boardroom

Results 1 - 25 of 39Sort Results By: Published Date | Title | Company Name

Boosting Productivity Among Today’s Decentralized Workforce with Video Conferencing

Published By: Arkadin     Published Date: Sep 11, 2013
Cost effective, simple to deploy, next generation HD video conferencing solutions are no longer limited to C-level boardrooms, today enabling face-to-face meetings at the knowledge worker level delivering high levels of engagement and increased productivity.
Tags : 
: video conferencing, video collaboration, cloud-based video conferencing, hd-video conferencing, mobile video conferencing, mobile video communications, enterprise video conferencing, saas video conferencing
    
Arkadin

Finance Technology: A new landscape for a digital world

Published By: BlackLine     Published Date: May 24, 2018
Digital transformation is the new boardroom buzzword. But what does this really mean for finance teams, and why does it matter? Beyond the hype, real change is underway.
Tags : 
    
BlackLine

Cloud-Based Video Conferencing: A Flexible Approach to Face-to-Face Communication

Published By: Blue Jeans Network     Published Date: Oct 29, 2013
Scalability and affordability have extended video beyond the boardroom to meet the demands of a growing mobile workforce. Cloud-based video conferencing has enabled companies to realize the full benefits of video: fact-to-face contact, efficient knowledge transfers and a degree of personal interaction that's proven critical for businesses hoping to gain a competitive advantage.
Tags : 
video conferencing, collaboration, cloud based video, mobile video conferencing, corporate agility, cloud, human resources
    
Blue Jeans Network

Innovative Uses of Telepresence

Published By: Cisco Systems     Published Date: Jun 05, 2013
Innovative Uses of Telepresence
Tags : 
telepresence, transformative technology, in-person, innovative, boardroom, collaboration, networking, it management
    
Cisco Systems

Breaches and the Boardroom: Lessons Learned in Cybersecurity

Published By: Concerto Cloud Services     Published Date: Dec 18, 2015
The purpose of this article is to provide the reader with several key insights that can better prepare your organization for mitigating security breaches
Tags : 
    
Concerto Cloud Services

Analytics in the Boardroom

Published By: Destination Analytics     Published Date: Apr 06, 2012
Organizations that take a wait-and-see approach to analytics are falling behind their more determined peers. Read to find out more.
Tags : 
ibm, technology, netezza, analytics, enterprise analytics, business analytics, customer relationship management, customer satisfaction
    
Destination Analytics

From Website Security Architecture To The Boardroom: Optimizing Your Business

Published By: DigiCert     Published Date: Jun 19, 2018
Your website is your most important digital asset and so protecting it is as important as ensuring positive cash flow, paying staff salaries and keeping the lights on in the head office. Despite the threats and the importance of website security, IT department organization, goals and technology – their ‘website security architecture’ – is often unfit for the purpose. With correct planning and strong execution, CIOs and CISOs can create a problem-solving, self-aware, agile organization that is better protected against fast-changing threats. This white paper explores the challenges they face and suggests a roadmap for change.
Tags : 
    
DigiCert

Board-Portale: 10 Kritische Fragen

Published By: Diligent     Published Date: Aug 05, 2016
This whitepaper reveals some of the most commonly asked questions about board portals and how they can help directors and company secretaries be more effective and secure in how they communicate.
Tags : 
board portals, boardroom, sharing information, information management, content management system, document management, intranets
    
Diligent

Attaining the Paperless Boardroom: The Human Side of Technology Change

Published By: Diligent Corporation     Published Date: Jun 29, 2015
This paper reveals how the paperless workplace has been a much-pursued goal for almost as long as there have been computers in the office.
Tags : 
technology, board, paperless, paperless workplace, workplace, board portals, boardroom, electronic board solution
    
Diligent Corporation

10 Questions to Ask About Board Portals

Published By: Diligent Corporation     Published Date: Jun 29, 2015
This white paper shows how board portals can help directors and company secretaries be more effective and secure in how they communicate.
Tags : 
board portal, advantages board portal, sharing documents, sharing information, benefits of board portals, electronic board solution, electronic board meeting, electronic board papers
    
Diligent Corporation

Digital Board Solutions: The high price of low-cost approaches

Published By: Diligent Corporation     Published Date: Jun 29, 2015
Read this paper now to discover the reason why today there are more reasons than ever to move to electronic board communications.
Tags : 
digital board, digital board solutions, electronic board solutions, electronic board meeting, electronic board communications, board portal solutions, board portal, electronic board communication
    
Diligent Corporation

Understanding Your Cybersecurity Posture

Published By: FICO     Published Date: Mar 22, 2018
Cybercrime and data breaches are daily news. Escalating cost, new regulations and increased focus on managing third-party relationships means cybercrime is a boardroom issue. This executive briefng explains why cybercrime is a relevant and pressing problem, and will show you how to evaluate and invest in layered controls to help you understand the security posture for your organisation.
Tags : 
    
FICO

IBM 2016 C-suite Study

Published By: IBM     Published Date: Apr 04, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, c-suite study, cybersecurity, security, knowledge management, enterprise applications, network security, business technology
    
IBM

IBM 2016 C-suite Study

Published By: IBM     Published Date: Sep 30, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, security, maturity, c suite, cybersecurity, knowledge management, enterprise applications, business technology
    
IBM

Millennial Money

Published By: Infosys     Published Date: May 21, 2018
The digital revolution has left no part of business untouched. The traditional world of CFO's is evolving fast - not only because technology enables them to perform their duties more effectively, but also because the next generation of CFOs are steadily making their way into the boardroom. And they are going to drive change even faster. This was an issue that was high on the agenda for our client, one of the world's largest multinational conglomerates. They could see that CEO's of the group's businesses were relying increasingly on the financial insight of their CFOs to help shape business direction strategy. CFOs, therefore, need to ensure that they are equipped with technology and data to fulfill this new and demanding role.
Tags : 
millennial, cfo, finance, business, technology
    
Infosys

Return of the CIO

Published By: Kaseya     Published Date: Apr 04, 2013
The role of the CIO is suffering. Take back your place in the boardroom by transforming IT from an operational entity to a more strategic, revenue-generating role within the organization.
Tags : 
cio, strategy, revenue, roi, business goals, job roles
    
Kaseya

10 Ways to Secure Your Digital Content

Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
    
Limelight Networks

10 Ways to Secure Your Digital Content

Published By: Limelight Networks     Published Date: Feb 21, 2018
From the boardroom to the backroom, everyone is looking for ways to protect their digital content from cyber threats like DDoS attacks, unauthorized access or theft. In this white paper, we’ll discuss ten different ways to protect your digital content, ensure high availability and maintain superior quality of experience for every digital visitor.
Tags : 
    
Limelight Networks

10 Ways to Secure Your Digital Content

Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
content delivery network, cdn, cybersecurity, ddos, waf, web application firewall, distributed denial of service attacks, cloud security
    
Limelight Networks

Protect your document & intellectual property with Locklizard

Published By: LockLizard     Published Date: Dec 08, 2008
In any enterprise there is information that has to be kept secret, but must be distributed, and therefore has to be identified with any recipient in the event that it is ‘leaked.’  This white paper addresses two examples of this requirement (boardroom secrets and mergers and acquisitions), and shows how to identify solutions that meet business needs for document protection and secure file sharing.
Tags : 
drm solutions, locklizard, document protection, secure file sharing, security, identity management, internet security, intrusion detection
    
LockLizard

Transformative Power of Talent Management

Published By: mavisliew     Published Date: Feb 04, 2015
In this whitepaper, you’ll find some practical advice on how you can demonstrate your value to the C-suite and gain that all-important seat at the boardroom table.
Tags : 
    
mavisliew

Transformative Power of Talent Management

Published By: mavisliew     Published Date: Feb 18, 2015
In this whitepaper, you’ll find some practical advice on how you can demonstrate your value to the C-suite and gain that all-important seat at the boardroom table.
Tags : 
    
mavisliew

Data to Decisions Business and Technology Trends Enterprises Must Track Through 2024

Published By: MicroStrategy     Published Date: Aug 28, 2019
The Constellation AstroChartTM supplies a visual guide of the trends impacting Data to Decisions. After assessing boardroom priorities, organizations should employ AstroCharts to inform portfolio management. This report contains two AstroCharts: one identifying Business Trends and one identifying Technology Trends. The AstroCharts’ vertical axes plot “Organizational Adoption” rates from Mainstream to Early Adopter to Bleeding Edge. Horizontal axes plot “Business Impact,” the impact of the trend on an organization’s business model, from Incremental to Transformational to Exponential. The Constellation AstroChart moves beyond both the hype and constraints of the standard 2 x 2 grid to identify the dynamics impacting the entire market. This report applies Constellation’s AstroChart to the Constellation’s business theme of Data to Decisions. This research domain examines the enablement of data-driven decisions across organizations. Holistic, data-informed decisions require a multidisciplin
Tags : 
    
MicroStrategy

Data to Decisions Business and Technology Trends Enterprises Must Track Through 2024

Published By: MicroStrategy     Published Date: Nov 08, 2019
The Constellation AstroChartTM research supplies a visual guide of the trends impacting Data to Decisions. After assessing boardroom priorities, organizations should employ AstroCharts to inform portfolio management. This report contains two AstroCharts: one identifying Business Trends and one identifying Technology Trends. The vertical axes plot “Organizational Adoption” rates from Mainstream to Early Adopter to Bleeding Edge. Horizontal axes plot “Business Impact,” the impact of the trend on an organization’s business model, from Incremental to Transformational to Exponential. The Constellation AstroChart moves beyond both the hype and constraints of the standard 2 x 2 grid to identify the dynamics impacting the entire market. This report applies Constellation’s AstroChart to the business theme of Data to Decisions. This research domain examines the enablement of data-driven decisions across organizations. Holistic, data-informed decisions require a multidisciplinary approach that
Tags : 
    
MicroStrategy

Data to Decisions Business and Technology Trends Enterprises Must Track Through 2024

Published By: MicroStrategy     Published Date: Nov 08, 2019
The Constellation AstroChartTM research supplies a visual guide of the trends impacting Data to Decisions. After assessing boardroom priorities, organizations should employ AstroCharts to inform portfolio management. This report contains two AstroCharts: one identifying Business Trends and one identifying Technology Trends. The vertical axes plot “Organizational Adoption” rates from Mainstream to Early Adopter to Bleeding Edge. Horizontal axes plot “Business Impact,” the impact of the trend on an organization’s business model, from Incremental to Transformational to Exponential. The Constellation AstroChart moves beyond both the hype and constraints of the standard 2 x 2 grid to identify the dynamics impacting the entire market. This report applies Constellation’s AstroChart to the business theme of Data to Decisions. This research domain examines the enablement of data-driven decisions across organizations. Holistic, data-informed decisions require a multidisciplinary approach that
Tags : 
    
MicroStrategy
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.