strategy

Results 176 - 200 of 3378Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC     Published Date: Oct 08, 2015
Download this whitepaper to learn how Dell can help you realize the full value of your big data strategy—and to capitalize on all of your data, from enterprise systems to social media and the Internet of things.
Tags : 
    
Dell EMC
Published By: Websense     Published Date: Jul 08, 2014
This paper provides 5 essentials for protecting against advanced persistent threats (APTS)
Tags : 
apts, understanding apts, apt security strategy, anti spam, anti spyware, anti virus, hacker detection, internet security
    
Websense
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware. "
Tags : 
dns, rdns, security, zero trust security, malware, data, network security
    
Akamai Technologies
Published By: CA Technologies     Published Date: Oct 22, 2014
This paper presented by Ponemon Institute provides its research findings into The Identity Imperative for the Open Enterprise: What IT Users and Business Users Think about Bring Your Own Identity (BYOID).
Tags : 
byoid, security, byoid strategy, it and business views on byoid, bring your own identity, access control, application security, identity management
    
CA Technologies
Published By: CA Technologies     Published Date: Oct 22, 2014
This infograph provides important information adn statistics on BYOID and the potential impact if IT and business are out of step.
Tags : 
byoid, security, byoid strategy, it and business views on byoid, bring your own identity, access control, application security, identity management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 09, 2015
This paper provides an overview of new APIs risks, and offers five simple solutions to counter the common threats. By adopting a secure API architecture from the beginning, organizations can pursue an API strategy more safely and securely — and reap the benefits of agile integration promised by this exciting new technology.
Tags : 
apis, risks of apis, apis can increase organization's risks, api security, access control, anti spam, application security, disaster recovery
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 09, 2015
This paper outlines the defense-in-depth strategy that complements the traditional security solutions to provide protection against ATP's across all four phases of the attack.
Tags : 
advanced persistent threats, apts, defense-in-depth strategy, new security strategies, ca security, security
    
CA Technologies
Published By: KeyBanc Capital Markets     Published Date: Nov 12, 2015
Private equity and investment banking experts share observations on what a distribution company owner can expect when preparing to sell a stake in the company, and how to prepare the business to attract potential buyers’ attention and maximize the price it can command.
Tags : 
industrial distribution, industrial distribution business owner, selling a business, private equity, financial sponsor, financial investor, strategic partner, growth strategy
    
KeyBanc Capital Markets
Published By: Dell     Published Date: Jan 26, 2015
Infrastructure and operations leaders must create a strategy and budget to outfit workers with devices, software, and services to improve their productivity. Additionally, I&O leaders play a critical role in both the strategy and budgetary support of customer-facing interaction technologies. This report helps you benchmark your organization against your peers as you work with business partners to develop and implement technology strategies that drive business results for your company. Read this Forrester Research report, offered compliments of Dell, for more information on strategies to devise the right technology fits for your organizational needs.
Tags : 
dell, windows, workforce, customer facing technology, infrastructure, operations, software, productivity
    
Dell
Published By: TriNet     Published Date: Jan 17, 2012
This white paper provides valuable insight on how to build an HR strategy that produces results in any economy.
Tags : 
trinet, integrated hr outsourcing, in-house infrastructure, internal costs, human resources, cost structure
    
TriNet
Published By: TriNet     Published Date: Jan 17, 2012
This white paper provides valuable insight on how to build an HR strategy that produces results in any economy.
Tags : 
trinet, integrated hr outsourcing, in-house infrastructure, internal costs, human resources, cost structure
    
TriNet
Published By: Collaborative Consulting     Published Date: Dec 20, 2013
An integrated launch plan was just the start for helping to transform a research organization into a commercial entity. A successful commercial launch of an FDA-approved specialty drug included project management support to a cross-functional client team and development of a dashboard tool to track each function’s progress.
Tags : 
collaborative consulting, biotech organization, case study, launch strategy, biotech company, infrastructure, tailored segment, particular market
    
Collaborative Consulting
Published By: Collaborative Consulting     Published Date: Dec 20, 2013
In this case study, a company needed to find a way to update and improve a legacy trade portal application. With the help of Collaborative, using domestic resources, the company completely replaced several legacy trade portal applications, allowing for the retirement of several application platforms and legacy databases.
Tags : 
collaborative consulting, trade portal, right price, infrastructure, better application, business documentation, inspire engagement, financial metrics
    
Collaborative Consulting
Published By: Collaborative Consulting     Published Date: Dec 20, 2013
Collaborative helped a research company transitioning to commercialization identify critical timelines, tasks, milestones and resources required to bring a new drug to market. As part of the project, leaders were given the information and tools they needed and the business began building the strong foundation necessary for a successful launch.
Tags : 
collaborative consulting, biotech organization, case study, launch strategy, biotech company, infrastructure, tailored segment, particular market
    
Collaborative Consulting
Published By: Collaborative Consulting     Published Date: Dec 23, 2013
Commercial launch is a critical and complex period in the Life Sciences product life cycle. The transition from clinical development to commercial operations can seem overwhelming as companies face considerable challenges in transforming from an R&D-driven organization to one focused on achieving in-market business and commercial excellence. Core to successful launches is preparing the company for a whole new raft of capabilities, processes, and relationships, and in doing so there are a number of factors included in this checklist that companies should consider and questions they should answer.
Tags : 
collaborative consulting, commercial launch, it infrastructure, balance representation, commercialization plan, define and track, iterative process, supply chain management
    
Collaborative Consulting
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Everybody has their favorite apps. But can you name even three mobile websites you like? We can’t. it’s because responsive retrofits to 20-year-old desktop web designs fail to serve us in our mobile moments of need. That’s a shame because even with lousy sites, web traffic around the world will be majority-mobile by 2019. eBusiness pros have a choice: hand your mobile moments over to a bunch of apps you don’t own, or do a radical reset of your mobile web strategy. This report carries the evidence to convince your company to make your mobile website a firstclass citizen.
Tags : 
mobile, app, web design, media
    
Akamai Technologies
Published By: Websense     Published Date: Jan 25, 2013
Increasing one's awareness of today's mobile security risks and understanding the options for solutions are two key steps in preparing for best security practices. In addition, this article discusses mobile security solutions and much more.
Tags : 
mobile security, solutions, websense, mobile security, solutions, major it security strategy, security, data center
    
Websense
Published By: Key Private Bank     Published Date: Apr 05, 2018
When it comes to building portfolios for wealth creation, Key Private Bank experts believe our clients are best served by a disciplined approach that incorporates both active and passive strategies. We understand the debate over which methodology generates better outcomes has been going on for decades, but with the right team by your side you’ll reap the benefits of a method that’s time-tested. Learn the whys and hows of both passive and active investing, and what to do to maximize their benefits, your portfolio and wealth when you read our latest whitepaper. © 2018 KeyCorp. E92127 180314-372281
Tags : 
investment, investing, investment portfolio, passive investing, active investing, passive or active investing, active vs passive investing, investment strategies
    
Key Private Bank
Published By: Key Private Bank     Published Date: May 22, 2018
There are obviously a variety of choices open to you: a spreadsheet plug-in may be appropriate if you are only focused on general ledger reporting and do not have concerns over security or compliance. You might also suppose that this is a low-cost option, though we would argue that the remediation required, the additional audit fees and the lack of repeatability means that this is a false economy and that this approach will end up costing you more in the long term. A second use case would be where you already have a financial reporting solution installed, when the add-on facilities for purposes such as business intelligence are likely to be your major focus. In this case an Oracle based solution is likely to be as good as anything else.
Tags : 
finance, business, planning, integration, strategy, company
    
Key Private Bank
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to achieve an app centric approach to enterprise mobility and see how this will enable workers to stay connected to corporate systems through a vast array of device types and wireless connectivity options while simultaneously increasing productivity and becoming more customer-centric.
Tags : 
enterprise mobility, applications, byod, mobile strategy, security
    
PulseSecure
Published By: Hewlett Packard Enterprise     Published Date: Jul 19, 2018
"The Enterprise Strategy Group put HPE SimpliVity hyperconverged infrastructure through its paces in a series of hands-on performance and stress tests simulating real-world configurations and load conditions. Read this report to learn how an HPE SimpliVity infrastructure: Ran nine workloads simultaneously, with an average response time across all applications of 3.9ms Showed little to no performance impact as a virtual controller, drive, and node were systematically failed on a two-node cluster."
Tags : 
hyperconverged, infrastructure, simplivity
    
Hewlett Packard Enterprise
Published By: MindTouch     Published Date: Oct 02, 2019
9 key areas that we recommend you consider when evaluating knowledge management platforms, why they are important, and where certain solutions will fall short.
Tags : 
content strategy, knowledge base, knowledge centered service (kcs), self-service
    
MindTouch
Published By: MindTouch     Published Date: Oct 02, 2019
The dynamics of the customer journey are constantly expanding and evolving. Traditional “company-first” approaches to delivering service excellence are no longer sufficient. Instead, today’s forward-thinking companies know that a more “customer-first” approach is best. Read our MindTouch-sponsored whitepaper by Lori Bocklund, President of Strategic Contact and experienced industry veteran, as she explores the ties between new self-service entry points and a strong foundation rooted in knowledge management.
Tags : 
content strategy, customer journey, customer success, digital transformation, knowledge base
    
MindTouch
Published By: MindTouch     Published Date: Oct 02, 2019
Understanding the important role that your support content plays (i.e. help docs, user guides, FAQs, troubleshooting steps, product information, etc.) can help organizations avoid creating frustrating journeys for their customers who simply need help. Undervaluing how customers seek answers is a critical oversight. To understand why, it helps to examine the place they’re most likely to start: Google.
Tags : 
content strategy, customer engagement, customer journey, customer success, digital transformation, knowledge base, online help, product documentation
    
MindTouch
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.