business practices

Results 1 - 25 of 581Sort Results By: Published Date | Title | Company Name
Published By: CrowdStrike     Published Date: Feb 01, 2017
Once a “consumer-only” problem, Ransomware now has an established business case for profitability, and that’s driving criminals to expand their operations and hunt for more lucrative prey. As a result, commercial enterprises and other large organizations are increasingly in the crosshairs. Consider these facts: ? Ransomware attacks doubled in 2015 ? The number of new ransomware variants increased 17% in Q1 2016 ? The FBI estimates that ransomware will net criminals $1 billion in 2016 This white paper dives into the inner workings of ransomware, its perpetrators and how they are evolving to maximize profits. You’ll also learn how companies are fighting back, and review best practices for protecting your organization from becoming another victim of electronic extortion.
Tags : 
    
CrowdStrike
Published By: IBM     Published Date: Apr 20, 2017
Security from design through deployment. Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. However, to achieve these benefits, it is imperative that mobile security best practices are incorporated throughout the lifecycle of the application.
Tags : 
    
IBM
Published By: CDW     Published Date: Feb 27, 2015
The real test of any SAM system goes beyond creating a one-time Effective Licensing Position (ELP) for a given software publisher. To be truly valuable, the SAM solution has to have the ability to manage change. Being able to work from a dependable list of software that has been approved by, and which also serves the business, means that finite IT & SAM resources are not wasted through the support of legacy software that might be deemed redundant, and should keep a company on track technically by not becoming dependent on aging software. This 10 –Minute Guide from SAM experts at Snow Software will show how to establish and maintain a Software Catalog for the purpose of ensuring that your software estate remains relevant and fit for its business purpose.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
    
CDW
Published By: Cisco     Published Date: Mar 17, 2017
Digital transformation significantly improves the performance and reach of an enterprise and has become a top priority for IT and business leaders across the globe. Read on to find out how Cisco's Architecture can enable Digital Transformation.
Tags : 
digital transformation, architecture, business processes, best practices, customer engagement, employee engagement
    
Cisco
Published By: Cisco     Published Date: Sep 21, 2017
Digital transformation isn’t a technology or a product. Rather, it’s a philosophy for using digital assets to change the way an organization runs. It involves realigning technology and modifying business processes to better engage employees, customers and other constituents of the extended enterprise. Digital transformation significantly improves the performance and reach of an enterprise and has become a top priority for IT and business leaders across the globe. Read on to find out how Cisco's Architecture can enable Digital Transformation.
Tags : 
digital transformation, architecture, business processes, best practices, customer engagement, employee engagement
    
Cisco
Published By: Impact Radius     Published Date: Oct 14, 2014
Affiliate marketing is big business and it is poised to grow to $4.5 billion by 2016! While affiliate marketing is growing and evolving, the best practices for this channel seem to be outdated and causing stagnating campaigns, weak affiliate relationships, and status quo sales metrics. Download this Whitepaper that outlines 10 new performance marketing best practices that will keep your affiliate program manageable, targeted, and profitable
Tags : 
    
Impact Radius
Published By: Palo Alto Networks     Published Date: Dec 11, 2013
The 10 Things Your Next Firewall Must Do outlines the latest capabilities that a firewall should possess and helps you learn how to choose a firewall that can safely enable your business in the ever-changing world of network security. In this free booklet, you'll find an insight and practical advice on: - Considerations for choosing your next firewall - Best practices for implementing safe application enablement policies - Essential firewall capabilities for battling modern threats
Tags : 
firewall, palo alto, security, network security, safe applications, cyber threats
    
Palo Alto Networks
Published By: Upside Travel     Published Date: Sep 20, 2019
A growing business can mean early mornings, late nights, business trips, impromptu meetings - the list goes on. With all this growth also comes the need to streamline and manage costs, all while keep your employees happy. Especially when it comes to the travel portion. Often one of the most costly line items, implementing the right travel practices at any stage of growth can make a significant impact on your team and overall business. In this guide, we break down the best travel practices to keep employee morale high and move your business forward.
Tags : 
business travel/travel expenses, group travel, incentive travel, travel management, operational efficiency
    
Upside Travel
Published By: Tapinfluence     Published Date: Jun 07, 2016
By utilizing these best practices from TapInfluence, you’ll increase your brand’s credibility while building goodwill and trust with potential customers. Incorporating the expert voices of industry influencers engages your audience, highlights brand integrity, and helps further your marketing goals.
Tags : 
marketing, content marketing, best practices, business optimization, business practices
    
Tapinfluence
Published By: Polycom     Published Date: Jun 08, 2016
"There are many ways to take advantage of the rich set of collaboration tools provided by Microsoft Skype for Business. IT leaders should consider a cap-and-grow Skype for Business strategy and then think through how it can be leveraged as a replacement technology. Digest this white paper by leading UC analyst Zeus Kerravala for insight on the 14 best practices for a Skype for Business Enterprise Voice deployment. Enabling IM and presence first, expanding desktop applications, and more are details in this informative piece. "
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, productivity
    
