discover

Results 301 - 325 of 1889Sort Results By: Published Date | Title | Company Name
Published By: Workday UK     Published Date: Mar 20, 2019
New research reveals there’s a digital disconnect in many organisations – with the gap widening between the needs of digital leaders, and the ability of core business systems to support broader digital transformation programmes. Several critical challenges include: • 80% say they can’t integrate new digital solutions with existing finance and HR processes, or it requires effort to do so • 80% say they can’t get real-time forecasts and dashboards, or it requires effort to do so • 80% say they find it difficult or impossible to adapt finance and HR processes to new requirements Download now to learn how you can successfully drive digital transformation at scale – and avoid the dreaded digital deadlock.
Tags : 
workday, workforce technology, digital strategy
    
Workday UK
Published By: bChannels     Published Date: Dec 11, 2018
For many years, organizations thought about business continuity in much the same way they thought about business insurance — yes, it was important, but rarely was it top of mind. But that’s all changed. Many organizations have, unfortunately, discovered that even a scant few minutes of service downtime can have deleterious effects on their business operations, resulting in lost revenue, diminished customer confidence and heightened compliance risk. For those and other reasons, IT executives have raised the bar on business continuity preparedness for their organizations in all ways. New technologies, business processes and partnerships, combined with a raised level of importance for testing and a full appreciation of what virtualization can and can’t do for business continuity, are essential to new thinking around avoiding the impact of an unplanned service interruption. Download this informative Whitepaper to learn more about how Veritas Netbackup 8.1.2 can help.
Tags : 
    
bChannels
Published By: Workday     Published Date: Feb 04, 2019
New research reveals there’s a digital disconnect in many organisations – with the gap widening between the needs of digital leaders, and the ability of core business systems to support broader digital transformation programmes. Several critical challenges include: • 80% say they can’t integrate new digital solutions with existing finance and HR processes, or it requires effort to do so • 80% say they can’t get real-time forecasts and dashboards, or it requires effort to do so • 80% say they find it difficult or impossible to adapt finance and HR processes to new requirements Download now to learn how you can successfully drive digital transformation at scale – and avoid the dreaded digital deadlock.
Tags : 
workday, workforce technology, digital strategy
    
Workday
Published By: WNS     Published Date: Jun 21, 2017
Making key decisions that improve business performance requires more than simple insights. It takes deep data discovery and a keen problem solving approach to think beyond the obvious. As a business leader, you ought to have access to information most relevant to you that helps you anticipate potential business headwinds and craft strategies which can turn challenges into opportunities finally leading to favorable business outcomes. WNS DecisionPoint , a one-of-its kind thought leadership platform tracks industry segments served by WNS and presents thought-provoking original perspectives based on rigorous data analysis and custom research studies. Coupling empirical data analysis with practical ideas around the application of analytics, disruptive technologies, next-gen customer experience, process transformation and business model innovation; we aim to arm you with decision support frameworks based on points of fact.
Tags : 
cost of goods solid, warehousing and logistics, advertising and promotion, rent, electricity and utilities, floor staff, depreciation, system costs
    
WNS
Published By: Proofpoint     Published Date: Aug 10, 2017
With data breaches at an all-time high, the time is now for organisations to identify and protect all personal EU data, and drive towards compliance to the GDPR–failure to do so will lead to significant disruption of business. What’s more, adhering to a compliance and standards based framework can ultimately help the business attract and retain more customers. In the case of the GDPR, compliance demonstrates the organisation’s investments in security, privacy, and customer care.
Tags : 
data audit, eu data, vendor risk, organisation, technology, archive management, messaging, content protection
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected.
Tags : 
advanced threats, e-discovery, compliance, rapid response, office 365, email controls, archiving, customer support
    
Proofpoint
Published By: Workday Netherlands     Published Date: Mar 20, 2019
New research reveals there’s a digital disconnect in many organisations – with the gap widening between the needs of digital leaders, and the ability of core business systems to support broader digital transformation programmes. Several critical challenges include: • 80% say they can’t integrate new digital solutions with existing finance and HR processes, or it requires effort to do so • 80% say they can’t get real-time forecasts and dashboards, or it requires effort to do so • 80% say they find it difficult or impossible to adapt finance and HR processes to new requirements Download now to learn how you can successfully drive digital transformation at scale – and avoid the dreaded digital deadlock.
Tags : 
workday, workforce technology, digital strategy
    
Workday Netherlands
Published By: Rackspace     Published Date: Feb 01, 2019
Whether you’re already a Google customer or simply getting started with the public cloud, Google Cloud Platform (GCP) is an aordable, reliable, innovative and intuitive cloud solution. Rackspace can help you accelerate innovation and cost savings by taking over the intensive dayto-day operations of GCP — letting you focus on achieving your core business objectives while optimizing the performance of your applications. Rackspace works with customers to identify the scope and criticality of their applications and determine the service level that best addresses their needs. To discover how, download this whitepaper today.
Tags : 
    
Rackspace
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: VMware     Published Date: Apr 09, 2019
With the right HCI solution, IT teams can lower costs, increase agility and reduce complexity. Adoption rates for HCI continue to soar – now expected to grow at a compound annual rate of 42% through 2023. If you’ve yet to make the transition to HCI or research its benefits, discover these 5 HCI Use Cases for 2019 – and Beyond.
Tags : 
    
