RSS feed Get our RSS feed

News by Topic

partner

Results 1251 - 1275 of 1291Sort Results By: Published Date | Title | Company Name
By: Determine (Selectica)     Published Date: Sep 13, 2016
The sponsor named below commissioned Ardent Partners to write this report. While the report topic In 2015, collaboration is the name of the game in procurement and frequently entails working with key internal stakeholders (like line-of-business managers and legal departments) or preferred suppliers to drive greater value through sourcing and procurement. For Chief Procurement Officers ("CPOs") and other supply management leaders, collaboration has taken on many new and innovative forms over the years, causing these executives to leverage new (and, in some cases, existing) processes, relationships, and technologies to enhance compliance, decrease risk, and increase savings. One such business process, contract management, has been reborn with digital, automated features that can shift the way procurement teams collaborate, mitigate risk, drive performance, and realize greater savings for the enterprise.
Tags : 
     Determine (Selectica)
By: Veracode     Published Date: Oct 26, 2016
20% of enterprises have suffered a security incident related to a business application or IT service consumed from external partners. With breaches like these making headlines, and enterprises’ growing reliance on third-party software, security of the cyber supply chain will garner increased attention. Download this joint Veracode/Enterprise Strategy Group (ESG) report to explore enterprises’ challenges in securing their cyber supply chain and get best practices for ensuring that every application – regardless of its origin – is secure.
Tags : veracode, security, supply chain security, web applications, application security
     Veracode
By: IBM     Published Date: Jan 09, 2017
Is it better to build your own internal cybersecurity expertise and security intelligence & analytics platform or should you outsource the responsibilities to a team of experts? Read this paper by Securosis, L.L.C, an independent research and analysis firm, to understand the drivers, use cases and partner selection criteria for managed security monitoring.
Tags : 
     IBM
By: IBM     Published Date: Apr 20, 2017
Security from design through deployment. Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. However, to achieve these benefits, it is imperative that mobile security best practices are incorporated throughout the lifecycle of the application.
Tags : 
     IBM
By: IBM     Published Date: Apr 20, 2017
Security from design through deployment. Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. However, to achieve these benefits, it is imperative that mobile security best practices are incorporated throughout the lifecycle of the application.
Tags : application management, application development, organization optimization, authentication, application security, enterprise applications, app blocking
     IBM
By: IBM     Published Date: May 16, 2017
When the CMO Council recently asked more than 200 senior marketing decision makers how effectively they have aligned physical and digital experiences, half admitted that these integrated experiences were selective, at best. Yet it is alignment, consistency and connection that drive the foundational relationship between the brand and the buyer. The CMO Council, in partnership with IBM, will host a one-hour interactive webcast with industry-leading media, entertainment and telecommunications marketers to discuss how audience insights across the digital and physical experience have been turned into action, allowing these brands to personalize and enrich each engagement. Multiple case studies will also be discussed during the webcast that focus on the power of segmentation and innovations around cognitive computing.
Tags : technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
     IBM
By: IBM     Published Date: Jun 07, 2017
Read this eBook to get insight on the essential elements of a modernized B2B integration architecture. Companies need a strategy as they think about modernizing their B2B integration capabilities. This eBook describes what to look for and how IBM can help. You’ll learn about: · Operating a single, secure B2B integration gateway · Simplified onboarding and partner management. · High availability business operations and disaster recovery · Adaptable capabilities to help react to changes to your business processes · Visibility and analytics that provide actionable insight over those processes · Supporting a mix of hybrid deployment models including on-premises and cloud
Tags : b2bi, ibm, b2b integration, modernization, b2b architechture
     IBM
By: IBM     Published Date: Sep 11, 2017
A partnership for the next generation of project automation
Tags : automation anywhere, webinar, project automation
     IBM
By: IBM     Published Date: Oct 26, 2017
Not long ago, job roles were relatively easy to define and control. A person was an “accountant” or a “graphic designer” or a “business partner.” But as organizations grew and business software became more sophisticated, new roles were added. “Accountant, New York” might require different access to applications and data than “Accountant, Chicago.” The challenge comes from the recent explosion in the numbers and types of business roles.
Tags : identity governance, entitlements, authorized users, orphan accounts, business activities
     IBM
By: IBM     Published Date: Oct 26, 2017
With the growing demand of business for tighter communication and collaboration with external parties such as business partners and customers, IT has to provide the technical foundation for such integration. Web Access Management and Identity Federation are key technologies for that evolution. They enable organizations to manage access both from and to external systems, including cloud services, in a consistent way. Organizations have to move forward towards strategic approaches to enabling that integration, in support of the Extended and Connected Enterprise.
Tags : access management, identity federation, it strategies, security, infrastructure
     IBM
By: New Voice Media     Published Date: May 22, 2017
Business is going through rapid, unprecedented change. We are accustomed to having access to information and resources wherever we are. Our anticipations and expectations of business have changed, and we expect the same when we deal with any organization, whether as a customer, employee, stakeholder or partner.
Tags : 
     New Voice Media
By: Datastax     Published Date: Aug 15, 2018
With DataStax Enterprise 6 (DSE 6), we upped the bar substantially for us, our partners, our customers, and our competitors. We also came out and said that DSE 6 was twice as fast as open source Apache Cassandra™, and now, we have a third-party validation of this claim. Read this benchmark report from zData to get the results of their test of DSE 6 against Cassandra, for which they ran a different series of workloads on an AWS-built cluster.
Tags : 
     Datastax
By: OnBase by Hyland     Published Date: Jun 26, 2017
Whether we’re talking about a life partner, a business partner or an enterprise information platform, you don’t want to start any kind of relationship without all relevant information – or worse yet, go in blind. Selecting a case management solution provider is no different. Download this white paper to discover key considerations and questions to ask when evaluating case management vendors and software solutions.
Tags : case, management, software, solution, dynamic, onbase, hyland, knowledge
     OnBase by Hyland
By: Spectrum Enterprise     Published Date: Feb 07, 2018
Partnering with Spectrum Enterprise sustains client loyalty by instilling confidence in how the bank operates, provides superior network service level agreements that ensure minimal downtime and assures smoother state and FDIC audits thanks to cybersecurity safeguards such as built-in redundancy and private network service.
Tags : 
     Spectrum Enterprise
By: Juniper Networks     Published Date: Jun 22, 2017
This study was conducted with independent global research firm Wakefield Research between November 24 through December 14th, 2015. The data was based on an online study of 20 content questions, plus screeners and demographics of 2704 respondents, in 8 markets: US, China, Australia, Japan, India, UK, Germany, and France. All respondents were restricted to the following industries: service provider organizations, healthcare, retail, and financial services. In this case, the definition of service provider includes companies offering web content services, cable, internet service providers, or telecom. Juniper Networks challenges the status quo with products, solutions and services that transform the economics of networking. Our team co-innovates with customers and partners to deliver automated, scalable and secure networks with agility, performance and value. Visit www.juniper.net for more information.
Tags : security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
     Juniper Networks
By: Juniper Networks     Published Date: Jun 22, 2017
This document is targeted at networking and virtualization architects interested in deploying VMware NSX network virtualization in a multi-hypervisor environment based on the integrated solution from VMware and Juniper. VMware’s Software Defined Data Center (SDDC) vision leverages core data center virtualization technologies to transform data center economics and business agility through automation and non disruptive deployment that embraces and extends existing compute, network and storage infrastructure investments. NSX is the component providing the networking virtualization pillar of this vision. As a platform, NSX provides partners the capability of integrating their solution and build on the top of the existing functionalities. NSX enables an agile overlay infrastructure for public and private cloud environments leveraging Juniper’s robust and resilient underlay infrastructure that also helps bridge the physical and virtual worlds using the L2 gateway functionality.
Tags : network security, account security, data management, network security, secure systems, application security, network performance, network diagnostics
     Juniper Networks
By: Juniper Networks     Published Date: Jun 29, 2017
Whilst the FSI sector races to implement cutting-edge technologies such as AI, blockchain and automation, there are no mutually agreed upon set of best practices to implement these technologies. As a result, organisations are using their own blend of strategic initiatives and company culture to drive innovation, with varying levels of success. To help, this article features advice from five of the leading experts in the FSI and technology sector today. Several of the most visible tactics to kick-start innovation in FSI organisations include launching innovation or incubation centres, launching hackathons, partnering with or acquiring start-ups, venture investment or simply trying to develop solutions in house. Whilst each of these approaches has potential, there is a risk that organisations fall into the trap of innovation theatre, in other words, failing to effectively integrate cutting edge technology into key business functions.
