Skip to main content
 

proactive

Results 226 - 250 of 417Sort Results By: Published Date | Title | Company Name
Published By: ESET     Published Date: Feb 17, 2010
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET's solution for integrated security management that is built around its advanced heuristic technology.
Tags : 
eset, endpoint security, networkwide platform, integrated security management, heuristic scanning, antimalware, enterprise security
    
ESET
Published By: Crowdcast     Published Date: Mar 09, 2010
Leverage the tacit knowledge in your organization to identify, understand, and proactively reduce risk.
Tags : 
crowdcast, collective intelligence, it project management, project management, project, business intelligence
    
Crowdcast
Published By: Crowdcast     Published Date: Mar 09, 2010
Leverage the tacit knowledge in your organization to improve decision making, increase control, and proactively reduce risk.
Tags : 
new product, crowd cast, business intelligence, silo, npi, npd, new product development
    
Crowdcast
Published By: Crowdcast     Published Date: Mar 09, 2010
Leverage the tacit knowledge in your organization to improve decision making, increase control, and proactively reduce risk.
Tags : 
crowdcast, collective intelligence, strategic planning, sap, it project management, project management, project, business intelligence
    
Crowdcast
Published By: Crowdcast     Published Date: Mar 09, 2010
Leverage the tacit knowledge in your organization to identify, understand, and proactively reduce risk.
Tags : 
crowdcast, collective intelligence, it project management, project management, project, business intelligence
    
Crowdcast
Published By: Crowdcast     Published Date: Mar 09, 2010
Leverage the tacit knowledge in your organization to improve decision making, increase control, and proactively reduce risk.
Tags : 
crowdcast, collective intelligence, strategic planning, sap, it project management, project management, project, business intelligence
    
Crowdcast
Published By: IBM Software     Published Date: Feb 03, 2012
This paper from IBM describes how to build a proactive threat and risk strategy based on predictive analytics; examples of how organizations used predictive analytics to minimize the negative impact of risk and maximize positive results; and steps to advance your organization's use of predictive analytics to combat threat and risk.
Tags : 
predictive threat, security, technology, risk management, security policy, ibm, intrustion protection
    
IBM Software
Published By: IBM Software     Published Date: Feb 03, 2012
Read this in-depth Aberdeen Group report, based on responses from 117 executives of successful companies, to find out how best-in-class businesses are proactively managing these challenges. You'll learn these techniques for optimizing maintenance and operations-and more.
Tags : 
asset management, software, ibm, technology, operations, maintenance, optimization
    
IBM Software
Published By: IBM Software     Published Date: Oct 24, 2011
This paper describes how to build a proactive threat and risk strategy based on predictive analytics and provides real life examples of the benefits.
Tags : 
ibm, predictive analytics, collaboration, insights, integration, automation, smarter, data analysis, ibm data analysis, smarter planet new intelligence, rfid, sensors and actuators, epedigree, track and trace, insurance fraud, data management, data mining, knowledge management, data storage, knowledge management software
    
IBM Software
Published By: ScriptLogic     Published Date: Mar 30, 2012
Desktop Authority reduces the cost of owning Windows desktops by enabling you to proactively configure, secure and support desktops and servers from a central location.
Tags : 
scriptlogic, desktop management, desktop authority, windows, software asset management, software license, tracking, automation, system center configuration manager, sccm, virtual application
    
ScriptLogic
Published By: SkillSoft MKG     Published Date: Nov 05, 2010
What does it really take to be a leader at our company? Will this program enable tomorrow's leaders to see the forest for the trees and initiate a plan to protect and grow that forest?
Tags : 
leadership development, benchmarking, talent management, talent development, leadership capacity
    
SkillSoft MKG
Published By: IBM Cloud Business     Published Date: Jul 12, 2011
If you're leading or working on a SaaS or PaaS project, interoperability and performance challenges through application migration processes are givens. Avoid common frantic missteps that will add time to your production cycles. This technical note offers specific proactive steps you can take to ensure to the successful migration of your enterprise apps.
Tags : 
app behavior, application migration, application migration process, cloud computing, emerging technologies
    
IBM Cloud Business
Published By: IBM     Published Date: Aug 06, 2012
With customer analytics-including predictive analytics, social analytics, business intelligence, and decision management-companies are empowered to improve the customer experience and maximize business outcomes by being proactive, rather than reactive. Comments made in social channels about a perceived problem with a checkout tool on a company's website, for example, can alert company decision-makers about a potential issue before it hits the contact center.
Tags : 
customer analytics, loyalty, profitability, revenue, ibm, transaction data, customer survey data, demographics, contact center, customer behavior, decision-makers, integrate, granular attributes, predictive analytics, life-stage changes
    
IBM
Published By: IBM     Published Date: Aug 07, 2012
Leading companies applying? Predictive intelligence? To proactively mitigate and manage complexity-fraught risks, while bringing value to their bottom line and their brand.
Tags : 
combating, combat, risk, predictive, intelligence, companies, applying, proactively, mitigate, manage, complexity, value, personal finance, investing, small business, finance
    
IBM
Published By: IBM     Published Date: Aug 08, 2012
While economic recovery is clearly in process, your capital and operational budgets are still extremely tight. At the same time, your maintenance organization is being pressured to take a stance of zero tolerance toward safety incidents while reducing maintenance costs and minimizing asset downtime. Read this in-depth Aberdeen Group report, based on responses from 117 executives of successful companies, to find out how best-in-class businesses are proactively managing these challenges. You'll learn these techniques for optimizing maintenance and operations-and more: creating a culture of collaboration among teams across your enterprise; empowering decision makers with appropriate, highly accurate metrics; and leveraging predictive management and analytics to manage assets throughout their life cycle.
Tags : 
ibm, technology, software, asset performance management, economic recovery, operational budgets, capital, asset management, maintenance cost
    
IBM
Published By: SAP     Published Date: Jul 25, 2012
With best-in-class processes supported by the right IT infrastructure, today's service parts organizations can operate at a new level of flexibility, efficiency, and responsiveness. This paper is the first in a five-part series that describes the best-in-class processes of Cat Logistics Services Inc. (Cat Logistics), a wholly owned subsidiary of Caterpillar Inc. It explores how Cat Logistics has optimized its demand-planning processes to proactively address customer demands and drive profitable growth.
Tags : 
infrastructure, technology, cat logistics, caterpillar, management
    
SAP
Published By: CDW     Published Date: Jan 15, 2016
Mobility has brought massive changes to the way we work, and to avoid lagging behind, you need to be able to respond to these changes. But to truly move your organization forward, it takes a proactive approach. We can help you build and implement a mobility strategy that lets you do more than just contain complexities in order to position your organization for future success.
Tags : 
cdw, mobility management, mobility strategy
    
CDW
Published By: CDW     Published Date: Apr 04, 2016
Hewlett Packard Enterprise is helping protect organizations by building security and resiliency into the fabric of their enterprise, proactively detecting and responding to threats, and safeguarding continuity and compliance to effectively mitigate risk.
Tags : 
security, business metrics, best practices, business intelligence, enterprise applications
    
CDW
Published By: Sage     Published Date: Jan 08, 2014
Learn how your HR team can take a proactive position to optimize today’s and tomorrow’s workforce and see how your employee’s productivity and efficiency will increase. Download the whitepaper to read the full report!
Tags : 
workplace environment, productivity, enterprise, flexible workplace, workflow management, workforce planning
    
Sage
Published By: McAfee     Published Date: Jan 28, 2014
AV-TEST preforms a comparative review of McAfee, Microsoft, and Symantec endpoint protection to pro-actively protect against zero-day attacks.
Tags : 
av-test, deep defender, rootkits, detection
    
McAfee
Published By: VMTurbo     Published Date: Apr 11, 2013
This whitepaper describes VMTurbo’s supply chain economy approach, which uniquely addresses these requirements. VMTurbo combines monitoring, analytics and actions to enable proactive virtualization management. VMTurbo’s Observe Advise Automate model delivers intelligent and holistic visibility, analytics and automation.
Tags : 
economic, management, operations, virtualization, vmturbo, analytics
    
VMTurbo
Published By: VMTurbo     Published Date: Mar 25, 2015
Virtualization 1.0 vs. Virtualization 2.0: Where Are You? Virtualization 1.0 is marked by the ability to virtualize, monitor, and react to problems across the environment as they occur. Ever cognizant of the performance limitations that typify higher workload densities, Virtualization 1.0 hesitates to virtualize the critical applications that would be most beneficial. Virtualization 1.0 is limited by the inherent complexities of virtualization. Virtualization 2.0 is marked by complete, proactive control over the virtual environment. Virtualization 2.0 virtualizes up to 100% of its applications, guided by an intelligent abstraction that continually drives the environment to its desired state. Virtualization 2.0 is the promise of virtualization brought to fruition.
Tags : 
vmturbo, virtualization, it economic model, virtual environment, it management solutions
    
VMTurbo
Published By: Cyveillance     Published Date: Apr 10, 2015
In today’s security landscape, more vendors than ever are offering what is purported to be “threat intelligence.” Although security experts often have different definitions for this term, one thing many of them can agree on is that an intelligence-led approach to security – that is, putting threat intelligence to real-world use – is critical to protecting organizations. If the goal of an intelligence-led security strategy is to help organizations be more proactive in finding and preparing for threats to physical and digital assets, it’s crucial to define and understand exactly what threat intelligence means, and separate fact from fiction. In this whitepaper, we dispel some common myths about threat intelligence.
Tags : 
myths, cyber, threat, intelligence, fact, fiction, big data, cloud
    
Cyveillance
Published By: Box     Published Date: Jan 16, 2015
The nature of the financial services industry places a myriad of international compliance requirements on a company's IT team, as well as an expectation by its customers to deliver the high test levels of performance and reliability. To survive and thrive, businesses in the industry must not only keep pace with customer demand but gain competitive advantage. Those demands mean the IT team must be at the forefront of adopting emerging technologies. This is certainly true for Orangefield Columbus, who recently experienced significant growth in its multiple databases which led to the serious performance degradation of its existing storage system. By focusing on a proactive data management storage array, Orangefield was able to eliminate resource contention. Download now and examine Orangefield's journey to find a solution that would meet, and exceed, their performance and capacity requirements.
Tags : 
nexgen, vmware, citrix, flash, financial services
    
Box
Published By: Cornerstone OnDemand     Published Date: Feb 22, 2016
For many small to medium size companies, finding the time to proactively manage employee performance is difficult. The emphasis is more often on increasing revenues and achieving stability, especially in the early days. However, as businesses grow, the need for improving staff engagement, productivity and loyalty becomes increasingly important. It is at this critical stage that Performance Management can mean the difference between businesses that experience sustained growth and those whose momentum falters. Even when organisations are aware of the importance of Performance Management, the tendency is to carry it out in an ad hoc manner. Such methods work with a low headcount, but as this increases, more formal processes are needed. 6 Steps to Performance Management Best Practice offers a practical guide for small and medium enterprises (SMEs) that have identified Performance Management as part of their long term growth strategy. Drawing on industry research, client case studies and
Tags : 
management, productivity, performance, growth, employee
    
Cornerstone OnDemand
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.