Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

ssm

Results 151 - 175 of 555Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Feb 01, 2017
Self assessment whitepaper allows retailers to determine where they are on the path to omnichannel.
Tags : 
ibm, omnichannel, commerce, b2c, b2c ecommerce, enterprise applications
    
IBM
Published By: Oracle     Published Date: Mar 01, 2019
Are you Cloud-Confident? Take five minutes and find out how you compare with your peers. Recent research conducted by Longitude looked at how companies are using cloud, and where it is delivering the greatest benefits. We've benchmarked some of the results in this short assessment tool. Are you ahead of the curve, or do you need to catch up?
Tags : 
    
Oracle
Published By: Group M_IBM Q1'18     Published Date: Feb 15, 2018
See how you can turn data into actionable insights with predictive analytics. Take our brief assessment to learn which analytical capabilities will enable you to find the greatest value in your data and make confident, accurate business decisions.
Tags : 
analytics assessment, business decisions, predictive analytics, analytics
    
Group M_IBM Q1'18
Published By: IBM     Published Date: May 22, 2018
An overview of testing in talent acquisition and four specific guidelines for assessment practitioners evaluating new selection methods.
Tags : 
human resources, talent management
    
IBM
Published By: VMware Citrix     Published Date: Jan 23, 2018
This IDC MarketScape includes vendors that create and sell software in the client virtualization space, with a focus on centralized virtual desktops, distributed virtual desktops, and virtual user session (VUS) software. Vendors that only offer user state virtualization and/or software products that support virtual client computing deployments but not one of the aforementioned products will not be included in the IDC MarketScape graphic or profiles. This is because these types of solutions address a specific or niche need in the market but do not, by themselves, provide a complete software solution that an end customer can purchase on a standalone basis or in addition to a Microsoft Server version.
Tags : 
idc, marketscape, vendors, software, desktops, vus, virtual user session, vmware
    
VMware Citrix
Published By: NAVEX Global     Published Date: May 13, 2014
A four step third party risk assessment provides understanding on where to focus energy and develop a plan.
Tags : 
third party risk, compliance, risk management
    
NAVEX Global
Published By: Active Power     Published Date: Aug 30, 2011
This paper provides an analysis of the reliability of Active Power's flywheel-based UPS system vs. a battery-based double-conversion UPS system.
Tags : 
flywheel, ups, double conversion, batteries, ups, reliability, backup power, backup power supply, battery backup, flywheel ups, green backup power, green power, uninterruptible power supply, critical power systems, ups backup power, ups power supply, data center
    
Active Power
Published By: Qualys     Published Date: Jun 02, 2015
In this guide, Qualys describes internal risks to IT security and three best practices to control incorrect configurations. Critical components to this include automation of assessments and prioritization of risks. By using the automation technology in Qualys Policy Compliance, organizations can ensure the safety of sensitive data and IT while meeting mandates for compliance.
Tags : 
security gap, automated configuration assessment, it security, compliance, security
    
Qualys
Published By: MessageLabs     Published Date: Aug 29, 2008
Unmanaged employee use of email and the web can subject any organization to costly risks including litigation, regulatory investigations and public embarrassment.  Download this guide and learn how to deploy clearly written Acceptable Usage Policies (AUPs) for email and web usage, supported by employee training and enforced by proven technology solutions.
Tags : 
messagelabs, compliance, email policies, policy, enforce policy
    
MessageLabs
Published By: BMC ESM     Published Date: Nov 05, 2009
Realizing its existing processes and tools were inadequate, labor intensive and error-prone, Morgan Stanley began looking for a new application deployment solution in early 2007. While not required in the initial assessment, Morgan Stanley also hoped to find a tool that would also provide capabilities such as hardware and operating system provisioning.
Tags : 
bmc esm, deployment, morgan stanley, hardware, operating system, management, application automation, operations manager, bladelogic, deploy application, application release manager, server hardware
    
BMC ESM
Published By: Ariba     Published Date: Dec 02, 2010
This assessment tool will compare your performance with that of over 400 procurement professionals surveyed during August and September.
Tags : 
ariba, cpo, free assesment tool, procurement, collaborative business commerce, saas
    
Ariba
Published By: Real Asset Management Inc.     Published Date: Jun 24, 2011
This informative guide highlights valid reasons for considering a fixed asset solution and offers advice and useful tips for each stage throughout the evaluation process.
Tags : 
fixed asset management solution, ram, evaluation guide, risk analysis assessment, planning, erp, ledger, spreadsheets, legacy system
    
Real Asset Management Inc.
Published By: Workday     Published Date: May 09, 2018
ERP Must-Haves for Finance: Leave behind cumbersome reporting, spreadsheets, and data that offers zero insights. IDC MarketScape has put together a guide to help you find the best finance and accounting applications. Read an excerpt of the report to learn today’s must-have ERP capabilities and why the IDC MarketScape positioned Workday in the Leaders category.
Tags : 
    
Workday
Published By: OpTier     Published Date: Sep 28, 2012
Ovum takes a representative group, across new to established leading vendors and provides a SWOT analysis of their solutions, and conducted a comprehensive features assessment with the results summarized in the Ovum APM Rainbow Map.
Tags : 
application performance management, apm, ovum, end-user experience monitoring, euem, apm solutions
    
OpTier
Published By: Symantec     Published Date: Oct 25, 2012
PassMark Software conducted objective performance testing on five publicly available Enterprise Endpoint Protection products. This report presents our results from these performance tests.
Tags : 
endpoint security, endpoint protection products, symantec, technology security, data security, security
    
