it employees

Results 326 - 350 of 1255Sort Results By: Published Date | Title | Company Name
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
When your business doesn’t provide adequate digital collaboration tools, your employees are likely to use their own – potentially compromising security. Read this informative whitepaper for three ways to improve employee collaboration while ensuring compliance with security policies: Why a consolidated approach to file sharing can boost security and productivity How business-wide adoption of enterprise-level tools aids workplace mobility What time-consuming tasks can be automated to improve efficiency and security
Tags : 
data security, mobility, content collaboration, security efficiency, productivity
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 24, 2017
In just a few years, we’ve learned to rely on our phones for everything from banking to email to watching cat videos. Most importantly, it’s a safe bet your employees are using mobile devices for work-related activities as well – whether your IT department is prepared for it or not. The proliferation of internet devices makes it simply too easy for employees to check emails en route to the office or give a project that final once over from their couch at home. Smart businesses are already taking advantage of this trend, and reaping the benefits of productivity and employee satisfaction. Is yours?
Tags : 
mobility, productivity, employee satisfaction
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 24, 2017
Known popularly as “Bring your own device”, or BYOD, the practice of working from personal devices is growing at a rapid pace.. And while security is real concern with BYOD, a recent survey found that employees are actually more cautious when using a personal device for work purposes
Tags : 
personal device, byod, survey
    
Citrix ShareFile
Published By: Secureworks     Published Date: Oct 04, 2017
The General Data Protection Regulation1 is a European Union regulation with the full title of ‘Regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, which repeals Directive 95/46/EC (General Data Protection Regulation)’. It’s the first comprehensive overhaul and replacement of European data protection legislation in over twenty years and could be the most significant regulatory framework to hit organizations since Sarbanes-Oxley in 2002. Its purpose is to replace the varying implementations across Europe of the earlier EU Data Protection Directive with a single harmonized EU regulation. The intended outcome is a standardized set of expectations about how an organization must manage and protect personally identifiable information on employees, clients and other applicable data subjects. Any organization that holds data on EU citizens, regardless of where it is domiciled, within the EU or otherwise, is in sco
Tags : 
    
Secureworks
Published By: Lookout     Published Date: Dec 11, 2018
There are three key statements enterprises must hear in order to move forward in protecting corporate resources from leakage and attack: The perimeter has disappeared. Legacy security technologies do not work. Devices cannot be trusted. A new security architecture is needed to protect data as employees and devices connect to corporate resources in the cloud, all over the world. That architecture is post-perimeter security. Read this whitepaper to: Learn why perimeter security is not longer viable Understand the new, necessary security architecture: post-perimeter security Learn how phishing attacks are thwarting traditional firewalls Find out how Lookout enables enterprises to embrace post-perimeter security in their own environments
Tags : 
    
Lookout
Published By: Carbonite     Published Date: Oct 10, 2018
With more and more employees spread around the globe, IT teams face a conundrum: how to secure an increasing amount of data traveling outside the network while preserving workforce productivity in an increasingly interconnected and global market. It’s up to IT decision-makers to protect and secure company data in a way that promotes user access without imposing overly restrictive or cumbersome device policies. When it comes to protecting data on laptops and mobile devices, several key factors are essential for today’s businesses:
Tags : 
    
Carbonite
Published By: Zebra Technologies     Published Date: Dec 20, 2017
Delivering the best possible care to every patient is a complex, interconnected process that involves every department in a healthcare facility. From the moment a patient enters a facility, a wide range of activities must be performed by many different employees from different functional areas — in a timely and efficient way—to ensure the best possible outcome, including performing tests, collecting specimens, administering medications and delivering treatments. Each one of these activities must be coordinated and documented as part of an overall care plan. But the first step is making sure clinicians are treating the right patient—in the right way—every time. Zebra’s white paper explores the critical impact positive patient identification (PPID) has on patient safety throughout the administrative, diagnostic and treatment phases of a patient’s stay. The paper also explores how PPID can improve staff efficiency and help healthcare organizations meet the needs of changing patient dem
Tags : 
    
Zebra Technologies
Published By: DocuSign UK     Published Date: Nov 16, 2017
"Today’s procurement leaders are using technology to achieve greater procedural and financial efficiencies, secure the best products and services, and improve vendor relationships. However with the lack of technology to boost efficiency and strengthen the partnership with vendors and employees, saving costs and speeding up procurement processes can be quite cumbersome. Industry experts predict that successful businesses will soon become 100% digital for all transactions. The challenge is how to “go digital” in the right ways. Download this best practices paper to learn the eight important ways that procurement teams can make meaningful progress in their digital transformations. "
Tags : 
procurement, professionals, practices, departments, digital, docusign, esignature
    
DocuSign UK
Published By: Schneider Electric     Published Date: Feb 12, 2018
Use of cloud computing by enterprise companiesis growing rapidly. A greater dependence on cloud-based applications means businesses must rethink the level of redundancy of the physical infrastructure equipment (power, cooling, networking) remaining on-premise, at the “Edge”. In this paper, we describe and critique the common physical infrastructure practices seen today, propose a method of analyzing the resiliency needed, and discuss best practices that will ensure employees remain connected to their business critical applications.
Tags : 
    
Schneider Electric
Published By: Abacus Labs     Published Date: Jan 11, 2019
Abacus is a real time expense reporting solution that processes individual expenses as they flow into the system. No expense report required. It provides finance teams unprecedented visibility into spend and minimizes the work required to submit expenses. At one time, the most efficient way to get expense documentation from employees to the finance team was to tape receipts together and fill out templated forms. Today we have mobile cameras, automated accounting software, and convenient apps for peer-to-peer payments. We live in a world of real time data. You should be able to submit your expenses as easily as you pay a friend for your half of dinner!
Tags : 
    
Abacus Labs
Published By: Abacus Labs     Published Date: Jan 11, 2019
Abacus is a real time expense reporting solution that processes individual expenses as they flow into the system. No expense report required. It provides finance teams unprecedented visibility into spend and minimizes the work required to submit expenses. At one time, the most efficient way to get expense documentation from employees to the finance team was to tape receipts together and fill out templated forms. Today we have mobile cameras, automated accounting software, and convenient apps for peer-to-peer payments. We live in a world of real time data. You should be able to submit your expenses as easily as you pay a friend for your half of dinner!
Tags : 
    
Abacus Labs
Published By: PwC     Published Date: Jun 20, 2018
Digital Fitness Assessment 2.0 is here. The time to upskill is now. Let’s face it--every industry is being disrupted. To stay profitable and lead the way, it’s critical to be deliberate about making sure your employees have the skills they’ll need to take you there. The Digital Fitness Assessment will help your employees build their future through a custom experience that targets specific skills and behaviors to each employee. Get a demo here. [Please confirm link works and is tracked] What if you could give every employee a blueprint for tomorrow's most-needed skills? Your people know they need new skills--and most are eager to get them. But, what most companies offer is, well, standardized. That can make it boring and not applicable. To stand out and bring your workforce into the future, you need a creative, personal--and even enjoyable--learning experience. The Digital Fitness Assessment will help your employees build their future. Get a demo here. [Please confirm link works and is
Tags : 
    
PwC
Published By: PwC     Published Date: Jul 19, 2018
What if you could give every employee a blueprint for tomorrow's most-needed skills? Your teams know they need new skills--and most are eager to get them. But, what most companies offer is, well, standardized. That can make it boring and not applicable. To stand out and bring your workforce into the future, you need a creative, personal--and even enjoyable--learning experience. The Digital Fitness Assessment will help your employees build their future. Get a demo here.
Tags : 
    
PwC
Published By: PwC     Published Date: Jun 13, 2019
A CEO scans the competitive landscape, and decides it’s time to implement new strategies or to examine internal factors that are limiting growth. With buy-in from senior leadership, the company makes a significant investment in a months-long process designed to yield actionable insights. A few areas may be singled out for a deep-dive examination of how work is performed and where pain points exist. After interviewing employees at various levels, creating detailed documentation, and making recommendations, the company is ready to pilot changes, measure results, and roll out strategies to larger groups of stakeholders.
Tags : 
    
PwC
Published By: Workday APAC     Published Date: Jul 24, 2019
Learn how Natixis deployed Workday to automate tasks, gain better insights via dashboards, track processes and encourage its employees' learning and development.
Tags : 
    
