key elements

Results 26 - 50 of 59Sort Results By: Published Date | Title | Company Name

Ask The Analyst: Key Elements of an Effective Security Program

Published By: AlienVault     Published Date: Oct 05, 2016
Join us for an engaging 30-minute discussion where AlienVault CEO Barmak Meftah will interview guest speaker Forrester Security Analyst Joseph Blankenship on how organizations should assess their security program, validate the effectiveness of security monitoring tools, and plan for the future. This session will also provide a unique opportunity to ask the analyst your questions.
Tags : 
    
AlienVault

The Role of the User Experience in Video Conferencing

Published By: Polycom     Published Date: Jul 30, 2014
While video conferencing can offer significant, measurable benefits to companies and their employees, all video conferencing solutions are not alike. To ensure successful deployment and implementation--and to maximize (ROI)--managers must choose their video conferencing tools wisely, matching the right technology to the right use cases. This is critical to ensure that employees actually benefit from the technology, and to keep management costs and headaches as low as possible. This paper will highlight the key elements companies should look for in a video conferencing system, and offer best-practices recommendations for identifying and working with a video solutions provider.
Tags : 
user experience, video conferencing, solution, roi, technology, business technology
    
Polycom

Deliver a Better Service Management User Experience

Published By: BMC Software     Published Date: Jul 22, 2015
This white paper explores the three key elements for modernizing service management through engaging user experiences.
Tags : 
service management, user experience, it efficiency, productivity
    
BMC Software

Vulnerability Intelligence: Incorporating the Most Critical Component of a Full Compliance Solution

Published By: Flexera     Published Date: Sep 08, 2016
This white paper will discuss the key elements of Software Vulnerability Management and how a properly deployed solution based on Vulnerability Intelligence will help organizations to maintain compliance and further secure their IT systems from breaches, attacks and data loss
Tags : 
    
Flexera

Five Tips for Improving Operational Performance in Today's Supply Chain

Published By: Kronos     Published Date: Sep 24, 2018
This is the second in a series of three white papers that discuss proven strategies and best practices for optimizing three key elements of success — People, Process, and Technology — to address critical challenges and drive competitive advantage in today’s logistics industry. Keep reading to gain valuable insights into the “Process” trends and issues that are top of mind for managers across the logistics sector.
Tags : 
    
Kronos

Trade Surveillance and Machine Learning

Published By: TIBCO Software     Published Date: Mar 04, 2019
In this podcast, Mark Hudson, event processing specialist in the office of the chief technology officer at TIBCO Software, discusses current financial industry challenges and the smartest ways of dealing with them. He explores the key elements missing from most of today’s solutions, and analyzes the business costs of regulation. Mark also explains how trade surveillance compares to market risk and payment surveillance and shares TIBCO’s uniquely effective approach to the industry. Podcast produced and edited by EM360.
Tags : 
trade surveillance, machine learning, fraud management
    
TIBCO Software

5 Strategies for Building and Feeding a Marketing Machine

Published By: Eloqua     Published Date: Jan 13, 2012
This white paper examines 5 key elements of developing an integrated sales and marketing funnel, and provides examples of how marketing departments can drive qualified sales opportunities and revenue.
Tags : 
sales funnel, targeted marketing, marketing white paper, revenue creation, lead management, revenue engine, funnel economics, lead conversion
    
Eloqua

Briefing: IT operating models in the age of the connected enterprise

Published By: KPMG     Published Date: Jun 06, 2019
As organisations transform to become customer-centric, connected enterprises, the IT operating model needs to transform too. Find out the advantage of a market-speed model. Read this briefing to discover: • what the key elements of a market-speed organisation are • how to design a new market-speed IT operating model • six priority actions to prepare the IT function for the shift.
Tags : 
    
KPMG

Key Points When Considering a Videoconferencing Platform/Manufacturer

Published By: LifeSize, a division of Logitech     Published Date: Jan 12, 2011
There are key points to consider when looking for a videoconferencing system. As independent Telecommunications and IT consultants, part of what we do is to evaluate various products and systems regularly for mid-to-large enterprise clients, from 500 to over 30,000 employees. At a high level evaluation elements include costs, technology and features, and service.
Tags : 
lifesize, roi, telecommunication, best user experience, ip networks, ip telephony, call center management, call center software
    
