business

Results 13826 - 13850 of 15579Sort Results By: Published Date | Title | Company Name
Published By: ASG Software Solutions     Published Date: Nov 03, 2008
The Information Technology Infrastructure Library (ITIL) provides guidance for the management of IT, and has quickly become the worldwide standard for IT Service Management (ITSM).
Tags : 
asg, sla, cmdb, bsm, metadata, itsm, metacmdb, lob
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Jul 27, 2009
To meet the challenges of intense competition and increasing customer demands, companies must tightly align their IT service management with business issues and priorities. This paper outlines the maturity steps involved in the progression towards proactive Business Service Management (BSM) and explains how ASG's metaCMDB helps secure its seamless adoption.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, configuration management, metadata
    
ASG Software Solutions
Published By: Tenable     Published Date: Feb 07, 2018
While multinational companies can likely meet some of the GDPR requirements right now, most will find the path to full compliance requires many changes to business-as-usual security practices. Read this paper to learn how you should be preparing your information security program for compliance with the GDPR. Written for InfoSec leaders, the paper includes: - A glossary outlining key concepts of the Regulation - 13 essential steps you should take to help ensure GDPR compliance - A summary of infosec considerations posed by the EU Data Protection Directive 95/46/EC and GDPRD
Tags : 
security frameworks, compliance, iso 27000, cis controls, nist, pci, security regulation
    
Tenable
Published By: Workday UK     Published Date: Nov 12, 2019
Did you know 35% of CFOs report they have little involvement or are barely involved in commercial decision-making? How effective is your business partnering? FSN Publishing surveyed more than 660 global finance executives on their approach to business partnering. Read the report to see how you compare.
Tags : 
workday, workforce technology, digital strategy
    
Workday UK
Published By: Workday     Published Date: Nov 12, 2019
Did you know 35% of CFOs report they have little involvement or are barely involved in commercial decision-making? How effective is your business partnering? FSN Publishing surveyed more than 660 global finance executives on their approach to business partnering. Read the report to see how you compare.
Tags : 
workday, workforce technology, digital strategy
    
Workday
Published By: Network Automation     Published Date: Dec 02, 2008
Rapid development and deployment of automation to eliminate repetitive,labor intensive, and computer related tasks throughout the enterprise.
Tags : 
network automation, business process automation, automation deployment, networking, it management
    
Network Automation
Published By: ttec     Published Date: Jul 24, 2019
The pace of automation in the contact center is accelerating as it moves from IVR and routing to artifi cial intelligence and bots. With the digitization of contact center operations, the status quo is being upended. Technological advances in robotic process automation (RPA), AI, and machine learning (ML) for both customer and employee interactions are literally changing the face of customer care. Simple, repetitive tasks don’t need a person to do them anymore. Chatbots and self-service knowledgebases put the control in customers’ hands to resolve their own issues quickly. Information from across the business can more easily be accessed, integrated, and analyzed to streamline backoffi ce and customer-facing functions. Companies are creating digital worker factories that leverage AI and ML to improve their business.
Tags : 
    
ttec
Published By: Cisco Umbrella EMEA     Published Date: Jan 24, 2020
"We live and surf in a cyber world where attacks like APT, DDOS, Trojans and Ransomware are common and easy to execute. Domain names are an integral part of any business today and apparently an integral part of an attacker's plan too. Domain names are carriers of malwares, they act as Command and Control servers and malware's ex-filtrate data too. In today's threat landscape - predicting threats, spotting threats and mitigating them is super crucial.. This is called Visibility and Analytics. Watch this on demand session with our Cisco cloud security experts Shyam Ramaswamy and Fernando Ferrari as they talk about how Cisco Umbrella and The Umbrella Research team detect anomalies, block threats and identify compromised hosts. The experts also discuss how effectively Cisco spot, react, filter out IOC, block the network communications of a malware; identify and stop a phishing campaign (unknown ones too). "
Tags : 
    
Cisco Umbrella EMEA
Published By: McAfee Inc     Published Date: Aug 19, 2009
Anti-virus by itself is no longer enough to protect endpoints, especially in this age of mobile devices and business users on the go. This brief explains the key benefits of implementing an endpoint security solution with McAfee. Read more.
Tags : 
mcafee, security, malware, compliance, cyber criminals, midmarket, encryption, security tools
    
McAfee Inc
Published By: McAfee Inc     Published Date: Aug 19, 2009
Most midsized businesses aren't fully aware of the number of vulnerabilities that exist on their networks. Is it possible to address them all? This brief explains the key benefits of implementing a network security solution with McAfee. Read more.
Tags : 
mcafee, email protection, midsize, hackers, security, data protection
    
McAfee Inc
Published By: McAfee Inc     Published Date: Aug 19, 2009
Email is an indispensible tool for businesses today, but it's also a favorite vehicle for spammers and cybercriminals. This brief explains the key benefits of implementing an email security solution with McAfee. Read more.
Tags : 
mcafee, email protection, midsize, global threat intelligence, security, data protection
    
McAfee Inc
Published By: Panaya     Published Date: Aug 26, 2016
In the era of digital transformation, where the speed of change requires business processes to be agile, change with evolving business context and respond to existing and emerging competition - organizational culture and large-scale business processes are still resistant to change. This Panaya whitepaper provides a practical "to-do" list that can help facilitate change and keep your ERP current.
Tags : 
panaya, erp, enterprise resource planning, digital, digital ready, erp systems, digitalization, digital transformation
    
Panaya
Published By: McAfee     Published Date: Feb 06, 2013
How do rogue programs work - and how do you protect yourself and your business? Three best practices to keep these unwanted programs out of your networks.
Tags : 
fake alerts, fake anti-virus, rogue programs, rogue applications, scareware, endpoint url filtering, web gateway, anti virus
    
McAfee
Published By: IBM Software     Published Date: Jul 19, 2011
In this white paper, you'll read why traditional planning and forecasting processes are not enough in today's environment. And, you'll learn about the three capabilities that form the foundation of modern, dynamic planning and forecasting processes. If you want to move beyond the traditional finance role and play a more visible, pro-active role in supporting business decision making, read this white paper today.
Tags : 
cognos, business intelligence, business intelligence software, business intelligence solution, corporate performance management, ibm
    
IBM Software
Published By: IBM     Published Date: Apr 23, 2013
The current business environment is still characterized by skittishness, tenuous demand and sporadic growth. It’s no surprise then, that 60% of CFOs plan to make major changes to critical finance practices and processes, according to the 2010 IBM Global CFO Study. In fact, 70% of CFOs claim to be taking a more prominent role in enterprise decision making beyond the traditional role of finance. Yet many CFOs admit to significant gaps in their ability to deliver on this expanded agenda, particularly in their ability to measure and monitor business performance. The IBM study found that those companies that invest in capabilities to expand their business insight are better able to anticipate and react to the unpredictable external forces affecting the economy.
Tags : 
dynamic planning, forecasting, financial forecasting, finance, cfo, enterprise
    
IBM
Published By: IBM     Published Date: Nov 19, 2012
Learn how enterprise planning and analysis solutions powered by IBM Cognos 10 are uniquely suited to support timely, reliable forecasts and plans with key analysis, modeling and participation capabilities, paving way to better business choices.
Tags : 
ibm, analysis, dynamic planning, forecasting, ibm cognos 10, knowledge management, data management, data center
    
IBM
Published By: IBM     Published Date: Sep 27, 2013
Today’s economy is widely characterized by skittishness and uncertainty about the future. The effect that unpredictable external forces can have on the economy can leave many business leaders feeling helpless. This fact was demonstrated in the IBM Global CFO Study, where many CFOs admitted that they lacked the ability to measure and monitor business performance effectively. The same study also found that the companies who invested in their business insight capabilities were better able to anticipate and react to external economic forces. IBM Cognos software can provide businesses with the business insight they need to be prepared, not scared. Cognos software allows businesses to analyze performance, model business strategies and processes, and contribute to a common set of business objectives.
Tags : 
ibm, ibm cognos software, dynamic planning, forecasting, analysis, financial planning, business insight, it management
    
IBM
Published By: Ciber     Published Date: Jun 22, 2016
Download this paper to find out how Implementing a digital transformation project can certainly offer numerous benefits to a banking organisation.
Tags : 
digital, digital banking, digital banking experience, banking organisation
    
Ciber
Published By: IBM     Published Date: Apr 09, 2015
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : 
ibm, cloud, social business, big data, data security, data protection, privacy, security
    
IBM
Published By: IBM     Published Date: Apr 06, 2016
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : 
ibm, data security, risk management, big data, security
    
IBM
Published By: IBM     Published Date: Feb 27, 2014
Organizations developing products and systems in industries such as automotive, aerospace and defense, medical devices and consumer electronics are undergoing a transformation driven by the rapid growth in functionality delivered by software and electronics. This paper outlines an approach for using this shift to gain a competitive advantage.
Tags : 
ibm, ibm software, systems engineering, business agility, smart products, traceability, engineering information, collaboration
    
IBM
Published By: IBM     Published Date: Apr 15, 2014
Organizations developing products and systems in industries such as automotive, aerospace and defense, medical devices and consumer electronics are undergoing a transformation driven by the rapid growth in functionality delivered by software and electronics. This paper outlines an approach for using this shift to gain a competitive advantage.
Tags : 
ibm, product development, systems development, it engineering, business objectives, traceability, collaboration, software development
    
IBM
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Privileged access management can not only reduce your enterprise’s exposure to these risks but also improve IT reliability and reduce IT costs. Download the white paper: Three Important Reasons for Privileged Access Management (and One Surprising Benefit). You’ll discover how a privilege access management solution can ensure: • Comprehensive compliance such as the Sarbanes-Oxley Act for responsible governance. • Ensure business integrity and responsible business processes. • Tackle security risks, both inside and outside the organization. • Realize bottom-line IT cost benefits.
Tags : 
privileged access management, it cost benefits, comprehensive compliance, business processes, it reliability, it management
    
Centrify Corporation
Published By: Cisco     Published Date: Jan 29, 2009
Traditional purchasing habits and brand loyalties are a thing of the past. They've grown accustomed to shopping and interacting with businesses over the Internet. They want personalized service and satisfying experience. Learn what you can do to keep up with these trends.
Tags : 
cisco, website enhancements, customer experience, web 2.0, pet scan, rss feed, rich product content, live chat
    
Cisco
Published By: Dell EMC     Published Date: Oct 30, 2019
As data volumes grow larger every year, businesses that adopt more sophisticated approaches to storing and deriving value from that data benefit in terms of performance, scalability, and cost. How do you migrate effectively to the latest storage and infrastructure technologies, while also mitigating the associated disruption and risk? Download this overview from Dell EMC and Intel® to learn more.
Tags : 
    
Dell EMC
Start   Previous    547 548 549 550 551 552 553 554 555 556 557 558 559 560 561    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.