force com

Results 301 - 325 of 838Sort Results By: Published Date | Title | Company Name
Published By: EMC Corporation     Published Date: May 27, 2014
Video: Flash technology has emerged as a powerful force in today's enterprise data centers. See why one size does NOT fit all when it comes to flash and how EMC is delivering the solutions you need to fit your flash needs.
Tags : 
emc, vdi, flash strategy, storage solutions, data center
    
EMC Corporation
Published By: Florida Enterprise     Published Date: Apr 21, 2016
Thanks in part to its leading business climate, workforce, and trade and transportation infrastructure, Florida ranks among the nation’s top 10 states for manufacturing.
Tags : 
enterprise florida, florida, manufacturing, business climate, industry, talent, workforce, cost competitive environment
    
Florida Enterprise
Published By: Forcepoint     Published Date: Jun 06, 2019
Your people access and share data using a myriad of different cloud apps. The bad news is, you probably have no idea how your data is used, where it travels to and the level of associated risk. You’ve lost visibility and control. The good news is, we can help get it back. Register now for a FREE Cloud Threat Assessment and detailed report of your cloud-application risk posture. This in-depth assessment will show you: Cloud usage patterns. How potentially harmful activities happen in cloud applications across your organization. Geographical usage. Which countries your data is traveling to and from (you may be surprised). Privileged users. Do you have more administrators than you need? Dormant users. Are you overspending on unused licenses? Riskiest users. Who are your riskiest users and why? You'll receive customized assessments on Office365, Box, G Suite, and Salesforce.com.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Financial institutions are facing increasing network security challenges as their organizations become more distributed, applications move to the cloud, and threats rapidly evolve. But legacy solutions are fragmented, labor intensive, and inconsistent. You need a better way. Forcepoint Next Generation Firewall (NGFW) leads the industry with #1 security, manageability, and availability. Download our whitepaper to learn about: Senior IT executives’ perspectives on the current network security landscape Forcepoint NGFW’s centrally managed solution combining enterprise-grade SD-WAN and network security Success stories from companies like Sword Apak, Avency, and Carglass
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jul 30, 2019
Financial institutions are facing increasing network security challenges as their organizations become more distributed, applications move to the cloud, and threats rapidly evolve. But legacy solutions are fragmented, labor intensive, and inconsistent. You need a better way. Forcepoint Next Generation Firewall (NGFW) leads the industry with #1 security, manageability, and availability. Download our whitepaper to learn about: Senior IT executives’ perspectives on the current network security landscape Forcepoint NGFW’s centrally managed solution combining enterprise-grade SD-WAN and network security Success stories from companies like Sword Apak, Avency, and Carglass
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
    
Forcepoint
Published By: Cisco     Published Date: Aug 27, 2015
Learn about the latest top unified communication trends and how others are planning for the future.
Tags : 
unified communication, communication trends, midsize business, byod, bring your own device, mobility, it management, workforce management
    
Cisco
Published By: Microsoft Azure     Published Date: Apr 10, 2018
Read why Forrester ranked Microsoft a leader in SFA Solutions You have bold ambitions for your sales team. You want to—and need to—reinvent productivity. But the success of your sales team is stifled by silos. It’s no wonder they’re struggling when their transactional systems, social networking, and productivity tools are separate. With the Microsoft Relationship Sales solution, you can scale the power of one-on-one relationship selling by unifying the sales experience. And you can help empower your sellers with savvy insights that engage and delight customers. It combines Dynamics 365 for Sales with LinkedIn Sales Navigator to help sellers identify the right customers—and the right time and way to engage with them. Read The Forrester Wave™: Sales Force Automation Solutions, Q2 2017 report that says Microsoft is a best fit "...for those companies that are bullish and looking to disrupt their peers with AI and machine learning." Empower your team to reinvent the way they sell—and he
Tags : 
    
