Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

over the top

Results 326 - 350 of 350Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Oct 30, 2014
The Best of the Best Benchmark report compares the overall average versus websites in the top 20% on 6 key performance indicators across six regions — United Kingdom, France, Germany, BeNeLux, Nordics and United States.
Tags : 
measuring your online presence, best of the best benchmark report, evaluating marketing techniques, increasing marketing trending
    
Adobe
Published By: Workday     Published Date: Sep 13, 2018
Are you a finance leader looking to get on track with digitization? With insight from over 650 global finance leaders, this report examines the top priorities for financial transformation and provides a valuable road map for successfully redefining the finance function. Download the report now.
Tags : 
    
Workday
Published By: Workday     Published Date: Sep 13, 2018
Are you a finance leader looking to get on track with digitization? With insight from over 650 global finance leaders, this report examines the top priorities for financial transformation and provides a valuable road map for successfully redefining the finance function. Download the report now.
Tags : 
    
Workday
Published By: Symantec     Published Date: Jul 29, 2013
Virtualization has been a game-changing technology for IT, providing efficiencies and capabilities that just aren't possible when constrained within a physical world. When searching for a backup and recovery solution for virtual environments, there are a few “must have” features to consider. Learn about the top four in this data sheet!
Tags : 
deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection, backup, recovery, system security, system management, security, it management
    
Symantec
Published By: Verint     Published Date: Apr 24, 2013
Commonwealth Bank of Australia, with over 1,000 branches and 50,000 employees was using spreadsheets to staff its branch network. When they looked to desktop process analytics from Verint they achieved major improvements in productivity and customer experience. Watch this case study to learn more about how desktop process analytics can use big data to help your organization.
Tags : 
case study, big data, organization, desktop process analytics, process management, analytics, workforce management
    
Verint
Published By: IBM     Published Date: Jan 09, 2014
IBM Power Systems provide a comprehensive approach designed to protect the continuity and availability of business-critical applications and services. Deploying integrated disaster recovery allows companies to deliver new services faster, with higher quality, and with superior economics. Downtime can be highly disruptive and expensive to an organization, with cost drivers including lost revenue, reduced employee productivity, reputational damage, and the cost of resources required to address and avoid outages. Most organizations in IDC surveys indicate that even one hour of downtime can have a severe business impact or greater and businesses are investing in highly available servers and systems. Hear from leading industry analysts as they share top resiliency trends and top practices. Also see how Power Systems can build a highly stable infrastructure
Tags : 
    
IBM
Published By: Riverbed     Published Date: Apr 14, 2017
"Applications are at the core of digital transformation. Intrinsically linked to the success of digital initiatives and the apps that power them are the areas of DevOps and Continuous Delivery. Underpinning all of these is the area of application performance management (APM). Read this study from Enterprise Management Associates to discover: 10 key factors impacting APM practices in the digital economy. APM requirements for DevOps and Continuous Delivery. How APM addresses other top challenges in a cloud- and digital-centric business."
Tags : 
    
Riverbed
Published By: Epicor     Published Date: Mar 19, 2015
This report, based on a survey of over 200 organizations, examines the top pressures that organizations are facing in business management, uncovers adoption rates of mobile ERP, and illustrates the benefits that mobile access can provide.
Tags : 
erp, roi, business management, mobile access, telecom
    
Epicor
Published By: Polycom     Published Date: Jun 08, 2016
"What are the benefits of moving your phone services to Office 365? How does the Skype for Business phone experience online differ from a traditional on-prem PBX phone experience? What are the important features to consider when selecting phones for your Office 365 cloud deployment? Join Polycom voice experts Randy Wintle and Peter Huboi as they cover these topics and more in one of our most accessed on-demand webinars."
Tags : 
cloud management, cloud services, cloud management, best practices, network management
    
