owned

Results 1 - 25 of 140Sort Results By: Published Date | Title | Company Name

15 Ways to Weed the Regulatory Violations Out of Your Spend

Published By: AppZen     Published Date: Oct 21, 2019
Spend-related regulatory violations come in the form of different types of payments or gifts, including those to sanctioned organizations or people; debarred organizations or people; organizations or people on an export control list; foreign officials or government-owned entities; politically-exposed people; and healthcare professionals or organizations. How do you know if you have these violations hiding in your organization's expenses, contracts, or invoices? It’s not easy to weed them out, and if you don’t have an automated, systematic approach, doing so is prohibitively time consuming.
Tags : 
    
AppZen

Intel® Optane™ Technology: Memory or Storage ? Both

Published By: Intel     Published Date: Sep 27, 2019
The stakes are high in today's data centers. Organisations have access to massive quantities of data promising valuable insights and new opportunities for business. But data center architects need to rethink and redesign their system architectures to ingest, store and process all that information. Similarly, application owners need to assess how they can process data more effectively. Those who don't re-architect might find themselves scrambling just to keep from being drowned in a data deluge.
Tags : 
    
Intel

15 Ways to Weed the Regulatory Violations Out of Your Spend

Published By: AppZen     Published Date: Sep 10, 2019
Spend-related regulatory violations come in the form of different types of payments or gifts, including those to sanctioned organizations or people; debarred organizations or people; organizations or people on an export control list; foreign officials or government-owned entities; politically-exposed people; and healthcare professionals or organizations. How do you know if you have these violations hiding in your organization's expenses, contracts, or invoices? It’s not easy to weed them out, and if you don’t have an automated, systematic approach, doing so is prohibitively time consuming.
Tags : 
    
AppZen

15 Ways to Weed the Regulatory Violations Out of Your Spend

Published By: AppZen     Published Date: Aug 02, 2019
Spend-related regulatory violations come in the form of different types of payments or gifts, including those to sanctioned organizations or people; debarred organizations or people; organizations or people on an export control list; foreign officials or government-owned entities; politically-exposed people; and healthcare professionals or organizations. How do you know if you have these violations hiding in your organization's expenses, contracts, or invoices? It’s not easy to weed them out, and if you don’t have an automated, systematic approach, doing so is prohibitively time consuming.
Tags : 
    
AppZen

How to Wrangle Data for Machine Learning on AWS

Published By: AWS     Published Date: Jun 24, 2019
Join our webinar to hear how Consensus, a Target-owned subsidiary, utilizes AWS and Trifacta to prepare data for use in fraud detection algorithms. You’ll learn how self-service automated data wrangling can save your organization time and money, and tips for getting started with Trifacta’s solution, built for AWS. Webinar attendees will learn: Why automating your data wrangling tasks can lead to greater data accuracy and more meaningful insights. How you can reduce your data preparation time by 60% and more with self-service data wrangling tools built for AWS. How easy it is to get started with machine learning solutions for data wrangling on the cloud.
Tags : 
    
AWS

Cisco Umbrella At A Glance

Published By: Cisco     Published Date: May 24, 2019
In the past, desktops, business apps, and critical infrastructure were all located behind the firewall. Today, more and more is happening off-network. More roaming users. More corporate-owned laptops accessing the internet from other networks. More cloud apps, letting users get work done off the corporate network. And more branch offices connecting directly to the internet.
Tags : 
    
Cisco

Third-Party Risk: Why Real-Time Intelligence Matters

Published By: Recorded Future     Published Date: Apr 18, 2019
Enterprises increasingly operate in a digitally interconnected world where third parties like suppliers, customers, channel partners, and others are often directly connected to their internal IT systems, and where their underlying IT infrastructure may be owned and managed by an outside organization. These business relationships can knowingly or unknowingly introduce different types of risks that need to be identified and managed as if these third parties were part of the enterprise itself. Recorded Future's latest risk intelligence offering enables threat intelligence teams to better understand, monitor, and measure their real-time exposure to these third-party risks. Armed with this information, organizations can better assess and prioritize risk mitigation actions.
Tags : 
    
Recorded Future

Largest North Carolina Medical Group Deploys Cohesity for Modern Storage Solution

Published By: Cohesity     Published Date: Mar 19, 2019
Piedmont HealthCare (PHC) is the largest physician-owned and directed multi-specialty medical group in North Carolina, providing comprehensive healthcare for the entire family. The provider has more than 50 locations throughout the state of North Carolina, with more than 200 physicians and providers, and over 1,000 employees. Piedmont HealthCare is headquartered in Statesville, North Carolina and is committed to deliver innovative medical care for the community across multiple specialties in three counties.
Tags : 
    
Cohesity

Lowering Commercial Automotive Insurance Costs

Published By: SambaSaftey     Published Date: Mar 15, 2019
Best practices for taking control. The numbers don’t lie: Driver monitoring can reduce accidents, save organizations money, and protect the people and communities you serve. Advances in safety technology, like comprehensive driver monitoring solutions, are enabling companies not only to stay safer, but to better navigate the tricky territory of insurance. By following a few new best practices, you can manage insurance costs and protect your company’s bottom line before your drivers even hit the road. In our free white paper, “Lowering Commercial Automotive Fleet Insurance Costs,” we’ll show you: • The many ways vehicle crashes affect the bottom line • A deeper look at the risks of employer- and employee-owned vehicles • How negligent entrustment suits can snare companies in any industry • How to mitigate risk and take control of insurance
Tags : 
    
SambaSaftey

Demand Gen Trends To Know In 2019 (on-demand webinar)

Published By: PGi     Published Date: Mar 08, 2019
Whether you’re a newly appointed demand gen specialist or a well-versed, highly-skilled demand gen ninja, this session is for you to learn about the Demand Gen imperatives for 2019 from the renowned, demand gen master himself, Andrew Gaffney. In this session, you’ll learn about the latest best practices for breaking down the top channels to optimize your demand gen efforts. We’ll discuss everything from how to breathe new life to your lead-gen webinars to creating killer content that drives pipeline. As a bonus, Andrew will share the latest, fresh-off-the-press findings from the 2019 Demand Gen Benchmark Study.
Tags : 
    
PGi

Securing the Enterprise of Things in the Public Sector

Published By: BlackBerry     Published Date: Feb 01, 2019
The Enterprise of Things (EoT) is the network of people, endpoints, and digital assets owned by and connected to the enterprise (or public sector organisation, in this context). It casts a wide net, to include content, communication, collaboration, transportation, and facilities – that is, anyone and anything connected to the internet. The EoT represents a powerful opportunity to transform existing public sector processes and create entirely new ones. Governments are moving on these initiatives because policymakers are legislating it, constituents are demanding it and because it presents an opportunity to do more with less.
Tags : 
    
BlackBerry

Securing the Enterprise of Things in the Public Sector

Published By: BlackBerry APAC     Published Date: Jan 29, 2019
The Enterprise of Things (EoT) is the network of people, endpoints, and digital assets owned by and connected to the enterprise (or public sector organisation, in this context). It casts a wide net, to include content, communication, collaboration, transportation, and facilities – that is, anyone and anything connected to the internet. The EoT represents a powerful opportunity to transform existing public sector processes and create entirely new ones. Governments are moving on these initiatives because policymakers are legislating it, constituents are demanding it and because it presents an opportunity to do more with less.
Tags : 
    
BlackBerry APAC

Case Study: 80% Reduction in Backup Windows for Burris Logistics

Published By: Cohesity     Published Date: Aug 24, 2018
As one of the nation’s largest and most sophisticated controlled-temperature food distribution companies, Burris Logistics offers over 60 million cubic feet of freezer warehousing space in 15 strategic locations along the East Coast. For over 90 years, Burris has been a family-owned, family-run business that employs over 1500 people. Burris has built a solid reputation through strong culture, people and commitment to its customers - all reasons why national leading retailers turn to them for custom supply chain solutions. Download this case study to learn how Cohesity helped Burris Logistics reduce their backup windows by over 80%.
Tags : 
    
Cohesity

Rethink Enterprise Endpoint Security In The Cloud Computing Era

Published By: Google     Published Date: Aug 23, 2018
"From APIs to employee-owned smartphones, there are more access points to corporate data than ever before. Have businesses updated their security strategies to reflect this explosion of new targets for potential breaches? In June 2017, Google commissioned Forrester Consulting to examine how security experts think about endpoint security and learn how the cloud is helping businesses address new vulnerabilities. Download the Forrester report and find out more."
Tags : 
    
Google

Case Study: 80% Reduction in Backup Windows for Burris Logistics

Published By: Cohesity     Published Date: Aug 21, 2018
As one of the nation’s largest and most sophisticated controlled-temperature food distribution companies, Burris Logistics offers over 60 million cubic feet of freezer warehousing space in 15 strategic locations along the East Coast. For over 90 years, Burris has been a family-owned, family-run business that employs over 1500 people. Burris has built a solid reputation through strong culture, people and commitment to its customers - all reasons why national leading retailers turn to them for custom supply chain solutions.
Tags : 
    
Cohesity

Advanced Endpoint Security for Dummies

Published By: Symantec     Published Date: Jun 13, 2018
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices desktops, laptops, tablets, and smartphones with various operating systems to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. In the wake of this disruption, vendors offered myriad point products that solve only a portion of the security problem. These products usually require costly custom integrations and high management overhead to boot. Making matters worse, traditional security approaches can’t address an evolving threat landscape that includes ransomware, stealthy attacks that dwell in a customer’s environment for months, and threats targeting iOS and Android devices. In fact, the mobile workforce is more vulnerable than ever before.
Tags : 
    
