Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

strengthen

Results 126 - 150 of 184Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Feb 11, 2015
Strengthen application protection—from design to deployment—to proactively address cloud security risks.
Tags : 
cloud environment, web application, cloud-based security, ibm, ibm security, security, it management
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
Managing user identities and user-access privileges is a cornerstone of effective security for organizations. It is vitally important to verify that only the right people can access protected resources and that their activities are sufficiently monitored. However, in order to effectively compete and meet customer expectations, organizations are increasing the number of users—including customers, employees, citizens, partners and suppliers—who are allowed to access information across the web, the cloud and federated environments. This trend makes identity and access management even more challenging and exposes organizations to many potential risks.
Tags : 
user identities, ibm, user access privileges, customer satisfaction, information access, cloud, security risks, networking, security, it management
    
IBM
Published By: IBM     Published Date: Oct 06, 2015
Discover how to use behavior-based protection strategies to help disrupt mutating threats in real time, looking at how integrated, intelligent solutions from IBM can detect and help prevent attacks - from the network perimeter to remote endpoints.
Tags : 
behavior based protection, behavior based protection strategy, ibm, data protection, network protection, ibm solutions, security, network management, network security
    
IBM
Published By: PermissionTV     Published Date: May 07, 2009
B2B Marketers can use online video to enhance the two-way dialogue with customers and prospects and strengthen the social relationship with online communities. Watch this free recorded webinar where experts from both online video and social media industries discuss ways to get started, capture ROI, and engage with online B2B audiences.
Tags : 
content personalization, emerging marketing, lead generation, rich media, social networking, b2b, roi, return on investment, webinar, video, vod, online video
    
PermissionTV
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
A white paper details how to apply authentication methods that strengthen security while delivering an excellent user experience.
Tags : 
trusted authentication, authentication methods, security, ibm
    
Group M_IBM Q1'18
Published By: Microsoft Dynamics     Published Date: Jul 11, 2007
In this white paper we do not make specific recommendations for manufacturers to follow; rather, we present suggestions for competing effectively in a fast-paced industry. From adopting lean manufacturing practices to strengthening bidding and quoting processes, opportunities exist for companies to grow and thrive despite relentless cost pressures.
Tags : 
manufacturing, manufacturer, scm, supply chain, supply chain management, lean methods, lean manufacturing, lean, industrial, competitive, competitive analysis, productivity, microsoft, microsoft dynamics
    
Microsoft Dynamics
Published By: Esker     Published Date: Jun 29, 2017
When folks in AR hear the word automation, it doesn't necessarily bring to mind the most positive, reassuring thoughts. Change is never a seamless process but distinguishing fact from fiction can go a long way. Every AR department has the same goals - reduce operating costs, collect payments faster and strengthen their relationships with customers - AR automation is simply a tool to help accomplish them. Learn why AR automation shouldn't be scary and why it matters more than ever in this insightful white paper.
Tags : 
accounts receivable management, invoice management, collections management, ar best practices, invoice portal, invoice delivery
    
Esker
Published By: Esker     Published Date: Jun 29, 2017
With little to no oversight into billing and collections‚ it can be hard to evaluate and improve the performance of accounts receivable (AR) processes — but not anymore. AR Automation solutions provide access to critical analytics that go beyond DSO to transform your AR department into a more strategic‚ value-added operation. Read our new AR Analytics Playbook to discover the six essential metrics that can bring big gains in efficiencies‚ such as: • Faster customer payments • Reduced administrative costs • Enhanced collections efficiencies • Improved customer retention The competition isn’t getting any weaker. Start strengthening your business with an AR automation solution today!
Tags : 
accounts receivable management, invoice management, collections management, ar best practices, invoice portal, invoice delivery
    
Esker
Published By: IBM     Published Date: Oct 10, 2013
Like many financial institutions today, the full-service Swedish bank featured in this case study has responded to changing customer needs, evolving from its original founding more than 100 years ago. As a result, the bank has realized remarkable success. Of course, along with that success have come significant challenges. New business growth, plus the rise in Internet and mobile banking, intensified the bank’s need for continuous availability of its IT infrastructure. IBM Resiliency Consulting Services helped the bank strengthen and streamline its environment. In the case study, you can read how teaming with IBM helped the bank meet recovery point and recovery time objectives; mitigate risk; and provide the flexibility to meet business demands without added IT expense.
Tags : 
ibm, resiliency consulting, ibm, full-service swedish bank, hyperswap, optimizing risk management, risk management, bank optimization, management capabilities, swedish banks, resiliency consulting, consulting solution, infrastructure, network management, network performance management
    
IBM
Published By: IBM     Published Date: Oct 17, 2013
Business needs, market trends, and customer demands are forcing IT teams to deploy applications at a rapid rate. The frequency of the deployments can invoke human errors, failed deployments, and outages. This paper will guide you through seven best practices that will strengthen the way applications are released to production.
Tags : 
ibm, release management, release process, application, development, production, release management practices, deployment process, agile solutions, source of truth, automation, application dependencies, visibility, release lifecycle, dev, devops
    
IBM
Published By: IBM     Published Date: Feb 14, 2014
Transforming the way enterprises work to better capitalize on our most valuable resource: people. As one of the world’s leading social businesses, IBM empowers more than 430,000 employees around the globe to know more, do more and deliver more value where and when it matters most. And by extending social capabilities outside the organization, IBM has been able to empower and strengthen connections with clients, IBM Business Partners, suppliers and other stakeholders to tap new opportunities for growth while building brand value.
Tags : 
ibm, social business, marketing social media, innovation, collaboration, social workforce, client relations, analytics
    
IBM
Published By: Cisco     Published Date: Jun 02, 2015
This study focuses on Cisco's enterprise datacenter strategy and portfolio including UCS and Nexus technologies.
Tags : 
cisco, data center, switches, optimization, scalability, storage, applications, enterprise support, network architecture
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Self-service analytics implies that users design and develop their own reports and do their own data  analysis with minimal support by IT. Most recently, due to the availability of tools, such as those from Qlik,  Spotfire, and Tableau, self-service analytics has become immensely popular. Besides powerful analytical  and visualization capabilities, they all support functionality for accessing and integrating data sources.  With respect to this aspect of data integration four phases can be identified in the relatively short history  of self-service analytics. This whitepaper describes these four phases in detail and shows how the tools  Cisco Data Preparation (CDP) and Cisco Information Server (CIS) for data virtualization can strengthen and  enrich the self-service data integration capabilities of tools for reporting and analytics.  
Tags : 
    
Cisco
Published By: Northeastern University     Published Date: Oct 01, 2015
Looking for a career change or considering the ways to maximize your career? Building your your LinkedIn profile to highlight your strengths, education and experience can help you establish your personal brand and market yourself to catch the attention of potential employers and recruiters. Browse this helpful guide, brought to you by Northeastern University, to learn about best practices for producing an attention-grabbing LinkedIn profile, while also exploring other LinkedIn tools and features to extend your network. Experience Northeastern.
Tags : 
grad school, northeastern university, graduate studies, masters, mba, career growth, career change
    
Northeastern University
Published By: CrowdTwist     Published Date: Jun 06, 2016
Loyalty is in the midst of positive momentum. Brands are increasingly realizing the value loyalty programs offer to boost their bottom line and strengthen customer relationships. While many are successful, there is still work to be done to achieve sophistication. This report provides a deep dive look into the loyalty landscape, the role of multichannel loyalty programs in driving success, and a glimpse at what the future holds for the industry.
Tags : 
crowdtwist, multichannel loyalty pograms, customer relationships, loyalty programs
    
CrowdTwist
Published By: CrowdTwist     Published Date: Sep 07, 2016
Learn how adding engagement-based drivers to an existing loyalty program can help brands strengthen customer relationships and boost sales.
Tags : 
crowdtwist, engagement, customer engagement, loyalty, customer loyalty, incremental sales, sales, marketing
    
CrowdTwist
Published By: Cisco     Published Date: Feb 16, 2016
Over the years we’ve all heard claims of simple, seemingly magical solutions to solve security problems, including the use of sandboxing technology alone to fight advanced malware and targeted threats.
Tags : 
technology, security, security management, malware analysis, network management
    
Cisco
    
Dotmailer
Published By: IBM     Published Date: Jul 09, 2014
Research shows that today’s business goals are centered on reducing costs, strengthening customer relationships and improving financial management. The biggest challenges to achieving these goals are lack of skills and investment funds, and inadequate linkages between the IT environment and how business processes are managed. Read this analyst report to see why enterprises are turning to managed services to help overcome these challenges so that they can optimize the value of their IT investments and achieve their corporate objectives.
Tags : 
ibm, managed services, it investments, data center, it infrastructure, managed services provider
    
IBM
Published By: IBM     Published Date: Oct 14, 2014
Security breaches can cost millions of dollars—but these days they’re virtually inevitable. Every organization needs a formal, documented Computer Security Incident Response Plan (CSIRP) and it needs to be kept up-to-date. In this executive brief, IBM shares the ten most common shortcomings of CSIPRs and how you can avoid these potentially costly mistakes. Read the executive brief to learn how IBM can help protect your organization from cyber threats and strengthen your IT security.
Tags : 
it security breach, csirp, cyber threats, security, it management
    
IBM
Published By: IBM     Published Date: Oct 14, 2014
Enterprises of all sizes must defend against online attackers. While security threats continue to evolve, organizations often lack the personnel and financial resources required to protect online systems. Read this service profile to learn how IBM Managed Security Services can help you protect your security investment while reducing the cost and complexity of your security operations. Find out how IBM combines industry-leading tools, technology and expertise with flexible, scalable packaging to meet a broad range of security solution requirements.
Tags : 
security operations, deployment, service delivery, problem management, security, it management
    
IBM
Published By: Citrix     Published Date: Oct 15, 2013
Explore ten reasons why virtual desktops should be the foundation of your layered approach to information security.
Tags : 
citrix, byod, secure data, mobile workers, mobile security, desktop virtualization, security, risk, network security
    
Citrix
Published By: Cisco     Published Date: Aug 18, 2014
IT can be one of the biggest concerns for businesses today. Security, compliance, enablement, cost control and scalability must all be considered. Additionally, with insurgent trends such as mobility changing the face of business, choosing a partner who is able to consultatively deliver multiple services and solutions is increasingly important. We have now strengthened the scope of our Unified Computing System by expanding our data centre management capabilities. Fill in your details to the right to download your free white paper and learn how we have become the key supplier of converged technology and services in this space.
Tags : 
ucs, scope, cisco, security, compliance, servers, data, innovative, data center, architecture, performance, processors, blade, equipment
    
Cisco
Published By: Cisco     Published Date: Sep 12, 2014
Every day, the threat landscape changes, and it can be hard to keep up. To help you strengthen your network security, Cisco has compiled the top 10 considerations that midsize companies should keep in mind when buying a next-generation firewall. Complete the form to download the white paper "Selecting a Next-Generation Firewall: Top 10 Considerations." You will learn about: Deep visibility into applications Requirements for proactive threat protection Services that can improve your migration plan and ongoing support management Read White Paper
Tags : 
firewall, buying, next-generation, companies, midsize, strengthen, network, security, visibility, management, support, migration, services, applications, improve, proactive, protection
    
Cisco
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.