like it

Results 326 - 350 of 1599Sort Results By: Published Date | Title | Company Name
Published By: CEB     Published Date: Nov 06, 2013
Talent is an increasingly critical differentiator of corporate performance and poses one of the most significant barriers to growth. CEB research finds that boards at top-performing companies are twice as likely to have a deep understanding of talent issues as boards at lower-performing competitors. However, most boards lack sufficient understanding of key talent issues facing the companies they oversee, particularly because the data and analysis they receive provide limited insight. This whitepaper outlines the critical talent conversations every board should have and shows how industry leaders are broadening their understanding of talent issues and assurance about critical talent risks by expanding the perimeter of talent issues they monitor beyond executive leadership and reshaping conversations on executive performance evaluation and succession.
Tags : 
talent risks, talent issues, talent management, development roi, human resources
    
CEB
Published By: Dyn     Published Date: Mar 30, 2016
IPM offers unparalleled visibility across the Internet allowing you the ability to optimize infrastructure costs, mitigate risk, and protect your revenue. Unlike APM and NPM which only provide visibility into your applications or internal network respectively, IPM provides a complete end-to-end view of the public Internet so you can: - Decide where to host content and applications for top performance - Determine the impact website partners, such as cloud providers and ISPs, have on web responsiveness - Identify optimal cloud hosts, NSPs, CDNs, and SaaS providers for Internet traffic, by region - Monitor and measure service provider performance and SLA compliance
Tags : 
dyn, internet performance management, online performance, ipm, apm, npm, cloud computing
    
Dyn
Published By: Castlight Health     Published Date: Feb 14, 2017
Wish you could get more employees to use their benefits? (And use them wisely?) The Ultimate HR Guide to Promoting Benefits Programs, Tools, and Resources can help you get started. This handy eBook from Castlight Health and Jellyvision explains how to 1) avoid sounding like an insurance robot, 2) find incentives that work (and that don’t bust the budget) and 3) promote your benefit programs — everywhere.
Tags : 
    
Castlight Health
Published By: BI WORLDWIDE     Published Date: Dec 22, 2014
Everyone likes to be noticed. Recognition and rewards help people feel good about what they are doing and things they have accomplished. Recognizing employees will keep them focused, directed and willing to repeat the behaviors they were recognized for. Learn 10 reasons why recognizing your employees really works.
Tags : 
employee engagement, employee recognition, social recognition, mobile recognition, employee awards, employer engagement, incentive programs, employee incentives
    
BI WORLDWIDE
Published By: BI WORLDWIDE     Published Date: Mar 07, 2016
If you’re a sales manager, you’re probably feeling stuck in the middle. On one hand, you have a huge employee engagement movement going on with HR departments focusing on developing leaders and recognizing achievements with substantial budgets. On the other side, marketing departments are using technology and creativity (and also large budgets) to connect with and educate customers about their products, solutions and brands. The trend is to challenge every dollar spent on sales compensation to maximize ROI. HR departments are treating salespeople like all other employees. And customers are going online to avoid anyone with sales in their title. Based on our research and applications we see in our customers’ leading sales initiatives, if you’re a sales manager, you are trying to maximize results out of your sales team by increasing your teams engagement to meet company goals. Download this white paper to see which eight trends you should consider as you strategize for the year.
Tags : 
bi worldwide, sales, incentives, effectiveness, sales incentive, productivity, engagement
    
BI WORLDWIDE
Published By: LifeLock     Published Date: Mar 02, 2015
Today’s workers and consumers conduct more transactions online and through mobile devices than ever before. Their always-connected lifestyles free them to work and play as they like, but may increase the risk of identity fraud.
Tags : 
    
LifeLock
Published By: LifeLock     Published Date: Mar 02, 2015
Mobile devices enable workers to take care of business from virtually anywhere, at any time. But, what’s the catch? Mobile, social media-savvy employees and customers may be more likely to become identity fraud victims.
Tags : 
    
LifeLock
Published By: MobileIron     Published Date: Feb 08, 2017
Enterprise organizations around the world are rapidly shifting their corporate apps and data to the cloud to drive IT efficiency and expand employee access to business processes. This applies not only to productivity suites like Microsoft Office 365, but also to enterprise mobility management (EMM) solutions like MobileIron.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Mar 21, 2017
Over the past few years, organizations have used a variety of tools and technologies to enable basic mobile device management (MDM) and essential apps like email and calendar. But those capabilities are inadequate for companies that want to move beyond the basics and transform their business processes by securely moving apps and data to the cloud. For AirWatch customers, this means they should start evaluating leading enterprise mobility management (EMM) platforms like MobileIron in order to achieve their mobile transformation goals. Our platform is 100% focused on building today’s modern enterprise architecture, which is quickly shifting core business processes away from legacy technologies and standardizing on mobile devices and cloud services.
Tags : 
    