VMware
Published By: Gigamon     Published Date: Feb 20, 2019
Stop deploying cyberthreat prevention tools in detection mode. Get “Scaling Inline Threat Prevention Tools” to learn the benefits of an inline bypass architecture. Learn how inline bypass removes failure points by automatically distributing traffic to the right security tools, keeping both traffic and protection up and running. Discover how you can add, remove, and upgrade security tools at the speed of your network to maximize threat prevention, security resilience, and network uptime. Get the paper.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Feb 20, 2019
Upgrading your network doesn’t have to be a big headache. Get the Securosis report Scaling Network Security and scale security controls and policy without starting over. Discover your options for improving security architecture on your terms, using existing infrastructure and intelligently applying security controls at scale without major overhauls. With this approach, your network protection can evolve with applications, attackers and technology—even in today’s demanding 100Gbps network environment.
Tags : 
    
Gigamon
Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
View this paper to discover the top 5 malware delivery networks and explore how Blue Coat web security solutions powered by can protect networks.
Tags : 
malware, delivery, protect, security, security solutions, networks, delivery networks, firewalls, anti-virus, threats, solutions, webpulse, defense, cloud
    
Blue Coat Systems UK
Published By: Success Factors     Published Date: Feb 16, 2012
With today's shortage of critical talent, strategic workforce planning is one of HR's most important responsibilities. Discover the common pitfalls that trap many companies-and how to avoid them. Get your compliments report from SuccessFactors now.
Tags : 
employee performance, high performance culture, high performing workforce, smart goals, performance reviews, goal setting, performance management, business strategy, business execution, strategy execution, business strategy software, business results, talent management, learning management, recruiting management, workforce planning, workforce analytics, succession planning, compensation, core competencies
    
Success Factors
Published By: Lieberman Software     Published Date: Mar 27, 2012
Download "Privileged Identity Management: An Executive Overview" to learn where privileged identities can be found on your network; the challenges to discover, secure and manage them; and why unsecured privileged account credentials are dangerous.
Tags : 
privileged identity management, enterprise password management, administrator access control, privilege account management, security management, it security audit, enterprise security
    
Lieberman Software
Published By: Teradata     Published Date: Oct 15, 2012
Does your organization struggle to get new business insights from all data types with rapid exploration?
Tags : 
data scientists, analyst, statistician, quants, quantitative analyst, scientist, data science
    
Teradata
Published By: Teradata     Published Date: Jan 30, 2015
Data from the Internet of Things makes an integrated data strategy more vital than ever.
Tags : 
teradata, internet, things, iot, data, warehouse, analytics, patchwork, value, development, integration, supply chain, inventory, sales, market demand, channel partners, deployment, hadoop, aster, discovery
    
Teradata
Published By: Symantec     Published Date: Dec 19, 2012
We recommend this analyst report for anyone considering an investment in an archive solution.
Tags : 
information archiving, enterprise, magic quadrant, e-discovery, compliance, storage
    
Symantec
Published By: BMC Software     Published Date: May 01, 2015
Complex hybrid environments can make it difficult to track interdependencies, increasing the risk of disrupting critical business services. In this research paper by EMA, you’ll learn how application discovery and dependency mapping can help you: • Meet granular targets for availability, cost, and time-to-revenue for cloud services • Accelerate mean time to repair (MTTR) while communicating better with stakeholders • Manage even the most complex hybrid environments more efficiently and effectively • Understand the impact of proposed changes and potential security risks to guide decision-making
Tags : 
hybrid environments, critical business services, mean time to repair, potential security risks, decision-making, cloud optimization, visibility and performance
    
BMC Software
Published By: Infomatica     Published Date: Mar 05, 2014
Knowing more about a customer’s relationship with your financial services company is key for growth. Discover how emerging data tools can help you improve customer centricity and find new revenue opportunities, unlocking the value of customer information.
Tags : 
improving revenue, customer experience management, financial services, best practices, customer information, solutions
    
Infomatica
Published By: Dun & Bradstreet     Published Date: Jun 08, 2016
THE B2B MARKETERS GUIDE TO THE WORLD OF PROGRAMMATIC ADVERTISING While some in the B2B world are quickly jumping on the programmatic advertising bandwagon, many more don’t know the first thing about it or what the benefits are. That’s probably why you’re checking out this nifty little guide right now. Whether you’re a beginner with a basic curiosity about programmatic, or you have already executed a programmatic ad buy but want to learn more, you’ve come to the right place. After skimming through the pages of this book, you’ll learn exactly what programmatic is, why you need it, how it works, and why there’s no looking back when planning you’re next great ad campaign. You’ll discover exactly why Programmatic Matters.
Tags : 
    
Dun & Bradstreet
Published By: NetApp     Published Date: Nov 13, 2017
Are misperceptions preventing your company from taking advantage of the cloud? Discover why common objections to cloud backup are based on myths rather than reality.
Tags : 
    
NetApp
Published By: NetApp     Published Date: Nov 13, 2017
This easy to read eBook provides an overview of cloud-integrated backup solutions. Discover how you can:* Modernize your backup strategy* Reduce data protection cost* Secure your backup data in a cloud
Tags : 
    
NetApp
Published By: NetApp     Published Date: Nov 13, 2017
Why move to cloud-integrated data protection? Discover how NetApp AltaVault cloud-integrated data protection enables companies to save money and increase efficiency.
Tags : 
    
NetApp
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.