inter enterprise

Results 201 - 225 of 369Sort Results By: Published Date | Title | Company Name
Published By: Recorded Future     Published Date: Apr 18, 2019
Enterprises increasingly operate in a digitally interconnected world where third parties like suppliers, customers, channel partners, and others are often directly connected to their internal IT systems, and where their underlying IT infrastructure may be owned and managed by an outside organization. These business relationships can knowingly or unknowingly introduce different types of risks that need to be identified and managed as if these third parties were part of the enterprise itself. Recorded Future's latest risk intelligence offering enables threat intelligence teams to better understand, monitor, and measure their real-time exposure to these third-party risks. Armed with this information, organizations can better assess and prioritize risk mitigation actions.
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Apr 18, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more
Tags : 
    
Recorded Future
Published By: Smarp     Published Date: Feb 22, 2019
As workplaces become more and more digital, diverse and scattered, internal communications are facing challenges at an accelerating speed. The emergence of digital services has brought us new ways to communicate and measure the success of our communications, and the importance of social media and internal platforms has altered the way we communicate with each other. In 2025, it is estimated 75 percent of the workforce will be comprised of millennials*. We are seeing a new, tech-savvy generation to take over the workplaces, and ensuring internal communications tackles the challenges of cross-generational workplaces. Effective communication correlates with high employee engagement, and companies who invest in communications are companies who understand the importance of an engaged workforce. Organizations with effective change and communication are 3.5 times more likely to significantly outperform their peers**. With significant changes occurring in workplaces and trough that, in intern
Tags : 
internal communication, employee engagement, enterprise communication
    
Smarp
Published By: Cisco     Published Date: Dec 15, 2010
This document discusses the requirements for job scheduling software in complex IT environments with multiple interconnected enterprise-class applications that touch every aspect of the organization.
Tags : 
cisco, enterprise-class job scheduling, delivery, business processes, automation software, data center, systems management, backup and recovery
    
Cisco
Published By: NETIQ     Published Date: Dec 03, 2013
A poll of CIOs and IT managers reports why departments must defend against complex internal and external threats while mitigating regulatory and compliance concerns. The results provide data about how enterprises view compliance.
Tags : 
security compliance, users access management, it management compliance
    
NETIQ
Published By: Intralinks     Published Date: Oct 03, 2013
For many companies, in particular in industries like pharmaceuticals, software development, or entertainment, their intellectual property is more valuable than any physical asset. And with the increasing need to collaborate with external business partners to accelerate product life cycles and enhance innovation, there is a greater risk for sensitive information to be compromised. In this 6-page white paper, discover the benefits of how the right inter-enterprise collaboration tool can ensure secure document sharing and team collaboration, and what to keep in mind as you look for a provider.
Tags : 
intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security
    
Intralinks
Published By: Intralinks     Published Date: Oct 03, 2013
As the business case for Software-as-a-Service (Saas) and other cloud computing models solidifies, more companies are incorporating cloud computing into their IT programs. However, the legal, regulatory, and ethical requirements of data security must be adhered to regardless of where the information is housed. The best SaaS providers offer strong authentication systems, user activity auditing tools, and real time usage reporting to maintain the highest level of control over sensitive and confidential data. In this 11-page white paper, Intralinks provides tips and questions to ask prospective providers about their security standards and practices, software reliability and uptime, and the availability of reporting and audit trails.
Tags : 
intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security
    
Intralinks
Published By: Intralinks     Published Date: Nov 26, 2013
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data.
Tags : 
intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security, jurisdictional privacy heat map
    
Intralinks
Published By: Windstream     Published Date: Aug 04, 2014
Cloud computing today is fundamentally altering business processes and changing the way organizations interact with customers, partners, and employees. This transformation brings incredible opportunities, including the ability to build a realtime enterprise where interaction and innovation flourish, and more agile, flexible, and cost-effective practices thrive. Yet cloud computing also presents significant challenges. The path to value is not clearly marked, and there are potential stumbling points along the way. Please download the whitepaper to learn more!
Tags : 
windstream, cloud computing, cloud hybrid options, oxford economics, cloud benefits
    
