business management

Results 601 - 625 of 2250Sort Results By: Published Date | Title | Company Name
Published By: Sage People     Published Date: Nov 02, 2017
Did you ever wonder what enterprise resource planning or ERP is and how it can help your business? Or perhaps you know a little about ERP but you’re not sure if you should opt for an on-premise or cloud solution and what to expect from your final choice. Don’t worry. If you’re a business owner, manager or director in a mid-sized or growing business and you’re confused about ERP, this guide will help you.
Tags : 
workflow software, performance indecator, monitor and analyse performance, enterprise resource planning, financial management services, business transformation, competitive/swot analysis, small business accounting, audits, account reconciliation, accounting automation, accounting audits, financial systems, contract lifecycle management, business intelligence, business analytics
    
Sage People
Published By: Sage People     Published Date: Nov 02, 2017
Forrester Consulting provides independent and objective research-based consulting to help leaders succeed in their organizations. Ranging in scope from a short strategy session to custom projects, Forrester’s Consulting services connect you directly with research analysts who apply expert insight to your specific business challenges. For more information, visit forrester.com/consulting.
Tags : 
workflow software, performance indecator, monitor and analyse performance, enterprise resource planning, financial management services, business transformation, competitive/swot analysis, small business accounting, audits, account reconciliation, accounting automation, accounting audits, financial systems, contract lifecycle management, business intelligence, business analytics
    
Sage People
Published By: Laser 2000     Published Date: Mar 12, 2019
Network
Tags : 
    
Laser 2000
Published By: CA Technologies     Published Date: Jan 06, 2014
As most European organisations open up their applications for external users, Identity Access Management (IAM) is becoming ever more critical to drive business growth.
Tags : 
mediacom, byoid, identity access management, iam, business growth, directories of identities, it professionals, external business users, primary motivator, secondary motivator, implementing iam, security goals, regional perceptions, it management, cloud resource, enforcement, iam adoption, deploy iam
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 06, 2014
This report presents new research into the use and benefits of IAM and the relationship it has with these three drivers. The research is based on over three hundred interviews with senior IT managers in medium sized to large organisations in a range of business sectors across Europe. The report should be of interest to anyone wanting to better serve all types of users, whilst still keeping control over applications and data.
Tags : 
mediacom, digital identities, open business, business growth, access management, identity management, iam, open interaction, in-house directories, management challenges, cloud-based services, b2b, b2c, cloud services, it applications, source of identity, bring your own identity, iam-as-a-service
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: CA WA     Published Date: May 12, 2008
The recent economic downturn and corporate scandals compounded concerns of corporate accountability and confidence in U.S businesses. To improve shareholder confidence in management’s ability to self-govern, the Federal Government implemented strict regulatory protocols to help restore accountability and improve public as well as shareholder confidence. The primary example of course is the Sarbanes-Oxley (SOX) Act of 2002 which sought lasting eradication of corporate corruption by implementing specific controls across key financial business processes.
Tags : 
ca wa, workload automation, business process automation, compliance, sox, sarbox, sarbanes oxley
    
CA WA
Published By: CA WA     Published Date: May 12, 2008
CA Workload Automation brings a central point of control and visibility to help assure efficient, reliable and secure business process management. It enables business workload design across platforms and operating systems, offering advanced monitoring and automated responses to changes and exceptions.
Tags : 
web services, bpm, business process, ca wa, workload automation
    
CA WA
Published By: CA SM     Published Date: Jun 02, 2008
The potential benefits of adopting a Knowledge Management strategy are significant and have far-reaching implications for a business when implemented correctly. The correct use of Knowledge Management techniques and technology makes a company agile and more responsive to the needs of the customer, resulting in enhanced business performance and greater return on investment.
Tags : 
ca sm, ca service management, service management, knowledge management, custoer service, return on investment, roi, best practices, it support
    
CA SM
Published By: CA SM     Published Date: Jun 02, 2008
Telecom assets are a special class of IT assets that require an accurate inventory for effective financial management. Enterprises should consider the benefits of establishing a "single version of the truth" that comes from linking management of IT and telecom assets with their other systems and processes. An accurate inventory is critical for effective financial management. Managers need accurate information that supports their business decisions.
Tags : 
ca sm, ca service management, service management, telecom, business management, asset management, business integration, convergence
    
CA SM
Published By: CA WA 2     Published Date: Oct 01, 2008
Featuring an expert from Enterprise Management Associates, this webcast discusses some tactical steps towards automation of various IT processes, showing how even in processes with interdependent tasks, IT Process Automation can start IT groups down the path of reducing complexity and error rates, two of the leading drivers of cost and chaos.
Tags : 
ca wa, ca wa 2, process automation, it process, bpa, business process automation, it management, webcast
    