Symantec
Published By: NAVEX Global     Published Date: Sep 05, 2013
The data from your ethics and compliance helpline should be benchmarked against comparable organizations to assess program health and make improvements such as implementing policies, training employees, and conducting investigations. Learn everything you need to know about benchmarking your helpline data in our toolkit.
Tags : 
incident, hotline, helpline, ethics, compliance, whistleblower, data, analysis, benchmark, report, risk, assessment, board, investigation, training, policy, case, management
    
NAVEX Global
Published By: NAVEX Global     Published Date: Sep 05, 2013
Explore four important facets of managing social media use by employees in your organization. Craft a best practice social media policy and navigate the legal landscape, train employees, address retaliation, and take a comprehensive approach. View examples of organizations that have successfully and creatively implemented social media guidelines.
Tags : 
social media policy, risk management, best practices, policy management, social media training, social media laws, national labor relations act, nlra, retaliation, harassment, mobile training, risk assessment, data, culture assessment, program assessment
    
NAVEX Global
Published By: AlienVault     Published Date: Oct 05, 2016
UW-Superior’s IT team was looking to replace their outdated intrusion prevention system. After a full evaluation of AlienVault’s Unified Security Management™ (USM) platform, they decided to leverage it to meet their IDS needs. As the team became familiar with using AlienVault USM as their intrusion detection system, they began to implement the other tools that make up the USM platform. They realized that because so many security features were already included in USM, like behavioral monitoring, SIEM and vulnerability assessment, they would not have to purchase additional security tools that they previously thought they would need.
Tags : 
    
AlienVault
Published By: Epicor     Published Date: Jun 06, 2018
Selecting a new manufacturing execution system (MES) can be difficult. With so many options in the marketplace, it can be overwhelming to sort out which one is the right fit for your business. In this report, we believe Gartner provides some clarity by naming a selection of vendors that specialize in creating MES solutions that support the unique capabilities of discrete industrial manufacturers and fit inside Gartner’s Magic Quadrant Perspective for MES. According to Gartner, recommended assessment criteria for technology and service selection are: • Relevant industry experience • Industry-specific functionality • Supplier collaboration • Financial viability • Evidence of innovation Download the report to learn more about why Epicor is named a notable vendor and why we believe you should consider Mattec MES for your manufacturing business.
Tags : 
    
Epicor
Published By: Mimecast     Published Date: Feb 13, 2017
Mimecast has seen firsthand that not all email security systems perform equally well. But, until now, we’ve lacked the comparative data to prove our perceptions. In order to address this head-on, Mimecast has launched the Email Security Risk Assessment (ESRA). The Mimecast ESRA has three goals: 1. To test the Mimecast cloud security service against an individual organization’s incumbent email security system. To help the organization understand the relative efficacy of the security systems and to see the number, type and severity of email-borne threats that are currently getting into the organization. 2. To inform the security industry with hard data on the effectiveness of various commonly-deployed email security systems. 3. To inform the security industry with hard data regarding the number, type and severity of email-borne threats that are being actively used in attacks. Download Now!
Tags : 
mimecast, email. esra, email security, cloud security
    
Mimecast
Published By: HotSchedules     Published Date: Mar 03, 2017
Lack of engagement. Loss of productivity. Poor attendance. That constant look of boredom. Toss the old-school training manual and take this free training assessment today.
Tags : 
lms, talent performance software
    
HotSchedules
Published By: Cisco Wireless     Published Date: Mar 06, 2017
Do you know how to get the best network provider? Download the IDC report to find the best vendor for WLAN Enterprise Learn the strengths and strategy of the top 12 Enterprise Wireless vendors Discover how Cisco ranks against top WLAN providers Understand what you need to bring mobility to your business network
Tags : 
    
Cisco Wireless
Published By: WorkBook from Deltek     Published Date: Apr 26, 2018
Digital transformation (DX) is fundamentally changing enterprise resource planning (ERP) — allowing businesses to transform their decision making, which is enhancing their business outcomes significantly as we enter the digital economy. Digital transformation is an enterprisewide, board-level strategic reality for companies wishing to remain relevant or maintain or enhance their leadership positon in the digital economy. Digitally transformed businesses have a repeatable set of practices and disciplines that are used to leverage new business, 3rd Platform technology, and operating models to disrupt businesses, customers, and markets in pursuit of business performance and growth. DX is driving businesses to rethink their technology strategy, and that includes moving beyond their legacy ERP and back-office systems.
Tags : 
global, saas, cloud, psa, erp, applications, vendor, assessment
    
WorkBook from Deltek
Published By: XpertHR     Published Date: Aug 02, 2018
When it comes to managing the risk of sexual harassment claims, today’s headlines and news stories make it abundantly clear that it’s not just what you’re doing today that may create risk—but what you’ve done, or haven’t done, in the past. XpertHR’s recent Sexual Harassment Survey revealed a wide range of responses from employers hoping to tackle the issue in 2018. New and vastly varying federal and state laws challenge HR professionals to remain on top of regulatory requirements related to policies, training and other compliance issues. XpertHR’s webinar, “Coming Soon: 50 States, 50 Sexual Harassment Training Laws,” will help you ensure you’re prepared, compliant and poised to act appropriately amid a growing number of regulations and continually emerging claims. Get tips from expert attorneys who will help you get up-to-date on: ? New training requirements for private sector employers in New York and varying requirements in other states ? Why high-quality harassment training i
Tags : 
sexual harassment, compliance training, #metoo, harassment training, harassment claim, compliance, harassment, employee management
    
XpertHR
Published By: Spectrum Enterprise     Published Date: May 15, 2017
Read this Forrester technology adoption profile to learn the mission-critical nature of and how to maintain an always-on business presence.
Tags : 
    
Spectrum Enterprise
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.