office

Results 151 - 175 of 1157Sort Results By: Published Date | Title | Company Name
Published By: MobileIron     Published Date: Aug 04, 2016
This whitepaper describes the MobileIron app security model and how it can be used to secure Office 365 for mobile devices.
Tags : 
office 365, mobileiron, crm, erp, analytics, security model, mobile apps
    
MobileIron
Published By: MobileIron     Published Date: Aug 04, 2016
Office 365 est la suite de productivité cloud de Microsoft. Elle comprend une version en ligne des solutions les plus connues de Microsoft, comme Exchange et SharePoint, un espace de stockage avec OneDrive et plusieurs applications mobiles, dont Word, Excel, PowerPoint, OneNote, Outlook, Publisher, Skype for Business et Yammer. Office 365 est au coeur de la stratégie d'évolution de Microsoft qui tend à devenir un fournisseur de solutions et de logiciels axés sur le mobile et le cloud. De nombreux clients MobileIron organisent également leur stratégie de productivité autour de cette suite en raison de l'utilisation croissante d'Office sur les appareils mobiles plutôt que sur les ordinateurs traditionnels. Dans ce contexte, ils exigent de pouvoir sécuriser et déployer Office 365 sur les appareils mobiles avec nos solutions.
Tags : 
mobile apps, best practices, mobileiron, phones
    
MobileIron
Published By: Mimecast     Published Date: Mar 13, 2017
Mimecast research finds that Office 365 adoption is growing quickly around the globe with 87% of respondents already using Exchange Online or planning to use it within the next twelve months. The survey also finds that email is an important communication channel with over 85% viewing email as critical to the organization. Whether your already on Office 365, executing or planning a migration, this report reveals insights that can help make email more secure and resilient.
Tags : 
    
Mimecast
Published By: Cielo     Published Date: Mar 04, 2016
The Human Resources function has experienced a dramatic transformation over the past century.
Tags : 
cielo, talent practices, talent acquisition, recruitment, recruitment process outsourcing, rpo, outsourcing, hiring, human resources
    
Cielo
Published By: Microsoft     Published Date: Jul 07, 2016
Enable, protect, and manage mobile productivity Protecting email and other corporate data on mobile devices—without bogging down workers—is one of today’s biggest challenges faced by IT pros today. With the massive, global proliferation of mobile devices, it can be a struggle to manage and secure these devices and your data, both on approved enterprise applications and shadow IT. Download this free e-book to learn how to control the uncontrollable and create a solution that: • Enables continuous management, so your employees are more productive. • Offers threat protection, so you can detect abnormal user behavior, suspicious activities, known malicious attacks, and security issues right away. • Guards against data leakage. • Provides security after loss or theft of mobile devices. • Helps protect your Microsoft Office email, files, and apps.
Tags : 
mobile devices, enterprise, best practices, management
    
Microsoft
Published By: CA Technologies     Published Date: Nov 02, 2016
The Travis Perkins Group is a leading supplier of building materials to the UK’s building and construction industry. For more than 200 years, the company has grown to deliver more than 100,000 products through 2,000 branch and store locations nationwide. Changing market demands, shareholder expectations and competition demand that the company continually enhance its performance. Yet, changing more than 200 years of tradition can be complicated. Traditional planning practices had led the company down the road to a bureaucratic project management office (PMO), and with the introduction of agile and CA Technologies, the once controlling environment has shifted into a service-oriented centre.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 02, 2016
Customer obsession has created a business environment of continual disruption. Constant change is forcing execs to recognize that traditional planning and delivery practices don’t sustain the ability to focus on strategy while delivering new capabilities. To adapt to an environment where change is the new normal, project management office (PMO) leaders and enterprise architecture (EA) strategists are expanding Agile methods, but scaling Agile to the enterprise requires significant process, organization, and cultural change. This report identifies best practices for tackling this challenge.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Today, digital is everywhere—cloud, mobile, social and the Internet of Things are changing the way we all work and play. This rapidly evolving digital world is also redefining the relationship between your business and your customers, who now expect a convenient, interactive experience from their preferred brands. Security is also a concern. Risk is rising, as both the enterprise and its customers exchange a growing amount of sensitive data.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Die Welt ist heute digital – Cloud, Mobilität, Social Media und das Internet of Things verändern Arbeit und Freizeit für jeden. Diese sich schnell weiterentwickelnde digitale Welt definiert auch die Beziehung zwischen Ihrem Unternehmen und Ihren Kunden neu. Die Kunden erwarten von ihren bevorzugten Marken heute eine komfortable, interaktive User Experience. Auch die Security ist ein wichtiges Anliegen. Die Risiken wachsen, da Unternehmen und Kunden immer mehr vertrauliche Daten austauschen.
Tags : 
    