CA WA 2
Published By: Progress Software Corporation CEP     Published Date: Mar 26, 2008
We all have an intuitive idea of what an event is. However, when it comes to the use of the term "event" within a business context then it is easy to get confused. This papers seeks to explain what events are, whey they are important to your business, and what the options are for processing and managing these events (depending on their type and volume).
Tags : 
bloor, progressive, software, complex event processing, cep, mission critical, rules-and-model, event pattern, detection, bpm, business process management, latency, soa, smartblocks, apama, correlator, event processing technical society, epts, rfid, scada
    
Progress Software Corporation CEP
Published By: BMC ESM     Published Date: Aug 20, 2009
Lorsque vous déménagez, en particulier dans un espace plus petit, vous devez déterminer ce que vous possédez, ce que vous gardez et ce que vous stockez. Vous avez toutes les chances de découvrir une multitude d'objets dont vous n'avez pas vraiment besoin. 
Tags : 
bmc, business process automation, spend management
    
BMC ESM
Published By: Cornerstone OnDemand     Published Date: Mar 27, 2017
Do you believe that your organisation could use a talent management initiative? Need help making the case to a business leader? This asset will help you prepare by giving you tips on topics such as: • Thinking like an executive • Identifying talent-related challenges • Assigning metrics to ensure accountability Interested in learning more about building your business case? Download 6 Steps to Making the Case for Talent Management.
Tags : 
    
Cornerstone OnDemand
Published By: SailPoint     Published Date: Feb 08, 2011
Learn the three best practices IT should follow to ensure that business managers actively and effectively participate in identity management compliance and security processes.
Tags : 
sailpoint, business management, identity management, compliance, security, government regulation
    
SailPoint
Published By: Citrix Systems     Published Date: Sep 17, 2015
The growing strategic value of desktop virtualization technology is advancing quickly, providing new ways to enable business mobility and increase the flexibility that organizations need to thrive. Read this white paper to see how falling cost factors in every part of the desktop virtualization architecture making it more affordable than ever.
Tags : 
desktop virtualization, business mobility, it management
    
Citrix Systems
Published By: Keas     Published Date: Mar 07, 2012
The economics of employee health & happiness are both frightening and wildly compelling. Companies that seize the Employee Wellness opportunity will win the war for talent and distance themselves from their competition. Wellness is no longer a "nice to have." It's business strategy.
Tags : 
employee wellness, corporate wellness, human capital management, wellness strategy, employee engagement, human resources, human resource management, talent management, business strategy, performance management, compensation, benefits, engagement
    
Keas
Published By: IBM     Published Date: Jul 13, 2012
Supporting a dynamic business and resilient IT environment requires effective management of your server infrastructure and network devices. Read this white paper to learn the challenges and solutions for effective management of your server infrastructures and network devices.
Tags : 
ibm, technology, management, infrastructure, white paper, software, business, server
    
IBM
Published By: IBM     Published Date: Jul 13, 2012
Business continuity planning and IT security management are increasingly becoming a critical part of enterprise-wide risk management and business resilience frameworks. But this has introduced new challenges and opportunities. This report explores how the shift towards more holistic risk management is affecting the day-to-day work for business continuity planners, IT risk managers and security executives.
Tags : 
ibm, technology, risk management, professionals, business, security management, emerging threats
    
IBM
Published By: Oracle     Published Date: Apr 27, 2015
In This Paper • Many enterprises lack a holistic view of their project management processes • Oracle Project Portfolio Management (PPM) Cloud uses open standards to create a best-in-class solution • Oracle PPM Cloud makes it easier for users to collaborate on projects internally or externally
Tags : 
ppm, oracle, transformative projects, project portfolio management, analytics, optimization, erp, cloud computing
    
Oracle
Published By: Oracle     Published Date: Apr 27, 2015
In This Paper • Finance is often first to adopt software solutions to automate business transactions and processes • Oracle Financials Cloud is a complete and integrated financial management solution • Businesses deploy Oracle Financials Cloud to help resolve pain points around control, compliance, and more
Tags : 
cloud computing, erp, productivity, applications, efficiency, finance, software solutions, management, compliance
    
Oracle
Published By: SunGard Availability Services     Published Date: Oct 30, 2013
Learn the 10 strategies for selecting a disaster recovery service provider to ensure that your organization will be better protected should a natural disruption occur.
Tags : 
sungard, sungard availability services, disaster recovery, disaster recovery provider, disaster recovery service provider, dr plan, drsp, business impact analysis, service level agreement, recovery, resiliency, application management, remote access, data center, security
    
SunGard Availability Services
Start   Previous    18 19 20 21 22 23 24 25 26 27 28 29 30 31 32    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.