corporate strategy

Results 1 - 25 of 61Sort Results By: Published Date | Title | Company Name
Published By: Group M_IBM Q2'19     Published Date: Apr 02, 2019
As the foundation for most critical business decisions, today's data environments are not just a vital piece of IT infrastructure, but key component of corporate strategy.
Tags : 
    
Group M_IBM Q2'19
Published By: Ricoh     Published Date: Mar 11, 2019
Today’s CIOs no longer just oversee technology. They are now key strategists who guide their organizations and give them the tools they need to stay competitive. A study by Forbes Research stated that five years ago, a CIO’s most critical skill was deploying technology. Now, the #1 way that CIOs provide value is by contributing to the corporate strategy, so they can advance business objectives and drive revenue.1 In particular, CEOs rely on the CIO for guidance around digital transformation. Organizations must transform how they operate and take advantage of new technologies to better engage customers and employees. Digital transformation falls squarely on the shoulders of IT leaders. CIOs are under pressure to drive transformation – overcoming barriers such as cultures that are resistant to change, employees who want to upload files anywhere, and increased concerns about data security. CEOs also expect CIOs to achieve results now. The longer you wait, the more likely you will fall beh
Tags : 
    
Ricoh
Published By: Automation Anywhere APAC     Published Date: May 17, 2019
Much has already been said and written about the infiltration of robotic process automation (RPA) and intelligent automation (IA) technologies into the workforce. In truth, it’s taken the corporate world a while to test, trust and commit to automation at work. To understand how far APAC/ANZ markets have advanced towards acting on these opportunities, the Shared Services and Outsourcing Network (SSON) surveyed the market and found that across the region corporations were forward thinking in building for scale, trusting technology and recognising the need to incorporate robotics into both IT infrastructure and enterprise strategy. This report explains how enterprises across APAC/ANZ are staying ahead of the global wave of RPA, the most popular solutions they are choosing, who the preferred consultants or 'integrators' are, the challenges, and how the digital workforce is being integrated into the human one.
Tags : 
    
Automation Anywhere APAC
Published By: Oracle     Published Date: Jan 12, 2017
Businesses today expect finance to play an extended role across departments, including IT, human resources, compliance, operations, sales, marketing, and most importantly, corporate strategy.To successfully deliver on this role, the finance function needs to play a bigger and visible role in real-time decision making and continuous planning. This report explores how, using cloud and analytics, finance leaders can leapfrog a few generations of technology and offer mature analytical feature/functionality and skills to the entire organization.
Tags : 
    
Oracle
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware. "
Tags : 
dns, rdns, security, zero trust security, malware, data, network security
    
Akamai Technologies
Published By: Dell     Published Date: Nov 12, 2018
Today, IT leaders address the PC lifecycle across a continuum from control to transformation. Control is geared to optimization, while transformation focuses on the business impact of technology. Though the two approaches differ, they are not in opposition. They strive for the same goals and face similar challenges. As IT leaders provide their workforce with the tools to carry out the corporate mission, they should develop a PC lifecycle strategy that encompasses the key organizational needs of systems management, end-user productivity, business innovation and data-centric security. Read this Dell whitepaper to learn more about the findings of a recent Forrester Consulting study, “Digital Transformers Innovate, Digital Controllers Optimize”. This paper will help clarify the PC lifecycle continuum, from the basics of control to the advanced levels of transformation, so you will be better equipped to determine the needs of your organization on that spectrum.
Tags : 
    
Dell
Published By: Prophix     Published Date: Jun 03, 2016
Prophix and IMA hosted a webcast, titled “Overcoming Barriers to Implement CPM Methods”, featuring subject matter expert Gary Cokins, the CEO, at Analytics-Based Performance Management. The adoption rate of business analytics and corporate performance management (CPM) methods has been slowed by various barriers. Gary Cokins outlines the causes of this lag, as well as lessons learned about how to overcome obstacles, and obtain buy-in to manage and improve performance. He describes techniques such as strategy maps, balanced scorecards with key performance indicators (KPIs), channel and customer profitability reporting, and driver-based budgeting that can prevent failure when implementing CPM methods.
Tags : 
prophix, best practices, performance management, business analytics, productivity, information management
    
Prophix
Published By: Schneider Electric     Published Date: Oct 31, 2017
In considering the four principal options of data center modernization, keep in mind that each option need not be treated as a separate and distinct approach. Data center stakeholders may want to combine options in order to better accommodate a particular migration timeline. Or cautious executives may want to simply dabble with the outsourcing option by piloting only a few select applications while still maintaining a core corporate data center. The key critical success factor is the recognition that data center modernization is not a one-time fi x, but rather a critical piece of an ongoing strategy to better service customers.
Tags : 
modernization, data center, investment, cost effectiveness, business sense, outsourced model, resources
    
Schneider Electric
Published By: Dell & Microsoft     Published Date: Aug 14, 2013
Employees are increasingly bringing their own devices to work and accessing corporate IT resources from home. Windows Server 2012 helps mitigate potential security, use and control issues and makes implementing a BYOD strategy easier.
Tags : 
secure mobility, windows server, security
    
