shared service

Results 51 - 70 of 70Sort Results By: Published Date | Title | Company Name

Environmentally Responsible Retailing: A Systems Approach 

Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
Tyco Retail Solutions, and its parent company Tyco International, consider protection of the environment a top corporate priority. It is a responsibility shared with our suppliers, retail customers, and shoppers—the ultimate beneficiaries of our products and services.
Tags : 
tyco, security, environment, system, retail
    
Tyco Integrated Security

Cloud Security through Trend Micro Deep Security

Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
Security in the cloud is a shared responsibility. That means customers and cloud service providers must work together to protect applications and data, meet compliance regulations, and ensure business continuity. Watch this video to learn more about cloud security through Trend Micro Deep Security. Webinar Brought To You By CDW-Trend Micro
Tags : 
networking, security, it management
    
CDW-Trend Micro

Enabling the Path to Private Cloud: Automation

Published By: CDW - NetApp     Published Date: Apr 07, 2016
A critical step in moving from a shared virtualized environment toward a private cloud is the transition from infrastructure optimization to service optimization. NetApp’s design approach, technologies, and ecosystem integration build upon our storage efficiencies to deliver service-level efficiencies using centralized, policy-based management and automation. With NetApp® OnCommand® Workflow Automation, an efficient service-oriented approach can be implemented that enables storage provisioning, data protection, and operational processes to be integrated and automated. As a result, enterprises can meet workload service-level requirements while greatly reducing management costs and improving business agility.
Tags : 
cloud management, cloud services, cloud management, it infrastructure, cloud application, cloud computing, infrastructure, technology
    
CDW - NetApp

9 Considerations For Securing Securing Web Apps In the Cloud

Published By: AWS     Published Date: May 25, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. Similarly, relying on your cloud service provider’s security services is insufficient; any provider will tell you that securing the cloud environment is a shared responsibility between cloud service provider and customer, and the responsibility for specifically securing web applications is the sole responsibility of the customer. And although the industry as a whole has become better at protecting lower-level network and server resources, as attackers look for targets, they are moving up the application stack.
Tags : 
    
AWS

Aberdeen Report: Security Operations in Public Cloud Services - Going with your Strengths

Published By: McAfee     Published Date: Mar 31, 2017
Aberdeen Group discusses the move to the public cloud and the security shared responsibility model that leverages the strengths of both the public cloud service providers and  enterprises
Tags : 
virtualization, public cloud, infrastructure as a service, iaas, cloud security, devops, devsecops 
    
McAfee

Insights to Accelerate Services Growth

Published By: Oco, Inc.     Published Date: Jun 24, 2008
As a Services Executive are you struggling with questions regarding what to measure, how to effectively engage with your customers, and what information should be leveraged and shared with service-chain partners and customers? Leading edge organizations are making tools and data available to their suppliers and customers with aggregated information from multiple data systems. Service-chain partners and customer personnel can now see the same views of service performance and activity. This is the next frontier to creating customer "stickiness" and business growth.
Tags : 
business analytics, oco, service management, analytical applications, dashboard, analytic, growth, data management
    
Oco, Inc.

Building Capabilities Leveraging Alternate Solution Deployments

Published By: SAP     Published Date: Jun 30, 2011
This paper aims to discuss the various capability acquisition and it solution deployment options and provide a perspective on how to evaluate the suitability of those options, given an enterprise's situation, and to get the best outcome.
Tags : 
sap, competitive positioning, solution landscape, risk tolerance, shared service center, bpo, bpu, application performance
    
SAP

Best Practices in AP Automation

Published By: Esker     Published Date: Dec 08, 2014
Is your company looking to gain the efficiencies and savings of automated accounts payable processing? Find out how you can: • Quickly deploy one easy, web-based AP workflow solution for all users and systems • Ensure a continuous invoice audit trail • Simplify shared services setup In this white paper, you'll learn important cost and risk factors to consider with AP tools installed inside ERP applications — especially if you have multiple ERP instances or a mix of different enterprise applications. Download the white paper to learn more!
Tags : 
automation, best practices, ap workflow, cost, erp system, data recognition, applications, invoicing
    
