office

Results 151 - 175 of 1120Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
The ‘80s Called… … And they don’t want their enterprise Project and Portfolio Management (PPM) tools back. If your Project Management Office (PMO) is still relying on the same or similar processes and systems used when neon and mullets were trending, it will never keep pace with today’s market demands or shifts in technology. Six-month deployment schedules and command and control models of yesteryear are actively being replaced with continuous delivery methods and practices like agile and lean—all in the interest of driving greater customer engagement.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
Les solutions modernes telles que CA PPM continuent d’élever la barre en matière d’outils dernière génération de gestion de la demande IT en proposant en permanence de nouvelles fonctionnalités permettant d’alléger la charge des bureaux de gestion de projets (Project Management Office, PMO), des directeurs financiers, des gestionnaires des ressources et des chefs de produit. Ces dernières années, de nouveaux fournisseurs cherchant à tirer parti du vaste marché toujours plus influent de la gestion de portefeuilles de projets (Project and Portfolio Management, PPM) ont développé des modules qui « s’intègrent » à leurs plates-formes SaaS. Ils se targuent du fait que leurs outils sont faciles à installer et à gérer et promettent des économies à leurs clients. Cela semble trop beau pour être vrai. Et pour la plupart des organisations, c’est malheureusement le cas.
Tags : 
    
CA Technologies EMEA
Published By: TIBCO Software APAC     Published Date: May 31, 2018
Integration is the lifeblood of today’s digital economy, and middleware is the software layer connecting different applications, services, devices, data sources, and business entities. This Ovum Decision Matrix (ODM) is a comprehensive evaluation to help enterprise IT leaders, including chief information officers (CIOs), enterprise/integration architects, integration competency center (ICC)/integration center of excellence (CoE) directors, and digital transformation leaders select a middleware-as-aservice (MWaaS) suite best suited to their specific hybrid integration requirements.
Tags : 
    
TIBCO Software APAC
Published By: VMware     Published Date: Dec 10, 2018
It’s no secret financial services organizations own and operate legacy solutions. Some of these core processes are front and center, meeting customer needs; others are in the middle, supporting account handling operations; and still many more are in the back-office, handling data and managing analytics. The challenge for financial leaders is to ensure these traditional systems don’t prevent the delivery of great digital experiences now and into the future. To find out more download this eBook today.
Tags : 
    
VMware
Published By: VMware     Published Date: Dec 14, 2018
Hyperconverged infrastructure (HCI) is giving organizations the agility to respond quickly to demand for new products, services and applications. Many organisations begin their HCI journey by targeting specific use cases such as virtual desktop infrastructure, disaster recovery and remote office-branch office environments. But HCI continues to evolve far beyond these use cases. In this case study, we look at real world deployments to identify how HCI is helping businesses to reduce TCO, improve scalability and rapidly adopt new technologies. Please enter your details to view the case study.
Tags : 
    
VMware
Published By: Vena Solutions     Published Date: Oct 29, 2018
Even after more than 30 years, it's easy to see why Excel remains so popular. It's flexible, powerful and irreplaceable - especially in finance and accounting. But how well does it work in FP&A today? That's the question that Vena and the Association of Finance Professionals set out to answer in this objective research-based guide, Making Excel Work for FP&A. From taking advantage of Excel's full feature set, to adopting FP&A software built around Excel, there's no shortage of ways to get the most out of Excel for your FP&A needs.
Tags : 
making excel work for fp&a, excel evolution, excel for finance, spreadsheet software, microsoft excel, power bi, financial planning and analysis, cpm, cpm systems, corporate performance management, data analytics, power pivot, microsoft office 365
    
Vena Solutions
Published By: Nice Systems     Published Date: Feb 26, 2019
NICE WFM 7.0’s Forecaster unlocks a high level of transparency into interaction history, allowing you to centrally forecast, schedule and manage contacts between multiple locations and ensure that site- and enterpriselevel objectives are met. With more than two thousand customers and two million users depending on its unparalleled ability to fine-tune the most precise forecasts, Forecaster allows you to plan and respond to the peaks and valleys of customer history through automatic collection of key historical data from all types of contact sources: • Automatic call distributors (ACDs) • Outbound dialers • Multi-channel routing platforms • Back-office employee desktops Download today to learn more.
Tags : 
    
Nice Systems
Published By: Riverbed     Published Date: May 24, 2012
Forrester Consulting recently analyzed the requirements for consolidating branch office infrastructures while simultaneously supporting the demands of emerging business goals.
Tags : 
infrastructure, server and storage virtualization, wan optimization, dns, dhcp, branch-office, business technology, data center
    
Riverbed
Published By: Dell SB     Published Date: Jan 24, 2019
Introducing a refreshed and most complete mobile portfolio on the planet!
Tags : 
    
Dell SB
Published By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected.
Tags : 
advanced threats, e-discovery, compliance, rapid response, office 365, email controls, archiving, customer support
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected.
Tags : 
malware, business email compromise, security, it departments, archiving, information protection, advanced technologies, office 365
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 21, 2017
De nos jours, les auteurs d'attaques, toujours plus inspirés, utilisent des outils automatisés pour puiser des informations sur leurs cibles dans les profils — souvent publics — disponibles sur les médias sociaux. Ils savent donc où vous travaillez. De même, le poste que vous occupez, vos centres d'intérêt, vos loisirs, votre situation matrimoniale ou encore vos précédents emplois n'ont plus aucun secret pour eux. Ils se servent de ces informations pour élaborer des messages convaincants qui vous incitent à cliquer sur une pièce jointe ou une URL malveillante. Si vous tombez dans le piège, une charge active malveillante est injectée dans votre système.
Tags : 
phishing, malware, des individus pris pour cible
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 21, 2017
Angreifer gehen heute kreativ vor und nutzen automatisierte Tools, um in Profilen bei sozialen Netzwerken (die häufig öffentlich zugänglich sind) nach Informationen über ihre Opfer zu suchen. Die Angreifer wissen daher, wo Sie arbeiten (und in welcher Position), ob Sie verheiratet sind und wo Sie in der Vergangenheit gearbeitet haben. Sie kennen Ihre Interessen, Hobbys und viele weitere Details. All diese Informationen werden zum Verfassen äußerst überzeugender E-Mail-Nachrichten verwendet, die Sie zum Klicken auf eine schädliche URL oder angehängte Datei verleiten sollen. Und sobald Sie geklickt haben, werden die Schaddaten auf Ihrem System abgelegt.
Tags : 
phishing, malware, bec, angriffe zielen auf menschen ab, für sicherheitsteams
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 21, 2017
Bei BEC-Attacken werden häufig CFOs oder Mitarbeiter der Personal- bzw. Finanzabteilung oder der Lohnbuchhaltung gezielt angegriffen. Mit einer als „Spoofing“ bezeichneten Methode werden die Opfer getäuscht und davon überzeugt, dass die erhaltene E-Mail von ihrem Vorgesetzten, einem Kollegen, einem Lieferanten oder einem Geschäftspartner stammt. Der Betrüger fordert den Empfänger zur Tätigung einer Überweisung oder zur Weitergabe von Steuerunterlagen oder anderer vertraulicher Daten auf.
Tags : 
geschäftsführer, chief financial officer, personalabteilung, finanzabteilung, lohnbuchhaltung
    
Proofpoint
Published By: Cloud Sherpas     Published Date: Nov 06, 2015
Need unlimited storage for files, folders, backups and more? How about access to all your files, including Microsoft Office files, from any device? Google Drive for Work provides just that.
Tags : 
storage, google drive for work, google drive, sharing files, security, collaboration, drive
    
Cloud Sherpas
Published By: Cloud Sherpas     Published Date: Nov 11, 2015
Are you considering Office 365 because it is what your users are used to? Do you think a move to Google Apps for Business is too big of a change for your users? Watch this webinar featuring Derik VanVleet, Director of Cloud Strategy of Cloud Sherpas to see why moving to Office 365 is actually more disruptive to your users.
Tags : 
go google, google, google apps, cloud sherpas, innovation with cloud sherpas, google for work, enterprise organisations, security, it solutions, business technology
    
Cloud Sherpas
Published By: Macquarie Telecom     Published Date: Jan 11, 2011
How hosted data center services eliminate the daily pain and frustration of managing your IT infrastructure.
Tags : 
macquarie telecom, hosted data center services, it infrastructure, chief information officer, cio, oursourcing, productivity
    
Macquarie Telecom
Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
Read this technology brief to learn about a solution to regain performance, minimize bandwidth usage, and reduce the time of all SharePoint operations
Tags : 
blue coat, wan optimization, microsoft office sharepoint server, application delivery network, application performance monitoring, midsize firms, sap, oracle, efficiency
    
Blue Coat Systems UK
Published By: Force.com     Published Date: Sep 05, 2012
Aligning the Core Back Office with the Social Front Office in Today's Connected World
Tags : 
best connected businesses, back office salesforce, technology, computing, business technology
    
Force.com
Published By: Genesys     Published Date: Oct 16, 2013
Enterprise Workload Management gets the right work to the right person at the right time, eliminating the outdated manual distribution of work model. Enterprise Workload Management finally gives organizations the ability to correlate the work that customer service interactions create in the front office -- with the best resource within the organization required to complete that work in the back office. Enterprise Workload Management ensures that the highest priority work is being handled by the right resource, and gives managers real-time visibility into when the work will be completed, as well as reports that show the outcomes of the work. Customers get notified when an order or application is processed instead of waiting to hear or having to repeated call back. Employees get specific coaching and training plans based on the results of their work.
Tags : 
contact center, customer service, customer relationship management, technology, business process management, bpm, crm, business technology
    
Genesys
Published By: NetApp     Published Date: Nov 27, 2017
Join data protection experts from Forrester Research, NetApp and AWS and find out how to secure your Microsoft Office 365 business-critical data from accidental deletion, corruption, or malicious intent.
Tags : 
    
NetApp
Published By: NetApp     Published Date: Nov 13, 2017
Read the ebook and learn how to guard your MS Office 365 data against malicious or accidental data loss with NetApp Cloud Control and AWS.
Tags : 
    
NetApp
Published By: NetApp     Published Date: Nov 13, 2017
Your MS Office 365 data might not be as safe as think. Read the ebook and learn about the 4 steps to improve the security of your MS Office 365 data.
Tags : 
    
NetApp
Published By: MobileIron     Published Date: Feb 08, 2017
Enterprise organizations around the world are rapidly shifting their corporate apps and data to the cloud to drive IT efficiency and expand employee access to business processes. This applies not only to productivity suites like Microsoft Office 365, but also to enterprise mobility management (EMM) solutions like MobileIron.
Tags : 
    
MobileIron
Published By: Brother     Published Date: Mar 08, 2018
Documents are an integral component to the successful operation of an organization. Whether in hardcopy or digital form, they enable the communication, transaction, and recording of business-critical information. To ensure documents are used effectively, organizations are encouraged to continually evaluate and improve surrounding workflows. This may involve automating elements of document creation, securing the transfer and storage of information, and/or simplifying the retrieval of records and the data contained within. These types of enhancements can save time, money, and frustration. This white paper will discuss top trends and requirements in the optimization of document-related business processes as well as general technology infrastructures for document management. It will also address how some office technology vendors have reacted to these trends to guide their design and development of products, solutions, and services.
Tags : 
documents, workflows, business process, document management
    
Brother
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.