work practices

Results 301 - 325 of 380Sort Results By: Published Date | Title | Company Name
Published By: Emulex Corporation     Published Date: Nov 07, 2013
Having 100% accurate network visibility is a looming requirement for avoiding substantial financial losses. Why? And how can you get it? You can’t manage and protect what you can’t see. But while many hundreds of network monitoring tools exist, organizations today know surprisingly little about the traffic on their mission-critical, high-speed networks. It takes them so long to fix network problems that the business suffers while the seconds, minutes, and hours of downtime accumulate. Download this Whitepaper for more information.
Tags : 
network monitoring, network visibility, technology, endace, best practices
    
Emulex Corporation
Published By: Qualys     Published Date: Nov 05, 2013
Automated Vulnerability Management (VM) solutions help you discover devices running in your network, determine whether they are vulnerable to attack, find fixes to the underlying problems, and protect yourself while those fixes are being implemented. This checklist of best practices will save you time and help you understand what to look for when selecting a VM, whether you have a dozen systems or a million.
Tags : 
vulnerability management solution, best practices, architecture, scanning, automation, continuity, reporting, cyber security
    
Qualys
Published By: Qualys     Published Date: Nov 05, 2013
Automated Web Application Scanning (WAS) solutions help you discover web apps running in your network, determine whether they are vulnerable to attack, understand how to fix them, and protect your business. This checklist of best practices will save you time and help you understand what to look for when selecting a WAS solution, whether you have a handful of apps or thousands.
Tags : 
vulnerability management solution, best practices, architecture, scanning, automation, continuity, reporting, cyber security
    
Qualys
Published By: IBM     Published Date: Oct 10, 2013
Flexible workplace forward thinkers are reporting productivity increases and cost decreases of 20% or more. Learn to achieve these benefits for your business by downloading the IBM executive report Achieving success with a flexible workplace: Forward thinkers’ best practices to enhance productivity, spur innovation and reduce costs. The report contains findings from a recent IBM survey covering user mobility, user support, collaboration and security.
Tags : 
workplace environment, enterprise, flexible workplace, ibm, enhance productivity, workplace environment, forward thinkers, achieve success
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
With 2.5 billion employee-owned mobile devices in the workplace today, enterprises are struggling to capture the business benefits while bracing their IT infrastructure against data breaches and a deluge of mobile traffic. A new study reveals that the most mobile-savvy organizations are employing specific best practices, including mobile planning, integration, optimization and management to achieve mobile infrastructure maturity.
Tags : 
mobiles, mobile technology, technology leaders, ibm, global it, it leaders, mobility, wireless
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
Mobile devices, including smartphones and tablets, enable increasing numbers of employees to work "anywhere, anytime."The security of enterprise data is a key concern, particularly on mobile devices that are easily lost or stolen. The security risk is further heightened by the proliferation of employee-owned mobile devices in many enterprises. Employees will almost always take the path of least resistance in leveraging mobile devices for business purposes, which may lead to unsafe computing practices. A clearly documented and enforceable mobile security policy is critical to reducing the risk of data loss.
Tags : 
mobile, mobile enterprise, mobile environment, security, mobile security, mobile device, wireless, mobile strategy
    
IBM
Published By: E-SignLive by Silanis     Published Date: Oct 02, 2013
An introduction to electronic signature technology for banks: What it is, why you need it, how it works and who in the banking industry is using e-signature solutions to automate customer-facing transactions. This guide answers common questions, shares ROI metrics and outlines best practices based on 20 years of transforming business processes and customer experience with electronic signatures.
Tags : 
banking, financial services, credit unions
    
E-SignLive by Silanis
Published By: Cisco Systems     Published Date: Oct 01, 2013
Annual global IP traffic has increased fourfold in the past five years, and it will surpass the zettabyte threshold by 2017. In this Cisco® Visual Networking Index (VNI) paper, discover the details and methodology of this forecast. Read report.
Tags : 
ip traffic, technology, cisco visual networking index, vni, best practices, telecommunication
    
