enterprise work management

Results 1 - 25 of 178Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: May 09, 2011
Forrester recently surveyed 225 Information and Knowledge Management (I&KM) professionals with Web Content Management (WCM) decision-making or influencer roles about their WCM strategies for the coming year.
Tags : 
adobe, web content management, enterprise application, knowledge management, wcm, analytics, social networking, rich media management, interactive/pr agencies, content management systems, interactive marketing, marketing software, web analytics, crm solutions/software, e-commerce solutions
    
Adobe
Published By: Adobe     Published Date: Nov 25, 2013
For the past several years, the nature of enterprise productivity has been forever changed by the new breed of mobile devices. Personal smartphones and tablets are everywhere. Gone are the days when every enterprise gave its employees a security-focused BlackBerry. Cloud-based productivity apps can be downloaded in seconds. Compared to even a few years ago, enterprises are operating in a new world. Please download whitepaper to learn more.
Tags : 
mobile devices, compatibility, cloud-based, enterprise, enterprise productivity, productivity apps, security-focused, smartphones tablets, growing mobile workforce, document productivity, content management, hybrid model
    
Adobe
Published By: Adobe     Published Date: Feb 20, 2014
As a valued customer, Adobe understands that your enterprise takes extensive advantage of our software, with anywhere from hundreds to thousands of licenses for a variety of Adobe solutions. With the Adobe Enterprise Term License Agreement (ETLA), we are now making the management and procurement of your Adobe software simpler, more flexible, and predictable.
Tags : 
adobe, adobe software, enterprise term licensing, etla, adobe solutions, software management, software compliance, tco, total cost of ownership, deployment, workflow, support, collaboration, information management, document management
    
Adobe
Published By: Akamai Technologies     Published Date: Oct 23, 2018
VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
"VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution"
Tags : 
    
Akamai Technologies
Published By: AtTask     Published Date: Jan 16, 2013
Do projects seem to appear out of nowhere? Do you find yourself scrambling to pull together reports for executives? Download this free guide and learn about several project portfolio management pitfalls and how AtTask can help you avoid them.
Tags : 
cross-project team insight, enterprise project management, gantt chart, it project, online project management, ppm, project collaboration, project management, project visibility, resource management, task management, team member accountability, time tracking software, workflow software, resource planning, capacity planning, portfolio management, productivity, work management, project portfolio management
    
AtTask
Published By: AtTask     Published Date: Jan 16, 2013
Choosing the best PPM software for your team doesn't have to be overwhelming. This Buyer's Guide will help you find project management software that's evolved for today's project teams. Get the guide today.
Tags : 
cross-project team insight, enterprise project management, gantt chart, it project, online project management, ppm, project collaboration, project management, project visibility, resource management, task management, team member accountability, time tracking software, workflow software, resource planning, capactiy planning, portfolio management, productivity, work management, project portfolio management
    
AtTask
Published By: AtTask     Published Date: Apr 29, 2013
Work chaos comes in many forms: random input processes, disconnected activities, poor visibility into work and more. Read this eBook: "How to Slay the Dragon of Enterprise Work" and learn how slaying the work chaos dragon will help you simplify your processes, connect team members, save time and money, and more. Get the eBook today.
Tags : 
cross-project team insight, enterprise project management, gantt chart, it project, online project management, ppm, project collaboration, project management, project visibility, resource management, task management, team member accountability, time tracking software, workflow software, resource planning, capactiy planning, portfolio management, productivity, work management, project portfolio management
    
AtTask
Published By: AtTask EMEA     Published Date: Mar 11, 2014
A look at the necessity of collaboration for organisations to provide their workers with the processes and capabilities to empower them to do their best work.
Tags : 
collaboration, enterprise, connectivity, productivity, efficiency, information sharing
    
AtTask EMEA
Published By: AtTask EMEA     Published Date: Mar 11, 2014
Work chaos is the fiend that plagues enterprise teams. It emerges as a result of serious work mismanagement and can take a variety of forms. Understand the mismanagement and how to slay your work chaos dragons for good.
Tags : 
enterprise, efficiency, disconnection, chaos, management, best practices, technology
    
AtTask EMEA
Published By: BehavioSec     Published Date: Sep 30, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BMC Control M     Published Date: Jul 16, 2009
Companies running legacy job scheduling products suffer from higher costs, inefficient use of resources, and greater IT complexity, according to independent analyst firm Enterprise Management Associates. Read their findings, and see why consolidating on a single, comprehensive workload automation solution is an easy win for IT and the business.
Tags : 
smart, modular, cost-effective, ema, enterprise management associates, it complexity, workload automation, bmc, product suite, wla, end-to-end workflow, enterprise visibility, management, service-driven management, dynamic workflow resourcing, simple, measurable, achievable, realistic, timely
    
BMC Control M
Published By: BMC Control M     Published Date: Jul 22, 2009
Companies running legacy job scheduling products suffer from higher costs, inefficient use of resources, and greater IT complexity, according to independent analyst firm Enterprise Management Associates. Read their findings, and see why consolidating on a single, comprehensive workload automation solution is an easy win for IT and the business.
Tags : 
smart, modular, cost-effective, ema, enterprise management associates, it complexity, workload automation, bmc, product suite, wla, end-to-end workflow, enterprise visibility, management, service-driven management, dynamic workflow resourcing, simple, measurable, achievable, realistic, timely
    
BMC Control M
Published By: BMC Software     Published Date: Jun 30, 2009
Companies running legacy job scheduling products suffer from higher costs, inefficient use of resources, and greater IT complexity, according to independent analyst firm Enterprise Management Associates. Read their findings, and see why consolidating on a single, comprehensive workload automation solution is an easy win for IT and the business.
Tags : 
smart, modular, cost-effective, ema, enterprise management associates, it complexity, workload automation, bmc, product suite, wla, end-to-end workflow, enterprise visibility, management, service-driven management, dynamic workflow resourcing, simple, measurable, achievable, realistic, timely
    
BMC Software
Published By: BMC Software     Published Date: Dec 21, 2011
This Executive Brief discusses IDC's perspective on how enterprise workload management requirements are changing and highlights the ways that workload automation solutions can address these emerging requirements
Tags : 
consolidate, schedulers, infrastructure, enterprise, workloads, enterprise workload, mttr, unified solution, bmc, control
    
BMC Software
Published By: Box     Published Date: Jun 22, 2018
• Business is changing faster than ever, and disruptors doing things in digital ways are leading the charge in just about every market. If you're not already managing your content in the cloud, it’s time to make a shift. • With Box, teams are unified, collaboration is sped up and productivity is amplified. This ebook illustrates how real Box customers are using the power of the cloud to get every part of their extended enterprise working together, from mobile productivity to streamlined business processes. o Marketing collaboration is integrated when internal teams and external partners work from one digital hub o Sales teams and workers in the field are empowered across any device with mobile productivity o HR streamlines processes for better team workflow and a stronger onboarding experience • To read how Box customers are using Cloud Content Management to enact practical transformation across teams, and to find out how you too can use Box to benefit every line of business within
Tags : 
    
Box
Published By: Box     Published Date: Jun 22, 2018
• Enterprise Content Management is a market in transition. And as demand for modernization becomes widespread, long-time leaders are investing in new capabilities to keep up — and bringing more of the market to the cloud to meet the needs of users and IT managers alike. • • This report shows how a range of providers measure up to help companies make the right choice when • requirements are skewed to the needs of information workers who need to create, collaborate on, share, and find enterprise content. • • Use the 2017 Forrester Wave™ report to: o Get educated. Gain an understanding of how the ECM market is changing and why complex, on-premises ECM suites are giving way to Cloud Content Management platforms like Box. o Define your needs. Forrester ranks the top 15 ECM business content vendors based on current offerings, strategy and market presence to help you evaluate vendors that suit your needs. o Select a vendor. Learn how cloud content management platforms like Box are designed
Tags : 
    
Box
Published By: Box     Published Date: Jun 22, 2018
• In today's ever-evolving world, content management is a moving target. With content flowing from a multitude of places, keeping up with the speed of business requires a content management strategy that's more flexible than traditional Enterprise Content Management (ECM). • As digital transformation forces organizations to rethink their processes, it's never been more important to focus on deploying a platform that works across all of your content so you can get more value out of each asset and protect yourself against technology stagnation. • Check out our ebook, 5 Considerations For Transforming Your ECM Strategy With Cloud Content Management, and learn how to bring your people and information together in the cloud.
Tags : 
    
Box
Published By: Butler Technologies     Published Date: Jul 02, 2018
As enterprises become more distributed and migrate applications to the cloud, they will need to diversify their network performance management solutions. In particular, the network operations team will need to complement its packet-based monitoring tools with active test monitoring solutions to enhance visibility into the cloud and help enterprises scale monitoring gracefully and cost-effectively.
Tags : 
    
Butler Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.