Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

it professional

Results 701 - 725 of 967Sort Results By: Published Date | Title | Company Name
Published By: Conductor     Published Date: Oct 21, 2013
Conductor's research of more than 380 enterprise search marketers and interviews with numerous SEO professionals finally reveals what separates the 'best-in-class' from the 'laggards.' Best-in-class cite early SEO involvement in content, greater maturity in reporting with the use of advanced techniques such as keyword segmentations, data mash-ups and the use of advanced technology in their reporting workflow, and a stronger commitment to organizational evangelism than their laggard colleagues.
Tags : 
seo, search engine optimization, natural search, successful seo, seo initiatives, seo strategies
    
Conductor
Published By: Symantec     Published Date: Sep 14, 2015
In the running battle with cyberthreats, your first line of defense is your IT staff: the system and network administrators, SOC and NOC operators, incident response and forensics analysts, and application development and QA teams. Are these IT professionals ready to take on an ever-growing army of innovative, persistent cybercriminals and hackers? Probably not, if you expect them to acquire the knowledge and skills they need through self-directed study and on-the-job training. There is too much to learn, and few members of the IT staff have the time to research every new threat. And you can’t afford to suffer through APTs, breaches and data leakages just to provide “teachable moments” for IT personnel. There is another solution. Security simulation immerses IT professionals in a realistic online environment and challenges them to fill the roles of cyberattackers and cyberdefenders. It borrows from education theory and online gaming to present knowledge in ways that motivate learning a
Tags : 
on-the-job training, it professionals, cyber security services, security programs, security
    
Symantec
Published By: Intacct     Published Date: Sep 09, 2014
The professional services market is back—and more competitive than ever. How will you outperform your competitors? By monitoring the financial metrics that matter. Through years of thorough research, Service Performance Insight has analyzed and identified the profit-centric measures that are highly correlated with financial success in professional services. Download the white paper, "The 5 KPIs that Matter for Professional Services," to learn: • The importance and primary characteristics of financial maturity. • The 5 financial metrics critical to service organizations. • Where successful service organizations fall in these metrics.
Tags : 
financial success, profit, professional services
    
Intacct
Published By: Cisco     Published Date: Sep 08, 2016
This white paper updates security professionals on the trends covered in our previous security report while also examining developments that may affect the security landscape later this year.
Tags : 
    
Cisco
Published By: Avalara     Published Date: Jan 28, 2014
Sales tax compliance and the CFO: What automation means for risk management conveys why it’s time C-level executives should take a closer look at how sales tax is managed within their organizations. This report highlights what finance and accounting professionals know (and don’t know) about managing sales tax, and more importantly, why risk of non-compliance is more important in this legislative climate. This report draws upon a recent study by Wakefield Research, which investigates what leading and emerging companies in the U.S. know about sales tax compliance — and, more importantly — what the accounting and finance professionals in the trenches are doing to safeguard their organizations from potential audits and accounting pitfalls. Download this White Paper for more information.
Tags : 
sales tax, tax liability, internet sales tax, best practices
    
Avalara
Published By: QTS Data Centers     Published Date: May 01, 2017
In every industry, IT professionals are watching their roles and objectives evolve rapidly. The world is now digital and data is at the core of how enterprises, governments and individuals manage their core functions. Now, more than ever, CIOs and CTOs are challenged to build sustainable IT strategies against a constantly changing backdrop. Enterprises are quickly realizing that the resources required are exceeding their in-house capabilities. So, who are they trusting with these most valued assets? Data center providers. Learn how IT strategies are evolving and the role data centers play in those strategies.
Tags : 
    
QTS Data Centers
Published By: Samanage     Published Date: Apr 24, 2014
As you evaluate Service Desk and Asset Management solutions in the marketplace, you likely have a set of requirements for features and functionality. But have you considered other key factors that will set you up for success with a cloud-based ITSM solution that might not be so obvious? Not evaluating solutions based on these considerations can delay implementation, driving up costs and causing undue stress for the IT professional. Don’t let them stop you in your tracks; instead, consider these criteria when making your solution decision and to gain greater organizational acceptance.
Tags : 
samanage, service desk, asset management, itsm, it service management, itsm, itsm solutions, itsm tools
    
Samanage
Published By: Adobe     Published Date: Jun 03, 2015
The highly-anticipated Adobe and Econsultancy report, Quarterly Digital Intelligence Briefing: The Quest for Mobile Excellence, details the results of a global survey of marketers and digital professionals. It highlights key priorities, challenges and areas of investments that companies need to consider for 2015 and beyond.
Tags : 
adobe, mobile, strategy, devices, engagement, measurement, apps, optimization
    
Adobe
Published By: Cyveillance     Published Date: Oct 20, 2015
In this white paper, we examine what we consider to be three necessary steps when making a business case for threat intelligence for your organization. Companies must define what they need and why they need it, align security needs and business objectives, and finally, develop an effective plan. We then offer two example scenarios of how businesses can put these steps together and created a solid justification for threat intelligence.
Tags : 
cyveillance, threat intelligence, security, security professionals, it management, it security
    
Cyveillance
Published By: IHS GlobalSpec     Published Date: Jul 09, 2014
Industrial customers use content to research and make purchasing decisions. Are you giving them the info they need? Developed by IHS GlobalSpec, this white paper explains the growing importance of using content to attract, acquire and engage engineers and technical professionals. Content marketing positions your company as an expert, builds trust and introduces new products and services to a wider audience via webinars, technical articles, social media and more. Find out which content appeals most to technical professionals. Learn how to provide information that fulfills their needs at specific points in the buying cycle. And see examples of how and where industrial suppliers effectively use content marketing to deliver information that can help turn shoppers into buyers. Content Marketing for Industrial Marketers also explores the challenges of producing enough of the right content, repurposing it across multiple channels and budgeting for it. Plus, it provides the steps to start dev
Tags : 
ihs globalspec, influence buying decisions, content marketing, purchasing decision makers, content marketing strategy, building brand awareness, content marketing vehicles, engagement opportunities
    
IHS GlobalSpec
Published By: Intel Corporation     Published Date: Sep 10, 2014
Sponsored by: NEC and Intel® Xeon® processor The goal of ESG Lab reports is to educate IT professionals about emerging technologies and products in the storage, data management and information security industries. ESG Lab reports are not meant to replace the evaluation process that should be conducted before making purchasing decisions, but rather to provide insight into these emerging technologies. Our objective is to go over some of the more valuable feature/functions of products, show how they can be used to solve real customer problems and identify any areas needing improvement. ESG Lab's expert third-party perspective is based on our own hands-on testing as well as on interviews with customers who use these products in production environments. This ESG Lab report was sponsored by NEC Corporation of America. Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries.
Tags : 
lab, reports, improvement, storage, data, technologies, purchasing, valuable
    
Intel Corporation
Published By: ForgeRock     Published Date: May 05, 2015
The goal of ESG Lab reports is to educate IT professionals about data center technology products for companies of all types and sizes. ESG Lab reports are not meant to replace the evaluation process that should be conducted before making purchasing decisions, but rather to provide insight into these emerging technologies. Our objective is to go over some of the more valuable feature/functions of products, show how they can be used to solve real customer problems and identify any areas needing improvement. ESG Lab's expert third-party perspective is based on our own hands-on testing as well as on interviews with customers who use these products in production environments. This ESG Lab report was sponsored by ForgeRock.
Tags : 
esg, forgerock, identity platform, self-service, third-party authentication, it management
    
ForgeRock
Published By: Intel Security     Published Date: Jan 12, 2016
This Tech Target research report summarizes a new survey of IT and security professionals that identifies what organizations are doing to combat advanced targeted attacks, and how they feel about their current preparedness to handle both detection and remediation of endpoint breaches due to these attacks.
Tags : 
advanced threat defense, endpoint security, tech target research, security, it management
    
Intel Security
Published By: Microsoft Office 365     Published Date: Sep 08, 2016
In conjunction with Forrester Consulting, Microsoft commissioned a Total Economic Impact study to examine the potential return on investment businesses can receive through the deployment of Office 365. To better understand the benefits, costs, and risks associated with an Office 365 implementation, we interviewed four existing customers and surveyed 72 midsized organizations about the use of Microsoft business products the SaaS platform, including Office Professional Plus, Exchange, Skype for Business, SharePoint, Yammer, and OneDrive.
Tags : 
microsoft, technology, communication, return on investment, forrester consulting
    
Microsoft Office 365
Published By: Engineering360 Media Solutions     Published Date: Jul 07, 2016
Engineering360 is pleased to bring you this selection of marketing articles compiled from recent editions of the Marketing Maven, our monthly e-newsletter created exclusively for business-to-business sales and marketing professionals in the industrial sector.
Tags : 
marketing, engineering360, sales, b2b marketing, marketing strategy, social media
    
Engineering360 Media Solutions
Published By: Citrix Online     Published Date: Jul 01, 2010
This new SPI white paper provides guidance on developing an effective strategy for monitoring, measuring and managing your professional services organization.
Tags : 
citrix online tech, monitoring, measurement, key performance indicators, kpi, tco, test and measurement
    
