Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

management practices

Results 1 - 25 of 556Sort Results By: Published Date | Title | Company Name
Published By: 8x8 Inc.     Published Date: Aug 15, 2017
Agent attrition in contact centers is on the rise. One reason for this is the lack of adequate coaching. Coaching drives higher agent engagement and motivation to outperform, however requires that supervisors develop a comprehensive quality management program. This paper offers best practices on how to develop a world-class quality management program.
Tags : 
8x8, quality management, contact center, customer experience, employee productivity
    
8x8 Inc.
Published By: A10 Networks     Published Date: Aug 21, 2009
This white paper highlights the complex nature of traditional authentication and identity management practices and shows how A10 Networks unified identity and access management solutions simplify the convergence of network, security, and identity resources for proper deployment.
Tags : 
identity management, authentication, access control, anti spam, anti spyware, anti virus, a10, a10 networks
    
A10 Networks
Published By: Aberdeen Group     Published Date: Aug 16, 2011
The purpose of this report is to provide guidance on how best to streamline sales and use tax management.
Tags : 
aberdeen, minimizing audit exposure, pace model, tax management practices, best practices
    
Aberdeen Group
Published By: Adaptive Planning     Published Date: Sep 16, 2013
Learn how Corporate Performance Management (CPM) has evolved in the past few years and how it has significantly changed the Return on Investment associated with CPM solutions. Furthermore, see what the leaders in the CPM market are doing and how they are achieving their success.
Tags : 
corporate performance management, roi, technology, best practices, solution, value matrix
    
Adaptive Planning
Published By: Adobe     Published Date: Sep 08, 2011
Regardless of the size of your organization or the depth of your CEM needs, Adobe can help you achieve your CEM goals with the industry's most comprehensive and versatile design tools and runtime support for realizing state-of-the-art CEM solutions. Download this white paper to learn more.
Tags : 
adobe, cem, customer experience management, best practices, customer interactions, enterprise applications, cloud compatibility, rias
    
Adobe
Published By: Adobe     Published Date: Sep 08, 2011
Review the new architecture based on OSGI, JCR and Sling which can run directly in a Java virtual machine.
Tags : 
adobe, cem, customer experience management, best practices, customer interactions, enterprise applications, cloud compatibility, rias
    
Adobe
Published By: Adobe     Published Date: Sep 08, 2011
Discover how to build mobile apps and learn more about minimizing development time and the re-use of components across device platforms.
Tags : 
adobe, cem, customer experience management, best practices, customer interactions, enterprise applications, cloud compatibility, rias
    
Adobe
Published By: Adobe     Published Date: Dec 08, 2014
When it comes to digital asset management (DAM) projects and rich media, marketers and IT professionals struggle to find the best ways to store, share, and deliver assets across devices. The Gartner Three Best Practices for Digital Asset Management Projects report identifies the key DAM challenges facing organizations and provides recommended strategies and best practices.
Tags : 
asset management, dam, rich media, metadata issues
    
Adobe
Published By: Adobe     Published Date: Sep 13, 2016
Streamline all your paperwork and processes by going 100% digital in HR. When everything is synced and organized, your team has more time to focus on strategies to attract and keep the best talent. Read Forbes Insights paper, How Digital Transformation Elevates Human Capital Management: Turning Talent into a Strategic Business Force to learn: - About the technology involved in digital HR - Best practices when going through digital transformation - How going digital elevates the role of HR in your company
Tags : 
adobe, cloud, document cloud, digital transformation, human capital, human capital management, human resources
    
Adobe
Published By: Adobe     Published Date: Sep 23, 2019
Customer experience is the new management battleground. You know it better than anyone. Most customer experience best practices center on the value businesses need to bring to customers. But what role do customer needs play in creating an enterprise plan of attack? Get the full scoop. Plus, learn how experience managers at companies like Guitar Center, Nestle, and PETCO keep their brands thriving and competitive. Read CMO Club Solution Guide: Customer Experience Essentials.
Tags : 
    
Adobe
Published By: Akamai Technologies     Published Date: Mar 15, 2016
HIMSS Analytics, in partnership with Akamai, recently conducted a survey of U.S. hospitals to understand the current state of web security in healthcare as well as what plans are in place to improve preparedness. The results raise some concerns that despite greater consciousness of the increased risk to healthcare data security, many hospitals are still vulnerable to a wide range of cyberattacks. Read this survey to learn about critical weaknesses in hospital web security.
Tags : 
web security, healthcare, network management, security, cyberattack prevention, best practices, network architecture, network performance
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 15, 2016
The globalization of the medical device industry has delivered substantial business benefits, but it has also presented certain problems that can make the realization of those opportunities challenging. Learn about a comprehensive global collaboration solution that addresses and overcomes these obstacles.
Tags : 
medical device industry, global network, employee management, best practices, internet performance, internet security, network performance management, network provisioning
    
