sets

Results 101 - 125 of 854Sort Results By: Published Date | Title | Company Name

Automating IT Data Collection and Compliance for GRCM Controls

Published By: Qualys     Published Date: Apr 05, 2011
This guide explains how QualysGuard PC automates the "C" in GRCM by automatically scanning all assets, collecting operating system configuration and application access controls, mapping these to IT policy, and documenting compliance.
Tags : 
it data collection, it compliance, grcm controls, qualys, qualysguard pc, gcc, automated general computer control, legacy, it risk, policy editor, saas, access control, compliance, network security appliance, security management, risk management, data protection, database security, software compliance, vulnerability management
    
Qualys

Automating the SANS 20 Critical Security Controls with QualysGuard

Published By: Qualys     Published Date: Nov 05, 2013
The SANS 20 Critical Security Controls are known for driving effective security programs across government agencies, establishing guidelines for security professionals to ensure the confidentiality, integrity and availability of information technology assets. This paper describes how automating these controls using QualysGuard can protect your organization with continuous security while drastically lowering costs.
Tags : 
automation, cyber security, critical controls, malware defense, application software security, data recovery, compliance applications, qualysguard, internet security, intrusion detection, intrusion prevention, policy based management, security management, vulnerability management
    
Qualys

Automating Trigger Marketing

Published By: iKnowtion     Published Date: Nov 17, 2011
Learn how a financial services company can retain critical customer assets, and their method for predicting customers that will transfer assets in and out of accounts and the expected amounts.
Tags : 
customer intelligence, customer loyalty, crm solutions, customer profiling, probability choice models, trigger marketing, financial services, profitability, data modeling, marketing analytics, iknowiton
    
iKnowtion

Automation Can Help Cement Plants Save $4+ Million Per Year

Published By: Schneider Electric     Published Date: Nov 21, 2017
When effectively applied in a cement plant, automation and control technologies can significantly reduce energy expenses, while helping to increase production and reduce waste.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, cement, cement plant
    
Schneider Electric

Automized Storage for z/OS

Published By: CA Mainframe     Published Date: Sep 12, 2008
The CA Automated Storage Optimization Mainframe Suite provides a best-practices-based and intelligent approach to SRM, delivering the tools to identify and classify your storage assets. Access this Technology Brief to understand how to maximize use of existing storage resources and ensures protection of business-critical applications and information.
Tags : 
srm, storage resource management, zos, z/os, ibm, ibm server, ca mainframe, mainframe, ibm mainframe, storage optimization, mainframe storage, networking, platforms, storage, storage management
    
CA Mainframe

AWS Data & Analytics: Information and Data Management Solutions Generate Value

Published By: AWS - ROI DNA     Published Date: Aug 09, 2018
In today's data -driven digital environment, companies are collecting, transforming and connecting data in innovative and meaningful ways. A robust information and data management solution enables you to leverage the power of your data, exploring and uncovering insights in documents, images and audio across billions of inputs and existing data assets.
Tags : 
    
AWS - ROI DNA

Banks and Fintechs Reimagine Digital Financial Services

Published By: Juniper Networks     Published Date: Aug 10, 2017
Resistance to change is futile. Financial services are becoming more embedded in the banking customer’s everyday life, driving unprecedented levels of change across the industry. The unfolding digital economy is ushering a new era of technology adoption in banking. From cloud to open banking APIs, these play a defining role in enabling banks to create new digital products and services, refresh the bank branch, find new customer segments, and monetize underutilized data and information assets.
Tags : 
opening banking, api, data, currency, cloud transformation, frictionless banking, business model disruption
    
Juniper Networks

Best Business Intelligence (BI) Practices to Transform Your Data into Information

Published By: ZSL Inc.     Published Date: Jul 20, 2009
Organizations have implemented enterprise applications such as ERP and CRM for business process execution but have failed to address the key enterprise asset: data. In the current economic environment, enterprises that fail to capitalize on their data assets jeopardize their cost structures and their earnings potential. It is vital for organizations to leverage their data assets to measure their business performance, identify the weak poles and strategic improvement spots to scale their business to new heights. Business Intelligence (BI), the recent innovation in IT, has emerged to be a potential hope for the organizations to build a strong business milieu without any new asset investments and utilizing the existing key assets of the organizations.
Tags : 
business intelligence, zsl, erp, crm, enterprise application, enterprises, investments, business transformation, olap, dashboards, metrics, business monitoring, enterprise applications, business management, customer relationship management, enterprise resource planning
    
ZSL Inc.

