RSS feed Get our RSS feed

News by Topic

it manager

Results 226 - 250 of 929Sort Results By: Published Date | Title | Company Name
By: Microsoft Office 365     Published Date: Sep 26, 2017
Today’s businesses rely heavily on email to communicate with clients, partners, and colleagues. But research suggests that organizations are lacking when it comes to protecting themselves against the increasing number of customized and complex attacks. When polled by Mimecast, 83% of IT security managers said they see email as a primary source of attack, yet 65% claim they aren’t fully equipped to resolve the risks associated with email threats. Respondents’ perceptions of primary security threats also appeared to change based on having experienced a successful breach. However, viruses, malware, spam, and insider threats remain the top concerns for both groups, both with and without breach experience.
Tags : 
     Microsoft Office 365
By: Cherwell Software     Published Date: Apr 07, 2016
Curves® and Jenny Craig® operate 7,000 Curves clubs and franchises globally and 400 Jenny Craig locations supported by IT service desks in California, Texas, and Australia. The two organizations combined to form Curves Jenny Craig in November 2013. Outdated systems, known internally as “the black hole,” plagued Jenny Craig with inefficient processes and created a lack of accountability. For example, records could not be categorized or prioritized properly, tracked by date or owner, and they could be intentionally hidden in an ambiguous status. Without visibility, Jenny Craig had no way to quantify the impact of their customer service. Mary Carter, manager of IT service, summed it up, “We had no reporting prior Cherwell Service Management.” Curves was in even worse shape as they logged tickets in an Excel® spreadsheet.
Tags : best practices, customer support, business intelligence, business optimization
     Cherwell Software
By: Secunia     Published Date: Oct 12, 2011
This paper discusses the limitations of security and highlights how cybercriminals can achieve their goals without administrative access.
Tags : vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
     Secunia
By: ESET, LLC.     Published Date: May 16, 2011
Trends such as mobility, Web 2.0, and consumerization are shattering traditional notions of IT control. As a result, IT security organizations are struggling to defend against a more formidable hacker adversary at a time when they have less visibility and control over their IT environment. As part of our Cybersecurity Masters webinar series, ESET would like to invite you to attend these expert presentations by Forrester and ESET.
Tags : eset, cybersecurity webinar, security manager, it security, crm solutions/software, customer experience/engagement, reputation monitoring, usability
     ESET, LLC.
By: Citrix     Published Date: Nov 14, 2016
Watch this Datacenter Automation on-demand webinar with Citrix NetScaler and Cisco ACI, featuring Sr. Solutions Marketing Manager, Cisco – Ravi Balakrishnan.
Tags : cisco, citrix, citrix netscaler, cisco aci, datacenter automation
     Citrix
By: Dell Windows Server     Published Date: Jan 16, 2009
Find out how can you reduce the risks (and anxiety) when upgrading your IT infrastructure to WS08 from two experts: Ray Weinstein, acting director on Windows Practice and Burk Buechler, Product Manager for Windows Server 2008 consulting services at Dell.
Tags : dell, data center, windows server 2008, microsoft longhorn
     Dell Windows Server
By: IBM     Published Date: Jan 19, 2017
With organizations keeping larger and larger quantities of data the question will come up that given dropping storage costs, does uncontrolled data growth even matter? It does matter, and in this IBM publication featuring Gartner research you will learn about this ever growing problem and ways for information managers to address solutions.
Tags : ibm, analytics, data, ecm, big data, information governance
     IBM
By: IBM     Published Date: Jul 05, 2018
Data is the lifeblood of business. And in the era of digital business, the organizations that utilize data most effectively are also the most successful. Whether structured, unstructured or semi-structured, rapidly increasing data quantities must be brought into organizations, stored and put to work to enable business strategies. Data integration tools play a critical role in extracting data from a variety of sources and making it available for enterprise applications, business intelligence (BI), machine learning (ML) and other purposes. Many organization seek to enhance the value of data for line-of-business managers by enabling self-service access. This is increasingly important as large volumes of unstructured data from Internet-of-Things (IOT) devices are presenting organizations with opportunities for game-changing insights from big data analytics. A new survey of 369 IT professionals, from managers to directors and VPs of IT, by BizTechInsights on behalf of IBM reveals the challe
Tags : 
     IBM
By: IBM     Published Date: Jul 09, 2018
Data is the lifeblood of business. And in the era of digital business, the organizations that utilize data most effectively are also the most successful. Whether structured, unstructured or semi-structured, rapidly increasing data quantities must be brought into organizations, stored and put to work to enable business strategies. Data integration tools play a critical role in extracting data from a variety of sources and making it available for enterprise applications, business intelligence (BI), machine learning (ML) and other purposes. Many organization seek to enhance the value of data for line-of-business managers by enabling self-service access. This is increasingly important as large volumes of unstructured data from Internet-of-Things (IOT) devices are presenting organizations with opportunities for game-changing insights from big data analytics. A new survey of 369 IT professionals, from managers to directors and VPs of IT, by BizTechInsights on behalf of IBM reveals the challe
Tags : 
     IBM
By: Hewlett Packard Enterprise     Published Date: May 11, 2018
For the typical enterprise, the volume of data that needs to be managed and protected is growing at roughly 40% per year. Add to that the performance requirements of new applications and the demands for instant response time, always-on availability, and anytime-anywhere access. With such demands, data center managers face storage challenges that cannot be addressed using traditional, spinning-disk technology.
Tags : 
     Hewlett Packard Enterprise
By: Teradata     Published Date: May 02, 2017
