RecruitingBlogscom

Follow Us:

 

business

Results 13376 - 13400 of 14340Sort Results By: Published Date | Title | Company Name
Published By: Urban Airship     Published Date: Apr 17, 2014
Are you ahead or behind in mobile? How does your business compare to other brands, and to your industry? The Mobile Maturity Benchmarks Report answers these questions with a comprehensive survey of 500 mobile executives, marketers and developers across eight industries.
Tags : 
urban airship, mobile, mobile marketing, app, mobile app, app platform, mobile maturity, benchmarking
    
Urban Airship
Published By: Urban Airship     Published Date: Oct 18, 2017
Learn the Pros & Cons of Leaders in the Engagement Space to ID the Best Solution for Enterprise Marketers The first-of-its-kind Forrester Wave™ on Mobile Engagement Automation helps digital business and marketing professionals make the right choice to power that next level of hyperpersonalized customer engagement — whether on mobile, or not. Get your complimentary report to learn: ? Which vendors Forrester analyzed based on a 30-criteria evaluation ? How these vendors differ on current offering, strategic vision and market presence ? Why more companies are investing in mobile engagement automation ? The considerations needed to make the right choice for enterprise marketers
Tags : 
    
Urban Airship
Published By: Urban Airship     Published Date: Oct 18, 2017
FIGHT THE FOMO! MAKE SURE YOU CHOOSE THE RIGHT MOBILE ENGAGEMENT VENDOR You've been tasked with evaluating mobile engagement vendors. Now what? Be sure you’re asking the right questions. We’ve gathered questions 14 key areas to ask vendors based on a few data sets — high-level thoughts from analyst firms like Forrester, the best questions prospective customers ask us, what we wish customers in certain verticals would ask, and more. It's thorough and it’ll give you a solid, informed place to start. Download the RFP template and get: ? A comprehensive list of 150+ questions in 14 key areas — and the business reasons behind asking them ? Recommendations for vertically-specific questions to ensure you’re including what’s most critical to getting your needs met
Tags : 
    
Urban Airship
Published By: UrbanCode     Published Date: Jul 09, 2013
Pressures from the business are producing frequent, incremental releases that increase the number of applications needing to be released.
Tags : 
urbancode, release process, release management, increase release management, it management
    
UrbanCode
Published By: UrbanCode     Published Date: Jul 09, 2013
An organization considering the adoption of deployment automation will do so to meet its own business objectives. Some organizations may be focused on clear reporting for audit, while others will be focused on getting features to market more quickly.
Tags : 
urbancode, deployment automation, automated deployments, release operations, networking, security, software development, knowledge management
    
UrbanCode
Published By: UrbanCode     Published Date: Jul 09, 2013
Adapting and responding quickly to business needs is dramatically chang-ing how IT teams operate. Teams need to be responsive to business requirements, enabling companies to gain ground in their market and keep up with changes in technology.
Tags : 
urbancode, continuous release and deploy, enterprise software delivery
    
UrbanCode
Published By: US Bank     Published Date: Feb 02, 2017
The average organization spends up to 10% of its annual budget on T&E, making it one of the largest controllable areas of discretionary spending. Combined with the fact that up to 90% of employee expenses are incurred on business trips each year, this means accurate expense management is more important than ever. Yet many organizations still rely on manual processes and paper-based tracking that can create serious expense management challenges for their finance teams: how can they control costs when they lack visibility into spending? Yet how can they increase visibility and control without sacrificing employee trust and empowerment? Streamlining expense management can help organizations save money, gain efficiencies and maintain control while increasing employee flexibility and freedom. But there’s no such thing as a “one size fits all” solution—different organizations require different solutions to meet their unique needs. However, when they start to consider their options, nearly
Tags : 
expense management, expense management automation, us bank, employee satisfaction, employee retention, employee connectivity, data security, employee rewards
    
US Bank
Published By: UsedCisco.com     Published Date: May 14, 2008
An incredible array of organizations from both the public and private sector are buying pre-owned. These organizations include global public commercial enterprises, small businesses, ISP's, telecoms, non-profits, local and US government, military and educational institutions of all kinds. An overwhelming majority of the customers we've surveyed mention the same fact - they just didn't know pre-owned was a real, safe and viable option. In this guide, we'll present you with critical information you need to make the switch.
Tags : 
pre-owned, used, cisco, usedcisco, used cisco, green, cost, usedcisco.com
    