Polycom
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Fortinet’s 2018 Security Implications of Digital Transformation Survey looks at the state of cybersecurity in organizations around the world from the lens of digital transformation (DX). Three hundred responses from CISOs and CSOs at large organizations helped us identify several current trends: n Digital transformation is the most impactful IT trend on businesses today, with 92% responding that it has a large impact today. n Security is by far the biggest challenge to DX efforts, with 85% of respondents saying it has a large impact. n The typical organization saw four attacks that resulted in data loss, outages, or compliance events over two years. n Many companies have automated some of their security procedures, but they are even further behind with other security best practices. n Big chunks of infrastructure remain vulnerable in the typical organization, with 25% of the infrastructure not adequately protected at the typical organization. Looking more deeply into the data, we ident
Tags : 
    
Fortinet EMEA
Published By: Ahead     Published Date: Nov 30, 2018
Over the past seven years, we’ve surveyed more than 30,000 technical professionals around the world to explore the relationships between IT performance, DevOps practices, culture, organizational performance and other elements that affect business outcomes. In the process, we’ve built the deepest and most widely referenced body of DevOps research available. The 2018 State of DevOps Report breaks new ground in our understanding of the DevOps evolutionary journey. We have identified the five distinct stages of DevOps evolution, and the critical practices at each stage that help you achieve success and progress to the next phase of your journey.
Tags : 
    
Ahead
Published By: Hyland Software     Published Date: Dec 17, 2013
Businesses are discovering how to create efficiencies and meet constantly evolving business needs with an enterprise content management (ECM) solution. Make ECM work for your organization by researching best practices and knowing your options.
Tags : 
emc, enterprise content management, emc solution, automated processing, workflow, integration, emc strategy, onbase
    
Hyland Software
Published By: Onbase     Published Date: Feb 18, 2016
Today’s increasingly competitive global economy requires businesses to make decisions faster than ever. Businesses need instant insight into the status of their people and processes. But manual, paper-based processes undermine decision-making. Paper makes it difficult for businesses to make smart decisions about their operations and their working capital. Manual processes also are costly and inefficient, create headaches for front-line staff, introduce compliance and security risks, and stymie collaboration with trading partners.
Tags : 
finance, decision-making, accounts payable, business practices, finance management
    
Onbase
Published By: Cherwell Software     Published Date: Sep 22, 2015
This ebook provides three concrete methods for keeping modern IT departments cutting edge and competitive.
Tags : 
application management, business intelligence analytics, business process management (bpm), contact center solutions, customer service best practices
    
Cherwell Software
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : 
ransomware, security, risk reduction, containerization, data security
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : 
ransomware, risk reduction, data security, collaboration, containerization
    
Citrix ShareFile
Published By: Great Bay Software     Published Date: Jan 09, 2019
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: Tenable     Published Date: Jan 25, 2019
"Web application attacks are the top source of data breaches today. The 2018 Cybersecurity Insiders Application Security Report reveals that 62% of cybersecurity professionals are at best moderately confident in their organization’s application security posture. Not surprisingly, about the same number consider their application security strategies immature.Applications play a critical role in supporting key business processes, but organizations are struggling to keep them safe. This eBook examines the 5 best practices for application security. Read this ebook now to understand: -Which types of apps present the highest security risk -Best practices for reducing security risks associates with web applications -Steps you can take now to secure web applications "
Tags : 
    
Tenable
Published By: Great Bay Software     Published Date: Apr 12, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jul 16, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: GSS Infotech     Published Date: Jun 11, 2013
Organizations in the SMB segment are constantly looking at new ways to remain competitive. One path is to improve efficiency by streamline and improving core business practices.
Tags : 
gss infotech, service desk, smb, help desk, smb service desk function, software tools, it management
    
GSS Infotech
Published By: SAS     Published Date: Aug 28, 2018
“Unpolluted” data is core to a successful business – particularly one that relies on analytics to survive. But preparing data for analytics is full of challenges. By some reports, most data scientists spend 50 to 80 percent of their model development time on data preparation tasks. SAS adheres to five data management best practices that help you access, cleanse, transform and shape your raw data for any analytic purpose. With a trusted data quality foundation and analytics-ready data, you can gain deeper insights, embed that knowledge into models, share new discoveries and automate decision-making processes to build a data-driven business.
Tags : 
    
SAS
Published By: SAS     Published Date: Mar 06, 2018
For data scientists and business analysts who prepare data for analytics, data management technology from SAS acts like a data filter – providing a single platform that lets them access, cleanse, transform and structure data for any analytical purpose. As it removes the drudgery of routine data preparation, it reveals sparkling clean data and adds value along the way. And that can lead to higher productivity, better decisions and greater agility. SAS adheres to five data management best practices that support advanced analytics and deeper insights: • Simplify access to traditional and emerging data. • Strengthen the data scientist’s arsenal with advanced analytics techniques. • Scrub data to build quality into existing processes. • Shape data using flexible manipulation techniques. • Share metadata across data management and analytics domains.
Tags : 
    
SAS
Published By: Microsoft Azure     Published Date: Apr 10, 2018
Learn about the five gaps that could be costing you time, customers, and profit in this digital e-book. Discover how to close those gaps and transform your people, process, and technology to better serve your customer. You’ll also learn how to: Create a unified view and deliver personalized experiences to your customers across all touchpoints and channels. Provide actionable insights to your sales and marketing team so they can work together more effectively. Bring intelligence to your data and connect it with content and processes, so you can make better, faster decisions. Transform your business by connecting sales and marketing with a shared set of successful business practices.
Tags : 
    
Microsoft Azure
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com