Microsoft Azure
Published By: Forcepoint     Published Date: May 14, 2019
The Total Economic Impact™ Of Forcepoint Web Security and Email Security, a commissioned study conducted by Forrester Consulting on behalf of Forcepoint, shows how a prominent manufacturing company experienced a ROI increase with Forcepoint after switching from another cloud vendor. Download the study to learn how this company achieved over a three year period: An ROI of 122% within a payback period of 6 months. Security breach reduction cost savings of $743,000. With an estimated cost of $3.25 million per breach and a starting risk level of 25%, the organization saved $743,000 over three years. Productivity gains up to $152,000. Company reported that they have benefited from the reduction in time spent managing malware and phishing incidents. Discover the potential impact of Forcepoint Web Security Cloud and Email Security Cloud on your organization!
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
The Total Economic Impact™ Of Forcepoint Web Security and Email Security, a commissioned study conducted by Forrester Consulting on behalf of Forcepoint, shows how a prominent manufacturing company experienced a ROI increase with Forcepoint after switching from another cloud vendor. Download the study to learn how this company achieved over a three year period: An ROI of 122% within a payback period of 6 months. Security breach reduction cost savings of $743,000. With an estimated cost of $3.25 million per breach and a starting risk level of 25%, the organization saved $743,000 over three years. Productivity gains up to $152,000. Company reported that they have benefited from the reduction in time spent managing malware and phishing incidents. Discover the potential impact of Forcepoint Web Security Cloud and Email Security Cloud on your organization!
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
The Total Economic Impact™ Of Forcepoint Web Security and Email Security, a commissioned study conducted by Forrester Consulting on behalf of Forcepoint, shows how a prominent manufacturing company experienced a ROI increase with Forcepoint after switching from another cloud vendor. Download the study to learn how this company achieved over a three year period: An ROI of 122% within a payback period of 6 months. Security breach reduction cost savings of $743,000. With an estimated cost of $3.25 million per breach and a starting risk level of 25%, the organization saved $743,000 over three years. Productivity gains up to $152,000. Company reported that they have benefited from the reduction in time spent managing malware and phishing incidents. Discover the potential impact of Forcepoint Web Security Cloud and Email Security Cloud on your organization!
Tags : 
    
Forcepoint
Published By: Mimecast     Published Date: Apr 18, 2017
"Secure Your Move To Cloud-Based Email With A Trusted Third-Party Security Service Provider Email is an essential component of business activity and workforce enablement. As cost, scale, flexibility, and usability become more important, organizations are seeking cloud-based email systems to support their workforces. Although cloud-based email investments provide financial and operating benefits, they do raise several security challenges. This report suggests that few firms understand or prepare upfront for the security challenges prior to their migration to a cloud environment. Download the study to learn more."
Tags : 
forrester, cloud security, email security, cloud-based email, cloud environment
    
Mimecast
Published By: OutSystems     Published Date: Apr 10, 2014
David Norfolk of Bloor Research International discusses research that compares two high-productivity platform as a service (PaaS) development platforms: OutSystems Platform and Force.com from Salesforce.com (now re-branded as Salesforce1 Platform). In this webcast, he will debunk the main myths surrounding high-productivity application development and how both platforms have overcome them, albeit with somewhat different approaches for different kinds of customers.
Tags : 
outsystems, predictive analysis, salesforce, cloud platforms, high productivity paas, management software company
    
OutSystems
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Published By: Success Factors     Published Date: Aug 10, 2012
Will the people you need for your future workforce be there? This complimentary SuccessFactors white paper shows how to shorten the journey to data-driven decision-making about talent. Download it today.
Tags : 
successfactors, sap, best practices, workforce planning, data-driven decisions, workforce analytics, data mining, predictive modeling
    
Success Factors
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Michael Parrish Dudell, bestselling author and one of nation’s leading Millennial voices, explains why now, more than ever, is the time for businesses to anticipate the rapidly evolving expectations of the new workforce or face the very real threat of irrelevance. Read the brief to get the facts on the huge impact Millennials will and are making in the workplace: Within the next three years, Millennials will make up the majority of the workforce By 2025, they will comprise a whopping 75% of workers In the last five years, 87 percent of Millennials took on management roles—up 75% from the five years prior
Tags : 
millennials, expansion, workforce, adaption, expectations
    
Citrix ShareFile
Published By: CEB     Published Date: Oct 30, 2015
Companies that use the workforce survey in an integrated life-cycle approach will simplify complex projects, reduce HR’s workload, and guide the way to the actions that will have the most influence on business performance.
Tags : 
workforce survey program, business performance, survey investment, engagement initiatives, change
    
CEB
Published By: Salesforce.com     Published Date: Apr 18, 2013
Work.com is the Sales Performance Management solution from Salesforce.com. Work.com helps sales organizations drive sales performance with real-time feedback, coaching, and shared goal setting. Salesforce Work.com drives constancy and reinforces winning behaviors on sales teams. Reps are more motivated. Onboarding time is reduced, and forecasting is more consistent. Sales output from each rep is increased through real-time coaching. Salesforce Work.com compliments the world class capabilities of Salesforce's Sales Cloud CRM solution.
Tags : 
salesforce, sales performance management, sales management, goal-setting, coaching, real-time, cloud, crm solutions/software
    
Salesforce.com
Published By: VMware AirWatch     Published Date: Oct 02, 2015
Ultimately, technology can minimize compromises so that everyone becomes a winner. In this paper, we discuss why a bring-your-own-device (BYOD) approach to workforce mobility is a compromise-free approach, and how the combined capabilities of Samsung KNOX and Enterprise Mobility Management from AirWatch by VMware turn this compromise-free approach into reality.
Tags : 
byod, mobility, analysis, enablement
    
VMware AirWatch
Published By: Quocirca     Published Date: Jul 27, 2009
Across the mid-market, inefficiencies are compounded by the lack of visibility into pertinent data, of processes being adequately and flexibly automated, and for the performance of the business to be monitored on a constant basis. Without such capabilities, businesses will find it difficult to survive the current financial conditions – yet creating an environment where information can be easily aggregated and viewed has never been easier. Also, business performance can be easily monitored with small proactive, and even reactive, actions ensuring effective responses to market forces and enabling organisations to compete with local and more global business threats.
Tags : 
quocirca, business intelligence, performance management
    
Quocirca
Published By: VMware AirWatch     Published Date: Jul 19, 2017
There’s no denying that today’s workforce is “mobile.” Inspired by the ease and simplicity of their own personal devices, today’s workforce relies on a variety of tools to accomplish their business tasks — desktops, smart phones, tablets, laptops or other connected devices — each with varying operating systems.  The specific tasks they need to accomplish? That depends on the person. But it’s safe to say remotely logging in and out of legacy, desktop, mobile, software as-a-service (SaaS) and cloud applications is a given. And the devices on which they work? They could be owned by the enterprise or the end user, with varying levels of company oversight, security and management. The result? An overabundance of “flexibility” that leads to fundamental IT challenges of security and manageability.
Tags : 
    
VMware AirWatch
Published By: VMware     Published Date: Jul 24, 2017
There’s no denying that today’s workforce is “mobile.” Inspired by the ease and simplicity of their own personal devices, today’s workforce relies on a variety of tools to accomplish their business tasks — desktops, smart phones, tablets, laptops or other connected devices — each with varying operating systems.  The specific tasks they need to accomplish? That depends on the person. But it’s safe to say remotely logging in and out of legacy, desktop, mobile, software as-a-service (SaaS) and cloud applications is a given. And the devices on which they work? They could be owned by the enterprise or the end user, with varying levels of company oversight, security and management. The result? An overabundance of “flexibility” that leads to fundamental IT challenges of security and manageability.
Tags : 
    
VMware
Published By: Salesforce.com     Published Date: Sep 16, 2013
Learn how the future of sales performance management is integrated with CRM and social collaboration and how this will help managers provide real-time coaching and motivation in context to drive better sales behaviors and, ultimately, better sales results. Download now.
Tags : 
sales performance management, crm, social collaboration, drive sales, nucleus research, best practices
    
Salesforce.com
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.