work practices

Results 1 - 25 of 308Sort Results By: Published Date | Title | Company Name
Published By: Great Bay Software     Published Date: Apr 12, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Apr 12, 2018
"IoT adoption is expected to generate a 21% increase in corporate profits by 2022. This business value comes from the ability to automate processes and collect and analyze massive amounts of data—so organizations can make better informed decisions and deliver powerful customer experiences. But how are organizations really putting IoT to work for their business? And how can IoT risks be mitigated so these rewards can truly be achieved? This e-book explores the potential of IoT in the enterprise, which industries are leading the way and how to secure your connected things. It also provides: • 7 best practices for data privacy and security policies • 7 items to consider for device security • 6 key considerations for network connection security"
Tags : 
    
Great Bay Software
Published By: SAP     Published Date: Mar 02, 2017
Deploying a performance management system is a powerful catalyst for increasing employee and organizational performance. If not handled properly, however, organizations risk creating unnecessary administrative work which can diminish some of the benefits. A key challenge is to balance the tension between creating a fair and consistent evaluation process across the organization and measuring employee performance based on individual needs. What best practices should you follow to help strike the right balance? How have other leading organizations designed effective review forms and processes?
Tags : 
    
SAP
Published By: Cisco     Published Date: Jul 30, 2015
This document consolidates the enterprise campus network design and deployment guidelines with various best practices from multiple deeply focused Cisco Validated Design Guides.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Feb 12, 2016
Get inspired! Discover the best options for your space with Workplace Transformation Solutions!
Tags : 
workplace solutions, work space, best practices, solutions, employee performance, productivity, retail
    
Cisco
Published By: Dialpad     Published Date: Apr 19, 2016
Workplace expectations are changing and companies are ditching outdated technology in favor of flexible, cloud-based services, freeing their employees to work from anywhere. From modern office spaces to popular business tools, this eBook breaks down the top trends of the workplace revolution, including: 1. The age of Millennial workers 2. Modern workspaces 3. Improving employee productivity and satisfaction 4. The rise of remote work
Tags : 
communication, internet, network management, best practices, business intelligence, business management, mobile, content delivery, content management system, productivity, content management
    
Dialpad
Published By: Dialpad     Published Date: Apr 19, 2016
Today, everything about the way we work has changed. Your employees, customers, and extended ecosystem have greater expectations than ever before, and the voice and unified communication solution you select is one of the most important decisions you can make toward a collaborative, connected, and productive workforce. This list gives you some of the most important questions to include in an RFP this year, as well as key insights about how these will play out for your business.
Tags : 
communication, reporting, network management, business intelligence, business management, best practices, productivity, network performance, content management system, project management
    
Dialpad
Published By: Pega     Published Date: May 25, 2016
Organizations are constantly turning to IT solutions to streamline their operations and processes and gain efficiencies. Business Process Management solutions is one area gaining traction inside enterprises as they look to making their workflow more effective and more capable to an ever changing business environment. According to Gartner, BPM-platform-based case management frameworks are configurable "apps" meant to help solution architects accelerate the delivery of unique and flexible case management solutions. Gartner evaluated 11 providers in this growing market segment including Pegasystems. Download this Gartner Magic Quadrant analysis for BPM platform-based case management frameworks and gain a better understanding of the solutions offered by each BPM vendor.
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, solutions, application integration, business intelligence, business management
    
Pega
Published By: Pega     Published Date: May 25, 2016
Adapting to changing market dynamics is not easy for any enterprise-class organization. To stay competitive, companies not only must adapt different go to market and customer service strategies but also embrace internal business process and workflow changes, which in many cases can be more difficult. Enter Intelligent Business Process Management Suites (iBPMS). According to Gartner, iBPMS compress the observation-to-action-to-outcome cycle, and help business transformation leaders, business process directors and solution architects establish a fluid capability to handle big change. Gartner evaluated 15 iBPMS vendors including Pegasystems. Download this Gartner Magic Quadrant analysis and gain a better understanding evolving iBPMS market and the solutions offered by each iBPMS vendor.
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, solutions, enterprise management, application integration, business integration, business intelligence, business management, business process automation
    
Pega
Published By: Pega     Published Date: May 25, 2016
Case management frameworks built on business process management platforms help IT solutions architects deploy case-handling applications and offer an alternative to specialized case management applications and custom coding. According to Gartner, the complex architecture required to support case management has relegated it to the status of a niche application, typically addressed by specialist, commercial off-the-shelf application providers and system integrators. Case management as a process style is being applied in many sectors beyond government, legal and insurance, including healthcare, banking, higher education and retail. Industry and cross-industry case management frameworks are now available. "Adaptive case management" hype exceeds the reality of what buyers need. Gartner evaluated 12 vendors including Pegasystems against nine critical capabilities in four use cases. Download this Gartner analysis and gain a better understanding of the case management frameworks solutions offe
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, solutions, case management, business intelligence, business management, collaboration
    
Pega
Published By: Cisco Spark     Published Date: Feb 08, 2017
A comprehensive guide to workforce trends, as well as tips and best practices for keeping employees engaged with the brand (and with each other) and ensuring they stay productive on a day-to-day basis.
Tags : 
    
Cisco Spark
Published By: Gigamon     Published Date: Oct 19, 2017
Register for the Enterprise Strategy Group’s Research Insights Paper, Understanding the State of Network Security Today to learn more about the challenges, changes, best practices and solution requirements for network security operations and tools. See why ESG recommends improving network visibility and reducing security vulnerabilities by consolidating tools through a platform-based approach to visibility in which data, analytics and reports from multiple tools are aggregated and consumed in one control panel. Download to learn more.
Tags : 
    
Gigamon
Published By: Riverbed     Published Date: Jan 25, 2018
To stay ahead in today's hybrid network, you need a lens into the end user's experience as well as an understanding of the dependencies between your applications and network. With this approach, you are alerted to issues before the business is impacted and problems are resolved faster. This eBook details what you need to know to select a best of breed network performance management solution and outlines the critical capabilities required for deep application visibility across virtualized, hybrid and cloud networks no matter where a user is located. Read this book and: Discover best practices - for proactive network monitoring and fast troubleshooting Learn how to stay ahead of application performance issues with increased visibility Increase productivity and a higher ROI - with automatic discovery, end-to-end monitoring, reporting, analytics and faster MTTR Ensure your approach is a proactive mode Study the
Tags : 
    
Riverbed
Published By: Dome9     Published Date: Apr 25, 2018
AWS provides powerful controls to manage the security of software-defined infrastructure and cloud workloads, including virtual networks for segmentation, DDoS mitigation, data encryption, and identity and access control. Because AWS enables rapid and elastic scalability, the key to securing cloud environments is using security automation and orchestration to effectively implement consistent protection across your AWS environment. The following eBook will discuss Dome9 best practices for using AWS controls to establish a strict security posture that addresses your unique business needs, and maintaining consistency across regions, accounts, and Virtual Private Clouds (VPCs) as your environment grows.
Tags : 
    
Dome9
Published By: Aviatrix     Published Date: May 17, 2018
Once you've designed and secured your Global Transit Network, are you done? Are you ready to hand day-to-day responsibility over to an operations team? Or, are there other elements you need to ensure that the day-to-day operation of your transit hub is efficient and effective? As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, demonstrate the best practices they've gleaned from working with operations teams, all who require: • Visibility: Do you have a way to centrally view your network, see performance bottlenecks, control security policies, and set other configuration details? • Deep Analytics: Can you easily gather performance and audit data and export it to Splunk, DataDog, or other advanced reporting tools? • Monitoring and Troubleshooting: Do you have a real-time view of network health, and how easily can you access the data needed to locate and fix issues? • Alert Management: When issues do occur, what r
Tags : 
    
Aviatrix
Published By: Dell     Published Date: Nov 20, 2014
In extreme conditions, you need reliable technology. Whether you are a first responder, work in dangerous locations, wild weather, or just need your equipment to be able to withstand the same harsh conditions you do, Dell allows you to access information quickly - in extreme environments where traditional notebooks simply cannot live up to your expectations. How do you work in such harsh environments and keep information secure and long-lasting without the fear of losing critical information? And how do you keep the information secure, yet utilize a manageable system? Download this interactive infographic today to become informed on Dell's best practices.
Tags : 
mobility, real-world systems, extreme environments
    
Dell
Published By: TriNet     Published Date: Nov 26, 2012
Download this white paper for best practices on how to better understand and effectively manage a multi-generational workforce.
Tags : 
workforce management, human resources, best practices, diverse workforce, enterprise applications, human resource technology, business technology
    
