management information

Results 1 - 25 of 475Sort Results By: Published Date | Title | Company Name
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
The SecureWorks Security and Risk Consulting practice provides expertise and analysis to help you enhance your security posture, reduce your risk, facilitate compliance and improve your operational efficiency.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Ipswitch     Published Date: Mar 14, 2014
This newly-released e-Guide provides senior technology leaders with a concise assessment of the challenges they face with legacy file transfer systems—and looks at innovative solutions and best practices that can solve these problems.
Tags : 
ipswitch, file transfer, stagnation, automation, file management, file management systems, file transfer systems, productivity, file security, file movement, managed file transfer, mft, information management, collaboration
    
Ipswitch
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
Auf einen Blick Mitarbeiter von heute sind es gewohnt, privat digitale Technologien zu nutzen, die eine problemlose Kommunikation ermöglichen und die Abläufe des täglichen Lebens vereinfachen. Bedauerlicherweise können viele Unternehmenstools nicht Schritt halten. Die meisten Projekt- und Portfoliomanagementlösungen, die heute eingesetzt werden, bieten keine unkomplizierten Optionen, um alltägliche Aufgaben auszuführen. Sie ermöglichen keine kontextbasierte Kommunikation, mit der sich Probleme lösen lassen, und verfügen nicht über entscheidende Funktionalität. Dazu zählen z. B. die Möglichkeit, den Fokus auf relevante Daten einzuschränken, das Durchführen von Drilldowns, um zusätzliche Informationen zu erhalten, sowie die Vorhersage finanzieller Entwicklungen und das Modeling von Ergebnissen.
Tags : 
    
CA Technologies EMEA
Published By: CEB     Published Date: Oct 21, 2014
The impact of information is changing and while this change provides great opportunities, it also presents greater risks. Traditional monitoring processes and technology advancements alone no longer deliver effective identification, management, and prevention of business risks, instead the changing impact of information demands early detection and root cause analysis. Learn how leading companies are magnifying exploitation of information security risks, along with advancing identification and protection of compliance risks.
Tags : 
corporate executive board, ceb, legal, risk, compliance, assurance teams, audit
    
CEB
Published By: IBM     Published Date: Apr 20, 2017
Ninety-nine percent of the enterprise workforce currently uses mobile devices – smart phones and tablets – to perform their jobs today. Nearly 60 percent of security leaders describe their organizations as either partially or fully mobile, deriving enhanced productivity and other business benefits. Reflecting on the survey results provides the opportunity to take a broad view of enterprise mobility and realize how business transformation has begun. Nearly all enterprises now incorporate mobility in their work, and a majority now sees tangible business results from mobility. Organizations are seeing greater efficiencies and productivity from mobile workers.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data
    
IBM
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Cybercriminals can be goal-driven and patient, and they often have a singular focus, plenty of time and access to vast, modern technical resources. Both organized and forum-based criminals are working constantly to find innovative and efficient ways to steal information and money with the lowest risk to their personal freedom. If we wish to stay “one step ahead” of the threats detailed in this report, awareness of online criminal threats, techniques and markets is our best defense.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
This report describes the results from a groundbreaking global study by Thycotic that reveals major risk and compliance gaps in how organizations manage and secure their privileged accounts and access to sensitive systems, infrastructure and data. The 2018 Global State of Privileged Access Management (PAM) Risk & Compliance report highlights where many organizations are failing to fully put security controls in place to protect their most critical information assets.
Tags : 
    
Group M_IBM Q2'19
Published By: SAS     Published Date: Apr 16, 2015
SAS Institute is gearing up to make a self-service data preparation play with its new Data Loader for Hadoop offering. Designed for profiling, cleansing, transforming and preparing data to load it into the open source data processing framework for analysis, Data Loader for Hadoop is a lynchpin in SAS's data management strategy for 2015. This strategy centers on three key themes: 'big data' management and governance involving Hadoop, the streamlining of access to information, and the use of its federation and integration offerings to enable the right data to be available, at the right time.
Tags : 
    
SAS
Published By: IBM     Published Date: Feb 02, 2009
Sign up for the webcast and you will learn: The strategic benefits of a robust information infrastructure for performance management, How to take immediate action if your operating reporting has data latency challenges, How to drive broader adoption in the business by addressing critical data challenges, Why the combination of IBM and Cognos, an IBM company, accelerates the delivery and quality of the information needed to drive business performance.
Tags : 
ibm, business optimization, performance management, cognos, robust information infrastructure, data latency, data quality challenges, data fragmentation, critical data challenges, data management
    
IBM
Published By: Cornerstone OnDemand     Published Date: Oct 17, 2014
Whether you're just getting started or taking your business to the next level, paper-based performance reviews are not the way to go. When you have limited HR resources it probably seems easier to print off forms than sign up for software, but that pile of paper will cost you more in the long run… Get smart with your performance management, embrace technology you'll be able to: • Easily track progress and make sure everyone completes their reviews • Collect up to date, reliable information • Review teams as teams • Collect feedback via self-assessments, 360 degree and manager reviews
Tags : 
cornerstone on demand, csod, performance reviews, management, employee, motivation, team performance, reviews
    
Cornerstone OnDemand
Published By: Ping Identity     Published Date: May 05, 2009
This white paper, intended for a management-level audience, describes why and how any organization can implement secure Internet single sign-on with a federated identity management system. Learn more today!
Tags : 
pingidentity, sso, secure internet, single sign-on, federated identity management system, software as a service, saas, business process outsourcing, bpo, ciso, attack, threats, personally-identifiable information, pii, trojan, virus, proprietary security mechanisms, crypto libraries, security assertion markup language, saml
    
Ping Identity
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
SecureWorks provides an early warning system for evolving cyber threats, enabling organisations to prevent, detect, rapidly respond to and predict cyber attacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform — our advanced data analytics and insights engine —SecureWorks minimises risk and delivers actionable, intelligence driven security solutions for clients around the world.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Mitel     Published Date: Jun 29, 2016
After years of being chained to the old ideas of office productivity, businesses are realizing that liberated employees are empowered employees. When you free people from the tethers of the office, amazing things start to happen: productivity rises, borders and barriers disappear, innovation replaces enervation, and the quality of work improves as employees’ quality of life improves.
Tags : 
productivity, best practices, business intelligence, business management, information technology, solutions
    
Mitel
Published By: Intuit, Inc     Published Date: Mar 19, 2009
No matter what role you have within an organization – be it engineer, salesperson, consultant, marketer, or business owner – you’ve acquired a second responsibility: project manager. But managing marketing projects has become more challenging than ever. Why? The work environment has expanded across departments, across job roles – and even across continents. To achieve organizational objectives, cross-functional teams form, collaborate, dissolve and re-form to tackle precisely defined projects and fulfill specific deliverables within carefully controlled deadlines and budget demands. Learn more today!
Tags : 
intuit, project management, project team productivity, collaboration, communication, spreadsheet shuffle, centralizing project information, packaged vs. custom software, software as a service, saas, scalability, cost efficiency, minimize it dependence, automate recurring processes, customizable dashboards
    
Intuit, Inc
Published By: Intuit Inc.     Published Date: Mar 19, 2009
No matter what role you have within an organization – be it engineer, salesperson, consultant, marketer, or business owner – you’ve acquired a second responsibility: project manager. But managing projects has become more challenging than ever. Why? The work environment has expanded across departments, across job roles – and even across continents. To achieve organizational objectives, cross-functional teams form, collaborate, dissolve and re-form to tackle precisely defined projects and fulfill specific deliverables within carefully controlled deadlines and budget demands. Learn more today!
Tags : 
intuit, project management, project team productivity, collaboration, communication, spreadsheet shuffle, centralizing project information, packaged vs. custom software, software as a service, saas, scalability, cost efficiency, minimize it dependence, automate recurring processes, customizable dashboards, it management
    
Intuit Inc.
Published By: HP and Intel ®     Published Date: May 06, 2013
The objective of this white paper is to provide IT executives and UNIX subject matter experts (SMEs) with a high level comparison of the UNIX virtualization offerings from HP for Integrity and HP-UX1 vs. IBM for Power and AIX. To assist in making a balanced comparison, this paper provides: - A high-level, feature-to-feature comparison of key areas of virtualization and virtualization management. - Modular table-based comparisons. - Information from publicly available resources.
Tags : 
    
HP and Intel ®
Published By: OneNeck IT Services     Published Date: Aug 24, 2007
When he joined SDBC in May of 2004, SunnyD's Chief Information Officer and Global Controller was faced with a classic build-or-buy decision, although the circumstances were less than typical. Despite the company just being carved out from Procter & Gamble with an experienced management team and a well-known brand name, it was missing a crucial operational element — an entire information technology infrastructure.
Tags : 
oneneck, erp hosting, erp outsourcing, it outsourcing, it hosting, microsoft dynamics ax, fusion, outsourcing, governance, outsource, erp, enterprise resource planning, it management
    
OneNeck IT Services
Published By: Godfrey     Published Date: Oct 24, 2008
This document is intended to provide us with the information we need to generate an audit of your existing system for sales lead management. This audit is organized into several parts, starting with a cursory survey of your business environment, and then focusing on the key aspects and issues of sales lead management. Since our face-to-face meeting time may be limited, we hope this audit will allow you to provide more thoughtful and detailed information, so that our deliverable to you is of significant value.
Tags : 
godfrey, lead management system, lead-generating communications, lead processing, lead reporting
    
Godfrey
Published By: Internet Security Systems     Published Date: Aug 21, 2009
Spyware is but the latest in a long list of Internet threats facing individuals and organizations alike. While it may sound relatively innocuous, spyware is the culmination of years of hacking development by cyber criminals. Spyware does more than just spy; it records and reports back specific information about the computer it infects.
Tags : 
spyware, information management, information theft, identity theft, data protection, anti spyware, anti-spyware, cybercrime, cyber crime, hacker, web security, internet security, internet security systems
    
Internet Security Systems
Published By: PDF Tools     Published Date: Aug 21, 2009
PDF files are prevalent in virtually all market segments worldwide. Most people know and use the term "PDF" but have misconceptions what it can and can't do. The purpose of this White Paper is to explain what PDF actually is and what it's strengths and limitations are.
Tags : 
content delivery, document management, information management, ebusiness, enterprise software, pdf, portable document format, adobe, acrobat, document, pdf tools, it management
    
PDF Tools
Published By: Riverbed     Published Date: Nov 08, 2012
Many enterprises are shifting from desktop applications to web and mobile apps, they have started a tidal wave of dynamic content that will overwhelm traditional architectures. A tidal wave of dynamic web content is coming - how will you respond?
Tags : 
web content management, real time information, mobile apps, web content optimization, business technology
    
Riverbed
Published By: SAP     Published Date: Feb 11, 2011
Read this Aberdeen Group research report, "Access Management: Efficiency, Confidence and Control" and learn how top performers protect access to information assets at lower cost while staying on top of compliance.
Tags : 
sap, access management, efficiency, confidence, control, auditors
    
SAP
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.