Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

it organization

Results 376 - 400 of 5353Sort Results By: Published Date | Title | Company Name
Published By: BetterUp     Published Date: Oct 29, 2018
American corporations today spend an estimated $160B annually on learning and development initiatives. Yet employees forget up to 75% of the material taught, meaning up to $120B of that investment is wasted. It’s no wonder that 70% of organizational transformations fail – organizational transformation starts with individual transformation. If we can’t nail the latter, we have no hope in achieving the former. This eBook will detail the phases of successful individual transformation, from Learning to Doing to Being, incorporating the latest evidence from fields across the behavioral sciences.
Tags : 
    
BetterUp
Published By: BetterUp     Published Date: Dec 05, 2018
American corporations invest an estimated $160B on learning and development initiatives. But since employees forget up to 75% of what is taught, $120B of that investment is wasted. So, it's no wonder that 70% of organizational transformations fail. This eBook details what's required for successful individual transformation, from Learning to Doing to Being, incorporating the latest evidence from fields across the behavioral sciences.
Tags : 
    
BetterUp
Published By: BetterUp     Published Date: Dec 05, 2018
BetterUp has been one of the most impactful learning and development solutions Logitech has implemented. By working one-on-one with BetterUp coaches, Logitech managers were equipped to better manage their mindsets and ultimately, have developed into stronger leaders. BetterUp can individually touch employees across your entire organization, regardless of their function, team, and location. Senior Director of Learning & Development at Logitech, Jessica Amortegui says, “If you want to significantly increase the impact of your learning and development programs, BetterUp coaching is the way to do it.”
Tags : 
    
BetterUp
Published By: BetterUp     Published Date: Mar 06, 2019
Despite spending $160B per year on L&D software and another $14B on leadership development, organizations continue to see a limited return on their human capital investments. Don’t miss this on-demand webinar as Gabriella Kellerman MD, Chief Innovation Office at BetterUp, discusses how to move beyond short-term behavior change to lasting transformation--maximizing your investment and empowering your workforce.
Tags : 
    
BetterUp
Published By: BeyondTrust     Published Date: Apr 04, 2019
The WannaCry ransomware attack in May 2017 crippled the UK’s National Health Service (NHS) and disrupted a range of organizations across 150 countries. Despite being a relatively unsophisticated attack, WannaCry was able to make such a global impact due to preventable vulnerabilities that had largely gone unaddressed. There were many more attacks in 2017, including high-profile breaches at Uber and Equifax, where heeding cyber-security recommendations may have reduced the impact and fallout. The scale and sophistication of cyber-attacks is not slowing down – ranging from phishing scams to cryptocurrency-based cyber-attacks, to statesponsored attacks on industrial control systems. These attacks present an ever growing challenge and serve as a reminder that organizations cannot afford to be complacent in the face of cyber threats. We’re living in a time when cyberattacks are a matter of when, not if, and security professionals must focus on mitigating their extent and damage. Our 2018 re
Tags : 
    
BeyondTrust
Published By: BeyondTrust     Published Date: Apr 04, 2019
Unix and Linux build the foundation for most business-critical systems. Thus, these present target-rich environments for cyber-attackers. Privileged Access Management (PAM) helps to mitigate such risks. To succeed, organizations must follow an integrated approach, covering both privilege elevation and centralized management of shared account credentials.
Tags : 
    
BeyondTrust
Published By: BeyondTrust     Published Date: Apr 11, 2019
The WannaCry ransomware attack in May 2017 crippled the UK’s National Health Service (NHS) and disrupted a range of organizations across 150 countries. Despite being a relatively unsophisticated attack, WannaCry was able to make such a global impact due to preventable vulnerabilities that had largely gone unaddressed. There were many more attacks in 2017, including high-profile breaches at Uber and Equifax, where heeding cyber-security recommendations may have reduced the impact and fallout. The scale and sophistication of cyber-attacks is not slowing down – ranging from phishing scams to cryptocurrency-based cyber-attacks, to statesponsored attacks on industrial control systems. These attacks present an ever growing challenge and serve as a reminder that organizations cannot afford to be complacent in the face of cyber threats. We’re living in a time when cyberattacks are a matter of when, not if, and security professionals must focus on mitigating their extent and damage.
Tags : 
    
BeyondTrust
Published By: BeyondTrust     Published Date: Jun 05, 2019
The world is an uncertain place. Particularly for cyber security professionals, many of whom have learned the hard way that they can’t rest on their laurels. New technologies and fresh threats are constantly emerging, and these threats come from both outside and within organizations. In our 2019 privileged access threat research, we discovered that almost two thirds of respondents (64%) think it is likely they’ve suffered a breach due to employee access, while 58% say the same about vendors. Meanwhile, the devices intended to make life easier can expose businesses further. Although hostile, external attacks are considered a significant or moderate concern by 61% of businesses, the threat of misused or abused insider access follows very closely behind at 58%. At the same time, 57% of security decision makers perceive at least a moderate risk from Bring Your Own Device (BYOD) policies and the Internet of Things (IoT) at 57%. In this fourth edition of BeyondTrust’s annual Privileged Acces
Tags : 
    
BeyondTrust
Published By: BI WORLDWIDE     Published Date: Jul 28, 2014
Employee engagement is what happens when companies win over the hearts and minds of employees in ways that lead to extraordinary effort and positive financial results. Engagement has a significant effect on key business outcomes including profitability, productivity, customer satisfaction and retention. Download our infographic to learn how engaging your employees will produce measurable results in your organization.
Tags : 
bi worldwide, employee engagement, employee recognition, social recognition, employee awards, employer engagement, incentive programs, employee incentives, reward ideas, recognition programs, recognition gifts, engagement survey, rewards and recognition, employee programs, recognition ideas, employee motivation, recognition program ideas
    
BI WORLDWIDE
Published By: BI WORLDWIDE     Published Date: Dec 22, 2014
Many people view middle managers as having the ultimate “cushy” job. In reality, middle managers are the key to turning top-line strategy into day-to-day action. Successful middle managers keep their teams motivated by using recognition that is timely, specific, sincere and positive. Learn how to harness the power of your middle managers to develop a culture of recognition in your organization.
Tags : 
employee engagement, employee recognition, social recognition, mobile recognition, employee awards, employer engagement, incentive programs, employee incentives, reward ideas, recognition programs, recognition gifts, employee programs, recognition ideas, employee motivation, recognition program ideas
    
BI WORLDWIDE
Published By: bigtincan     Published Date: Oct 10, 2014
Understanding content value and unlocking the tribal knowledge that exists among mobile workforces is one of the key drivers that can improve how an organization operates in the age of mobile computing. By implementing Content Intelligence, mobile users can easily learn from their colleagues and leverage the domain expertise and the content that works best. It’s the ultimate way to get people working together to improve the productivity of every user within the organization.
Tags : 
mobile content, b2b, content intelligence, content value
    
bigtincan
Published By: Bill.com     Published Date: May 14, 2012
Small and mid-sized business use Bill.com to help manage their cash flow and make better use of their resources. Here are the top ten things you can do with Bill.com to help take control of your organization's financial management.
Tags : 
cloud invoice, cloud, smb, management, invoices, bill.com
    
Bill.com
Published By: Bit9     Published Date: Mar 07, 2013
In this whitepaper, Industry Analyst Frost and Sullivan examines today’s advanced threat landscape and recommends that organizations adopt a new approach to server security that is based on trust.
Tags : 
data breaches, data center, security, cyber threats, server, business continuity
    
Bit9
Published By: Bitium     Published Date: Jan 22, 2014
Selecting the right single sign-on solution (SSO) for your organization can be a daunting task. Competing solutions offer varying levels of application support, management overhead, and potentially confusing (and counter- productive) cost structures. But the upside in terms of improved security, manageability and user productivity enhancements provided by the right SSO solution can be dramatic. The questions contained within are intended to help you collect and organize the critical information you need to make a well-informed decision for your organization. Please use them as a guide during your due diligence and vendor selection process. Please download the white paper to learn more.
Tags : 
single sign on, sso, identity as a service, idaas, access and identity management, identity access management, password management, password manager, it management, enterprise applications
    
Bitium
Published By: BitSight Technologies     Published Date: Feb 03, 2015
Download "Making Risk Management More Effective with Security Ratings" to learn how BitSight is revolutionizing the way organizations manage security risk throughout their ecosystem.
Tags : 
risk management, security ratings, compliance mandates, executive reporting, security risk assessments, security, it management
    
BitSight Technologies
Published By: BitSight Technologies     Published Date: Feb 20, 2015
Learn how to drastically improve your third-party security compliance and see how your organization should make adjustments to ensure you’re protected from unmitigated risks.
Tags : 
bitsight technologies, security, cyber attacks, monitoring, third party security monitoring, third party risk, risk management, it management
    
BitSight Technologies
Published By: BitSight Technologies     Published Date: Feb 29, 2016
Cybersecurity is an issue facing nearly every organization today—and if you aren’t taking the necessary precautions, your company, customers, and vendors could all suffer.
Tags : 
cybersecurity, security risk, security ratings, security, it management, enterprise applications
    
BitSight Technologies
Published By: BitSight Technologies     Published Date: Jul 07, 2016
Download this white paper to learn: - Why vendor risk management is becoming a standard business practice - About the challenges organizations face in building formalized vendor risk programs - How to move beyond "point-in-time" tools and begin continuously monitoring your vendors.
Tags : 
bitsight, risk management, cybersecurity, vrm practices, vendor risk management, cybersecurity, security, enterprise applications
    
BitSight Technologies
Published By: Bizagi     Published Date: Jun 29, 2016
The research explores the challenges surrounding digital transformation and provides recommendations based on four key areas. Understanding the drivers of change for your business Identifying the risk factors that influence successful transformation Overcoming cultural and organizational resistance to change Increasing the agility of existing systems to drive transformation
Tags : 
drivers of change, risk factors, digital transformation, enterprise applications
    
Bizagi
Published By: Black Duck Software     Published Date: May 18, 2010
In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source
    
Black Duck Software
Published By: Black Duck Software     Published Date: Jul 16, 2010
This paper is for IT development executives looking to gain control of open source software as part of a multi-source development process. You can gain significant management control over open source software use in your development organization. Today, many IT executives, enterprise architects, and development managers in leading companies have gained management control over the externally-sourced software used by their application development groups. Download this free paper to discover how.
Tags : 
open source, development, architects, application development, software development
    
Black Duck Software
Published By: Black Duck Software     Published Date: Dec 29, 2015
Today, companies are more concerned than ever about software security threats. With some 95 percent of companies relying on open source software, its security is now a critical focus for CEOs, COOs, and boards of directors. Learn which security tools and methodologies are best suited for your organization's environment.
Tags : 
black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management, open source management, open source monitoring, oss, oss security, open source tools, open source software, open source scanning, enterprise applications
    
Black Duck Software
Published By: Black Duck Software     Published Date: May 18, 2016
Today, companies are more concerned than ever about software security threats. With some 95 percent of companies relying on open source software, its security is now a critical focus for CEOs, COOs, and boards of directors. Learn which security tools and methodologies are best suited for your organization's environment.
Tags : 
black duck, open source, security, security testing tools, software, enterprise applications
    
Black Duck Software
Published By: Black Duck Software     Published Date: May 18, 2016
Using open source code is not necessarily a problem, but not knowing what open source you’re using can be extremely dangerous, particularly when so much open source contains security flaws. In fact, the latest Future of Open Source Survey found that: - 55 percent of respondents had no formal policy or procedure for open source consumption - 98 percent were unaware of the open source code they were using "Application Security in 2016," a complimentary report from Black Duck Software, considers the key application security challenges your organization will face, with a special focus on staying both agile and secure with open source. Download the report today!
Tags : 
black duck, application security, security, open source, code, enterprise applications
    
Black Duck Software
Published By: BlackBerry     Published Date: Apr 13, 2010
The BlackBerry Enterprise Server Express is designed to be a secure, centralized link between an organization's wireless network, communications software, applications, and BlackBerry devices. The BlackBerry Enterprise Server Express integrates with your organization's existing infrastructure, which can include messaging software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources. You can install the BlackBerry Enterprise Server Express on the same server as Microsoft Exchange or Windows Small Business Server, or you can install the BlackBerry Enterprise Server Express on a separate server.
Tags : 
blackberry, server express, microsoft exchange, v5.0.1, administration guide, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.