RSS feed Get our RSS feed

News by Topic

it manager

Results 401 - 425 of 921Sort Results By: Published Date | Title | Company Name
By: McAfee     Published Date: Mar 08, 2013
McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : database security, database vulnerability manager, database compliance, mysql security, database password security, sql injection, buffer overflow, insecure sql code
     McAfee
By: McAfee     Published Date: Mar 11, 2013
McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities
     McAfee
By: McAfee     Published Date: Apr 16, 2014
SANS Institute's analysis team took a peek into McAfee's latest ESM software with a particular bent towards SIEM applications, and found an "easy-to-use SIEM system that can perform broad and deep event analysis as well as provide a quick assessment."
Tags : siem, data storage, event analysis, attacks, forensic analysis, security
     McAfee
By: McAfee     Published Date: Oct 28, 2014
Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Vendors are improving threat intelligence and security analytics. Read this report from leading analyst firm Gartner, to learn why they have placed McAfee as a Leader in the Magic Quadrant for Security Information and Event Management.
Tags : siem, mcafee enterprise security manager, gartner, magic quadrant, threat management, collect, store, forensics and regulatory compliance
     McAfee
By: Aruba Networks     Published Date: Sep 18, 2013
In this whitepaper Gartner explores smartphones and tablet devices, and their applications, which are increasingly at risk of malware. IT security planners and operations managers can thwart serious malware threats for the time being with these best practices. Read this whitepaper for more information.
Tags : smartphones, tablet devices, malware, best practices, security planners, risk, applications, technology
     Aruba Networks
By: Salesforce.com     Published Date: Sep 16, 2013
How is it possible that in the same environment and under the same conditions, some reps achieve outstanding results while others struggle just to make their quota? In 5 Steps to Better Sales Performance we reveal the proven methods the best sales managers rely on to close the sales performance gap between average performers and All-Stars. Download now.
Tags : sales performance management, crm, social collaboration, drive sales, best practices
     Salesforce.com
By: Salesforce.com     Published Date: Sep 16, 2013
Learn how the future of sales performance management is integrated with CRM and social collaboration and how this will help managers provide real-time coaching and motivation in context to drive better sales behaviors and, ultimately, better sales results. Download now.
Tags : sales performance management, crm, social collaboration, drive sales, nucleus research, best practices
     Salesforce.com
By: BMC Software     Published Date: Oct 23, 2014
To better support the business, I&O managers often turn to IT service support management (ITSSM) tools. ITSSM tools enable IT operations organizations, specifically infrastructure and operations (I&O) managers, to better support the production environment. ITSSM tools automate the tasks and workflows associated with the management and delivery of quality IT services to the business. The vendors in this Magic Quadrant offer integrated products that address functionality from a combined perspective of people, processes and tooling. BMC was rated as a leader by Gartner in the Magic Quadrant.
Tags : saas, cloud, itsm, integrating itsm, itsm integration, saas integration
     BMC Software
By: VMware, Inc     Published Date: Dec 05, 2013
Executive Summary: In November 2012, Vmware Commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying Vmware vCenter Site Recovery Manager (SRM). The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the VMware vCenter Site Recovery Manger on their organizations. Please download the white paper to learn more.
Tags : vmware, roi, return on investment enterprises, vmware vcenter site recovery manager, forrester consulting. srm, storage
     VMware, Inc
By: Cisco     Published Date: May 15, 2015
This Technology Spotlight examines key trends and discusses the role that Cisco's Application Centric Infrastructure (ACI) plays in addressing ongoing challenges for enterprise IT and network managers.
Tags : data center, software, networking, scale, automation, cisco
     Cisco
By: CradlePoint     Published Date: Sep 04, 2014
In this white paper, learn how PCI-DSS 3.0 effects how you deploy and maintain PCI compliant networks using CradlePoint solutions. Properly configure, monitor, and maintain your CradlePoint devices to meet the requirements of PCI DSS 3.0. Enabling features include network segmentation (ethernet ports, SSIDs, and VLANs), stateful firewall, MAC/IP/URL filtering, authentication/encryption, event logging, event alerts, time synchronization, and configuration/upgrade management from CradlePoint Enterprise Cloud Manager.
Tags : cradlepoint enterprise cloud manager, pci dss 3.0, pci compliance, stateful firewall, mac/ip/url filtering, authentication/encryption, event logging, event alerts
     CradlePoint
By: VMware SD-WAN by VeloCloud     Published Date: May 20, 2019
Software-Defined WAN, or SD-WAN for short, is at the leading edge of software-based networking deployments. SD-WAN offers significant business value for organizations with distributed branches in terms of business agility and the ability to leverage Internet bandwidth economics – put simply, cost savings. This Software-Defined WAN For Dummies book explains the way for IT and business managers to migrate to a distributed network which is less complex, more flexible and easier to manage. With this book, VMware and Dan Pitt make an important contribution to better understanding the future of WAN implementations
Tags : 
     VMware SD-WAN by VeloCloud
By: Workforce Software     Published Date: Jul 28, 2015
Download this white paper to gain a clear understanding of: Where current employee scheduling practices fall short 5 concrete ways to empower employees and improve engagement through scheduling Essential manager tools to look for in any workforce scheduling tool What to expect from scheduling improvements And more
Tags : workforce scheduling, employee engagement, productivity, manager tools, scheduling improvements, human resources
     Workforce Software
By: Xangati     Published Date: May 20, 2015
The goal for organizations with eCommerce Web sites, application developers and IT infrastructure managers is to deliver a successful end-user experience. Xangati can help you scale environment and succeed in reaching that goal.
Tags : e-commerce, e-commerce web applications, citrix netscaler adc, web server, web application infrastructure, it administrator, it infrastructure, web application performance
     Xangati
By: HP     Published Date: Jun 05, 2015
Agile management platform fosters collaboration, reduces development times, and improves project visibility.
Tags : enterprise, management, mobility, workforce, operating system, device, productivity, agile
     HP
By: SAP     Published Date: Feb 26, 2016
Work has evolved, so performance management should follow. SuccessFactors partnered with PwC to develop a paper that helps companies assess their PM programs and make PM more effective. Rethinking your performance management program addresses: • The critical importance of having separate but integrated processes to accurately assess past performance and to provide continuous coaching for the future • Techniques for embedding user-friendly social and mobile performance tools that reflect the real rhythm of the business • The pivotal role of HR to evaluate and evolve PM processes Our proven tips on how to adjust and nurture PM processes are food for thought as many managers and employees focus on the business of making 2014 a successful year.
Tags : sap, pwc, performance management
     SAP
By: Rosetta Stone     Published Date: Apr 03, 2018
For many companies, language barriers increase as business globalization becomes the norm rather than the exception. Perhaps a call center agent cannot handle customer contact in an unfamiliar language. Or a manager travels to a face-toface meeting only to sit across a conference table from clients wanting to speak in their own native language. Even within your organization, teams across global geographies must collaborate to achieve collective goals, but language barriers often stand in their way. Meanwhile, HR leaders are tasked with recruiting and retaining top talent and L&D managers must align programs with business goals. Each of these scenarios and areas of responsibility have something in common: A clear need for company-sponsored training to develop employees’ language proficiency so they can engage successfully with colleagues and customers anywhere. Thousands of learners were surveyed about the impact of language training with Rosetta Stone® business solutions.1 Results show
Tags : 
     Rosetta Stone
By: LogRhythm     Published Date: Sep 19, 2016
In this webinar Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Niemen Marcus, Sony and other breaches. By analyzing the available information about these recent data breaches, from the perspective of detection, the two have assembled an interesting list of security monitoring lessons and ideas. The list includes tips on how to eliminate double false positives, a number of generalized monitoring scenarios, as well as acknowledges the incredible power of monitoring for new executables running for the first time on your environment. If you are concerned about data breaches and you're involved in SIEM and other security monitoring, this is the webinar for you.
