professionals

Results 251 - 275 of 973Sort Results By: Published Date | Title | Company Name
By: NetApp     Published Date: Sep 21, 2017
In the current landscape of modern data centers, IT professionals are stretched too thin. Triage situations are the norm and tend to reduce the time spent on strategic business objectives. This paper offers a solution to this IT dilemma, outlining the ways to achieve a storage infrastructure that enables greater performance and capacity.
Tags : netapp, database performance, flash storage, data management, cost challenges, all-flash
     NetApp
By: OpenDNS     Published Date: Mar 31, 2015
A security strategy centered on preventing identified attacks and threats no longer provides adequate protection. New malware tactics emerge at a rate impossible for security professionals to match. Learn how to become a less appealing target and reduce the potential impact of security breaches.
Tags : 
     OpenDNS
By: Intralinks     Published Date: Apr 13, 2015
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: • Half of all respondents lack the confidence to deal with risky file sharing practices • 62% of respondents accidently sent files to unauthorized individuals outside the organization • 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: • The extent of the risk associated with unsecure file sharing • The individual behaviors driving and organizational responses to information loss
Tags : 
     Intralinks
By: Intralinks     Published Date: Apr 13, 2015
In the wake of the 2008 financial crisis regulatory exams have become increasingly demanding for governance, risk, and compliance professionals. New rules brought about by the Dodd-Frank Act will continue to shape future examinations including safety and soundness, compliance, market conduct, and risk-based targeted exams. We can expect these changes will require examiners to spend more time onsite, request more documents, and extend the scope and/or depth of their examinations. This means it is more important than ever to avoid the classic mistake of sharing examination documents through ad-hoc, manual processes and delivering highly sensitive data through unsecured channels like mail, e-mail, thumb drives, and FTP. In response to these increasing burdens financial institutions are looking to take control with a more structured, collaborative process for collecting, refining, and submitting regulatory information. Download this white paper to learn more about Intralinks VIA.
Tags : 
     Intralinks
By: Waterline Data & Research Partners     Published Date: May 18, 2015
In this report, Forrester Research recommends that application development and delivery (AD&D) professionals working on BI and big data initiatives get the best out of both by designing and integrating them in a flexible data platform.
Tags : waterline, big data, automation, cataloging, processing, analysis, assets, data science
     Waterline Data & Research Partners
By: Teradata     Published Date: Sep 21, 2015
This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help customer insights (CI) professionals select the right partner for their RTIM needs.
Tags : application management, business analytics, business process management (bpm), cloud applications, desktop management, experian, forrester, integrated cloud solution
     Teradata
By: SilkRoad Technology     Published Date: Feb 24, 2016
At Connections 2014, SilkRoad’s annual user conference, a panel of human resources professionals convened to discuss timely onboarding issues including automation, socialization, duration, and ownership.
Tags : silkroad, human resources, onboarding, hr professional
     SilkRoad Technology
By: SilkRoad Technology     Published Date: Feb 24, 2016
For decades, learning in a corporate environment consisted of a day or a week of classroom-based training. However, technological advances delivered on the promise of a more complex learning protocol with automated, virtual, and experiential elements. At Connections 2014, SilkRoad’s annual user conference, a panel of learning professionals convened to discuss five major learning themes this year, including integration, mobility, engagement, compliance, and analytics.
Tags : silkroad, human resources, industry trend, learning
     SilkRoad Technology
By: Puppet     Published Date: May 20, 2016
This July 2015 Forrester Report explores: - Why consistent, automated DevOps processes are essential to closing vulnerabilities and limiting exposure. - Practices, such as infrastructure as code and automated provisioning, for closing holes as soon as patches are available. - How DevOps and security professionals can work together to adopt DevSecOps.
Tags : 
     Puppet
By: Citrix ShareFile     Published Date: Jul 11, 2017
Finance moves fast, and the ability to work from anywhere on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive financial data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. Why data encryption is often easier to adopt as part of a cloud initiative What top security threat your employees are less susceptible to on personal devices How to manage device updates and passwords for the greatest protection
Tags : finance, data encryption, mobility, security, data
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Jul 11, 2017
Some financial professionals store or share terabytes of electronic information, including quarterly reports, billing statements or even sensitive personal data belonging to clients. Read this e-Book to better understand your security risks. You’ll learn: The common challenges of data security Steps to solve these challenges And much more
Tags : finance, data security, security risks, encryption
     Citrix ShareFile
By: Lookout     Published Date: Mar 28, 2018
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile specifc security. To encourage this evolution, Lookout developed the Mobile Risk Matrix. Its purpose is to help security organizations understand the spectrum of risk on mobile devices and to provide data that demonstrates the prevalence of mobile risk.
Tags : 
     Lookout
By: Google     Published Date: Aug 09, 2017
This report looks at the biggest changes in firms’ expectations of their chief information security officers (CiSOs) and provides specific examples of how top information security professionals rise to those occasions.
Tags : security, ciso, chief information security officers, performance, customer experience, customer engagement
     Google
By: DocuSign UK     Published Date: Nov 16, 2017
"Industry experts predict that successful businesses will soon become 100% digital for all transactions. The key challenge is how to “go digital” in the right ways. For most companies, it will be an incremental journey. BusinessNewsDaily.com notes that CIOs and business-minded technology leaders are moving beyond being supportive functions and into being an integrated part of overall business strategy and operations. IT is delivering added value, enhanced business performance, and greater security. This best practices paper outlines eight important ways that IT teams can make meaningful progress in their digital transformations."
Tags : digital, practices, professional, technology, esignature, docusign
     DocuSign UK
By: DocuSign UK     Published Date: Nov 16, 2017
"Industry experts predict that successful businesses will soon become 100% digital for all transactions. The challenge is how to “go digital” in the right ways. For many companies, it will be an incremental journey. The HR world is changing quickly—global candidates are tech-savvy and are relying on mobile-enabled interactions. Now more than ever, HR teams are looking to improve the onboarding experience, increase employee satisfaction, and focus HR staff away from mundane tasks. This best practices paper outlines seven important ways that HR teams can make meaningful progress in their digital transformations." .
Tags : professionals, team, digital, transformations, technology, optimization
     DocuSign UK
By: DocuSign UK     Published Date: Nov 16, 2017
"Industry experts predict that successful businesses will soon become 100% digital for all transactions. The key challenge is how to “go digital” in the right ways. For most companies, it will be an incremental journey. TodaysGeneralCounsel.com suggests that organisations should focus on a broad enterprise-wide information governance strategy developed by IT, legal, records and business stakeholders. Doing so improves governance, risk management and compliance programs. This best practices paper outlines seven important ways that legal teams can make meaningful progress in their digital transformations." .
Tags : legal, professionals, digital, practices, docusign, esignature
     DocuSign UK
By: DocuSign UK     Published Date: Nov 16, 2017
"Industry experts predict that successful businesses will soon become 100% digital for all transactions. Sales teams that leverage digital technology close more deals faster, improve the customer experience, and gain clear competitive advantages. Sales professionals are most effective when they’re equipped with the best tools. A mobile-enabled electronic workflow is becoming essential to optimise efficiency and provide teams with true flexibility. This best practices paper outlines eight important ways that sales teams can make meaningful progress in their digital transformations." ake meaningful progress in their digital transformations.
Tags : sales, professionals, marketing, customer, digital, docusign, esignature
     DocuSign UK
By: DocuSign UK     Published Date: Nov 16, 2017
"Today’s procurement leaders are using technology to achieve greater procedural and financial efficiencies, secure the best products and services, and improve vendor relationships. However with the lack of technology to boost efficiency and strengthen the partnership with vendors and employees, saving costs and speeding up procurement processes can be quite cumbersome. Industry experts predict that successful businesses will soon become 100% digital for all transactions. The challenge is how to “go digital” in the right ways. Download this best practices paper to learn the eight important ways that procurement teams can make meaningful progress in their digital transformations. "
Tags : procurement, professionals, practices, departments, digital, docusign, esignature
     DocuSign UK
By: Cohesity     Published Date: May 04, 2018
Cohesity provides the only hyper-converged platform that eliminates the complexity of traditional data protection solutions by unifying your end-to-end data protection infrastructure – including target storage, backup, replication, disaster recovery, and cloud tiering. Cohesity DataPlatform provides scale-out, globally deduped, highly available storage to consolidate all your secondary data, including backups, files, and test / dev copies. Cohesity also provides Cohesity DataProtect, a complete backup and recovery solution fully converged with Cohesity DataPlatform. It simplifies backup infrastructure and eliminates the need to run separate backup software, proxies, media servers, and replication. This paper specifically focuses on the business and technical benefits of Cohesity DataPlatform for the data protection use case. It is intended for IT professionals interested in learning more about Cohesity’s technology differentiation and advantages it offers for data protection - (i) Elim
Tags : 
     Cohesity
By: Abacus Labs     Published Date: Feb 01, 2019
“It’s not what you know. It’s who you know.” We’ve all heard the phrase. We all understand there’s truth to it. But ask yourself: would you recommend or hire everyone you know? No way. Having the right connections is important to advancing your career. But it’s only half the battle. What really creates opportunity is defining your personal brand to your employer, to your network, to the market. It’s taking that moment when you make a great impression and scaling it to the larger world. This guide presents different approaches real professionals are using to build their brands. You’ll see tips and strategies that you can use to become an in-demand finance leader, including a system we developed called the ROLE Model of personal branding. In the age of effortless connection, cultivating a personal brand is essential. It’s not just who you know. It’s what they know you can do.
