manual process

Results 51 - 75 of 188Sort Results By: Published Date | Title | Company Name

Automating Fax, Email & EDI Orders into SAP Systems

Published By: Esker     Published Date: Feb 03, 2017
In a perfect world, every sales order your company receives would go straight into your SAP system. But in reality, orders sent by fax and email end up as paper that gets pushed around the office. And those are the ones that cost the most to process. Learn about a solution to: Automate fax, email, EDI, and other orders into SAP applications Eliminate the cost and errors of manual order processing Consolidate resources to simplify your IT landscape You’ll also find out how the technology works and what it has done for other businesses.
Tags : 
sales, solutions, best practices, business process, business management, business intelligence
    
Esker

Interstate Batteries: Charging Up the Road to Mount Awesomeness

Published By: Workday     Published Date: Mar 02, 2018
: In a mixed media experience, we share a story about how Interstate Batteries moved away from manual processes and transformed HR with Workday
Tags : 
interstate batteries, transform hr
    
Workday

Lights, Camera, ACTIONABLE

Published By: MarkLogic     Published Date: May 16, 2017
Getting data from today’s television and film production and post-production workflows may seem like you’re moving through molasses. Mired in manual processes, attempting to manage and automate data during the creation stage of your content’s lifecycle can sometimes feel like a losing battle as the demands of creatives constantly move forward. Hear Lulu Zezza, Physical Production Executive for New Regency Productions, Matt Turner, Media & Entertainment CTO, MarkLogic, and Guy Finley, Executive Director, Media & Entertainment Strategic Alliance (MESA) as they discuss: o Metadata’s value and its evolution, beyond delivery and experiences, to harnessing critical production data o Results of taking a new approach to bring this data together with context and meaning that impacts other business unit roles o How the New Regency team created a software driven production data hub that is enabling creatives to work seamlessly on the project, in a comfortable UI/UX driven environment, with e
Tags : 
    
MarkLogic

Intralinks VIA™ for Managing Regulatory Examinations

Published By: Intralinks     Published Date: Apr 13, 2015
In the wake of the 2008 financial crisis regulatory exams have become increasingly demanding for governance, risk, and compliance professionals. New rules brought about by the Dodd-Frank Act will continue to shape future examinations including safety and soundness, compliance, market conduct, and risk-based targeted exams. We can expect these changes will require examiners to spend more time onsite, request more documents, and extend the scope and/or depth of their examinations. This means it is more important than ever to avoid the classic mistake of sharing examination documents through ad-hoc, manual processes and delivering highly sensitive data through unsecured channels like mail, e-mail, thumb drives, and FTP. In response to these increasing burdens financial institutions are looking to take control with a more structured, collaborative process for collecting, refining, and submitting regulatory information. Download this white paper to learn more about Intralinks VIA.
Tags : 
    
Intralinks

The Foundation for Cloud-first, Mobile-first IT

Published By: Okta     Published Date: Jul 19, 2016
Within 6 months of starting to use Okta, customers on average will connect more than 10 applications for single sign-on. Once single-sign-on is tackled, cloud-first IT organizations can start to tackle the next set of problems. These next challenges are all about how you manage identities across all connected systems, how to determine who has access to what, and how you maintain control over user access. Some of the largest organizations in the world spend millions of dollars building out complex workflow systems to manage these processes. Even then, they depend heavily on manual work to actually get the job done. With Okta, there is a better way to do this, and it’s accessible to organizations of all sizes. Okta Provisioning gives you a foundation for cloud-first IT that brings sanity to your IT processes and enables you to encourage business groups to keep adopting more applications and users to bring the devices of their choice to work. App management, mobility management, and authe
Tags : 
best practices, business optimization, business management, productivity, cloud services, mobile, identity, idaas
    
Okta

Top 5 Reasons to Automate Identity Lifecycle

Published By: Okta     Published Date: Jul 19, 2016
Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace. This paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration and build a solid foundation for future cloud-first, mobile-first IT.
Tags : 
best practices, business optimization, business management, productivity, cloud services, mobile, identity, idaas
    
Okta

Higher Education Mac Labs Reimagined

Published By: Jamf     Published Date: Mar 29, 2018
With Mac labs being a major presence on university campuses, many IT admins rely on imaging to ensure computers do not fall prey to viruses and costly data breaches, and to provide students with the education resources they need to be successful. The problem is imaging machines is a tedious and manual process, requiring lots of IT time. In this white paper, we examine a better way to manage a Mac lab and explain how to: • Leverage Apple’s Device Enrollment Program (DEP) to automatically configure and enroll Mac devices into management • Make apps and resources readily available for students to use, regardless which computer they choose • Ensure students only have access to the resources relevant to them by binding machines to your school’s directory services system
Tags : 
    
Jamf

The Buried Costs and Hidden Risks of Manual Reconciliation. What's at Stake?

