RSS feed Get our RSS feed

News by Topic

change management

Results 226 - 250 of 408Sort Results By: Published Date | Title | Company Name
By: ITinvolve     Published Date: Jun 06, 2012
Learn why Enterprise Management Associates analyst Dennis Drogseth calls ITinvolve for Change Management "a breath of fresh air in humanizing change management and streamlining collaboration across a wide range of relevant stakeholders.
Tags : change management, cloud computing, cross-domain change management, cmdb, cms, itinvolve
     ITinvolve
By: ITinvolve     Published Date: Jun 06, 2012
As much as 80 percent of the time related to MTTR (mean time to repair) is spent on identifying the key components, relationships, and people involved to determine the cause of a problem and fix it.
Tags : mean time to repair, mttr, cloud computing, change management
     ITinvolve
By: ITinvolve     Published Date: Apr 16, 2013
What if you could quickly and easily review the potential impacts of making a change in your environment and identify each and every stakeholder who should weigh in on the risk of the change before it is approved? With social knowledge collaboration you can. Read this use case document to explore a real-world example of how social knowledge collaboration improves the accuracy and speed of change planning.
Tags : knowledge collaboration, social knowledge collaboration, social knowledge, collaboration, stakeholder, itinvolve
     ITinvolve
By: Jamf     Published Date: Jun 07, 2018
A decade ago, Mac was an uncommon sight in many businesses and routinely ignored by corporate IT — but times have changed. Today, employee-choice programs are driving Mac growth in enterprises with 72 percent of employees choosing Mac over PC when given the chance. Now, the need to properly deploy, manage and secure Apple is at an all-time high. This white paper examines how purpose-built management solutions are essential to a successful Apple strategy, and walks you through: • The current state of enterprise management solutions • Features required for best-of-breed Apple management • How Jamf and Microsoft are delivering co-management to the enterprise
Tags : 
     Jamf
By: JobApp     Published Date: Jul 26, 2012
Seasonal hiring has its own set of unique challenges compared with finding candidates for permanent positions. Committing to making five common-sense changes in the seasonal-talent management process can result in faster, more effective hiring.
Tags : jobapp, seasonal hiring, holiday hiring, summer hiring, winter hiring, retail hiring, paperless hiring, onboarding
     JobApp
By: Jobvite     Published Date: Aug 25, 2016
The talent acquisition market has changed dramatically. It is no longer just about placing ads on different sites and waiting for the resumes to roll in. Rather, it’s ferreting out those passive candidates and convincing them that your company is where they can shine and grow in their profession. Today’s recruiters must proactively search, find, and nurture candidates in this tough job market, and they need good tools to do this. In Forrester’s 45 criteria evaluation of talent acquisition vendors, we identified the 12 most significant software providers — ADP, Cornerstone OnDemand, Findly, IBM Kenexa, iCIMS, Jobvite, Lumesse, Oracle, PageUp People, PeopleFluent, SuccessFactors, and Technomedia — in the talent acquisition category that provide both applicant tracking system (ATS) and various levels of talent relationship management (TRM) functionality in their recruiting offering. This report details our findings about how well each vendor fulfills our criteria and where they stand in r
Tags : 
     Jobvite
By: Juniper Networks     Published Date: Aug 08, 2017
Digital Transformation and other changes drive vast and innumerable new data flows through the business, and increase pressure on IT to continually, quickly, and efficiently address a broad array of new demands. IT needs a network that empowers the business but is too often hampered by it instead. Network management as most practice it now is too complex and inefficient. The solution is automation.
Tags : 
     Juniper Networks
By: Juniper Networks     Published Date: Aug 08, 2017
The constant growth of cloud, IoT, virtualization, mobility, and digital transformation has brought tectonic changes to the world of networking. Long viewed as a bastion of single-purpose, inflexible, and closed solutions, networks have started to transform in line with the demands for flexibility, scalability, ease of management, interoperability, and application support. Networking departments need to achieve all of the tasks above while keeping costs under control. Additionally, security requirements for the new network are not letting up — quite the opposite, as the virtualized network (and general IT) environment requires rethinking, virtualization, and evolution of security architectures.