Symantec

Navigant: Charging Ahead with EV Analytics

Published By: SAS     Published Date: Jun 11, 2018
Electric vehicle technology touches all areas of the utility business, including IT, forecasters and grid operations. The growth of IoT-connected devices, both in the utility-owned grid and customer-owned smart energy apps, makes this a rich field for innovation. But what analytics infrastructure is needed in order to manage the future demand coming from EVs? And what opportunities and risks do EVs present? This white paper from Navigant Research, sponsored by SAS and Intel, explores the analytics infrastructure that utilities need to prepare for and benefit from the growth of EVs.
Tags : 
    
SAS

iOS Security Checklist

Published By: Jamf     Published Date: Jun 07, 2018
The Center for Internet Security (CIS) benchmark for iOS is widely regarded as a comprehensive checklist for organizations to follow to secure iPad and iPhone devices. This white paper explains how to implement the independent organization’s recommendations and walks you through: • CIS and iOS management basics • Securing institutionally-owned devices • Securing personally-owned devices
Tags : 
    
Jamf

Forrester: Rethink Enterprise Endpoint Security In The Cloud Era

Published By: Google Chrome Enterprise     Published Date: May 07, 2018
In the year 2016 alone, the world learned about security breaches that compromised nearly 2 billion records.1 Employee endpoints are increasingly targeted: Nearly two-thirds (64%) of external attacks last year targeted a corporate-owned, employee-owned, or mobile device.2 Data breaches cost companies time and money, weaken brand reputation, and jeopardize customer and employee trust.
Tags : 
    
Google Chrome Enterprise

Case study – Factory Direct Fencing

Published By: Sage Software (APAC)     Published Date: May 02, 2018
Factory Direct Fencing, Austraila’s largest family-owned manufacturer and distributor of fencing products, deploys Sage Business Cloud Enterprise Management to handle multi-warehouse management, radio frequency scanning and component manufacturing functionality. Sage Business Cloud Enterprise Management not only streamlines its processes and reduces duplication of data entry, it also ensures more reliable reporting and automates its key business processes.
Tags : 
    
Sage Software (APAC)

Whitepaper: The Customer First Future of Marketing

Published By: Sprinklr     Published Date: Apr 02, 2018
75% of today’s S&P 500 companies will be replaced by 2027. It’s a tenuous time to be a marketing leader - many of the strategies that have worked in the past are no longer relevant. Learn how companies like Microsoft, LVMH, and IBM are approaching digital transformation.
Tags : 
customer experience, marketing strategy, marketing performance, roi, digital marketing, digital advertising, paid media, earned media, owned media, social media, social advertising
    
Sprinklr

The Analytics Supply Chain

Published By: FICO     Published Date: Mar 02, 2018
The role of analytics in managing, improving and ultimately transforming supply chains cannot be understated. But what about the analytics themselves? FICO’s Zahir Balaporia and renowned author Tom Davenport use the term “The Analytics Supply Chain” to reflect that the actual analytics themselves parallel supply chains, with inherent challenges and problems if things “get stuck.” Rethinking analytics in these terms can not only improve supply chain performance, but also any other business problems you seek to solve. This article targets: · Steps in the analytics supply chain and the vital role of data and analytic models · How your predictions, recommendations and insights need to rely on similar attributes to finished manufactured products; · Key questions to ask yourself in determining where you need to fix your analytics supply chain.
Tags : 
supply, chain, analytics, employee, optimization, organisations, productivity
    
FICO

MobileIron Delivers Strong Security and Modern Management to Macs

Published By: MobileIron     Published Date: Feb 26, 2018
Enterprises are increasingly expected to support Macs as corporateapproved devices. In order to be in compliance, it is imperative that all devices accessing sensitive corporate and customer data be fully secured and managed. MobileIron delivers a new model for authentication and identity to Macs and enables enterprises to unify Apple mobile and desktop operations using a common security and management platform. MobileIron’s layered security can be extended to not only corporate-owned Macs, but to employee-owned devices as well. And, IT organizations can bring Macs under management across the organization with unparalleled speed and at scale thanks to seamless integration with Apple’s Device Enrollment Program (DEP) and Volume Purchase Program (VPP).
Tags : 
    
MobileIron

The Creative Industries in the UK

Published By: Department for International Trade     Published Date: Feb 09, 2018
The UK is recognised around the world for its unique character and the strength of its creative industries. We’re renowned for great storytellers, from Shakespeare to Dickens, Orwell to J.K Rowling; for our world-famous musicians, from Coldplay to Queen, The Beatles to Adele; for our fantastic actors; our striking modern architecture; our leadership in fashion and design, matched by high quality craftsmanship; our witty and effective advertising, genre-defining publishing; and our globally important digital games industry.
Tags : 
creativity, industries, investments, marketplace
    
Department for International Trade

Renowned Winery Seeks To Optimize the Finance Organization

Published By: MineralTree     Published Date: Jan 23, 2018
How much time are you spending on manual AP tasks? This company saved 60% of their finance department's time by automating accounts payable.
Tags : 
business payments, accounts payable, payment automation, invoice automation, accounting applications
    
MineralTree
Start   Previous   1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.