Best Practice Recommendations for IT and Telecom Inventory Management

Published By: CA SM     Published Date: Jun 02, 2008
Telecom assets are a special class of IT assets that require an accurate inventory for effective financial management. Enterprises should consider the benefits of establishing a "single version of the truth" that comes from linking management of IT and telecom assets with their other systems and processes. An accurate inventory is critical for effective financial management. Managers need accurate information that supports their business decisions.
Tags : 
ca sm, ca service management, service management, telecom, business management, asset management, business integration, convergence, ip telephony
    
CA SM

Best Practices for Fixed Asset Managers

Published By: Sage FAS Fixed Assets     Published Date: Apr 11, 2011
The goal of this paper is to help you learn about best practices for fixed asset management and suggest tips for implementing them in your organization.
Tags : 
sage fas, fixed asset management, best practices, financial reporting, baseline, ghost assets, asset inventories, inventory software, spreadsheets, application integration, depreciation calculation, compliance
    
Sage FAS Fixed Assets

Best Practices for Transactional Emails

Published By: BlueHornet     Published Date: Jun 06, 2008
Applying opt-in email marketing strategies and best practices to transactional emails can be a win-win for customers and marketers. But the two types of communications are not the same. This white paper is written to help email marketers and online retailers understand: What sets transactional emails apart from commercial messages; how they must comply with all federal regulations; and where to take advantage of opportunities to optimize their transactional email program.
Tags : 
email marketing, email messaging, blue hornet, bluehornet
    
BlueHornet

Best Practices to Effectively and Efficiently Deploy PCs and Other Assets

Published By: Dell     Published Date: Feb 07, 2018
How can IT put PCs in the hands of their users without draining staff time and resources? IDC has put forth a deployment optimization model to help IT organizations understand how to deploy systems in less time, with fewer resources, and with better results. The model provides plenty for IT professionals to think about, including the wisdom of leaving some or all of the tasks to deployment experts who deploy PCs all day, every day. Join this on demand webcast today to learn about IDC’s view of the PC market, where it is headed, and best practices associated with their deployment optimization model. Speakers: • Rob Brothers, IDC, Program Vice President, Software and Hardware Support and Deployment Services • Jason Christensen, Dell EMC, Product Manager Intel Inside®. Powerful Productivity Outside. Intel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell

Best Practices to Effectively and Efficiently Deploy PCs and Other Assets

Published By: Dell     Published Date: May 08, 2018
How can IT put PCs in the hands of their users without draining staff time and resources? IDC has put forth a deployment optimization model to help IT organizations understand how to deploy systems in less time, with fewer resources, and with better results. The model provides plenty for IT professionals to think about, including the wisdom of leaving some or all of the tasks to deployment experts who deploy PCs all day, every day. Join this on demand webcast today to learn about IDC’s view of the PC market, where it is headed, and best practices associated with their deployment optimization model. Speakers: • Rob Brothers, IDC, Program Vice President, Software and Hardware Support and Deployment Services • Jason Christensen, Dell EMC, Product Manager Intel Inside®. Powerful Productivity Outside. Intel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell

Best Practices to Effectively and Efficiently Deploy PCs and Other Assets

Published By: Dell     Published Date: Jan 29, 2019
Best Practices to Effectively and Efficiently Deploy PCs and Other Assets
Tags : 
    
Dell

Best Practices: Using the iPad for Sales Demos + Business Presentations

Published By: StoryDesk     Published Date: Aug 17, 2011
Take advantage of the iPad's interactivity and mobility to wow your clients and leave an impression that sets you apart from the competition.
Tags : 
ipad, sales tool, apple ipad, ipads, presentation, presentation tools
    
StoryDesk

Best-Of-Breed EAM With Ease Of Integration

Published By: Lawson     Published Date: Jun 23, 2008
Lawson Enterprise Asset Management is a software solution specifically designed to help improve the reliability and availability of your critical assets. It can help you to maximize your profitability and return on your asset investment during every stage of the asset lifecycle. It can also be easily integrated with your other business operations and systems.
Tags : 
erp, eam, lawson, manufacturing, enterprise asset management
    
Lawson

Beyond The Inbox: How To Transform Your Email Marketing Platform Into An Omnichannel Solution