Cisco Systems
Published By: EMA     Published Date: Sep 23, 2013
Join Steve Brasen, EMA Managing Research Director, and Kimber Spradlin, IBM Product Marketing for Endpoint Manager, for this informative, on-demand Webinar where the latest unified endpoint management research is revealed. Learn the strategic management processes necessary to empower a mobile workforce with the agility to adapt to rapidly evolving business requirements. Topics discussed include: • Securing devices without impeding user productivity • Expanding management processes to address increased device heterogeneity • Supporting employee-owned devices • Simplifying practices for delivering business IT services • Enhancing user flexibility in accessing IT resources necessary to achieve business goals
Tags : 
ibm, ema, on-demand webinar, endpoint management, mobile workforce, strategic management, technology, productivity
    
EMA
Published By: Aruba Networks     Published Date: Sep 18, 2013
In this whitepaper Gartner evaluates a variety of networking vendors providing access layer connectivity. Vendors must have an end-to-end hardware solution, but increasingly, vendor differentiation centers on network services, including guest access, onboarding, security and management tools. Read this whitepaper for more information.
Tags : 
wireless lan, infrastructure, hardware solution, network services, security, technology, best practices
    
Aruba Networks
Published By: Seamless     Published Date: Sep 16, 2013
Learn how fostering a strong corporate culture can help build success in your business by attracting and retaining top talent
Tags : 
corporate culture, top talent, business, workplace environments, seamless, culture, common practices, human resources
    
Seamless
Published By: Blue Coat Systems     Published Date: Aug 12, 2013
There is no question that security attacks targeting your organization will continue to grow and evolve. The question is, how can you respond to malware and other risks without unnecessarily constraining your workforce? How can you get beyond the fear and anxiety that leads to excessive prohibition, prevention, blocking, and excluding – so that you can use security technology to both protect and empower people? The answer is with a multi-layered defense – one that uses advanced security technologies and sophisticated operational practices in combination to cover the full spectrum of threat vectors. This solution brief explores the growing importance of multi-layered defense in today’s fast-changing web environment, and key considerations in implementing an effective multi-layered defense strategy.
Tags : 
av defense, blue coat, web environment
    
Blue Coat Systems
Published By: Navisite- A Time Warner Cable Company     Published Date: Aug 07, 2013
Designing and implementing an enterprise security plan can be a daunting task for any business. To help facilitate this endeavor NaviSite has developed a manageable process and checklist that can be used by enterprise security, compliance, and IT professionals as a framework for crafting a successful cloud computing security plan. It defines seven steps—sequentially—that have been tested and refined through NaviSite’s experiences helping hundreds of companies secure enterprise resources according to best practices. This plan enables organizations to gain the economic advantages of secure and compliant managed cloud services.
Tags : 
cloud, security, cloud computing, security plan, enterprise security
    
Navisite- A Time Warner Cable Company
Published By: CompareBusinessProducts.com     Published Date: Jul 11, 2013
The basis for Legal Hold and Data Preservation Best Practices was the exceptional work by the group of presenters at the 2012 Conference on Preservation Excellence, held in Portland, Oregon in late September. The conference focused solely on the area of data preservation best practices. Download this White Paper for more information.
Tags : 
legal, preservation, legal hold, data, technology, best practices
    
CompareBusinessProducts.com
Published By: IBM Smarter Analytics     Published Date: Jun 20, 2013
For many companies, 2012 was a year of positive momentum and better results. Consequently, strong optimism influenced planning for 2013, leading to one resounding, emphatic focus: GROWTH. As such, companies geared their compensation plans to focus the sales force on growth. Has it worked? This, at first glance, should be a simple question for sales compensation professionals to answer, but it is often illusive. This practical, high impact discussion will provide attendees with key practices for how to understand the effectiveness of their sales compensation plans and where to look as they seek to make improvements. Attendee benefits/Takeaways: •Key Do's and Don’ts for Assessing Plan Effectiveness •Core Plan Effectiveness Metrics to Leverage •Next Steps for Making Improvements •Learn how technology can be used to sharpen management’s visibility •Understand the operational efficiencies that can be achieved with Sales Performance Management technology.
Tags : 
sales, optimization
    
IBM Smarter Analytics
Published By: Teradata     Published Date: Jun 12, 2013
Because subpar analytics put customer relationships at risk, Forrester is redefining the modern practice of web analytics as "digital intelligence." This new approach to analytics brings a set of expanded requirements and calls on firms to consider their technology frameworks, organizational structures, metrics, and optimization practices.
Tags : 
web analytics, data driven marketing, digital intelligence
    
Teradata
Published By: ClickExpress     Published Date: May 01, 2013
Mobile Workforce Management solutions enable companies to deliver superior field service and customer satisfaction (see Part I, Setting The Stage For Best Practices Service Performance). However, a successful Mobile Workforce Management transformation is dependent upon many factors beyond simply deploying new technology. It requires a full understanding of the overall business objectives, a keen understanding of historical processes, a standard system of key performance metrics along with the organization’s current performance in those metrics, and effective communication to ensure organizational readiness and project execution.
Tags : 
mobile, management, workforce, technology, solutions, field service, customer satisfaction, management
    
ClickExpress
Published By: Polycom     Published Date: Apr 30, 2013
One of the simplest, most effective ways to bring healthcare to the community level is through video collaboration. When video technology is enabled through a standards-based, scalable platform, community members can all join a multipoint video call to collaborate and work together with professionals and even with groups of similarly afflicted, empathetic peers to address health issues. Patients benefit from more regular evaluations and better access to specialty support. They participate in live or recorded education sessions—regardless of location or ability to travel. And with today’s move to ubiquitous video, you cannot only do one-to-one video sessions, but groups can meet over video to share ideas and best practices.
Tags : 
healthcare, re-hospitalization, video collaboration, collaboration, video conferencing, video platform, telepresence
    
Polycom
Published By: Cleversafe     Published Date: Mar 29, 2013
Cloud applications and web-based services, such photo sharing sites, create some monumental challenges for a storage infrastructure.
Tags : 
raid, cloud storage, storage, replication, capacity, bandwith, efficiency, web applications
    
Cleversafe
Published By: Cleversafe     Published Date: Mar 29, 2013
Scalability has always been an important characteristic of enterprise storage systems, maybe the most important, since the rationale of consolidating storage assumes that the system can easily grow with aggregate demand.
Tags : 
object storage, cloud storage, access nodes, scalability, metadata, storage controller, backup and recovery, network attached storage
    
Cleversafe
Published By: McAfee     Published Date: Feb 06, 2013
How do rogue programs work - and how do you protect yourself and your business? Three best practices to keep these unwanted programs out of your networks.
Tags : 
fake alerts, fake anti-virus, rogue programs, rogue applications, scareware, endpoint url filtering, web gateway, anti virus
    
McAfee
Published By: Websense     Published Date: Jan 25, 2013
In this whitepaper, we provide guidance and clarity to help you implement a DLP control that is practical, efficient, and effective. Learn about 4 key topics of data breaches, potential vendors, 9 step framework and other best practices.
Tags : 
websense, data loss prevention, executive guide, data loss, practical guide, 4 topics, potential vendors
    
Websense
Published By: HP - Enterprise     Published Date: Jan 24, 2013
This eBook will help you to assess where you currently are in the security landscape, where you’re still unprotected and what you need to do complete your security portfolio.
Tags : 
security, network security, enterprise, infrastructure, best practices, vulnerability
    
HP - Enterprise
Published By: Kaseya     Published Date: Jan 14, 2013
Like 62% of your peers*, do you lack an easy way to discover and manage devices both on and off your network? One thing that won’t change in 2013 for IT Pros is the daily onslaught of challenges. Learn about 5 best practices for network discovery
Tags : 
kaseya, it automation, discovery & management, free webinar, increasing security, 5 best practices for network discovery
    
Kaseya
Published By: Red Hat     Published Date: Jan 01, 2013
Traditional security measures such as network firewalls are no longer enough to keep an enterprise secure. With Red Hat Enterprise Linux, security mechanisms are incorporated and applied at the core of every solution, and security is extended to include all the open source packages that make up Red Hat Enterprise Linux. As a result, customers experience a higher quality of service.
Tags : 
red hat, security systems, server operating system, next-generation datacenters, enterprise linux, security innovation, evade network defenses, dynamic datacenters
    
Red Hat
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Resource Library