Skip to main content
 

assessment

Results 251 - 275 of 519Sort Results By: Published Date | Title | Company Name
Published By: Jive     Published Date: Feb 12, 2015
The Forrester Wave can help your organization in evaluating an enterprise social platform. The full report covers 13 vendors with specific information on core functionality and strategy.
Tags : 
enterprise, transition, interaction, digital business, social networks, vendor evaluations, vision, communication, collaboration, market assessment, search marketing, emerging marketing
    
Jive
Published By: Jive     Published Date: Feb 12, 2015
Remember getting your first box of LEGOS as a kid? How fun it was putting the pieces together, collaborating with your friends to create something new? Now, as an IT professional, assembling and maintaining a Lego-like collaboration infrastructure isn’t what you signed up for. Piecing together disparate systems of record for email, web meetings and other applications is about as painful as stepping on a pile of Legos. Download the e-book to learn how implementing a collaboration system connects systems of record the easy way.
Tags : 
enterprise, transition, interaction, digital business, social networks, vendor evaluations, vision, communication, collaboration, market assessment, search marketing, emerging marketing
    
Jive
Published By: Jive     Published Date: Feb 12, 2015
With its in-depth guidance and independent third-party vendor evaluations, Gartner’s Magic Quadrant market assessment can assist your organization in implementing an effective communication and collaboration solution. The full report covers 17 vendors, with specific information on their ability to execute and completeness of vision.
Tags : 
enterprise, transition, interaction, digital business, social networks, vendor evaluations, vision, communication, collaboration, market assessment, search marketing, emerging marketing
    
Jive
Published By: HPE     Published Date: Feb 11, 2015
This assessment is composed of a core set of comparative questions, and the option to be assessed in any of three key areas: computing economics, service delivery and business performance. After a half-decade of cost cutting and shrinking IT budgets, the compute infrastructure that powers the enterprise now is typically inefficient, slow and not optimized for business outcomes. It is better suited to the economic realities of 2010 rather than the rigors of the application workloads, delivery models & business expectations of today driven by cloud, mobility, security and big data megatrends. As a result, there is a significant gap between what businesses expect from technology and what IT can deliver.
Tags : 
    
HPE
Published By: HPE     Published Date: Feb 11, 2015
It’s essential to align critical applications and infrastructure with your overall modernization program to address risk, optimize benefits, and prioritize your business needs.
Tags : 
    
HPE
Published By: BitSight Technologies     Published Date: Feb 03, 2015
Download "Making Risk Management More Effective with Security Ratings" to learn how BitSight is revolutionizing the way organizations manage security risk throughout their ecosystem.
Tags : 
risk management, security ratings, compliance mandates, executive reporting, security risk assessments
    
BitSight Technologies
Published By: BitSight Technologies     Published Date: Feb 03, 2015
Download "Cybersecurity Is Essential for M&A Due Diligence" to learn how Security Ratings can help you examine the risk your latest target poses to your information security (and potentially your bottom line).
Tags : 
cybersecurity, security ratings, acquistion target, cybersecurity assessment, information security
    
BitSight Technologies
Published By: Exablox     Published Date: Jan 27, 2015
Object-based storage (referred to as OBS throughout this document) platforms continue to perpetuate cloud and enterprise IT infrastructure. As businesses move toward petabyte-scale data storage, OBS solutions are turning out to be the right choice for balancing scale, complexity, and costs. By way of their core design principles, OBS platforms deliver unprecedented scale at reduced complexity and reduced costs over the long term. Early OBS platforms suffered from "necessity crisis," were too cumbersome to deploy and, in some cases, caused a platform lock-in because of their proprietary access mechanisms. In spite of their from-the-ground-up design, a departure from how traditional SAN and NAS arrays are deployed and, more importantly, a lack of standard interfaces made it difficult for IT organizations to deploy OBS solutions in the infrastructure. Thanks to Amazon S3 and OpenStack Swift becoming de facto access interfaces, this situation has changed.
Tags : 
network attached storage, nas arrays, storage efficiency, idc storage marketscape, storage data resiliency, storage platform scalability, exablox, oneblox
    