LifeSize, a division of Logitech

BYOD Policy: It’s Protection, Not Paperwork

Published By: Enterprise Mobile     Published Date: Sep 30, 2013
Creating a BYOD policy helps to minimize frustration and risk as you take advantage of cost savings. With a BYOD policy in place, you’ll be able to confidently move forward with your own BYOD program, staying at the forefront of mobility trends and fostering improved productivity and user satisfaction. Using a short template can help you identify the key elements that your policy should include. The more policy elements you’re able to cover in the template and the more elements you add on your own, the easier it will be to create the final, formal BYOD policy.
Tags : 
mobility-as-a service, managed mobility services, byod, bring-your-own-device, enterprise mobile, mobility, enterprise mobility, mobile strategy
    
Enterprise Mobile

Modern Data Warehousing on AWS

Published By: AWS     Published Date: Aug 20, 2018
A modern data warehouse is designed to support rapid data growth and interactive analytics over a variety of relational, non-relational, and streaming data types leveraging a single, easy-to-use interface. It provides a common architectural platform for leveraging new big data technologies to existing data warehouse methods, thereby enabling organizations to derive deeper business insights. Key elements of a modern data warehouse: • Data ingestion: take advantage of relational, non-relational, and streaming data sources • Federated querying: ability to run a query across heterogeneous sources of data • Data consumption: support numerous types of analysis - ad-hoc exploration, predefined reporting/dashboards, predictive and advanced analytics
Tags : 
    
AWS

Six Steps to SSL Certificate Management

Published By: Entrust Datacard     Published Date: Jan 16, 2015
Upon issuance, all SSL digital certificates have a finite lifespan and are no longer recognized as valid upon expiration. Certificates may have varying periods of validity and are often set to expire anywhere between one and five years based on company policy and/or cost considerations. This guide — intended for IT and security professionals — outlines the key elements of a certificate lifecycle management process and how to provide adequate tools and training to implement this process.
Tags : 
entrust, ssl, certificates, security, professionals, management, lifecycle, certificate
    
Entrust Datacard

eBook: Modern Data Warehousing on AWS

Published By: AWS     Published Date: Jun 20, 2018
Data and analytics have become an indispensable part of gaining and keeping a competitive edge. But many legacy data warehouses introduce a new challenge for organizations trying to manage large data sets: only a fraction of their data is ever made available for analysis. We call this the “dark data” problem: companies know there is value in the data they collected, but their existing data warehouse is too complex, too slow, and just too expensive to use. A modern data warehouse is designed to support rapid data growth and interactive analytics over a variety of relational, non-relational, and streaming data types leveraging a single, easy-to-use interface. It provides a common architectural platform for leveraging new big data technologies to existing data warehouse methods, thereby enabling organizations to derive deeper business insights. Key elements of a modern data warehouse: • Data ingestion: take advantage of relational, non-relational, and streaming data sources • Federated q
Tags : 
    
AWS

Delivering Under Pressure

Published By: Shell     Published Date: Aug 15, 2018
Shell Lubricants believes companies can achieve significant cost savings by upgrading their lubrication processes. Taking better care of equipment can contribute to savings from lower maintenance costs, reduced unplanned downtime and improvements in productivity. These potential savings go far beyond what can be achieved by selecting lubricants on the basis of lowest price per litre. There are two key elements to seizing this opportunity. The first is selecting the right lubricant; the second is effective lubrication management.
Tags : 
productivity, savings, lubricants, shell, maintenance, construction, equipment protection, hydraulic system
    
Shell

How We Build Now - Tackling Technology In Construction 2019

Published By: Procore     Published Date: Jun 25, 2019
Download Your Copy: How We Build Now - Tracking Technology in Construction 2019 The Australian construction industry is undergoing a technical transformation and we’ve taken a snapshot of this dynamic and interesting space - examining how construction companies are adopting technologies and implementing new tech-enabled processes. Our inaugural report How We Build Now - Tracking Technology in Construction 2019 examines and tracks key elements in this fast-paced, tech-driven transition. It covers 4 main areas: Taking the Pulse: People and skills development Pick and Mixing: Technology adoption and future proofing Forging Ahead: Processes and implementation The Spirit Level: Business outlooks across industry sectors The new findings provide insight and ideas about technology adoption and how new technologies are influencing modern construction company processes.
Tags : 
    
Procore

The 3 Key Elements to Employee Engagement

Published By: Achievers     Published Date: Nov 08, 2013
Employee engagement is a team effort, but it requires a commitment from all three areas to be effective. Download your copy of our report and take the first step to real engagement in your company!
Tags : 
employee engagement, performance management, productivity, management
    
Achievers

Passive Optical LAN Explained

Published By: Nokia     Published Date: Aug 04, 2016
This paper outlines the key elements of an enterprise POL and explains why it is the best enterprise network option for tomorrow’s digital enterprise.
Tags : 
passive optical lan, enterprise networks, digital enterprise, traffic volume, enterprise lan
    
