it management

Results 126 - 150 of 6944Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Aug 02, 2017
Customer experience (CX) continues to dominate the agenda, and it is clear from the research that retailers collectively grasp the importance of a personalised and mobilefriendly experience which is relevant at every stage of the customer journey. It makes absolute sense for retailers to focus on optimising the mobile experience as part of their CX initiatives. CX is a differentiator for retail brands and, as part of this trend, the mobile experience in particular will increasingly define your brand.
Tags : 
digital skills, culture, strategy, data management, processing, technology, ux design
    
Adobe
Published By: NAVEX Global     Published Date: Jul 17, 2017
Establishing a culture of integrity, ethics and respect is the number one priority for companies in 2017, according to a new report. In common with the 2015 report, getting an organisation's culture right is the main objective for compliance professionals in the year ahead, with 85 per cent of respondents saying it is one of their three main goals. However despite this, only 32 per cent of firms indicated that they are planning to undertake a culture or ethics assessment in the next twelve months. In addition, workplace behaviour was rated as the lowest area of risk receiving attention by stakeholders (29 per cent). Download the full report for additional stats on board level reporting, increasing compliance programme awareness and satisfaction with third party risk management.
Tags : 
measuring programme effectiveness, insufficient staff, managing regulations, lack of tools, budget issues, programme reporting
    
NAVEX Global
Published By: NAVEX Global     Published Date: Dec 07, 2017
Good analysis and benchmarking of hotline data helps organisations answer crucial questions about their ethics and compliance programme, including: Does our culture support employees who raise concerns? Are our communications with employees reaching the intended audiences and having the desired effect? Are our investigations thorough and effective? Do we need more training? Do we need to review or update our policies? Do employees know about our reporting channels? Comparing internal data year over year to help answer these questions is important. But getting a broader perspective on how your performance matches up to industry norms is critical. This year’s analysis of our EMEA & APAC data from nearly 14,000 ethics and compliance hotline reports revealed key data points that compliance professionals can use to benchmark and assess their programme’s performance, and move toward predictive risk mitigation.
Tags : 
navex, ethics and compliance software, hotline data, risk mitigation, incident management systems
    
NAVEX Global
Published By: NAVEX Global     Published Date: Dec 22, 2017
Ethics and compliance officers have many opportunities to leverage the data in their hotline and incident management systems to improve their compliance programmes— and their organisational culture of ethics and respect. This year’s benchmarks point to several opportunities to increase programme effectiveness. Hotline data that is carefully tracked, reviewed, benchmarked and presented with sufficient context often provides the early warning signs needed to detect, prevent and resolve problems. We at NAVEX Global hope that this report is helpful to your organisation and we welcome any feedback on these findings.
Tags : 
whistleblowing, hotline, whistleblowing hotline, hotline best practices, hotline benchmark data, whistleblower protection, whistleblowing programe
    
NAVEX Global
Published By: NAVEX Global     Published Date: Mar 21, 2018
Good analysis and benchmarking of hotline data helps organisations answer crucial questions about their ethics and compliance programme. Comparing internal data year over year to help answer these questions is important. But getting a broader perspective on how your performance matches up to industry norms is critical. To help, each year NAVEX Global takes anonymised data collected through our hotline and incident management systems to create these reports. This particular report is the second NAVEX Global benchmark report we have published that focuses specifically on the status of ethics and compliance hotline services in the EMEA and APAC regions. This benchmark only takes reporting data from organisations that has its data warehoused in Europe—a subset of the data used in our global hotline report.
Tags : 
    
NAVEX Global
Published By: NAVEX Global     Published Date: Apr 20, 2018
An effective third-party risk management programme is in the interest of all organisations—regardless of size, industry, and number of third party providers. This report will help you benchmark your third-party risk management programme and its performance against trends in the market and best practices. What you'll learn: The top issues and challenges organisations are facing with their third-party risk management programmes How organisations are using outside providers to help with third party due diligence The inconsistency of top concerns year over year and what this might indicate How to leverage the findings in this benchmark report to increase programme effectiveness in your own organisation
Tags : 
    
NAVEX Global
Published By: IBM     Published Date: May 08, 2018
Security testing is growing faster than any other security market, as AST solutions adapt to new development methodologies and increased application complexity. Security and risk management leaders must integrate AST into their application security programs.
Tags : 
application security, ast solutions, security management, risk management
    