Dell & Microsoft
Published By: MobileIron     Published Date: Sep 22, 2014
The release of iOS 8 not only introduces a comprehensive list of features to enable greater enterprise mobility, it also highlights the pervasive need for an agile mobility strategy and EMM platform. According to a March 2014 study conducted by the Ponemon Institute, 50 percent of IT professionals in financial services say their company has no mobile strategy(1). Without a strategic approach to mobility and an EMM provider, organizations lack control over data security, end-user privacy, and mobile technologies that support corporate productivity. As iOS 8 becomes widely adopted, it will impact other mobility trends such as the continued migration away from Blackberry. Enterprises will need to move quickly to address these challenges, so updating the mobile strategy should be a top priority in every IT organization.
Tags : 
ios 8, agile mobility strategy, emm platform, data security, end-user privacy, corporate productivity, mobility trends, it management, wireless, enterprise applications
    
MobileIron
Published By: MobileIron     Published Date: Sep 22, 2014
The release of iOS 8 not only introduces a comprehensive list of features to enable greater enterprise mobility, it also highlights the pervasive need for an agile mobility strategy and EMM platform. According to a March 2014 study conducted by the Ponemon Institute, 50 percent of IT professionals in financial services say their company has no mobile strategy(1). Without a strategic approach to mobility and an EMM provider, organizations lack control over data security, end-user privacy, and mobile technologies that support corporate productivity. As iOS 8 becomes widely adopted, it will impact other mobility trends such as the continued migration away from Blackberry. Enterprises will need to move quickly to address these challenges, so updating the mobile strategy should be a top priority in every IT organization.
Tags : 
ios 8, agile mobility strategy, emm platform, data security, end-user privacy, corporate productivity, mobility trends, it management, wireless, enterprise applications
    
MobileIron
Published By: Cool Effect     Published Date: Mar 05, 2019
Universities around the world are realizing the importance of sustainable practices and are working towards shrinking their carbon footprint by focusing on renewable energy resources, clean technology, and carbon offsets. This guide will provide complimentary information on carbon credits along with case studies where universities have incorporated them into their sustainability strategy. Also included: tips for identifying high-quality credits and avoiding low-quality credits that do not reduce carbon emissions. Read this guide to learn more about what carbon credits are and how to navigate the process of measuring, assessing, and obtaining carbon credits.
Tags : 
carbon offsets, carbon credits, carbon footprint, carbon neutral, carbon emissions, carbon management, tonnes, climate neutral, reduce emissions, greenhouse gas, climate impact, sustainability, corporate responsibility, environmental responsibility, clean technology, renewable energy, voluntary credits, university, higher education, college
    
Cool Effect
Published By: Cisco     Published Date: Dec 27, 2017
Among your primary responsibilities as a board member is providing advice on both business strategy and enterprise risk. A general understanding of risk management is essential when looking at cyber risk specifically. Ultimately, an enterprise should consider adding cybersecurity expertise to its board membership, but all members can benefit from increasing their understanding about how cyber risk affects corporate strategy and the overall enterprise risk profile. To provide effective strategic advice to company leadership on cyber risk, you must ask the right questions, including whether a company does ongoing cyber risk assessment and management, and how.
Tags : 
    
Cisco
Published By: IBM     Published Date: May 26, 2017
Securing your infrastructure, your customer interactions and protecting your data are critical to preserving your reputation and your bottom line. Many cyber attacks remain undetected for up to eight months1 and can cost an organization an average of 11 million USD.2 Today’s cyber actors are becoming more sophisticated, agile and capable of getting past any network security. Organizations must evolve, replacing traditional defensive security strategies with a proactive, intelligence-driven offense to prevent and disrupt these threats. IBM® i2® Enterprise Insight Analysis is a next generation intelligence solution that enables organizations to incorporate cyber threat hunting into their security strategy and turn their defense into a proactive offense.It helps organizations uncover critical insights about their threats and threat actors so they can mitigate and counter more threats with a combination of multi-dimensional visualte analysis capabilities
Tags : 
ibm, ibm i2, cyber security, customer interaction, enterprise insight analysis
    
IBM
Published By: Anaplan     Published Date: Apr 06, 2016
A Harvard Business Review Analytics Services White Paper Finance is constantly tested to keep pace in today’s business environment. To keep up, planning needs to become a continuous process that spans departmental boundaries and enables managers to collectively realign resources to respond to market changes. Organizations must streamline disparate sales and operational planning with traditional financial planning and analysis by using technology to connect people, data, and processes across the organization. Download this white paper to discover the three steps to moving towards finance-led integrated business planning recommended by the Harvard Business Review.
Tags : 
analytics, planning, cfo, operations, business practices, revenue, growth, enterprise business, finance trends, business analytics, business process, harvard business review, hbr, financial planning, corporate finance, fp&a, budgeting, integrated business planning, ibp, finance
    
