Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

office

Results 176 - 200 of 1246Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Nov 02, 2016
The Travis Perkins Group is a leading supplier of building materials to the UK’s building and construction industry. For more than 200 years, the company has grown to deliver more than 100,000 products through 2,000 branch and store locations nationwide. Changing market demands, shareholder expectations and competition demand that the company continually enhance its performance. Yet, changing more than 200 years of tradition can be complicated. Traditional planning practices had led the company down the road to a bureaucratic project management office (PMO), and with the introduction of agile and CA Technologies, the once controlling environment has shifted into a service-oriented centre.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 02, 2016
Customer obsession has created a business environment of continual disruption. Constant change is forcing execs to recognize that traditional planning and delivery practices don’t sustain the ability to focus on strategy while delivering new capabilities. To adapt to an environment where change is the new normal, project management office (PMO) leaders and enterprise architecture (EA) strategists are expanding Agile methods, but scaling Agile to the enterprise requires significant process, organization, and cultural change. This report identifies best practices for tackling this challenge.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Today, digital is everywhere—cloud, mobile, social and the Internet of Things are changing the way we all work and play. This rapidly evolving digital world is also redefining the relationship between your business and your customers, who now expect a convenient, interactive experience from their preferred brands. Security is also a concern. Risk is rising, as both the enterprise and its customers exchange a growing amount of sensitive data.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Die Welt ist heute digital – Cloud, Mobilität, Social Media und das Internet of Things verändern Arbeit und Freizeit für jeden. Diese sich schnell weiterentwickelnde digitale Welt definiert auch die Beziehung zwischen Ihrem Unternehmen und Ihren Kunden neu. Die Kunden erwarten von ihren bevorzugten Marken heute eine komfortable, interaktive User Experience. Auch die Security ist ein wichtiges Anliegen. Die Risiken wachsen, da Unternehmen und Kunden immer mehr vertrauliche Daten austauschen.
Tags : 
    
CA Technologies
Published By: Juniper Networks     Published Date: Aug 10, 2017
Interactive Data is a trusted leader in financial information, delivering a comprehensive set of products and services designed to meet the needs of the front, middle, and back offices at some of the largest and most well-known institutions around the world. These clients trust Interactive Data to help support their investment activities and operational workflow through a broad range of offerings.
Tags : 
interactive data, financial services, global network, market data, ethernet switches, low latency, it infrastructure
    
Juniper Networks
Published By: Google     Published Date: Jan 08, 2018
What happens when teams switch to Google Docs from Microsoft Word Online? They can share documents in nearly half the time, see real-time edits 96% faster and cut down on errors by 88%. Get more findings and how-tos in this detailed report by Principled Technologies, which compares the performance of collaboration and productivity tools included in G Suite and Microsoft Office 365. Download the report now.
Tags : 
productivity tools, collaboration tools, business software
    
Google
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
At a Glance: With the new CA Project & Portfolio Management (CA PPM) 15.3, you can tailor projects to any business unit with drag and-drop ease. Whether complex workflow for HR or simple task management for sales, workers now spin up projects in minutes—not days. Add in-app collaboration to eliminate redundant meetings, a familiar Microsoft Excel®-like grid to manage budgets, a new connection for third-party business intelligence (BI) tools to unearth answers, and you have the most modern project portfolio management app on the market today. Download this whitepaper today to find out more about CA PPM 15.3—a simple, powerful and practical project portfolio management tool available on-premises and in the cloud—let you modernize the project management office.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
The ‘80s Called… … And they don’t want their enterprise Project and Portfolio Management (PPM) tools back. If your Project Management Office (PMO) is still relying on the same or similar processes and systems used when neon and mullets were trending, it will never keep pace with today’s market demands or shifts in technology. Six-month deployment schedules and command and control models of yesteryear are actively being replaced with continuous delivery methods and practices like agile and lean—all in the interest of driving greater customer engagement.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
Les solutions modernes telles que CA PPM continuent d’élever la barre en matière d’outils dernière génération de gestion de la demande IT en proposant en permanence de nouvelles fonctionnalités permettant d’alléger la charge des bureaux de gestion de projets (Project Management Office, PMO), des directeurs financiers, des gestionnaires des ressources et des chefs de produit. Ces dernières années, de nouveaux fournisseurs cherchant à tirer parti du vaste marché toujours plus influent de la gestion de portefeuilles de projets (Project and Portfolio Management, PPM) ont développé des modules qui « s’intègrent » à leurs plates-formes SaaS. Ils se targuent du fait que leurs outils sont faciles à installer et à gérer et promettent des économies à leurs clients. Cela semble trop beau pour être vrai. Et pour la plupart des organisations, c’est malheureusement le cas.
Tags : 
    