TriNet
Published By: Websense     Published Date: Jan 25, 2013
In this whitepaper, we provide guidance and clarity to help you implement a DLP control that is practical, efficient, and effective. Learn about 4 key topics of data breaches, potential vendors, 9 step framework and other best practices.
Tags : 
websense, data loss prevention, executive guide, data loss, practical guide, 4 topics, potential vendors, it management, data management, business technology, data center
    
Websense
Published By: Cisco     Published Date: Oct 08, 2015
This document consolidates the enterprise campus network design and deployment guidelines with various best practices from multiple deeply focused Cisco Validated Design Guides. The best practices conclusions are derived from thorough solution-level end-to-end characterization of various levels of system types, network design alternatives, and enterprise applications.
Tags : 
cisco infrastructure, enterprise network, network design, infrastructure, migration, network architecture, network management, network performance, network performance management, quality of service, remote access, remote network management
    
Cisco
Published By: Schneider Electric     Published Date: Jun 06, 2017
Could you do more for worker safety? Protective gear alone can't prevent arc flash injury. In fact, according to NFPA 70E, injuries sustained during an arc ?ash event would be reduced and survivable due to arc-rated PPE. Complying with the safe work practices required by NFPA 70E and implementing arc flash mitigation strategies through engineering controls will enhance workplace safety for employees and lower financial risk for your company. Read the white paper, "Mitigating Arc Flash Hazards", for more information.
Tags : 
arc flash, nfpa 70e compliance, electrical workplace safety, arc flash risk assessment, arc flash analysis, arc flash mitigation solutions
    
Schneider Electric
Published By: Schneider Electric     Published Date: Nov 21, 2017
Could you do more for worker safety? Protective gear alone can't prevent arc flash injury. In fact, according to NFPA 70E, injuries sustained during an arc ?ash event would be reduced and survivable due to arc-rated PPE. Complying with the safe work practices required by NFPA 70E and implementing arc flash mitigation strategies through engineering controls will enhance workplace safety for employees and lower financial risk for your company. Read the white paper, "Mitigating Arc Flash Hazards", for more information.
Tags : 
arc flash, nfpa 70e compliance, electrical workplace safety, arc flash risk assessment, arc flash analysis, arc flash mitigation solutions
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jan 02, 2018
Could you do more for worker safety? Protective gear alone can't prevent arc flash injury. In fact, according to NFPA 70E, injuries sustained during an arc ?ash event would be reduced and survivable due to arc-rated PPE. Complying with the safe work practices required by NFPA 70E and implementing arc flash mitigation strategies through engineering controls will enhance workplace safety for employees and lower financial risk for your company. Read the white paper, "Mitigating Arc Flash Hazards", for more information.
Tags : 
arc flash, nfpa 70e compliance, electrical workplace safety, arc flash risk assessment, arc flash analysis, arc flash mitigation solutions
    
Schneider Electric
Published By: Blue Coat Systems     Published Date: Aug 12, 2013
There is no question that security attacks targeting your organization will continue to grow and evolve. The question is, how can you respond to malware and other risks without unnecessarily constraining your workforce? How can you get beyond the fear and anxiety that leads to excessive prohibition, prevention, blocking, and excluding – so that you can use security technology to both protect and empower people? The answer is with a multi-layered defense – one that uses advanced security technologies and sophisticated operational practices in combination to cover the full spectrum of threat vectors. This solution brief explores the growing importance of multi-layered defense in today’s fast-changing web environment, and key considerations in implementing an effective multi-layered defense strategy.
Tags : 
av defense, blue coat, web environment, application security, business continuity, email security, ssl
    
Blue Coat Systems
Published By: Red Hat     Published Date: Jan 01, 2013
Traditional security measures such as network firewalls are no longer enough to keep an enterprise secure. With Red Hat Enterprise Linux, security mechanisms are incorporated and applied at the core of every solution, and security is extended to include all the open source packages that make up Red Hat Enterprise Linux. As a result, customers experience a higher quality of service.
Tags : 
red hat, security systems, server operating system, next-generation datacenters, enterprise linux, security innovation, evade network defenses, dynamic datacenters, virtualization technologies, cloud computing practices, security, data center
    
Red Hat
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Search the Library

Add Research

Get your company's research in the hands of targeted business professionals.