Tags : cyber threat, cyber risk, technology, best practices, security
     LogRhythm
By: LogRhythm     Published Date: Aug 08, 2016
Security information and event management technologies vary widely in their focus and functionalities, with vendors offering divergent security monitoring visions. This research helps IT security managers align their needs with one of the three most common use cases to choose the best SIEM solution.
Tags : security, technology, best practices, information technology
     LogRhythm
By: 8x8 Inc.     Published Date: Jun 16, 2017
Do attitudes to IT adoption vary depending on your seniority within a business? And could this be holding back adoption of technology? These are key questions explored in this paper, which compares the views of mid-level ‘hands on’ IT managers with those of senior directors within British companies. Across both groups, there is a sense that UK business in general is too wary of implementing new technology. But there is a significant divergence of opinion when it comes to a range of factors, such as the extent to which companies invest in new technology, stay on top of the latest tech, and understand its importance to the success of the business. A pattern emerges, whereby the senior leaders within companies are far happier than middle managers with the status quo around technology adoption. And IT managers even suggest that this might be driven by self preservation on the part of senior leaders.
Tags : video conferencing, instant messaging, cloud based computer system, fixed phone line, pbx, cloud based telephony system, call analytics, byod
     8x8 Inc.
By: VMware     Published Date: Feb 24, 2017
As enterprises embrace adoption of Microsoft Office 365 to drive business and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between identity management and user experience is often difficult. In this white paper, discover how VMware AirWatch® Enterprise Mobility Management (EMM) can easily integrate with Office 365 APIs, VMware Identity Manager, and an enterprise’s existing cloud, or on-premise, identity management solution to optimize user experience and ensure data is secure across all devices and platforms.
Tags : 
     VMware
By: The Ariel Group     Published Date: Jan 25, 2017
There was a time when middle managers were seen as fairly expendable. If you needed to cut costs or eliminate layers, managers were the first to get the axe. The realities of today’s environment are changing that, however. Managers are playing a pivotal role, not just in making sure key tasks get done, but in engaging employees to be more vested in the organization and motivated to contribute their best. As we keep asking people to “do more with less,” step up to new challenges, and embrace new organizational directions, managers are the ones who have the greatest opportunity to influence the actions on the front lines. They are also critical for helping organizations keep and grow top talent, a particular concern as employee disengagement and turnover rates are costing companies billions of dollars annually.
Tags : 
     The Ariel Group
By: Rizepoint     Published Date: Feb 13, 2017
Download this white paper,Improving RTE Food Safety by Building a more Complete and Modern Safety Management System, and read about the food safety challenges of ready-to-eat and fresh prepared foods, and how technology plays a growing role in achieving active managerial control with crucial characteristics and capabilities required for a next-generation food safety auditing solution.
Tags : 
     Rizepoint
By: Kronos     Published Date: Jul 26, 2017
It’s time to think more strategically about your entire workforce. Learn the benefits of a unified approach to HCM and workforce management. In today’s competitive and rapidly changing business environment, sustained success requires a total HCM strategy that focuses on managing, engaging, and retaining your entire workforce — both hourly and salaried employees alike. It also requires a single, unified technology platform that enables managers to successfully execute on that holistic strategy for improved operational efficiency, higher employee engagement, and better business outcomes.
Tags : workforce, unified technology, operational efficiency, employee engagement, better business outcomes
     Kronos
By: Infosys     Published Date: May 21, 2018
Experimenting faster is a trait shared by most innovative organizations. They want to experiment with new products and promotions to see if they can unearth bold new ways of serving the customer. But this experimentation cannot be random: it needs to be guided by data and based on current customer insight. It was access to this data that was the problem for our client, a large consumer brand. It took a long time to prepare the data to a point where it could be used by business managers. So long, in fact, that the data was no longer relevant; and the moment as often lost. The company needed to be able to experiment faster but was held back by a cumbersome and ineffective analytics infrastructure.
Tags : experiment, organizations, customer, insights, analytics
     Infosys
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics