info systems

Results 251 - 275 of 311Sort Results By: Published Date | Title | Company Name
Published By: Tact     Published Date: Sep 06, 2016
Did you know that sales reps typically waste up to 16 hours per week on non-selling tasks? If your sales team is spending too much time on non-selling tasks, logging sales activities to Salesforce, hunting for customer information and documents, or copy-pasting data between separate systems, they might resist the rise of mobile CRM solutions like Salesforce1. However, it’s important to figure out how to enable these teams in the field, as 55% of salespeople will access sales applications exclusively through smartphones or tablets by the end of 2016. It’s not surprising that salespeople will increase their use of mobile apps 125% from 2015-2017. In this whitepaper from Tact, you’ll learn 1) common challenges facing field sales teams, 2) a framework for thinking about mobile sales productivity, 3) essential characteristics for evaluating mobile sales solutions, and 4) key trends in mobile sales.
Tags : 
salesforce, salesforce.com, crm, sales productivity, sales enablement, salesforce adoption, crm adoption, sales management, crm best practices, salesforce best practices, mobile applications, field sales, mobile field sales, tactile, tact, chuck ganapathi
    
Tact
Published By: SAS     Published Date: Aug 04, 2016
Banks have been using credit scoring models for over five decades, so managing the life cycle of models is nothing new. Most have had some kind of process in place to ensure the models they develop are robust, validated and monitored from a performance perspective and that decision makers have confidence in them. In recent times, however - partly in response to the credit crisis in 2008 - the discipline of model risk management (MRM) has become more formalized and rigorous, driving the need for enterprise-level model information management systems. The regulatory scrutiny being applied to them is intensifying and spreading globally, with US and European regulators leading the charge. For example, whereas regulators were previously more interested in the numbers they were provided, now more regulators want to have a core understanding of the models banks used to generate these numbers.
Tags : 
best practices, risk management, finance, security, info systems
    
SAS
Published By: Symantec Corporation     Published Date: Jun 18, 2014
Information security professionals who want to want to understand how to protect their systems from Heartbleed vulnerability should read this paper!
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
Symantec Corporation
Published By: VMware/Intel Server Refresh and Cost Savings     Published Date: Oct 23, 2007
Today's use of virtualization technology allows IT professionals to automatically manage the resources of the physical server to efficiently support multiple operating systems, each supporting different applications. This IDC Technology Assessment presents IDC's view of how virtualization technologies are impacting and will continue to impact operating environments and the operating environment market near- and long-term.
Tags : 
vmware, operating environments, virtualization, x86, server virtualization, data center, fc san, fibre, networkattached storage, nas, nic, high availability, vmware consolidated backup, vcb, vdc os, tco, total cost of ownership, vstorage, distributed power management, dpm
    
VMware/Intel Server Refresh and Cost Savings
Published By: RiskWatch     Published Date: Jan 23, 2007
The single most important trend in security in the next ten years will be the integration of various security elements such as information security, physical security and integrated systems security into a single security function.
Tags : 
physical security, network security, security management, cso, chief security officer, security integration, riskwatch
    
RiskWatch
Published By: CA Technologies     Published Date: Jun 01, 2018
Thanks to numerous, headline-making incidents in recent years, cybercrime has risen toward the top of the concern list for many organizations—and the customers with whom they do business. You’ve heard many of the stories. Major health insurers, such as Anthem, Premera BlueCross and CareFirst had personal information for millions of their customers stolen. Sony Pictures experienced a breach that not only embarrassed employees and adversely impacted the release of the high-profile film, “The Interview,” but also damaged systems and applications—making it extremely difficult for the company to conduct business. The list goes on. Some you maybe haven’t heard, like the one about CodeSpaces, a provider of version management services to developers. When attackers were able to gain access to its cloud-based management consoles, they deleted the company’s entire infrastructure and backups—ultimately forcing CodeSpaces out of business. The bad news for organizations like yours is, thanks to the
Tags : 
    
CA Technologies
Published By: IBM     Published Date: Jan 27, 2017
A solid information integration and governance program must become a natural part of big data projects, supporting automated discovery, profiling and understanding of diverse data sets to provide context and enable employees to make informed decisions. It must be agile to accommodate a wide variety of data and seamlessly integrate with diverse technologies, from data marts to Apache Hadoop systems. And it must automatically discover, protect and monitor sensitive information as part of big data applications.
Tags : 
    
IBM
Published By: Mimecast     Published Date: Feb 13, 2017
Mimecast has seen firsthand that not all email security systems perform equally well. But, until now, we’ve lacked the comparative data to prove our perceptions. In order to address this head-on, Mimecast has launched the Email Security Risk Assessment (ESRA). The Mimecast ESRA has three goals: 1. To test the Mimecast cloud security service against an individual organization’s incumbent email security system. To help the organization understand the relative efficacy of the security systems and to see the number, type and severity of email-borne threats that are currently getting into the organization. 2. To inform the security industry with hard data on the effectiveness of various commonly-deployed email security systems. 3. To inform the security industry with hard data regarding the number, type and severity of email-borne threats that are being actively used in attacks. Download Now!
Tags : 
mimecast, email. esra, email security, cloud security
    
Mimecast
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Enterprise chief information security officers (CISOs) are seeking ways to leverage existing security investments to bridge the divide between largely siloed security systems. The focus is on reducing the number of consoles needed to manage the security infrastructure. Network security vendors have a significant role to play in bridging the communication gap between these systems. The creation of a unified defense architecture enables threat data exchange between existing security systems. It helps automate the process of raising an organization's security posture when a security infrastructure component detects a threat. The following questions were posed by Fortinet to Robert Ayoub, program director in IDC's Security Products program, on behalf of Fortinet's customers.
Tags : 
    
Fortinet EMEA
Published By: IBM     Published Date: Sep 18, 2008
IBM conducted an in-depth assessment to identify vulnerabilities in New Hanover Health Network's information security practices, with emphasis on their auditing activity and capabilities. This white paper will explain how IBM helped them implement a series of best practices, thereby improving the confidentiality, integrity, and availability of their information systems.
Tags : 
ibm, ibm mmdg, hipaa, hippa, healthcare, health care, compliance, privacy, patient, patient privacy
    
IBM
Published By: IBM     Published Date: Feb 04, 2015
Read this white paper to discover how to: Accelerate the flow of messages throughout your organization and extend business value outward to smart devices and mobile phones. Create a more-responsive business by supporting rapid, reliable, and secure transport of information between your applications, systems and services. Reduce cost when you diminish complexity and reduce maintenance. Take action to drive
Tags : 
application systems, application services, it solutions, application complexity
    
IBM
Published By: Tealium     Published Date: Mar 12, 2014
“The Rise of Data Activism: How Digital Data Distribution Platforms (D3P) Enable Marketers to Act on Their Data” discusses how marketers can solve the optimization gap and leverage new solutions to take action on their most actionable audience segments in real time.
Tags : 
tealium, big data, data analytics, business analytics, information technology, data distribution, tag management systems, digital data distribution platform, d3p, marketing, data, data activism, data consolidation, digital marketing
    
Tealium
Published By: TIBCO Software     Published Date: Aug 02, 2019
As an insurer, the challenges you face today are unprecedented. Siloed and heterogeneous existing systems make understanding what’s going on inside and outside your business difficult and costly. Your systems weren’t set up to take advantage of, or even handle, the volume, velocity, and variety of new data streaming in from the internet of things, sensors, wearables, telematics, weather, social media, and more. And they weren’t designed for heavy human interaction. Millennials demand immediate information and services across digital channels. Can your systems keep up?
Tags : 
    
TIBCO Software
    
Ciena
Published By: Imprivata     Published Date: Aug 21, 2009
When the U.S. Congress passed the Health Insurance Portability and Accountability Act (HIPAA) of 1996, among the law's many provisions was the establishment of formal regulations designed to protect the confidentiality and security of patient information. In addition to mandating new policies and procedures, the HIPAA security regulations require mechanisms for controlling access to patient data on healthcare providers' information technology (IT) systems.
Tags : 
password management, enterprise single sign on, enterprise single sign-on, single sign on, single sign-on, esso, sso, hipaa, hipaa compliance, regulatory compliance, authentication, imprivata
    
