it management

Results 76 - 100 of 6950Sort Results By: Published Date | Title | Company Name
Published By: Mimecast     Published Date: Oct 25, 2010
Download this whitepaper to learn 10 ways your company will save by moving your email management to the cloud.
Tags : 
mimecast, cloud-based email management, email archiving, software-as-a-service, e-discovery, continuity, policy management
    
Mimecast
Published By: Mimecast     Published Date: Nov 10, 2010
Practical cost saving benefits of cloud-based email management.
Tags : 
mimecast, software as a service, saas, email spend datasheet, cloud-based email management, archiving
    
Mimecast
Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
content delivery network, cdn, cybersecurity, ddos, waf, web application firewall, distributed denial of service attacks, cloud security, digital rights management
    
Limelight Networks
Published By: ITManagement     Published Date: Jul 24, 2008
The days of deploying new equipment for the sake of having the latest and greatest ended when the Internet bubble burst. So when you know it's time for a network upgrade, you need to have more than the technical facts — you need to arm yourself with a rock-solid business case. Start with these 10 ways to sell the members of your upper-management team on the network upgrade.
Tags : 
it management, upgrade, servers, management, network, network upgrade, selling management, itmanagement
    
ITManagement
Published By: Epicor     Published Date: Feb 22, 2010
This white paper explains the 12 criteria that allow you to identify and select the solution that will meet these expectations.
Tags : 
epicor, erp system replacement, enterprise resource planning, ifrs financial, ebusiness, service-oriented architecture, soa, it management
    
Epicor
Published By: BitSight Technologies     Published Date: Feb 29, 2016
Cybersecurity is an issue facing nearly every organization today—and if you aren’t taking the necessary precautions, your company, customers, and vendors could all suffer.
Tags : 
cybersecurity, security risk, security ratings, security, it management, enterprise applications
    
BitSight Technologies
Published By: CEB     Published Date: May 19, 2014
Twelve Key Trends in Contract Management CEB Legal’s contract management survey results allow general counsel to evaluate their current contract review and monitoring processes against hundreds of their peers at midsized companies. Your peers are using our 12 Key Trends in Contracts Management to: o Gain in-depth insight into the challenges and viable solutions presented by the current contracts management landscape. o Determine the scope of their contract review policies. o Identify opportunities to accelerate their approach across the contract life cycle -- from drafting through negotiation, review, and monitoring. o Improve efficiency using contract management software, including a review of key features and associated costs
Tags : 
ceb, legal, contract management, contract review process, contract management software, contract life cycle
    
CEB
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
Auf einen Blick Mitarbeiter von heute sind es gewohnt, privat digitale Technologien zu nutzen, die eine problemlose Kommunikation ermöglichen und die Abläufe des täglichen Lebens vereinfachen. Bedauerlicherweise können viele Unternehmenstools nicht Schritt halten. Die meisten Projekt- und Portfoliomanagementlösungen, die heute eingesetzt werden, bieten keine unkomplizierten Optionen, um alltägliche Aufgaben auszuführen. Sie ermöglichen keine kontextbasierte Kommunikation, mit der sich Probleme lösen lassen, und verfügen nicht über entscheidende Funktionalität. Dazu zählen z. B. die Möglichkeit, den Fokus auf relevante Daten einzuschränken, das Durchführen von Drilldowns, um zusätzliche Informationen zu erhalten, sowie die Vorhersage finanzieller Entwicklungen und das Modeling von Ergebnissen.
Tags : 
    
CA Technologies EMEA
Published By: 15five     Published Date: Jul 17, 2019
Everything you need to know about how to make Objectives and Key Results (OKRs) work at your company. Learn how to: • Manage like top execs from Salesforce and LinkedIn • Align OKRs with your vision • Create inspiring objectives • Build a holistic performance management practice
Tags : 
    
15five
Published By: Viavi Solutions     Published Date: Apr 14, 2017
At Viavi Solutions® we’ve had the benefit of observing a number of hybrid cloud deployments up close. All sectors of IT users from small to large enterprises, governmental groups, and even cloud service providers (CSPs) who themselves have begun to offer managed cloud services from third-party platforms—touch the hybrid cloud environment. CIOs, especially, face new challenges in deploying or expanding their enterprise presence in the cloud. This white paper examines four critical areas—migration, security, costs, and visibility—where CIOs can make major differences in the successful execution of hybrid cloud strategies. We’ve listed 20 fundamental questions CIOs can discuss with both their internal deployment groups and their external CSP/system integrator in preparation for a migration to or an expansion of hybrid cloud services.
Tags : 
cloud privacy, cloud security, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Viavi Solutions
Published By: Clarus Systems     Published Date: Mar 18, 2008
In this document, you'll learn to enable the successful execution and completion of IPT Deployment projects through a standardized set of processes and methodologies based upon Information Technology Infrastructure Library (ITIL) standards.
Tags : 
itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices, voice engineering, pdioo, strategies, deployment, operations, day 1, day 2, clarusipc, automated testing, business intelligence, performance management, configuration management
    