To understand the challenges and opportunities with the Internet of Things, MIT Sloan Management Review’s 2016 Global Executive Study conducted a comprehensive study with business executives, managers, and IT professionals globally. Through the survey results and interviews with subject matter and industry experts, MIT Sloan Management Review was able to reveal the business value and competitive issues from the Internet of Things (IoT). This comprehensive report dives into data sharing with competitors, analytic talent management, and the intersection with governing the data. Analytics is unsurprisingly is shown as the key to IoT success.
Tags : data, sharing, analytics, iot, mit
     Teradata
By: Infosys     Published Date: May 21, 2018
Experimenting faster is a trait shared by most innovative organizations. They want to experiment with new products and promotions to see if they can unearth bold new ways of serving the customer. But this experimentation cannot be random: it needs to be guided by data and based on current customer insight. It was access to this data that was the problem for our client, a large consumer brand. It took a long time to prepare the data to a point where it could be used by business managers. So long, in fact, that the data was no longer relevant; and the moment as often lost. The company needed to be able to experiment faster but was held back by a cumbersome and ineffective analytics infrastructure.
Tags : experiment, organizations, customer, insights, analytics
     Infosys
By: HPE Intel     Published Date: Mar 15, 2016
As more enterprises adopt technologies such as cloud, mobile, and analytics to help achieve strategic competitive advantage, CIOs and IT managers must support business-critical processes at a very high level across the enterprise. At the same time, IT organizations must manage complex hybrid IT infrastructures that include both cloud and on-premises technologies from multiple vendors and support providers. IDC believes that to tackle these challenges, IT organizations should look to support providers for comprehensive offerings to help optimize IT operations and improve the efficiency of IT service delivery. In addition, IDC recommends that IT organizations looking to manage rapid change in today’s IT landscape consider support providers with a record of innovative support services and a focus on advanced technology in support delivery.
Tags : 
     HPE Intel
By: Oracle     Published Date: Apr 26, 2016
The IT/business relationship has long been misrepresented as broken and ineffective. But what impact has the cloud had on the relationship between IT and business managers? A recent Harvard Business Review report debunks several myths over IT, business management and the cloud.
Tags : 
     Oracle
By: McAfee EMEA     Published Date: Mar 14, 2018
McAfee advanced threat defense, McAfee Threat Intelligence Exchange, and McAfee enterprise security manager can cut through the grey to provide a clear understanding of risk.
Tags : mcafee, webinar, security, product, technology
     McAfee EMEA
By: Alert Logic     Published Date: Jun 12, 2014
New security threats are emerging all the time, from new forms of malware and web application exploits that target code vulnerabilities to attacks that rely on social engineering. Defending against these risks is an ongoing battle. Download to learn more!
Tags : cloud security, vulnerability management, vulnerabilities, patching, patch management, security
     Alert Logic
By: GoToMeeting     Published Date: Jun 09, 2010
This new Forrester white paper explores the evolution of project management and outlines steps for defining, hiring and developing your next-generation project managers.
Tags : citrix gotomeeting, project management, collaboration, software delivery, remote access
     GoToMeeting
By: GoToMeeting     Published Date: Apr 05, 2011
This Forrester white paper explores the evolution of project management and outlines steps for defining, hiring and developing your next-generation project managers.
Tags : project manager, software development, lean, pmbok, soft skills, pmp, forrester, interactive marketing
     GoToMeeting
By: GoToMeeting     Published Date: Apr 04, 2011
This Forrester white paper explores the evolution of project management and outlines steps for defining, hiring and developing your next-generation project managers.
Tags : citrix gotomeeting, project manager, software development, lean, pmbok, soft skills, pmp, forrester
     GoToMeeting
By: BlackBerry     Published Date: Aug 26, 2008
It's important that corporate mobile policies cover everything from what types of devices will be available to users, how and when they can use them, what corporate resources they are able to access and what security measures will be instituted. Furthermore, Mobile managers must not ignore the impact of government regulations and compliance when laying out their corporate mobile policies.
Tags : blackberry, mobile policies, vpn, mobile devices, microsoft exchange, mobile device management, mobile device management software, mobile workers
     BlackBerry
By: RES Software     Published Date: Apr 05, 2013
Patients are, and always will be, the number one priority for Waterbury Hospital. The selection of RES Workspace Manager is helping us keep our commitment to our patients and our clinicians. This infographic looks at the benefits of implementing RES Software.
Tags : res software, complexity or risk with res software, infographic, infosys
     RES Software
By: Adobe     Published Date: Nov 06, 2013
Download this case study to learn how SPAR Austria, a leading food retail company enhanced their digital marketing strategies by leveraging the powerful content management and publishing capabilities of Adobe Experience Manager.
Tags : 
     Adobe
By: Dell     Published Date: Oct 21, 2008
Dell's automated deployment solution meets the challenges that IT managers face, according to Windows expert and author Jerry Honeycutt.
Tags : dell, dell automated deployment, automated deployment solution, challenges of deploying to vista
     Dell
By: IBM     Published Date: Mar 04, 2009
This video will demonstrate some of the features of IBM Tivoli Identity Manager Express by taking you through a simple scenario. ITIM Express offers you the ability to set up approval workflows for account requests and ecertification. In this demonstration we will build an account request workflow that requires that all VPN accounts be approved by the requester’s supervisor.
Tags : ibm, tivoli identity manager, vpn, itim, approval workflows, vpn accounts, linux vpn
     IBM
By: GFI     Published Date: Jun 14, 2007
This technical white paper gives an overview of how GFI EventsManager works and discusses installation and deployment issues whilst enabling you to calculate the number of GFI EventsManager instances required on your network.
Tags : event manager, events manager, events management, log management, security event, event log, gfi
     GFI
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics