adoption

Results 476 - 500 of 963Sort Results By: Published Date | Title | Company Name

The Perimeter: An Identity Crisis

Published By: F5 Networks Inc     Published Date: Aug 25, 2017
Sixty-three percent of data breaches involve weak, default, or stolen passwords. Why? To put it simply, password fatigue. Think of all the passwords you keep track of for your personal needs—your mobile banking app, your Gmail, your Facebook account, your Amazon Prime… the list goes on. Best practices tell us that we should use a unique and complex password for every service, but due to increased cloud adoption—enabling anytime access to applications from any device—users lean toward convenient but risky password practices.
Tags : 
    
F5 Networks Inc

EMA Radar™ For Business Service Management (BSM): Service Impact Q3 2010 CA Vendor Profile

Published By: Arcserve     Published Date: Jul 23, 2010
This report is designed to help IT organizations more effectively plan for the adoption of solutions that can help bring together a unified view of IT service performance as it impacts business outcomes. Download now!
Tags : 
ca technologies, ema radar, business service management, bsm, vendor, application performance management, infrastructure manager, service desk
    
Arcserve

Extracting the Full Value of the Cloud

Published By: NaviSite     Published Date: Sep 02, 2014
This whitepaper is structured for business leaders evaluating enterprise cloud services, and uses real-world customer experiences to examine the business impact of the Cloud.
Tags : 
the full value of the cloud, the business impact of the cloud, cloud adoption, navisite, mobile computing, mobile data systems, mobile workers, cloud computing
    
NaviSite

The Future of Mobile Selling — Getting More from your CRM

Published By: Tact     Published Date: Sep 06, 2016
Did you know that sales reps typically waste up to 16 hours per week on non-selling tasks? If your sales team is spending too much time on non-selling tasks, logging sales activities to Salesforce, hunting for customer information and documents, or copy-pasting data between separate systems, they might resist the rise of mobile CRM solutions like Salesforce1. However, it’s important to figure out how to enable these teams in the field, as 55% of salespeople will access sales applications exclusively through smartphones or tablets by the end of 2016. It’s not surprising that salespeople will increase their use of mobile apps 125% from 2015-2017. In this whitepaper from Tact, you’ll learn 1) common challenges facing field sales teams, 2) a framework for thinking about mobile sales productivity, 3) essential characteristics for evaluating mobile sales solutions, and 4) key trends in mobile sales.
Tags : 
salesforce, salesforce.com, crm, sales productivity, sales enablement, salesforce adoption, crm adoption, sales management
    
Tact

10 Tips for enterprise cloud migration

Published By: AppDynamics     Published Date: Dec 08, 2017
This Whitepaper looks into the technologies once relegated to the pages of science fiction novels—artificial intelligence, digital currency, and self-driving cars to name a few—have become a reality. Enterprises must innovate with high velocity and at massive scale to stay competitive. Cloud adoption has become a strategic imperative for enterprises—it’s the price required to transform into a digital business.
Tags : 
    
AppDynamics

10 Tips for enterprise cloud migration

Published By: AppDynamics     Published Date: Dec 08, 2017
This Whitepaper looks into the technologies once relegated to the pages of science fiction novels—artificial intelligence, digital currency, and self-driving cars to name a few—have become a reality. Enterprises must innovate with high velocity and at massive scale to stay competitive. Cloud adoption has become a strategic imperative for enterprises—it’s the price required to transform into a digital business.
Tags : 
    
AppDynamics

Setting The Stage For The Best Practices Service Performance

Published By: ClickExpress     Published Date: May 01, 2013
The path forward is clear: the best practices organizations have already taken the first steps to establish a stronghold with the application of Mobile Workforce Management Solutions. They are already at the vanguard of technology adoption, implementation, and usage. However, as the global services economy continues to expand, all services organizations that expect to compete successfully in their respective market space will need to embrace the state-of-the-art technologies that will allow them to survive – and thrive – in an increasingly competitive marketplace.
Tags : 
stage, practice, service, performance, organizations, management solutions, implementation
    
ClickExpress

Mission Critical Webcast

Published By: HP     Published Date: Jul 29, 2008
Join IDC and HP on this webcast about Mission Critical Services. Matt Healey of IDC provides insights on the adoption of consolidation, virtualization and Service Oriented Architecture as aggressive strategies to align IT more closely with business goals.
Tags : 
erp, mission critical, itsm, service management, soa, service-oriented, service oriented, enterprise resource planning
    
HP

CMDB Adoption in the Real World: Just How Real Is It?

Published By: Tideway Systems     Published Date: Dec 11, 2007
This report provided by Enterprise Management Associates (EMA) is developed around research that's focused on showing the many faces of the CMDB – as a central point for governance, asset, inventory, change and configuration control, and as a core system, in many cases for more effective service assurance. Designated for IT adopters and planners – read by executives, as well as, architects, and technical influencers.
Tags : 
cmdb, configuration management, change management, itil, service management, itsm, tideway systems, tideway
    
Tideway Systems

How to Ensure That Your Employees Will Want to Use CRM

Published By: Pivotal CRM     Published Date: Dec 21, 2007
In this paper, learn how with the right CRM solution, information workers can increase productivity, improve customer service, and boost collaboration, while the business simplifies complex processes, increases sales, and reduces costs.
Tags : 
information worker, crm, microsoft, office, customer relationship management, user adoption, information management, data management
    
Pivotal CRM

Forrester Findings: Modern Authentication Methods that Protect and Enable

Published By: Entrust Datacard     Published Date: Sep 14, 2018
Digital is changing the face of business, and your security needs are evolving along with it. The widespread adoption of technologies and applications like mobile, VPN and Office 365 have enabled your users a more frictionless work experience. But how can you ensure those experiences are also secure? Forrester recently surveyed 100 IT and security executives to understand their current approaches to user authentication and access management. Check out the 2018 Forrester Opportunity Snapshot — Modern Authentication Methods Protect and Enable study to learn what authentication methods other companies are using and which of these methods are most effective.
Tags : 
authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
    
