Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

eva

Results 101 - 125 of 2660Sort Results By: Published Date | Title | Company Name
Published By: Sage People     Published Date: Apr 10, 2018
How to build your dream team to evaluate the right technology investment.
Tags : 
    
Sage People
Published By: Dell EMC & Intel     Published Date: Aug 03, 2018
When running core workloads, consider hyper-converged infrastructure. Solutions like Dell EMC VxRail simplify operations and significantly reduce TCO. Recent research from Evaluator Group shows how VxRail compares to AWS On-Demand: Learn how to lower TCO with Evaluator Group’s full analysis
Tags : 
    
Dell EMC & Intel
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : 
ransomware, security, risk reduction, containerization, data security
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : 
ransomware, risk reduction, data security, collaboration, containerization
    
Citrix ShareFile
Published By: ForUsAll     Published Date: Jul 02, 2018
Select a 401(k) provider that saves you time, money, and minimizes your compliance liability. Most importantly, partner with an employee-focused 401(k) provider with a track record of helping more employees join and save in the plan — leaving you with happier employees and a 401(k) plan that makes your benefits package even more attractive. And as you evaluate providers, chat with someone from our team and check out our platform. We help our customers achieve 88% participation rates and save 8% on average.
Tags : 
    
ForUsAll
Published By: BlackBerry Cylance     Published Date: Aug 22, 2018
Artificial intelligence (AI) is a security industry term that is now so broadly and loosely applied, it's become almost meaningless. Now that every product boasts AI capabilities, security decision makers are becoming cynical, even in the face of the most exciting innovation shaping cybersecurity today.
Tags : 
security, solutions, industry, artificial, intelligence
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Mar 12, 2019
Artificial intelligence (AI) has become a security industry buzzword so broadly applied as to become almost meaningless. When every product boasts AI capabilities, security decision makers may quickly become cynical, even in the face of the most exciting innovation shaping cybersecurity today.
Tags : 
    
BlackBerry Cylance
Published By: Frontier Communications     Published Date: Dec 29, 2017
We’ve all heard the phrase “you have to spend money to make money,” and while it may be accurate to some extent, businesses also have to keep a close eye on their budgets. As you establish your technology allowance and evaluate tools to help grow your business, consider these five items as absolute essentials.
Tags : 
    
Frontier Communications
Published By: iCims     Published Date: Mar 06, 2014
Growing organizations have different hiring needs than companies in low growth mode. Companies that plan to grow must consider their recruitment technology and how it will impact their ability to scale. When businesses start to expand, they are often required to change many of their recruiting and talent acquisition practices. Typically, emerging companies find themselves unprepared when it comes to increasing workforce changes. The solution: Implementing Talent Acquisition Software to streamline all hiring needs.
Tags : 
talent acquisition software, recruitment technology, hiring needs, talent acquisition practices, human resources, hr technology, icims, human resource technology
    
iCims
Published By: iCims     Published Date: Apr 01, 2015
In order for your organization to recruit and maintain top talent, you need modern, specialized recruitment technology that is designed to meet today's talent acquisition challenges. Learn what to look for when evaluating talent acquisition software in our free whitepaper.
Tags : 
recruiting, staffing, hiring
    
iCims
Published By: VMware, Inc.     Published Date: Apr 05, 2016
Many businesses are beginning to understand that hybrid cloud can provide the best of both worlds: on-demand access to much-needed IT resources, and the flexibility to move workloads onsite or offsite to meet specific needs. The most common question is not “Why hybrid cloud?” but “How do we get started?” Depending on your specific IT strategy and requirements, consider evaluating the following five types of workloads for hybrid cloud.
Tags : 
vmware, disaster recovery, next gen, cloud computing, hybrid cloud
    
VMware, Inc.
Published By: Palo Alto Networks     Published Date: Dec 04, 2015
Simplify your maintenance management software evaluation process with this 2015 software pricing guide!
Tags : 
palo alto, maintenance management, pricing guide, software guide, enterprise applications
    
Palo Alto Networks
Published By: Polycom     Published Date: Sep 09, 2016
40% of Skype for Business customers are now using the platform for voice communication, and many of these customers are now considering complementing the deployment with or shifting to Microsoft’s cloud suite, Office 365. When migrating to Office 365 cloud voice, customers should evaluate whether their existing audio devices are compatible or whether new technology will be needed. If you’re thinking about making the switch to cloud voice, download the report for the 5 Key Considerations when Choosing Technology for Use with Office. 365.
Tags : 
    
Polycom
Published By: Polycom     Published Date: Oct 17, 2016
When migrating to Office 365 cloud voice, customers should evaluate whether their existing audio devices are compatible or whether new technology will be needed. If you’re thinking about making the switch to cloud voice, make sure to download this white paper.
Tags : 
    
Polycom
Published By: Polycom     Published Date: Aug 16, 2017
"40% of Skype for Business customers are now using the platform for voice communication, and many of these customers are now considering complementing the deployment with or shifting to Microsoft’s cloud suite, Office 365. When migrating to Office 365 cloud voice, customers should evaluate whether their existing audio devices are compatible or whether new technology will be needed. If you’re thinking about making the switch to cloud voice, download the report for the 5 Key Considerations when Choosing Technology for Use with Office. 365. "
Tags : 
polycom, office 365, cloud, voice, skype
    
Polycom
Published By: Polycom     Published Date: Nov 29, 2016
40% of Skype for Business customers are now using the platform for voice communication, and many of these customers are now considering complementing the deployment with or shifting to Microsoft’s cloud suite, Office 365. When migrating to Office 365 cloud voice, customers should evaluate whether their existing audio devices are compatible or whether new technology will be needed. If you’re thinking about making the switch to cloud voice, download the report for the 5 Key Considerations when Choosing Technology for Use with Office. 365.
Tags : 
    
Polycom
Published By: NAVEX Global     Published Date: Mar 18, 2015
In this whitepaper, industry expert Michael Volkov, CEO of The Volkov Law Group, LLC, shares key questions no business can afford to overlook when evaluating and selecting vendor risk management solutions.
Tags : 
    
NAVEX Global
Published By: F5 Networks Inc     Published Date: Jun 24, 2015
To succeed in this dynamic environment, organizations must create networks that combine core layer 4-7 functionality, programmability, and application fluency into a scalable Application Delivery Network. While these components all bring their individual benefits, the real lasting value lies in the resulting synergy of the combined solution. Read this whitepaper to learn about the five advantages of F5 when evaluating a replacement for Cisco ACE.
Tags : 
appplication services, cloud, software, load balancing, iot, agility, automation, operational efficiency
    
F5 Networks Inc
Published By: Epicor     Published Date: Mar 31, 2012
Learn from the experiences of other distributors who have been through the ERP selection process and not only lived to tell about it, but brought great benefit to their companies. Read this white paper now and learn what NOT to do when evaluating ERP
Tags : 
epicor, erp, enterprise resource planning, wholesale and distribution, supply chain, distribution, finance, challenges
    
Epicor
Published By: Cisco     Published Date: Oct 07, 2014
Malware has changed considerably since the early PC viruses appeared more than 25 years ago. Today, it evolves so quickly that many customers find staying ahead of the latest threat nearly impossible. If the explosion in malware variants weren’t enough, sophisticated client-side attacks and advanced persistent threats (APTs) target victims in ways that evade traditional security measures. The question isn’t whether your network will be attacked with advanced malware. The question is when it will happen and how you will respond. Advanced malware is changing the way security is managed.
Tags : 
email, malware, web security, quadrant, solutions, threats, data loss, phishing attacks
    
Cisco
Published By: Cornerstone OnDemand     Published Date: Jul 28, 2017
Employee management tools that are paper-driven and spreadsheet-oriented are no longer viable workforce development strategies. The modern worker wants performance evaluations to be goal-oriented and feedback-focused, with learning opportunities that are self-driven and personalized to their own career aspirations. Combining Performance with Learning helps employees and managers create meaningful career-building plans that lead to bottom line growth.
Tags : 
management tools, performance evaluations, bottom line growth, workforce development
    
Cornerstone OnDemand
Published By: Cornerstone OnDemand     Published Date: Jan 31, 2018
Employee management tools that are paper-driven and spreadsheet-oriented are no longer viable workforce development strategies. The modern worker wants performance evaluations to be goal-oriented and feedback-focused, with learning opportunities that are self-driven and personalized to their own career aspirations. Combining Performance with Learning helps employees and managers create meaningful career-building plans that lead to bottom line growth.
Tags : 
    
Cornerstone OnDemand
Published By: Cornerstone OnDemand     Published Date: Jun 29, 2018
Employee management tools that are paper-driven and spreadsheet oriented are no longer viable workforce development strategies. The modern worker wants performance evaluations to be goal oriented and feedback-focused, with learning opportunities that are self-driven and personalized to their own career aspirations. Combining Performance with Learning helps employees and managers create meaningful career-building plans that lead to bottom line growth.
Tags : 
growth, strategy, development, spreadsheet, workforce
    
Cornerstone OnDemand
Published By: Datto Inc.     Published Date: May 08, 2013
The growth of the backup and disaster recovery market, and desire for increased revenues, has prompted MSPs to consider building their own BDR solutions. Learn the top 5 reasons factors MSPs need to evaluate when considering a “do-it-yourself” BDR.
Tags : 
datto, backup, disaster recovery, bdr, backup and recovery
    
Datto Inc.
Published By: Carbonite     Published Date: Oct 10, 2018
Find out five good reasons to consider disaster recovery as a service (DRaaS) and use our buyer’s cheat sheet to make sure you are asking the right questions when evaluating a DRaaS solution.
Tags : 
    
Carbonite
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.