business approach

Results 376 - 400 of 502Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Aug 06, 2014
Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.
Tags : 
ibm, banking, business, fraud-prevention, fraud, technology
    
IBM
Published By: Salesforce.com     Published Date: Jul 02, 2014
A well-executed "System of Engagement" strategy provides value to banks and customers. • Approximately 45% of bank customers today regularly interact with their institution through a mobile channel, with estimates of 70% within a few years. • Why it’s time to break down the System of Record and move to a System of Engagement. • How this shift can increase customer satisfaction and create new business opportunities. Download this white paper to get the full details on how a new approach to banking pays off for everyone.
Tags : 
salesforce, system of engagement, banking, increase customer satisfaction, mobile channel, system of record
    
Salesforce.com
Published By: DocuSign     Published Date: Jun 25, 2014
Regulatory actions have forced financial institutions to re-strategize their business models, an approach that could increase or decrease profitability depending on the strategy chosen. Banking executives who want to stay competitive must focus on differentiating their services based on the customer experience and streamline related costs.
Tags : 
docusign, financial institutions, regulatory actions, streamline, reinvention strategies, customer experience, banking executives
    
DocuSign
Published By: BMC Software     Published Date: Jun 13, 2014
The last five years have fundamentally changed the way people interact with technology, leaving IT in a reactive mode. As business customers have rushed to “consumerized” services and experiences, IT is beginning to redefine its approach to offering IT services.  In this eBook, explore the top trends driving the New IT for IT Service Management, and how leading organizations are evolving to focus on end-user experience.
Tags : 
bmc, itsm solutions, changing business, cloud, cios, software, it organizations, saas
    
BMC Software
Published By: Dropbox for Business     Published Date: Jun 09, 2014
“Security” is the number one issue holding business leaders back from the cloud. But does the reality match the perception? Keeping data close to home, on premises, makes business and IT leaders feel inherently more secure.1 But the truth is, cloud solutions can offer companies real, tangible security advantages. Before you assume that on-site is the only way to keep data safe, it’s worth taking a comprehensive approach to evaluating risks. Doing so can lead to big benefits.
Tags : 
dropbox, cloud, security, business, risk, secure
    
Dropbox for Business
Published By: Dropbox for Business     Published Date: Jun 09, 2014
Protecting your data isn’t a feature on a checklist, something to be tacked on as an afterthought. Security is at the heart of Dropbox for Business, informing not only how we approach new features and enhancements, but also how we’ve designed the product itself. Download here to find out how we’ve built Dropbox for Business to keep data safe for all our users.
Tags : 
dropbox, business, data, protect, security
    
Dropbox for Business
Published By: BMC Software     Published Date: May 28, 2014
"In the paper, “Integrate Big Data into Your Business Processes and Enterprise Systems” you’ll learn how to drive maximum value with an enterprise approach to Big Data. Topics discussed include: • How to ensure that your Big Data projects will drive clearly defined business value • The operational challenges each Big Data initiative must address • The importance of using an enterprise approach for Hadoop batch processing
Tags : 
    
BMC Software
Published By: IBM     Published Date: May 28, 2014
Different types of data have different data retention requirements. In establishing information governance and database archiving policies, take a holistic approach by understanding where the data exists, classifying the data, and archiving the data. IBM InfoSphere Optim™ Archive solution can help enterprises manage and support data retention policies by archiving historical data and storing that data in its original business context, all while controlling growing data volumes and improving application performance. This approach helps support long-term data retention by archiving data in a way that allows it to be accessed independently of the original application.
Tags : 
ibm, data retention, information governance, archiving, historical data, integrating big data, governing big data, integration
    
IBM
Published By: BMC Software     Published Date: May 19, 2014
Today’s mature cloud-based ITSM solutions can give you the flexibility and agility you need—without sacrificing security, stability or performance. In this THINKstrategies, Inc. white paper, you’ll learn why businesses are moving to cloud-based ITSM and the advantages they’ve achieved. Explore how this innovative approach to IT management might be right for your organization.
Tags : 
bmc, itsm solutions, changing business, cloud, cios, software, it organizations, saas
    
BMC Software
Published By: HP     Published Date: May 15, 2014
IDC Spotlight paper. Seeking the business benefits generated by private cloud and to free themselves from the rigid silos of traditional IT infrastructures, organizations are turning to an approach that extends virtualization to all compute, network, and storage resources in their datacenters.
Tags : 
gen8 blades, sddc, datacenter infrastucture
    
HP
Published By: HP     Published Date: May 14, 2014
As a long-time leader in data protection and backup solutions, and with innovations such as HP StoreOnce deduplication, HP TapeAssure and HP StoreOpen with LTFS, HP understands your immediate requirements and strategic business direction. With an integrated approach to comprehensive business protection, we can help you safeguard the integrity of your data and rapidly restore access whenever, wherever, and however you need it.
Tags : 
hewlett packard, data protection, storeonce, tapeassure, ltfs
    
HP
Published By: HP     Published Date: May 14, 2014
As business purposes have changed over the years, IT approaches and infrastructures have had to change in lock-step to serve them optimally. IT professionals are now combining the best of the centralized approach – via virtualization, federation, and clouds of all sorts – with the best of the decentralized model – via mobile and localized consumption and production. In this paper, Enterprise Strategy Group examines approaches to IT operational challenges and business requirements. Learn how HP Converged Storage’s comprehensive approach represents a logical evolution development in storage, delivering ease, flexibility and cost-efficiency all in one.
Tags : 
3par storeserv, converged storate, new style of it, storage architecture, itaas, cloud, hybrid cloud, private cloud
    