Nokia

Stratus Avance: An IT Administrator's View

Published By: Stratus Technologies     Published Date: Mar 10, 2009
Haitham Al-Beik, Product Development Engineer, highlights the key product attributes of Avance that deliver ease of use and other elements designed to improve an IT Administrator's world.
Tags : 
stratus, it administration, development engineer, mission critical, web services, disaster recovery, critical data, server unreachable
    
Stratus Technologies

How to show ROI in social media

Published By: Adobe     Published Date: Jun 08, 2015
See how companies like Adobe are using social media to drive huge results. Then discover “the key elements of good social ROI” for B2B—and how you can apply them to your business—in this free whitepaper.
Tags : 
social, roi, adobe, b2b, marketing, marketer, impact, measurement
    
Adobe

Endpoint Protection Buyers Guide

Published By: CrowdStrike     Published Date: Feb 14, 2019
How to navigate a crowded vendor landscape and find the best endpoint protection solution According to the 2018 SANS Endpoint Security Survey, more than 80 percent of known breaches involve an endpoint. That’s why finding the most effective endpoint protection has never been more important. Unfortunately, with hundreds of options on the market, all claiming the same “next-gen” features, choosing the best endpoint security for your organization can be challenging. Read the Endpoint Protection Buyers Guide to learn: • Why you should ensure that the solution you choose includes these five key elements: prevention (NGAV), detection (EDR), managed threat hunting (MDR), threat intelligence, and IT hygiene and vulnerability assessment • Details on the role each of these elements plays in ensuring your organization’s security • The evaluation criteria you should apply and questions to ask to ensure a solution is truly effective • How the cloud-native CrowdStrike Falcon® next-gen endpoint prote
Tags : 
    
CrowdStrike

On-Page Search Engine Optimization: Template & Tips

Published By: MoreVisibility     Published Date: Dec 19, 2017
Although keyword-targeting and on-page search engine optimization are just some areas that search engines evaluate when ranking pages, it is important to get these elements “right.” This complimentary white paper offers tips and a template to help establish a useful foundation for your on-page optimization efforts. Topics include: How to create content for users first, search engines second Body Copy Optimization Checklist Keyword Targeting Best Practices Meta Data Checklist with Downloadable Template Images & Multimedia Content Checklist
Tags : 
    
MoreVisibility

How Best-in-Class Plan, Budget and Forecast in Today's Dynamic World

Published By: SAP     Published Date: Nov 22, 2011
This Aberdeen report demonstrates how highly effective financial planning, budgeting and forecasting enables good decision making, even in periods of major change. Dynamic financial planning enabled through five key elements -- process, organisation, knowledge management, technology and performance enhancement -- can give business leaders the tools to take prompt action and emerge even stronger.
Tags : 
aberdeen, analyst insight, business, budget, forecast, financial planning, business intelligence, business management
    
SAP

CIO's Guide to Mobile Device Management

Published By: Blackberry     Published Date: Jul 03, 2012
For virtually every enterprise today, mobile device management (MDM) is top of mind. And while security is a chief concern, smart organizations are also discovering new opportunities for productivity. Getting the most from the BYOD phenomenon requires strategic thinking. Find out what key elements to consider in your Enterprise Mobility Strategy. And learn how BlackBerry Mobile Fusion can improve mobile security, reduce TCO and improve productivity.
Tags : 
blackberry, cio, mobile, mdm, smartphones, tablet, business technology
    
Blackberry

5 Rules for Choosing an Identity Solution that Lasts

Published By: OKTA     Published Date: Mar 30, 2018
"As a modern organization, you embrace powerful new cloud apps to fuel your organization's growth. You know adopting, using and even building the best technologies will be a big driver for your future success. But did you realize that identity is the lynchpin for the modern cloud ecosystem? It's the new security standard in a world where there is no perimeter anymore. We've talked with technology and security leaders from small to large enterprises and organizations across every industry. You'll want to know the five key elements of an identity solution they said you need to have."
Tags : 
    
OKTA

FAQ: Why Information Lifecycle Governance Is Key to Reducing Costs and Risks in e-Discovery

Published By: IBM     Published Date: Feb 24, 2015
This paper asks the key questions that IT, legal, records, compliance officers and corporate managers should consider when contemplating an information lifecycle governance solution, and why these elements are critical in addressing e-discovery challenges.
Tags : 
ibm, lifecycle governance, e-discovery, e-discovery challenges, ilg solutions, it management, knowledge management, data management
    
IBM
Start   Previous    1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.