work practices

Results 1 - 25 of 377Sort Results By: Published Date | Title | Company Name
Published By: CrowdStrike     Published Date: Feb 01, 2017
Once a “consumer-only” problem, Ransomware now has an established business case for profitability, and that’s driving criminals to expand their operations and hunt for more lucrative prey. As a result, commercial enterprises and other large organizations are increasingly in the crosshairs. Consider these facts: ? Ransomware attacks doubled in 2015 ? The number of new ransomware variants increased 17% in Q1 2016 ? The FBI estimates that ransomware will net criminals $1 billion in 2016 This white paper dives into the inner workings of ransomware, its perpetrators and how they are evolving to maximize profits. You’ll also learn how companies are fighting back, and review best practices for protecting your organization from becoming another victim of electronic extortion.
Tags : 
    
CrowdStrike
Published By: Focus     Published Date: Nov 15, 2011
When it's time to expand your network, this guide will help you evaluate the needs of your organization and enable you to provide best performance for mission-critical applications.
Tags : 
network, infrastructure, best practices, mission critial, applications, network, scale
    
Focus
Published By: CDW     Published Date: Feb 27, 2015
The real test of any SAM system goes beyond creating a one-time Effective Licensing Position (ELP) for a given software publisher. To be truly valuable, the SAM solution has to have the ability to manage change. Being able to work from a dependable list of software that has been approved by, and which also serves the business, means that finite IT & SAM resources are not wasted through the support of legacy software that might be deemed redundant, and should keep a company on track technically by not becoming dependent on aging software. This 10 –Minute Guide from SAM experts at Snow Software will show how to establish and maintain a Software Catalog for the purpose of ensuring that your software estate remains relevant and fit for its business purpose.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
    
CDW
Published By: TriNet     Published Date: Jul 28, 2015
This white paper will help you establish a framework of policies, practices, and actions that guide your efforts to focus on your most important asset—your people.
Tags : 
human capital plan, talent development, human capital issues, customer experience improvement, employee training management, employee retention, customer recommendation, customer impressions
    
TriNet
Published By: Palo Alto Networks     Published Date: Dec 11, 2013
The 10 Things Your Next Firewall Must Do outlines the latest capabilities that a firewall should possess and helps you learn how to choose a firewall that can safely enable your business in the ever-changing world of network security. In this free booklet, you'll find an insight and practical advice on: - Considerations for choosing your next firewall - Best practices for implementing safe application enablement policies - Essential firewall capabilities for battling modern threats
Tags : 
firewall, palo alto, security, network security, safe applications, cyber threats
    
Palo Alto Networks
Published By: Janrain, Inc.     Published Date: Feb 28, 2012
Your customers interact with you on social networks, but how effectively are you using social media to connect with them on your website? This white paper explores best practices to build on-site engagement by integrating social tools.
Tags : 
social login, social sharing, game mechanics, gamification, social media, social tools, social networks, facebook
    
Janrain, Inc.
Published By: Emulex Corporation     Published Date: Nov 07, 2013
Flying blind at 100G It might go something like this: Your company is a voracious consumer of bandwidth – perhaps a very large enterprise, a research lab, or a service or content provider of some description. Today you are running multiple 10Gbps network connections in the core of your network, but these links are rapidly approaching capacity. An upgrade in the not-too-distant future to 40/100G ultra-high-speed links now looks inevitable.
Tags : 
network monitoring, network visibility, technology, endace, best practices
    
Emulex Corporation
Published By: Polycom     Published Date: Jun 08, 2016
"There are many ways to take advantage of the rich set of collaboration tools provided by Microsoft Skype for Business. IT leaders should consider a cap-and-grow Skype for Business strategy and then think through how it can be leveraged as a replacement technology. Digest this white paper by leading UC analyst Zeus Kerravala for insight on the 14 best practices for a Skype for Business Enterprise Voice deployment. Enabling IM and presence first, expanding desktop applications, and more are details in this informative piece. "
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, productivity
    
Polycom
Published By: Visier     Published Date: Jul 08, 2014
Read the results of the 2014 Workforce Analytics and Planning survey where over 300 U.S.-based employers answered questions about their current workforce analytics and planning practices, investments, and future plans. Download the full report and discover key trends, including how 91% of companies aspire to increase their workforce analytics maturity over the next 24 months.
Tags : 
visier, workforce analytics, hr metrics, planning, human resources
    
Visier
Published By: Avi Networks     Published Date: Mar 24, 2016
This buyer’s guide for load balancers is based on research, best practices, and conversations with network administrators and IT operations teams at over 110 Global 2000 enterprises. It presents guidelines for choosing application services that mirror the needs of modern data centers and public cloud initiatives. The guide is organized in sections, starting with a pre-assessment of your current application delivery capabilities. With data gathered from your pre-assessment, you can review the considerations involved in creating a software-defined application services strategy; identify opportunities to improve automation of application services and operations. Finally, use the software-defined application services checklist at the end of the guide to identify key priorities in your choice of application service solutions for your enterprise.
Tags : 
avi networks, best practices, application services, modern data centers, public cloud initiatives, load balancer, load balancing, application delivery
    
Avi Networks
Published By: LogRhythm     Published Date: Jun 19, 2018
As uncertainties—cybersecurity and otherwise—swim around us with increased velocity and frequency, it’s always helpful to hear directly from security leaders in the trenches of our industry. These first-hand accounts have the unique ability to shed light on the challenges security professionals and their teams face nearly every day of their work lives. That’s precisely what this “2018 Cybersecurity: Perceptions & Practices” benchmark survey accomplishes. It provides insights into the state of the cybersecurity practice of 751 mid- to large-sized organizations in the United States, United Kingdom, and AsiaPacific regions.
Tags : 
cybersecurity, survey, security, leaders, data, industry
    
LogRhythm
Published By: Hyland Software     Published Date: Dec 17, 2013
Businesses are discovering how to create efficiencies and meet constantly evolving business needs with an enterprise content management (ECM) solution. Make ECM work for your organization by researching best practices and knowing your options.
Tags : 
emc, enterprise content management, emc solution, automated processing, workflow, integration, emc strategy, onbase
    
Hyland Software
Published By: Avaya     Published Date: Jun 15, 2016
Enabling information mobility and security is critical to the evolution of healthcare Hospitals and other healthcare organizations are rapidly moving to a digital care ecosystem, putting incredible pressure on the network. The solution is an SDN solution built for the specific needs of healthcare. Read the ZK Research now for 4 key capabilities SDN offers
Tags : 
sdn, networking, best practices, software, technology
    
Avaya
Published By: Workfront     Published Date: Sep 18, 2014
As marketers, we know our best work is fueled by time to think, brainstorm and explore different directions. But in a world of endless email, status meetings and countless other distractions, finding time to do great work seems to be a lofty dream rather than reality. Check out this white paper by MarketingProfs to learn 4 best practices to find time to do your best, most satisfying work. You’ll learn how to: • Reduce interruptions • Spend less time tracking work • Reduce random work requests • Stop chasing information and requirements
Tags : 
strategies, creative work, brainstorm, status meetings, work requests, information and requirements
    
Workfront
Published By: Great Bay Software     Published Date: Jan 09, 2019
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Apr 12, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jul 16, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: Kaseya     Published Date: Jan 14, 2013
Like 62% of your peers*, do you lack an easy way to discover and manage devices both on and off your network? One thing that won’t change in 2013 for IT Pros is the daily onslaught of challenges. Learn about 5 best practices for network discovery
Tags : 
kaseya, it automation, discovery & management, free webinar, increasing security, 5 best practices for network discovery
    
Kaseya
Published By: Microsoft Azure     Published Date: Apr 10, 2018
Learn about the five gaps that could be costing you time, customers, and profit in this digital e-book. Discover how to close those gaps and transform your people, process, and technology to better serve your customer. You’ll also learn how to: Create a unified view and deliver personalized experiences to your customers across all touchpoints and channels. Provide actionable insights to your sales and marketing team so they can work together more effectively. Bring intelligence to your data and connect it with content and processes, so you can make better, faster decisions. Transform your business by connecting sales and marketing with a shared set of successful business practices.
Tags : 
    
Microsoft Azure
Published By: EMA     Published Date: Oct 01, 2014
A new mantra is emerging for IT professionals – Quality of Experience (QoE). In order to align monitoring and management practices with the true demands of the business, IT professionals must expand beyond traditional comfort zones of watching network and system health metrics to begin measuring and understanding the experience IT end users are having. Join EMA Vice President of Research, Jim Frey, and Fluke Networks Director of Products, Doug Roberts, for this on-demand webinar and discussion that will reveal:
Tags : 
quality of experience, qoe, monitoring, network, systems, applications, services, proactive practices
    
EMA
Published By: Polycom     Published Date: Dec 18, 2014
IT leaders are now at the center of a significant technological and marketplace shift and must understand how the world is changing and the role video will play in the world of tomorrow. In our infographic, global futurist Jack Uldrich outlines the key trends driving the evolution of work practices, and what this means for the CIO of today.
Tags : 
business, video, conference, multicultural, meetings, communication, cio, digital
    
Polycom
Published By: Navisite- A Time Warner Cable Company     Published Date: Aug 07, 2013
Designing and implementing an enterprise security plan can be a daunting task for any business. To help facilitate this endeavor NaviSite has developed a manageable process and checklist that can be used by enterprise security, compliance, and IT professionals as a framework for crafting a successful cloud computing security plan. It defines seven steps—sequentially—that have been tested and refined through NaviSite’s experiences helping hundreds of companies secure enterprise resources according to best practices. This plan enables organizations to gain the economic advantages of secure and compliant managed cloud services.
Tags : 
cloud, security, cloud computing, security plan, enterprise security
    
Navisite- A Time Warner Cable Company
Published By: DocuSign UK     Published Date: Nov 16, 2017
"Industry experts predict that successful businesses will soon become 100% digital for all transactions. Sales teams that leverage digital technology close more deals faster, improve the customer experience, and gain clear competitive advantages. Sales professionals are most effective when they’re equipped with the best tools. A mobile-enabled electronic workflow is becoming essential to optimise efficiency and provide teams with true flexibility. This best practices paper outlines eight important ways that sales teams can make meaningful progress in their digital transformations." ake meaningful progress in their digital transformations.
Tags : 
sales, professionals, marketing, customer, digital, docusign, esignature
    
DocuSign UK
Published By: McAfee     Published Date: Aug 14, 2014
Are you using the latest tools to guarantee your network survives an attack? Have you automated routine tasks, simplified upgrades and implemented plug-and-play deployment capability? Here are eight best practices for managing your network security.
Tags : 
firewall management, ngfw, next generation firewall, firewall resource, firewall staff, resource optimization, network security management, ngfw
    
McAfee
Published By: XpertHR     Published Date: Oct 23, 2017
Employers should take note that a significant number of legal changes on the federal, state and local level have or will have a substantial impact on workplace policies and employee handbooks. It is critical for an employer to review, amend and properly update its handbook for 2018 so that it reflects the latest legal requirements. An employer also needs to understand what the legal update is and how it affects the workplace, as well as develop and implement policies, practices and procedures to remain compliant. Further, an employer may need to update its employee handbook based on internal changes (e.g., benefits, performance management). Below are relevant XpertHR resources, including Employee Handbook policy statements, to assist an employer in updating its own handbook.
Tags : 
    
XpertHR
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library