enterprise management

Results 301 - 325 of 1405Sort Results By: Published Date | Title | Company Name
Published By: Delphix     Published Date: Feb 28, 2013
This paper by analyst firm ESG describes the key challenges in ERP upgrade projects, and maps specific database virtualization functions to each challenge.
Tags : 
erp, enterprise resource planning, database virtualization, data management, virtualization
    
Delphix
Published By: AtTask     Published Date: Jan 16, 2013
Do projects seem to appear out of nowhere? Do you find yourself scrambling to pull together reports for executives? Download this free guide and learn about several project portfolio management pitfalls and how AtTask can help you avoid them.
Tags : 
cross-project team insight, enterprise project management, gantt chart, it project, online project management, ppm, project collaboration, project management, project visibility, resource management, task management, team member accountability, time tracking software, workflow software, resource planning, capacity planning, portfolio management, productivity, work management, project portfolio management
    
AtTask
Published By: AtTask     Published Date: Jan 16, 2013
Choosing the best PPM software for your team doesn't have to be overwhelming. This Buyer's Guide will help you find project management software that's evolved for today's project teams. Get the guide today.
Tags : 
cross-project team insight, enterprise project management, gantt chart, it project, online project management, ppm, project collaboration, project management, project visibility, resource management, task management, team member accountability, time tracking software, workflow software, resource planning, capactiy planning, portfolio management, productivity, work management, project portfolio management
    
AtTask
Published By: AtTask     Published Date: Apr 29, 2013
Work chaos comes in many forms: random input processes, disconnected activities, poor visibility into work and more. Read this eBook: "How to Slay the Dragon of Enterprise Work" and learn how slaying the work chaos dragon will help you simplify your processes, connect team members, save time and money, and more. Get the eBook today.
Tags : 
cross-project team insight, enterprise project management, gantt chart, it project, online project management, ppm, project collaboration, project management, project visibility, resource management, task management, team member accountability, time tracking software, workflow software, resource planning, capactiy planning, portfolio management, productivity, work management, project portfolio management
    
AtTask
Published By: Box     Published Date: Mar 14, 2012
Read how organizations are realizing massive productivity gains by transitioning their content management solutions to cloud-based models.
Tags : 
cloud, enterprise, collaboration, productivity, transition, management, content management, virtual, collaborate, information, data
    
Box
Published By: Box     Published Date: Mar 14, 2012
Improving collaboration and access to the growing collection of content are critical, fundamental components of companies' future growth. Download this white paper to learn more.
Tags : 
reaping, ecm, cloud, enterprise, content, solutions, cloud, collabortation, growth, content management, enterprise applications
    
Box
Published By: ServiceNow     Published Date: Nov 22, 2013
Whether you’ve embraced it or not, mobile is already part of your business. To remain relevant, IT must think like the business. IT must reinvent itself and become more of a technology advisor and less of a technology traffic cop. This paper sets out some of the key lessons learned by progressive organizations that have used mobile to get ahead.
Tags : 
servicenow, enterprise it, mobile computing, mobile initiative, it managers, progressive enterprise, mobile users, bring your own device, mobile device management, mobile adoption, mobile maturity model, mobile savvy, actionable analytics, renew it
    
ServiceNow
Published By: ServiceNow     Published Date: Nov 22, 2013
A modern ITAM solution allows organizations to consolidate legacy systems into one system of record and automate the asset lifecycle.
Tags : 
servicenow, enterprise it, asset management, software asset management, itam, itsm, service management, software-as-a-service, service catalog, runbook automation, manual to automation, workflow engine, complex integration, vendors and models
    
ServiceNow
Published By: ServiceNow     Published Date: Nov 22, 2013
An effective service catalog enables IT to deliver business services that are more customer and service focused, which results in higher customer satisfaction, provides standardization and consistency and increases IT visibility across the organization.
Tags : 
servicenow, enterprise it, boost visibility, business value, service catalog, service management, infrastructure library, budget effectiveness, customer-focused services, business critical asset, customer requirements, service level management, it management
    
ServiceNow
Published By: McAfee     Published Date: Sep 15, 2014
Centralized and accurate network security management is more than a trend—it is quickly establishing itself as the only means of network survival. Old-school point solutions, where each solution served a single purpose at a particular point in the network, are quickly becoming unwieldy, if not impossible, to manage. Larger enterprises may have hundreds of point products throughout their network, and managing them effectively, efficiently, and securely can only be done through a centralized network security management solution. Look for eight key features in your network security management solution to ensure that your network not only survives but thrives.
Tags : 
network survival, network security management, best practices, firewalls, hacker detection
    
McAfee
Published By: AppDynamics     Published Date: Aug 25, 2015
In collaboration with Enterprise Management Associates (EMA), AppDynamics has conducted a survey of application management professionals and managers to determine exactly what IT organizations want and need from APM providers. Here are some key findings from the research: • Only 30% of companies currently have application-specific solutions to monitor apps • 50% or fewer of the tools companies have purchased are actively being used to monitor apps • 27% of application-related problems are detected by monitoring tools • A “unified monitoring platform” is the top choice in a feature of an APM solution Download the full report to review the findings and understand the key challenges and “must haves” associated with APM solutions voiced by IT professionals themselves.
Tags : 
business technology, digital, customer service, efficiency, operations, infrastructure, business intelligence, business management, productivity
    
AppDynamics
Published By: MobileIron     Published Date: Jul 31, 2015
Windows 10 is a major OS overhaul that unifies device and security management for the modern enterprise architecture by converging separate OS versions onto one platform managed by an EMM console. This Infographic details 10 tips for ensuring you and your organization are ready to upgrade to Windows 10.
Tags : 
windows 10, emm, enterprise mobile management, mobile it administrators, security
    
MobileIron
Published By: MobileIron     Published Date: Jul 31, 2015
This whitepaper takes the findings from the 2015 Trust Gap Survey and translates them into actionable recommendations for employers in the form of privacy-centric mobile device policies. This white paper also reviews the privacy enhancements that Apple, Google, and Microsoft have made to their operating systems. When used with an enterprise mobility management (EMM) platform, these enhancements enable a more powerful set of privacy protections than was available even two years ago.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Aug 03, 2015
This is an article about how enterprise mobility management (EMM) suites help organizations integrate mobile devices into their security frameworks and systems and information technology life cycles.
Tags : 
enterprise mobility management, mobile devices, security framework, mobile devices, data encryption
    
MobileIron
Published By: MobileIron     Published Date: Apr 05, 2017
MobileIron is a proven leader in mobile and cloud security innovation for the modern enterprise. In addition to being the enterprise choice for secure mobility, we rank in the top five for all categories of the Gartner Critical Capabilities for High-Security Mobility Management. We have also been positioned as a Leader in the Gartner Magic Quadrant for Enterprise Mobility Management Suites for six consecutive years. Our platform is fully mature and built from the ground up to address evolving mobility and cloud requirements. Plus, MobileIron integrates with leading technology providers, so customers aren’t tied to proprietary technologies that don’t meet their needs. We ensure customers can choose the best technologies that fit their environment.
Tags : 
cloud services, enterprise management, cloud security, mobile security, mobile device security, platforms, email security, cloud data, app security
    
MobileIron
Published By: MobileIron     Published Date: Apr 05, 2017
MobileIron is a proven leader in EMM innovation and mobile security for the modern enterprise. In addition to being the enterprise choice for secure mobility, we rank in the top five for all categories of the Gartner Critical Capabilities for High-Security Mobility Management. We have also been positioned as a Leader in the Gartner Magic Quadrant for Enterprise Mobility Management Suites for six consecutive years. Our platform is fully mature and built from the ground up to address evolving mobility and cloud requirements. Plus, MobileIron integrates with leading technology providers, so customers aren’t tied to proprietary technologies that don’t meet their needs. Our goal is to ensure organizations can choose the best technologies that fit their environment.
Tags : 
cloud services, enterprise management, cloud security, mobile security, mobile device security, platforms, email security, cloud data, application protection, app security
    
