual performance review is in need of a technology-based update. In this global research study, learn how to transform the performance management process from an annual chore to a continuous value driver that better engages and retains employees.
Tags : 
    
Workday UK
Published By: Workday Netherlands     Published Date: Sep 20, 2018
Workday Human Capital Management is de enige toepassing waarin HR en talentmanagement in één system of record zijn samengebracht. Workday geeft een nieuwe dimensie aan het managen van een internationaal, mobiel personeelsbestand met een diverse achtergrond. Bekijk de Product Preview van Workday Human Capital Management om meer te weten te komen over dit product.
Tags : 
    
Workday Netherlands
Published By: Workday Netherlands     Published Date: Sep 20, 2018
Bekijk de belangrijkste conclusies voor medium enterprises uit dit onderzoek dat Forrester Consulting in februari 2018 namens Workday heeft uitgevoerd. Ontdek waarom een frequentere performance review-cyclus nodig is en hoe technologie daarbij helpt.
Tags : 
    
Workday Netherlands
Published By: Evariant     Published Date: Nov 08, 2018
Health systems gain a competitive edge when they identify the right physicians and target those physicians to develop unsurpassed loyalty. Learn how to cultivate relationships with physicians that lead to an increase in cases being referred, which results in smarter provider engagement, increased margins, optimized network utilization and health system growth. But which doctors? In which service lines? And what kinds of cases? And what touch points? This guide discusses how to reimagine how network development teams work that results in the ability to demonstrate indisputable ROI from network development activity and liaison outreach.
Tags : 
physician relationship management, network utilization, market development
    
Evariant
Published By: Evariant     Published Date: Nov 08, 2018
Gone are the days when your physician liaisons called on physicians to discuss referrals and recruit physicians armed with only the “word on the street.” In fact, if your institution is doing this, you can be sure that any competitor is winning the referrals with the help of market intelligence. Download this eBook to get the secrets to unlocking physician liaison ROI and grow market share in this hyper-competitive environment.
Tags : 
physician relationship management, network utilization, market development
    
Evariant
Published By: CyberSource     Published Date: Aug 31, 2018
Gain a bird's-eye view of how online fraud affects the airline industry Fraud continues to be a major source of revenue loss for the global airline industry. With airlines pushing for more direct bookings and the accelerating use of mobile as a booking platform, incidence of fraud is rising, albeit only slightly. Despite these factors, many airlines are not devoting the necessary resources and tracking the required metrics to measure and control fraud. CyberSource partnered with Phocuswright to benchmark global metrics and trends in fraud management and protection among airlines. The study also explores airline awareness of various fraud-related issues and examines their approaches to and implementation of fraud management tools and services. To learn more, download the study today
Tags : 
    
CyberSource
Published By: Zscaler     Published Date: Oct 26, 2018
Cloud computing is rapidly changing enterprise IT with applications like Salesforce and Office 365, which are improving productivity, reducing costs, and simplifying management. Now, organizations are discovering that those same advantages can be achieved by migrating security to the cloud. In fact, in its 2016 Magic Quadrant report on Secure Web Gateways, Gartner reported, “Cloud services have experienced a 35% five-year compound annual growth rate, while on-premises appliances have only grown by 6% during the same period.” Organizations understand that protecting users with a consistent and enforceable policy requires much more than simple URL or web filtering. Thousands of companies have already switched their IT security from appliances to experience the benefits of the Zscaler™ Security Cloud. Download this whitepaper today to find out why.
Tags : 
    
Zscaler
Published By: Mimecast     Published Date: Oct 11, 2018
Information management is getting harder. Organizations face increasing data volumes, more stringent legal and regulatory record-keeping requirements, stricter privacy rules, increasing threat of breaches and decreasing employee productivity. Companies are also finding that their old-fashioned, legacy archive strategies are increasingly ineffective. This is driving many organizations to rethink their approach, developing more modern Information Governance strategies.
Tags : 
    
Mimecast
Published By: Lookout     Published Date: Apr 18, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2018
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile specifc security. To encourage this evolution, Lookout developed the Mobile Risk Matrix. Its purpose is to help security organizations understand the spectrum of risk on mobile devices and to provide data that demonstrates the prevalence of mobile risk.
Tags : 
    
Lookout
Published By: Wasabi     Published Date: Nov 13, 2018
In this case study, read about how one major broadcaster discovered a whole new solution for accessing their archived content and saved a lot of money in the process. Needing on-demand access to archived promotional content this broadcaster was using both on-premise storage and off-promise tape storage with disappointing results. Seeking an alternative they looked to the cloud and Amazon S3. But before they could pull the trigger their media management company Acembly introduced them to Wasabi. It was a game changer. Wasabi’s Hot Cloud Storage is 80% cheaper and 6x the speed of even Amazon’s fastest offering. Plus, there’s free unlimited egress which is crucial for companies with unpredictable content needs. Download the case study to see how Wasabi’s revolutionary cloud storage technology is changing the possibilities for broadcasters and how they access their content.
Tags : 
    
Wasabi
Published By: Juniper Networks     Published Date: Oct 02, 2018
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 42.3% of respondents in ASEAN countries saying they deal with more than 50 alerts each day. Shockingly, for 7% of organizations, that figure rises to between 100 and 1,000 threats a day. The Solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download the Report to find out what else Ovum has discovered about security practices in ASEAN.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 02, 2018
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 50% of respondents in India saying they deal with more than 50 alerts each day. Shockingly, for 6% of organizations, that figure rises to between 100 and 1,000 threats a day. The Solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download the Report to find out what else Ovum has discovered about security practices in India.
Tags : 
    
Juniper Networks
Published By: Black Duck Software     Published Date: May 18, 2010
In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source
    
Black Duck Software
Published By: Black Duck Software     Published Date: Jul 16, 2010
This paper is for IT development executives looking to gain control of open source software as part of a multi-source development process. You can gain significant management control over open source software use in your development organization. Today, many IT executives, enterprise architects, and development managers in leading companies have gained management control over the externally-sourced software used by their application development groups. Download this free paper to discover how.
Tags : 
open source, development, architects, application development, software development
    
Black Duck Software
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.