Exablox
Published By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : 
entrust, server, risk, assessment, authentication, standards, layered, authentication, education, malware, threats, mobile, data, security, integration, deployment, certificates, identity
    
Entrust Datacard
Published By: IBM     Published Date: Jan 16, 2015
Read the 2014 IDC MarketScape for Worldwide B2B Integration Gateway Software to learn what’s causing so many businesses to adopt advanced integration solutions, and discover why IBM is positioned as a Leader in this vendor assessment.
Tags : 
ibm, industry solutions, b2b, b2b integration, software, integration gateway software, integration solutions
    
IBM
Published By: Rackspace     Published Date: Jan 15, 2015
This white paper aims to help businesses address these fundamental questions, based on a Total Cost of Ownership (TCO) modeling methodology built from Rackspace’s extensive experience working with IT organizations of all sizes, in order to make an informed ROI assessment.
Tags : 
rackspace, outsource, tco, it spending, infrastructure outsource
    
Rackspace
Published By: IBM     Published Date: Jan 05, 2015
In an era when human resources departments are constantly being asked to do more with less, it’s clear that something needs to be done. As more and more resumes pile up for each position, HR teams need help to make a quality hire quickly. Fortunately, IBM Smarter Workforce technology can help, by providing companies the ability to test candidate skills at the beginning of the hiring process. Using simple and convenient skills assessments, it’s easy for HR departments to separate the serious candidates from the rest of the applicants. Once this is done, considering the candidates and making a quality hire becomes much more manageable.
Tags : 
hr technology, human resources, pre-employment assessment technology, hiring decisions
    
IBM
Published By: SilverSky     Published Date: Dec 11, 2014
Forrester's 26-criteria evaluation of managed security service providers (MSSPs) included the 13 most significant vendors in the North American market that security and risk professionals can turn to for solving some of their most important security challenges. Forrester’s assessment evaluates MSS offerings based on current offering, market presence and strategy. SilverSky was named a “leader” in the report, with highest marks for delivery capabilities and services and its market presence in North America. Forrester states in the report that, “SilverSky capabilities rival those of larger companies."
Tags : 
mssps, managed security service, security challenges, security professionals
    
SilverSky
Published By: HP     Published Date: Dec 05, 2014
This assessment is composed of a core set of comparative questions, and the option to be assessed in any of three key areas: computing economics, service delivery and business performance. After a half-decade of cost cutting and shrinking IT budgets, the compute infrastructure that powers the enterprise now is typically inefficient, slow and not optimized for business outcomes. It is better suited to the economic realities of 2010 rather than the rigors of the application workloads, delivery models & business expectations of today driven by cloud, mobility, security and big data megatrends. As a result, there is a significant gap between what businesses expect from technology and what IT can deliver.
Tags : 
server, performance, efficiency, application, infrastructure, information technology, mobility, cloud, storage, data, speed, software
    
HP
Published By: ARMA     Published Date: Nov 04, 2014
All organizations depend on information to manage day-to-day operations, comply with regulations, gauge financial performance, and monitor strategic initiatives. This critical information resides in the organization's business records. As internal auditors conduct their annual risk assessment, they should consider how well business records are managed and assess the degree to which the risks to this information are understood.
Tags : 
value proposition, financial performance, internal auditors, annual risk assessment
    