MobileIron
Published By: Intralinks     Published Date: Apr 13, 2015
The increased mobility of the workforce is changing the way we work. Business users want the flexibility to share and collaborate on content that drives their business while IT needs to ensure the security of that data, no matter where it goes. An effective enterprise collaboration solution must consider people, processes and technologies to be effective, but where to begin? This comprehensive Buyer’s Guide offers guidance on how to develop your organization’s requirements with regard to: • Risk management – avoiding data breaches and loss of information that can result in non-compliance • Business productivity - allowing for secure collaboration while enabling teams to work anywhere on any device • IT efficiency - supporting the full breadth of external business content requirements while integrating with existing applications and protocols
Tags : 
    
Intralinks
Published By: OpenText     Published Date: Nov 30, 2015
Download this whitepaper to learn how OpenText’s enterprise-grade, workflow-oriented digital asset management ecosystem gives organizations the necessary combination of performance, security and management control for using digital assets both within their enterprises and in their relationships with customers, partners and prospects.
Tags : 
    
OpenText
Published By: Akamai Technologies     Published Date: Aug 22, 2018
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
management, bot, security, credential, akamai
    
Akamai Technologies
Published By: Jamf     Published Date: Mar 20, 2018
The word is out. Apple has officially arrived in the enterprise. Once thought of as only for consumers, Apple has not so quietly created a $25 billion enterprise business — with no signs of slowing. If you want to join the Apple at work movement, but have questions yourself about security best practices or, more likely, need to alleviate the security concerns of your executives or information security team, we can help. Topics covered include: How the Apple ecosystem is structured How Apple management differs from Windows What security features are unique to the Apple ecosystem What to consider when adding new Apple devices What Apple integrations are available to leverage what you already have
Tags : 
    
Jamf
Published By: Lookout     Published Date: Mar 29, 2017
Read the eBook to learn the difference between securing mobility and mobile security, why Enterprise Mobility Management/ Mobile Device Management (EMM/ MDM) solutions alone are not security, and the kinds of attacks your mobile fleet might be facing.
Tags : 
enterprise, mobile security, basics, ebook, lookout, emm, mdm
    
Lookout
Published By: Lookout     Published Date: Mar 29, 2017
Over the past year, Gartner has provided important observations and guidance on Enterprise Mobility Management (EMM) and mobile security solutions. Read the report for key insights into the differences between the two as well as to better understand current state of mobile threat defense.
Tags : 
gartner, market, insights, mobile threat, emm, lookout
    
Lookout
Published By: Lookout     Published Date: Aug 28, 2017
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective.
Tags : 
mobile risk, enterprise risk management, endpoint security, mobile-specific security, mobile threats
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
The modern organization has recognized the need to embrace mobile devices in the workplace. Some have fully implemented a bring-your-own-device (BYOD) program, while some have adopted a hybrid model of corporateowned and personally-enabled (COPE) devices. Many companies then choose to deploy an Enterprise Mobility Management (EMM) or Mobile Device Management (MDM) solution to enable some control of the mobile devices that access corporate data. For companies at this stage of mobility, security is the next critical layer. As Gartner states, “It is becoming increasingly important that security leaders look at the anti-malware, mobile threat defense solutions market, the products available and how they should be used."
Tags : 
enterprise mobility management, mobile device management, mobile security, mobile security solutions, mobile threats
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
Mobility is exploding. Workers and businesses fully expect to work anywhere, any time, from any device. Riding right alongside this growth is the amount of data created and consumed on mobile devices. While this presents organizations with an attractive means of empowering flexibility and productivity, the security risks are real and daunting. Unfortunately, while enterprise mobility management tools can provide valuable administrative capabilities and protect the organization from phone loss, accidental data loss or weak passwords, they lack the necessary visibility into today’s modern security risks, including malware and other device-centric attacks
Tags : 
mobile security, enterprise mobility, mobile security risks, mobile management tools, data protection
    
Lookout
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.