Published By: Fiserv     Published Date: Nov 06, 2017
Don’t Let Non-Compliance Fines Impact your Bottom Line and Reputation. Manual reconciliation of vast amounts of data is an arduous process, involving countless staff hours that includes backtracking, often ending without an audit trail to demonstrate how the balance sheet was derived. Automated processes offer a solution to this risk-laden adventure. In the white paper, The Buried Costs and Hidden Risks of Manual Reconciliation for Insurers, learn how to calculate and compare the costs of a manual system versus an automated system.
Tags : 
manual reconciliation, automated reconciliation for insurers, automated reconciliation, automated insurance reconciliation, automated reconciliation system, non-compliance, data reconciliation
    
Fiserv

How Automation Can Simplify Mortgage Loan Boarding

Published By: Fiserv     Published Date: Nov 07, 2017
Learn how loan onboarding can become more efficient and accurate by eliminating manual data validation with automation technology that is poised to transform mortgage servicing. From end-to-end, tools can simplify workflow processes, driving time and cost efficiencies. Trained staff can be deployed to greater effect and can be crucial to eliminating servicing errors. In the process, servicers improve data quality, save time and money, and deliver a better borrower experience.
Tags : 
loan quality, loan data quality, mortgage quality, mortgage data quality, loan compliance, lending compliance, mortgage compliance, lending efficiency
    
Fiserv

Ebook: 8 Biggest Mistakes IT Practitioners Make and How to Avoid Them

Published By: Splunk     Published Date: Nov 29, 2018
IT organizations struggle with numerous challenges — hybrid environments, lack of visibility during cloud migration, multiple infrastructure monitoring tools, and reliance on manual processes. Yet according to a 2018 global survey, less than half of IT practitioners are confident they can ensure performance and system availability with their current toolset. As a Splunk customer, you understand the power of running your monitoring and logging environment in a machine data platform. Are you utilizing your machine data platform to effectively run APM, infrastructure monitoring and Network performance monitoring and diagnostics? This guide outlines the 8 biggest mistakes IT practitioners make and provides solutions, key takeaways and real-world examples to help you improve IT monitoring and troubleshooting in your organization. Download your copy to learn how to: Achieve end-to-end-visibility throughout cloud migration Find trends and root cause faster with automated investigations
Tags : 
application performance monitoring, network tools, network monitoring tools, network monitoring software, network monitoring, it monitoring
    
Splunk

Improve Overall Security With Integrated Endpoint And Network Security

Published By: Cisco DWA Security     Published Date: Sep 14, 2018
Complete enterprise security requires coordination. Firms must integrate the technologies and data that come from the endpoint and network layers to make accurate decisions that ensure optimal threat detection, containment, and remediation. Unfortunately, too many firms rely on a huge variety of solutions that require manual integration and correlation, leading to wasted time and poor threat detection. Security leaders must automate these processes to eliminate detection lag and improve prevention efforts.
Tags : 
    
Cisco DWA Security

Reducing Cost, Risk, and Errors with IT Process Automation

Published By: CA WA     Published Date: Aug 15, 2008
Despite increasingly complex data center environments, IT is expected to provide business owners with faster service, higher reliability, and greater agility than ever before – all within a tight budget. It is impossible to meet these goals with manual IT processes. However, EMA research shows that IT Process Automation (ITPA) helps achieve these goals, delivering annual savings of $500,000 on staff costs alone, and 64 hours of additional uptime per year – plus improved resource utilization, security and compliance, problem response times, and agility.
Tags : 
workload automation, ca wa, computer associates, automation, bpm, bpa, it management, business process automation
    
CA WA

Orchestration For Modern IT: Helping IT Accelerate Business

Published By: ServiceNow     Published Date: Mar 24, 2015
In its most basic form, a runbook is an electronic or physical document that lists detailed procedures for handling every expected situation that an IT system may experience. Based on changes in system condition, incoming requests and other factors, system administrators determine which procedures to run and when to run them. Runbook procedures often include complex decision trees that indicate specific steps to follow depending on answers to pre-established questions. Administrators are responsible for performing the appropriate steps of the procedure in painstaking detail, often by manually issuing commands to components and sub-systems. Primitive runbooks are notoriously inefficient, inflexible and error prone, sometimes relying on undocumented steps known to just a few staff members. Yet, if a critical step is missed or an incorrect command is entered, the entire process may be negatively impacted.
Tags : 
runbook, it system, system administrator, sub-systems, accelerate business, it management, enterprise applications
    
