framework

Results 326 - 350 of 561Sort Results By: Published Date | Title | Company Name
Published By: OpenText     Published Date: Apr 16, 2014
Learn how the enterprise process management systems that you are using may be outdated and see why there may be another enterprise process application that better fits your organization’s needs.
Tags : 
opentext, bpm, business process management, it projects, produce results, framework, startup time, potential of bpm
    
OpenText
Published By: OpenText     Published Date: Apr 16, 2014
Learn the 7 steps for mastering business process management and see how simple it is to achieve meaningful process improvement.
Tags : 
opentext, bpm, business process management, it projects, produce results, framework, startup time, potential of bpm
    
OpenText
Published By: OpenText     Published Date: Apr 16, 2014
Learn how the landscape of business has changed and see how you no longer need multiple systems, and instead need a complete process automation and case management system that will fit all of your organization’s needs.
Tags : 
opentext, bpm, business process management, it projects, produce results, framework, startup time, potential of bpm
    
OpenText
Published By: OpenText     Published Date: Apr 16, 2014
Learn why the next generation of Business Process Management has to realign its priorities to focus on being agile, responsive and aimed at achieving business outcomes that deliver, drive, and create innovative ways to help organizations stay competitive.
Tags : 
opentext, bpm, business process management, it projects, produce results, framework, startup time, potential of bpm
    
OpenText
Published By: OpenText     Published Date: Apr 16, 2014
Learn about what case management is and how it differs from conventional business process management; but more importantly, see what you should look for in a case management platform.
Tags : 
opentext, bpm, business process management, it projects, produce results, framework, startup time, potential of bpm
    
OpenText
Published By: OpenText     Published Date: Apr 16, 2014
Learn how to provide a framework for developing a business case for new or continued justification of BPM projects and see how this can help accelerate the startup time and enable more organizations to realize success from BPM.
Tags : 
opentext, bpm, business process management, it projects, produce results, framework, startup time, potential of bpm
    
OpenText
Published By: Cyveillance     Published Date: Apr 03, 2015
Protecting a business – including its information and intellectual property, physical infrastructure, employees, and reputation – has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Like many security trends and frameworks, the early stages of adoption often involve inconsistent definitions, challenges with justification and management communication and an unknown path to implementation. In this white paper, we: • Review the current threatscape and why it requires this new approach • Offer a clarifying definition of what cyber threat Intelligence is • Describe how to communicate its value to the business and • Lay out some concrete initial steps toward implementing Intelligence-Led Security
Tags : 
intellectual property, hackers, protection, leaks, security, threatscape
    
Cyveillance
Published By: ARMA     Published Date: Nov 04, 2014
The relationship between an organization's information-handling practices and the impact those practices have on its ability to respond to electronic discovery is recognized in the Electronic Discovery Reference Model (EDRM). But the EDRM falls short of describing standards or best practices that can be applied to the complex issues surrounding the creation, management, and governance of electronic information. ARMA International's Generally Accepted Record-keeping Principles and its information Governance Maturity Model are designed specifically to provide a scalable, broadly applicable framework to address these issues.
Tags : 
information-handling practices, edrm, electronic discovery, maturity model
    
ARMA
Published By: NetApp     Published Date: Mar 11, 2015
To enable the data-driven enterprise, IT organizations are moving rapidly to a services-based cloud model. This white paper highlights the challenges of controlling data in hybrid as-a-service IT environments and suggests that data control in hybrid IT should be looked at as a framework rather than as a single effort.
Tags : 
    
NetApp
Published By: Avaya     Published Date: Jun 15, 2016
How the industry’s first holistic software-defined networking architecture fulfills the promise of SDN The Avaya SDN Fx™ architecture defines a solutions framework that enables customers to reap the benefits of network simplicity, reliability, and virtualization. Read how a simple solution solves big problems in this white paper.
Tags : 
networking, best practices, software, technology, productivity
    
Avaya
Published By: QuickPivot     Published Date: Jan 28, 2016
As our framework for channels and devices continues to broaden, so, too, does the strategy and technology stack needed to deliver the right content.
Tags : 
quickpivot, iot, content strategy, omnichannel, multichannel, marketing solutions
    
QuickPivot
Published By: Optimizely     Published Date: Dec 01, 2015
Find the most impactful areas to optimize & unlock hidden revenue! When your testing roadmap includes dozens of ideas (each with unique requirements) and each team member is vying for her idea to be run first, effective prioritization becomes paramount. This session will focus on the considerations, tools and frameworks you can use to make sure your roadmap is appropriately prioritized to meet your goals.
Tags : 
optimizely, optimization roadmap, webinar, revenue generation
    
Optimizely
Published By: Optimizely     Published Date: Dec 01, 2015
Statistics are the underpinning of how Optimizely’s customers use data to make decisions. We use experiments to understand how changes we make affect the performance of our online experiences. To do this, we need a framework for evaluating how likely those changes are to have an impact, positive or negative, on a business over time. To run great experiments, investing in an understanding of statistics is one of the most important skills you can develop. Statistics provide inference on your results and help to determine whether you have a winning variation. Using statistical values to decide leads to stable, replicable results you can bet your business on. Lack of understanding can lead to errors and unreliable outcomes from your experiments.
Tags : 
statistics, experiments, data, customers, results, variation
    
Optimizely
Published By: LogRhythm     Published Date: Feb 07, 2017
Globally, sophisticated cyber-attacks are compromising organizations at an unprecedented rate and with devastating consequences. Modern attackers, including criminal organizations, ideological groups, nation states and other advanced threat actors are motivated by a wide range of objectives that include financial gain, industrial espionage, cyber-warfare, and terrorism.
Tags : 
security, technology, best practices, information technology, business analytics, business management
    
LogRhythm
Published By: LogRhythm     Published Date: Feb 22, 2018
The traditional approach to cybersecurity has been to use a prevention-centric strategy focused on blocking attacks. While prevention-centric approaches do stop many threats, many of today’s advanced and motivated threat actors are circumventing these defenses with creative, stealthy, targeted, and persistent attacks that often go undetected for significant periods of time.
Tags : 
    
LogRhythm
Published By: CrowdStrike     Published Date: Feb 14, 2019
How adopting a framework can optimize cybersecurity Today’s threat landscape has created new challenges for security analysts and incident responders, as the number of alerts and their complexity have increased significantly. Organizations with small IT teams are overwhelmed, often lacking the time or resources to investigate every alert. Failing to do so means a high-risk threat might go unnoticed. This can result in a devastating breach, damaging an organization's finances and reputation. This white paper discusses how CrowdStrike is solving these challenges, by implementing the MITRE ATT&CK™ Framework across multiple CrowdStrike processes and product features to help improve analyst’s productivity and prevent breaches. This provides many benefits, including time savings; adding advanced context to security alerts and information; and enabling a common, shared language. However, it also provides some hidden advantages, especially concerning cybersecurity. Read this whitepaper to lear
Tags : 
    
CrowdStrike
Published By: ExpertVoice     Published Date: Jun 14, 2019
Of course you want to ensure your customers have a good experience, that you’re creating brand loyalists and building a positive reputation along the way, but most importantly, you want to impact your bottom line. That’s where advocacy marketing comes in. Advocacy marketing is harnessing the voices of your brand’s fans and leveraging them to increase sales. Also known as word-of-mouth marketing, advocacy marketing is using happy customers to promote your business — and sell more
Tags : 
    
ExpertVoice
Published By: 15five     Published Date: Jul 17, 2019
Learn best practices for choosing performance management software and advice for getting everyone at your company excited for this critical piece of HR Tech: • How to identify HR pain points • A list of sample questions for your Needs Assessment • Conducting your due diligence • A framework to analyze HR solution options • Six steps to gain executive buy-in
Tags : 
    