ARMA
Published By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are essential, considering vulnerability data in a vacuum greatly limits your ability to prioritize your action plan in an effective way. Without the context of which vulnerabilities are the most severe, which are actively being targeted, which are on critical assets, etc, you may waste time checking things off the list without actually improving security. Join us for this session to learn how to integrate threat intelligence into your vulnerability management strategy.
Tags : 
alienvault, threat intelligence, vulnerability assessments, vulnerability data
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are an essential part of understanding your risk profile, it's simply not realistic to expect to eliminate all vulnerabilities from your environment. So, when your scan produces a long list of vulnerabilities, how do you prioritize which ones to remediate first? By data criticality? CVSS score? Asset value? Patch availability? Without understanding the context of the vulnerable systems on your network, you may waste time checking things off the list without really improving security. Join AlienVault for this session to learn: • The pros & cons of different types of vulnerability scans - passive, active, authenticated, unauthenticated • Vulnerability scores and how to interpret them • Best practices for prioritizing vulnerability remediation • How threat intelligence can help you pinpoint the vulnerabilities that matter most
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: Cornerstone OnDemand     Published Date: Oct 17, 2014
Whether you're just getting started or taking your business to the next level, paper-based performance reviews are not the way to go. When you have limited HR resources it probably seems easier to print off forms than sign up for software, but that pile of paper will cost you more in the long run… Get smart with your performance management, embrace technology you'll be able to: • Easily track progress and make sure everyone completes their reviews • Collect up to date, reliable information • Review teams as teams • Collect feedback via self-assessments, 360 degree and manager reviews
Tags : 
cornerstone on demand, csod, performance reviews, management, employee, motivation, team performance, reviews
    
Cornerstone OnDemand
Published By: IBM     Published Date: Oct 10, 2014
IBM Rational solutions for the oil and gas industry combine process, requirements, architecture, models and test tools with an underlying platform that supports requirements management, risk analysis, conformance assessments and more.
Tags : 
ibm, requirements management, risk analysis, conformance assessments, addressing complexity, manage requirements, manage compliance
    
IBM
Published By: Skillsoft     Published Date: Oct 03, 2014
To compete in today’s global marketplace, employees at every level of your organization need to understand the risks associated with a broad spectrum of compliance issues and feel empowered to make the right decisions — even when no one is watching. Sixty-two percent of organizations cite risk management and assessment as a top-three concern when asked about elements of success. Many companies struggle to meet this challenge, but an effective compliance training program can foster a culture of workplace best-practices from the boardroom all the way to the shop floor. Here are 10 questions that you may find useful to consider when planning or reviewing your code of conduct program.
Tags : 
skillsoft, compliance, conduct program, compliance training program, workplace culture, risk
    
Skillsoft
Published By: IBM     Published Date: Aug 28, 2014
From recruitment to onboarding and processing, HR teams spend hundreds of hours every year manually typing and processing documents. But what if you could eliminate tedious, manual processes to save valuable time - and get critical data across the organization faster? Employee Lifecycle Management solutions from IBM can help you integrate employees faster and simplify your daily task list, so you can get back to what's important - take the assessment to see how much time you could save.
Tags : 
online tool, employee lifecycle, employee onboarding
    
IBM
Published By: Fireblade     Published Date: Aug 21, 2014
Fireblade has developed an innovative behavioral approach to website security. It inspects users’ behavior and interactions with and relays the aggregated information to a central cloud, where a continual, real-time risk assessment process uses big data to discern legitimate users from attackers and abusers. Download this whitepaper to learn about this new approach.
Tags : 
fireblade, web application security, cloud security, interactions, cloud computing, hackers, attackers, cyberattack, central security cloud
    
Fireblade
Published By: KANA®, A Verint® Company     Published Date: Aug 07, 2014
Save time and money by taking advantage of existing resources in a new way. KANA offers a unified, omni channel desktop that allows you to transform your customer experience without the cost and complexity of rip and replace.
Tags : 
kana, customer experience, case management, process improvement, empowering employees, maturity assessments, customer satisfaction, loyalty
    
KANA®, A Verint® Company
Published By: Symantec     Published Date: Jul 30, 2014
This report will help you to understand the threats that you face, your vulnerabilities and how you can protect against this.
Tags : 
vulnerability assessment, website security, protecting against vulnerabilities
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This report will help you to understand the threats that you face, your vulnerabilities and how you can protect against this.
Tags : 
vulnerability assessment, website security, protecting against vulnerabilities
    
Symantec
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.