Skip to content
 

links

Results 1 - 25 of 131Sort Results By: Published Date | Title | Company Name
Published By: ASG Software Solutions     Published Date: Jul 29, 2008
Aligning IT and business perspectives requires the ability to create links between configuration information in the CMDB and the business service as experienced by the user. Service Dependency Mapping (SDM) products automate the process of creating and maintaining these links.
Tags : 
asg, cmdb, bsm, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
Published By: Sitecore     Published Date: Nov 04, 2009
This report highlights the strategic value of a next generation web content management system integrated with lead scoring, email marketing, customer relationship management, and web analytics. The report links the technology and practices of Best-in-Class organizations to engage customers, provide personalized experiences and manage the lead lifecycle.
Tags : 
sitecore, aberdeen, lifecycle management, web content management, analytics, crm, emarketing, email marketing, lead generation, content management systems
    
Sitecore
Published By: Mimecast     Published Date: Oct 22, 2018
What if your employees were more informed about security threats, more skeptical about what they receive in email, and less likely to click on malicious links in email without first verifying them? There are some impactful, quick wins that you and your organization can realize by implementing security awareness training. This recent in-depth survey of security professionals by Osterman Research shows that the leading security concerns across organizations are all areas in which security awareness training can yield significant benefits. Here are some suggestions on processes and practices to consider when developing a security awareness training program that will actually change behavior and make the organization less likely to fall prey to a cyberattack.
Tags : 
    
Mimecast
Published By: Cisco     Published Date: Dec 11, 2018
The most significant IT transformation of this century is the rapid adoption of cloud-based applications. Most organizations are now dependent on a number of SaaS and IaaS platforms to deliver customer satisfaction and empower employee productivity. IT teams are responsible for delivering a high quality user experience for cloud applications while they struggle to manage a secure environment with advanced persistent threats. The WAN is the fabric to connect and control access between remote users and cloud-based applications. The WAN fabric needs to identify application type, location, apply prioritization and route traffic across the appropriate (multiple) WAN links to deliver on user experience. Different types of users/devices connecting to the cloud (via the Internet) means security policies must be enforced at branch, data center and in the cloud.
Tags : 
    
Cisco
Published By: SAS     Published Date: Jan 17, 2018
Consider the many ways that a customer encounters your brand – organic results on a search engine, display media campaigns, social media links, re-targeting on external sites, etc. One thing is certain – consumer journeys are far from linear. They can occur across multiple platforms, devices and browsers. The problem is that organizations are often constrained to channel-limiting decisions regarding their media investment allocations. Marketing attribution helps you analyze the impact and business value of company-generated marketing interactions to help make the best marketing investment decisions. The challenge is to interpret the massive volumes of customer data that continues to expand day by day.
Tags : 
    
SAS
Published By: Cisco     Published Date: Oct 08, 2015
The Cisco 2015 Annual Security Report, which presents the research, insights, and perspectives provided by Cisco Security Research and other security experts within Cisco, explores the ongoing race between attackers and defenders, and how users are becoming ever-weaker links in the security chain.
Tags : 
security, cisco, hacking, malware, attackers, security report
    
Cisco
Published By: Schneider Electric     Published Date: Sep 19, 2017
When your power system has aging switchgear, you need to work harder to maintain safety and reliability. But easy-to-install options are available to upgrade aging switchgear to bring safety and reliability up to modern standards. Find out how switchgear modernization works in the comprehensive "Answer Guide: Make Aging Switchgear Last Longer and Perform Better." The guide includes information like the 4 Big Wins of Modernization, embedded demonstration videos, an FAQ on how to modernize and links to other modernization resources.
Tags : 
switchgear modernization, mv circuit breakers, lv circuit breakers, switchgear upgrades, electrical distribution equipment, schneider electric, circuit breaker upgrade, obsolete switchgear
    
Schneider Electric
Published By: VMware     Published Date: Jul 01, 2016
This guide will help you leverage opportunities in the public cloud in ways that make sense no matter where you are on the cloud adoption spectrum. If you are running a VMware vSphere®-powered Data Center, it may be time to modernize your infrastructure with VMware vCloud® Air™, the ready-to-run public cloud for protecting, extending, and replacing on-premises vSphere workloads. Read the eBook for tips and tricks, lessons learned from other organizations, and links to additional resources to help you get started.
Tags : 
vmware data center, vcloud air, vsphere, hybrid cloud, public cloud, private cloud, disaster recovery, data center extension, data center replacement, date center modernization, virtual private cloud
    
VMware
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
The latest version of CA Project & Portfolio Management facilitates core financial activities with the ease and familiarity of a spreadsheet. Two years ago, CA began to reevaluate how organizations were leveraging their project and portfolio management solutions. Our goal was to identify ways CA Project & Portfolio Management (CA PPM) could better serve every user, from project, resource and financial managers to executive decision makers and team members. CA PPM 15.3 simplifies the job of the financial manager with Microsoft Excel®-like functionality, embedded communication and collaboration features, and direct links to the industry’s most popular reporting and business intelligence tools.
Tags : 
    
CA Technologies EMEA
Published By: Juniper Networks     Published Date: Jan 11, 2016
Unsere Anleitung mit fünf Schritten zur Firewall-Planung bietet Ihnen eine Zusammenfassung zur Gestaltung der Netzwerk-Firewall. Sie enthält außerdem Links zu noch detaillierteren Websites und Veröffentlichungen zu diesem Thema. Wenn Sie die Firewall-Architektur für Ihr Unternehmen gestalten, sollten Sie zunächst diesen Text lesen.
Tags : 
    
Juniper Networks
Published By: Mimecast     Published Date: Nov 14, 2018
What if your employees were more informed about security threats, more skeptical about what they receive in email, and less likely to click on malicious links in email without first verifying them? There are some impactful, quick wins that you and your organization can realize by implementing security awareness training. This recent in-depth survey of security professionals by Osterman Research shows that the leading security concerns across organizations are all areas in which security awareness training can yield significant benefits. Here are some suggestions on processes and practices to consider when developing a security awareness training program that will actually change behavior and make the organization less likely to fall prey to a cyberattack.
Tags : 
    
Mimecast
Published By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 11, 2017
Despite the rise in chat adoption, many organizations are still not providing the service their customers expect. That’s why it’s essential to follow proven best practices, including defining goals, identifying key metrics, and appropriately hiring and training staff. With these foundations in place, organizations can establish routing and queuing practices, before customizing the solution to meet their specific needs, and fine-tuning analytics to further improve performance. To learn more about how Oracle Chat Cloud Service can improve CSAT, customer loyalty, and revenue for your organization, visit oracle.com/goto/chatbestpractices
Tags : 
home page support, faq escalation, points of right-channeling, frustration points, page headers and footers, business driver, chat channel, customer satisfaction, sales, productivity, hyperlinks, mobile users, screen real estate
    
Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
Published By: Intralinks     Published Date: Apr 13, 2015
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: • Half of all respondents lack the confidence to deal with risky file sharing practices • 62% of respondents accidently sent files to unauthorized individuals outside the organization • 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: • The extent of the risk associated with unsecure file sharing • The individual behaviors driving and organizational responses to information loss
Tags : 
    
Intralinks
Published By: Intralinks     Published Date: Apr 13, 2015
They say content is king. But if your content isn’t protected, it’s a king with no clothes. The proliferation of mobile devices in the workplace, and the availability of cloud services designed for consumers, can lead to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns. Key topics include: • The threat posed by Dropbox and other consumer-grade FSS providers • The need for lifetime control of information and content • The ability to perform audits, and locate files, anywhere, and who accessed them • How next-generation IRM technology is available to add a new layer of security to every file
Tags : 
    
Intralinks
Published By: Intralinks     Published Date: Apr 13, 2015
The truth is that they can get a lot worse – and no one is immune. Your company’s data has never been at greater risk. There is no doubt that 2014 was a dire year for many organizations, as they failed to properly protect their computer systems and the data held upon them. As if it wasn’t bad enough keeping on top of new zero-day vulnerabilities, targeted attacks, and revelations of state-sponsored espionage, users are potentially exposing companies’ most important data by not following best practices and using consumer-grade cloud services that aren’t built with enterprise needs in mind. An ever more mobile workforce wants to work on their files remotely but may be taking dangerous risks with sensitive corporate data at the same time. In this white paper, we detail some of the biggest computer security threats of the last year and offer some predictions on what we can expect to see in 2015.
Tags : 
    