HP
Published By: Oracle     Published Date: Apr 29, 2014
Cash forecasting in an extremely important process that organizations must execute effectively in order to succeed. Since cash is the lifeblood of a business, business leaders must know how much cash is going to be available to the organization at any given time. Download this white paper to learn more!
Tags : 
oracle, cash forecasting, cash, available cash, modern business approach, cash management
    
Oracle
Published By: Adobe     Published Date: Apr 17, 2014
Discover new opportunities for maturing your data practices—and building your business results. You’ll learn how to move beyond mere web analytics to build a more comprehensive marketing analytics approach that includes mobile, social, and offline channels. And you’ll see how your current analytics capabilities compare to those of similar organizations and where you have opportunities for improvement.
Tags : 
adobe, analytics, marketing, data collection, data automation, marketing automation, web analytics, marketing analytics
    
Adobe
Published By: HP Enterprise System     Published Date: Apr 03, 2014
SAP HANA is a powerful, in-memory computing platform that streamlines business suite applications, analytics, planning, predictive analysis, and sentiment analysis on a single platform, so businesses can operate in real time. The design approach for enterprise-level solutions involving SAP HANA, and the best practices surrounding them, isn’t intrinsically different from the approach to any other enterprise-level solution for technology implementations. This paper is written to address those elements of good solution design and apply them to the SAP landscape, with particular focus on the SAP HANA element.
Tags : 
sap hana, as a service solution, solutions, cost effective, operational management, accelerate value
    
HP Enterprise System
Published By: HP Enterprise Services     Published Date: Mar 24, 2014
Today’s complex, rapidly changing IT environments require dynamic continuity programs. Your peers are reassessing both the service provider model and the internal alternative for business continuity. It’s time to learn the ins and outs of enterprise-class cloud-based continuity. Examine how traditional IT operations can be recovered to the cloud. Explore the requirements of the disaster-recovery-as-a-service model. Understand the key issues to evaluate when considering a cloud-oriented approach to disaster recovery.
Tags : 
disaster recovery, business continuity, recovery services, resiliency services, recovery-as-a-service, cloud continuity
    
HP Enterprise Services
Published By: Symantec Corporation     Published Date: Mar 21, 2014
This paper examines algorithm agility, how it fits into the current and evolving security landscape and how your business can enhance online security through a more flexible, scalable approach to SSL certification.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
Symantec Corporation
Published By: Citrix Systems     Published Date: Feb 27, 2014
Mobility and consumerization are little more than buzzwords without the applications that drive business activities. A successful enterprise mobility strategy places priority on applications first, mapping their mission to the variety of use cases out in the field. Success with mobilizing Microsoft® Windows® applications also requires a broad technology approach. The right approach integrates a universal client and single sign-on with a comprehensive application delivery platform to ensure information security and a seamless user experience. This paper describes how you can simplify application mobilization with Citrix.
Tags : 
citrix, mobile. mobilizing, windows applications, microsoft windows
    
Citrix Systems
Published By: Nativeflow     Published Date: Feb 25, 2014
Are your company’s employees using Sharepoint, Dropbox for Business or other enterprise cloud file-sharing services? Do your users want to use standard market aps to view and edit shared files on the go? Are you concerned about preventing enterprise data leakage from mobile devices? Download the datasheet to learn about approaches that address these challenges so that your enterprise can use these services while ensuring enterprise data is protected.
Tags : 
enterprise file-sharing, mobile devices, sharepoint, dropbox, cloud file-sharing, standard market app, datasheet, file leakage
    
Nativeflow
Published By: Liaison Technologies     Published Date: Feb 07, 2014
Learn why businesses are increasingly using a managed services approach for their EDI/B2B needs. You too may consider it for your business.
Tags : 
liaison, electronically exchange, managed services, manage data, b2b, data management, enterprise application integration, eai
    
Liaison Technologies
Published By: BMC Software     Published Date: Jan 31, 2014
Today’s mature cloud-based ITSM solutions can give you the flexibility and agility you need—without sacrificing security, stability or performance. In this THINKstrategies, Inc. white paper, you’ll learn why businesses are moving to cloud-based ITSM and the advantages they’ve achieved. Explore how this innovative approach to IT management might be right for your organization. Please download the whitepaper to learn more.
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications
    
BMC Software
Published By: F5 Networks Inc     Published Date: Jan 21, 2014
Cloud computing and the "bring your own device" (BYOD) trend will impact the design of future datacenters and their supporting networks. To attain the kind of business agility that companies now demand, network infrastructure needs to provide the flexibility required by cloud application workloads and the changing traffic patterns fostered by BYOD. To make networks more agile, new approaches to network implementation need to be enabled. As these trends continue, application delivery controllers (ADCs) will be critical elements in the new network infrastructure. This Technology Spotlight examines these trends and the role that F5 Networks' integrated scalable platform plays in this strategic market.
Tags : 
f5 networks, idc, cloud, cloud computing, bring your own device, byod, datacenter, network
    
F5 Networks Inc
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Resource Library