Tags : 
     Abacus Labs
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
In 2018, the Enterprise Strategy Group (ESG) completed a research survey of 450 cybersecurity, IT, and networking security professionals with knowledge of or responsibility for the policies, processes, and controls used for remote office/branch office (ROBO) security. This report is the summary of ESG's conclusions from the study.
Tags : 
     Cisco Umbrella EMEA
By: Illusive Networks     Published Date: Apr 10, 2019
How well-equipped is your organization to stop malicious attackers once they’re inside your network? According to this study of over 600 IT security professionals, almost two-thirds of respondents lack efficient capabilities to detect and investigate “stealth” attackers before serious damage occurs. Download the report to learn the primary obstacles to better threat detection and incident response, how well organizations are hardening their environments against lateral movement, and how cybersecurity budgets are changing to address the reality that attackers will get in.
Tags : risk management, it security, ponemon institute, ponemon, cybersecurity, research report, cyber attack, data breach
     Illusive Networks
By: Dassault Systèmes     Published Date: Jul 25, 2017
There is a large gap between understanding how important project management is to a successful product launch and how effective a company may be with its actual execution. John Hayes, CEO of Engineering.com, and Jon Gable, former Strategic Planning Director for Dassault Systèmes , team up to bring you a webinar on product development and project management tools. This webinar covers: • Research report findings from 140 product development professionals • Analysis of how product development issues can be addressed • Web-based project management for product development Gain insight into the latest thinking on project management for product development and how project management issues can impact business at the highest level.
Tags : project management, company optimization, execution, product development, research report, web based, business impacts
     Dassault Systèmes
By: NAVEX Global     Published Date: Jul 17, 2017
Establishing a culture of integrity, ethics and respect is the number one priority for companies in 2017, according to a new report. In common with the 2015 report, getting an organisation's culture right is the main objective for compliance professionals in the year ahead, with 85 per cent of respondents saying it is one of their three main goals. However despite this, only 32 per cent of firms indicated that they are planning to undertake a culture or ethics assessment in the next twelve months. In addition, workplace behaviour was rated as the lowest area of risk receiving attention by stakeholders (29 per cent). Download the full report for additional stats on board level reporting, increasing compliance programme awareness and satisfaction with third party risk management.
Tags : measuring programme effectiveness, insufficient staff, managing regulations, lack of tools, budget issues, programme reporting
     NAVEX Global
By: Panaya     Published Date: May 31, 2018
When it comes to investing in ERP systems, improving the efficiency and responsiveness of business processes is a top concern for SAP customers. However, among IT professionals, safe delivery is of higher priority than ERP digitalization or starting an IT agility transformation. With SAP S/4HANA, this no longer needs to be a compromise. When moving to SAP S/4HANA, IT professionals need to implement not only the technical upgrade of SAP S/4HANA but also the required customizations, which necessitate an intensive amount of business collaboration and software delivery. And for that to happen, IT needs an enterprise agile delivery solution to gather and implement the business requirements to SAP S/4HANA as quickly as possible without business disruption. Read this white paper to discover how you can transition to SAP S/4HANA and achieve true enterprise agile delivery — a new standard to deliver changes to your SAP environment. Topics include: › Sync business and IT to ensure your ERP solu
Tags : 
     Panaya
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com