Polycom
Published By: HPE     Published Date: Feb 11, 2015
Delivering high-quality services with greater speed and efficiency is one of the greatest pressures facing your information technology (IT) infrastructure. The rise of computing in the cloud, expansive mobility options, and increasing pressure to boost application performance have added even further complexity - leading to inefficiencies that can limit your opportunity for growth and success. Traditional, siloed IT infrastructures are often too labor intensive, inefficient, and slow to overcome these challenges. Organizations need a converged, cloud-ready, software defined infrastructure to help them meet the evolving demands of their business. Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries. Sponsored by: HP and Intel® Xeon® processor HP is the sponsor of this material. By submitting your information you agree to be contacted by HP on topics of interest. Before deciding please review HP’s
Tags : 
    
HPE
Published By: Harvard Business School     Published Date: Jan 30, 2015
It’s easy to generate a burst of revenue. But will your strategies deliver consistently high profits over the long term? Discover the risks of strategic inertia and learn how to develop strategies that keep your firm on top—today and tomorrow.
Tags : 
strategy, competitive advantage, sustainable competitive advantage, global competition, technological innovation, formulate action plans, harvard business school, executive education
    
Harvard Business School
Published By: VMware AirWatch     Published Date: Jul 20, 2017
Over 350M Windows 10 devices have been deployed in less than a year, and the recent Windows 10 anniversary update has accelerated the planning of Windows 10 rollouts for the vast majority of enterprises.  This is the perfect time to evaluate your desktop deployment strategy.  In this session, we will discuss the how VMware Horizon can enable your journey to Windows 10, and the benefits of centrally deploying Windows 10 through virtual desktops. We will also discuss how VMware provides a comprehensive solution by managing your physical endpoints through AirWatch as well.
Tags : 
    
VMware AirWatch
Published By: Polycom     Published Date: Feb 16, 2017
"Whether you are planning to retire legacy phone systems or have already adopted Skype for Business, organizations are looking past IM and presence and exploring other productivity and efficiency gains. And the most logical first step is Voice. Discover how to take full advantage of Skype for Business in this white paper from ZK Research: The Top 10 Ways to Maximize Your Skype for Business Investment. 2 ways are to make Skype for Business part of your BYOD strategy and consolidate infrastructure. Find out the remaining 8 ways to maximize your investment - and how to make it work for you. "
Tags : 
polycom, business technology, skype, byod
    
Polycom
Published By: Dell EMC     Published Date: Feb 23, 2017
Business leaders are increasingly looking to IT to deliver a mobile workspace that allows employees to access corporate data, applications, and communication resources on their devices of choice. But making the most of the opportunity while minimizing risks can be complex and overwhelming for many IT teams. Therefore, it makes more sense than ever for IT leaders to consider virtual client computing (VCC), also commonly referred to as virtual desktop infrastructure (VDI) solutions.
Tags : 
    
Dell EMC
Published By: Okta     Published Date: May 09, 2016
Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace. This paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration and build a solid foundation for future cloud-first, mobile-first IT.
Tags : 
    
Okta
Published By: Akamai Technologies     Published Date: Nov 02, 2018
Which bot management solution is right for you? Bots are responsible for 30% to 70% of website traffic. They range from good to middling to bad, and from simple to sophisticated. Many bot management vendors say they can solve your bot problem. But can they really? This e-book provides guidance on how to evaluate bot management solutions and understand what the differences mean for you and your customers. We cover the top 10 things to consider when selecting a bot management solution, from accuracy and API protection to flexibility and resilience over time. In viewing this Akamai content, we would like to share your data with Akamai. Click here for more info or to opt out.
Tags : 
    
Akamai Technologies
Published By: IBM     Published Date: Jul 20, 2016
In this presentation you’ll see and learn: - How companies are implementing pre-hire reference assessments - What pre-hire assessments can do for your company - How they decrease turnover amongst high performers - Why they lead to higher employee job performance - How they enable top companies to identify the highest potential candidates available
Tags : 
ibm, employee engagement, smarter workforce, pre-hire assessments, enterprise applications, human resource technology
    
IBM
Published By: Oracle HCM Cloud     Published Date: Nov 30, 2016
The talent landscape is more crowded than ever! Discover the keys to building a magnetic culture that attracts and retains top talent in tough markets. Read more.
Tags : 
    
