sso

Results 1 - 25 of 1564Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA Tier 3 ABM     Published Date: Jun 05, 2018
In Cisco abbiamo aiutato migliaia di aziende a prepararsi per il GDPR, il che significa che ci è stata fatta praticamente ogni domanda possibile sull’argomento. Così abbiamo pensato di riassumere le domande che ci sentiamo rivolgere più spesso e di fornire alcune risposte utili per chi si sta avviando sul percorso della conformità al GDPR.
Tags : 
    
Cisco EMEA Tier 3 ABM
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Dans cette ère de disruption numérique incessante, les entreprises doivent améliorer leur agilité pour être prêtes à saisir les opportunités. Pour certains observateurs, les technologies du cloud semblaient être la solution idéale, capables d'apporter des réponses en matière d'agilité, d'évolutivité et de coût. Mais après avoir adopté ces technologies, les entreprises ont souvent constaté que les caractéristiques de performances, de sécurité et de conformité du cloud ne répondaient pas pleinement à leurs besoins. En outre, une idée reçue tenace laissait à penser que le cloud public était moins coûteux que le cloud privé, alors que nous savons maintenant que ce n'est pas toujours le cas. Les entreprises les plus avisées ont réalisé depuis longtemps que la plus grande agilité est proposée par les solutions d'informatique hybride, qui associent des services hors site et sur site.
Tags : 
    
Hewlett Packard Enterprise
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware. "
Tags : 
dns, rdns, security, zero trust security, malware, data, network security
    
Akamai Technologies
Published By: DigiCert     Published Date: Jun 19, 2018
Protect your business, brand and customers in a constantly evolving threat landscape. As market and business needs evolve, and the technological arms race between cybercriminals and the security industry continues, the boundaries of website and web security are shifting. This paper explores the opportunities, risks and challenges, associated with this rapidly evolving landscape both from a business and technical standpoint, and lays out key guidelines for building an effective security strategy for the future.
Tags : 
    
DigiCert
Published By: DellEMC and Toshiba SSDs     Published Date: Jul 04, 2018
Dell EMC provides VMware vSAN Ready Nodes that combine a wide range of Dell hardware and VMware vSAN software into a ready-to-order package. These include the new single-socket Dell EMC PowerEdge R7415 servers powered by the AMD EPYC 7000-series processors. These Dell EMC vSAN Ready Nodes are validated and configured to meet hyper-converged workload needs while taking advantage of lower single-socket licensing costs from VMware. Dell commissioned Demartek to evaluate the performance of the new Dell EMC PowerEdge R7415 servers that use the AMD EPYC 7000-series of processors. Mixed enterprise workloads were run in this VMware vSAN cluster using one model of the AMD EPYC processor in each of three identical nodes. Then the tests were repeated using different models of AMD EPYC processors in the vSAN cluster nodes.
Tags : 
    
DellEMC and Toshiba SSDs
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
CA Technologies automation solutions help organizations increase business productivity by simplifying the management of complex workloads and empowering development teams with self-service tools that accelerate the development and delivery of new and enhanced applications. CA Technologies commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) that enterprises may realize from automation. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of CA on their organizations. To better understand the benefits, costs, and risks associated with CA workload automation (WLA) solutions, Forrester interviewed an existing customer with years of experience using CA. The organization that Forrester interviewed manufactures consumer electronics that it sells through retailers around the globe. Download this whitepaper to find out more.
Tags : 
    
CA Technologies_Business_Automation
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
It doesn’t matter whether you’re new to Oracle Retail, have an active implementation project that is running or have an existing deployment in production. The same issue applies: You are making a significant investment in the technology and need to develop a reliable and efficient batch schedule. If you’re new to Oracle Retail, you are no doubt embarking on a major project to improve your competitive position in the retail market. With that in mind, your goals will be to shrink the time-to-market for your retail implementation, lower the reliability risks associated with in-house developed solutions and improve the visibility and control of retail business processes. In this eBook you will discover a series of recommendations for operating a fail-safe and efficient Oracle Retail operational environment. You will also understand how automation enables you to streamline the execution of your Oracle Retail batch operations and increase the day-to-day efficiency of your operations teams.
Tags : 
    
CA Technologies_Business_Automation
Published By: Workday     Published Date: May 09, 2018
Wellesley College has a lot of success stories to share following its strategic deployment of Workday. Increased internal adoption and collaboration between finance and HR are just the start of a long list of benefits the college now enjoys. Watch the webinar replay with Wellesley’s Ravi Ravishanker, CIO and associate provost; Nephellie Dobie, director of Project Management and Business Analysis; and Veronica Brandstrader, associate CIO, to learn about its: • Evaluation and deployment • Technology transformation • Benefits realized • Lessons learned
Tags : 
    
Workday
Published By: Zendesk GmbH     Published Date: Apr 25, 2018
Zendesk commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) that organizations may realize by utilizing Zendesk’s customer support products to improve handling customer interactions. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Zendesk on their organizations. To better understand the benefits, costs, and risks associated with a Zendesk implementation, Forrester interviewed seven organizations with experience using Zendesk’s customer support products.
Tags : 
    
Zendesk GmbH
Published By: Groove     Published Date: May 16, 2018
Trader Interactive provides marketing services and technology solutions to customers across seven verticals. Their customer support team was bogged down with associating support requests with the appropriate cases in Salesforce, and they needed a solution to streamline their work. Now, the customer support team enjoys Gmail integration with Salesforce, and the sales team takes advantage of multi-step campaigns, email tracking, and much more. Overall, they’ve been able to work more efficiently and provide better value to their customers. Let’s check out their story.
Tags : 
    
Groove
Published By: Abacus Labs     Published Date: Jun 14, 2018
The purpose of expense reporting software is to streamline your team’s workflow for submitting and reviewing business expenditures. By implementing an expense management solution, you can decrease the time and costs associated with processing expenses and increase your visibility into the implications of business spend, while helping improve general expense policy compliance and reduce expense fraud.
Tags : 
reporting, software, expense, finance, business, management
    
Abacus Labs
Published By: IBM     Published Date: Jun 04, 2018
"Today’s business users want to use all types of data to create compelling, shareable visualizations. But charts and graphs alone may not convey all the information, especially when they are part of a complex series. An audience can best understand analytic results when those results tell a story that connects all the pieces together. The right visuals can also reinforce the lessons buried in the data. Stories are powerful mechanism to communicate with people. Stories stick and make insights actionable, so it goes without saying that storytelling is a very powerful (soft) skill. In this webinar, you'll learn how to effectively apply storytelling best practices to get your message across. Especially in the world of BI, it is getting more and more important to effectively communicate business results. Watch this webinar to learn how to use IBM Cognos Analytics to: · Create the important elements of a good story · Put the data in context · Select the best type of ch
Tags : 
data analytics, data storytelling, business intelligence
    
IBM
Published By: Genesys     Published Date: Jun 11, 2018
Don’t let your communications system hold you back. PBX systems once provided top-of-the-line business communications, but they weren’t designed to accommodate business growth and change. And cloud-based platforms have altered the landscape of business communications. Your PBX isn’t just an inconvenience, it could hurt your business. This eBook covers common problems associated with PBX systems as well as their impact on your business. Learn to identify signs of trouble in your business communications as well as key features to look for in a new system. Don’t let a fear of the unknown hold you back. Download the eBook and learn: • Key warning signs to look for in your PBX • The impact of maintaining an outdated system • How modern communication tools can benefit your business
Tags : 
pbx, cloud, business communications
    
Genesys
Published By: DocStar     Published Date: Jun 11, 2018
Accounts Payable is a fundamental activity for nearly all businesses. Pick any enterprise and you can bet there is an AP function at the heart of financial operations. The obligation to pay off short-term debt is one that every company must satisfy. But more than that, the process to do it must be efficient and productive. If you get behind on your obligations you risk missing important financial discounts, defaulting with creditors, and damaging your reputation with suppliers and stakeholders. CFOs face the challenges associated with Accounts Payable…and it’s easy to lose sleep. As other areas of business and commerce have become more and more paperless, the accounts payable process in most organizations remains mired in paper copies and manual workflow. The result is an often costly and people intensive process that leaves companies vulnerable to competitors and financial executives with a growing unease over the inherent inefficiencies.
Tags : 
    
DocStar
Published By: Workday UK     Published Date: Mar 08, 2018
In the HR Outlook Report for Winter 2016/2017, brought to you by the CIPD in association with Workday, HR leaders discuss the priorities and challenges facing the function, both today and as we move into a business landscape which is anything but clear. Read the report and discover: • How HR leaders view their role in guiding their organisation through periods of economic and political uncertainty, such as Brexit • The uptake of analytics and big data to strengthen evidence-based decision making and the barriers preventing HR from adopting these technologies • HR’s priorities for 2017, and how these are shifting from 2016
Tags : 
    
Workday UK
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Oggi la tecnologia digitale è ovunque: cloud, mobility, social network e Internet of Things stanno cambiando il modo in cui tutti noi lavoriamo e ci divertiamo. Questo mondo digitale in rapida evoluzione sta anche rimodellando il rapporto tra le aziende e i clienti, che ora si aspettano dai propri brand preferiti un'esperienza utile e interattiva. Anche la sicurezza è motivo di preoccupazione. Azienda e clienti si scambiano un volume in continuo aumento di dati sensibili, aumentando i fattori di rischio.La trasformazione del mercato sta inoltre intensificando la concorrenza. Come osserva l'analista Mark Raskino, "Come conseguenza, tutti i contendenti hanno rielaborato le proprie strategie e si sono risvegliate alla potenza del business digitale nello stesso momento. Il conflitto è quindi inevitabile.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
La protezione degli accessi privilegiati e la prevenzione delle violazioni restano preoccupazioni urgenti per le aziende di tutte le dimensioni. Gli autori di attacchi utilizzano una gamma sempre più ampia di metodi sempre più sofisticati per infiltrarsi in sistemi vulnerabili. E anche se le notizie di violazioni esterne spesso dominano le cronache, le aziende devono essere in grado di difendersi anche dalle minacce interne. In effetti, dato l'impiego oggi diffuso di outsourcing e partnership per supportare le funzioni aziendali chiave, il numero degli utenti che dispongono di accesso con privilegi ai sistemi di business critici è aumentato. In aggiunta, è essenziale per gli amministratori di sistema di oggi comprendere in che modo i sistemi vengono utilizzati, da chi e in quali condizioni. Purtroppo, le soluzioni di sicurezza standard non sono in grado di proteggere l'accesso interno/privilegiato in modo efficace e presentano gravi carenze, che mettono a rischio l'azienda.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 24, 2018
L’essor des interfaces de programmation d’applications (API) représente à la fois une opportunité commerciale et un défi technique. Pour les dirigeants d’entreprise, les API sont synonymes de nouvelles sources de revenu et d’optimisation de la valeur pour le client. Ce sont toutefois les architectes d’entreprise qui sont chargés de créer ces API permettant de réutiliser les systèmes back-end dans les nouvelles applications Web et mobiles. Il est crucial que tous les intervenants comprennent que les objectifs métier et les défis techniques d’un programme d’API sont intimement liés. Les responsables de programmes ont pour rôle de présenter clairement les objectifs commerciaux clés d’une API proposée aux architectes qui seront en charge de la conception de l’interface.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 25, 2018
Vor zwei Jahren begann CA Technologies zu prüfen, wie Unternehmen ihre Projektund Portfoliomanagementlösungen nutzen. Ziel war es, CA Project and Portfolio Management (CA PPM) besser für alle Anwender zu konzipieren – von Projekt-, Ressourcen- und Finanzmanagern bis zu Entscheidungsträgern auf Leitungsebene und Teammitgliedern.
Tags : 
ppm, leistungsstark, konfigurierbar, sozial, vernetzt
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 25, 2018
Molte delle aziende più grandi e di maggior successo nel mondo utilizzano CA Project & Portfolio Management (CA PPM) come chiave di volta della strategia di Business intelligence (BI). Questo permette a CA di monitorare costantemente l'andamento del mercato, e l'evoluzione relativa ad aspettative ed utilizzo, man mano che le aziende adottano tecnologie BI.
Tags : 
sette, trend, nella, business, intelligence
    
CA Technologies EMEA
Published By: Virtela Communications, Inc.     Published Date: Nov 16, 2009
Frost & Sullivan review the limitations associated with a single-provider approach to MPLS networks and its impact on the enterprise. They examine Virtela's Global Service Fabric - a multi-carrier network approach that provides a best-of-breed global MPLS network solution.
Tags : 
virtela, frost & sullivan, mpls networks, virtela's global service fabric, mpls network solution, cos, multi-protocol label switching, wide area network, cos mapping, network consolidation, network management, network performance management, network security, wide area networks
    
Virtela Communications, Inc.
Published By: iShares by BlackRock     Published Date: May 21, 2018
Visit www.iShares.com to view a prospectus, which includes investment objectives, risks, fees, expenses and other information that you should read and consider carefully before investing. Investing involves risk, including possible loss of principal.Visit www.iShares.com to view a prospectus, which includes investment objectives, risks, fees, expenses and other information that you should read and consider carefully before investing. Investing involves risk, including possible loss of principal. The iShares Funds are distributed by BlackRock Investments, LLC (together with its affiliates, “BlackRock”).This study was sponsored by BlackRock. BlackRock is not affiliated with Greenwich Associates, LLC, or any of their affiliates. iSHARES and BLACKROCK are registered trademarks of BlackRock, Inc., or its subsidiaries. All other marks are the property of their respective owners. BlackRock, Inc. is not affiliated with The Economist. 503791
Tags : 
business management, financial management, business technology, finance
    
iShares by BlackRock
Published By: iShares by BlackRock     Published Date: Jun 15, 2018
While the accumulated knowledge of a portfolio manager should not be undervalued, a move toward more systematic instrument selection could ultimately enhance fund returns. This material is provided for educational purposes only and is not intended to constitute investment advice or an investment recommendation within the meaning of federal, state, or local law. Investing involves risk, including possible loss of principal. This study was sponsored by BlackRock. BlackRock is not affiliated with Greenwich Associates, LLC, or any of their affiliates. iSHARES and BLACKROCK are registered trademarks of BlackRock, Inc., or its subsidiaries. All other marks are the property of their respective owners. Prepared by BlackRock Investments, LLC, member FINRA. BlackRock, Inc. is not affiliated with The Economist. 530180
Tags : 
best practices, business management, return on investment, business technology, finance
    
iShares by BlackRock
Published By: ASG Software Solutions     Published Date: Jun 08, 2008
As organizations have improved service delivery, they have also turned their focus to presenting business value more positively. These organizations are beginning to develop true BSM systems in two ways: by understanding the metrics that successful businesses employ to determine the value of IT, and by linking these metrics and associated business services to IT infrastructure components.
Tags : 
asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization, business activity monitoring, business process automation, business process management, application integration, analytical applications, configuration management, database development, web service management
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Mar 01, 2010
In Q4, 2009, ENTERPRISE MANAGEMENT ASSOCIATES (EMA) analysts worked with ASG to research how executives in IT and within the lines of business use dashboards to gain holistic insights into IT services as they impact business outcomes.
Tags : 
asg, ema, enterprise management associates, dashboards, cio, ceo, coo, cfo, side bar, application performance management, business integration, business intelligence, business management, business process automation, enterprise resource planning, enterprise software, workforce management
    
ASG Software Solutions
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Search the Library

Add Research

Get your company's research in the hands of targeted business professionals.