Entrust Datacard

Appian: BPM Accelerated

Published By: Appian     Published Date: Jun 28, 2010
Leveraging Rapid Process Application Development, Deployment, Adoption and Use for Business Value.
Tags : 
appian, bpm, business process management, process application development, application performance management, business management
    
Appian

Reinforcing Agile Software Development in the Cloud

Published By: CollabNet     Published Date: Dec 20, 2011
Why the Cloud Is Advantageous for Agile, and for Accelerating its Enterprise-wide Adoption
Tags : 
cloud, development, alm, agile, software development, collaboration, dev team, production
    
CollabNet

Taking Windows Mobile on Any Device

Published By: Citrix Systems     Published Date: Sep 06, 2013
As the adoption of mobile devices continues to expand, IT organizations are challenged to keep up with the mobile demands of today’s fast-paced workforce and at the same time secure critical business data.
Tags : 
citrix, windows mobile, security, it management
    
Citrix Systems

Taking Windows Mobile on Any Device

Published By: Citrix Systems     Published Date: Jul 17, 2015
Adoption of mobile devices continues to expand.
Tags : 
windows, applications, platform, security, performance, application security, business intelligence, employee performance
    
Citrix Systems

Windows 10: The Unavoidable Upgrade

Published By: Citrix Systems     Published Date: Apr 15, 2016
With faster adoption rates than any other upgrade, Windows® 10 is breaking records—and it’s poised to accelerate. In fact, Gartner predicts that 50% of businesses will be on their way to Windows 10 by early 2017—and 100% by 2019. Businesses of all sizes need an IT strategy that maintains employee productivity and business continuity without the worry of app compatibility issues or OS instability across differing end points. The time to upgrade to Windows 10 is now.
Tags : 
citrix, windows, windows 10, upgrade, productivity, enterprise applications, business technology
    
Citrix Systems

Join.Me Guidebook by LogMeIn

Published By: LogMeIn     Published Date: Jan 15, 2014
Nucleus found that the ease of use for end users and administrators led to increased adoption, improved business productivity, and IT efficiencies. Also, join.me’s low pricing relative to functionality resulted in significant cost savings.
Tags : 
logmein, join.me, conferencing, collaboration, support presentations, online collaboration, ease of use, increase adoption
    
LogMeIn

VMware Virtualization and Cloud Management Solutions : Managing IT in the Cloud Era

Published By: CDW Vmware     Published Date: Aug 08, 2013
The principal driver behind the rapid adoption of virtualization has been cost reduction through server and other infrastructure consolidation.
Tags : 
cdw, vmware, cloud management, cloud era, technology solutions, managing it, virtualization, software development
    
CDW Vmware

EVault Ebook: Trusted Data Assurance in the Cloud

Published By: EVault Inc.     Published Date: Aug 22, 2012
How will you prepare your company for cloud adoption? Cloud services are especially attractive to midmarket companies hit with the high cost of meeting compliance requirements. Author and information security expert Felix Santos discusses: . Information security and data protection in the cloud . Recent cloud standards and audit initiatives . Evaluation criteria for selecting a cloud provider that offers trusted data assurance
Tags : 
evault, ebook, trusted, data, assurance, cloud, services, compliance
    
EVault Inc.

White Paper: Best Practices for Protecting Laptop Data

Published By: EVault Inc.     Published Date: Aug 22, 2012
Learn best practices for guarding your endpoint corporate data so you can mitigate the risk of regulatory and financial exposure, and more. This white paper explores: . Defining security policies for endpoint backup and recovery . Enforcing endpoint controls . Ensuring employee adoption . Keeping IT costs in check
Tags : 
white, paper, best, practices, for protecting, laptop, data, endpoint
    
EVault Inc.

7 Steps for Maximizing e-Procurement User Adoption and Cost Savings Within Your Organization

Published By: Coupa Software     Published Date: Sep 19, 2012
Your new e-procurement solution is only as productive as the people using it. Download this white paper now and find out what it takes to get employees on board so you can meet your ROI goals fast.
Tags : 
e-procurement, purchasing decision, cost savings, procurement processes, business process management, eprocurement
    
Coupa Software

2012 Insights on Invoice & Workflow Automation Adoption (Benchmarking Survey Report)

Published By: Concur     Published Date: Apr 17, 2013
In this survey report analysts examine electronic invoicing, imaging and data extraction, and automated workflow solutions at US-based enterprises. The analysis is based on over 300 survey results and more than nine years of research findings.
Tags : 
ap automation, accounts payable, invoice management, invoice automation, invoicing, ap report, ap study
    
Concur

Intel and McAfee Solutions for Enabling Secure Cloud Adoption

Published By: McAfee     Published Date: Feb 06, 2013
Insight and control to secure your dynamic cloud environment at every infrastructure layer
Tags : 
cloud security, cloud computing, public cloud security, private cloud security, cloud security policy enforcement, application security, data security, security compliance
    
McAfee

Gartner Magic Quadrant for Security Information and Event Management

Published By: McAfee     Published Date: Oct 28, 2014
Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Vendors are improving threat intelligence and security analytics. Read this report from leading analyst firm Gartner, to learn why they have placed McAfee as a Leader in the Magic Quadrant for Security Information and Event Management.
Tags : 
siem, mcafee enterprise security manager, gartner, magic quadrant, threat management, collect, store, forensics and regulatory compliance
    
McAfee
Start   Previous    13 14 15 16 17 18 19 20 21 22 23 24 25 26 27    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.