UsedCisco.com
Published By: Varonis     Published Date: Nov 12, 2013
The purpose of this document is to explain how Varonis products can help ease migration to Microsoft SharePoint, and how it can help keep data properly managed and protected once data has been moved.
Tags : 
varonis, sharepoint, sharepoint migrations, managing sharepoint content, protecting sharepoint content, project plan, sharepoint deployment, datadvantage
    
Varonis
Published By: vCom Solutions     Published Date: Sep 25, 2012
Build a Winning Business Case for TEM
Tags : 
vcom, solutions, tem, telecom, expense, management, free webinar, roi
    
vCom Solutions
Published By: Vectra Networks     Published Date: Aug 03, 2015
The Dyre family of banking malware is back in the news after researchers recently observed that the malware incorporated tricks to avoid detection in malware sandboxes. Previously, Dyre was most notable for targeting high value bank accounts, including business accounts, and incorporating sophisticated social engineering components to overcome the 2-factor authentication used by most banks.
Tags : 
malware, data, malware, banking, malware sandbox, authentication, two-factor authentication
    
Vectra Networks
Published By: Vectra Networks     Published Date: Nov 05, 2015
Covert communications are key enablers of cyber attacks that allow remote humans to patiently manage and direct their attacks undetected. Attackers choose these vehicles specifically for their ability to evade signatures, malware sandboxes and reputation lists. To learn how Vectra empowers security teams to automatically pinpoint active cyber attacks as they’re happening, correlate threats with the hosts that are under attack, prioritize attacks that pose the greatest business risk, and quickly prevent or mitigate loss, register to get the white paper Detecting Covert Communications.
Tags : 
malicious covert communications, cyber attacks, undetected attacks, business risk, prevent and mitigate loss, security
    
Vectra Networks
Published By: Veeam '18     Published Date: Mar 13, 2018
Disaster recovery (DR) planning has a reputation for being difficult and time consuming. Setting up alternate processing sites, procuring hardware, establishing data replication, and failover testing have been incredibly expensive undertakings. To top it all off, the need for 24x7x365 business application availability threatens to make disaster recovery planning an exercise in futility.
Tags : 
draas, business, applications, planning, business, optimization
    
Veeam '18
Published By: Veeam '18     Published Date: Mar 13, 2018
As a smaller organization tasked with big responsibilities – public health and exceptional customer service around the clock – Vallejo needed a backup solution that kept pace with the growing needs of their company and customers and was easy to manage. They understood that backups played a critical role to success, but their existing solution was slow, cumbersome and expensive in their new, virtualized environment. They needed a solution that would boost backup speeds within their existing HP architecture while simplifying and streamlining management and cutting costs.
Tags : 
digital, customer, solutions, optimization, business
    
Veeam '18
Published By: Veeam '18     Published Date: Dec 04, 2018
"Ransomware is top of mind for many organizations’ leaders as their organizations face the potentially disastrous aftermath of successful attacks. ESG has surveyed IT leaders and organizations to find out how big of a problem ransomware is, what are the business consequences of downtime caused by these attacks, and which are some of the best practices and capabilities organizations need to apply to be protected. According to the ESG research, nearly two-thirds of surveyed organizations across North America and Western Europe experienced a ransomware attack at some point last year, with 22% reporting weekly attacks. The attacks have helped make cybersecurity a target of IT investment, and spending is accelerating. What’s needed to fend off this epidemic are best practices and tools to: Prevent or at least mitigate attacks Protect data and backup data Recover reliably"
Tags : 
    
Veeam '18
Published By: Veeam '18     Published Date: May 01, 2019
The digital revolution is transforming every industry. Yet it also brings new challenges: threats to the security and Availability of mission-critical data and services. Approximately 80% of IT decision-makers say their organization has an Availability gap, that is, a failure to meet recovery requirements—a common issue across all industries. 75% say they also have a data protection gap, meaning they are unable to protect their data frequently enough to ensure that business units’ expectations against data loss are being met.
Tags : 
    
Veeam '18
Published By: Veeam '18     Published Date: May 01, 2019
This 5-minute, easy-to-read document explains why organizations need to protect Office 365 data. This report will teach you: • The big misunderstanding between Microsoft's responsibility and the IT organizations • 6 reasons why backing up Office 365 is critical • Who is in control of Office 365 data
Tags : 
    
Veeam '18
Published By: Veeam '18     Published Date: May 01, 2019
Downtime & Data Loss are Business Problems, not IT Issues Data protection and backup are often among the least appreciated aspects of IT, both in terms of budget and the perception of creating “business value” for the broader organization. Arguably, data protection and backup aren’t always respected even when compared to other facets of IT — until something fails, breaks, is overwritten, or corrupted accidentally or on purpose.
Tags : 
    
Veeam '18
Published By: Veeam Software     Published Date: Nov 28, 2012
Windows Server 2012 represents a paradigm shift from the traditional client/server model to a new cloud-based infrastructure. Is your business ready? Download this whitepaper to learn the 7 key questions you need to answer now
Tags : 
hyper v, servers, storage, cloud based infrastructure, storage solutions, data center, backup and recovery, disaster recovery
    
Veeam Software
Published By: Vehicle Tracking Solutions     Published Date: May 31, 2018
Safety is a top priority for companies with a fleet of drivers and vehicles. It starts with hiring and screening new employees with safe driving records and qualifications. You may even have written safety policies. However, having visibility into your driver’s whereabouts and their behaviors behind the wheel is key in identifying and preventing risks before it costs your business. Do you wish that you could sit in the passenger seat of every vehicle in your fleet to watch driver behavior? With data-driven fleet safety management software from Silent Passenger you can. According to NHTSA, the cause of 94% of collisions is driver error. By monitoring unsafe driver behaviors such as speeding, hard braking, and fast acceleration is key to preserving fleet safety. A reliable fleet safety management software delivers key business intelligence that helps maintain fleet efficiency and productivity on the road. Improve Safety and Reduce Operational Costs Running a safer fleet can have a signif
Tags : 
    
Vehicle Tracking Solutions
Published By: Vena Solutions     Published Date: Oct 29, 2018
With such proven and widely recognized benefits, how many companies are using rolling forecasts today? The short answer is, it depends on whom you ask. On the whole, adoption rates range from less than 5% to over 75%, depending on how you define a true rolling forecast.
Tags : 
rolling forecasts, financial forecasting, financial rolling forecast, business rolling forecasts, static budget, monthly forecast updates, quarterly forecast updates, driver based forecasts
    
Vena Solutions
Published By: Vena Solutions     Published Date: Oct 29, 2018
As digitization drives business at ever-faster speeds, CFOs recognize the need to keep pace. They understand the importance of financial planning and analysis (FP&A) solutions that allow their finance teams to develop budgets and forecasts quickly and accurately. They need confidence in their numbers and the decisions they drive. But selecting the right FP&A software is only half the battle.
Tags : 
fp&a software, fp&a, financial planning and analysis, fp&a solutions, financial planning, financial analysis, fp&a process, fp&a implementation
    
Vena Solutions
Published By: Vena Solutions     Published Date: Oct 29, 2018
Based on in-depth research and customer interviews, the annual Nucleus Research Value Matrix map out the corporate performance management (CPM) market landscape, evaluating vendors on a matrix contrasting usability and ease-of-use versus features and depth of functionality. Read or download the 2018 edition to uncover the most up-to-date CPM landscape, to find the best finance software solution for your needs, and to see why Vena led the pack in usability to land in the Leader quadrant for the third straight year.
Tags : 
nucleus research, cpm matrix, cpm technology value, cpm technology matrix 2018, excel replacement, financial planning, budgeting, forecasting
    
Vena Solutions
Published By: Venafi     Published Date: Mar 04, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security staff who are interested in detailed attack methods and remediation tactics. The executive summary is intented for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business. The attack scenario described in this technical white paper is based on a reproduction of a real-world attack in a Raxis test environment that simulated an enterprise security infrastructure.
Tags : 
venafi, ssh keys, vpn credentials, digital certificates
    
Venafi
Published By: Venafi     Published Date: Mar 26, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security sta? who are interested in detailed attack methods and remediation tactics. The executive summary is intended for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business.
Tags : 
secutiry, certificates, keys, security attacks, business
    
Venafi
Start   Previous    529 530 531 532 533 534 535 536 537 538 539 540 541 542 543    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top