Esker

A Primer on Cloud-Native App Development

Published By: Rackspace     Published Date: Jan 19, 2016
In recent years, the term “cloud” has appeared seemingly everywhere. But it’s become difficult to understand what precisely someone means when they say “cloud.” The National Institute of Standards and Technology defines cloud computing as a “model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.”
Tags : 
rackspace, cloud, application, software development, security
    
Rackspace

Ensuring secure and compliant cloud app use with Symantec

Published By: Symantec     Published Date: Jul 11, 2017
Cloud Access Security Brokers (CASBs) serve as a critical control point to ensure the secure and compliant use of cloud apps and services. Cloud service providers typically maintain a shared responsibility policy for security—they guarantee the integrity of their service infrastructure, but the customer is responsible for securing actual app usage. In addition to the growing cloud security challenges organizations face to safeguard data and protect against threats in the cloud, total volume of cloud app adoption is accelerating, with most of it being done by business units and employees without approval or security oversight from the IT organization. As a result, CASB functionality has become so critical that by 2020 it is projected that 80% of enterprises will use a CASB solution. (Gartner)
Tags : 
cloud, cloud service providers, cloud security, cloud applications
    
Symantec

Shared Services: Setting Up A Financial Center for Success

Published By: Esker     Published Date: Jul 09, 2019
For 20+ years, many businesses have enjoyed the cost savings, operational efficiencies and process quality improvements that shared services centers (SSCs) were designed to deliver — but often not to the fullest extent. In this eBook we will cover: Standardized AP Processing without Disruption Measuring and Evaluating KPIs with Automation 7 Tips for Mastering Modern-Day Finance SSCs Achieving the Ultimate Control, Oversight & Orientation
Tags : 
    
Esker

HP Cloud Design Service: “Seven design principles for building a converged cloud”

Published By: HP and Intel ®     Published Date: Jul 26, 2013
Without the proper policies governing cloud usage, a shared infrastructure design, and without a comprehensive yet effective cloud service portfolio, your organization will end up spending more time and money fixing issues rather than delivering desired results to the business.
Tags : 
cloud, converged infrastructure, cloud design, software development
    
HP and Intel ®

Storage Switzerland: Software Defined Storage Needs A Platform, Oct 2013

Published By: IBM     Published Date: Jan 09, 2014
Simply put, software defined storage is the abstraction of storage services from storage hardware. This term is more than just marketing hype, it’s the logical evolution of storage virtualization from simply being a storage aggregator to the end goal of storage as a service. To achieve this goal, software defined storage needs a platform from which to centralize.
Tags : 
ibm, storage switzerland, storage platform, sds, software defined storage, data center, storage virtualization, data protection
    
IBM

Enterprise file-sharing on mobile devices: from foe to friend

Published By: Nativeflow     Published Date: Feb 25, 2014
Are your company’s employees using Sharepoint, Dropbox for Business or other enterprise cloud file-sharing services? Do your users want to use standard market aps to view and edit shared files on the go? Are you concerned about preventing enterprise data leakage from mobile devices? Download the datasheet to learn about approaches that address these challenges so that your enterprise can use these services while ensuring enterprise data is protected.
Tags : 
enterprise file-sharing, mobile devices, sharepoint, dropbox, cloud file-sharing, standard market app, datasheet, file leakage
    
Nativeflow

Understanding the HP BladeSystem Matrix technology

Published By: HP     Published Date: May 10, 2011
This paper describes how a properly converged and shared IT infrastructure can improve the speed and reliability of service delivery while increasing IT efficiency and lowering associated costs.
Tags : 
hp bladesystem matrix, converged infrastructure strategy, server virtualization, capacity management, bc/dr
    
HP

Best Practices Guide: Optimizing Your Construction Business for Profitable Growth

Published By: Maxwell Systems     Published Date: Sep 05, 2013
Construction companies are meeting the challenge of ever-intensifying competition by refining their business operations with standardized operating practices and “visible” information that is shared among multiple departments. “Before, only owners who wanted to grow a very large company would worry about transitioning from the informal business they started to formalized, standardized business processes,” says Jim Flynn, CEO of Maxwell Systems, a leading provider of construction management software solutions, expert services, and best practices. “But in the current environment, you also have to make that transition just to stay competitive and improve your profitability.”
Tags : 
construction, business processes, business management, process management, operations management
    
Maxwell Systems

API-led Connectivity for Government

Published By: MuleSoft     Published Date: Jan 18, 2018
Today, government IT teams are expected to deliver more services with fewer resources. Consequently, many agencies have prioritized legacy modernization, interoperability, and shared service models as a means towards increasing IT delivery capacity. We propose that successful execution of these initiatives within the confines of a strictly managed budget requires a new approach to integration, one centered around APIs. Our recommended approach, API-led connectivity, builds on the principles of re-use first outlined by SOA, while avoiding many of the pitfalls that limited the success of heavyweight SOA implementations. In this whitepaper, you will learn: What forces drive digital transformation in federal government, and what role integration plays in supporting digital transformation How a civilian federal agency leveraged APIs to modernize legacy systems and accelerate the speed of integration How to build out an API-led architecture within a government agency to accelerate project
Tags : 
    
MuleSoft

API-led Connectivity for Government

Published By: MuleSoft     Published Date: Jan 18, 2018
Today, government IT teams are expected to deliver more services with fewer resources. Consequently, many agencies have prioritized legacy modernization, interoperability, and shared service models as a means towards increasing IT delivery capacity. We propose that successful execution of these initiatives within the confines of a strictly managed budget requires a new approach to integration, one centered around APIs. Our recommended approach, API-led connectivity, builds on the principles of re-use first outlined by SOA, while avoiding many of the pitfalls that limited the success of heavyweight SOA implementations. In this whitepaper, you will learn: What forces drive digital transformation in federal government, and what role integration plays in supporting digital transformation How a civilian federal agency leveraged APIs to modernize legacy systems and accelerate the speed of integration How to build out an API-led architecture within a government agency to accelerate project
Tags : 
    
MuleSoft

Federal Government Edition: What's out there threatening your network?

Published By: Cox Business     Published Date: Dec 19, 2016
As we continue to move forward into an age of big data, optimization, and shared information through the capabilities of better networking technologies, opportunities have never been greater for using technology to improve the way the government interacts with constituents. However, increasing dependence on web and network services also makes government a tempting target for hackers. Distributed Denial of Service attacks, data breaches, leaks, the risks can be enormous. Recent events have shown us that now more than ever, government servers are getting victimized by well-funded teams of foreign hackers, possibly funded by their government.
Tags : 
    
Cox Business

Harmonizing urban movement - How location intelligence is transforming mobility in cities

Published By: HERE Technologies     Published Date: Jul 11, 2019
Whether you’re a private company moving people or goods, or a governmental organization responsible for managing traffic flow, urban environments present a common set of challenges. Greater safety, reduced congestion and pollution, a better consumer experience, more well-organized networks and intuitive vehicle use are shared goals for all those looking to transform urban mobility. City transportation is about to undergo a seismic change. This presents a huge opportunity for businesses to improve their services and for public sector leaders to understand and manage networks more efficiently. By reading this ebook, you will discover how location intelligence helps: - Meet ever-increasing customer expectations of timely pick-ups and deliveries - Improve safety and congestion across a road network - Reduce operational costs and improve efficiency for movers of people and parcels -Maximize the use of fleet vehicles and drivers by efficiently matching supply to demand
Tags : 
urban mobility, here tech, mapping
    
HERE Technologies
Start   Previous    1 2 3     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.