Akamai Technologies
Published By: Alert Logic     Published Date: Jun 12, 2014
Log management is an organizational requirement that extends beyond simple data collection. Today’s compliance regulations demand the ability to collect, analyze and report on all data collected. This whitepaper discusses key best practices to consider when evaluating automated log management solutions.
Tags : 
log management, log collection, log solutions, log storage, security logs, it management, enterprise applications
    
Alert Logic
Published By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
To comply with today’s government and industry mandates, such as PCI, Sarbanes-Oxley, HIPAA and GLBA, log data must be collected, regularly reviewed and archived. In addition, regular analysis and forensics can also be performed on the same log data to enhance overall security and availability. This paper discusses the challenges associated with effective log management and enables you to better define best practices and requirements for log management projects, as well as log management and review solutions.
Tags : 
alert logic, rackspace, log management, automated log management, pci, hipaa, glba, log data
    
Alert Logic and Rackspace
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
To comply with today’s government and industry mandates, such as PCI, Sarbanes-Oxley, HIPAA and GLBA, log data must be collected, regularly reviewed and archived. In addition, regular analysis and forensics can also be performed on the same log data to enhance overall security and availability. This paper discusses the challenges associated with effective log management and enables you to better define best practices and requirements for log management projects, as well as log management and review solutions.
Tags : 
alert logic, sungard, log management, automated log management, pci, hipaa, glba, log data
    
Alert Logic and Sungard Availability Services
Published By: AlienVault     Published Date: Oct 21, 2014
When dealing with ransomware threats like CryptoWall, which encrypt your data and demand payment to unlock it, spotting infections quickly is critical in order to limit the damage. AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the command and control server. Watch this demo on-demand to see how AlienVault USM detects these threats quickly, saving you valuable clean-up time and limiting the damage from the attack.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. These can be very difficult to detect since they happen as users are going about their normal business. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM. You'll learn: • Common browser vulnerabilities used to execute these attacks • What attackers do next to take control of the system • How to catch it before the attacker moves further into your network
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
Have you ever wondered how the bad guys actually get control of a system? And, how they convert that system into a data-syphoning droid? Join AlienVault security engineer, Tom D'Aquino as he walks you through the steps of a system compromise and how detect these nefarious activities at every stage. You'll learn: • How attackers exploit vulnerabilities to take control of systems • What they do next to find & exfiltrate valuable data • How to catch them before the damage is done with AlienVault USM Using a real-world example of a common vulnerability, Tom will show you how AlienVault USM gives you the evidence you need to stop an attack in its tracks.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
In this webinar, we'll cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment so you can: • Detect threats (known and emerging) • Identify vulnerabilities • Accelerate incident response • Identify policy violations • Simplify compliance management Join AlienVault to learn tricks for achieving unified security visibility in the shortest amount of time.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. Join compliance experts from Terra Verde Services and AlienVault for this practical session on how to take the pain out of PCI DSS reporting. You'll learn: • The key reporting requirements of the PCI DSS standard • The security technologies you need to collect the required data • How AlienVault USM can generate these reports in minutes, not days • How to use your audit reports to improve security on an on-going basis
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
As cyber attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. Event monitoring and correlation technologies and security operations are often tied to incident handling responsibilities, but the number of attack variations is staggering, and many organizations are struggling to develop incident detection and response processes that work for different situations. In this webcast, we'll outline the most common types of events and indicators of compromise (IOCs) that naturally feed intelligent correlation rules, and walk through a number of different incident types based on these. We'll also outline the differences in response strategies that make the most sense depending on what types of incidents may be occurring. By building a smarter incident response playbook, you'll be better equipped to detect and respond more effectively in a number of scenarios.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are an essential part of understanding your risk profile, it's simply not realistic to expect to eliminate all vulnerabilities from your environment. So, when your scan produces a long list of vulnerabilities, how do you prioritize which ones to remediate first? By data criticality? CVSS score? Asset value? Patch availability? Without understanding the context of the vulnerable systems on your network, you may waste time checking things off the list without really improving security. Join AlienVault for this session to learn: • The pros & cons of different types of vulnerability scans - passive, active, authenticated, unauthenticated • Vulnerability scores and how to interpret them • Best practices for prioritizing vulnerability remediation • How threat intelligence can help you pinpoint the vulnerabilities that matter most
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: Allscripts     Published Date: Oct 14, 2015
Download this white paper to learn how small practices can earn Chronic Care Management revenue while providing the complex patient better care, the clinician knowing that they are providing higher quality care, and CMS reducing its overall costs and rewarding the practice financially.
Tags : 
chronic care management, small practices, complex patients, clinicians, high quality care, cms, healthcare spending
    
Allscripts
Published By: Alteryx, Inc.     Published Date: Sep 06, 2017
Organizations that want to apply consistent data management, governance and security practices across their organization can learn a lot from Ford Motor Company. Data-driven decision making led Ford Motor Company to perfect the vehicle assembly line in 1913. A century later, Ford had more than 4,600 data sources, and a wide range of analytical tools, methods, and processes in use throughout the company, and needed a more strategic approach to decision-making.
Tags : 
    
Alteryx, Inc.
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.