Oracle HCM Cloud
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
"MVP ASSET IN STORAGE CAMPAIGN • HPE enhanced the perception of SimpliVity's supportability and stability by leveraging the global go-to-market reach and capabilities of HPE and its channel partners. • SimpliVity delivers robust data services, such as in-line global compression and deduplication combined with an integrated backup solution and rapid disaster recovery capabilities for operational simplicity and cost reduction. • The HPE ProLiant DL380 installed base and global market acceptance make SimpliVity one of the top choices as an HCI platform for existing HPE customers."
Tags : 
    
Hewlett Packard Enterprise
Published By: IBM     Published Date: Apr 20, 2017
Protecting confidential data while keeping mobile users productive. The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own. While these solutions generally meet the need to secure the device, they have been lacking in some of the more sophisticated security aspects that are commonplace in laptop and distributed network deployments. Specifically lacking are the robust DLP controls common in laptop management solutions.
Tags : 
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Protecting confidential data while keeping mobile users productive. The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own. While these solutions generally meet the need to secure the device, they have been lacking in some of the more sophisticated security aspects that are commonplace in laptop and distributed network deployments. Specifically lacking are the robust DLP controls common in laptop management solutions.
Tags : 
mobile management, system solutions, data security, software management, personal data management, device management
    
IBM
Published By: Fiserv     Published Date: Jul 09, 2018
Even with the rise of digital payments, cash is still a popular form of payment. According to the Federal Reserve, consumers use cash to pay for nearly one-third of all retail transactions. For many retailers, a completely "cashless society" is nowhere in sight. Cash management remains one of the most important aspects of managing a retail operation, particularly at quick service restaurants (QSRs) and convenience stores, where transactions are smaller and cash is a preferred method of payment. This white paper, Boost Profitability by Automating Cash, sponsored by Fiserv and Fast Casual, details the steps to manage cash properly and boost profit for your business. Uncover the top reasons and flexible options to automate your cash management. • Time savings • Theft deterrence • Higher accuracy • Better customer service • Real-time data
Tags : 
cash automation, smart safe, cash loss, cash handling, automated cash handling, cash management, cash reconciliation, manual cash reconciliation, automated cash reconciliation, automated vault, cash counting, cash automation system, cash deposits, cash recycler, cash dispensers, cash drawer, point of sale
    
Fiserv
Published By: Carbon Black     Published Date: Apr 10, 2018
A dversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to “go on the hunt.” Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able t
Tags : 
    
Carbon Black
Published By: Alert Logic     Published Date: May 23, 2019
This security overview provides best practices to help organizations looking to harden their environment. Designed to help small- to mid-sized organizations stop an attack before one starts, this basic guidance will help reduce your attack surface and outlines practical steps to securing your enterprise. With this checklist, you will have a guide to help prevent initial compromise and stop attacks before they start. This checklist helps to explain how to: • Address software vulnerabilities and misconfigurations • Eliminate exposed ports & services • Reduce the chance of attacks delivered via email • Limit browser-based attacks • Reduce the attack surface across Microsoft Office applications Lastly, we will share details on how Alert Logic helps organizations of all sizes get a comprehensive view of their enterprise assets, find misconfigurations and vulnerabilities, and delivers endpoint coverage with an automated quarantine response to stop malware in its tracks.
Tags : 
    
Alert Logic
Published By: Alert Logic     Published Date: May 23, 2019
In our first cyber security checklist, we provided a security overview and best practices to help organizations prevent an initial compromise from occurring. In this guide, we will help you understand practical steps you can take to mitigate techniques attackers use once they have penetrated your defenses. Once attackers have access to a machine, they can evade detection by using fileless techniques and legitimate system administration tools to do their dirty work. With this checklist, you will have a guide to help mitigate the impact of an attacker. Lastly, we will hep you understand how partnering with a company like Alert Logic can provide better defenses to stop attackers in their tracks. This checklist helps to explain how to: • How to manage and limit PowerShell access • Securing and utilizing Windows Management Instrumentation (WMI) • Ways to apply application controls • Following the principle of least privilege and applying access controls • What to monitor for to help uncover
Tags : 
    
Alert Logic
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14     Next   End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.