Anaplan
Published By: KPMG     Published Date: Jul 10, 2018
Alliances are becoming a key part of corporate strategy for organisations seeking to keep abreast of disruptive technologies. Is this the right route for your organisation – and how can you maximise the chances of success? Download this report to find out: • how alliances are reshaping industries worldwide • whether strategic alliances are a viable alternative to M&A • the factors that can make or break an alliance • three priorities for making an alliance work.
Tags : 
    
KPMG
Published By: Keas     Published Date: Mar 02, 2012
The direct and indirect costs associated with Employee Health & Happiness has shifted Employee Wellness from voluntary benefit to Strategic Imperative. HR is on the front lines of this fight. Are you ready?
Tags : 
employee wellness, corporate wellness, human capital management, wellness strategy, employee engagement, human resources, human resource management, talent management, business issues and trends, global hr management, human resources management, management fundamentals, staffing, training and development
    
Keas
Published By: Keas     Published Date: Mar 07, 2012
The economics of employee health & happiness are both frightening and wildly compelling. Companies that seize the Employee Wellness opportunity will win the war for talent and distance themselves from their competition. Wellness is no longer a "nice to have." It's business strategy.
Tags : 
employee wellness, corporate wellness, human capital management, wellness strategy, employee engagement, human resources, human resource management, talent management, business strategy, performance management, compensation, benefits, engagement, business issues and trends, global hr management, human resources management, management fundamentals, training and development
    
Keas
Published By: MuleSoft     Published Date: Apr 13, 2016
New Enterprise challenge has emerged. With the number of APIs growing rapidly, managing them one-off or via Excel or corporate wiki is no longer feasible. The smartest organizations have discovered a set of best practices to design powerful APIs that leverage existing services, to effectively manage those APIs throughout their lifecycle and to scale their deployment across consumers and devices. This eBook examines the relationship between APIs and services and presents the key elements of a successful API strategy in the form of 7 habits. In this eBook you will learn: - How to leverage existing services in the API economy - Where to get started with your API strategy - Key criteria for selecting an API Management solution - Strategies to overcome API security and identity challenges - How and why to apply the fundamentals of API First Design
Tags : 
service management, enterprise applications, best practices, business management, business strategy, application integration, business intelligence, service oriented architecture, web service management, content management system
    
MuleSoft
Published By: Red Hat     Published Date: Jan 02, 2018
Organizations are at a strategic crossroads. According to IDC analysts,1 two-thirds of CEOs will center their corporate strategies around digital transformation initiatives. The goal of digital transformation is only partly to make existing functions more effective. The greater goal is to be able to do new things and use existing data in new, better ways. Yet, 72% of current IT spending2—and the focus of IT resources—is on maintaining existing systems. This creates tension between what needs to be done today and what should be done for the future. Middle-tier applications, according to IDC,3 are the core of a digital transformation strategy because they provide data integration, messaging, and application programming interface (API) management. Middle-tier applications also provide a platform for application development and management that can handle traditional enterprise applications and cloud-native, distributed applications. Specifically, a Java™ EE-based application platform can
Tags : 
    
Red Hat
Published By: Good Technology Corporation     Published Date: Apr 29, 2013
Mobile apps are the ultimate corporate dilemma: They turbo-charge productivity—but also bring security risks. You need a mobile app security strategy to navigate the challenge. Read this guide to learn the top 10 must-haves as you build yours.
Tags : 
mobile applications, mobile security, mobile application management, mobile app security, secure mobile application, enterprise mobile applications
    
Good Technology Corporation
Published By: Cisco and NVIDIA Corporation     Published Date: May 06, 2019
IT organizations are no longer just a business support function and cost center—they are expected to drive business as part of the core corporate strategy. Adding to this, IT landscapes continue to increase in complexity, complicating management and innovation. Digital transformation helps IT adapt to these changes. Building a hybrid or multi-cloud IT environment can help you transform successfully. An effective cloud environment can provide: • Improved infrastructure management and flexibility • More time for IT to focus on strategic projects rather than manage data centers. • Better IT cost management In fact, 49% of companies cite “modernized IT infrastructure and technologies with increased agility, flexibility, manageability, and security” as a digital initiative on their long-term roadmap.
Tags : 
    
Cisco and NVIDIA Corporation
Published By: SAP Inc.     Published Date: Jul 28, 2009
Learn how core corporate processes can help your company meet financial objectives and mitigate risk in troubled economic times.
Tags : 
sap, lean, lean enterprise, three-tierd, operations, lehman, costs, operations, shared services level, corporate level, division level, leadership, crisis management, corporate strategy, enterprise visibility, enterprise applications, governance, united pipe, benchmark, procurement
    
SAP Inc.
Published By: Adobe     Published Date: Apr 04, 2018
Recently the S&P 500 experienced something new: its top four most valuable companies at closing were Apple, Google, Microsoft, and Amazon—all tech companies. It’s a tech world out there, and one increasingly driven by a mastery of mobile. This reality is changing not only consumer expectations, market conditions, and competitive dynamics, but it’s also changing—and challenging— traditional approaches to corporate strategy.
Tags : 
    
Adobe
Start   Previous   1 2 3    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.