CA Technologies
Published By: Juniper Networks     Published Date: Aug 10, 2017
Interactive Data is a trusted leader in financial information, delivering a comprehensive set of products and services designed to meet the needs of the front, middle, and back offices at some of the largest and most well-known institutions around the world. These clients trust Interactive Data to help support their investment activities and operational workflow through a broad range of offerings.
Tags : 
interactive data, financial services, global network, market data, ethernet switches, low latency, it infrastructure
    
Juniper Networks
Published By: Google     Published Date: Jan 08, 2018
What happens when teams switch to Google Docs from Microsoft Word Online? They can share documents in nearly half the time, see real-time edits 96% faster and cut down on errors by 88%. Get more findings and how-tos in this detailed report by Principled Technologies, which compares the performance of collaboration and productivity tools included in G Suite and Microsoft Office 365. Download the report now.
Tags : 
productivity tools, collaboration tools, business software
    
Google
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
At a Glance: With the new CA Project & Portfolio Management (CA PPM) 15.3, you can tailor projects to any business unit with drag and-drop ease. Whether complex workflow for HR or simple task management for sales, workers now spin up projects in minutes—not days. Add in-app collaboration to eliminate redundant meetings, a familiar Microsoft Excel®-like grid to manage budgets, a new connection for third-party business intelligence (BI) tools to unearth answers, and you have the most modern project portfolio management app on the market today. Download this whitepaper today to find out more about CA PPM 15.3—a simple, powerful and practical project portfolio management tool available on-premises and in the cloud—let you modernize the project management office.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
The ‘80s Called… … And they don’t want their enterprise Project and Portfolio Management (PPM) tools back. If your Project Management Office (PMO) is still relying on the same or similar processes and systems used when neon and mullets were trending, it will never keep pace with today’s market demands or shifts in technology. Six-month deployment schedules and command and control models of yesteryear are actively being replaced with continuous delivery methods and practices like agile and lean—all in the interest of driving greater customer engagement.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
Les solutions modernes telles que CA PPM continuent d’élever la barre en matière d’outils dernière génération de gestion de la demande IT en proposant en permanence de nouvelles fonctionnalités permettant d’alléger la charge des bureaux de gestion de projets (Project Management Office, PMO), des directeurs financiers, des gestionnaires des ressources et des chefs de produit. Ces dernières années, de nouveaux fournisseurs cherchant à tirer parti du vaste marché toujours plus influent de la gestion de portefeuilles de projets (Project and Portfolio Management, PPM) ont développé des modules qui « s’intègrent » à leurs plates-formes SaaS. Ils se targuent du fait que leurs outils sont faciles à installer et à gérer et promettent des économies à leurs clients. Cela semble trop beau pour être vrai. Et pour la plupart des organisations, c’est malheureusement le cas.
Tags : 
    
CA Technologies EMEA
Published By: TIBCO Software     Published Date: May 31, 2018
Integration is the lifeblood of today’s digital economy, and middleware is the software layer connecting different applications, services, devices, data sources, and business entities. This Ovum Decision Matrix (ODM) is a comprehensive evaluation to help enterprise IT leaders, including chief information officers (CIOs), enterprise/integration architects, integration competency center (ICC)/integration center of excellence (CoE) directors, and digital transformation leaders select a middleware-as-aservice (MWaaS) suite best suited to their specific hybrid integration requirements.
Tags : 
    
TIBCO Software
Published By: VMware     Published Date: Dec 10, 2018
It’s no secret financial services organizations own and operate legacy solutions. Some of these core processes are front and center, meeting customer needs; others are in the middle, supporting account handling operations; and still many more are in the back-office, handling data and managing analytics. The challenge for financial leaders is to ensure these traditional systems don’t prevent the delivery of great digital experiences now and into the future. To find out more download this eBook today.
Tags : 
    
VMware
Published By: VMware     Published Date: Dec 14, 2018
Hyperconverged infrastructure (HCI) is giving organizations the agility to respond quickly to demand for new products, services and applications. Many organisations begin their HCI journey by targeting specific use cases such as virtual desktop infrastructure, disaster recovery and remote office-branch office environments. But HCI continues to evolve far beyond these use cases. In this case study, we look at real world deployments to identify how HCI is helping businesses to reduce TCO, improve scalability and rapidly adopt new technologies. Please enter your details to view the case study.
Tags : 
    
VMware
Published By: Vena Solutions     Published Date: Oct 29, 2018
Even after more than 30 years, it's easy to see why Excel remains so popular. It's flexible, powerful and irreplaceable - especially in finance and accounting. But how well does it work in FP&A today? That's the question that Vena and the Association of Finance Professionals set out to answer in this objective research-based guide, Making Excel Work for FP&A. From taking advantage of Excel's full feature set, to adopting FP&A software built around Excel, there's no shortage of ways to get the most out of Excel for your FP&A needs.
Tags : 
making excel work for fp&a, excel evolution, excel for finance, spreadsheet software, microsoft excel, power bi, financial planning and analysis, cpm, cpm systems, corporate performance management, data analytics, power pivot, microsoft office 365
    
Vena Solutions
Published By: Intapp     Published Date: Jan 09, 2019
Intapp Time provides superior business intelligence thatchangesyour firm’sfundamental relationship with time.Thisunified suite of applications gives timekeepers access to time data and capture wherever they are: in the office, on a mobile device, online and offline.It is user-centric, offering a completely automated option while fullysupporting hands-on tracking—contemporaneous or reconstructionist.Intapp Time helps your business mine time data to reveal new sources of revenue, inform staff decisions, increase project efficiency, and reduce time leakage.
Tags : 
business, business intelligence, time, tax, time for tax, intapp, applications, time data, automation, reporting, timekeeping, audit, accounting, consulting, professional services, active time capture, passive time capture, time tracking
    
Intapp
Published By: Riverbed     Published Date: May 24, 2012
Forrester Consulting recently analyzed the requirements for consolidating branch office infrastructures while simultaneously supporting the demands of emerging business goals.
Tags : 
infrastructure, server and storage virtualization, wan optimization, dns, dhcp, branch-office
    
Riverbed
Published By: Dell SB     Published Date: Jan 24, 2019
Introducing a refreshed and most complete mobile portfolio on the planet!
Tags : 
    
Dell SB
Published By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected.
Tags : 
advanced threats, e-discovery, compliance, rapid response, office 365, email controls, archiving, customer support
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected.
Tags : 
malware, business email compromise, security, it departments, archiving, information protection, advanced technologies, office 365
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 21, 2017
De nos jours, les auteurs d'attaques, toujours plus inspirés, utilisent des outils automatisés pour puiser des informations sur leurs cibles dans les profils — souvent publics — disponibles sur les médias sociaux. Ils savent donc où vous travaillez. De même, le poste que vous occupez, vos centres d'intérêt, vos loisirs, votre situation matrimoniale ou encore vos précédents emplois n'ont plus aucun secret pour eux. Ils se servent de ces informations pour élaborer des messages convaincants qui vous incitent à cliquer sur une pièce jointe ou une URL malveillante. Si vous tombez dans le piège, une charge active malveillante est injectée dans votre système.
Tags : 
phishing, malware, des individus pris pour cible
    
Proofpoint
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.