Workday APAC
Published By: Citrix ShareFile     Published Date: Jun 12, 2017
Some of the biggest challenges IT teams face today stem from data loss and security risks arising from the unauthorized use of personal file sharing services by employees for business purposes. Personal file sharing services invite data leakage and compliance violations by allowing files being shared to escape beyond the visibility and control of IT. At the same time, these services meet the essential need of today’s mobile workforce to be able to access and share data wherever people work. Learn how enterprise-ready file sharing solutions exceed employee needs while securing and mobilizing business data.
Tags : 
data loss, security, file sharing, mobile workforce
    
Citrix ShareFile
Published By: Limeade     Published Date: Feb 02, 2017
Who says you can’t have it all? With work-life balance, that might be true but there’s another way: work-life integration. Download our ebook to learn how employees can integrate all parts of their work and life to be engaged, happy, and productive.
Tags : 
    
Limeade
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies
Published By: Centrify Corporation     Published Date: May 22, 2018
A significant paradigm shift occurred in the last few years. Much like other technological shifts of the last decade — when cloud computing changed the way we do business, agile changed the way we develop software and Amazon changed the way we shop — Zero Trust presents us with a new paradigm in how we secure our organizations, our data and our employees. While difficult to identify the precise tipping point, one thing is certain: what were once extraordinarily high-profile, damaging breaches are no longer extraordinary. In just the last 18 months, Yahoo, Accenture, HBO, Verizon, Uber, Equifax, Deloitte, the U.S. SEC, the RNC, the DNC, the OPM, HP, Oracle and a profusion of attacks aimed at the SMB market have all proven that every organization — public or private — is susceptible. The epiphany behind the paradigm shift is clear: Widely-accepted security approaches based on bolstering a trusted network do not work. And they never will. Especially when businesses are dealing with skill
Tags : 
    
Centrify Corporation
Published By: Citrix Systems     Published Date: Jul 25, 2016
NetScaler MobileStream™ technology from Citrix enables enterprises to do more than simply get by when it comes to the performance and security of mobile workspaces. Building on the gains derived from the core set of NetScaler functionality, NetScaler MobileStream combines a suite of multi-layer optimizations purpose-built to accelerate mobile service delivery with an essential collection of secure access and threat protection capabilities for mobile computing. The result is a unified solution that not only provides the peace of mind IT needs but also delivers the exceptional mobile experience your employees, customers and partners deserve. Put another way, the result with NetScaler MobileStream is a dramatic improvement in mobile service performance and protection that makes Citrix NetScaler® the world’s fastest and most secure delivery platform for mobile workspaces.
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 25, 2016
The modern enterprise workforce poses new challenges for IT. Today’s employees work in more places, on more devices— personal or company-owned—and over more networks than ever, using a diverse array of datacenter applications, mobile apps, SaaS and cloud services. As they move among apps, networks and devices, IT needs to be able to control access and ensure data and application security without impeding productivity. That means enabling users to get to work quickly and easily in any scenario without having to deal with different ways of accessing each app. Traditional VPNs and point solutions add complexity for both users and IT, increase costs and fail to enable a holistic approach to business mobility. Over the years, many IT organizations have addressed these evolving requirements through point solutions and by case-by-case configuration of access methods. The resulting fragmented experience poses a key roadblock to productivity and increases user frustration. For IT, the lack of a
Tags : 
    
Citrix Systems
Published By: Citrix     Published Date: Nov 09, 2012
Companies of all sizes are witnessing the changes in types of devices entering the workplace, fueled by the employees, not IT. Employees want to be able to have a device of their choice. This paper discusses the concept of BYO, Bring Your own.
Tags : 
citrix, bring your own device, bring your own, byo, devices, it management, enterprise applications, data center
    
Citrix
Published By: Dell & Microsoft     Published Date: Jul 23, 2013
As small businesses grow, many reach a point when their computing systems falter. A company with only a handful of employees can usually get by with disconnected computers and software packages. But as you add desktops, laptops and other devices to support an increasing headcount, the system can become so cumbersome that productivity and customer service start to suffer.
Tags : 
benefits, server, small business, it management
    
Dell & Microsoft
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.