MobileIron
Published By: Mimecast     Published Date: Nov 14, 2018
What if your employees were more informed about security threats, more skeptical about what they receive in email, and less likely to click on malicious links in email without first verifying them? There are some impactful, quick wins that you and your organization can realize by implementing security awareness training. This recent in-depth survey of security professionals by Osterman Research shows that the leading security concerns across organizations are all areas in which security awareness training can yield significant benefits. Here are some suggestions on processes and practices to consider when developing a security awareness training program that will actually change behavior and make the organization less likely to fall prey to a cyberattack.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Mar 19, 2019
Human error, careless behavior and lack of security inspections on internally-generated email are putting organizations at risk. Basic, outside-in email security won’t provide the necessary protection for advanced tactics like the distribution of malware, malicious URLs or impersonation emails – all things that can quickly traverse an internal network with just one click. Check out this E-book to learn about the three riskiest internal threat actors and the key things you can do to combat internal threats.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Apr 10, 2019
Email. It’s the number-one business application used by organizations. It’s also the number-one method used to execute cyberattacks, enabling malware delivery, phishing, impersonations, and the spread of threats that are already internal to your organization. In fact, 91 percent of all cyberattacks start with an email. And your organization can’t function for long without email. How many hours of email downtime can your organization comfortably live with? If email isn’t accessible due to an adverse incident like malicious intent, human error or technical failure, your organization would likely suffer. The only way to get ahead of cybercriminals and to holistically protect your business is to adopt a new approach to email security. You need a multidimensional approach that brings together threat protection, adaptability, durability and recoverability in a single cloud-based service. You need to enable these four dimensions to truly provide cyber resilience for your email.
Tags : 
    
Mimecast
Published By: Datamyx     Published Date: Aug 11, 2016
Here’s what you need to know about prescreening with Deluxe Marketing Services. With prescreening, you’ll be able to identify consumers who match your credit qualifications AND are likely interested in your loan product -- so you can reach out with your best offer. No more wasting campaign dollars on people who are neither qualified nor interested in a loan right now.
Tags : 
deluxe, prescreening, lending, credit, loan
    
Datamyx
Published By: goTransverse     Published Date: Nov 02, 2016
In this era of cloud computing, mobile devices, and the Internet of Things (IoT), firms are testing new product offerings that combine elements of content, software, services, and hardware together. Like the innovative products themselves, the rulebook on monetizing them is evolving. Firms are shifting from one-time perpetual sales or fixed monthly subscriptions to consumption models that blend onetime, subscription, and usage-based billing. Download this white paper to learn the eight subscription billing solution providers that matter most and how they stack up.
Tags : 
    
goTransverse
Published By: Okta     Published Date: May 09, 2016
Part of a strong foundation for cloud-first, mobile-first IT includes supporting BYOD. BYOD can improve end user satisfaction and enable employees to work anywhere from any device. To really get these benefits though, the end-user experience must provide seamless access to the applications end-users want and need. Accomplishing this starts with extending app provisioning to mobile devices, and automatically deprovisioning mobile access as part of the identity lifecycle. For the best user experience, you’ll want automatic configuration of native mobile applications with mobile SSO, security settings and app settings like usernames, URLs and tenant IDs. Provisioning devices to users should be simply an extension of the foundational identity lifecycle management system. And, mobility management should enable IT teams to implement simple policies to enable and secure access from mobile. This eGuide provides an overview of how Okta can power BYOD programs with integrated identity and mobili
Tags : 
    
Okta
Published By: Okta     Published Date: May 09, 2016
With a secure foundation in place to manage internal IT, many IT leaders are thinking about a foundation for the entire business. In the new world of mobile apps, cloud services, and the Internet of Everything, people, processes, data, and devices are all converging to reshape how day-to-day business is done. Companies are reaching out to customers and partners—and even intelligent objects like connected cars and monitoring systems—and modifying the products and services they bring to market as a result. To an unprecedented degree, the future of an enterprise lies in the hands of the CIO and her IT staff who orchestrate these connections and act on the benefits they bring. IT leaders are finding new opportunities in an era of digital disruption. This executive brief provides a quick overview of how they are driving growth and increasing efficiency by securely connecting the digital enterprise with customers, partners, suppliers and distributors.
Tags : 
    
Okta
Published By: Brocade     Published Date: May 02, 2016
Power your path to a software-defined data center. Brocade and VMware are delivering automation, agility, and efficiency advantages that will change the way you do business. Read this paper and learn how to make SDDC a reality today.
Tags : 
    
Brocade
Published By: Dynatrace     Published Date: May 20, 2016
For all Development Managers, Operations Managers and DevOps Managers, this eBook by DevOps advocate and author Gene Kim will clearly outline: - How leaders are 2.5x more likely to exceed profitability, market share and productivity goals through DevOps - Why your IT delivery model needs to be continuous and collaborative to meet demands for more features faster - Which Milestones to have in mind when plugging performance into the four pillars - culture, automation, measurement and sharing - How identifying bad patterns earlier in development prevents them from making it into production Start accelerating your own results; read this eBook now.
Tags : 
dynatrace, software development, devops, results, productivity, development, it management, enterprise applications
    
Dynatrace
Published By: Dynatrace     Published Date: May 24, 2016
This guide, compiled from numerous client interviews, best practices and real-life project experiences, will: - Walk you through tools like the Gartner Magic Quadrant - Provide organized criteria to evaluate vendor capabilities in detail - Define why these criteria matter - Give you an example of the typical evaluation process and timeline for an Application Performance Management buyer
Tags : 
dynatrace, vendor selection, gartner magic quadrant, application performance management, enterprise applications
    
Dynatrace
Published By: Oracle Commerce Cloud     Published Date: Feb 05, 2016
Many potential customers and partners of Oracle Sales Cloud would like to understand from third parties if the claims Oracle makes about the product are accurate. Conducting extensive research, including interviewing customers, systems integrators, and others with firsthand experience of the application, has allowed Constellation to provide an objective view through three customer case studies. This report offers insights into four of Constellation’s primary business research themes, the Next-Generation Customer Experience, Technology Optimization and Innovation, Digital Marketing Transformation and the Future of Work.
Tags : 
    
Oracle Commerce Cloud
Published By: illusive networks     Published Date: May 18, 2016
The only way to stop cyber attackers in their tracks is to learn to think like an attacker. To give you better insight into what tools attackers are using, we've compiled a list of 15 "must-have" tools for aspiring attackers. Download this guide and learn about Open source tool cyber attackers use, such as Kali Linux and Wireshark, Password cracking tools that automatically test all possible combinations , and Tools such as Nmap, which lets users "map" a target network and its ports.
Tags : 
    
illusive networks
Published By: CA Technologies     Published Date: Jun 01, 2018
Challenge Businesses today must reduce the risk of security breaches to protect the valuable data within their organizations. At the same time, IT auditors are increasingly enforcing ever more stringent requirements on the business. The bottom line is that privileged accounts and privileged access are being targeted by hackers as a new attack surface and focused on by auditors who are insisting on greater controls around privileged accounts. Opportunity The right privileged access management solution provides comprehensive protection for your missioncritical servers with powerful, fine-grained controls over operating system-level access and privileged user actions. Capable of enforcing access controls on powerful native Superuser accounts—like the UNIX® and Linux® root and Microsoft® Windows® administrator—this system-level, host-based privileged access management solution controls, monitors and audits privileged user activity, improving security and simplifying audit and compliance. B
Tags : 
    
CA Technologies
Published By: Lucidworks     Published Date: Aug 24, 2016
Online search functionality should feel seamless. Type what you’re looking for, and watch it appear instantly—like magic. No stumbling through category hierarchies or landing pages; just fast, accurate, search results pointing you to exactly what you want. Unfortunately, ecommerce search isn’t quite there yet. Download this eBook to learn 12 must-have query types to optimize your organization's eCommerce search.
Tags : 
query types, search engine optimization, seo, search functionality, search results, ecommerce search
    
Lucidworks
Published By: Skillsoft     Published Date: Aug 26, 2016
Success nowadays demands providing all members of the workforce with the resources they need in order to effectively respond to and support customers’ needs and expectations. More specifically, organizations must provide employees with digestible knowledge at the point of need and as quickly as possible, so they can re-learn how to resolve specific challenges, also known as microlearning. According to research from Aberdeen, Best-in-Class companies are 60% more likely than all others to consider microlearning to be effective for employee development. This report explores the importance of microlearning, and what it can do for your business, your employees, and your customers.
Tags : 
microlearning, development, mobile, employee development, enterprise applications
    
Skillsoft
Published By: Skillsoft     Published Date: Dec 06, 2016
Success nowadays demands providing all members of the workforce with the resources they need in order to effectively respond to and support customers’ needs and expectations. More specifically, organizations must provide employees with digestible knowledge at the point of need and as quickly as possible, so they can re-learn how to resolve specific challenges, also known as microlearning. According to research from Aberdeen, Best-in-Class companies are 60% more likely than all others to consider microlearning to be effective for employee development. This report explores the importance of microlearning, and what it can do for your business, your employees, and your customers.
Tags : 
microlearning, development, mobile, employee development, knowledge management
    
Skillsoft
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.