des

Results 301 - 325 of 8452Sort Results By: Published Date | Title | Company Name

5 Steps to Better Social Media Security

Published By: uberVU via HootSuite     Published Date: Apr 07, 2014
Alors qu'un nombre croissant d'entreprises adopte la puissance des médias sociaux, les violations de la sécurité sont également en hausse. Piratage du Twitter de l'entreprise, salariés malhonnêtes qui usurpent le compte Facebook de l'entreprise, cadres supérieurs qui divulguent des informations confidentielles sur leurs réseaux personnels. Ces sortes de crises peuvent être catastrophiques pour votre marque. Savez-vous comment les éviter?
Tags : 
hootsuite, social relationship platforms, it leadership, social media, social media advice, success stories
    
uberVU via HootSuite

5 Steps to Effective MPS Assessments in Large Enterprises

Published By: Lexmark     Published Date: May 28, 2014
This paper provides the 5 steps to effective MPS assessments.
Tags : 
lexmark, mps assessments, 5 steps to effective mps assessments, business management, change management, enterprise software, return on investment
    
Lexmark

5 Steps to Firewall Planning and Design

Published By: Juniper Networks     Published Date: Oct 19, 2015
The guidelines provided in this white paper make up some of the best practices entailed in creating an overall security policy for your organization that underlies deployment of effective firewalls.
Tags : 
juniper, firewall, threat, security, policy, configuration, packet, networking
    
Juniper Networks

5 Steps to Firewall Planning and Design

Published By: Juniper Networks     Published Date: Feb 18, 2015
The 5 Steps to Firewall Planning and Design Guide provides a step-by-step summary for planning your network firewall. It also contains links to the more detailed list of useful sites and publications on the subject. If you’re designing your company’s firewall architecture, read this first.
Tags : 
firewall planning, network firewall, security policy, http, terminal server, network, email security, firewalls
    
Juniper Networks

5 Steps to Managing Third Party Corruption Risk

Published By: CEB     Published Date: Dec 09, 2013
This guide is designed to break down the complex challenge of mitigating third-party corruption risk into manageable components. Based on hundreds of member conversations and extensive research, we believe that successful companies conduct third party due diligence in five key phases.
Tags : 
corruption risk, managing risk, compliance, risk, anticorruption, third-party corruption
    
CEB

5 Steps to Secure Internet SSO

Published By: Ping Identity     Published Date: May 05, 2009
This white paper, intended for a management-level audience, describes why and how any organization can implement secure Internet single sign-on with a federated identity management system. Learn more today!
Tags : 
pingidentity, sso, secure internet, single sign-on, federated identity management system, software as a service, saas, business process outsourcing
    
Ping Identity

5 Steps to Strategic Spend Management

Published By: SAP Concur     Published Date: Aug 07, 2019
"Spend Management is the planning, process, and system of managing business dollars to positively affect the production of products and services. Spend management usualy includes processes relating to procurement, supply chain management, and outsourcing. Optimal spend management relies on the ability to understand and control company spend through automation tools and analytics. Steps to Strategic Spend Management All CFOs are concerned with how their company is spending its money. However, this is of particular concern for CFOs of small to mid-size businesses who need to manage their cash flow effectively to survive. To survive and maintain a competitive advantage, companies need to be strategic in their spend management and identify ways to invest wisely to meet current demands and fuel growth for the future. Expense and invoice management can no longer be viewed as simply a cost center. Download this white paper to explore five initiatives that can help guide your company towa
Tags : 
    
SAP Concur

5 Strategies for Building and Feeding a Marketing Machine

Published By: Eloqua     Published Date: Sep 28, 2011
This white paper examines 5 key areas of integrated sales and marketing funnel economics, and provides examples of how marketing departments drive qualified sales opportunities and revenue that will affect how their organizations grow revenue.
Tags : 
sales funnel, targeted marketing, marketing white paper, revenue creation, lead management, revenue engine, funnel economics, lead conversion
    
Eloqua

5 Strategies for Building and Feeding a Marketing Machine

Published By: Eloqua     Published Date: Jan 13, 2012
This white paper examines 5 key elements of developing an integrated sales and marketing funnel, and provides examples of how marketing departments can drive qualified sales opportunities and revenue.
Tags : 
sales funnel, targeted marketing, marketing white paper, revenue creation, lead management, revenue engine, funnel economics, lead conversion
    
Eloqua

5 Strategies for Transforming On-premises Infrastructure

Published By: Hewlett Packard Enterprise     Published Date: Aug 15, 2016
This paper provides a checklist for IT leaders who are looking to build a strategy for the future of IT services and are considering their on-premises/off-premises options.
Tags : 
    
Hewlett Packard Enterprise

5 Tenants of Modern Marketing: Marketing Technology

Published By: Oracle     Published Date: Jan 21, 2014
Organizations across all sizes and industries are leveraging tools to simplify business. Traditionally, marketing technology has been very task specific, designed to operate within a single functional silo such as email campaign management or lead scoring. But marketers know the value and significance of aligning marketing automation, sales force automation (SFA), and customer relationship management (CRM) platforms in the cloud — a task that can be easily accomplished through the implementation of Marketing Technologies.
Tags : 
marketing technology, modern marketing, tenants, customer journey, segmentation, lead generation, eloqua, oracle
    
Oracle

5 Tenants of Modern Marketing: Marketing Technology (FR)

Published By: Oracle     Published Date: Jan 22, 2014
Organizations across all sizes and industries are leveraging tools to simplify business. Traditionally, marketing technology has been very task specific, designed to operate within a single functional silo such as email campaign management or lead scoring. But marketers know the value and significance of aligning marketing automation, sales force automation (SFA), and customer relationship management (CRM) platforms in the cloud — a task that can be easily accomplished through the implementation of Marketing Technologies.
Tags : 
marketing technology, modern marketing, tenants, customer journey, segmentation, lead generation, eloqua, oracle
    
Oracle

5 Things You Didn't Know About Windows Migrations - Plan now before 8th April

Published By: Centrix Software     Published Date: Mar 19, 2014
This paper highlights 5 things you may not know about Windows migrations, helping you to identify ways in which to avoid major obstacles.
Tags : 
windows migrations, desktop operating, systems, migration, project management, software compliance, service management, desktop management
    
Centrix Software

5 Tips for Choosing a Next-Generation Endpoint Security Solution

Published By: Cisco     Published Date: Dec 19, 2016
Prevention is your first line of defense. Make sure your Next-Gen Endpoint Security includes: Global Threat Intelligence – a team of threat hunters detecting the newest threats and uncovering zero-days to keep you protected 24/7 Signature-based AV Detection – let your Next-Gen Endpoint Security solution do all the AV heavy lifting and consolidate protection onto one agent Built-in Sandboxing – get static and dynamic analysis of suspicious threats, without having to deploy a third-party sandbox Proactive Protection – identify and patch vulnerabilities, and analyze and stop suspicious low-prevalence executables before they become real problems
Tags : 
    
Cisco

5 Tips to Keep On Site Workers Productive

Published By: Dell APAC     Published Date: Mar 01, 2019
From the desk to the meeting or somewhere in between, they always get the job done and exceed expectations every time. They excel with powerful technology to keep them on task, so that’s exactly what we give them. Here are more tips on how to keep them in the zone.
Tags : 
    
Dell APAC

5 tips to write an awesome job description

Published By: Cornerstone OnDemand     Published Date: Aug 08, 2018
xxx
Tags : 
    
Cornerstone OnDemand

5 Trend Tecnologici Che Ridefiniscono la Customer Experience

Published By: Genesys     Published Date: Feb 12, 2019
Abbiamo chiesto a una serie di analisti e figure di riferimento del settore di indicarci quali saranno secondo loro le tendenze chiave relative all’engagement del cliente a partire dal 2017. Da tecnologie all’avanguardia come l’IoT e i Bot fino a nuove interpretazioni di idee del passato, i temi caldi indicati hanno fatto emergere cinque trend fondamentali destinati a ridefinire il futuro della Customer Experience. In questo ebook, scoprirai: I cinque trend che avranno il maggiore impatto sulla Customer Experience Come usare il machine learning per identificare tendenze e modelli utili a offrire un’eccezionale Customer Experience di nuova generazione Come avere un contact center all’avanguardia e adattarlo alle esigenze in rapida evoluzione dei clienti
Tags : 
    
Genesys

5 Trends That Will Impact Your IT Planning in 2012

Published By: Dell     Published Date: Jul 30, 2012
This Executive Brief is one of five installments in this series that will examine trends you need to include in your IT planning in 2012.
Tags : 
disaster recovery, integrated management, service mangement, cloud computing, deskto virtualization, multivendor solutions, virtual appliances, virtualization
    
Dell

5 Trends That Will Impact Your IT Planning in 2012

Published By: Dell     Published Date: Mar 02, 2012
By now the fundamentals of computer and network security are familiar to almost everyone who interacts with a PC on a regular basis: install antivirus software, choose good passwords and protect them and download and install software updates. Despite these measures, businesses of all sizes continue to suffer security breaches.
Tags : 
dell, mobile data, mobile devices, smartphones, it planning, technology, it management, small business
    
Dell

5 Unexpected Considerations for IT Executives When Selecting a Cloud-Based ITSM Solution

Published By: Samanage     Published Date: Apr 24, 2014
As you evaluate Service Desk and Asset Management solutions in the marketplace, you likely have a set of requirements for features and functionality. But have you considered other key factors that will set you up for success with a cloud-based ITSM solution that might not be so obvious? Not evaluating solutions based on these considerations can delay implementation, driving up costs and causing undue stress for the IT professional. Don’t let them stop you in your tracks; instead, consider these criteria when making your solution decision and to gain greater organizational acceptance.
Tags : 
samanage, service desk, asset management, itsm, it service management, itsm, itsm solutions, itsm tools
    
Samanage

5 ways Citrix Workspace puts user experience first

Published By: Citrix Systems     Published Date: Nov 13, 2018
Nowadays, employees expect intuitive tools that are not only easy to use but also enable them to work when, where, and how they need without constraint. Get this e-book to learn five ways Citrix Workspace prioritizes user experience and security by providing: -Easy access to all apps, desktops, and files -Reliable, high-quality 3-D graphics, videoconferencing and virtual apps from any location -File sharing across devices -Mobile productivity apps
Tags : 
    
Citrix Systems

5 Ways Dropbox for Business Keeps Your Data Protected

Published By: Dropbox for Business     Published Date: Jun 09, 2014
Protecting your data isn’t a feature on a checklist, something to be tacked on as an afterthought. Security is at the heart of Dropbox for Business, informing not only how we approach new features and enhancements, but also how we’ve designed the product itself. Download here to find out how we’ve built Dropbox for Business to keep data safe for all our users.
Tags : 
dropbox, business, data, protect, security, data management, data center
    
Dropbox for Business

5 Ways Learning Managers Can Make a Strategic Contribution

Published By: SuccessFactors     Published Date: Sep 17, 2014
This paper provides best practices in order to help learning managers to make a strategic contribution.
Tags : 
how to make a strategic contribution, contributing as a learning manager, talent management top tips, growing talent, workforce management software, employee monitoring software, employee performance management
    
SuccessFactors
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.