it strategy

Results 2026 - 2050 of 2123Sort Results By: Published Date | Title | Company Name
Published By: Connectus     Published Date: Aug 21, 2009
This paper discusses both the benefits and the pitfalls of the increased focus on marketing measurement, and describes how a comprehensive Marketing Intelligence strategy can be used to report on the full spectrum of marketing activities.
Tags : 
marketing, email marketing, business intelligence, business analytics, analytics, analytical applications, marketing intelligence, direct response, connectus
    
Connectus
Published By: ICG Commerce     Published Date: Aug 21, 2009
This white paper examines how companies are successfully realizing benefits from their procurement initiatives and are viewing procurement as an integral part of their overall corporate strategy. They no longer perceive procurement as a cost center, but rather as a strategic lever for improving profits or funding new initiatives.
Tags : 
eprocurement, procurement, psp, procurement service provider, strategy, corporate strategy, icg commerce, icg
    
ICG Commerce
Published By: Preventsys     Published Date: Aug 21, 2009
Increased assessment, reporting and compliance requirements are going to be difficult to manage from year to year, and organizations without the right strategy, will face a significant increase in costs to audit and report on compliance annually.
Tags : 
compliance, regulatory compliance, fisma, security management, audit, auditing, security audit, vulnerability management, vulnerability assessment, vulnerability, preventsys
    
Preventsys
Published By: Secure Computing     Published Date: Aug 21, 2009
This paper outlines the types of threats that leverage the Internet as a means of delivery and the risks that they pose to your organization. Learn the key drivers of a corporate security policy and how you can protect against HTTP-based threats using Web filtering as part of a multi-layered content security strategy.
Tags : 
security, anti spyware, malware prevention, malware, access control, hacker detection, internet security, security management, web service security, secure computing, securecomputing
    
Secure Computing
Published By: Sybase     Published Date: Aug 21, 2009
This paper provides guidance on how companies should rethink their existing management and security strategy to effectively secure mobile solutions in the workforce, over a wide array of devices, connections and applications. It details why mobile security must be included as a mission critical component of any enterprise strategy and implemented on a pro-active basis before any major security breach has the opportunity to negatively affect the enterprise.
Tags : 
security management, mobile device, mobile security, wireless security, secure laptop, secure pda, secure blackberry, network security, compliance, sybase
    
Sybase
Published By: Third Brigade     Published Date: Aug 21, 2009
Businesses today are under intense pressure to open up their networks, comply with increasingly rigorous regulatory requirements, AND ensure their IT assets are protected from attacks. This white paper explores these security challenges and explains how host-based Intrusion Prevention Systems  play a critical role in an organization's overall security strategy.
Tags : 
intrusion prevention, security, network security, compliance, security compliance, attacks, hacker detection, ips, intrusion prevention system, security strategy, security management, third brigade
    
Third Brigade
Published By: Third Brigade     Published Date: Aug 21, 2009
Organizations that need to protect business critical applications, and sensitive data and hosts recognize that traditional network defenses can be readily bypassed by attackers. This white paper defines four key qualities of an effective host-based IPS.
Tags : 
intrusion prevention, network security, data protection, hacker detection, intrusion detection, ips, intrusion prevention systems, host-based ips, security strategy, third brigade
    
Third Brigade
Published By: TopLayer     Published Date: Aug 21, 2009
Enterprises without a sound intrusion prevention strategy across the three threat dimensions - undesired access, malicious content, and rate-based attacks - open the door to unacceptable risks and costs, especially from hybrid attacks.
Tags : 
intrusion prevention, network security, ips, access control, hacker, top layer, toplayer, 3-d multi-layered, multi-tiered, multi tiered
    
TopLayer
Published By: Junta42     Published Date: Aug 20, 2009
This Junta42 whitepaper shows you how to develop a content marketing strategy that positions your company as the expert. Learn how to create and distribute valuable content that will add to your bottom line, and turn prospects into loyal customers.
Tags : 
branding, content marketing, junta42, loyalty, zoomerang, branding, content development, editorial, b2b, behavioral, customer segment, media, content-specific
    
Junta42
Published By: SAP Inc.     Published Date: Jul 28, 2009
This paper presents the steps to swiftly and precisely execute a migration path using a specific set of solutions for successful mergers, acquisitions, and the divestitures that often result.
Tags : 
sap, mergers, acquisitions, divestitures, migration path, premerger assessment, post merger integration support, strategy management, mad
    
SAP Inc.
Published By: SAP Inc.     Published Date: Jul 28, 2009
Decision-making is at the core of all business activity, as executives set strategy and manage operations by weighing a vast array of factors to arrive at the desired balance of risk and reward. The enormous growth of companies' size and operations in recent years-particularly across borders-is making this process increasingly complex. It is cause for alarm, then, that executives themselves perceive the quality of decision-making at their companies as mixed at best.
Tags : 
sap, business intelligence, dashboards, analytics, decision-making
    
SAP Inc.
Published By: SAP Inc.     Published Date: Jul 28, 2009
Learn from today's sales leaders who have benefited from building a sales strategy based on a position of deep customer knowledge.
Tags : 
sap, sales organization, best-run, sales opportunity, sales strategy, customer database, crm, customer relationship management, actionable intelligence, business intelligence, sales cycle, americas’ sap users’ group, asug, talent, price and margin management, pmm
    
SAP Inc.
Published By: BMC ESM     Published Date: Jul 22, 2009
If your enterprise has multiple service desks in different geographies using disparate, disjointed tools and supporting diverse but possibly overlapping constituencies, you may be wasting hundreds of thousands of dollars every year. Service desk consolidation is a proven strategy for eliminating that waste.
Tags : 
service desk, consolidation, bmc, bmc software, itil, it infrastructure library, service, business service management, bsm, cobit
    
BMC ESM
Published By: Bulldog Solutions     Published Date: Jul 20, 2009
A call-to-action architecture helps you engage more prospects in conversations that could lead to closed sales. This white paper outlines a strategy to create a call-to-action architecture that sets your sales team up for a success.
Tags : 
conversion mapping, sales pipeline, prospects, call-to-action architecture, lead generation, sales engagement, conversion points, planning, btob, hosted solutions, on-premise, bulldog solutions, lead gen, nurture, convert, sales leads, bds
    
Bulldog Solutions
Published By: BMC ESM     Published Date: Jul 17, 2009
Are you looking for new inspiration to move forward with ITIL in these tough economic times? Join us as we talk with Erin Casteel, Solutions Architect with BMC Software and draw on Erin's wealth of experience as an ITIL consultant for tips on leading change in the organization. Learn how you can avoid reinventing the wheel, what it really means to sell ITIL in the organization, and why it pays to find opportunities in crises.
Tags : 
itil, bmc, tough times, economy, organization, software, iso, architecture, change, crises, recession, cost cutting, strategy, itil adoption, it infrastructure library
    
BMC ESM
Published By: BMC ESM     Published Date: Jul 17, 2009
If your enterprise has multiple service desks in different geographies using disparate, disjointed tools and supporting diverse but possibly overlapping constituencies, you may be wasting hundreds of thousands of dollars every year. Service desk consolidation is a proven strategy for eliminating that waste.
Tags : 
service desk, consolidation, bmc, bmc software, itil, it infrastructure library, service, business service management, bsm, cobit
    
BMC ESM
Published By: IBM ILOG.     Published Date: Jul 14, 2009
Much of the value of BRMS is achieved when it is combined with a larger SOA strategy and BPM. This video demonstrates clear requirements for reuse using the multichannel use case for retail banking.
Tags : 
ibm, brms, soa, bpm, video, demonstration, multichannel, banking, retail, customers
    
IBM ILOG.
Published By: LeapFrog Interactive     Published Date: Jul 09, 2009
For a brand's online destination to be effective, for its marketing message to connect with its audience, it has to be properly constructed. To reach this state, the right blending of interactivity, usability, and design needs to be determined and then achieved. Otherwise, a brand runs the risk of an off target, off-putting interactive experience.
Tags : 
leapfrog, utilize, interaction, usability, design, marketing, online, strategy, audience, experience, interactive, target
    