15five
Published By: Engagio     Published Date: Jan 10, 2018
Account-based strategy is the coordination of highly valuable, personalized experiences across all functions that impact the customer to drive engagement and conversion at a targeted set of accounts. The adoption of account-based strategy has accelerated in the last few years, with a dramatic increase in the number of companies looking to implement this approach. This growth is driving demand to “start now,” particularly in marketing organizations, but account-based cannot be developed by the marketing department alone. The best account-based leaders begin by securing organization-wide commitment to the account-based strategy.
Tags : 
    
Engagio
Published By: Engagio     Published Date: Feb 05, 2018
Be the first to read Engagio’s brand-new guide that tells you everything you need to know about ABM Analytics. We’ll cover: Great Marketing, Great Marketing Analytics Account Based Analytics Are Different 3 Styles of ABM A Framework for ABM Measurement Journey and ROI Analytics 6 Attribution Models The New Metrics for ABM And more! The Clear & Complete Guide to ABM Analytics is your guide to becoming a world-class B2B marketer!
Tags : 
    
Engagio
Published By: HP     Published Date: Aug 04, 2010
Virtualization is moving to the mainstream and may soon be overtaking non-virtualized environments as a method for deploying applications. Does this broad adoption of virtualization, though, make network security easier or more difficult to achieve? While responses to this question are still highly varied, one thing is certain: most companies still have no clear and definite security policy for their virtual environments.
Tags : 
security hype, hyper-jacking, 3com, vm escape, vm hopping, vm theft, vm sprawl, virtualization security
    
HP
Published By: SwellPath     Published Date: Sep 04, 2012
This guide provides the framework to build a successful analytics foundation in your organization, and shows you how to create an effective analytics measurement program that provides actionable insights and results driven recommendations.
Tags : 
google analytics, marketing analytics, ecommerce analytics, analytics strategy, web analytics, analytics implementation, google analytics consulting, measurement strategy
    
SwellPath
Published By: VMware AirWatch     Published Date: Nov 12, 2015
Recentemente, una delle domande più comuni dei clienti è: “In che modo AirWatch supporta Office 365?” Molti chiedono se AirWatch possa controllare l’accesso ad Office 365 (O365) non solo sul loro sistema del desktop aziendale, ma soprattutto dai dispositivi mobili. Per fortuna AirWatch® by VMware® fornisce un alto livello di assistenza in modo che le aziende possano sfruttare al meglio O365 sui loro dispositivi mobili e la nostra recente integrazione con VMware® Identity Manager fornisce il primo framework nel settore del controllo di accesso flessibile per garantire che tutte le applicazioni di lavoro, tra cui O365, possano ottenere l’accesso solo da dispositivi gestiti e conformi.
Tags : 
airwatch, emm, office365, cloud
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Nov 12, 2015
In letzter Zeit stellen Kunden immer häufiger die Frage, wie AirWatch Office 365 unterstützt. Viele fragen, ob AirWatch den Zugang zu Office 365 (O365) nicht nur auf ihren geschäftlichen Desktop-Systemen, sondern auch auf ihren Mobilgeräten steuern kann. Erfreulicherweise bietet AirWatch® by VMware® Organisationen enorme Unterstützung bei der Nutzung von O365 auf ihren Mobilgeräten. Unsere jüngste Integration mit VMware® Identity Manager bietet ein branchenerstes adaptives Zugriffskontroll-Framework, um zu gewährleisten, dass alle geschäftlichen Apps, einschließlich O365, nur auf konformen Geräten aufgerufen und verwaltet werden.
Tags : 
airwatch, emm, office365, cloud
    
VMware AirWatch
Published By: BlackBerry Cylance     Published Date: Sep 13, 2017
The Forrester Consulting report provides a framework to evaluate the potential financial impact and benefits of investing in a prevention based cybersecurity strategy with Cylance.
Tags : 
    
BlackBerry Cylance
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.