Clarus Systems
Published By: Business-Software     Published Date: Apr 02, 2009
With help desk automation, companies can increase collaboration and information-sharing among the various departments that play a role in customer satisfaction, including customer service, product development, and quality assurance, as well as field consultants and support staff. Additionally, help desk automation can tightly integrate both internal and external support processes. Learn more today!
Tags : 
itil, itsm, service management, help desk, automation, customer satisfaction, loyalty, retention, end-to-end
    
Business-Software
Published By: McAfee     Published Date: Dec 28, 2009
McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.
Tags : 
mcafee, cybersecurity, hackers, malware, security threats, trojan horses, virus protection, vulnerability assessments, vulnerability management, web application security
    
McAfee
Published By: SHL     Published Date: Dec 13, 2011
SHL's Global Assessment Trends Report provides human resources professionals and those interested in learning about global assessment practices a comprehensive look at how organizations around the world measure talent.
Tags : 
gatr, trends, trends report, global assessment trends, global assessment trends report, global assessments, talent measurement practices, talent measurement trends, people intelligence programs, people intelligence, global assessment practices, remote testing, social media, interview, selection, recruiting, hiring practices, talent management, workforce programs, human resources professionals
    
SHL
Published By: SumTotal     Published Date: May 24, 2013
Forrester Research, Inc.’s 2013 evaluation of Talent Management vendors against 57 criteria named SumTotal Systems a Leader and “the largest of the pure-play talent management vendors” (The Forrester Wave™: Talent Management, Q1 2013). Download the full report to jump-start your knowledge of the talent management solution landscape.
Tags : 
forrester, talent management, talent management solutions, talent management systems
    
SumTotal
Published By: Lumension     Published Date: Jan 22, 2013
Keeping track of 10,000+ of anything is a management nightmare. With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control
    
Lumension
Published By: Lumension     Published Date: Jan 22, 2013
With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control
    
Lumension
Published By: IBM     Published Date: Jan 09, 2015
IBM sponsored the and Ponemon Institute examined the actual costs of data breaches at 61 US companies and drew on the results of more than 500 interviews to reveal the true costs of data breaches today, from detection and escalation to customer churn. Read the analyst research to find out the average number of breached records per company, the real reasons most data breaches occur, the capital outlays that a breach requires, and the rate at which customers abandon companies after a breach occurs.
Tags : 
data breaches, data breach detection, business continuity management, malware
    
IBM
Published By: IBM     Published Date: Jul 31, 2015
Selecting MSS providers.
Tags : 
mss, security, management
    
IBM
Published By: IBM MaaS360     Published Date: Oct 27, 2014
Find the best EMM solution for your needs. Evaluate vendors based on customer satisfaction, ease of use and more. Learn about the BYOD and EMM landscape from top industry analysts in this in-depth research report.
Tags : 
maas360, fiberlink, ibm, emm solution, emm, enterprise mobility management, enterprise mobility management suites, byod, emm solution, mobility
    
IBM MaaS360
Published By: Teradata     Published Date: Feb 04, 2015
Optimize your customer experience with Teradata Integrated Marketing Cloud Teradata is recognized for vision, innovation and broad set of marketing capabilities. The 2014 Gartner Magic Quadrant for Integrated Marketing Management is an invaluable resource with insights that can help you execute your marketing initiatives.
Tags : 
teradata, integrated, marketing, vendors, executional, operational, analytical, campaign, management, resources, research, oracle, infor, microsoft, direxxis, sdl, repoint global, adobe, market, sap
    
Teradata
Published By: CEB     Published Date: Oct 21, 2014
The impact of information is changing and while this change provides great opportunities, it also presents greater risks. Traditional monitoring processes and technology advancements alone no longer deliver effective identification, management, and prevention of business risks, instead the changing impact of information demands early detection and root cause analysis. Learn how leading companies are magnifying exploitation of information security risks, along with advancing identification and protection of compliance risks.
Tags : 
corporate executive board, ceb, legal, risk, compliance, assurance teams, audit
    
CEB
Published By: CEB     Published Date: Dec 03, 2014
As cost and productivity expectations persist, many functions are rethinking the way their work gets done to remain both efficient and innovative. But not all business partners may welcome these kinds of transformations. To stay progressive, the best companies enable employees to exercise greater influence over internal clients and alter the entrenched views their function.
Tags : 
procurement insights, operations insights, productivity expectations, proactive business, procurement organizations, productive supplier partnerships, supplier relationship management, procurement leaders, procurement executives, operations professionals, operations leaders, operations executives
    
CEB
Published By: TheMarketingScope     Published Date: Jan 22, 2015
A results-focused, visual buyer’s guide that ranks the top vendors in the Content Management System industry.
Tags : 
bridgeline digital, bridgeline, cms, content management system, engagement, cms software
    
TheMarketingScope
Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Gartner evaluates nine vendors’ enterprise mobility management (EMM) solutions against 11 critical capabilities in the 2015 Critical Capabilities for Enterprise Mobility Management Suites report.
Tags : 
citrix, gartner, enterprise, mobility, management, mobility
    
Citrix Systems, Inc.
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.