LeapFrog Interactive
Published By: LeapFrog Interactive     Published Date: Jul 09, 2009
A wise brand uses many marketing channels to reach its target audience. But a successful one will integrate its multi-channel efforts into one cohesive marketing campaign where all the parts work together to better each other's performance and drive the campaign to success. The following white paper breaks down why integrated marketing should be a strategy that a brand employs and offers some examples of what makes a successful integrated campaign run.
Tags : 
leapfrog, channel, integration, consumer, marketing, audience, performance, success, solution, white paper, strategy, campaign
    
LeapFrog Interactive
Published By: LeapFrog Interactive     Published Date: Jul 09, 2009
A brand's media strategy needs to be built on a solid foundation that is provided by an acute understanding of its target consumer base. Utilizing market research tools like those provided by MRI, comScore, and BuzzMetrics can help a brand build a well-defined understanding of its target audience's likes, dislikes, opinions, interests, and online habits. With this comprehension of its target audience in hand, a brand can then determine the best media strategy to engage for its interactive marketing campaign.
Tags : 
leapfrog, target, drive, strategy, market, research, market research, data, consumer, mri, comscore, buzzmetrics, audience, brand, campaign, advertising
    
LeapFrog Interactive
Published By: HP     Published Date: Jul 08, 2009
Today's economic climate has heightened the goal of every IT department to provide high-quality IT service to the business, at the lowest possible cost, while improving business outcomes. Looking outside of the infrastructure itself, there are two key challenges related to data storage: provisioning capacity for applications and reducing risk through a sound data protection strategy. This white paper discusses the challenges of creating the right storage infrastructure, provides an overview of data storage options, and examines a storage solution that combines blade servers and network-attached storage.
Tags : 
storage, storageworks, hp bladesystem, server, infrastructure, nas, network-attached storage, blade servers, data protection, san, fibre channel, iscsi, serial attached scsi, sas, proliant, msa, disk arrays, ethernet, rack, servers
    
HP
Published By: HP     Published Date: Jul 08, 2009
Data is the backbone of every organization. No matter the business, industry, or size, reliable data access is essential to operations. Should a "worst-case scenario" occur, being prepared with an appropriate disaster recovery strategy is essential. Given the potential high cost associated with data loss, reliable data protection is no longer an option; rather, it is an obligation. This white paper discusses a data protection strategy that takes into consideration the business environment, offering sophisticated features while maintaining simplicity, affordability, and reliability.
Tags : 
storage, data protection, reliability, reliable, disaster recovery, business protection, business continuity, storageworks, rto, rpo, recovery time objective, recovery point objective, tape, lan, san, das, direct attached storage, rdx, d2d, disk to disk
    
HP
Published By: SAP     Published Date: Jun 23, 2009
Is your company seeking to incorporate finance as a core line of business? This SAP Executive Insight examines the changing role of the finance organization in today's business environment - and describes how companies can develop best-run finance organizations.
Tags : 
finance, sap, business realities, best-run finance organizations, executive insight, sox, agile, metric, asug, optimization, streamline, gruma, closed-loop process, strategy, expertise –based activities, erp, financials, financial performance, value engineering, grc
    
SAP
Published By: SAP Inc.     Published Date: Jun 16, 2009
Take a look at how organizations are taking strides to align business strategy with actual initiatives, projects, and daily activities - in short, to close the gap between strategy and execution. Studies show that even well-formulated plans often fall short; here's how to change that.
Tags : 
sap, enterprise performance, strategy management, managing initiatives
    
SAP Inc.
Published By: SAP Inc.     Published Date: Jun 16, 2009
CRM is a business strategy that helps organizations cope with three of today´s most urgent business imperatives generating new growth, attaining operational excellence and enhancing competitive agility.
Tags : 
crm, customer relationship management, customer centric, customer-centric, customer service, service, retention, loyalty, growing, growth, profitable, profitability, sapservice, service, retention, loyalty, growing, growth, profitable, profitability
    
SAP Inc.
Start   Previous    71 72 73 74 75 76 77 78 79 80 81 82 83 84 85    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.