Skip to main content
 

organization

Results 626 - 650 of 8297Sort Results By: Published Date | Title | Company Name
Published By: Zilliant     Published Date: Apr 09, 2010
Learn how recent advances in pricing science and technology have enabled a breakthrough approach for B2B companies wanting to improve their pricing --- one that generates results in a fraction of the time, with far less organizational upheaval.
Tags : 
zilliant, best practices, pricing intelligence, price quotes
    
Zilliant
Published By: Entrust Datacard     Published Date: Aug 03, 2011
Whether it's a smartcard for physical and logical access, soft tokens on a mobile device, or a unique grid card for strong authentication to a VPN, organizations can consolidate all authentication processes with a single, proven solution.
Tags : 
digital certificate, digital certificates, pki, pki security, two factor authentication, encryption software, multi factor authentication, public key infrastructure, 4g iphone, iphone jail break, jail break iphone, iphone jailbreak, jailbreak, iphone
    
Entrust Datacard
Published By: Dell EMC     Published Date: Feb 23, 2017
This study provides IT decision-makers with insight on various types of clouds and how they are used today along with a practical framework to evaluate converged infrastructure versus do-it-yourself approaches.  Based on interviews with organizations that implemented VCE solutions, Forrester Consulting quantified how VCE converged infrastructure drove significant increases in IT efficiency and productivity, as well as decreases in the cost associated with infrastructure, security, and compliance. The study describes a process for setting improvement goals and measuring success for infrastructure modernization. This process is supported by an intuitive template.
Tags : 
    
Dell EMC
Published By: RSA     Published Date: Sep 19, 2017
The General Data Protection Regulation (GDPR) has been approved by the European Union and demands significant data protection safeguards to be implemented by organizations around the world. Learn how you can successfully prepare for GDPR with advice from Osterman Research.
Tags : 
gdpr, data protection, rsa, rsa security, personal data, privacy
    
RSA
Published By: Service Now     Published Date: Feb 15, 2017
ServiceNow shares this practical guide for using service management to simplify your HR delivery—the challenges it addresses, how it addresses them, how it can benefit your organization, and some easy ways to get started.
Tags : 
servicenow, service delivery, hr service delivery, service management
    
Service Now
Published By: BMC Software     Published Date: Jan 31, 2014
Consumerization of IT forces enterprises to rethink their approach to IT service delivery. What does consumerization really mean and why does it matter? Understand the basics to accurately identify the practical implications and benefits for your organization. This guide explores the realities of IT Consumerization to define challenges and opportunities. Learn best practices and get actionable recommendations. Please download the whitepaper to learn more.
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications, internal customers, gartner, itssm, saas, itrpm, it service support management tools, cloud-based, customer experience, consumerization
    
BMC Software
Published By: BMC Software     Published Date: Aug 18, 2014
Consumerization of IT forces enterprises to rethink their approach to IT service delivery. What does consumerization really mean and why does it matter? Understand the basics to accurately identify the practical implications and benefits for your organization. This guide explores the realities of IT Consumerization to define challenges and opportunities. Learn best practices and get actionable recommendations.
Tags : 
consumerization, enterprise, it service, best practices
    
BMC Software
Published By: Apptio     Published Date: Jul 16, 2019
Your business partners need IT to deliver innovation and agility, but traditional budgeting processes struggle to do either. Interested in adopting a zero-based budgeting approach to your organization? Download this eBook to learn: - The limitations of traditional budgeting vs. zero-based budgeting - How to benchmark your budgets against business outcomes - Five myths about zero-based budgeting and why they are wrong - How to confidently build zero-based budgets with the right tool
Tags : 
    
Apptio
Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
This report looks at the challenges surrounding the new world of EHR technology and also details the measures that organizations need to start taking right now to prepare for the upcoming changes in the healthcare industry.
Tags : 
verisign, privacy, security requirements, electronic health records, ehrs, ehr technology, ssl certificates, authentication, symantec
    
VeriSign, Inc.
Published By: CA Technologies     Published Date: Jun 26, 2017
Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Ensuring visibility and accountability for compliance, security and governance while enabling flexibility for digital transformation requires a fresh and more tightly aligned approach to who—and now what in the form of applications, services, machines and things—are given the keys to the kingdom: privileged access. Read this white paper to understand how the digital transformation journey requires thinking through a clear roadmap that spans multiple years, anticipating near- and long-term requirements from a privileged access management solution and ensuring scope and scale needs at a reasonable cost of ownership through the entire lifecycle.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Challenge Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure. Opportunity Knowing your privileged users is knowing your risk. Privileged access management tools themselves must be able to support automation in the authorization process and enable scalability through support for both dynamic operations and ephemeral infrastructure. Benefits Better pinpointing attacks exploiting credential theft isn’t simply a question of accumulating more data but involves incorporating better data about privileged user behaviour, which can identify significant changes that represent real risk.
Tags : 
    
CA Technologies EMEA
Published By: Collaborative Consulting     Published Date: Dec 20, 2013
Collaborative helped a research company transitioning to commercialization identify critical timelines, tasks, milestones and resources required to bring a new drug to market. As part of the project, leaders were given the information and tools they needed and the business began building the strong foundation necessary for a successful launch.
Tags : 
collaborative consulting, biotech organization, case study, launch strategy, biotech company, infrastructure, tailored segment, particular market, collaborative, integrated launch plan, operating systems
    
Collaborative Consulting
Published By: Pure Storage     Published Date: Dec 05, 2018
Data is the new currency. Is your organization capitalizing on the full potential of data analytics? In this big data primer, you will learn about the 3 key challenges facing organizations today: managing overwhelming amounts of data, leveraging new complex tools/technologies, and developing the necessary skills and infrastructure. And since storage is where your organization's data lives, it’s a pivotal part of the infrastructure jigsaw puzzle. Thus with a “tuned for everything” storage solution that is purpose-built for modern analytics, you can confidently harness the power of your data to drive your enterprise forward.
Tags : 
    
Pure Storage
Published By: IBM     Published Date: Jan 10, 2014
Applications are evolving at an ever-faster pace. These applications are not discrete islands; they build on a complex, interconnected set of components that includes disparate technologies, developers, deployment topologies and organizations. Developers must deliver high-quality applications while limiting their testing expenses. In this challenging environment, a combination of automated integration testing and test virtualization can enable test teams to improve software quality and keep up with the rate of change. This whitepaper helps address these needs by describing the benefits that can be gained through a proactive and continuous approach to integration testing with IBM® Rational® test automation solutions.
Tags : 
ibm, rational, integration, integration testing, incremental integration, testing, virtulization, data management, asset sharing, application performance
    
IBM
Published By: Schneider Electric     Published Date: May 31, 2019
Gartner predicts that by 2020, 90 percent of organizations will adopt hybrid infrastructure management capabilities. However, this isn’t easy. With a hybrid IT environment can come complexity, confusion, and even infrastructure fragmentation. And, if you leave this poorly managed, your users, business, and most of all customers will certainly start to notice. In this eBook, we’ll explore the evolution of the enterprise data center, impacts of cloud-powered digital solutions, and how to manage hybrid IT solutions.
Tags : 
hybrid, digital solutions, schneider electric
    
Schneider Electric
Published By: iCims     Published Date: Jan 24, 2017
here are many benefits to social recruiting. To start, social recruiting enables organizations to hire the best talent. This can be done by connecting, educating, and inspiring people through social networks. While some businesses have dabbled in the social arena, the majority are hesitant to fully pursue social recruiting.
Tags : 
    
iCims
Published By: Dome9     Published Date: Apr 25, 2018
The term “Cloud First” was initially popularized by Vivek Kundra, who formerly held the post of White House CIO and launched this strategy for U.S. federal government IT modernization at the Cloud Security Alliance Summit 2011. The underlying philosophy of the cloud-first strategy is that organizations must initially evaluate the suitability of cloud computing to address emergent business requirements before other alternatives are considered. This paper offers guidance to help organizations establish a systematic and repeatable process for implementing a cloud-first strategy. It offers a high-level framework for identifying the right stakeholders and engaging with them at the right time to reduce the risk, liabilities, and inefficiencies that organizations can experience as a result of adhoc cloud decisions. The goal of this guidance is to help ensure that any new cloud program is secure, compliant, efficient, and successfully implements the organization’s key business initiatives.
Tags : 
    
Dome9
Published By: Zendesk     Published Date: Aug 26, 2016
This white paper provides insight into how to perform a customer service audit to determine what needs to change in an organization.
Tags : 
    
Zendesk
Published By: EMC Corporation     Published Date: Mar 20, 2014
Starting with a foundational set of data management and analytic capabilities enables organizations to effectively build and scale security management as the enterprise evolves to meet Big Data challenges.
Tags : 
emc, big data, incident response, malware detection, security journey, reduce risk, improve security, budget constraints, threat intelligence
    
EMC Corporation
Published By: RSA Security     Published Date: Oct 24, 2013
Starting with a foundational set of data management and analytic capabilities enables organizations to effectively build and scale security management as the enterprise evolves to meet Big Data challenges.
Tags : 
rsa, emc, big data, security, security analytics, scale, security management
    
RSA Security
Published By: Skillsoft     Published Date: Jan 19, 2017
An introductory guide on how to use learning to catapult your customer experience to excellence. Get tips on how to apply learning at every phase of the customer life cycle, the benefits you'll gain, and examples of how leading organizations are putting external learning into practice.
Tags : 
sumtotal systems, customer experience, customer life cycle, external learning
    
Skillsoft
Published By: SumTotal Systems     Published Date: Jan 19, 2017
An introductory guide on how to use learning to catapult your customer experience to excellence. Get tips on how to apply learning at every phase of the customer life cycle, the benefits you'll gain, and examples of how leading organizations are putting external learning into practice.
Tags : 
sumtotal systems, customer experience, customer life cycle, external learning
    
SumTotal Systems
Published By: Kronos Incorporated     Published Date: Sep 06, 2012
Today, the most important asset for employers is their people. With recent advances in workforce analytics, cloud technology, social media and mobile communications, and talent management applications, HR staff can provide greater long-term value to their organization. This paper outlines how HR can make use of these technology opportunities to benefit the entire organization.
Tags : 
    
Kronos Incorporated
Published By: Oracle     Published Date: Sep 21, 2016
The job of keeping business data safe has spread across the organization to become an enterprise wide concern. The critical question now—the one that’s being asked, not only by IT but also by CFOs—is “Whether it’s on-premises or in the cloud, how do you keep sensitive data secure?” Your cloud provider should be able to provide the right answers.
Tags : 
    
Oracle
Start   Previous    19 20 21 22 23 24 25 26 27 28 29 30 31 32 33    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.