RSS feed Get our RSS feed

News by Topic

business

Results 201 - 225 of 14159Sort Results By: Published Date | Title | Company Name
By: HireRight     Published Date: Jul 31, 2013
HireRight Employment Screening Benchmarking Survey 2013 Edition.
Tags : hireright, background checks, talent management, screening employees, small business report
     HireRight
By: Birst     Published Date: Jul 16, 2013
Covering 23 vendors and 5 market segments, the 2013 Wisdom of Crowds Business Intelligence Market Study helps readers understand the current market landscape including the perceptions and plans of organizations adopting BI solutions, the latest user trends and technology.
Tags : business intelligence, agile bi, self service bi, bi in the cloud, unified bi, mobile bi, embedded analytics, business analytics
     Birst
By: Adobe     Published Date: Apr 17, 2014
Discover new opportunities for maturing your data practices—and building your business results. You’ll learn how to move beyond mere web analytics to build a more comprehensive marketing analytics approach that includes mobile, social, and offline channels. And you’ll see how your current analytics capabilities compare to those of similar organizations and where you have opportunities for improvement.
Tags : adobe, analytics, marketing, data collection, data automation, marketing automation, web analytics, marketing analytics
     Adobe
By: Windstream     Published Date: Mar 26, 2014
With so much information about cloud computing, it’s hard to know where to go or who to trust for information. Here’s a short resource guide on cloud computing trends.
Tags : windstream, cloud, cloud trends, cloud computing, great migration, cloud security, data, cloud for business
     Windstream
By: IBM     Published Date: Jan 09, 2015
IBM sponsored the and Ponemon Institute examined the actual costs of data breaches at 61 US companies and drew on the results of more than 500 interviews to reveal the true costs of data breaches today, from detection and escalation to customer churn. Read the analyst research to find out the average number of breached records per company, the real reasons most data breaches occur, the capital outlays that a breach requires, and the rate at which customers abandon companies after a breach occurs.
Tags : data breaches, data breach detection, business continuity management, malware, security
     IBM
By: Progress Software     Published Date: Mar 12, 2014
For IT managers, choosing the wrong vendor can lead to disruption, high costs, and the loss of confidence from within the business. Learn how to de-risk your vendor selections by aligning with market trends.
Tags : progress software, choosing vendors, datadirect, connectivity, saas applications, big data, data warehousing, nosql
     Progress Software
By: NetProspex     Published Date: May 12, 2014
NetProspex manages B2B marketing data on a massive scale. When we analyzed the more than 61M the records we processed last year, here’s what we found.
Tags : marketing data services, marketing data management, marketing data quality, installed technology list, international contact data, business contact list, marketing database cleansing, marketing database services
     NetProspex
By: Polycom     Published Date: Jul 24, 2014
Download this survey to learn what 5,000 business professionals around the world say are their biggest collaboration challenges—and discover the strategies they deploy to overcome them. In late 2013, Polycom invited customers and partners around the world to participate in a survey that focused on collaboration challenges. More than 5,000 business professionals from all job levels, functions and vertical sectors responded, candidly sharing insights about their obstacles and the strategies they deploy to overcome them. The survey reveals that 85% of the respondents believe video conferencing helps them achieve their business goals. See how they successfully use video in their profession and how you can leverage technology to defy distance and improve remote collaboration within your organization as well.
Tags : polycom, collaboration video conferencing, defy distance
     Polycom
By: CEB     Published Date: Oct 21, 2014
The impact of information is changing and while this change provides great opportunities, it also presents greater risks. Traditional monitoring processes and technology advancements alone no longer deliver effective identification, management, and prevention of business risks, instead the changing impact of information demands early detection and root cause analysis. Learn how leading companies are magnifying exploitation of information security risks, along with advancing identification and protection of compliance risks.
Tags : corporate executive board, ceb, legal, risk, compliance, assurance teams, audit
     CEB
By: CEB     Published Date: Dec 03, 2014
As cost and productivity expectations persist, many functions are rethinking the way their work gets done to remain both efficient and innovative. But not all business partners may welcome these kinds of transformations. To stay progressive, the best companies enable employees to exercise greater influence over internal clients and alter the entrenched views their function.
Tags : procurement insights, operations insights, productivity expectations, proactive business, procurement organizations, productive supplier partnerships, supplier relationship management, procurement leaders
     CEB
By: CompareBusinessProducts     Published Date: Feb 27, 2015
Read on to discover revealing points on the climate of phone systems in 2015
Tags : phone system, the cloud, byod, identity phone, integration, business tools, communication value, value pyramid
     CompareBusinessProducts
By: IBM     Published Date: Oct 13, 2015
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : ibm, ibm managed security services, cyber security, data, threat, malware, index, security
     IBM
By: IBM     Published Date: Jan 07, 2016
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : ibm, cyber security, threat, data, security
     IBM
By: IBM     Published Date: Jan 15, 2016
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : ibm, cyber security, overview, threats, security
     IBM
By: IBM     Published Date: Apr 04, 2016
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : ibm, cybersecurity, cybersecurity intelligence index, security threats, security
     IBM
By: Lumension     Published Date: Jun 03, 2015
Report leads to the security best practices that can better protect your information and your business.
Tags : 
     Lumension
By: Crownpeak     Published Date: Jul 31, 2015
With today's ever-increasing demand for a seamless customer experience, the website has become a primary influencer for buyers. The Gartner Magic Quadrant for Web Content Management provides an in-depth analysis of leading vendors, guiding companies that are in the process of evaluating a Web Content Management solution for their business.
Tags : crownpeak, gartner, gartner magic quadrant, web content management, wcm, saas, cloud, search marketing
     Crownpeak
By: Cisco     Published Date: Aug 27, 2015
Magic Quadrant report looking specifically at on-premises unified communications requirements for midsize organizations with 100 to 999 employees.
Tags : unified communications, midsize enterprise, uc solutions, productivity, business process, enterprise communications methods, integrated application, collaboration application
     Cisco
By: Cisco     Published Date: Nov 17, 2015
Midsize businesses have ever-greater choice in premises-based unified communications, with providers extending features and go-to-market channels while trying to maintain ease of use and consistency. Midmarket IT planners should evaluate UC providers' delivery capabilities, not just their solutions.
Tags : cisco, gartner, unified communications, midsize enterprises
     Cisco
By: Bounty Jobs     Published Date: Oct 14, 2015
The BountyJobs Direct Hire Agency Benchmarking Reports are released twice a year to provide business leaders with key insights into trends and past performance of the agency recruiting marketplace, where companies seek some of the most highly sought-after candidates.
Tags : 
     Bounty Jobs
By: VMware AirWatch     Published Date: Nov 12, 2015
VMware continues to raise the bar in business mobility. It offers the most streamlined process for deployment and management of business mobility solutions through its EUC products, and has given IT administrators the perfect set of options to efficiently manage the challenges of business mobility. The company continues to grow by bringing complete solutions that go beyond simply providing basic client or desktop monitoring services. Frost & Sullivan believes that VMware is in an ideal position to help its customers execute on their next-generation business mobility strategies; based on this analysis Frost & Sullivan recognizes VMware with the 2015 Visionary Innovation Leadership Award.
Tags : vmware, business mobility, euc products, end user computing
     VMware AirWatch
By: Xactly     Published Date: May 11, 2016
Read on to discover how companies are designing and administering their sales compensation plans, and to get additional considerations and summary findings from Xactly analysts based on an analysis of the results.
Tags : sales, sales planning, business management
     Xactly
By: Salesforce     Published Date: Jan 06, 2016
Salesforce Research surveyed more than 2,300 global sales leaders to discover: The unifying goals, stumbling blocks, and success metrics for today’s sales teams How high-performing sales teams are evolving to stay ahead of the curve Areas where sales is doubling down to supercharge business in the next 12–18 months. This report highlights sales trends in 2015, including the central role of sales teams in an integrated customer success platform. Throughout the report, data is examined relative to sales performance to identify patterns for overall customer success.
Tags : 
     Salesforce
By: Lumension     Published Date: Jun 05, 2015
Well-funded hackers with sophisticated tools made headlines and worried organizational leadership throughout 2014 yet the primary reason endpoint security risk has become more difficult in the past 24 months is due to negligent or careless employees who do not follow security policies says IT in the 2015 State of the Endpoint study by Ponemon Institute and commissioned by Lumension, a global leader in endpoint management and security. Learn more about the risks.
Tags : report, servers, cloud, applications, it network, business intelligence, productivity
     Lumension
By: Polycom     Published Date: May 12, 2015
The infographic Top Challenges of 2015 for Financial Institutions outlines the industry’s trends and landscape.
Tags : polycom, finance, best practices, fsi, business model, technology
     Polycom
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics