Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

critical

Results 501 - 525 of 2642Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Nov 13, 2013
Two dominant trends are potentially reshaping the role of the HR function in the corporate world. The first relates to the rapid growth of the knowledge economy. In this environment, a committed, appropriately skilled and prudently deployed workforce is critical in order to develop new products and outstrip the competition. Second, many administrative functions that were formerly handled by HR departments, such as payroll and pensions, have now been farmed out to third parties. Indeed, research reveals that more than two-thirds of companies outsource a portion of their HR functions. This report by the Economist Intelligence Unit investigates whether the HR function is forging a close and robust relationship with the CEO. It also explores the nature of these working relationships, how they have been affected by the economic downturn and how they vary across industries and regions.
Tags : 
zenithoptimedia, oracle, ceo perspectives, hr department drives growth, economist intelligence unit, ibm, hr and organizational strategy, strategic influence of hr
    
Oracle
Published By: Entrust Datacard     Published Date: Jul 23, 2019
PKI is becoming a critical underpinning to help organizations succeed as they roll out new digital business models. Establishing a trusted infrastructure through PKI will help businesses take smart risks, evolve quickly and manage relationships with customers, partners, vendors and employees more effectively. Certificate management is a crucial part of a robust PKI implementation, ensuring visibility and adherence to policy throughout the certificate lifecycle: from identity vetting, to issuance, to renewal to revocation. As Gartner noted in its recent report, “PKI is Gearing Up for the Internet of Things”
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 10, 2017
PKI is becoming a critical underpinning to help organizations succeed as they roll out new digital business models. Establishing a trusted infrastructure through PKI will help businesses take smart risks, evolve quickly and manage relationships with customers, partners, vendors and employees more effectively.
Tags : 
certificate management, digital business, pki, datacard, certificate management
    
Entrust Datacard
Published By: Fiserv     Published Date: Nov 06, 2017
Uncover Exceptions Easily and Certify Financial Statements with Confidence. With increasing regulatory requirements for insurance organizations and the need for executive management to sign off on financial statements, it is critical to ensure that there is detailed visibility into the underlying financial data. Ongoing emphasis on having a strong internal control structure for insurers brings into light reconciliation and certification as being the critical components to making it happen.
Tags : 
automated reconciliation for insurers, automated reconciliation, automated certification for insurers, internal control structure, financial close, comprehensive reconciliation system, comprehensive reconciliation solution
    
Fiserv
Published By: Fiserv     Published Date: Mar 02, 2018
Uncover Exceptions Easily and Certify Financial Statements with Confidence. With increasing regulatory requirements for financial institutions and the need for executive management to sign off on financial statements, it is critical to ensure that there is detailed visibility into the underlying financial data. Ongoing emphasis on having a strong internal control structure for insurers brings into light reconciliation and certification as being the critical components to making it happen. When done properly, they assure accuracy of information flowing into the financial close process, with minimal risk of misstatement, and a full audit trail. The white paper, Certify with Confidence: How Automated Reconciliation Lets You Sign With Certainty, explains how a comprehensive reconciliation solution should work In today's regulatory climate, and why a comprehensive, end-to-end, automated reconciliation system is essential to protecting yourself and your company.
Tags : 
automated reconciliation, automated reconciliation for banks, automated certification, automated certification for banks, internal control structure, financial close, comprehensive reconciliation system, comprehensive reconciliation solution
    
Fiserv
Published By: Fiserv     Published Date: Mar 02, 2018
Uncover Exceptions Easily and Certify Financial Statements with Confidence. With increasing regulatory requirements for insurance organizations and the need for executive management to sign off on financial statements, it is critical to ensure that there is detailed visibility into the underlying financial data. Ongoing emphasis on having a strong internal control structure for insurers brings into light reconciliation and certification as being the critical components to making it happen. When done properly, they assure accuracy of information flowing into the financial close process, with minimal risk of misstatement, and a full audit trail. The white paper, Certify with Confidence: How Automated Reconciliation Lets You Sign With Certainty, explains how a comprehensive reconciliation solution should work In today's regulatory climate, and why a comprehensive, end-to-end, automated reconciliation system is essential to protecting yourself and your company.
Tags : 
automated reconciliation for insurers, automated reconciliation, automated certification for insurers, internal control structure, financial close, comprehensive reconciliation system, comprehensive reconciliation solution
    
Fiserv
Published By: Shell     Published Date: May 30, 2019
The cost of a single turbine failure – whether it’s a steam, gas, water or combined cycle turbine - can amount to hundreds of thousands of dollars per hour. Avoiding turbine outages is business critical, but do you know what warning signs to look out for, and what steps to take to get to the root of the problem?
Tags : 
    
Shell
Published By: DocuSign     Published Date: Apr 24, 2018
At DocuSign, we understand that deploying new technology and processes in your organization can be a challenge. Based on our experience with on-boarding real estate offices across the country, we have found that there are several key factors that contribute to successful deployment and adoption. Within this guide, we have outlined critical change management principles and supporting materials that will help you successfully manage your organizations transition to DocuSign.
Tags : 
    
DocuSign
Published By: MindTouch     Published Date: Mar 08, 2019
Chatbots are hungry and knowledge management is the secret sauce. Chatbots are all the rage. They help customers find information and answers. They help contact centers automate tasks and create considerable efficiency gains. How, then, do organizations ensure their chatbots consistently deliver A+ experiences? The answer is knowledge management. Without the availability of rich, relevant content, chatbots have very little to work with during customer interactions. They won’t be able to accurately match user intent with the right information. And that’s no good for the customer. How knowledge management changes all that is the topic of our latest whitepaper.
Tags : 
    
MindTouch
Published By: BlackLine     Published Date: Aug 06, 2018
When did reconciliations become a living nightmare? Demanding deadlines. Strict requirements for review and supporting documentation. Endless piles of reconciliations to approve?that were due yesterday. Reconciliations are one of the most labor-intensive, yet critical controls processes within any organisation. Even the smallest mistake can compromise the integrity of your balance sheet and create discrepancies in your financial close. There is a simpler way to perform your reconciliation process that allows you to focus on analysis, risk mitigation, and exception handling. Join us for this webinar to find out what this is. You will learn how to: Automate daily reconciliations for continuous control and validation Gain better visibility into the quality, accuracy, and timeliness of a reconciliation Develop a seamless and streamlined workflow for preparation, approval, and review
Tags : 
    
BlackLine
Published By: Limelight Network     Published Date: Aug 12, 2019
To provide the best possible customer experiences that will increase revenue and customer satisfaction, many organizations engage the services of a Content Delivery Network (CDN). However, to choose the right CDN for your workflow and business requirements, you must first evaluate your unique needs. The following provides guidance for identifying the key considerations and questions to ask.
Tags : 
    
Limelight Network
Published By: Limelight Network     Published Date: Aug 12, 2019
To provide the best possible streaming video experience that will increase revenue and customer satisfaction, many organizations engage the services of a Content Delivery Network (CDN). However, to choose the right CDN for your video workflow and business requirements, you must first evaluate your unique needs. The following provides guidance for identifying the key considerations and questions to ask.
Tags : 
    
Limelight Network
Published By: SchemaLogic     Published Date: Jun 11, 2008
SchemaLogic of Kirkland, WA, provider of business semantics management software, announced that Chevron has chosen SchemaLogic Enterprise Suite as a critical software component for Phase 3 of the company's third-generation Global Information Link (GIL3) initiative. This strategic initiative defines Chevron's overall information management strategy, global hardware and software architecture and operating environment.
Tags : 
schemalogic, oil, gas, petroleum, sharepoint, share point, collaboration, chevron
    
SchemaLogic
Published By: Coveo     Published Date: Nov 13, 2013
In the health-care industry, every second counts. Learn how the Children’s Hospital of Boston uses Coveo to ensure clinicians and hospital staff easily local precise, critical patient care information.
Tags : 
internal knowledgebase, enterprise search, enterprise search solutions, unified search
    
Coveo
Published By: Palo Alto Networks     Published Date: Apr 25, 2017
A new survey commissioned by Palo Alto Networks and conducted by Enterprise Strategy Group explores why enterprise IT leaders are embracing CASB products, where they are using them, and what capabilities are most important to them. One of the most critical needs is securing the use of SaaS applications. Here’s what you need to know.
Tags : 
    
Palo Alto Networks
Published By: BlackBerry     Published Date: Apr 13, 2010
Mobile deployments in business are growing at an accelerating rate, enabled by increasingly capable devices at attractive prices, faster, less costly, and more reliable wireless networks being deployed across wider areas, and an expanding array of mobile applications that empower the mobile workforce with an abundance of business critical functions.
Tags : 
blackberry, iphone, windows, wireless networksmicrosoft exchange, mobile device management, mobile device management software, mobile workers, remote computing
    
BlackBerry
Published By: K2     Published Date: Jun 10, 2015
Business process management (BPM) needs can vary widely, from top-down business transformation initiatives to smart process applications to enterprise resource planning, marketing, social and more. With this breadth and depth of reach, BPM – and BPA, business process automation – are more than a couple of buzzwords, they are absolutely mission critical.
Tags : 
    
K2
Published By: ASG Software Solutions     Published Date: Aug 20, 2008
A forward-looking CMDB does more than keep an organization's IT operations running. It draws clear connections between IT components and business services, which is the core of Business Service Management (BSM). But even more critical than the CMDB's ability to support business as it is now, is the question of how well it will drive business innovation in the future.
Tags : 
asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce
    
ASG Software Solutions
Published By: Druva     Published Date: Sep 27, 2017
There are significant differences between a cloud-native data protection solution and those that call themselves “clouds.” Understanding the value of each requires asking the right questions based on the needs of the organization. This executive brief provides critical insights into the pros and cons of each model.
Tags : 
cloud protection, data protection, enterprise recovery, cloud
    
Druva
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
In too many organizations today, innovation isn’t happening fast enough. Within these businesses, skills are siloed and resources are misaligned. As businesses seek to speed innovation and meet their growth and revenue targets, they have to get maximum utility out of all their investments—including in the areas of IT infrastructure, product development and human resources. This buyer’s guide is intended to help those decision makers tasked with making this critical buying decision—focusing on the characteristics that help enterprises address both their immediate and long term needs. This guide shows how leveraging a PPM platform that delivers both top-down, strategic portfolio management, as well as bottom-up project management capabilities, helps organizations maximize their ROI over the long term.
Tags : 
    
CA Technologies EMEA
Published By: GeoTrust     Published Date: Oct 06, 2014
Choosing the right security solution is critical to the success of an online business. Look for trust-based security solutions that deliver protection and consumer peace-of-mind through cutting edge technology and integration with complementary third-party solutions.
Tags : 
security solution, online business, trust-based security solutions, protection, cutting edge technology, integration, third-party solutions, security
    
GeoTrust
Published By: Symantec     Published Date: Apr 02, 2015
The online world can be a scary place as the integration of the Internet into everyone’s lives has also brought with it an ever-increasing trend towards malicious activity. Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customers’ sensitive information. It is critical to choose e-commerce security solutions that continually evolve and extend to address a range of ever-changing needs. SSL-based security platforms with solid track records of meeting new challenges are the best way to defend, and future proof, e-commerce environments against a growing and dynamic Internet threat environment.
Tags : 
security solution, ssl, e-commerce environments, malicious activity, safeguard information, ssl-based security, security
    
Symantec
Published By: TDi Technologies     Published Date: Aug 16, 2011
Configuration ports on critical and non-critical cyber assets are often misunderstood and overlooked in the overall cyber security strategy.
Tags : 
    
TDi Technologies
Published By: Adobe     Published Date: Sep 20, 2016
With a world of information and accessibility in their pockets, customers can engage with a brand whenever and wherever they want. This flexibility has made mobile technology an essential part of the way both customers and businesses interact. And to deliver experiences that feel personal and intimate, your plan needs to account for a critical building block to any relationship: trust. Read Circles of Trust: Use Mobile to Engage Better, to understand how you can leverage trust to deliver a better customer experience. Read the white paper to learn: • The four major circles of trust as a fresh approach to successful customer experience • The seven steps to effective optimization • The 3 C’s of mobile marketing • The steps for developing a mobile optimization plan across your organization
Tags : 
adobe, mobile, data driven marketing, marketing, marketer
    
Adobe
Published By: Adobe     Published Date: Mar 03, 2017
With a world of information and accessibility in their pockets, customers can engage with a brand whenever and wherever they want. This flexibility has made mobile technology an essential part of the way both customers and businesses interact. And to deliver experiences that feel personal and intimate, your plan needs to account for a critical building block to any relationship: trust. Read Circles of Trust: Use Mobile to Engage Better, to understand how you can leverage trust to deliver a better customer experience. Read the white paper to learn: • The four major circles of trust as a fresh approach to successful customer experience • The seven steps to effective optimization • The 3 C’s of mobile marketing • The steps for developing a mobile optimization plan across your organization
Tags : 
mobile engagement, branding, mobile marketing, mobile optimization
    
Adobe
Start   Previous    14 15 16 17 18 19 20 21 22 23 24 25 26 27 28    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.