rsa

Results 326 - 350 of 575Sort Results By: Published Date | Title | Company Name
Published By: Rsam     Published Date: Apr 28, 2016
Healthcare enterprises are under more scrutiny than ever to demonstrate compliance. With more than 5,000 suppliers, this FORTUNE 50 company needed to automate and streamline their vendor risk management program. Learn why they selected Rsam and the results of their successful implementation.
Tags : 
rsam, fortune 500, vendor risk management, healthcare enterprise, compliance, data management
    
Rsam
Published By: Rsam     Published Date: Apr 28, 2016
Enterprises are intensely focused on Vendor Risk today and with good reason.
Tags : 
rsam, vendor risk management, enterprise, risk assessment, security
    
Rsam
Published By: Rsam     Published Date: Apr 28, 2016
Join Rsam and Tom Garrubba, the Senior Director of Shared Assessments, as they discuss how to develop a game plan for vendor risk that aligns with OCC 2013-29.
Tags : 
rsam, occ, vendor risk, risk management, networking
    
Rsam
Published By: Citrix     Published Date: Oct 26, 2017
Explore los beneficios del mundo real realizados por las compañías que utilizan SD-WAN y cómo la sucursal redefinida tiene impacto en una amplia gama de sectores.
Tags : 
    
Citrix
Published By: LifeLock     Published Date: Jan 18, 2018
Regardless of the workforce demographic, LifeLock is a universally relevant benefit for all employees because everyone has an identity to protect.
Tags : 
    
LifeLock
Published By: Navisite- A Time Warner Cable Company     Published Date: Apr 12, 2012
Today, cloud adoption is rapidly expanding its footprint and is no longer simply a theoretical or academic conversation that enterprise organizations are debating. This white paper, intended for business leaders evaluating enterprise cloud services, uses real-world customer experiences to examine the business impact of the cloud beyond ROI.
Tags : 
navisite, technology, roi, technology solutions, cloud computing, business technology, business analytics, business intelligence, analytical applications
    
Navisite- A Time Warner Cable Company
Published By: Aprimo     Published Date: May 14, 2010
Updated strategies and actionable steps to help B2B and B2C marketers deliver integrated and measurable email marketing campaigns in today's quickly changing online landscape.
Tags : 
aprimo, b2b, email marketing, b2b, b2c, roi, social media, lead generation, customer conversations, sales tools, crm, nurture, lead gen, email, bounce rates
    
Aprimo
Published By: Aprimo     Published Date: Mar 07, 2011
Using Behavior-Based Brand Interactions for True 1-to-1 Marketing.
Tags : 
aprimo, cmo, roi, measurement, b2b, b2c, digital media, marketing, customer satisfaction, expectations, conversion
    
Aprimo
Published By: PC Mall     Published Date: Mar 27, 2012
BPM is a discipline and a methodological approach, which changes IT's conversation with the business to an interactive, continuously iterative approach to building solutions. BPM is now at the stage of maturity where it can be a tool for enterprise.
Tags : 
bpm, maturity, methodology, method, businsess procses management, building, business, interactive, enterprise applications
    
PC Mall
Published By: Lumension     Published Date: Nov 19, 2010
Learn how removable device policy enforcement can mitigate these risks while enabling managed use of these necessary productivity tools.
Tags : 
lumension security, usb insecurity, universal serial bus, enterprise, policy, risk mitigation, productivity tool, data loss, data theft, malware, anti spam, anti spyware, anti virus, policy based management, enterprise software, data protection, database security, productivity
    
Lumension
Published By: Skillsoft     Published Date: Jun 26, 2015
Don't let stress create chaos in your professional and personal life. Business owner and self-help guru Beverly Beuermann-King will help you put a plan in place to improve the mental health of you and your team. De-stress today! Watch the on-demand webinar, Conversations in Leadership: 52 Weeks to Letting More Life In.
Tags : 
leadership, leadership development, stress management, leaders, managers, teams, human resources
    
Skillsoft
Published By: Kenshoo     Published Date: Aug 06, 2012
TicketsNow, a leading online resale marketplace for sports, concert, and theater tickets, has created a strong paid search program to drive visitors and conversions to its site, TicketsNow.com. In 2010, TicketsNow began using Kenshoo Enterprise to manage its robust paid search campaigns. Using Kenshoo's algorithmic rules and model-based bid policies, TicketsNow has been able to effectively optimize millions of keywords and double overall contribution from its search engine marketing. To build on its success with the Kenshoo Universal Platform, TicketsNow sought to expand its efforts into social marketing with Facebook ads.
Tags : 
kenshoo, ticketsnow, cost-per-fan, kenshoo social, marketing, sales, finance
    
Kenshoo
Published By: Jobvite     Published Date: Oct 02, 2013
Social recruiting has grown up and has seen universal adoption across industries. Anyone not leveraging social referrals is behind the curve. Download Jobvite's 6th Annual Social Recruiting Survey Results to see how your social recruiting strategy compares
Tags : 
social recruiting, social recruiting survey, survey results, employee referrals, social referrals, human resources
    
Jobvite
Published By: IBM     Published Date: May 22, 2013
Cloud computing continues to dominate conversations in the banking industry worldwide, and the cloud concept is gaining increased visibility among banking IT executives.
Tags : 
ibm, ibm cloud, cloud computing, integration, business software, bank software, ibm bank, business continuity, application integration
    
IBM
Published By: NetApp     Published Date: Sep 17, 2014
This collection of insights, market trends and best practice recommendations, suggest ideas that are relevant for any organization evaluating or managing a hybrid cloud environment.  NetApp enables unrestricted yet secure movement of data across any public and private clouds, allowing you to move to hybrid cloud architectures.
Tags : 
hybrid cloud, clustered data, dynamic data portability, universal data platform, product operations, storage, data management
    
NetApp
Published By: Plantronics     Published Date: Oct 18, 2013
Wireless technology surrounds us — in the workplace, at home, and many places in between. Mobile phones, WiFi networks, wireless computer accessories, and cordless phones all use radio transmissions for wireless communication. Even devices not used for communication, such as microwave ovens and lighting systems, emit radio frequency energy that can impact wireless devices. In this crowded radio environment, two technologies have emerged as the standard for wireless voice communication in UC and enterprise applications.
Tags : 
plantronics, audio device technology, wireless technology, digital telecommunications, wireless headset success, influence deployment, analogue modulation, business conversations, dect, dect architecture, wireless technologies, bluetooth headsets, interference avoidance, roaming range, radio spectrum, channel sharing, density effects, wideband operation, wireless, authentication
    
Plantronics
Published By: Cyveillance     Published Date: Apr 03, 2015
Protecting a business – including its information and intellectual property, physical infrastructure, employees, and reputation – has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Like many security trends and frameworks, the early stages of adoption often involve inconsistent definitions, challenges with justification and management communication and an unknown path to implementation. In this white paper, we: • Review the current threatscape and why it requires this new approach • Offer a clarifying definition of what cyber threat Intelligence is • Describe how to communicate its value to the business and • Lay out some concrete initial steps toward implementing Intelligence-Led Security
Tags : 
intellectual property, hackers, protection, leaks, security, threatscape, networking
    
Cyveillance
Published By: OpenText     Published Date: Aug 19, 2014
A lot of talk is in the marketplace about enterprise software deployment models: on-premises, cloud, hybrid, managed/hosted. The conversation is an important one for every enterprise as it considers enterprise applications. This document is designed to help you evaluate the available deployment options for enterprise fax solutions. It includes easy-to-follow tables that will allow you to build selection criteria based on your organization’s requirements and needs.
Tags : 
opentext, fax, document delivery, workflow improvements, automation systems, transactional paper documents, knowledge management, enterprise applications
    
OpenText
Published By: GuideSpark     Published Date: Aug 01, 2018
IDG surveyed 1,500 HR decision makers, managers, and employees, and this is what they found: 88 percent of employees at firms with informal processes say they’re more satisfied with their jobs. Discover more of the latest trends in our white paper.
Tags : 
employee communication, employee engagement, employee experience, performance management, performance reviews, continuous performance management, informal conversations, informal performance management, millennial performance management, annual reviews, check-ins, continuous feedback, coaching, employee development, talent management, employee training, constant feedback
    
GuideSpark
Published By: ThreatTrack Security     Published Date: May 21, 2015
In an interview recorded at RSA Conference 2015, Itkin discusses: The unique security challenges of the midmarket; Disturbing cyber-extortion trends; What larger organizations can learn from the midmarket.
Tags : 
security challenges, mid-market security, cyber-extortion, cyberthreat, security, it management, knowledge management, data management
    
ThreatTrack Security
Published By: CDW-Trend Micro     Published Date: Aug 04, 2015
This is a whitepaper about how organizations are constantly under attack from increasingly advanced cyber adversaries.
Tags : 
ecosystem, cyber attack, antivirus, security, single vendor, endpoint, digital, web, holistic, email systems, hosted service
    
CDW-Trend Micro
Published By: Dell EMC     Published Date: May 29, 2015
If you are considering Hybrid Cloud, tune in to this revealing conversation with EMC’s Chad Sakac and Wikibon Analysts, Dave Vallente and Stu Miniman. Great insight on virtualization, Openstack, and the future of cloud computing plus informative details on EMC Enterprise Hybrid Cloud
Tags : 
hybrid cloud, hardware, software, hardware, service center, application integration, business intelligence, data quality, productivity, cloud computing, data integration, content management
    
Dell EMC
Published By: Dell EMC     Published Date: Jul 27, 2015
If you are considering Hybrid Cloud, tune in to this revealing conversation with EMC’s Chad Sakac and Wikibon Analysts, Dave Vallente and Stu Miniman. Great insight on virtualization, Openstack, and the future of cloud computing plus informative details on EMC Enterprise Hybrid Cloud.
Tags : 
wikibon, emc, virtualization, hybrid cloud, cloud computing
    
Dell EMC
Published By: Microsoft Office 365     Published Date: Mar 01, 2018
Much has been written about how to understand and work with millennials—but it's been from the perspective of forcing this group of tech-savvy and connected people into old ways of working. But consider this: by 2020, millennials will make up 50% of the workforce. Also consider: the way we work changes almost daily. That means it's time to rethink the entire conversation about working with millennials. In this eBook, learn 4 ways to motivate millennials in the workplace—and how the right technology plays a critical role.
Tags : 
    
Microsoft Office 365
Published By: Avi Networks     Published Date: Mar 24, 2016
This buyer’s guide for load balancers is based on research, best practices, and conversations with network administrators and IT operations teams at over 110 Global 2000 enterprises. It presents guidelines for choosing application services that mirror the needs of modern data centers and public cloud initiatives. The guide is organized in sections, starting with a pre-assessment of your current application delivery capabilities. With data gathered from your pre-assessment, you can review the considerations involved in creating a software-defined application services strategy; identify opportunities to improve automation of application services and operations. Finally, use the software-defined application services checklist at the end of the guide to identify key priorities in your choice of application service solutions for your enterprise.
Tags : 
avi networks, best practices, application services, modern data centers, public cloud initiatives, load balancer, load balancing, application delivery, application delivery controller, adc, software-defined networks, sdn, networking, it management
    
Avi Networks
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.