hi def

Results 426 - 450 of 1110Sort Results By: Published Date | Title | Company Name

Why Resilience Matters

Published By: MeQuilibrium     Published Date: Jul 25, 2018
In today’s competitive work environment, attracting and retaining top talent is paramount and expensive. Companies recruit high performing employees with deep experience, invest in training, and reward outcomes. Yet while talent and experience are critical, new evidence suggests those attributes may not be enough. It’s not simply how well a person can perform in a typical situation, but how quickly they can return to high performance after an inevitable setback. Resilience is the ability to become strong, healthy or successful again after something bad happens. It includes (learnable) cognitive and emotional skills that reduce the degree and duration of episodes of discouragement, reluctance or defeat that often follow negative events. A resilient worker will quickly put the event in perspective and search for alternative solutions while their less-resilient colleagues experience a letdown or assign blame. This paper describes how resilience, measured by the meQ Score, corresponds to w
Tags : 
    
MeQuilibrium

Manufacturing Intelligence for the Next Industrial Revolution

Published By: TIBCO Software     Published Date: Sep 12, 2018
The Internet of Things (IoT) didn’t just connect everything everywhere; It laid the groundwork for the next industrial revolution. Connected devices sending data was only one achievement of the IoT—but one that helped solve the problem of data spread across countless silos that was not collected because it was too voluminous and/or too expensive to analyze. Now, with advances in cloud computing and analytics, cheaper and more scalable factory solutions are available. This, in combination with the cost and size of sensors continuously being reduced, supplies the other achievement: the possibility for every organization to digitally transform. Using a Smart Factory system, all relevant data is aggregated, analyzed, and acted upon. Sensors, devices, people, and processes are part of a connected ecosystem providing: • Reduced downtime • Minimized surplus and defects • Deep insights • End-to-end real-time visibility
Tags : 
internet of things, connected ecosystem, big data, operations monitoring, process control, analytical techniques
    
TIBCO Software

Real World Success with Digital Customer Experience (DCX)

Published By: Avaya     Published Date: Mar 15, 2019
Organizations around the globe are finding measurable success with their DCX initiatives, which has become a competitive differentiator, redefining loyalty by how well an organization engages, serves, and responds to customers and prospects. A recent global study by Nemertes Research shows that the metrics for DCX are so compelling, as business and IT leaders you must align on strategic goals and objectives you need to meet, and then move swiftly to launch your own DCX initiatives.
Tags : 
    
Avaya

Real World Success with Digital Customer Experience (DCX)

Published By: Avaya     Published Date: Mar 15, 2019
Organizations around the globe are finding measurable success with their DCX initiatives, which has become a competitive differentiator, redefining loyalty by how well an organization engages, serves, and responds to customers and prospects. A recent global study by Nemertes Research shows that the metrics for DCX are so compelling, as business and IT leaders you must align on strategic goals and objectives you need to meet, and then move swiftly to launch your own DCX initiatives.
Tags : 
    
Avaya

How to prepare for your cloud migration

Published By: Apptio     Published Date: Oct 09, 2019
Cloud migration is consistently one of the top priorities of technology leaders across the world today, but many are overwhelmed by trying to plan their cloud migration, struggling to prioritize workloads and unsure of the cost implications. Download this white paper to discover the 5 key steps for cloud migration based on the best practices of today’s most successful IT leaders: - Baseline TCO resources (cloud, on-premises, hybrid) - Map current on-premises resources to cloud offerings - Evaluate and prioritize migration strategy - Calculate migration costs - Define success metrics
Tags : 
    
Apptio

Top 10 North American Bank Eliminates Credential Stuffing

Published By: Shape Security     Published Date: Sep 12, 2019
A Big 5 Canadian bank had been suffering from automated attacks on its web and mobile login applications for months. Bad actors were performing credential stuffing attacks on all possible channels. Not only were the attacks leading to account takeover fraud losses, but the sheer volume of attacks also put significant strain on the bank’s infrastructure. After months of playing cat-and-mouse with the attackers, the bank decided to seek out a sophisticated solution and approached Shape. In this case study, learn how Shape’s Enterprise Defense service and Threat Intelligence team were able to successfully defend against these attacks.
Tags : 
    
Shape Security

Top 3 Telecom Provider Secures Mobile Accounts

Published By: Shape Security     Published Date: Sep 12, 2019
A Top 3 US Telecom Provider needed to secure its mobile accounts from credential stuffing attackers targeting them to commit various fraud schemes, including: Upgrade theft Two-factor authentication bypass Virtual calling When account takeovers became so common that the telecom provider received negative press about the situation, the company knew it needed to find a solution immediately. Download this case study to learn how the company was able to stop credential stuffing with Shape Enterprise Defense.
Tags : 
    
Shape Security

Tips for Maximizing the Return on Your ERP Investment

Published By: Sage     Published Date: Jul 08, 2015
This white paper describes two strategies organizations can employ to maximize the returns from their ERP investments: Use a proven methodology to speed implementation and achieve ROI faster, and define and track metrics to measure progress in meeting business objectives.
Tags : 
enterprise resource planning, erp, investment dollars, erp implementation
    
Sage

10 Things Your Next Firewall Must Do

Published By: Palo Alto Networks     Published Date: Jul 05, 2012
While the next-generation firewall (NGFW) is well defined by Gartner as something new, enterprise-focused, and distinct, many network security vendors are claiming NGFW is a subset of other functions.
Tags : 
    
Palo Alto Networks

Start Planning a Successful Finance Transformation

Published By: Workday     Published Date: Jan 31, 2019
Are you a finance leader looking to get on track with digitisation? With insight from over 650 global finance leaders, this report examines the top priorities for financial transformation and provides a valuable road map for successfully redefining the finance function. Download the report now.
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday

Gartner: Innovative ERP Strategies for Today’s Era of Disruption

Published By: Workday     Published Date: Jun 14, 2019
Upgrading your ERP system can be vital to your organisation's survival in this era of disruption. This Gartner report offers actionable advice for IT leaders looking to keep pace with innovation, such as defining your ERP strategy goals and incorporating AI that can drive business value. Read now.
Tags : 
workday, workforce technology, digital strategy
    
Workday

Gartner: Innovative ERP Strategies for Today’s Era of Disruption

Published By: Workday     Published Date: Jul 05, 2019
"Upgrading your ERP system can be vital to your organisation's survival in this era of disruption. This Gartner report offers actionable advice for IT leaders looking to keep pace with innovation, such as defining your ERP strategy goals and incorporating AI that can drive business value. Read now."
Tags : 
    
Workday

App. Release & Deployment For Dummies

Published By: IBM     Published Date: Jul 08, 2015
This book defines the basics of application release and deployment, and provides best practices for implementation with resources for a deeper dive.
Tags : 
application integration, life cycle, software deployment, automation, itil, software integration, devops approach, infrastructure, application performance management, best practices, marketing automation, product lifecycle management, database development, software testing, productivity
    
IBM

Email Security in a Zero Trust World

Published By: Mimecast     Published Date: Apr 18, 2017
"To tackle today’s cyber threats, IT security leaders must rethink traditional security strategies. Email security in particular has become a victim of its own success and requires a radical rethink, having played a key role in several high-profile security breaches. Today’s threats, like spear-phishing, are designed to bypass traditional Secure Email Gateway defenses, often taking advantage of end users who are considered the weakest link in business email security armor. A zero-trust approach to email security is needed. This white paper discusses how: - CISO’s should carefully assess email security as part of a strategic security review - IT Managers can evaluate the state of current email defenses and take tactical action to strengthen them - Security Administrators can deliver best-practice defense in depth for email - Organizations can remove a reliance on trust to more effectively protect information, their network and employees. "
Tags : 
email security, cyber threats, it security, phishing
    
Mimecast

Resetting Your Email Security Strategy

Published By: Mimecast     Published Date: Apr 18, 2017
"It’s no secret that organizations find themselves the target of increasingly sinister and highly sophisticated phishing, spear-phishing, whaling and ransomware attacks. While risks are clearly mounting, many organizations still aren’t keeping up with the challenge. Download Resetting Your Email Security Strategy to learn: - How employees are your first and last line of defense in attacks and why proper education is key. - How you can fix your processes against modern threats like whaling - The critical role of today’s cyber security technologies - Why your security strategy is doomed to failure without strong leadership"
Tags : 
email security, ransomware, phishing, whaling, security strategy
    
Mimecast

Definitive Guide to Third – Party Risk Management: How to Successfully Mitigate Your Organisation’s

Published By: NAVEX Global     Published Date: Dec 07, 2017
The Definitive Guide to Third-Party Risk Management is a comprehensive resource full of insight, advice and examples to help organisations identify and address their third-party risk. A strong third-party risk management programme will help your organisation make smart choices when it comes to engaging with third party business partners. It will also protect your organisation from the risks that third parties can present. This guide is divided into three main sections: PLAN, IMPLEMENT and MEASURE. In these sections you’ll find the information and tools you need to develop a risk-based strategy, define third-party risk and a standard due diligence process, implement continuous monitoring of third parties and identify areas in which you need to improve your programme’s effectiveness.
Tags : 
risk management, third – party risk, navex, safeguard, risk – based strategy
    
NAVEX Global

Definitive Guide to Compliance Programme Assessment: The Essential Step to Improving Your Compliance