CA Technologies EMEA
Published By: TIBCO Software     Published Date: May 31, 2018
Integration is the lifeblood of today’s digital economy, and middleware is the software layer connecting different applications, services, devices, data sources, and business entities. This Ovum Decision Matrix (ODM) is a comprehensive evaluation to help enterprise IT leaders, including chief information officers (CIOs), enterprise/integration architects, integration competency center (ICC)/integration center of excellence (CoE) directors, and digital transformation leaders select a middleware-as-aservice (MWaaS) suite best suited to their specific hybrid integration requirements.
Tags : 
    
TIBCO Software
Published By: VMware     Published Date: Dec 10, 2018
It’s no secret financial services organizations own and operate legacy solutions. Some of these core processes are front and center, meeting customer needs; others are in the middle, supporting account handling operations; and still many more are in the back-office, handling data and managing analytics. The challenge for financial leaders is to ensure these traditional systems don’t prevent the delivery of great digital experiences now and into the future. To find out more download this eBook today.
Tags : 
    
VMware
Published By: VMware     Published Date: Dec 14, 2018
Hyperconverged infrastructure (HCI) is giving organizations the agility to respond quickly to demand for new products, services and applications. Many organisations begin their HCI journey by targeting specific use cases such as virtual desktop infrastructure, disaster recovery and remote office-branch office environments. But HCI continues to evolve far beyond these use cases. In this case study, we look at real world deployments to identify how HCI is helping businesses to reduce TCO, improve scalability and rapidly adopt new technologies. Please enter your details to view the case study.
Tags : 
    
VMware
Published By: Vena Solutions     Published Date: Oct 29, 2018
Even after more than 30 years, it's easy to see why Excel remains so popular. It's flexible, powerful and irreplaceable - especially in finance and accounting. But how well does it work in FP&A today? That's the question that Vena and the Association of Finance Professionals set out to answer in this objective research-based guide, Making Excel Work for FP&A. From taking advantage of Excel's full feature set, to adopting FP&A software built around Excel, there's no shortage of ways to get the most out of Excel for your FP&A needs.
Tags : 
making excel work for fp&a, excel evolution, excel for finance, spreadsheet software, microsoft excel, power bi, financial planning and analysis, cpm, cpm systems, corporate performance management, data analytics, power pivot, microsoft office 365
    
Vena Solutions
Published By: Intapp     Published Date: Jan 09, 2019
Intapp Time provides superior business intelligence thatchangesyour firm’sfundamental relationship with time.Thisunified suite of applications gives timekeepers access to time data and capture wherever they are: in the office, on a mobile device, online and offline.It is user-centric, offering a completely automated option while fullysupporting hands-on tracking—contemporaneous or reconstructionist.Intapp Time helps your business mine time data to reveal new sources of revenue, inform staff decisions, increase project efficiency, and reduce time leakage.
Tags : 
business, business intelligence, time, tax, time for tax, intapp, applications, time data, automation, reporting, timekeeping, audit, accounting, consulting, professional services, active time capture, passive time capture, time tracking
    
Intapp
Published By: Oracle Oracle Marketing Cloud     Published Date: Jul 27, 2016
Marketers need integration and coordination among systems to manage and optimize individual dialogues in real time, across channels, devices and contexts, on a continuous basis. Vendors from advertising, marketing automation and analytics disciplines are converging on this opportunity.
Tags : 
digital marketing, modern marketing, marketing automation, chief marketing officers
    
Oracle Oracle Marketing Cloud
Published By: Riverbed     Published Date: May 24, 2012
Forrester Consulting recently analyzed the requirements for consolidating branch office infrastructures while simultaneously supporting the demands of emerging business goals.
Tags : 
infrastructure, server and storage virtualization, wan optimization, dns, dhcp, branch-office, data center
    
Riverbed
Published By: Dell SB     Published Date: Jan 24, 2019
Introducing a refreshed and most complete mobile portfolio on the planet!
Tags : 
    
Dell SB
Published By: Box     Published Date: Nov 06, 2019
Digital transformation is forcing businesses to rethink how collaboration and process occurs across their extended enterprise, blurring the definitions of “back office” and “front office.” It’s also making it increasingly important to get more value out of their content, while also addressing modern security and regulatory requirements. Although legacy enterprise content management systems helped manage the most sensitive content, they were never designed to accommodate the new mobile, highly agile business processes of the digital age. A new strategy is needed.
Tags : 
    
Box
Published By: Box     Published Date: Nov 06, 2019
Aujourd'hui, l'environnement professionnel est plus concurrentiel que jamais : les entreprises doivent innover toujours plus rapidement, fournir un service client irréprochable et répondre aux besoins croissants des équipes de plus en plus mobiles et connectées. Les enjeux de cet environnement concurrentiel sont réels : environ la moitié des entreprises inscrites au S&P 500 aujourd'hui auront cédé leur place à d'autres d'ici 2026. Et les choix technologiques d'une entreprise sont cruciaux pour sa survie : des études montrent que les organisations qui profitent de services cloud améliorant leur productivité connaissent une croissance plus rapide de 19,6%.
Tags : 
    
Box
Published By: Box     Published Date: Nov 07, 2019
Die digitale Transformation zwingt Unternehmen zu überdenken, wie Zusammenarbeit und Prozesse in ihrem erweiterten Unternehmen stattfinden, wobei die Definitionen für „Backoffice“ und „Frontoffice“ verschwimmen. Sie macht es auch immer wichtiger, mehr Wert aus ihren Inhalten herauszubekommen, während gleichzeitig auch moderne Sicherheits- und regulatorische Anforderungen thematisiert werden. Obwohl Altsysteme des Enterprise-Content-Managements geholfen haben, die sensibelsten Inhalte zu verwalten, wurden sie nie entwickelt, um den neuen mobilen, sehr agilen Geschäftsprozessen des digitalen Zeitalters Rechnung zu tragen. Eine neue Strategie wird benötigt.
Tags : 
    
Box
Published By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected.
Tags : 
advanced threats, e-discovery, compliance, rapid response, office 365, email controls, archiving, customer support
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected.
Tags : 
malware, business email compromise, security, it departments, archiving, information protection, advanced technologies, office 365
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 21, 2017
De nos jours, les auteurs d'attaques, toujours plus inspirés, utilisent des outils automatisés pour puiser des informations sur leurs cibles dans les profils — souvent publics — disponibles sur les médias sociaux. Ils savent donc où vous travaillez. De même, le poste que vous occupez, vos centres d'intérêt, vos loisirs, votre situation matrimoniale ou encore vos précédents emplois n'ont plus aucun secret pour eux. Ils se servent de ces informations pour élaborer des messages convaincants qui vous incitent à cliquer sur une pièce jointe ou une URL malveillante. Si vous tombez dans le piège, une charge active malveillante est injectée dans votre système.
Tags : 
phishing, malware, des individus pris pour cible
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 21, 2017
Angreifer gehen heute kreativ vor und nutzen automatisierte Tools, um in Profilen bei sozialen Netzwerken (die häufig öffentlich zugänglich sind) nach Informationen über ihre Opfer zu suchen. Die Angreifer wissen daher, wo Sie arbeiten (und in welcher Position), ob Sie verheiratet sind und wo Sie in der Vergangenheit gearbeitet haben. Sie kennen Ihre Interessen, Hobbys und viele weitere Details. All diese Informationen werden zum Verfassen äußerst überzeugender E-Mail-Nachrichten verwendet, die Sie zum Klicken auf eine schädliche URL oder angehängte Datei verleiten sollen. Und sobald Sie geklickt haben, werden die Schaddaten auf Ihrem System abgelegt.
Tags : 
phishing, malware, bec, angriffe zielen auf menschen ab, für sicherheitsteams
    
Proofpoint
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.