Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

ssm

Results 276 - 300 of 555Sort Results By: Published Date | Title | Company Name
Published By: HP and Intel® Xeon® processors     Published Date: Dec 19, 2012
Learn more how HP ProLiant Gen8 e-Series servers are simple, reliable, affordable solutions that let a growing business boost performance as well as productivity.
Tags : 
hp proliant, gen8, smb, impact assessment, proliant servers, data center
    
HP and Intel® Xeon® processors
Published By: Jive Software     Published Date: Feb 24, 2014
With its in-depth guidance and independent third-party vendor evaluations, Gartner's Magic Quadrant market assessment can assist your organization in implementing an effective social business software solution.
Tags : 
jive, human resources, social software, social media, workforce, workforce magagement, social business, social business software, software solution, third party vendor, software development
    
Jive Software
Published By: BMC Software     Published Date: Jan 31, 2014
Today’s mature cloud-based ITSM solutions can give you the flexibility and agility you need—without sacrificing security, stability or performance. In this THINKstrategies, Inc. white paper, you’ll learn why businesses are moving to cloud-based ITSM and the advantages they’ve achieved. Explore how this innovative approach to IT management might be right for your organization. Please download the whitepaper to learn more.
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications, internal customers, gartner, itssm, saas, itrpm, it service support management tools, cloud-based, thinkstrategies, it management, enterprise applications, cloud computing, content management
    
BMC Software
Published By: BMC Software     Published Date: Jan 31, 2014
Consumerization of IT forces enterprises to rethink their approach to IT service delivery. What does consumerization really mean and why does it matter? Understand the basics to accurately identify the practical implications and benefits for your organization. This guide explores the realities of IT Consumerization to define challenges and opportunities. Learn best practices and get actionable recommendations. Please download the whitepaper to learn more.
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications, internal customers, gartner, itssm, saas, itrpm, it service support management tools, cloud-based, customer experience, consumerization, it management, enterprise applications, network management
    
BMC Software
Published By: BMC Software     Published Date: Jan 31, 2014
“Exploring Business and IT Friction: Myths and Realities,” outlines key issues that cause friction between business users and IT, such as: • Gaps in customer satisfaction and the perceived value of services • Inadequate IT support, which decreases productivity and revenue • Lack of communication and ownership in how business users and IT work together to identify service levels and technology needs See what 900 business and IT professionals had to say and get recommendations for change.
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications, internal customers, gartner, itssm, saas, itrpm, it service support management tools, cloud-based, customer experience, consumerization, it management, enterprise applications, network management
    
BMC Software
Published By: BMC Software     Published Date: Feb 03, 2014
Analysts predict that soon, half of all new IT service desk tools will be adopted as cloud-based services. While shifting to an on-demand model can be a complex decision, requiring organizations to assess carefully the potential impact on their business operations, a growing number of companies are clearly finding the move worthwhile. This paper explores the reasons for the rapid growth of cloud-based IT service management (ITSM) solutions and the benefits they offer for enterprises. Topics include: • The cost savings companies can achieve by deploying ITSM solutions via the cloud, which allows better management and optimization of consumption and costs. • Improved alignment between IT to and business, as self-service, a service catalog, collaboration, and mobility help IT expose and provide its services more effectively. • The ability to integrate cloud and on-premise solutions to leverage existing systems while leveraging new innovations via the cloud. • The advantages of cloud
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications, internal customers, gartner, itssm, saas, itrpm, it service support management tools, networking, it management, enterprise applications
    
BMC Software
Published By: Rsam     Published Date: Apr 28, 2016
Enterprises are intensely focused on Vendor Risk today and with good reason.
Tags : 
rsam, vendor risk management, enterprise, risk assessment, security
    
Rsam
Published By: Rsam     Published Date: Apr 28, 2016
Join Rsam and Tom Garrubba, the Senior Director of Shared Assessments, as they discuss how to develop a game plan for vendor risk that aligns with OCC 2013-29.
Tags : 
rsam, occ, vendor risk, risk management, networking
    
Rsam
Published By: Staples     Published Date: Jun 23, 2017
Want to save time and money? Just ask a facilities expert. See what a site assessment can do for your facility.
Tags : 
save time, save money, benefits, facility assessment, efficiency, productivity
    
Staples
Published By: IBM     Published Date: Oct 13, 2017
Analytics is game-changing and can produce valuable insights from the ever-growing volume, velocity and variety of data. Business Intelligence (BI) provides the foundation for many types of Analytics. It enables companies to deliver exceptional customer experience, enhance marketing effectiveness, increase operational efficiencies, reduce financial risks, improve product quality and reliability, and so on. But businesses are also challenged to generate timecritical actionable insights and make a compelling financial business case for BI investments.
Tags : 
ibm, cognos analytics, business intelligence, customer experience, marketing
    
IBM
Published By: Frontier Communications     Published Date: Jul 18, 2017
What type of IT-PRO-INNER-GEEK are you? Take this quiz to find out.
Tags : 
    
Frontier Communications
Published By: Tenable     Published Date: Sep 14, 2018
"Insights and ideas to help you evaluate vendors and improve your security program. Organizations seeking to evaluate vulnerability assessment solutions turn to the “Gartner Market Guide for Vulnerability Assessment” for expert help in navigating the market. Tenable is pleased to provide a complimentary copy of the report. According to Gartner, “the vulnerability assessment (VA) market is mature, but is being challenged by the need to cover changing device demographics and emerging technologies and better represent true risk.” Gartner addresses these considerations and others in the 2018 Market Guide for Vulnerability Assessment, providing insights that will help you evaluate vendors and improve your security program. Topics covered: The scope of the market for vulnerability assessment solutions, common use cases and challenges Recommendations for identifying requirements and vendor selection criteria Changing device demographics and other trends impacting the market and effective v
Tags : 
    
Tenable
Published By: Trend Micro SPN     Published Date: May 15, 2009
Measuring the effectiveness of your security infrastructure is key to any enterprise as threats change on a minute by minute basis. See an example of the report you would receive following a Trend Micro Threat Discovery Assessment.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security, threat discovery assessment, secure, threat discovery, worms, trojans, infected, recovering, instant messaging
    
Trend Micro SPN
Published By: Trend Micro SPN     Published Date: Nov 24, 2009
How do you measure security effectiveness? Conventional security solutions may appear to be holding back targeted malware attacks but this eBook shows you how to check the performance of your current infrastructure. Whether you are 'secure', 'infected' or 'recovering', you can benefit from a Threat Discovery Assessment.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security, threat discovery assessment, secure, infected, recovering, instant messaging
    
Trend Micro SPN
Published By: Trillium Software     Published Date: May 19, 2011
Insurers must combine information from disparate systems, applications, and business units to create an enterprise view of risk. By developing a process to incorporate geocodes into location intelligence, insurers can build a more accurate assessment of risk.
Tags : 
trillium software, underwriting risk, insurers, location intelligence, geocodes, risk management, granularity, risk models, cat, centroid, collective catastrophe, multilingual data, risk exposure
    
Trillium Software
Published By: Mainline Information Systems     Published Date: Oct 20, 2009
This white paper will discuss the steps necessary to building a resilient business.
Tags : 
business continuity, mainline information systems, downtime, data loss, risk assessment, bcd, data protection, backup, platform protection, archiving
    
Mainline Information Systems
Published By: Mainline Information Systems     Published Date: Oct 27, 2009
This webcast will describe the new features of TSM 6.1 and will recommend strategies for assessing your current environment, upgrading to 6.1 and how to maximize the monitoring benefits. We will include lessons learned and advice for avoiding pitfalls.
Tags : 
ibm, tivoli, storage manager, tsm, data management, assessment, remote administration, conversion, remote access, remote network management
    
Mainline Information Systems
Published By: Webroot UK     Published Date: Sep 05, 2013
PassMark Software® conducted objective performance testing on eight (8) security software products, on Windows 7 Ultimate Edition (64-bit) during January 2013. This report presents our results and findings as a result of performance benchmark testing conducted for these endpoint security products. The aim of this benchmark was to compare the performance impact of Webroot’s SecureAnywhere Business Endpoint Protection product with seven (7) competitor products. Read this report to learn how Webroot performed against competitors in all 13 performance metrics.
Tags : 
secure anywhere, business endpoint protection, passmark software, competitor software, benchmark performance, performance metrics, endpoint security, security
    
Webroot UK
Published By: Acquia     Published Date: Sep 14, 2011
With Drupal, it is easy to produce engaging, content rich websites, incorporate both structured and unstructured data sources, and blend published information with user-generated content.
Tags : 
acquia, technology, drupal, assmebled web, content rich websites, user-generated content, data sources
    
Acquia
Published By: EdgeWave     Published Date: Oct 15, 2011
Today's uncertain economic climate demands that you do a thorough assessment before you invest. Here's a concise list of steps that will help you achieve the best return on your Web filtering dollar.
Tags : 
edgewave, web filter for enterprise, web security, email security, messaging security, web filtering, evaluating, evaluation, filtering, filter, demands, short-term, long term security
    
EdgeWave
Published By: IBM     Published Date: Dec 30, 2008
Is your current data warehouse meeting the needs of your business? Take this self-assessment quiz to understand how optimized, simple and flexible your solution is today and learn what next steps are recommended to establish a warehouse solution that can easily grow with your demands and bring greater business value.
Tags : 
ibm, data warehouse, warehouse assessment tool, warehouse solution
    
IBM
Published By: IBM     Published Date: Jun 16, 2009
Establish and Maintain Secure Cardholder Data with IBM Payment Card Industry Solutions.
Tags : 
pci dss, ibm, mmdg, payment card industry, assessment, design, deployment, management, report on compliance, roc, vulnerabilities, threat, solutions, compliance, secure, cardholder, encryption, hospitality, retail, transportation
    
IBM
Published By: IBM     Published Date: Oct 09, 2009
Tune into this Web Seminar to hear BPM industry analysts, Dr. Bruce Silver and Amy Lipton share how dynamic BPM powered by the IBM Smart SOATM approach can help you react quickly and drive ROI. After the seminar you'll receive a complimentary IBM BPM assessment for a targeted analysis of your current situation.
Tags : 
smart soatm, ibm, service oriented architecture, soa, bpm assessment, business process management
    
IBM
Published By: IBM     Published Date: Oct 28, 2009
The five-minute Maintenance & Technology Service Self-Assessment from IBM can help you start addressing the shortfalls in your hardware, software and managed support areas. You'll learn how to create plans for potential issues, plus identify next steps to improve your support.
Tags : 
infrastructure, ibm, vendor management, vendor assessment, maintenance, technical support
    
IBM
Published By: IBM     Published Date: Nov 20, 2009
The Payment Card Industry Data Security Standard (PCI DSS) is a global security program created to increase confidence in the payment card industry and reduce risks to PCI members, merchants, service providers and consumers. It was developed by the major credit card companies as a guideline to help organizations that process card payments prevent credit card fraud.
Tags : 
ibm, pci requirements, pci dss, credit card fraud, ibm iss certified assessments, ips, ibm public key infrastructure for z/os, ibm tivoli provisioning manager, encryption management
    
IBM
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.