IBM
Published By: LogRhythm     Published Date: Jun 19, 2018
Security and risk management leaders are implementing and expanding SIEM to improve early targeted attack detection and response. Advanced users seek SIEM with advanced profiling, analytics and response features.
Tags : 
siem, gartner, magic, quadrant, analytics
    
LogRhythm
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Cybercriminals can be goal-driven and patient, and they often have a singular focus, plenty of time and access to vast, modern technical resources. Both organized and forum-based criminals are working constantly to find innovative and efficient ways to steal information and money with the lowest risk to their personal freedom. If we wish to stay “one step ahead” of the threats detailed in this report, awareness of online criminal threats, techniques and markets is our best defense.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017
Published By: UBM Technology     Published Date: Sep 05, 2017
As the use of public cloud becomes a given, IT leaders must navigate the transition and advocate for improved management tools and methods.
Tags : 
    
UBM Technology
Published By: Workday     Published Date: Jun 15, 2018
Looking for a trusted partner in financial management who has what it takes to lead your organization today and into the future? Get an analysis of the market, key recommendations for evaluating vendors, and more. Download your complimentary copy of Gartner Magic Quadrant for Cloud Core Financial Management Suites.
Tags : 
finance, management, gartner, cloud
    
Workday
Published By: Workday Nordics     Published Date: Sep 19, 2018
Looking for a trusted partner in financial management who has what it takes to lead your organisation today and into the future? Get an analysis of the market, key recommendations for evaluating vendors, and more. Download your complimentary copy of Gartner Magic Quadrant for Cloud Core Financial Management Suites.
Tags : 
workday, workday technology, digital strategy for finance
    
Workday Nordics
Published By: Forcepoint     Published Date: Jun 06, 2019
Forcepoint recognized as a Visionary for 2nd year in a row, in the Gartner 2018 Magic Quadrant for NGFW Gartner has named Forcepoint sole Visionary in their 2018 Magic Quadrant for NGFW, for ability to execute and completeness of vision. According to Gartner, “In this mature market, vendors differentiate on feature strengths. Security and risk management leaders must consider the trade-offs between best-of-breed enterprise network firewall functions and risk tolerance.”*
Tags : 
    
Forcepoint
Published By: Google Apigee     Published Date: Jun 08, 2018
A must-read for IT professionals that provides a comprehensive analysis of the API management marketplace and evaluates 22 vendors across 15 essential criteria. APIs are the de-facto standard for building and connecting modern applications. But securely delivering, managing and analyzing APIs, data and services, both inside and outside an organization, is complex. And it’s getting even more challenging as enterprise IT environments grow dependent on combinations of public, private and hybrid cloud infrastructures. Choosing the right APIs can be critical to a platform’s success. Likewise, full lifecycle API management can be a key ingredient in running a successful API-based program. Tools like Gartner’s Magic Quadrant for Full Life Cycle API Management help enterprises evaluate these platforms so they can find the right one to fit their strategy and planning. Apigee is pleased to offer you a complimentary copy of the Gartner report. Access in-depth evaluations of API managemen
Tags : 
    
Google Apigee
Published By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
This report describes the results from a groundbreaking global study by Thycotic that reveals major risk and compliance gaps in how organizations manage and secure their privileged accounts and access to sensitive systems, infrastructure and data. The 2018 Global State of Privileged Access Management (PAM) Risk & Compliance report highlights where many organizations are failing to fully put security controls in place to protect their most critical information assets.
Tags : 
    
Group M_IBM Q2'19
Published By: Fiserv     Published Date: Jan 16, 2018
For the past decade, financial institutions have created sophisticated digital platforms for consumers to access, save, share and interact with their financial accounts. As sophisticated as these digital platforms have become, cyber criminals continue to pose an ever-present risk for everyone – from individual consumers to large corporations In his recent article, 2018 Outlook: Customer Experience and Security Strike a Balance, Andrew Davies, vice president of global market strategy for Fiserv’s Financial Crime Risk Management division, explains how and why security will become a key differentiator for financial institutions as they respond to a changing landscape, which includes: •Global payment initiatives •Open Banking standards •Artificial intelligence and machine learning •Consumer demand for real-time fraud prevention and detection
Tags : 
2018 trends, aml trends, money laundering trends
    
Fiserv
Published By: NAVEX Global     Published Date: Jul 31, 2018
Compare your policy and procedure management programme to industry standards and identify where your programme needs improvements. Read the top challenges policy management programmes face in 2018 and expert recommendations on meeting those challenges. What You'll Learn: Where organisations are struggling with policy management What the best organisations do to create efficiency in their programme How organisations are starting to comply with new SFO and DOJ guidance How automated systems improve results and satisfaction for policy management
Tags : 
    
NAVEX Global
Published By: WorkBook from Deltek     Published Date: Apr 26, 2018
Service Performance Insight (SPI Research) is a global research, consulting and training organization dedicated to helping professional services organizations (PSOs) make quantum improvements in productivity and profit. In 2007, SPI developed the PS Maturity Model™ as a strategic planning and management framework. It is now the industry-leading performance improvement tool used by over 20,000 service and project-oriented organizations to chart their course to service excellence.
Tags : 
professional, services, benchmark, report, productivity, organizations, pso
    
WorkBook from Deltek
Published By: Illusive Networks     Published Date: Apr 10, 2019
Illusive Networks is proud to once again sponsor the Cyberthreat Defense Report by CyberEdge Group, now in its sixth year, to help security leaders assess and shape their cybersecurity programs. Download this comprehensive report to learn more about the most wanted security management and operations technology for 2019, which security processes organizations struggle with the most, and how organizations are trying to detect advanced cyberthreats more quickly.
Tags : 
cybersecurity, cyber threats, apt, targeted attacks, cyberedge, advanced persistent threats, threat management, illusive networks
    
Illusive Networks
Published By: Symantec     Published Date: Jul 31, 2017
The Shadow Data Report, published by Symantec, addresses key trends and challenges faced by enterprises securing data in cloud apps and services.
Tags : 
data, data security, cloud, threat and vulnerability management, cloud applications
    
Symantec
Published By: Citrix Systems     Published Date: Oct 07, 2014
Citrix XenDesktop is the clear choice for mobilizing Windows apps and desktops. Whether you are looking to deliver Windows apps and desktops to mobile users, reduce costs and management through desktop virtualization, or secure intellectual property, XenDesktop is the only solution able to meet all your needs from a single, easy to deploy platform. It quickly and securely delivers mobile access to individual apps or complete desktops while maintaining a high definition user experience.
Tags : 
mobilizing, windows, intellectual property, secure, desktops, virtualization, high definition, user experience
    
Citrix Systems
Published By: Accelerance     Published Date: Feb 01, 2008
Despite the fact that Software Executives are pressured to do more with less and cut costs to the bone, many see offshoring as a "threat."  They know they need to go offshore - but where? And with who? What they want is an easier, better, more effective and safer way to use offshore programming resources.
Tags : 
it management, software development, development, developer, programmer, programming, developing, offshoring
    
Accelerance
Published By: Hyland Software     Published Date: Dec 17, 2013
Businesses are discovering how to create efficiencies and meet constantly evolving business needs with an enterprise content management (ECM) solution. Make ECM work for your organization by researching best practices and knowing your options.
Tags : 
emc, enterprise content management, emc solution, automated processing, workflow, integration, emc strategy, onbase
    
Hyland Software
Published By: Seismic     Published Date: May 24, 2019
Implementing a sales enablement strategy is one of the most effective ways you can transform your sales and marketing teams. Organizations that have undertaken a sales enablement initiative have seen a 350% increase in content usage, 275% boost in conversions, and 65% more revenue generated by new reps. In this webinar, we’ll share the 3 biggest mistakes companies make when implementing a sales enablement strategy to ensure you don’t fall victim to these pitfalls. You'll walk away with the framework for implementing a sales enablement strategy that will enable you to: ? Increase Sales Productivity ? Improve Sales and Marketing Alignment ? Increase Efficiency of Content Management ? Unlock Deep Content Insights and Analytics
Tags : 
    
Seismic
Published By: C2C Systems, Inc.     Published Date: Mar 15, 2007
Compliance, capacity management and e-policy enforcement. Which factors are driving email archiving at your organization? And how do you pick a solution that solves your specific problems without breaking the bank? There are many internal and external forces driving the need to archive.
Tags : 
email archiving, email security, storage, security policies, policy based management, compliance, exchange server, c2c
    
C2C Systems, Inc.
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.