Tags : 
     Juniper Networks
By: Juniper Networks     Published Date: Aug 08, 2017
Business evolution and technology advancements during the last decade have driven a sea change in the way data centers are funded, organized, and managed. Enterprises are now focusing on a profound digital transformation which is a continuous adjustment of technology management resources to deliver business results, guided by rapid review of desired outcomes related to end clients, resources, and budget constraints. These IT transitions are very much part of the competitive landscape, and executed correctly, they become competitive differentiators and enable bottom line growth. These outcomes are driving data centers to virtualization, service-oriented architectures, increased cybersecurity, “big data,” and “cloud,” to name a few of the key factors. This is completely rethinking and retooling the way enterprises handle the applications, data, security, and access that constitute their critical IT resources. In essence, cloud is the new IT.
Tags : 
     Juniper Networks
By: Juniper Networks     Published Date: Aug 10, 2017
A Scalable Data Center Network for the Data Tsunami Digital Transformation and other changes drive vast and innumerable new data flows through the business, and increase pressure on IT to continually, quickly, and efficiently address a broad array of new demands. IT needs a network that empowers the business but is too often hampered by it instead. Network management as most practice it now is too complex and inefficient. The solution is automation.
Tags : digital transformation, virtual infrastructure, network, data, automation, security, nemertes
     Juniper Networks
By: K2     Published Date: Jan 07, 2016
When driving any major change within an organization, strategy and execution are intrinsic to a project’s success. Nevertheless, closing the gap between strategy and execution remains a challenge for many organizations, as explored in a recent Process Excellence Network report: “Shift Business Excellence Into High Gear: Drive Strategic Performance Through Process Excellence.” Companies tend to focus more on execution than strategy for quick results, instead of taking the time needed to understand the parts that make up the whole, so the right execution plan can be put in place to deliver the best outcomes. A large part of closing this gap is understanding that business operations don’t fit neatly within the traditional organizational hierarchy. Business processes are often messy, collaborative efforts that span people, departments and systems, making them difficult to manage within a hierarchical structure. Business process management (BPM) helps by redefining an organization accordin
Tags : business transformation, organizational change, process excellence network, strategic performance
     K2
By: K2     Published Date: Jan 07, 2016
The business context for process excellence and business process management (BPM) has changed dramatically since the 2009-to-2010 recession. During the recession, BPM software and services saw impressive double-digit growth as a result of enterprises slashing costs and boosting worker productivity. Now, executive agendas have shifted to focus on growing revenue, expanding the customer base, and delivering new digital products and services. Enterprise and process architects are reshaping their business cases for BPM around these new drivers. This is not an easy task. However, process excellence will play a critical role for forward-thinking enterprise architects that invest the time to link BPM to new front-office drivers to help the organization drive digital transformation. This report replaces “Building The Case For Your BPM Initiative” in the business process management playbook and provides guidance on developing revenue and customer-focused business cases.
Tags : bpm, business process management, process excellence, best practices, security
     K2
By: Kaseya     Published Date: Feb 16, 2011
The goal for this suite is to give you ITIL in a box. This release includes Incident Management, Service Request Management, Problem Management and Change Management.
Tags : kaseya, itil, incident management, service request management, problem management, change management, service desk
     Kaseya
By: LANDesk     Published Date: Feb 12, 2007
This paper shows how LANDesk Process Manager can allow you to design processes once, automate them everywhere and refine them as needed - saving money, ensuring compliance and keeping even the most complex processes running reliably.
Tags : it management, productivity, change management, project management, groupware workflow, automating it, it automation, process management
     LANDesk
By: LeftHand Networks, Inc.     Published Date: Jan 15, 2009
Today's Microsoft Exchange environment is growing exponentially.  This white paper explores several ways that administrators can spend less time on day to day Microsoft Exchange Management - all while planning future growth in the process.  Isn't it time to start reducing the stress of managing your exchange environment?
Tags : lefthand networks, microsoft exchange, microsoft exchange management, exchange environment, iscsi san
     LeftHand Networks, Inc.
By: Liaison Technologies     Published Date: Feb 07, 2014
Learn why businesses are increasingly using a managed services approach for their EDI/B2B needs. You too may consider it for your business.
Tags : liaison, electronically exchange, managed services, manage data, b2b, data management, enterprise application integration, eai
     Liaison Technologies
By: Liaison Technologies     Published Date: Feb 07, 2014
Businesses and their IT departments are increasingly looking into the Cloud to drive innovation and increase business agility. Are you on the cloud?
Tags : liaison, the cloud, cloud computing, hybrid approach, hybrid business, business agility, increase innovation, applications or processes
     Liaison Technologies
By: Lookout     Published Date: Dec 13, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
     Lookout
By: Lookout     Published Date: Mar 28, 2018
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile specifc security. To encourage this evolution, Lookout developed the Mobile Risk Matrix. Its purpose is to help security organizations understand the spectrum of risk on mobile devices and to provide data that demonstrates the prevalence of mobile risk.
Tags : 
     Lookout
By: Lumension     Published Date: Oct 17, 2008
The realities of security and compliance have changed considerably since patch management faced its first big paradigm shift some years ago. At that time many organizations wrestled with the transition from manual patching and remediation to an automated process. Of course, nothing in security is ever static, so it is no surprise that patch management has continued to evolve since then. Though still automated, today’s best patch management tools and techniques are significantly different from their predecessors. In this whitepaper, Lumension Security’s Matt Mosher, Senior Vice President of the Americas, gives an historical perspective on how this evolution unfolded and why it is important for organizations to evolve their patch management technology in order to remain on top of increasing security attacks.
Tags : lumension, unix, linux, web 2.0, windows, cve
     Lumension
By: Lumension     Published Date: Feb 07, 2014
Being able to compare the impact of application control and traditional anti-virus solutions could help you improve your server's performance and security.
Tags : lumension, server performance, server security, application control, anti-virus solutions, endpoints, application control solution, malware
     Lumension
By: Lumension     Published Date: Feb 07, 2014
Do you know about advanced threats? Would you know how to deal with them? This white paper will teach you the 5 tactics for dealing with those advanced persistent threats.
Tags : lumension, persistent threats, information security, it regimes, threat solution, risk mitigation, vulnerability management, layered defenses
     Lumension
By: Lumension     Published Date: Feb 07, 2014
Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Here’s what you need to know about memory-based attacks—and how to effectively protect against them.
Tags : lumension, persistent threats, memory-based attacks, information security, it regimes, threat solution, risk mitigation, data security products
     Lumension
By: Lumension     Published Date: Jun 03, 2015
The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up. It’s time to rethink how we protect our endpoints. Instead of trying to build a better anti-virus “mousetrap,” without any shift in the underlying management model for vetting change in endpoint environments, security professionals should investigate more innovative approaches to endpoint security that can automate trusted change policies. This paper discusses an innovative approach to application whitelisting – one that integrates application control, anti-virus, patch management and a trusted change management engine into one unified solution – to improve endpoint security and provide the necessary flexibility to optimize IT operations and user productivity.
Tags : anti-virus, security, application, management, patch
     Lumension
By: Lumension     Published Date: Jun 05, 2015
The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up. It’s time to rethink how we protect our endpoints. Instead of trying to build a better anti-virus “mousetrap,” without any shift in the underlying management model for vetting change in endpoint environments, security professionals should investigate more innovative approaches to endpoint security that can automate trusted change policies. This paper discusses an innovative approach to application whitelisting – one that integrates application control, anti-virus, patch management and a trusted change management engine into one unified solution – to improve endpoint security and provide the necessary flexibility to optimize IT operations and user productivity.
Tags : anti-virus, security, application, management, patch, anti virus, application security, patch management
     Lumension
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics