inform

Results 476 - 500 of 4068Sort Results By: Published Date | Title | Company Name
Published By: Adaptive Planning     Published Date: Apr 18, 2011
Join us for an informative webinar to hear case studies describing how leading financial services firms have been able to move beyond Excel and save time, enhance collaboration, and improve business decisions -- ultimately resulting in higher revenues and profits.
Tags : 
fp&a, adaptive planning, financial services, budgeting, strategic value, forecasting, monthly reporting, driver-based models
    
Adaptive Planning
Published By: Adaptive Planning     Published Date: Dec 05, 2011
Join us for an informative webinar and learn how easy it can be to create exceptional value through FP&A. You will hear case studies describing how leading financial services firms worldwide have been able to move beyond Excel and save time, enhance companywide collaboration, and improve business decisions - ultimately resulting in higher revenues and profits. And you'll also see a demo of how Adaptive Planning's award-winning software creates value for enterprise companies.
Tags : 
finance, budget, business, management solutions, adaptive planning, financial services, revenue, profit
    
Adaptive Planning
Published By: CA SM     Published Date: Jun 02, 2008
Telecom assets are a special class of IT assets that require an accurate inventory for effective financial management. Enterprises should consider the benefits of establishing a "single version of the truth" that comes from linking management of IT and telecom assets with their other systems and processes. An accurate inventory is critical for effective financial management. Managers need accurate information that supports their business decisions.
Tags : 
ca sm, ca service management, service management, telecom, business management, asset management, business integration, convergence
    
CA SM
Published By: GoodData     Published Date: Aug 02, 2013
Explore over 50 critical sales metrics in a live, checkable and drill able environment. View essential metrics for executive overview, pipeline management, product and regional analysis, and team management, as well as vivid visualizations of historical performance trends. Download this White Paper for more information!
Tags : 
sales metrics, how to forecast sales, sales analysis, sales analytics, crm analytics, salesforce reports, salesforce analytics, sales projections
    
GoodData
Published By: IBM     Published Date: Mar 28, 2016
Whether it's through using pre- or post-hire assessments, applying managerial feedback or learning results, identifying high potentials is a huge win for determining who will lead your company forward. With such information, businesses can ensure that their most valued employees are promoted, challenged, and encouraged to succeed - and that they stay with your business. Without this data, companies risk losing the talent that keeps them competitive and successful.
Tags : 
ibm, aberdeen group, talent acquisition, recruitment
    
IBM
Published By: IBM     Published Date: Jul 20, 2016
Whether it's through using pre- or post-hire assessments, applying managerial feedback or learning results, identifying high potentials is a huge win for determining who will lead your company forward. With such information, businesses can ensure that their most valued employees are promoted, challenged, and encouraged to succeed - and that they stay with your business. Without this data, companies risk losing the talent that keeps them competitive and successful.
Tags : 
ibm, aberdeen group, talent acquisition, recruitment
    
IBM
Published By: Symantec     Published Date: Sep 19, 2012
The solutions to problems of computing security are varied and must be explored individually, but one technology shows up often: TLS or Transport Layer Security, often known by the name of the predecessor technology, SSL or Secure Sockets Layer.
Tags : 
business computing, information technology, symantec, verisign, web security
    
Symantec
Published By: Hewlett Packard Enterprise     Published Date: Aug 15, 2016
To overcome the challenges and risks of the digital era, while positioning their businesses for success, SMBs need to partner with professional services organizations with the expertise that can safely guide them through achieving the following six key IT business initiatives: Data mobility A strong information security framework (for external and internal threats) 24x7 application availability Scalable infrastructure Pervasive, end-to-end data protection End-to-end professional services
Tags : 
    
Hewlett Packard Enterprise
Published By: CDW     Published Date: Nov 13, 2012
Webinar discussing the Best Practices for Deploying Data Loss Prevention Solutions.
Tags : 
cdw webinar, dlp, personal information protection act, data loss provention
    
CDW
Published By: Trillium Software     Published Date: May 25, 2011
To achieve business goals and objectives, you must first optimize the information supporting all of your business processes. Implementing an Information Quality Management practice and applying best practices will help maximize the value of your information.
Tags : 
trillium software, information quality management, iqm, business process silos, tactical data, strategic information, productivity, mdm
    
Trillium Software
Published By: Trillium Software     Published Date: May 25, 2011
To achieve business goals and objectives, you must first optimize the information supporting all of your business processes. Implementing an Information Quality Management practice and applying best practices will help maximize the value of your information.
Tags : 
trillium software, information quality management, iqm, business process silos, tactical data, strategic information, productivity, mdm
    
Trillium Software
Published By: AlienVault     Published Date: Oct 21, 2014
The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: Velaro     Published Date: Jul 09, 2014
Application downtime impacts everyone. This paper provides best practices for communicating application downtime to end-users in a manner that maintains - or can even improve- your organization's credibility and brand image. Learn what to do and what not to do in this informative white paper.
Tags : 
    
Velaro
Published By: Focus     Published Date: Jan 06, 2011
Mitigate the risks of data breach and loss with these best practices for managing security on mobile devices.
Tags : 
amy babinchak, best practices, bob egan, expert content, information technology, it security, josh lipton, ken wineberg
    
Focus
Published By: Marketo     Published Date: Oct 17, 2016
We live in a mobile-first reality, one that has put the world’s information at our fingertips via smartphone, tablet, or wearable device. It has forever altered the ways in which we shop and consume, and how marketers engage with buyers. As a mobile marketer, you need to deliver the cohesive experience that your audience expects. Download to find out how.
Tags : 
mobile marketing, mobile apps, online shopping, email marketing, emerging marketing, social media
    
Marketo
Published By: SAS     Published Date: Aug 03, 2016
Imagine that you are in a meeting with several department heads discussing issues around enrollment. As people begin to share their thoughts, you quickly realize that each person in the room is working from conflicting information – and everyone thinks their information is correct. The group spends most of the meeting arguing over whose data and reports are correct rather than understanding the problem and making decisions. Sound familiar? When organizations have their data fragmented across many systems and departments, these situations are all too common. Without a single, trusted source of truth and easyto- use tools to interpret and understand the data, conversations are limited by everyone’s departmental perspectives and resources.
Tags : 
best practices, enterprise, competitive advantage, technology, data
    
SAS
Published By: ThousandEyes     Published Date: Aug 04, 2017
Traditional enterprise performance management solutions were designed for applications running inside the corporate network and are unable to provide visibility beyond the corporate network perimeter. With the rapid adoption of Software-as-a-Service (SaaS) applications by enterprises, these performance management solutions that are completely blind to issues outside the enterprise, are unable to help IT teams troubleshoot performance problems with the SaaS applications.
Tags : 
information technology, software as a service, management solutions, corporate network
    
ThousandEyes
Published By: Qualys     Published Date: Jan 11, 2017
With attackers using increasingly-sophisticated ways to break into systems, manual methods of locating and inspecting devices on your network are no longer enough. The right Vulnerability Management (VM) solution can monitor your environment, enabling you to: discover devices running in your network, determine whether they are vulnerable to attack, find fixes to the underlying problems, and protect yourself while those fixes are being implemented
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys
Published By: Qualys     Published Date: Jan 11, 2017
With attackers getting more sophisticated every day, manual methods of locating and testing web-based apps are no longer enough. The right Web Application Scanning (WAS) solution can help you systematically: discover web apps running in your network, determine whether or not they are vulnerable to attack, understand how to fix them, and protect your business while fixes are being implemented
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys
Published By: Workforce Software     Published Date: Feb 02, 2015
Effective workforce management starts with in an accurate, efficient and user-friendly method for capturing work hours, pay rates and absences. Those critical details inform you of whether you are overstaffing particular roles, shifts or locations (or the opposite), provide a true gauge of worker performance through productivity and attendance rates, and – when fully automated – keep your payroll spend in check. In short, there’s immense value in getting the right time and attendance system.
Tags : 
workforce software, software, automation, budgets, costs, compliance, visibility, labor
    
Workforce Software
Published By: Infoblox     Published Date: Sep 09, 2014
With trends like virtualization and BYOD making networks more complex, the need for accurate and dynamic IP address management (IPAM) is growing. Learn how to implement an IPAM solution that centralizes information to create highly efficient teams.
Tags : 
infoblox_dns_dhcp_ipam, infoblox_ddi, infoblox_dns, infoblox_ipam, infoblox_dhcp, infoblox_ip_address_management, dhs_dhcp_ipam, dns
    
Infoblox
Published By: CA Mainframe     Published Date: Sep 12, 2008
Increased regulatory scrutiny on the protection levels afforded sensitive information by those that transact and process it is causing enterprises to improve mainframe security strategies. This entails proactively investigating exposures and implementing appropriate policies, processes and technologies, including those for data z/OS tape encryption. Read this Technology Brief created by CA to learn how to identify exposure points and through the use of Tape Encryption.
Tags : 
tape library, tape backup, tape encryption, backup, encryption, best practices, ca mainframe, mainframe
    
CA Mainframe
Published By: Actiance, Inc.     Published Date: Jan 15, 2015
Government and public sector agencies are just beginning to realize how social networks can improve business results. With access to real-time communication, collaboration, and social networking platforms, agencies can improve internal process efficiencies that help them provide better services to their constituents. But first, these agencies have to consider regulatory requirements like the Freedom of Information Act (FOIA) which require compliant use of these networks and the content people create on them. Read this paper to gain an understanding of: What the regulatory landscape of the public sector looks like What concerns you should be aware of from a legal perspective
Tags : 
electronic communications, public sector, social networking platforms, compliance, real-time communication
    
Actiance, Inc.
Published By: Maxwell Systems     Published Date: Sep 05, 2013
Construction companies are meeting the challenge of ever-intensifying competition by refining their business operations with standardized operating practices and “visible” information that is shared among multiple departments. “Before, only owners who wanted to grow a very large company would worry about transitioning from the informal business they started to formalized, standardized business processes,” says Jim Flynn, CEO of Maxwell Systems, a leading provider of construction management software solutions, expert services, and best practices. “But in the current environment, you also have to make that transition just to stay competitive and improve your profitability.”
Tags : 
construction, business processes, business management, process management, operations management
    
Maxwell Systems
Published By: IBM     Published Date: Dec 30, 2008
Does your business need to safeguard information, keep auditors and regulators satisfied, and improve data quality? Data governance is the answer. This informative video outlines the latest challenges and best practices in data governance. IBM data governance solutions help businesses with:• Audit and reporting • Data architecture/infrastructure • Data quality • Information lifecyle management • Metadata/business glossaries • Organizational design/development • Policy/risk management • Security/privacy/compliance • Stewardship/value creation
Tags : 
ibm, data governance, safeguard information, data quality, data architecture, data infrastructure, information lifecycle management, metadata
    
IBM
Start   Previous    13 14 15 16 17 18 19 20 21 22 23 24 25 26 27    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.