Skip to main content
 

sam

Results 151 - 175 of 1173Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Aug 09, 2013
AV-Test performed a comparative review of 7 enterprise endpoint security products to determine their real-world protection and remediation capabilities. The malware test used samples for real-world threats, false-positives, and remediation. Download the report to find out how each of the security solution performed. Download Now.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec
Published By: Skillsoft     Published Date: Dec 07, 2016
There are many potential threats to your time and productivity in a typical workday. In this sample lesson from our new Improving Your Personal Productivity Business Skills course, learn how to eliminate the most common time wasters at work. Skillsoft's new line of business skills courses are designed for the modern learner. We’ve created fresh, new business skills videos in a variety of formats including scenario-based storytelling, animation, and panel discussions with subject matter experts. Watch a sample course, Avoiding Time Wasters in the Workplace.
Tags : 
video courses, business skills courses
    
Skillsoft
Published By: Ahead     Published Date: Nov 15, 2018
If your business is like many other organizations that are in the process of enabling a Microsoft Azure public cloud platform, then you might be struggling with the guardrails needed to secure and manage cost, while at the same time enabling flexibility for the teams consuming cloud services. While the Azure platform is already very secure, it also allows a great deal of flexibility in configuration. In order to avoid accidentally creating security holes and out-of-control spend, a Governance Framework is required. We created the AHEAD Azure Governance framework to allow enterprises to develop and maintain a fully optimized, and secure environment. The resulting framework will be tailored to your organization’s specific business and compliance needs, as every enterprise is different. This guide will introduce you to the components of this necessary Azure Foundational Governance Design.
Tags : 
    
Ahead
Published By: Microsoft     Published Date: Jul 20, 2018
Each organization has a unique journey to the cloud based on its own starting point, its history, its culture, and its goals. This document is designed to meet you wherever you are on that journey and help you build or reinforce a solid foundation around cloud application development and operations, service management, and governance. At Microsoft, we have been on our own journey for the past decade, and over the past years we have learned important lessons by developing our own internal and customer-facing systems. At the same time, we've been fortunate to share the experiences of thousands of customers on their own journeys. This document is designed to share those experiences and distill them into proactive guidance. You do not need to follow these recommendations to the letter, but you ignore them at your peril. Our experience has shown that a careful approach to these topics will speed you along on your organization’s journey and avoid well understood pitfalls. For the past severa
Tags : 
    
Microsoft
Published By: CEB     Published Date: Aug 12, 2013
B2B buyers are learning on their own and delaying contact with suppliers until late in the purchase. Most B2B marketers are fighting back with thought leadership—but it’s not working. The Challenger Marketing approach helps marketers stand out amongst the noise and more reliably reset the customer’s purchase criteria decisively in theirf avor.
Tags : 
content marketing, thought leadership, b2b marketing, demand generation, lead generation
    
CEB
Published By: CEB     Published Date: Sep 04, 2013
B2B buyers are learning on their own and delaying contact with suppliers until late in the purchase. Most B2B marketers are fighting back with thought leadership—but it’s not working. The Challenger Marketing approach helps marketers stand out amongst the noise and more reliably reset the customer’s purchase criteria decisively in their favour.
Tags : 
content marketing, thought leadership, b2b marketing, demand generation, lead generation
    
CEB
Published By: IBM     Published Date: Apr 26, 2017
"Business buyers are shopping online as private consumers and they expect the same experience when purchasing business products and services online. While B2B organizations can learn from B2C online retailers in terms of user experience, B2B selling is much more complex. Read this white paper to learn how to: Use B2C best practices to meet buyer expectations for enhanced online experiences Deliver multiple combinations of products and services for faster, streamlined quoting and ordering Support complex buying cycles and selling executions across channels and markets—and around the world"
Tags : 
b2b commerce, efficiency, online retail, buying cycles, b2b selling
    
IBM
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Achieving and maintaining a high level of information security requires information security professionals with robust skills as well as organisational, technical and operational capabilities. The gap between intent and ability to be secure is evident in our sample of UK large enterprises. Deficient companies will only close that gap when they acquire the necessary capabilities. Some of these capabilities can be purchased as information security tools or application solutions, but it is more prudent for an organisation to consider acquiring these capabilities through a service arrangement with a dedicated security services partner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017
Published By: CDW     Published Date: Feb 27, 2015
Bank of Ireland is a leading retail and commercial bank. Snow has helped Bank of Ireland streamline and optimize its software licensing.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
    
CDW
Published By: Cognizant     Published Date: Oct 23, 2018
As financial services firms embrace digital, they need business assurance strategies that extend conventional quality assurance methods to address the nuances of emerging technologies such as blockchain and advanced artificial intelligence (AI). At the same time, they also need assurance that their strategies can accommodate changes in the ever-shifting regulatory landscape wrought by the acceleration of digital within the core of their businesses. This white paper explores how financial firms can excel in digital by holistically addressing the quality of business processes built on disruptive technologies while assuring compliance to regulations.
Tags : 
cognizant, finance, digital
    
Cognizant
Published By: Pega     Published Date: Apr 04, 2016
It is no secret banks are losing customers, and fast. A recent Finextra/Pegasystems survey pegs that 78% of banks have lost business in the last 12 months. The question is “Why?”. It all comes down to engaging with customers before, during and even after the sales process. Nearly all banks are struggling with the impact of client due diligence and KYC (know your customer) regulation on their onboarding processes, and are painfully aware that lack of speed, process visibility and repeat data requests are frustrating their corporate customers. The same holds true for service, where corporates are crying out for improvement, as well as omni-channel access and quick turnaround of service requests and inquiries. To stop the sales decline, banks need to begin doing all these things well. They will then be more competitive in the market as well as retain and win new business. Download this research study and gain a better understanding of how banks can better meet the needs of their customers
Tags : 
    
Pega
Published By: Pega     Published Date: May 24, 2016
It is no secret banks are losing customers, and fast. A recent Finextra/Pegasystems survey pegs that 78% of banks have lost business in the last 12 months. The question is “Why?”. It all comes down to engaging with customers before, during and even after the sales process. Nearly all banks are struggling with the impact of client due diligence and KYC (know your customer) regulation on their onboarding processes, and are painfully aware that lack of speed, process visibility and repeat data requests are frustrating their corporate customers. The same holds true for service, where corporates are crying out for improvement, as well as omni-channel access and quick turnaround of service requests and inquiries. To stop the sales decline, banks need to begin doing all these things well. They will then be more competitive in the market as well as retain and win new business. Download this research study and gain a better understanding of how banks can better meet the needs of their customers
Tags : 
    
Pega
Published By: Zebra Technologies     Published Date: Sep 12, 2018
Detecting and preventing errors that threaten patient safety is a closed-loop process that begins at the point of care, extends to independent laboratories, and then back to the caregiver. Sample identification and results reporting errors can lead to misdiagnosis and inappropriate treatment with deadly consequences. A 2006 Wall Street Journal article reported that while malpractice claims for pathology errors are relatively low, they are the second most costly. In addition to creating a serious risk to patient safety, sample misidentification creates significant financial implications. Redraws, retesting and additional treatment that result from sample errors cost the healthcare industry an estimated $200 million to $400 million per year.
Tags : 
    
Zebra Technologies
Published By: Oracle     Published Date: May 05, 2017
Alla yrkesverksamma personer måste idag hantera digital disruption. Kunderna har ett oöverträffat urval, de förväntar sig ytterst personanpassade upplevelser tillsammans med en alltmer avancerad inköpsväg, och väljer de företag som kan erbjuda ett relevant värde i varje steg.
Tags : 
    
Oracle
Published By: Cisco     Published Date: Apr 08, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking for protection. In fact, 100 percent of companies surveyed by Cisco, as part of our Annual Security Report, have connections to domains that are known to host malicious files or services. At the same time, the Internet of Everything (IoE) is accelerating, creating significant opportunities for businesses and attackers alike as more things come online - along with the people, processes, and data that interact with them.
Tags : 
security, attacks, data, domain, zero-day, capabilities, malicious files, blocking
    
Cisco
Published By: Cisco     Published Date: Apr 08, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking for protection. In fact, 100 percent of companies surveyed by Cisco, as part of our Annual Security Report, have connections to domains that are known to host malicious files or services. At the same time, the Internet of Everything (IoE) is accelerating, creating significant opportunities for businesses and attackers alike as more things come online - along with the people, processes, and data that interact with them.
Tags : 
security, attacks, data, domain, zero-day, capabilities, malicious files, blocking
    
Cisco
Published By: IBM     Published Date: Oct 14, 2009
Web conferencing tools ensure that face-to-face meetings can still take place while removing the costs associated with business travel. Now available as a service with no infrastructure costs, these solutions are being used by savvy companies to go more places than boarding a plane or getting in a car allows.
Tags : 
web conferencing, ibm, infrastructure cost, smb, saas, software-as-a-service, sametime unyte, spend management
    
IBM
Published By: Samanage     Published Date: Aug 22, 2014
One of the oldest and largest global private equity firms, The Riverside Company was fed up with their complex ITSM solution, the costly consultants it required to maintain, and the sub-par customer service they received from their vendor. In this webinar, Eric Feldman, Director of IT at Riverside, shares behind-the-scenes details of how they regained control of their domain, including: "IT"SM…and Beyond – Cross functional business challenges that drove their requirements The journey – What they learned about cloud ITSM along the way The tangible benefits – Immediate business impact and what’s now possible including more accurate budgeting and building economies of scale If you’re actively looking at, or merely thinking about a new IT Service Management (ITSM) solution for your organization, this is one conversation you don’t want to miss. Like Riverside, you can get control and become master of your own IT domain.
Tags : 
samanage, itsm, riverside, itsm solutions, vendors
    
Samanage
Published By: Symantec     Published Date: Oct 02, 2012
Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business.
Tags : 
ssl certificates, online security options
    
Symantec
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business. Not only does it make you feel safer but it also protects people who visit your home, place of business, or website. It is important to understand the potential risks and then make sure you are fully protected against them. In the fast-paced world of technology, it is not always easy to stay abreast of the latest advancements. For this reason it is wise to partner with a reputable Internet security company. This guide will de-mystify the technology involved and give you the information you need to make the best decision when considering your online security options. For a glossary of terms, please see “Tech Talk Made Simple” at the end of this document.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Zebra Technologies     Published Date: Sep 12, 2018
Labeling blood and other samples at the time they are collected improves patient safety and helps prevent a host of problems related to misidentification — including many of the estimated 160,900 adverse events that occur in U.S. hospitals annually because of sample identification errors.1 There is a strong and growing body of evidence within medical literature that creating specimen identification labels on demand at the patient bedside with a mobile printer can significantly reduce errors. The Joint Commission’s National Patient Safety Goals (NPSG) for 2010 advocate the use of two patient-specific identifiers, such as name and birthdate, whenever taking blood or other samples from a patient, and to label the sample collection container in the presence of the patient. Producing specimen labels at the patient bedside and encoding patient identification in a barcode satisfies both The Joint Commission’s NPSG and Health Insurance Portability and Accountability Act (HIPAA) requirements. T
Tags : 
    
Zebra Technologies
Published By: Akamai Technologies     Published Date: Jul 25, 2019
Das Customer Identity and Access Management (CIAM) spielt für Marken, die ihren anspruchsvollen Kunden ein nahtloses, sicheres digitales Erlebnis bieten wollen, eine immer größere Rolle. Als Teil des Identity and Access Management Playbook bietet Forrester Research Unterstützung beim Aufbau eines kundenorientierten IAM-Teams, das über die nötigen technischen Fähigkeiten, Geschäftspraktiken und zwischenmenschlichen Eigenschaften verfügt, um eine CIAM-Strategie zu entwerfen und sie über verschiedene Funktionsgruppen hinweg zu implementieren. Lesen Sie den vollständigen Bericht, um zu erfahren, was Sie bei der effektiven Gestaltung eines CIAM-Teams berücksichtigen sollten. Die Kernpunkte des Berichts: ? Vier wichtige Rollen für Ihr CIAM-Team ? Warum die gemeinsame Nutzung und Integration von Kundendaten über Unternehmensgrenzen hinweg entscheidend für den Erfolg ist ? Die wichtigsten technischen, geschäftlichen und zwischenmenschlichen Fähigkeiten, die die Mitglieder Ihres CIAM-Teams mit
Tags : 
    
Akamai Technologies
Published By: Centrify     Published Date: Sep 08, 2015
Adding Macs to a Microsoft-based corporate network can be a challenge. This paper will explore how Centrify can quickly and easily provide the necessary tools to allow Macs to be managed in the same way PCs are managed today.
Tags : 
device management, security management, mobility, application security, management solutions
    
Centrify
Published By: SambaSaftey     Published Date: Mar 15, 2019
What you don't know could hurt your bottom line Let’s begin with a question: Do you know who is behind the wheel? The reality is that for many enterprises with employees who drive as part of their job, the answer is, “I think so,” or maybe, “no.” Driver risk management has recently become a top issue for many organizations since it directly affects budgets and the bottom line. The fact that there are more than 100 million people driving for work-related activities on U.S. roads and many of them have invalid, suspended or no driver’s license at all should be cause enough for concern. But combining this with the facts that: • most organizations’ budgets are at best flat • P&C insurance rates are rising 14% every 2 years • 90% of crashes are due to human error • there are fewer qualified drivers available today • the number of lawsuits around negligence are skyrocketing • and it becomes clear that understanding exposure to driver risk is imperative for every organization. So what do
Tags : 
    
SambaSaftey
Published By: BlueHornet     Published Date: Apr 12, 2010
Every popular email client will display HTML content sent in email. However, not every email client has a "web standards" compliant HTML rendering engine. Therefore, the same email may render differently across different email clients. This whitepaper offers practical solutions to help designers, coders, and non-designers alike build a successful email that will render well across all email platforms.
Tags : 
bluehornet, html email rendering, email platforms, best practices, css, coding
    
BlueHornet
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.