Published By: AppNexus     Published Date: Apr 04, 2017
Email marketing is one of digital media’s most effective channels. Inside the inbox, marketers can capture the consumer’s undivided attention in a uniquely intimate environment, creating a perfect opportunity for meaningful brand engagement and driving new purchase transactions. However, with open rates for even the most effective brands hovering around 25%, there is huge opportunity for marketers to reach their customers with impactful formats on the open internet to successfully engage them across the marketing funnel. Download the free eBook “Beyond The Inbox: How To Transform Your Email Marketing Platform Into An Omnichannel Solution” to learn: • How to rapidly build an omni-channel solution for your clients • How AppNexus can help your platform reach your marketer’s customers most cost-effectively • How AppNexus ensures complete security for your client’s CRM data assets ?
Tags : 
appnexus, email marketing, omni-channel, crm data, branding, marketing, brand engagement, customer engagement
    
AppNexus

Big Data Integration And Hadoop

Published By: IBM     Published Date: Apr 18, 2017
Apache Hadoop technology is transforming the economics and dynamics of big data initiatives by supporting new processes and architectures that can help cut costs, increase revenue and create competitive advantage. An effective big data integration solution delivers simplicity, speed, scalability, functionality and governance to produce consumable data. To cut through this misinformation and develop an adoption plan for your Hadoop big data project, you must follow a best practices approach that takes into account emerging technologies, scalability requirements, and current resources and skill levels.
Tags : 
data integration, data security, data optimization, data virtualization, database security, data migration, data assets, data delivery
    
IBM

Bloor Report: Test Data Management

Published By: CA Technologies EMEA     Published Date: Sep 07, 2018
There are five ways to provision test data. You can copy or take a snapshot of your production database or databases. You can provision data manually or via a spreadsheet. You can derive virtual copies of your production database(s). You can generate subsets of your production database(s). And you can generate synthetic data that is representative of your production data but is not actually real. Of course, the first four examples assume that the data you need for testing purposes is available to you from your production databases. If this is not the case, then only manual or synthetic data provision is a viable option. Download this whitepaper to find out more about how CA Technologies can help your business and its Test Data problems.
Tags : 
    
CA Technologies EMEA

Board Portal Buyer's Guide: Five Essential Qualities

Published By: Diligent     Published Date: Jul 10, 2017
You may already know what a board portal is. You Probably know that paper is heavy and hackers are a risk, and by now, you know there are multiple vendors that offer board portals. You may not realize that by making the right choice, a board can improve governance and efficiency while collaborating in a secure setting. With lots of vendors to choose from, here are the most important questions to ask during your search, divided into the five essential categories. For private, public, non profit and government boards alike, finding an app that excels across all five categories will lead to better electronic security and a more productive board.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
    
Diligent

Bolean 101

Published By: Entelo     Published Date: Sep 06, 2017
With the power of the Boolean search, talent acquisition pros can boost their recruiting arsenal, run highly specialized searches, and hire top talent based on current and past job titles, particular skill sets, geographic location, work experience, or academic background. Read on to get started!
Tags : 
    
Entelo

BREAKING THE DAM

Published By: Adobe     Published Date: Jul 04, 2016
Your effectiveness at creating, sharing and deploying creative digital assets has a direct impact on your ability to create compelling customer experiences. And digital asset management (DAM) is the foundational piece in that effort. But be careful. There’s danger in the attitude, ‘We have a DAM.
Tags : 
creative digital assets, share digital assets, asset management, digital asset management, dam, document management, information management
    
Adobe

Breaking The Kill Chain Stopping Data Breaches With Privileged Access Management

Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged identity, accounts and credentials are core, critical assets for enterprises that must be highly protected through a combination of technology and processes which are enabled by privileged access management. Delivering that protection is instrumental in breaking the data breach kill chain, helping to prevent attacks and mitigating the impact of those that do occur.
Tags : 
data breach, it security, malicious spyware, security management, cloud security, system protection
    
CA Technologies

Brilliant Advertising

Published By: Adobe     Published Date: Mar 03, 2017
Programmatic advertising is full of complex patterns. Very similar to patterns in nature. Our guide, Brilliant Advertising, shows how fractals in nature perfectly describe the complexity of programmatic ads and pave the way for how you should approach creative assets. Read the guide to learn five ways to overcome challenges to programmatic ads, including how to: • Bring marketers, creatives, IT, and data analysts together to ensure success • Save money and time while improving engagement and conversion • Customize multiple versions of one campaign and serve ads with strong creative in real time
Tags : 
adobe media optimizer, programmatic advertising, engagement and conversion, application integration
    
Adobe
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.