Tags : business resources, enterprise headcounts, individual roles, organizational charts, corporate initiatives, management principles, department optimization
     Juniper Networks
By: Juniper Networks     Published Date: Aug 10, 2017
In today’s business and IT landscape, the network is no longer simply a basic IT function. It is an essential business asset. The ability of your network users—whether they be employees, customers, or partners—to have fast, real-time access to online resources is directly correlated to financial success.
Tags : software as a service, platform as a service, infrastructure, cloud service provider, virtual data center, sdsn
     Juniper Networks
By: Juniper Networks     Published Date: Aug 10, 2017
Facing the future requires enterprises to embark on a digital transformation, employing new technologies such as AI, big data, IoT, and the cloud. Enterprises need a long-term, trusted partner who will support them on their journey and understand their vision. Switch to Juniper Networks and align your enterprise with an innovation leader that places scalable solutions, high availability, productivity, security, and R&D at the forefront, all while keeping simplicity and savings in mind.
Tags : security, switching, routing, operating system, secure network, sdsn, solutions
     Juniper Networks
By: Oracle APAC ZO OD Prime Volume ERP ABM Leads June 2017     Published Date: Jul 11, 2017
Mobile, relationship intelligence, and sales coaching are necessities for today’s sales organization and are pervasive capabilities for every sales automation solution category. No vendor solely offers these capabilities without complementing them with other functions. Instead, they are embedded across the categories mentioned above. For example, sales content management providers cannot compete without extensive mobile expertise; market intelligence and customer success do not work without relationship intelligence; and sales coaching is not constrained only to the sales performance management vendors.
Tags : sales content management, customer success, market intelligence, sales acceleration, sales performance management, partner relationship, contract life cycle
     Oracle APAC ZO OD Prime Volume ERP ABM Leads June 2017
By: Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017     Published Date: Jul 11, 2017
Mobile, relationship intelligence, and sales coaching are necessities for today’s sales organization and are pervasive capabilities for every sales automation solution category. No vendor solely offers these capabilities without complementing them with other functions. Instead, they are embedded across the categories mentioned above. For example, sales content management providers cannot compete without extensive mobile expertise; market intelligence and customer success do not work without relationship intelligence; and sales coaching is not constrained only to the sales performance management vendors.
Tags : sales content management, customer success, market intelligence, sales acceleration, sales performance management, partner relationship, contract life cycle
     Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017
By: Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017     Published Date: Jul 11, 2017
Mobile, relationship intelligence, and sales coaching are necessities for today’s sales organization and are pervasive capabilities for every sales automation solution category. No vendor solely offers these capabilities without complementing them with other functions. Instead, they are embedded across the categories mentioned above. For example, sales content management providers cannot compete without extensive mobile expertise; market intelligence and customer success do not work without relationship intelligence; and sales coaching is not constrained only to the sales performance management vendors.
Tags : sales content management, customer success, market intelligence, sales acceleration, sales performance management, partner relationship, contract life cycle
     Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017
By: Q2 eBanking     Published Date: Jul 30, 2017
Each year we examine trends in fraud reported to Q2 by our partner institutions, and every year we continue to see online banking fraud attempts in great frequency. While we may see patterns emerge or spikes in new trending behavior, the foundation of an effective defense remains consistent. Examining trends in online banking and cybercrime is crucial to navigating the current threat landscape, as is maintaining a solid defense-indepth security foundation.
Tags : 
     Q2 eBanking
By: CA Technologies EMEA     Published Date: May 25, 2018
CA recently partnered with TechValidate to perform a research study that would help us to understand how organizations are leveraging our CA Project & Portfolio Management (CA PPM) solution to evolve their businesses. The study validated the changing role of the modern PMO.
Tags : tech, validate, research, study, portfolio, management
     CA Technologies EMEA
By: Datavail     Published Date: Nov 03, 2017
“One of the most popular MDM solution is Oracle Hyperion Data Relationship Management. Oracle DRM is used to resolve the challenges across the people, processes, and tools that go into the tasks of data management. Although Oracle DRM is a powerful software, it nevertheless presents challenges for organizations seeking to integrate it with other Oracle applications such as PeopleSoft Financials – DRM is unable to automatically push updates made within its system to PeopleSoft. As a result, changes in DRM to cost centers, project centers, trees, and hierarchies must be manually updated in PeopleSoft Financials – a tedious process that can take hours every day. The good news is that these challenges can be easily addressed with the support of partners such as Datavail.
Tags : 
     Datavail
Start   Previous    38 39 40 41 42 43 44 45 46 47 48 49 50 51 52    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics