role

Results 1101 - 1125 of 1133Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Apr 20, 2017
The National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) have taken leading roles in exploring requirements for Mobile Device Management (MDM) systems for government agencies. Mobile devices, particularly smartphones, are exceptionally vulnerable to security breaches. They are easily lost, are filled with unknown applications, communicate over untrusted networks, and are often purchased by users without regard to IT standards and security features.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data, app security
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
Not long ago, job roles were relatively easy to define and control. A person was an “accountant” or a “graphic designer” or a “business partner.” But as organizations grew and business software became more sophisticated, new roles were added. “Accountant, New York” might require different access to applications and data than “Accountant, Chicago.” The challenge comes from the recent explosion in the numbers and types of business roles.
Tags : 
identity governance, entitlements, authorized users, orphan accounts, business activities
    
IBM
Published By: Carbonite     Published Date: Apr 09, 2018
No one ever wants a recovery to go south—whether it’s your first or 50th time completing a data recovery operation. But your organization will experience a bit more anxiety when it goes to perform its first recovery using a new solution. If the phrase “successful recovery”, in your experience, has applied to only a few applications or a limited set of files, it’s understandable that you may be anxious the first time you test a recovery of your entire environment. Know this: you can successfully conduct a full recovery of your environment the first time as well as every time thereafter. This is the challenge and opportunity that I face every day in my role: to deliver successful cloud recovery for my clients no matter what. While we never guarantee that a recovery will occur without some hiccups during the process, I can point to the fact that every cloud recovery that I have overseen has met our agreed upon service levels whether that guarantee is for a 1-hour recovery, a 24-hour rec
Tags : 
    
Carbonite
Published By: WorkBook from Deltek     Published Date: Apr 26, 2018
Built on Amazon Web Services, Deltek’s powerful ERP software delivers an enterprise level of service and collaboration. Our best-in class ERP solution maximizes end user productivity through industry and role specific functionality, while providing unparalleled speed, scalability, flexibility, security and agility for advanced performance. Deltek can help your firm better serve clients and increase profitability.
Tags : 
deltek, roi, professional, services, firm, web, amazon
    
WorkBook from Deltek
Published By: OnBase by Hyland     Published Date: May 16, 2017
The role of enterprise content management (ECM) as a centralized document repository is well established. However, the value of ECM increases exponentially when it is leveraged as an information hub between line-of-business (LOB) systems to facilitate key processes, keep data in sync and maximize investments in existing applications.
Tags : 
hyland, ecm, document repository, enterprise information hub, automated business processes
    
OnBase by Hyland
Published By: Juniper Networks     Published Date: Jun 22, 2017
The digital financial services world has created an amplified set of challenges for the data center and network. Its role in enabling the success of the wider institution has become even more critical, but to deliver this it needs to provide a higher level of performance with increased agility, while maintaining high levels of efficiency and security. This is forcing institutions to transform their underlying IT capabilities, with the need to simplify the network, obtain more flexible connectivity, automate IT operations, and enable centralized control and administration being core strategies in this respect. As shown in Figure 8, this is driving a number of requirements for the future network. Key considerations for financial institutions in architecture design and vendor selection should be around moving toward a software-defined, intelligent, cloud-ready, and open network that enables the institution to meet its ICT imperatives and achieve these key ICT strategies.
Tags : 
account security, data management, network protection, secure systems, application security, network performance, network diagnostics
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jun 29, 2017
Whilst the FSI sector races to implement cutting-edge technologies such as AI, blockchain and automation, there are no mutually agreed upon set of best practices to implement these technologies. As a result, organisations are using their own blend of strategic initiatives and company culture to drive innovation, with varying levels of success. To help, this article features advice from five of the leading experts in the FSI and technology sector today. Several of the most visible tactics to kick-start innovation in FSI organisations include launching innovation or incubation centres, launching hackathons, partnering with or acquiring start-ups, venture investment or simply trying to develop solutions in house. Whilst each of these approaches has potential, there is a risk that organisations fall into the trap of innovation theatre, in other words, failing to effectively integrate cutting edge technology into key business functions.
Tags : 
business resources, enterprise headcounts, individual roles, organizational charts, corporate initiatives, management principles, department optimization
    
Juniper Networks
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
Companies that manufacture industrial equipment find themselves in a unique place among manufacturers: • Their products can range from small components to mammoth machines for mines or mills. • They rarely order large production runs and may be called on to create a process that results in an order of one. • Their markets impose challenging constraints. Customers want more choices, more options, more extras, and more features. And they want the order to be fulfilled sooner. The competitive environment is forcing model cycles to shrink, pressuring manufacturers to accelerate processes that are unable to keep pace. Dassault Systèmes DELMIA has assembled an industry-specific set of roles for industrial equipment manufacturers that brings these challenges under control.
Tags : 
    
Dassault Systèmes
Published By: Pure Storage     Published Date: Apr 18, 2018
Everybody’s talking about big data. Huge promises have been made about its role in driving enterprises forward. But few organizations are realizing its true benefits. For those able to put data to good use, there’s much to be excited about. Data is transforming not only businesses, but entire industries, and the world as we know it. Today organizations are harnessing big data to do things like transform healthcare, provide eyesight for the visually impaired, and bringing us closer to autonomous cars
Tags : 
    
Pure Storage
Published By: CA Technologies EMEA     Published Date: May 25, 2018
CA recently partnered with TechValidate to perform a research study that would help us to understand how organizations are leveraging our CA Project & Portfolio Management (CA PPM) solution to evolve their businesses. The study validated the changing role of the modern PMO.
Tags : 
tech, validate, research, study, portfolio, management
    
CA Technologies EMEA
Published By: Oracle Marketing Cloud     Published Date: Oct 06, 2017
In a new study by Forbes Insights and sponsored by Oracle Marketing Cloud, 60% of brand and agency executives say their roles and responsibilities have changed significantly over the past two years. As a result, both groups are reengineering their internal organizations and forging new ways of working with their respective agency or brand counterparts. At the same time, the research found that technology is ingrained in marketing operations and, perhaps most significantly of all, agency and brand stakeholders are challenging themselves to analyze and apply consumer data in more sophisticated ways. Some are even hiring data scientists and others outside of the traditional marketing discipline to help in these efforts.
Tags : 
    
Oracle Marketing Cloud
Published By: Oracle OMC     Published Date: Nov 30, 2017
In a new study by Forbes Insights and sponsored by Oracle Marketing Cloud, 60% of brand and agency executives say their roles and responsibilities have changed significantly over the past two years. As a result, both groups are reengineering their internal organizations and forging new ways of working with their respective agency or brand counterparts. At the same time, the research found that technology is ingrained in marketing operations and, perhaps most significantly of all, agency and brand stakeholders are challenging themselves to analyze and apply consumer data in more sophisticated ways. Some are even hiring data scientists and others outside of the traditional marketing discipline to help in these efforts.
Tags : 
    
Oracle OMC
Published By: IBM     Published Date: Jun 05, 2018
There is one certainty with cybersecurity and that is nothing is certain. Take for example the role the endpoint plays in keeping an enterprise secure. While many cybersecurity professionals are relatively certain that endpoints are locked down and security policies are being enforced, the simple fact of the matter is that endpoints prove to be the root of most compromises.
Tags : 
    
IBM
Published By: IBM     Published Date: Jul 05, 2018
IBM® Information Governance Catalog helps you understand your information and foster collaboration between business and IT by establishing a common business vocabulary on the front end, and managing data lineage on the back end. By leveraging the comprehensive capabilities in Information Governance Catalog, you are better able to align IT with your business goals. Information Governance Catalog helps organizations build and maintain a strong data governance and stewardship program that can turn data into trusted information. This trusted information can be leveraged in various information integration and governance projects, including big data integration, master data management (MDM), lifecycle management, and security and privacy initiatives. In addition, Information Governance Catalog allows business users to play an active role in information-centric projects and to collaborate with their IT teams without the need for technical training. This level of governance and collaboration c
Tags : 
    
IBM
Published By: IBM     Published Date: Jul 09, 2018
Data is the lifeblood of business. And in the era of digital business, the organizations that utilize data most effectively are also the most successful. Whether structured, unstructured or semi-structured, rapidly increasing data quantities must be brought into organizations, stored and put to work to enable business strategies. Data integration tools play a critical role in extracting data from a variety of sources and making it available for enterprise applications, business intelligence (BI), machine learning (ML) and other purposes. Many organization seek to enhance the value of data for line-of-business managers by enabling self-service access. This is increasingly important as large volumes of unstructured data from Internet-of-Things (IOT) devices are presenting organizations with opportunities for game-changing insights from big data analytics. A new survey of 369 IT professionals, from managers to directors and VPs of IT, by BizTechInsights on behalf of IBM reveals the challe
Tags : 
    
IBM
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
After several years of relentless hardware and software innovation, the mainframe is at an inflection point from being a supporting platform of transaction revenue to becoming a source of revenue growth and innovation. Organizations are evolving toward what IDC calls the “connected mainframe.” The platform is transforming from a revenue-supporting machine into a revenue-generating machine and is increasingly playing a central role in organizations’ digital transformation (DX) journey. Key steps in achieving the connected mainframe require organizations to modernize and integrate the platform with their internal and external environments. IDC finds that these modernization and integration initiatives lead to new business innovations, which in turn are driving revenue growth and improving organizational operational efficiency.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
After several years of relentless hardware and software innovation, the mainframe is at an inflection point. It’s quickly moving from being a supporting platform of transaction revenue to becoming a source of revenue growth and innovation. Organizations are evolving toward what IDC calls the “connected mainframe.” This evolution to the platform is also enabling the mainframe to play a central role in organizations’ digital transformation (DX) journey. Key steps in achieving the connected mainframe require that organizations modernize and integrate the platform with their internal and external environments. IDC finds that these modernization and integration initiatives lead to new business innovations, which in turn are driving revenue growth. Early adopters of a connected mainframe strategy have achieved more than 300% return on investment (ROI). Over 50% of the benefit value came from business productivity gains, realized from higher transaction volumes, new services, and/or business
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Encryption, if properly deployed and managed, is one of the most powerful tools that organizations can use to avoid costly and embarrassing data breaches. Yet organizations struggle with the complexity associated with the technology that often stems from a history of siloed investments of point solutions designed to largely address pools of regulated data associated with a compliance mandate.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Oct 26, 2018
Over the past few years, business leaders have been the primary drivers of technology change, including making decisions to adopt new applications in the cloud, mandate a cloud-first strategy, offer new capabilities with an API-first strategy, and provide new applications to end users on mobile first. There are significant benefits to these cloud decisions because they decrease time to value, lower costs, and make it easier for organizations to experiment and innovate. But there are consequences as well, chiefly in the complexity of learning how to integrate applications and exchange data across a decentralized architecture that is largely driven by autonomous development decisions. This IDC White Paper answers the following questions about the need for hybrid integration: How are changes in business strategy and technology adoption requiring changes in how organizations approach integration? What are the major events that trigger integration adaptation? How are the roles involve
Tags : 
    
Group M_IBM Q418
Published By: Tenable     Published Date: Mar 07, 2018
Includes 5 tips for bridging the DevOps InfoSec gap. Across industries, in the public and private sector alike, the benefits of DevOps are undeniable: speed to market, improved service delivery and cost savings. At the same time, DevOps can create security blind spots that impact an entire enterprise. To understand why this happens and learn how you can bridge the gap between security and development, read: Information Security in the DevOps Age: Aligning Conflicting Imperatives. Topics covered include: - Rethinking the role of security - Shifting security left by focusing on code quality and prevention - Blind spots in containers and open source components - 5 tips for bridging the DevOps infosec gap Written by CyberScoop, this paper offers practical advice for DevOps and InfoSec professionals who want to realize the benefits of accelerated software development without jeopardizing enterprise security.
Tags : 
secure devops, container security, docker, infosec
    
Tenable
Published By: Trustpilot     Published Date: Apr 11, 2018
In a survey of over 900 US and UK companies, Trustpilot compiled results from finance companies among the respondents to learn which initiatives they consider most important, what their 2018 priorities are, and whether or not trust plays a role in their business strategy. Trustpilot also conducted a global consumer poll throughout the month of January 2018 on Trustpilot.com to learn more about customers’ expectations when it comes to the finance industry, receiving over 15,000 responses. Those survey results provided a more detailed understanding of whether finance companies’ priorities are aligned with consumer expectations, while also getting a clearer picture of how trust and reputation should be approached. At the end of this report, in addition to the findings, recommendations are provided to finance companies based on the survey findings and analysis.
Tags : 
trustpilot, finance, consumer expectations, business strategy, brand management, online reputation, consumer loyalty
    
Trustpilot
Published By: Lenovo and Intel     Published Date: Jul 11, 2019
Colleges and universities are transforming to meet the demands of new students. Technology plays a critical role in making improvements to both physical and process infrastructure. As the world’s leading provider of education technology, Lenovo knows that steady technology leadership is critical to ensuring higher education institutions to stay responsive to these always-evolving, real-world challenges. • IT must balance innovation with budget and manageability • Professors must navigate new tools while focusing on institutional goals • Administration needs to support student growth with limited budgets • Students are exploring digitally driven learning opportunities
Tags : 
    
Lenovo and Intel
Published By: Shell     Published Date: May 28, 2019
How lubrication can play a role in your TCO program.
Tags : 
    
Shell
Published By: SAP     Published Date: Oct 11, 2018
Over the next 10 years, companies will face more opportunity and disruption than ever before. Digital transformation is already helping companies redefine their business models, operating processes, and work – and this trend will accelerate as powerful technologies mature. Given that up to 65% of the value of a company’s products or services is derived from its suppliers1, procurement will play a leading role in enabling this transformation.
Tags : 
    
SAP
Published By: Workday Italy     Published Date: Aug 07, 2018
The role of the CIO is currently experiencing vast change and increased attention from the executive team as a leader who can guide a strategic path for how technology can improve business growth. The CIO’s responsibilities once focused almost entirely on selecting and managing technology solutions, but over the past several years the role of IT has shifted to broadly supporting enterprise strategy through technology, including the creation of new digital businesses. CIOs must now be immersed in both business and technology, and ensure that the organisation overall has the right platforms in place to thrive and grow
Tags : 
    
Workday Italy
Start   Previous    32 33 34 35 36 37 38 39 40 41 42 43 44 45 46    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.