Imprivata
Published By: IBM     Published Date: Feb 27, 2014
Organizations developing products and systems in industries such as automotive, aerospace and defense, medical devices and consumer electronics are undergoing a transformation driven by the rapid growth in functionality delivered by software and electronics. This paper outlines an approach for using this shift to gain a competitive advantage.
Tags : 
ibm, ibm software, systems engineering, business agility, smart products, traceability, engineering information, collaboration, engineering disciplines, business objectives, change management, compliance standards, systems age, engineering process, information integration, communication
    
IBM
Published By: Tidal Software     Published Date: Sep 03, 2008
Staples’ information systems play a critical role in delivering on their brand promise 'that was easy.' As part of a recent strategic imperative, Staples recently embarked on a major modernization of its systems architecture and supporting processes. The goal was to ensure IT’s systems could scale with the company’s continued global expansion without sacrificing the quality of the brand experience. One critical target for modernization was Staples’ enterprise job scheduling processes and systems. After researching the top software providers in this space, Staples selected Tidal Software to support its efforts to centralize and streamline automated batch processing.
Tags : 
job scheduling roi, tidal scheduler, enterprise scheduling roi, systems management tools, batch processing, systems architecture, tidal, tidal software
    
Tidal Software
Published By: IBM     Published Date: Nov 17, 2009
This report describes a study of attempts by organizations to improve decision-making through the use of information, among other interventions.
Tags : 
ibm, organizational performance, business information systems, decision making, automating process, process efficiency, leveraging info
    
IBM
Published By: EMC Corporation     Published Date: Mar 20, 2014
To develop the visibility, agility and speed to deal with advanced threats, security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics.
Tags : 
emc, siem, security transformation, malware detection, malware threats, big data security platform, incident detection, advanced security analysis
    
EMC Corporation
Published By: RSA Security     Published Date: Oct 24, 2013
To develop the visibility, agility and speed to deal with advanced threats, security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics.
Tags : 
rsa, emc, secuirty, warning, threat, analytics
    
RSA Security
Published By: Red Hat     Published Date: Sep 08, 2017
TransUnion, a leading global risk and information solutions provider, used mainframe computers to support its global business. To improve IT performance and costs, the company launched an initiative, Project Spark, to migrate all of its applications and systems to a Red Hat® operating environment. With the new infrastructure—based on Red Hat Enterprise Linux®, Red Hat JBoss® Middleware, and other Red Hat products—TransUnion achieved faster time to market, greater competitive advantage, improved employee satisfaction, and significant operating cost savings.
Tags : 
    
Red Hat
Published By: Mainline Information Systems     Published Date: Oct 27, 2009
View this webcast to learn about tuning for Oracle from an AIX administrative perspective. This session covers basic topics on AIX performance tuning including memory; starter set of tunables; page space; and memory tuning.
Tags : 
aix, mainline information systems, oracle, memory, tunables, page space
    
Mainline Information Systems
Published By: Mainline Information Systems     Published Date: Oct 27, 2009
View this webcast to learn about tuning for Oracle from an AIX administrative perspective. This session covers operating system related topics including Oracle and disk; volume groups and file systems; asynchronous and concurrent I/O; and Oracle AWR.
Tags : 
aix, mainline information systems, oracle, tuning, disk
    
Mainline Information Systems
Published By: Netsuite DWASF Leads Display Q1 2015     Published Date: Feb 03, 2015
Download this new white paper to learn the secrets to success from finance leaders at high-growth companies such as Glassdoor, SmugMug, Solar Universe and Harmony Information Systems and how they have leveraged the cloud to support their tremendous growth.
Tags : 
finance, cloud financials, high-growth companies, information systems
    
Netsuite DWASF Leads Display Q1 2015
Published By: Netsuite DWASF Leads Display Q1 2015     Published Date: Jun 10, 2015
Download this new white paper to learn the secrets to success from finance leaders at high-growth companies such as Glassdoor, SmugMug, Solar Universe and Harmony Information Systems.
Tags : 
business management software, cloud erp, erp, business software, accounting software, business accounting software, cloud financials, small business software, enterprise software, saas, cloud, integrated software solutions, cloud computing, business software solutions, integration platform, business growth, international expansion, integrated platform, business management suite
    
Netsuite DWASF Leads Display Q1 2015
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.