Skip to main content
 

control

Results 176 - 200 of 2131Sort Results By: Published Date | Title | Company Name
Published By: Blackberry     Published Date: Jul 03, 2012
With the increasing amount of smartphones and tablets in today's workplace, it is difficult to ensure security without jeopardizing user experience.
Tags : 
blackberry, mobile, smartphones, tablets
    
Blackberry
Published By: BlackBerry     Published Date: Oct 03, 2012
Finally, there's a way for IT to give both aspects the attention they deserve. Find out what BlackBerry Balance® can do for your organization.
Tags : 
it control, information technology, user experience, mobile solutions, mobile security
    
BlackBerry
Published By: BlackBerry     Published Date: Mar 12, 2013
Find out about the challenges companies are encountering in the face of the four Cs: Compliance, Control, Cost and Consumerization. And, learn what businesses can glean from the public sector about best-practice Enterprise Mobility Management (EMM).
Tags : 
tco, security, enterprise grade mobility, emm, blackberry 10, best practices
    
BlackBerry
Published By: Blackberry     Published Date: Oct 03, 2012
Finally, there's a way for IT to give both aspects the attention they deserve. Find out what BlackBerry Balance® can do for your organization.
Tags : 
it control, information technology, user experience, mobile solutions, mobile security
    
Blackberry
Published By: BlackLine     Published Date: Jun 15, 2016
Finance is shifting from traditional rigid and manual accounting processes to more automated, more flexible, and more agile cloud based systems. This shift is essential, because it provides the productivity benefits so that finance can focus more on reporting and analyzing financial performance. Download this eBook, “The Modern Approach to Closing the Books” to learn a new approach to the Record-to-Report processes - an approach in which automation, controls and period-end tasks are embedded within daily activities allowing for; more balanced workloads, time freed for analysis, current – not out of date – results, and Finance to better align with business operations.
Tags : 
    
BlackLine
Published By: BlackLine     Published Date: Aug 06, 2018
Listen to this webinar to learn about utilizing technology to improve the control environment!
Tags : 
    
BlackLine
Published By: BlackLine     Published Date: Aug 06, 2018
When did reconciliations become a living nightmare? Demanding deadlines. Strict requirements for review and supporting documentation. Endless piles of reconciliations to approve?that were due yesterday. Reconciliations are one of the most labor-intensive, yet critical controls processes within any organisation. Even the smallest mistake can compromise the integrity of your balance sheet and create discrepancies in your financial close. There is a simpler way to perform your reconciliation process that allows you to focus on analysis, risk mitigation, and exception handling. Join us for this webinar to find out what this is. You will learn how to: Automate daily reconciliations for continuous control and validation Gain better visibility into the quality, accuracy, and timeliness of a reconciliation Develop a seamless and streamlined workflow for preparation, approval, and review
Tags : 
    
BlackLine
Published By: BlackLine     Published Date: Aug 06, 2018
The biotechnology and pharmaceutical industry is among the most heavily regulated industries in the world, challenged by evolving regulations, complex compliance requirements and close regulatory scrutiny. At the same time, companies must address the market pressures of globalization, the use of predictive data analytics and digital technologies, and the industry’s ongoing consolidation. In this challenging environment, confidence in internal controls is crucial.
Tags : 
    
BlackLine
Published By: BlackLine     Published Date: Aug 06, 2018
The role of the controller is a demanding one. To be successful in this position, an individual must possess strong interpersonal and communications skills.
Tags : 
    
BlackLine
Published By: BlackLine     Published Date: Aug 06, 2018
There is no getting away from it – keeping up with compliance and control is a constant challenge. It is something that is mandated on organizations and in the aftermath of many financial crises there is little sympathy for organizations that do not comply with the demands of their industry regulators.
Tags : 
    