Citrix Online
Published By: Citrix Online     Published Date: Aug 09, 2010
Browse through the tips that follow-there's a lot of wisdom here that should boost your professional services revenues significantly.
Tags : 
citrix online, roi, business management, professional services
    
Citrix Online
Published By: Tripwire     Published Date: Jul 25, 2008
Tripwire surveyed IT professionals to learn how virtualization is expanding and if security, change controls and compliance requirements are keeping pace. Read this white paper to learn more about the state of virtualization today and why most of the respondents agree that a dedicated configuration tool is needed and are in the process of evaluating or planning to acquire such a tool.
Tags : 
virtual, virtualization, tripwire, configuration, change managemement
    
Tripwire
Published By: IBM     Published Date: Aug 17, 2016
As digital transformation accelerates, the opportunity to engage customers digitally has never been greater — but so has the threat of not delivering great customer experiences. In order for customer insights professionals to compete, the use of customer understanding to optimize experiences at scale must be at the heart of all digital transformation initiatives. Digital intelligence provides a vision and approach that captures a holistic view of the customer in order to optimize digital interactions, engagements, and experiences. During his talk James McCormick will describe the vision and need for digital intelligence; the approach needed to make it a strategic initiative, and ultimately, how it will provide a competitive advantage.
Tags : 
ibm, customer experience, commerce, customer experience analytics, data insights, digital intelligence, digital interaction, engagement
    
IBM
Published By: IBM     Published Date: Oct 12, 2016
As digital transformation accelerates, the opportunity to engage customers digitally has never been greater — but so has the threat of not delivering great customer experiences. In order for customer insights professionals to compete, the use of customer understanding to optimize experiences at scale must be at the heart of all digital transformation initiatives. Digital intelligence provides a vision and approach that captures a holistic view of the customer in order to optimize digital interactions, engagements, and experiences. During his talk James McCormick will describe the vision and need for digital intelligence; the approach needed to make it a strategic initiative, and ultimately, how it will provide a competitive advantage.
Tags : 
ibm, commerce, customer analytics, digital intelligence, customer experience, enterprise applications
    
IBM
Published By: Symantec     Published Date: Jul 11, 2017
In our 25-criteria evaluation of endpoint security suite providers, we identified the 15 most significant ones — Bromium, Carbon Black, CrowdStrike, Cylance, ESET, IBM, Intel Security, Invincea, Kaspersky Lab, Landesk, Palo Alto Networks, SentinelOne, Sophos, Symantec, and Trend Micro — and researched, analyzed, and scored them. This report shows how each provider measures up and helps S&R professionals make the right choice.
Tags : 
endpoint security, security, threat prevention, threat detection, security solution
    
Symantec
Published By: IBM MaaS360     Published Date: Oct 09, 2015
Mobilephobia: A family of fears typically impacting CISOs and other security professionals associated with embracing and deploying a mobile security strategy that enables access across the enterprise, sharing of corporate data or interaction with associates, customers and other third parties via mobile devices and applications.
Tags : 
fiberlink, ciso, security, mobile, mobilephobia, corporate data, networking
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 01, 2016
In Forrester’s 25-criteria evaluation of enterprise mobile management (EMM) vendors, we identified the 11 most significant EMM providers — AirWatch by VMware, BlackBerry, Citrix, Good Technology, IBM, Landesk, Microsoft, MobileIron, SAP, Sophos, and Soti — and analyzed their offerings. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help infrastructure and operations (I&O) professionals select the right partner for their enterprise mobile management.
Tags : 
ibm, forrester, enterprise mobile management, mobile, security, wireless
    
IBM MaaS360
Published By: IBM     Published Date: Apr 09, 2015
Hybrid cloud infrastructures and mobility are changing the rules of the game for IT security professionals. Read this paper to understand the requirements to adopting a new monitoring strategy to quickly detect attacks across the infrastructure you control in your data center, as well as what you don't control in the dynamic cloud.
Tags : 
ibm, hybrid cloud, cloud computing, monitoring, detection, it security, data center security
    
IBM
Published By: IBM     Published Date: Oct 02, 2015
Moving your company's security intelligence monitoring and management to the cloud can provide access to market leading capabilities and reduce capital expense. This paper outlines the advantages of the IBM security intelligence solution, delivered from the cloud, and monitored by service professionals.
Tags : 
cloud, security intelligence, ibm security, ibm security intelligence solution, security, it management
    
IBM
Start   Previous    22 23 24 25 26 27 28 29 30 31 32 33 34 35 36    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.