RSS feed Get our RSS feed

News by Topic

control

Results 2176 - 2200 of 2252Sort Results By: Published Date | Title | Company Name
By: VMware AirWatch     Published Date: May 24, 2016
Una de las preguntas más frecuentes de los clientes es ¿cuánto soporte le provee AirWatch a Office 365? Muchos preguntan si AirWatch controla el acceso a Office 365 (O365) en los dispositivos móviles de la misma forma que lo controla en los sistemas de escritorio corporativos.
Tags : application management, best practices, mobile support, mobile, systems management, business optimization
     VMware AirWatch
By: IBM     Published Date: Jan 07, 2016
Trusteer Apex delivers a new approach to advanced malware protection - Stateful Application Control.
Tags : ibm, threat, trusteer apex, malware, application, security
     IBM
By: IBM     Published Date: Jan 07, 2016
This buyer’s guide can help you select the right identity and access management solution to successfully manage and control user access within, across and between organizations.
Tags : ibm, identity, access assurance, identity, security
     IBM
By: Dell EMC     Published Date: Nov 04, 2016
With the 'EMC Mission Control' center in Portsmouth, UK and a second at the America’s Cup venue in Bermuda, plus a mobile center travelling worldwide to the preliminary events, Land Rover BAR will have all its data continuously replicated. The team in Portsmouth can analyze race and testing data immediately, as well as identify and make improvements right up to and through the finals in June 2017. This allows the design team and the crew to adapt much faster. With the introduction of the VCE VxRail Appliance powered by Intel® Xeon® processors, Land Rover BAR will be able to flexibly and rapidly scale, irrespective of location, ensuring a seamless experience for the team. To learn more about the impact of the Dell EMC VCE VxRail Appliance, read this brief infographic.
Tags : it infrastructure, hyper-convergence, architecture, sql, microsoft exchange
     Dell EMC
By: Dell EMC     Published Date: May 09, 2018
Dell’s approach to PC Lifecycle management is designed to help customers make the change from IT maintenance to innovation all while controlling their PC infrastructure costs. With this eGuide IT professionals will learn how to deploy, secure, and support PCs with unparalleled efficiency leveraging Dell’s industry-leading hardware, services, and security solutions. Access the eGuide from Dell and Intel® and you will learn: • Why IT needs to take a different approach PC lifecycle management • The four critical stages of the PC lifecycle (Plan, Deploy, Manage, and Retire) • How to partner with Dell to strategically migrate to Windows 10 • What solutions can help in each phase to reduce costs and increase IT productivity • The latest security solutions to protect data and employees
Tags : 
     Dell EMC
By: EMC     Published Date: Oct 13, 2015
MG Group explains their adoption of EMC Documentum Capital Projects to streamline information control and effective management in the world’s largest PET production plant.
Tags : emc documentum capital projects, document management, share information, share documents
     EMC
By: ServiceNow     Published Date: Jan 13, 2017
The End of Now. The Beginning of Now. Your IT service desk is swamped from the moment work begins. It’s unclear how to gain control without the right tracking, prioritization and reporting. But with the right guidance, you can improve IT service delivery and demonstrate how IT is performing to support the business. This eBook, the first in a series that addresses key aspects of IT Service Management, provides best practices on how to: Accelerate incident resolution with automation and prioritization Improve change management processes with better controls and visibility Optimize reporting for setting goals, aligning priorities, demonstrating results
Tags : 
     ServiceNow
By: Okta     Published Date: Jul 27, 2016
The shift to the cloud is changing how companies think about their IT infrastructure and what they must do to manage it. The on-demand applications and services that comprise a cloud services network enable companies to rapidly deploy powerful capabilities to a broad set of users at very low costs. However, they also introduce challenges associated with securing and controlling users and access, simplifying adoption and scaling of these applications, and providing insight into utilization to ensure the business is optimizing its cloud investments. Okta’s on-demand identity management service enables companies to address these challenges head-on by being designed from the ground up as a scalable, secure, multi-tenant service that protects your data through centralized access control. This whitepaper details Okta’s focus on security and reliability, how Okta enhances security and how Okta itself stays secure.
Tags : identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
     Okta
By: U.S. Cellular     Published Date: Jun 04, 2018
Mobile Device Management (MDM) is a must for any business with employees who have access to company data via mobile devices. This free whitepaper will inform you on the basics of MDM technology and how it can give you more control over Smartphones, Tablets and laptops used by your employees—like being able to remotely lock and wipe lost or stolen devices
Tags : 
     U.S. Cellular
By: Flexera     Published Date: Apr 22, 2019
The annual RightScale State of the Cloud Survey research team has now joined Flexera—and our newest Report doesn't disappoint. Check out some of our key takeaways for 2019. The #1 cloud priority in 2019 is cost optimization. Most enterprises already spend over $1 million a year in public cloud, yet users underestimate the amount of their wasted cloud spend. With companies now running 79% of their workload in cloud, this rapid rise poses a challenge for IT teams whose business units often control the purse strings. How does your cloud infrastructure compare? This leading survey of 786 corporate cloud users gives you a by-the-numbers look, from small business to large enterprise, from healthcare to government and across a wide range of industries. Get all the details in this eighth annual report. Download it today.
Tags : 
     Flexera
By: Flexera     Published Date: Apr 22, 2019
The annual RightScale State of the Cloud Survey research team has now joined Flexera—and our newest Report doesn't disappoint. Check out some of our key takeaways for 2019. The #1 cloud priority in 2019 is cost optimization. Most enterprises already spend over $1 million a year in public cloud, yet users underestimate the amount of their wasted cloud spend. With companies now running 79% of their workload in cloud, this rapid rise poses a challenge for IT teams whose business units often control the purse strings. How does your cloud infrastructure compare? This leading survey of 786 corporate cloud users gives you a by-the-numbers look, from small business to large enterprise, from healthcare to government and across a wide range of industries. Get all the details in this eighth annual report. Download it today.
Tags : 
     Flexera
By: Microsoft Office 365     Published Date: Oct 14, 2016
Going with a single-vendor collaboration platform is an easy call, right? Employees can communicate and share more easily, and your IT team only has to deal with implementation from one vendor, not dozens. But, in case you’re still pondering, here are five reasons a collaboration suite makes sense: 1.Saved time and increased productivity 2.Lower costs and less complexity 3.End-to-end security compliance 4.Scaling at your pace 5.Control over the back end Download the Better Together eBook for complete details.
Tags : productivity, enterprise, complexity, compliance, employees, security
     Microsoft Office 365
By: BlackLine     Published Date: Aug 06, 2018
Listen to this webinar to learn about utilizing technology to improve the control environment!
Tags : 
     BlackLine
By: Coupa     Published Date: Mar 07, 2016
You can't capture the full benefits of eInvoicing without getting all your suppliers onboard. This webinar will cover: How to communicate the change to suppliers The importance of supporting multiple transaction models Financial and efficiency gains for both parties Impact on supplier relationships
Tags : 
     Coupa
By: Coupa     Published Date: Mar 08, 2016
You can't capture the full benefits of eInvoicing without getting all your suppliers onboard. This webinar will cover: how to communicate the change to suppliers The importance of supporting multiple transaction models Financial and efficiency gains for both parties Impact on supplier relationships
Tags : 
     Coupa
By: Akamai Technologies     Published Date: Nov 13, 2018
The ongoing adoption of cloud computing by communications service providers (CSPs) continues to fundamentally reshape their business models and technology strategies on several levels. One such area that is garnering significant attention is the impact of the cloud on security services. This is because security services and the vital tools they encompass can be empowered through the adoption of a carrier cloud model. This, in turn, better positions CSPs to meet the demands of their customers, including those in the small to medium-size business (SMB) market segment. The timing of this migration is optimal, since many SMBs now recognize the threats they face and realize that given their limited IT budgets and lack of security expertise, CSPs are well positioned to protect them from cyberattacks. While the opportunity for CSPs is significant, many are hesitant to make a move in this area because they want to ensure they can address SMBs’ needs and maintain control of the service in a car
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Dec 05, 2018
Akamai now mitigates the more than 65% of the 10,000-plus yearly DDoS attacks against its Prolexic platform via proactive mitigation controls, in 0 seconds and with no customer impact. The number of DDoS attacks instantly mitigated via the Prolexic platform has increased exponentially over the past four years. We attribute this growth to our proactive engagement with customers, and the ability to implement and manage proactive mitigation postures based upon their baselined network traffic. Akamai has been detecting and successfully mitigating DDoS attacks in an industry-leading SLA for 15 years. We will illustrate how Akamai continues to lead the industry with new capabilities including advanced customer traffic profiling and proactive mitigation controls to ensure the best possible results during an actual DDoS event.
Tags : 
     Akamai Technologies
By: IBM     Published Date: Apr 04, 2016
Enterprises are trending toward hybrid IT operations, turning to the cloud and managed service providers to fill the gaps in complex IT environments. This demands a new generation of MSS, enabling on-premise and managed functions to be viewed and controlled as part of a common platform.
Tags : ibm, hybrid it operations, cloud, mss, managed security services
     IBM
By: IBM     Published Date: Jul 14, 2016
Many internal control programs are still undergoing major modifications due to increased PCAOB requirements, adoption of the 2013 COSO Framework, and board focus on risk and compliance processes. Organizations are using several technology approaches to manage the process—some with more success than others. Read this white paper to learn why organizations need to utilize the tools that optimize collaboration and focus on productivity, the pros and cons of desktop-based spreadsheets and GRC platforms, and the merits of taking a fresh approach to technology to manage internal control processes.
Tags : 
     IBM
By: IBM     Published Date: Jul 14, 2016
If your company is engaged in international activities, it's critical that you assess and understand the risks of non-compliance with the Foreign Corrupt Practices Act (FCPA). To avoid becoming a costly statistic, you need to design your controls accordingly. Download this white paper from experts Joseph Howell, Cofounder and Executive Vice President at Workiva, and Brent Macey, Director of Internal Audit for Schnitzer Steel Industries, Inc. They'll discuss the major components of the FCPA, and how companies can perform the risk assessment process in an efficient manner. They'll also provide a practical guide to implement internal controls for FCPA at an international level.
Tags : best practices, risk management, foreign corrupt practice act, technology, business management
     IBM
By: IBM     Published Date: Jul 14, 2016
How are some companies decreasing audit fees in the face of pressure to increase them? In this follow-up report to the 2015 Audit Fee Survey, Financial Executives Research Foundation interviewed several senior-level financial executives and audit partners. These interviews revealed best practices in mitigating increases in audit fees and how to work more efficiently and effectively with auditors. Access this report to learn the reasons for increased audit fees and the impact of PCAOB inspections. You'll also discover how to review current audit focus areas, improve internal controls, automate processes, and review audit hours and fees.
Tags : best practices, audit, finance, efficiency, productivity
     IBM
By: IBM     Published Date: Jul 14, 2016
As the focus on internal controls moves into its second decade, it'd be easy to assume that most organizations have mastered their processes. However, with the adoption of the 2013 COSO Framework, increased requirements from the PCAOB, and board focus on risk and compliance processes, many internal control programs are undergoing major modifications in numerous areas. Read this e-book to find out how and why companies have made the move to different platforms, including why companies need to focus on utilizing the most productive tools, several technology approaches used by organizations, and the merits of taking a fresh approach to technology to manage internal control processes.
Tags : best practices, technology, risk management, compliance, business management
     IBM
By: IBM     Published Date: Jul 14, 2016
Workiva commissioned Forrester Consulting to conduct a Total Economic ImpactTM study and examine the potential return on investment (ROI) enterprises may realize by deploying Wdesk for Controls Management. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Wdesk on their organizations and how it can be leveraged to optimize the processes necessary to deliver Sarbanes-Oxley (SOX) compliance. This in-depth financial summary finds a 238% three-year, risk-adjusted ROI for a large auto parts retailer. Key outcomes include reduced the effort required to formulate and update processes and controls for SOX compliance resulting in a three-year benefit of $190,568, and simplified audit efforts with improved audit trails in financial controls, delivering three-year present value benefits of $128,965.
Tags : cloud reporting, business management, economic impact, forrester, consulting
     IBM
By: IBM     Published Date: Jul 14, 2016
Fraud can happen in any organization—big or small— even in yours. Read this e-book to learn how to identify risks in your organization. It details how and why fraud happens in many organizations, four steps to prevent and detect fraud through internal controls, and why properly designing controls is a crucial step.
Tags : best practices, detect fraud, business management, internal control, security
     IBM
By: Oracle     Published Date: Apr 16, 2018
Os líderes empresarias querem que os gestores financeiros assumam o papel de direcionadores proativos do negócio. Mas a sua equipe está preparada para isso? Veja como as soluções de Finanças da Oracle podem habilitar a Jornada da Modernização Financeira com inovações relevantes que impactam diretamente os atuais processos de controle e análise, oferecendo alto desempenho, agilidade e evolução digital com riqueza de funcionalidades cada vez mais próximas das necessidades dos usuários de negócios.
Tags : aumentar, agilidade, equipe, financeira, reduzir, custos
     Oracle
Start   Previous    77 78 79 80 81 82 83 84 85 86 87 88 89 90 91    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics