Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

practice

Results 1 - 25 of 3590Sort Results By: Published Date | Title | Company Name
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
The SecureWorks Security and Risk Consulting practice provides expertise and analysis to help you enhance your security posture, reduce your risk, facilitate compliance and improve your operational efficiency.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: CrowdStrike     Published Date: Feb 01, 2017
Once a “consumer-only” problem, Ransomware now has an established business case for profitability, and that’s driving criminals to expand their operations and hunt for more lucrative prey. As a result, commercial enterprises and other large organizations are increasingly in the crosshairs. Consider these facts: ? Ransomware attacks doubled in 2015 ? The number of new ransomware variants increased 17% in Q1 2016 ? The FBI estimates that ransomware will net criminals $1 billion in 2016 This white paper dives into the inner workings of ransomware, its perpetrators and how they are evolving to maximize profits. You’ll also learn how companies are fighting back, and review best practices for protecting your organization from becoming another victim of electronic extortion.
Tags : 
    
CrowdStrike
Published By: Dun & Bradstreet     Published Date: Apr 21, 2016
Is your well-worn playbook in need of a refresh? What worked best for B2B marketers last year may not help you optimize a moment with a customer or prospect today. All too often, baked in processes get in the way of delighting customers. If you’re a B2B marketer who wants to be a game changer, you have come to the right place. This reader is for marketers who crave to poke and pull apart the “tried and true”. Break the cycle of “best practice” rituals and ask yourself these questions: - When was the last time you made a truly bold move in your marketing? - Do you have any idea how bad your data problem really is? -How long will you continue to create sales content nobody uses? We answer these questions and more- download the free guide today!
Tags : 
marketing strategies, hoover's, b2b marketer, analytics
    
Dun & Bradstreet
Published By: Oracle     Published Date: Feb 20, 2019
Practice Supply Chain Best-in-Class What does it take to thrive in a digital world? A strong, strategic relationship with customers; data that supports confident decision-making; and an end-to-end SCM and ERP platform that brings it all together. See how industry leaders do it.
Tags : 
    
Oracle
Published By: SAS     Published Date: May 24, 2018
For 20 years running, SAS has landed a coveted spot on Fortune’s 100 Best Companies to Work For list. Our HR department plays a critical role in keeping current employees engaged and productive as well as anticipating and preparing for future workforce needs. How? One reason is our use of data and analytics to drive HR decision making. It would be easy to assume other companies see the value of analytics; however, a Deloitte survey found 75 percent of HR leaders rate analytics as a priority, yet only 8 percent say their HR organization has a strong analytics capability. I had the pleasure of meeting David Harcourt, Associate Manager of Employee Insights at Yum! Brands when he spoke at the Analytics Experience 2016 conference in Las Vegas. His session, “HR Analytics from Scratch: 8 Lessons Learned in the First Year,” provided valuable insight into what it takes to build HR analytic competency from scratch. His mission is to share with others what he wishes he’d known when he started bui
Tags : 
    
SAS
Published By: CheckMarx     Published Date: Apr 03, 2019
As new code deployments accelerate through wider adoption of DevOps methodology, maintaining software security is crucial to you and your customers. Is your software security program up to the challenge? If you’re not getting the most out of your software security program, our security experts may be able to diagnose your difficulties. We’ve created a list of specific recommendations on how to improve your program for better, faster results. We present to you “How to make your software security program successful: 10 Essential Best Practices.”
Tags : 
    
CheckMarx
Published By: CDW     Published Date: Feb 24, 2015
Software asset management (SAM) solutions promise to fix all that. They present a set of tools, practices and processes that take the uncertainty out of software licensing and enable organizations to fully optimize software inventories.
Tags : 
software license, software compliance, software asset management, sam, strategic license management, cloud-based services, virtualization, network security
    
CDW
Published By: Comcast Business     Published Date: Oct 19, 2018
Technology has had a truly transformative impact on the healthcare space. Thanks to innovations in technology, tools and their respective processes, the practice of treating patients has shifted from mostly reactive to proactive, enabling physicians and caregivers to approach healthcare in a more holistic fashion. As part of that shift, hospitals, wellness centers and physicians’ offices are focusing on providing value over volume1, taking healthcare beyond the four walls of the facility and into patients’ homes, places of work and social centers. The concept of whole health is much easier to attain with technology such as artificial intelligence, analytics, wearables and mobile health (mHealth) apps, to name a few.
Tags : 
    
Comcast Business
Published By: Juniper Networks     Published Date: Oct 02, 2018
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 50% of respondents in India saying they deal with more than 50 alerts each day. Shockingly, for 6% of organizations, that figure rises to between 100 and 1,000 threats a day. The Solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download the Report to find out what else Ovum has discovered about security practices in India.
Tags : 
    
Juniper Networks
Published By: Henry Jhonson     Published Date: Feb 01, 2011
In over forty pages this guide tackles every Twitter feature, tip and trick you can think of. Learn to work the interface, to Tweet from your desktop, cool Twitter bots and which people to follow.
Tags : 
twitter, tricks, tips, social, media, optimization, guide, whitepaper, e-book
    
Henry Jhonson
Published By: Avaya     Published Date: Jun 15, 2016
Expanding and enriching the educational experience through a streamlined, broadened networkBYOD in the classroom and one-student-one-device trends meant Kentucky’s Bullitt County Public Schools needed an easily configurable, reliable and scalable network. Read this case study to discover the benefits of WLAN technology in the educational world.
Tags : 
mobile device, best practices, networks, technology
    