BlackLine
Published By: Blue Coat     Published Date: Feb 04, 2016
Malware hiding in SSL/TLS has become an urgent priority for security executives. Read "Encrypted Traffic Management for Dummies," a new e-book brought to you by Blue Coat. This must-read e-book is a great introduction to learn how dedicated, high-performance appliances: **Give your security devices an instant look at SSL-encrypted traffic **Protect user privacy **Allow you to control SSL’s use.
Tags : 
    
Blue Coat
Published By: Blue Coat Systems     Published Date: Jul 05, 2011
There's a reason why two leading analyst firms named us a leader in WAN Optimization Controllers. Wait, actually, there are a lot. Read the five most critical reasons now.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring, midsize firms, sap, oracle, efficiency
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 05, 2011
The wide-area network optimization controller market is maturing rapidly, but remains dynamic, with a high level of innovation from vendors. Organizations looking to acquire WOC capabilities should identify their specific needs and conduct real-life trials before committing to any purchase.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring, magic quadrant, optimization controllers
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Oct 25, 2011
Blue Coat WebFilter is best-in-class for web threat protection, but content filtering databases have another key role to play: control of Internet use
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway, application performance monitoring
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
Does your network bandwidth usage align with business goals?  This white paper highlights the challenges of ensuring SaaS application access and performance. It discusses the pros and cons of popular approaches and explains how you can control, prioritize and optimize traffic so that business-critical applications have the performance users need.
Tags : 
network, bandwidth, saas, application, optimize traffic, performance, technology, cloud
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Does your network bandwidth usage align with business goals?  This white paper highlights the challenges of ensuring SaaS application access and performance. It discusses the pros and cons of popular approaches and explains how you can control, prioritize and optimize traffic so that business-critical applications have the performance users need.     
Tags : 
cloud, applications, network, bandwith, saas
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
For decades, fear has dominated the discussion of cyber security. Every magazine article, presentation or blog about the topic seems to start the same way: trying to scare the living daylights out of you with horror stories, alarming statistics, and doomsday scenarios. The result is that most IT shops and security vendors think security is only about what you prevent. They think it’s about blocking, prohibiting, controlling, constraining, excluding, outlawing, and forbidding. Hence IT’s reputation as the “Department of No.”
Tags : 
security, business, cyber security
    
Blue Coat Systems
Published By: BlueCat     Published Date: Aug 20, 2013
To enable always-on application access and business connectivity, you need a rock-solid network foundation. The increasingly complex, dynamic and fluid relationship between networks and devices requires a new approach to IP Address Management (IPAM) – one that unifies mobile security, address management, automation and self-service to provide actionable network intelligence and a broad span of control. This paper discusses the critical role of IPAM in providing a smarter way to connect mobile devices, applications, virtual environments and clouds.
Tags : 
device management, ipam, ip address management, ip management, dns management, dhcp management, network security, network management, network intelligence, ip networks, network management
    
BlueCat
Published By: BMC     Published Date: Jan 05, 2012
Learn more on how users can customize their cloud services - while you maintain control.
Tags : 
bmc, cloud, cio, cto, hardware, operations, business operations, productivity, myths, network, virtualization, implementation
    
BMC
Published By: BMC     Published Date: Jan 09, 2012
The complexity of cloud computing warrants a unique approach to planning. See how BMC can help!
Tags : 
cloud computing, bmc, planning, initiative, computing, transition, budget, silos, virtualized, servers, network devices, storage, hardware, infrastructure, control
    
BMC
Published By: BMC     Published Date: Dec 03, 2012
Read EMA's Impact Brief to get a detailed evaluation of the new capabilities of BMC Control-M V8, and learn how the latest version of BMC Software's workload automation software fits within the current industry landscape.
Tags : 
workload automation, bmc control-m, control-m, job scheduling
    
BMC
Published By: BMC     Published Date: Dec 12, 2017
Computing jobs are expected to run smoothly in the background all the time, but administrators know it is not that easy. BMC’s Control-M solution supports and simplifies processes that lead to efficient and reliable workload automation.
Tags : 
bmc, workload automation, process automation, it processes
    
BMC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.