ServiceNow

FICO® Optimization Solutions for Manufacturers (Executive Brief)

Published By: FICO     Published Date: Nov 30, 2016
Historically, manufacturers have “looked to the past” to help predict what they need to do in the future. This would include basic business intelligence, powered by spreadsheets, and even manual processes. The challenge is that what will happen may be something outside of what the past can predicts – who, 25 years ago, would have considered the Internet as a primary vehicle for commerce, or that Big Data would become both a treasure and a tragedy for organizations? Consider other factors, such as regulations, largely transient customers (where loyalty and brand aren’t what they used to be), disruptors (such as new entrants and technologies), and the need for manufacturers to “move faster than ever” – in effect, to be able to plan for the future before it happens.
Tags : 
manufacturing optimizations, enterprise software, infrastructure, networking, it management, knowledge management, enterprise applications, data management
    
FICO

The Foundation for Cloud-first, Mobile-first IT

Published By: Okta     Published Date: Jul 25, 2016
Within 6 months of starting to use Okta, customers on average will connect more than 10 applications for single sign-on. Once single-sign-on is tackled, cloud-first IT organizations can start to tackle the next set of problems. These next challenges are all about how you manage identities across all connected systems, how to determine who has access to what, and how you maintain control over user access. Some of the largest organizations in the world spend millions of dollars building out complex workflow systems to manage these processes. Even then, they depend heavily on manual work to actually get the job done. With Okta, there is a better way to do this, and it’s accessible to organizations of all sizes. Okta Provisioning gives you a foundation for cloud-first IT that brings sanity to your IT processes and enables you to encourage business groups to keep adopting more applications and users to bring the devices of their choice to work. App management, mobility management, and authe
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta

Top 5 Reasons to Automate Identity Lifecycle

Published By: Okta     Published Date: Jul 27, 2016
Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace. This paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration and build a solid foundation for future cloud-first, mobile-first IT.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta

How Intelligent Restaurant Inventory Technology Helps Managers Win

Published By: HotSchedules     Published Date: Apr 25, 2018
Successful restaurants know just how important a solid inventory management process is to delivering a great product and experience. Even so, many restaurants today still struggle with ordering the right amount of inventory. Statistics show that restaurants waste about 10% of their food product, that’s money literally thrown in the trash! There’s only so much time in a manager’s day to manually deal with all of it. This ebook will explore the exciting new frontier of intelligent restaurant operating platforms, and how modern inventory management systems can make the process easier and more successful for your managers.
Tags : 
    
HotSchedules

The Buried Costs and Hidden Risks of Manual Reconciliation for Financial Institutions

Published By: Fiserv     Published Date: Mar 02, 2018
Don’t Let Non-Compliance Fines Impact your Bottom Line and Reputation. Manual reconciliation of vast amounts of data is an arduous process, involving countless staff hours that includes backtracking, often ending without an audit trail to demonstrate how the balance sheet was derived. Automated processes offer a solution to this risk-laden adventure. In the white paper, The Buried Costs and Hidden Risks of Manual Reconciliation for Financial Institutions, learn how to calculate and compare the costs of a manual system versus an automated system. Tags: manual reconciliation, automated reconciliation for banks, automated reconciliation for credit unions, automated reconciliation, automated reconciliation for financial institutions, automated reconciliation system, non-compliance, data reconciliation
Tags : 
manual reconciliation, automated reconciliation for banks, automated reconciliation, automated reconciliation system, non-compliance, data reconciliation
    
Fiserv

How a Top 10 Insurer Reconciles for a Faster Financial Close

Published By: Fiserv     Published Date: Mar 02, 2018
Does your company still rely on a time-consuming and error-prone manual approach to reconciliation? Does it consolidate multiple data sources from disparate systems to close the books? Find out how one of the top 10 multi-line insurers automated the reconciliation process for over 3,000 accounts, resulting in fewer errors and quicker close times. Plus, the insurer now has visibility into all reconciliation items rather than reviewing 300 different Excel reconciliation documents!
Tags : 
manual reconciliation, automated reconciliation for insurers, automated reconciliation, automated insurance reconciliation, automated reconciliation system, non-compliance, data reconciliation
    
Fiserv

The Impact of Robotic Process Automation on the Financial Close

Published By: Trintech EMEA ABM Pilot     Published Date: Nov 03, 2017
In terms of reconciliations, we tend to spend most of our time simply gathering data before we can even begin to think about reconciling it. Once the data is finally in the right format, the majority of our time is then spent manually going through the matching process, rather than spending that time focused on the areas that are most critical to us, as can be seen in the diagram on the right.
Tags : 
account reconciliation, accounting automation, finance shared services, finance transformation program, finance transformation strategy, financial close, financial close process, reconciliation software
    
Trintech EMEA ABM Pilot

A guide to optimizing digital marketing performance through better data.

Published By: Claravine     Published Date: Jan 03, 2019
Marketers have long struggled with the simple task of knowing which marketing spend is truly effective, and how to optimize that spend. At the heart of the issue lies the challenge of ensuring the data quality and consistency exists to make decisions based on real intelligence. Why is this a problem? First, effective tracking is reliant on the consistent, complete application of campaign tracking codes and associated metadata, which has traditionally been a manual, ungoverned process. Adding to this complexity has been the dramatic expansion of digital marketing point solutions, and the disparate teams expected to execute across each of these channels and geographies. The result is what you would expect—highly inaccurate, incomplete, and inconsistent data that must be manually cleaned before reporting is possible. Fortunately a solution exists. Progressive marketing leaders are implementing Digital Experience Data Management (DXDM), ensuring the rich, consistent insights critical to ma
Tags : 
    
Claravine

ESG Webinar Moving Beyond EDR to XDR

Published By: Trend Micro     Published Date: Aug 13, 2019
While threat prevention continues to improve with the use of advanced techniques, adversaries are outpacing these advances requiring security teams to implement threat detection and response programs. Security teams are often addressing the process haphazardly, using disconnected point tools and manual processes that consume too many analysts and result in slow mean-time to detection and response. While EDR has enabled security teams to take important steps forward for detection and response, ultimately it can only look at the endpoints which limits the scope of threats that can be detected and if something is detected, limits the view of who and what is affected and thus, how best to respond. ESG therefore recommends looking beyond the endpoint and utilizing natively integrated security solutions across more than just one vector to improve detection and response times. The more data you can knit together, the more effective you can be to uncover the security incidents most dangerous to your organization. Watch this webinar to learn about the value of XDR: connecting detection and response across multiple security layers. Dave Gruber, senior analyst at ESG, shares recent research and his views on the evolution of threat detection and response; making the case for expanding the capabilities and expectations of detection and response solutions. Wendy Moore, VP of Product Marketing, discusses Trend Micro’s own XDR strategy and the unique value that Trend Micro can bring to detection, investigation and response.
Tags : 
    
Trend Micro

Learn How You Can Fuel Innovation and Streamline Security

Published By: Cybric     Published Date: Oct 30, 2017
Learn how a security rationalization process helps CISOs optimize your security infrastructure while improving the bottom line. Development velocity is accelerating as enterprises adopt DevOps methodologies, yet security is still not integrated into the coding and deployment processes. Security teams are falling further behind as their manual processes and controls can’t scale at the same rate as development. This paper discusses: The impact the current approach to application security has on business How shifting security left in the application development process, seamlessly integrating it “early and often,” can accelerate innovation Questions the Board and C-suite are now asking about security: are you prepared? Read this paper to learn how, by shifting security left in the development process, it’s now no longer an obstacle to velocity, innovation and competitiveness. Instead, it’s an asset.
Tags : 
application security, (security) automation, (security) orchestration, security visibility, devsecops, devops, security assurance, security resilience
    
Cybric

BMC Service Automation Demo

Published By: BMC ESM     Published Date: Aug 20, 2009
BMC Service Automation automates repetitive, manual tasks (such as provisioning, patching and compliance) to reduce the margin for error, allowing IT to get things done more quickly, and across organizational silos.  Software Consultant Ron Coleman provides a demonstration and discusses the key points of Service Automation from BMC Software.
Tags : 
bmc, automation, service automation, silos, software, margin for error, error reduction, patching
    
BMC ESM

Automate configuration changes and save your data center millions

Published By: BMC ESM     Published Date: Nov 09, 2009
In this article, customers, analysts and IT experts share strategies to help automate your manual processes and ensure that changes are applied according to configurations - every time. Download the ebook.
Tags : 
bmc esm, service automation, utility computing, business service management, itil, roi, server compliance, business management
    
BMC ESM
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.