Avaya
Published By: IBM     Published Date: Apr 20, 2017
Security from design through deployment. Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. However, to achieve these benefits, it is imperative that mobile security best practices are incorporated throughout the lifecycle of the application.
Tags : 
    
IBM
Published By: Clicktale     Published Date: Dec 04, 2012
In this guide, we'll be introducing the full gamut of web solutions, starting with tools that evaluate your entire site traffic, and ending with techniques and best practices for understanding the individual user.
Tags : 
customer experience analytics, web optimization, web analytics
    
Clicktale
Published By: BonitaSoft     Published Date: Jun 27, 2011
10 steps and guidelines to ensure the success of organization's BPM implementation while minimizing the possibility of any potential setbacks.
Tags : 
bpm, implementation, colleboration
    
BonitaSoft
Published By: newScale     Published Date: Jan 30, 2008
This white paper outlines the challenges associated with IT Request Management and ten best practices that represent the hard-won knowledge from dozens of successful Service Request Management projects. By following these guidelines, your IT organization can provide more responsive service delivery, increase operational efficiency, and improve internal customer satisfaction.
Tags : 
itil, service catalog, service catalogue, itil service catalogue, it service catalogue, best practices, service management, customer service, customer satisfaction, newscale, request fulfillment, it management
    
newScale
Published By: LifeSize, a division of Logitech     Published Date: Aug 19, 2011
Incorporating video collaboration as a standard business practice can result in tighter employee and business partner relationships, increased productivity, faster decision-making and many more lucrative bene?ts.
Tags : 
lifesize, best practices, video collaboration, standard business practice, productivity, video conferencing technology, virtualization, communications objectives, it environment, unified communications, mobility, pip, picture in picture suppression, bandwidth management, ip networks, network management
    
LifeSize, a division of Logitech
Published By: Thawte     Published Date: Aug 09, 2013
SharePoint is a valuable collaboration tool. But your organization could be vulnerable if you don’t take the right steps. There’s no silver bullet for securing SharePoint because each deployment is unique. However, here are 10 best practices that everyone should follow when using this collaboration tool.
Tags : 
thawte, ssl certificate, application, web server, data collection, technology, encryption, security, enterprise applications
    
Thawte
Published By: Thawte     Published Date: Oct 06, 2014
SharePoint is a valuable collaboration tool. But your organization could be vulnerable if you don't take the right steps. There’s no silver bullet for securing SharePoint because each deployment is unique. However, there are 10 best practices that everyone should follow when using this collaboration tool.
Tags : 
collaboration tool, vulnerability, deployment, 10 best practices, it management, enterprise applications
    
Thawte
Published By: CloudHealth by VMware     Published Date: Feb 13, 2019
While cost is often cited as the reason why people move to the cloud, it's not always that simple. Many organizations have noticed cloud bills 2-3x higher than expectations, when not managed properly. Have you achieved the savings you expected? Learn 10 ways you can reduce your spend in AWS, including: -Terminate Zombie Assets -Rightsize EC2 Instances & EBS Volumes -Upgrade instances to the latest generation -Delete Disassociated Elastic IP Addresses Check out this eBook to find out how you can better manage your costs through pro-tips from cloud experts.
Tags : 
cloud management, amazon web services, multicloud management, amazon ec2
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Apr 15, 2019
While cost is often cited as the reason why people move to the cloud, it's not always that simple. Many organisations have noticed cloud bills 2-3x higher than expectations, when not managed properly. Have you achieved the savings you expected? Learn 10 ways you can reduce your spend in AWS, including: Terminate Zombie Assets Rightsize EC2 Instances & EBS Volumes Upgrade instances to the latest generation Delete Disassociated Elastic IP Addresses Check out this eBook to find out how you can better manage your costs through pro-tips from cloud experts.
Tags : 
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Feb 13, 2019
Choosing Azure revolutionizes your environment's agility, simplicity, and innovation, but have you achieved the cost savings you expected? Discover 10 ways you can reduce your spend in Azure, including: -Terminate Zombie Assets -Delete Aged Snapshots -Rightsize Virtual Machines -Rightsize SQL Databases Read 10 Best Practices for Reducing Spend in Azure, to learn key strategies for optimizing cloud spend and saving 10-20% on your monthly Azure costs.
Tags : 
cloud management, microsoft azure, multicloud management
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Apr 15, 2019
Choosing Azure revolutionises your environment's agility, simplicity, and innovation, but have you achieved the cost savings you expected? Discover 10 ways you can reduce your spend in Azure, including: Terminate Zombie Assets Delete Aged Snapshots Rightsize Virtual Machines Rightsize SQL Databases Read 10 Best practices for Reducing Spend in Azure, to learn key strategies for optimising cloud spend and saving 10-20?% on your monthly Azure costs.
Tags : 
    
CloudHealth by VMware
Published By: Dell Cloud Marketplace     Published Date: Jan 07, 2015
CIOs and other senior IT leaders have a growing responsibility to ensure that the right steps for cost savings and optimization are understood and applied. This report focuses on the clear and practical steps you can take to optimize cloud spend and get the most value for your dollar.
Tags : 
dell, iaas, cloud computing, cloud services, cloud budget, cloud spending, it budget, data center design and management, colocation and web hosting
    
Dell Cloud Marketplace
Published By: McAfee     Published Date: Aug 14, 2014
URL filtering is a must for enterprise policy management. While the process is not difficult to implement, you can make it even easier and more effective by adhering to 10 best practices for URL filtering.
Tags : 
url filter, firewall url, web filtering, website blocking, white listing, next generation firewall, ngfw, ngfw features, security, enterprise applications
    
McAfee
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.