Windstream
Published By: VMware SD-WAN by VeloCloud     Published Date: Feb 19, 2019
The network of yesterday is not the network that can take businesses into the future. As mission critical enterprise applications move to the cloud, wide area network (WAN) must adapt to become agile, flexible, and scale rapidly. Leading IT trends such as Internet of Things (IoT), Software as a Service (SaaS), cloud storage, enterprise mobility, emerging transport alternatives, and globalization increase the importance of how network assets are leveraged and how the network is conceptualized. The advantages of public and private data centers and cloud-based applications are significantly diminished if the network is slow, inflexible, and unpredictable. Erratic network performance with high latency, jitter and packet loss can significantly impact user adoption, satisfaction, and overall corporate productivity. As connectivity options continue to emerge, end users are no longer tethered to the office or to the localized applications and services that were trademarks of a primary or branc
Tags : 
sd-wan, saas, cloud storage
    
VMware SD-WAN by VeloCloud
Published By: MuleSoft     Published Date: Oct 13, 2015
It’s in a retail business’ best interest to develop an omnichannel strategy; customers who engage in multiple channels spend up to 30% more than single channel customers and tend to be powerful advocates for the business. Building these strategies is a process that businesses embark upon, and that process can be made easier through MuleSoft's approach to enterprise integration, API-led connectivity. In this whitepaper, we’ll discuss the omnichannel journey and how integrating and exposing valuable data can put retailers in a competitive position to win over the tech savvy customer.
Tags : 
retail business, omnichannel retailing, multiple channels, connectivity, integration, single channel customers
    
MuleSoft
Published By: Oracle Service Cloud     Published Date: Mar 23, 2016
The Internet of Things (IoT) is connecting our world in ways that were unimaginable 10 years ago—collecting data on everything we do and using it to streamline our daily activities. In doing so, IoT is changing the way that consumers think about service. Service organizations must be prepared to support these new customer expectations to ensure continued satisfaction to strengthen and foster loyalty. Additionally, IoT is making its way into the enterprise, especially among organizations in industries like utilities, oil and gas, medical devices, manufacturing and telecommunications. Connected devices enable more efficient processes for maintenance and repair by constantly providing information on machines’ performance, environmental conditions, and possible failures. For example, a connected washing machine in a customer’s home could automatically send out an error report to the manufacturer when it experiences a failure. This is where field service management comes in.
Tags : 
oracle, service cloud, service management, customer interaction, internet of things
    
Oracle Service Cloud
Published By: Oracle Service Cloud     Published Date: Mar 24, 2016
Despite the array of new technologies enabling customer contact across web and mobile channels, most serious interactions still have to pass through an agent in order to be resolved. Enterprises can push customers toward self-service, but in the end, people often still need to talk to other people. This means that, even in the best of circumstances, the customer experience is highly dependent on the capabilities of the agent manning the phones. That person needs more than skills and a beneficial temperament; they require a software environment that provides maximum space for flexibility, problem solving, and intuitive task switching.
Tags : 
oracle, service cloud, customer interaction, customer support
    
Oracle Service Cloud
Published By: ThousandEyes     Published Date: Aug 04, 2017
Technology trends like telecommuting, BYOD, VoIP and SaaS adoption bring new challenges to the underlying network infrastructure that connects branch offices and datacenters. This guide explains how to tackle the challenges faced by the internet-centric enterprise by intelligently monitoring your WAN, LAN, Wi-Fi and SaaS applications through a combination of Enterprise and Endpoint Agents.
Tags : 
telecommuting, datacenter, network infrastructure, lan monitoring
    
ThousandEyes
Published By: Riverbed DE     Published Date: Oct 16, 2017
Is your IT organization taking the proper steps toward successful cloud adoption? Legacy networking technology is hampering IT agility. Cloud providers have initiated an agility revolution but secure inter- and intra-cloud network connectivity are still very challenging. Easier alternatives are either expensive, worsen application performance and/or hamper network efficiency. Riverbed’s unique SD-WAN solution helps unlock agility across the complete enterprise network allowing for easier deployment and management of cloud-centric networks. This cloud adoption Use Case outlines challenges and solutions for cloud-centric enterprise architectures including: ·       Unlocking cloud agility through simple workflows in the WAN such as single-click secure connectivity to cloud and branch networks ·       The importance of bandwidth reduction and application acceleration to ensure cloud adoption ·       Distinguishing between application and network problems through enhanced visibility
Tags : 
cloud analytics, cloud development, cloud storage, cloud management, cloud security, cloud services, storage analytics
    
Riverbed DE
Published By: Canon Solutions America     Published Date: Feb 28, 2019
90% of enterprises have suffered a data breach from an unsecured printer,1 and there are many other places in your organization where data can be vulnerable. Learn how to help protect your data everywhere it lives with this free Security Primer.
Tags : 
canon security solutions, security printing, secure printing, print security, secure print solutions, secure printing, secure documents, document security
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: Mar 28, 2019
Today’s data breaches are planned and executed with military precision. This Security Brief reveals how cybercriminals can get in and out of your network without being detected. It also gives you tips for helping secure your data, documents, and devices.
Tags : 
canon security solutions, security printing, secure printing, print security, secure print solutions, secure printing, secure documents, document security
    
Canon Solutions America
Published By: Microsoft     Published Date: Jul 20, 2018
Microsoft provides a solution to easily run small segments of code in the cloud with Azure Functions. Azure Functions provides solutions for processing data, integrating systems, and building simple APIs and microservices. The book starts with intermediate-level recipes on serverless computing along with some use cases on the benefits and key features of Azure Functions. Then, we'll deep dive into the core aspects of Azure Functions, such as the services it provides, how you can develop and write Azure Functions, and how to monitor and troubleshoot them. Moving on, you'll get practical recipes on integrating DevOps with Azure Functions, and providing continuous deployment with Visual Studio Team Services. The book also provides hands-on steps and tutorials based on real-world serverless use cases to guide you through configuring and setting up your serverless environments with ease. Finally, you'll see how to manage Azure Functions, providing enterprise-level security and compliance to
Tags : 
    
Microsoft
Published By: Interactive Intelligence     Published Date: Feb 14, 2012
Read what makes the Interaction Center Platform a true-all-in-one solution for the contact center, the enterprise and the cloud, from Interactive Intelligence president and CEO Don Brown, and Tim Passios, senior director, Solutions Marketing.
Tags : 
    
Interactive Intelligence
Published By: Trillium Software     Published Date: May 19, 2011
Effective CRM demands a single, complete, accurate view of customer information including purchasing history, product interest, and support interactions. Enterprises require a solution to discover data issues, correct and standardize, and maintain data accuracy and consistency.
Tags : 
trillium software, single customer view, data quality, crm, customer relationship management, high-quality data, erp, mdm
    
Trillium Software
Published By: Trillium Software     Published Date: May 19, 2011
Effective CRM demands a single, complete, accurate view of customer information including purchasing history, product interest, and support interactions. Enterprises require a solution to discover data issues, correct and standardize, and maintain data accuracy and consistency.
Tags : 
trillium software, single customer view, data quality, crm, customer relationship management, high-quality data, erp, mdm
    
Trillium Software
Published By: Red Hat     Published Date: Dec 15, 2017
Red Hat commissioned Forrester Consulting to evaluate cloud migration strategies of organizations by surveying 272 respondents and doing 4 interviews with cloud migrators at enterprises all over the world. Private cloud is still very much in the mix for enterprises actively migrating existing workloads to the public cloud. Read this paper to learn about their migration methods weighing criteria like cost and performance optimization, flexibility, speed, and methods for mitigating disruption.
Tags : 
    
Red Hat
Published By: IBM     Published Date: Jul 10, 2009
A complex IT infrastructure is a stumbling block for many businesses seeking greater agility in these uncertain times. This white paper shows how a service oriented architecture (SOA) helps align the infrastructure with business needs in order to achieve maximum flexibility.
Tags : 
soa, service oriented architecture, ibm smart soa, it infrastructure, integration, websphere, change management, costs
    
IBM
Published By: Epicor     Published Date: Feb 22, 2010
This white paper covers how to effectively managing the upcoming transition for US registered companies to file their financial statements in International Financial Reporting Standards (IFRS) format.
Tags : 
epicor, ifrs, sec, enterprise resource planning, erp, general ledger, accounting, security
    
Epicor
Published By: GoToMeeting     Published Date: Oct 08, 2013
The use of too many communication channels can actually hinder collaboration. That's why many organizations are now moving toward a single interface for all business communications. Enterprises realize they must improve the communication and collaboration experience but are still figuring out how social media integrates within corporate culture and business process. This Yankee Group white paper explores how built-for-business social workspaces enable employees to more effectively work together and move projects to completion faster.
Tags : 
social, marketing, citrix podio, social media, pim bilderbeek, brian partridge, yankee group, connectivity
    
GoToMeeting
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.