Published By: NAVEX Global     Published Date: Dec 07, 2017
A strong ethics and compliance programme improves organisational culture, protects corporate reputation and enhances employee engagement. When an ethics and compliance programme is lacking, an organisation could be exposed to significant risk. To ensure compliance programmes meet ongoing best practices, assessments and regular reviews are necessary, valuable and expected by numerous internal and external parties, including government agencies. New laws and regulations, new lines of business, new geographies and mergers and acquisitions become part of a growing enterprise your compliance ecosystem must support. This requires those in charge of the system to regularly revisit and assess their risk and priorities to make necessary adjustments that ensure an effective compliance programme. The Definitive Guide to Compliance Programme Assessment is a comprehensive resource full of advice and best practices. It is designed to help organisations evaluate and improve their ethics and complia
Tags : 
ethics and compliance programmes, risk management, compliance ecosystem, industry standards, hotline and incident management system
    
NAVEX Global

Gartner: Innovative ERP Strategies for Today’s Era of Disruption

Published By: Workday     Published Date: Jul 05, 2019
"Upgrading your ERP system can be vital to your organisation's survival in this era of disruption. This Gartner report offers actionable advice for IT leaders looking to keep pace with innovation, such as defining your ERP strategy goals and incorporating AI that can drive business value. Read now."
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday

Learning from Companies That Use VMware vSAN to Address Today's Most Pressing Datacenter Challenges

Published By: VMware     Published Date: Jul 24, 2018
This IDC White Paper offers an overview of the new datacenter infrastructure trends that are being driven by a need to solve traditional datacenter challenges that still exist today. This paper also offers insight into a recent IDC survey of different customers running VMware vSAN, a software-defined, hyperconverged solution. The survey was conducted during the second half of 2017 to understand the real-world value VMware vSAN provides when deployed within production environments. 
Tags : 
    
VMware

Learning from Companies That Use VMware vSAN to Address Today's Most Pressing Datacenter Challenges

Published By: VMware     Published Date: Jul 24, 2018
This IDC White Paper offers an overview of the new datacenter infrastructure trends that are being driven by a need to solve traditional datacenter challenges that still exist today. This paper also offers insight into a recent IDC survey of different customers running VMware vSAN, a software-defined, hyperconverged solution. The survey was conducted during the second half of 2017 to understand the real-world value VMware vSAN provides when deployed within production environments. 
Tags : 
    
VMware

Gartner: Innovative ERP Strategies for Today’s Era of Disruption

Published By: Workday     Published Date: Jul 05, 2019
"Upgrading your ERP system can be vital to your organisation's survival in this era of disruption. This Gartner report offers actionable advice for IT leaders looking to keep pace with innovation, such as defining your ERP strategy goals and incorporating AI that can drive business value. Read now."
Tags : 
workforce-technologie, digitale strategie
    
Workday

Next Generation Secure Web Gateways: The Case and Criteria for Embedded Data Loss Prevention

Published By: Websense     Published Date: Apr 16, 2010
Web 2.0 technology has transformed the Web into a core business communication platform. Unfortunately, it's also become much easier to accidentally or intentionally disclose sensitive data. This white paper outlines the business need for Web data loss prevention (DLP), makes the case for DLP as an embedded capability within secure Web gateways, and defines what customers should look for in a solution.
Tags : 
websense, dlp, data loss prevention, securosis, security, data management, testing, secure gateways, security management, security policies, web service security, database development, data protection
    
Websense

Data Is Your Story: The Language of Data Infrastructure Modernization

Published By: Hitachi Vantara     Published Date: Aug 02, 2018
In this book, we are going to look at the key trends driving the modernization of data infrastructure. We’ll see how organizations are adapting and flourishing in a data-driven world. For some time, headlines have been around the internet of things (IoT), big data and data analytics. While these developments are important, the reality is that you cannot take full advantage of them without modernization. We’re going to look at these trends and priorities in detail, then look at the three key drivers of modernization: governance, mobilization and analytics. We’ll also consider the technologies that make up modern data infrastructure including artificial intelligence (AI), flash storage, converged and hyperconverged platforms and software-defined infrastructures. By making sense of data, we make sense of the world. With more data than ever before, we have the tools to turn all that information into intelligent innovation and change the way the world works.
Tags : 
data infrastructure, big data, internet of things
    
Hitachi Vantara

Transformation story: How to get more value from your technology investment

Published By: KPMG     Published Date: Jun 06, 2019
Many businesses continue to upgrade finance solutions piecemeal. But a bolder investment has the potential to deliver exceptional value. Find out how a global retailer transformed their finance function with a major Oracle ERP Cloud implementation. Read this story to understand: • what benefits you can expect from a full-scale transformation • how to start defining your vision • how to realise benefits sooner • five key principles to guide your transformation.
Tags : 
    
KPMG

Definitive Guide to Third-Party Risk Management

Published By: NAVEX Global     Published Date: Apr 20, 2018
Learn everything you need to know about effectively managing your third party risk-from defining a due diligence process to creating risk-based strategy-in our comprehensive guide. What you'll learn: -How to define your goals and create a strategy -How to manage your third-party risk management programme -How to track and improve your programme's effectiveness
Tags : 
    
NAVEX Global
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.