Intralinks
Published By: Intralinks     Published Date: Apr 13, 2015
The increased mobility of the workforce is changing the way we work. Business users want the flexibility to share and collaborate on content that drives their business while IT needs to ensure the security of that data, no matter where it goes. An effective enterprise collaboration solution must consider people, processes and technologies to be effective, but where to begin? This comprehensive Buyer’s Guide offers guidance on how to develop your organization’s requirements with regard to: • Risk management – avoiding data breaches and loss of information that can result in non-compliance • Business productivity - allowing for secure collaboration while enabling teams to work anywhere on any device • IT efficiency - supporting the full breadth of external business content requirements while integrating with existing applications and protocols
Tags : 
    
Intralinks
Published By: Intralinks     Published Date: Apr 13, 2015
In the wake of the 2008 financial crisis regulatory exams have become increasingly demanding for governance, risk, and compliance professionals. New rules brought about by the Dodd-Frank Act will continue to shape future examinations including safety and soundness, compliance, market conduct, and risk-based targeted exams. We can expect these changes will require examiners to spend more time onsite, request more documents, and extend the scope and/or depth of their examinations. This means it is more important than ever to avoid the classic mistake of sharing examination documents through ad-hoc, manual processes and delivering highly sensitive data through unsecured channels like mail, e-mail, thumb drives, and FTP. In response to these increasing burdens financial institutions are looking to take control with a more structured, collaborative process for collecting, refining, and submitting regulatory information. Download this white paper to learn more about Intralinks VIA.
Tags : 
    
Intralinks
Published By: Intralinks     Published Date: Apr 13, 2015
In the wake of the 2008 financial crisis, financial institutions are faced with increasing scrutiny from government regulators. The Dodd-Frank act was passed in response to the disaster, creating the Consumer Financial Protection Bureau and mandating 398 new rulemakings, many of which remain to be finalized. In light of these events financial services organizations are increasingly relying on Intralinks® as the most secure way to control sensitive information when collaborating within and outside their organizations. Intralinks meets the strictest security, auditability, and compliance requirements of regulated entities around the world – regardless of business complexities. Download this white paper to learn how Intralinks VIA for Financial Services can help you control your communications with regulators and other third parties.
Tags : 
intralinks, financial services, financial crisis, compliance requirements, financial protection
    
Intralinks
Published By: Intralinks     Published Date: Nov 23, 2015
Download this detailed, insightful article and follow Volterra Fietta’s journey to their “just right” solution.
Tags : 
intralinks, mwd, volterra fietta, goldilocks zone, security, file sharing, information rights
    
Intralinks
Published By: Intralinks     Published Date: Nov 23, 2015
There are multiple options for organizations with intellectual property and restricted information that must be shared between staff and business partners to adopt in order to avoid inadvertent release of restricted information to unauthorized personnel.
Tags : 
kuppingercole, information sharing, security, data, intralinks
    
Intralinks
Published By: Intralinks     Published Date: Nov 23, 2015
This report focuses on the use of CFSS tools in the workplace, the problems that their use causes, and it offers several recommendations as well as data from an in-depth survey on file-sharing practices conducted by Osterman Research during July 2015.
Tags : 
osterman, enterprise, file sync, share solutions, file-share, cfss, efss
    
Intralinks
Published By: Intralinks     Published Date: Nov 23, 2015
Use this guide to clarify the process, and move toward the right solution.
Tags : 
enterprise, intralinks, collaboration, security, data
    
Intralinks
Published By: Intralinks     Published Date: Nov 23, 2015
In this white paper, we detail some of the biggest computer security threats of the last year and offer some predictions on what we can expect to see in 2015.
Tags : 
intralinks, security, data, threat
    
Intralinks
Published By: Intralinks     Published Date: Nov 23, 2015
This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns.
Tags : 
intralinks, content, security, data, regulatory, information, management
    
Intralinks
Published By: Intralinks     Published Date: Nov 23, 2015
Download this research report now to find out the extent of the risk associated with unsecure file sharing, the individual behaviors driving and organizational responses to information loss and the key considerations for securing information in the collaborative enterprise
Tags : 
intralinks, file sharing, security, data
    
Intralinks
Start   Previous   1 2 3 4 5 6    Next    End
Search      

Find Research

Add Research

Get your company's research in the hands of targeted business professionals.