RSS feed Get our RSS feed

News by Topic

effective enterprise

Results 126 - 150 of 180Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Mar 11, 2015
Cyber attacks are growing every day and become serious threats to your organization, but how do you know and understand the threats out there? Download a copy of this book, and you discover the zero-day exploits and threats used to compromise your enterprise. You also learn about a promising new technology developed by Trusteer, an IBM company, which provides effective yet transparent protection to enterprise endpoints. Start reading Stopping Zero-Day Exploits For Dummies, Trusteer Special Edition, today!
Tags : ibm, cybercrime prevention, it security solutions, trusteer, security
     IBM
By: IBM     Published Date: Mar 11, 2015
The primary approaches used to fight advanced threats over the past several years simply aren’t effective. Traditional methods such as user education, vulnerability patching, and malware detection have failed to protect enterprises against the current threat landscape. Attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection methods, requiring the security industry to find a different approach to malware protection. Trusteer has pioneered a new cybercrime prevention approach that provides unparalleled protection against spear-phishing, drive-by downloads and advanced, information-stealing malware.
Tags : ibm, malware detection, cybercrime prevention, it security solutions, security
     IBM
By: IBM     Published Date: Jul 28, 2017
Modern enterprises are doing their best to address three simultaneous and closely interrelated objectives related to their information technology/infrastructure: To identify and assess security-related risks, and manage them to an acceptable level To achieve, sustain, and demonstrate compliance with policies and regulatory requirements To improve the efficiency and cost-effectiveness of ongoing operations, e.g., to provide greater flexibility and scale at lower total annual cost For several years now, Aberdeen Group has referred to this trifecta of strategic objectives as the quest for enterprise computing infrastructure to be secure, compliant, and well-managed.
Tags : information technology, information infrastructure, security risks, operation efficiency, operation flexibility
     IBM
By: IBM     Published Date: Oct 13, 2017
Integrated Threat Management For Dummies, IBM Security Limited Edition, lays the foundation for effective tools and techniques that work together to help counter today’s advanced threats. Regardless of your role in the IT security organization, threat management tools and techniques will influence your job. Your role determines the part you play to effectively manage threats, including those targeting the cloud and your company’s data. If you are a Chief Information Security Officer (CISO) or security manager, this book explains in detail the types of tools you need to effectively prevent, detect, and respond to security incidents. If you’re in general business management, you’ll better understand the risks associated with enterprise computing and the reasons why a comprehensive portfolio of security tools that work well together is so important.
Tags : malware prevention, network intrusion prevention, malware protection, ibm, firewall, mutating malware, cyber threats
     IBM
By: IBM     Published Date: Oct 13, 2017
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned X-Force research, provides security intelligence to help organizations holistically protect their infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 15 billion security events per day in more than 130 countries, and holds more than 3,000 security patents.
Tags : it security, malware, malware protection, virus prevention, ibm, threat intelligence
     IBM
By: VeriSign Incorp.     Published Date: Apr 15, 2009
Get your guide today and discover a smart, new strategy for managing SSL security across your network. With VeriSign's Managed PKI for SSL Web-based service, you can centrally manage all of your SSL Certificates with a simple, Web-based interface.
Tags : mpki for ssl, managed security solutions, ssl, verisign, http protocol, secure sockets layer, public key infrastructure, certification-authority (root ca)
     VeriSign Incorp.
By: BlackBerry     Published Date: Jul 22, 2010
Unified Communications (UC) integrates multiple communications modalities and adds presence features to allow workers to communicate and collaborate more effectively with co-workers, customers and suppliers. Learn about the cost, productivity and reachability issues associated with increased enterprise mobility and the benefits and future directions of Mobile UC.
Tags : blackberry, mobility, smartphones, cell phones, mobile workforce, e-commerce, handset, fmc
     BlackBerry
By: Social Text     Published Date: Jul 21, 2009
Read this paper to learn the steps to successfully roll out an enterprise collaboration solution and help your organization embrace a more collaborative, transparent and effective way of working. Introducing a social software solution carries with it a unique set of challenges and opportunities, and requires a new roll-out approach. The approach outlined in this paper has been honed over thousands of customer implementations to generate the fastest adoption across your enterprise.
Tags : socialtext, social networking, collaboration, enterprise collaboration, social media, twitter, linkedin, facebook
     Social Text
By: IBM     Published Date: Oct 10, 2013
This paper outlines practical “how-to” guidance to strategize and implement more effective mobile enterprise programs and details the robust capabilities that mobile enterprise partners can bring to the development and support of your corporate owned device or BYOD mobile enterprise programs. It focuses on mobile enterprise programs for employees, as opposed to customers.
Tags : effective mobile enterprise, enterprise programs, mobile enterprise, guidance to strategize, guidance to implement, implement efficiently, effective implementation, corporate device
     IBM
By: IBM     Published Date: Mar 20, 2014
This analyst report provides guidelines for how to plan an effective Enterprise Asset Management strategy, including maturity levels, processes, and technologies in context of IT Asset Management advances. The paper was developed by Enterprise Management Associates - an IT Analyst firm.
Tags : ibm, enterprise assets, it assets, data management, it management, enterprise asset management, ema, it organization
     IBM
By: Polycom     Published Date: Aug 16, 2017
"Effective, engaging collaboration that leverages video conferencing should incorporate features like content sharing, clear participant rosters, easy call management controls and Instant Messaging. But, according to Microsoft research, some 97 percent of meeting rooms aren’t adequately equipped to handle video. In fact, a majority of these rooms host the most rudimentary of collaboration solutions like a digital projector and an audio connection for conference calls. And, while most of these enterprises are adopting Skype for Business for end-users, the reality is that many of their conference rooms lack the ability to connect to Skype for Business calls, which eliminates effective collaboration tools like video and content sharing. Download this guide to see how to create engaging voice and video meeting experience with Skype for Business."
Tags : polycom, skype for business, voice, video, microsoft
     Polycom
By: Polycom     Published Date: Nov 30, 2017
Effective, engaging collaboration that leverages video conferencing should incorporate features like content sharing, clear participant rosters, easy call management controls and Instant Messaging. But, according to Microsoft research, some 97 percent of meeting rooms aren’t adequately equipped to handle video. In fact, a majority of these rooms host the most rudimentary of collaboration solutions like a digital projector and an audio connection for conference calls. And, while most of these enterprises are adopting Skype for Business for end-users, the reality is that many of their conference rooms lack the ability to connect to Skype for Business calls, which eliminates effective collaboration tools like video and content sharing. Download this guide to see how to create engaging voice and video meeting experience with Skype for Business.
Tags : skype for business, collaboration, video conferencing, content sharing, call management controls, microsoft office 365
     Polycom
By: IBM     Published Date: Jun 26, 2014
Cyber attacks are growing every day and become serious threats to your organization, but how do you know and understand the threats out there? Download a copy of this book, and you discover the zero-day exploits and threats used to compromise your enterprise. You also learn about a promising new technology developed by Trusteer, an IBM company, which provides effective yet transparent protection to enterprise endpoints. Start reading Stopping Zero-Day Exploits For Dummies, Trusteer Special Edition, today!
Tags : ibm, security, cyber security, cybercrime, cybercriminals, malware, network security
     IBM
By: IBM     Published Date: Apr 06, 2015
How effective is your mobile app development process when it comes to meeting customer needs and business objectives? IBM commissioned Forrester to identify the key drivers of successful mobile apps and the costs of failure -- for both customer-facing and enterprise applications. Watch the webcast to understand the key cost drivers and why it’s more important than ever to get this right due to what Forrester calls the “mobile mind shift.” IBM customer, Bank of Montreal, also shares their mobile app dev story. A good app can increase traffic, sales, productivity and brand satisfaction. And a bad app will do the opposite (you could risk doubling your costs if you’re not mindful of the key cost drivers).
Tags : mobile app development, customer-facing applications, enterprise applications, ibm, mobile moments, traffic, sales, productivity
     IBM
By: VMware AirWatch     Published Date: May 18, 2016
VMware AirWatch gives enterprises identity, productivity and collaboration solutions through enterprise mobility management. The VMware AirWatch platform gives end users a seamless digital workspace, so they can be more effective on the go. A future-proof mobility platform enables IT to support business initiatives now and in the future with features: • Broadest OS and device support with same-day updates • Unified identity management framework across solutions • Suite of integrated productivity and collaboration apps • Centralized content management and collaboration • Global scalability with multi-tenant framework AirWatch offers a unique vision for identity, mobile, network and Infrastructure that is trusted by more than 16,000+ organizations, including 500 of the Global 2000, and has been positioned as a leader by Gartner in the 2015 Magic Quadrant for Enterprise
Tags : productivity, best practices, business intelligence, business management, information technology, device support, device management, content management
     VMware AirWatch
By: XO Communications     Published Date: Jul 17, 2014
MPLS IP-VPN network usage continues to grow and with good reason. MPLS IP-VPN provides secure, reliable, cost-effective and scalable answers for today’s enterprise networking needs.
Tags : cloud-enabled network, mpls ip-vpn, cost-effective, improve disaster, recovery, infrastructure
     XO Communications
By: Business Software     Published Date: May 28, 2013
What is Financial Management Software? Financial management software solutions allow organizations to more effectively and accurately control and manage financial operations throughout the entire business – including across multiple companies, subsidiaries, divisions, countries, and sites. With powerful features and functionality, financial management systems dramatically streamline and enhance the way vital financial data is collected, processed, stored, accessed, and presented to users within, and beyond, the enterprise.
Tags : business software, divisions, financial management
     Business Software
By: Oracle     Published Date: Nov 05, 2013
Learn how you can harness the power of the cloud to run your business more effectively and lower upfront costs. Oracle ERP Cloud Service offers a comprehensive, enterprise-grade cloud that can transform back office operations and allow you to focus on running your business.
Tags : cloud computing, enterprise-grade, back-office, erp applications, technology
     Oracle
By: Oracle     Published Date: Jan 07, 2014
Most enterprises understand the importance of listening to customer comments and conversations through social channels, and engaging and developing relationships with influencers and customer communities. But as the variety, volume, and velocity of social data continues to grow, many organizations are looking for cost-effective ways to use this data to get a better understanding and more holistic view of their customer. Social provides a unique channel to learn about your customer, and offers real-time insights like interests, actions, likes and dislikes that can provide invaluable behavioral and predictive data patterns. This social data (when aggregated with enterprise CRM data) reveals a more complete picture and understanding of customers.
Tags : social crm social roi, social media analytics, cmo and cio collaboration, socially enabled enterprise, social business, social data, social marketing, social media management
     Oracle
By: Polycom     Published Date: Mar 12, 2018
Effective, engaging collaboration that leverages video conferencing should incorporate features like content sharing, clear participant rosters, easy call management controls and Instant Messaging. But, according to Microsoft research, some 97 percent of meeting rooms aren’t adequately equipped to handle video. In fact, a majority of these rooms host the most rudimentary of collaboration solutions like a digital projector and an audio connection for conference calls. And, while most of these enterprises are adopting Skype for Business for end-users, the reality is that many of their conference rooms lack the ability to connect to Skype for Business calls, which eliminates effective collaboration tools like video and content sharing. Download this guide to see how to create engaging voice and video meeting experience with Skype for Business.
Tags : skype, business, polycom, infrastructure, meeting, enterprise
     Polycom
By: HP     Published Date: Aug 25, 2014
Virtualization offers significant agility and efficiency benefits. Pre-tested and optimized solutions from HP and Red Hat® are your fastest—and most cost-effective—path to get there. HP and Red Hat—two trusted business partners—have collaborated to create an answer. HP RA for Red Hat on ConvergedSystem 700x combines proven HP Converged Infrastructure components—to speed virtual server deployments—with open-source Red Hat Enterprise Virtualization software. The result is a compelling, cost-effective platform for consolidating your Linux systems. Read this solution brief to learn more.
Tags : virtualization, data center, cloud, infrastructure, red hat, integrated, optimization, solution
     HP
By: VMware     Published Date: Feb 24, 2017
The economy isn't standing still. For your business to succeed, your employees shouldn't either. With your network infrastructure as a strong pair of legs, the right combination of a seamless user experience and a secure workspace will give users -- and your organization -- the ability to move forward with mobility. This eBook relays the importance of unifying your infrastructure to deliver apps effectively across multiple devices. Learn how to stay on top of security and consistency with enterprise mobility management.
Tags : 
     VMware
By: IBM     Published Date: Oct 24, 2013
This analyst report provides guidelines for how to plan an effective Enterprise Asset Management strategy, including maturity levels, processes, and technologies in context of IT Asset Management advances.
Tags : enterprise asset management, maturity levels, processes, it asset management, asset management, service, inventory, procurement
     IBM
By: Oracle     Published Date: Mar 18, 2014
Dramatic shifts in workplace norms as a result of remote sales teams are now a reality, as field-based personnel perform so many vital selling and strategic account management business functions, more effectively armed with tablets than ever before. Aberdeen research conducted for Sales Performance Management 2012: How the Best-in-Class Optimize the Front Line to Grow the Bottom Line (December 2011), shows that 60% of companies’ sales team members are primarily remote workers. Indeed, in Aberdeen research for Mobile HCM: Workforce and Talent Management on the Move (June 2010), 57% of respondents who track the impact of their mobile recruiting efforts report improved quality and/or size of their talent pool as a result of their work. Does attracting and retaining a quality sales force thus require corporate technologies and processes that are influenced by consumer trends and cultural sea changes? Moreover, are there benefits to enterprises that enable their sales team to work remotely?
Tags : oracle, data management, account management, sales performance management, remote workers, sales research, workplace shifts, sales strategy
     Oracle
By: Oracle     Published Date: Mar 18, 2014
Customer relationship management (CRM) deployments are most effective when they legitimately support all three words that make up the acronym itself. Customers of the modern business-to-business (B2B) enterprise benefit when they purchase goods and services from companies who are focused on the buyer’s experience. Internal relationships within the selling organization are more effectively maintained when all customer-facing stakeholders have access to the rich data contained in a well-maintained CRM. And the management of the enterprise providing solutions can run their business like a finely-tuned machine when the maximum levels of visibility into customers and accounts are clear and accurate. This Research Brief combines research from a number of Aberdeen Sales Effectiveness research data sets, to create a holistic view of the most effectively deployed CRM systems.
Tags : oracle, customer relationship management, crm, b2b, internal relationships, sales effectiveness, sales teams, sales strategy
     Oracle
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics