strength

Results 251 - 275 of 365Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Nov 09, 2011
Learn how Forrester evaluated the strengths and weaknesses of top CCCM vendors.
Tags : information technology, marketing, cccm, communications, forrester
     IBM
By: Cisco     Published Date: Sep 07, 2016
This white paper explains what's needed for effective malware analysis.
Tags : 
     Cisco
By: K2     Published Date: Jan 07, 2016
Choosing the right solution to automate your business processes or meet specific business process needs isn’t easy. While a broad array of functionality is available, from BPM suites to custom applications that meet specific business needs, different solutions have differing capabilities and strengths across a variety of categories. In the following RFI, we’ve honed in on eight key areas for business process automation success to help you evaluate the quality of the platforms you are considering – and to ensure that the system you choose is agile and flexible enough to meet your business needs.
Tags : business process automation, rfi, best practices, bpm, networking, security, software development, it management
     K2
By: AuditBoard     Published Date: Nov 26, 2018
Affecting over 200,000 machines in more than 150 countries, the ransomware known as Wanna Decryptor, or “WannaCry,” became the largest cybersecurity attack in history in May 2017. The malicious software locked out users from critical data, and demanded a ransom payment to unlock the contents. Governments, hospitals, and corporations scrambled to address the attack and prevent the infection from spreading. Ironically, the virus’ execution method was simple: it exploited a vulnerable Windows SMB protocol to spread – an exploit Microsoft had addressed two months prior to the attack with the release of a patch.
Tags : 
     AuditBoard
By: Citrix Online     Published Date: Jul 01, 2010
This new smith+co white paper explores the importance of the customer experience and the role of technology in creating, nurturing and strengthening customer relationships with every single interaction.
Tags : citrix online tech, support center, customer experience management, contact center, crm
     Citrix Online
By: IBM     Published Date: Nov 22, 2014
In this first-release MQ, Gartner evaluates providers on service delivery, B2B Network/Collaboration, Integration Functionality and success in capitalizing on vision. Rated against an extensive 15-criteria evaluation, IBM earned one of only three Leader positions, and outpaced the competition in "completeness of vision," signifying our strength in delivering the most competitive solution to the marketplace.
Tags : integration brokerage, supply chain management, service delivery, integration functionality, b2b, it management, enterprise applications
     IBM
By: IBM     Published Date: Oct 17, 2014
In this first-release MQ, Gartner evaluates providers on service delivery, B2B Network/Collaboration, Integration Functionality and success in capitalizing on vision. Rated against an extensive 15-criteria evaluation, IBM earned one of only three Leader positions, and outpaced the competition in "completeness of vision," signifying our strength in delivering the most competitive solution to the marketplace.
Tags : integration brokerage, service delivery, integration functionality, competitive solutions, it management, data management
     IBM
By: IBM     Published Date: Feb 11, 2015
Securely connect people, applications and devices to cloud environments. While organizations build their cloud environment by choosing from multiple service delivery models – Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) – the security needs for each of the delivery models is different. Read this whitepaper to learn more about how: · Threat-aware identity and access management can strengthen security in each of the cloud delivery models · Self-service IAM solution can provide higher level of Security in Cloud as compared to on-premise
Tags : cloud environment, iaas, paas, saas, access management, security, it management
     IBM
By: IBM     Published Date: Feb 11, 2015
Strengthen application protection—from design to deployment—to proactively address cloud security risks.
Tags : cloud environment, web application, cloud-based security, ibm, ibm security, security, it management
     IBM
By: IBM     Published Date: Apr 09, 2015
Managing user identities and user-access privileges is a cornerstone of effective security for organizations. It is vitally important to verify that only the right people can access protected resources and that their activities are sufficiently monitored. However, in order to effectively compete and meet customer expectations, organizations are increasing the number of users—including customers, employees, citizens, partners and suppliers—who are allowed to access information across the web, the cloud and federated environments. This trend makes identity and access management even more challenging and exposes organizations to many potential risks.
Tags : user identities, ibm, user access privileges, customer satisfaction, information access, cloud, security risks, networking, security, it management, data management
     IBM
By: IBM     Published Date: Oct 06, 2015
Discover how to use behavior-based protection strategies to help disrupt mutating threats in real time, looking at how integrated, intelligent solutions from IBM can detect and help prevent attacks - from the network perimeter to remote endpoints.
Tags : behavior based protection, behavior based protection strategy, ibm, data protection, network protection, ibm solutions, security
     IBM
By: PermissionTV     Published Date: May 07, 2009
B2B Marketers can use online video to enhance the two-way dialogue with customers and prospects and strengthen the social relationship with online communities. Watch this free recorded webinar where experts from both online video and social media industries discuss ways to get started, capture ROI, and engage with online B2B audiences.
Tags : content personalization, emerging marketing, lead generation, rich media, social networking, b2b, roi, return on investment, webinar, video, vod, online video
     PermissionTV
By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
A white paper details how to apply authentication methods that strengthen security while delivering an excellent user experience.
Tags : trusted authentication, authentication methods, security, ibm
     Group M_IBM Q1'18
By: IAG Consulting     Published Date: Aug 24, 2010
Requirements excellence cannot be achieved without first understanding the critical capabilities of requirements maturity, and recognizing your organizations strengths and weaknesses. In order to develop a focused plan of attack, it is necessary to assess your requirements practice in each of six areas: process, technology, staff competency, organization, techniques, and deliverables. You will then be armed with the information you need to identify key improvement opportunities, recognize organizational strengths, and form concrete goals for action.
Tags : iag, project management, project management, maturity, consulting, model
     IAG Consulting
By: Microsoft Dynamics     Published Date: Jul 11, 2007
In this white paper we do not make specific recommendations for manufacturers to follow; rather, we present suggestions for competing effectively in a fast-paced industry. From adopting lean manufacturing practices to strengthening bidding and quoting processes, opportunities exist for companies to grow and thrive despite relentless cost pressures.
Tags : manufacturing, manufacturer, scm, supply chain, supply chain management, lean methods, lean manufacturing, lean, industrial, competitive, competitive analysis, productivity, microsoft, microsoft dynamics
     Microsoft Dynamics
By: CrownPeak     Published Date: Jun 30, 2009
Congratulations you've decided to embark on the journey to implement a content management system (CMS) for your Web site. This document assumes that you have already built the business case for purchasing a CMS and has been signed off on by the appropriate stakeholders. Learn more today!
Tags : crownpeak, cms, content management system, web site development, infocenter, hosted services, open source software, project definition, rfp, request for proposal, vendor strengths, os/ databases, hardware, infrastructure, document management, portal, licensing, workflow management, enterprise integration, enterprise application
     CrownPeak
By: CrownPeak     Published Date: Jun 30, 2009
This is the second of a three part CrownPeak White Paper exploring Why Content Marketing Is Online Marketing. In this series we present the new idea that Web content marketing is the central and most important tenet of online marketing. Today, the function of online marketing revolves around the Web which, itself, revolves around content. So as we talk about online marketing/marketers and content marketing/marketers consider them and yourself one and the same. Learn more today!
Tags : crownpeak, roi, web content marketing, cms, content management system, web site development, infocenter, hosted services, open source software, project definition, rfp, request for proposal, vendor strengths, os/ databases, hardware, infrastructure, document management, portal, licensing, workflow management
     CrownPeak
By: Cornerstone OnDemand     Published Date: Oct 13, 2017
Being a manager is hard. Being a great manager is even harder. Learn simple things you can do as a manager to increase performance from both individuals and teams. Simple strategies like: • Talk less, listen more • Play to your (and your team's) strengths • Manage teams, not individuals • Accentuate the positive
Tags : 
     Cornerstone OnDemand
By: IBM     Published Date: Apr 26, 2013
This Magic Quadrant assesses the APM market. First, we will define the market and explain why it's important to treat the five functional dimensions that together constitute its technology foundation in an integrated manner and to distinguish the APM market from others that are closely related to it. Next, we will set out the qualifying criteria for inclusion in this research and then survey some general characteristics of each of the resulting quadrants. This research will then conclude with a brief study of each participating vendor's APM strengths and weaknesses.
Tags : gartner, magic, quadrant, application, performance, monitoring, apm, market, strength
     IBM
By: Esker     Published Date: Jun 29, 2017
When folks in AR hear the word automation, it doesn't necessarily bring to mind the most positive, reassuring thoughts. Change is never a seamless process but distinguishing fact from fiction can go a long way. Every AR department has the same goals - reduce operating costs, collect payments faster and strengthen their relationships with customers - AR automation is simply a tool to help accomplish them. Learn why AR automation shouldn't be scary and why it matters more than ever in this insightful white paper.
Tags : accounts receivable management, invoice management, collections management, ar best practices, invoice portal, invoice delivery
     Esker
By: Esker     Published Date: Jun 29, 2017
With little to no oversight into billing and collections‚ it can be hard to evaluate and improve the performance of accounts receivable (AR) processes — but not anymore. AR Automation solutions provide access to critical analytics that go beyond DSO to transform your AR department into a more strategic‚ value-added operation. Read our new AR Analytics Playbook to discover the six essential metrics that can bring big gains in efficiencies‚ such as: • Faster customer payments • Reduced administrative costs • Enhanced collections efficiencies • Improved customer retention The competition isn’t getting any weaker. Start strengthening your business with an AR automation solution today!
Tags : accounts receivable management, invoice management, collections management, ar best practices, invoice portal, invoice delivery
     Esker
By: BlackBerry     Published Date: Mar 12, 2013
Mobile Computing Corp Inc. (MCC) specializes in mobile field service solutions. After a rigorous trial period, the company’s CEO concluded that “the strength of BlackBerry 10 is great.” Find out what made the experience so positive.
Tags : case study, enterprise feedback, blackberry 10, mobile field service solutions, mobile computing corp, enterprise applications
     BlackBerry
By: Blackberry     Published Date: Mar 12, 2013
Mobile Computing Corp Inc. (MCC) specializes in mobile field service solutions. After a rigorous trial period, the company’s CEO concluded that “the strength of BlackBerry 10 is great.” Find out what made the experience so positive.
Tags : mobile computing corp, implementing blackberry 10, feedback, enterprise, enterprise applications
     Blackberry
By: F5     Published Date: Feb 07, 2013
In this report, Gartner evaluates vendors’ strengths and weaknesses, and places vendors on the Magic Quadrant based on ability to execute and completeness of vision for application delivery controllers.
Tags : gartner magic quadrant, application delivery controllers, gartner survey, gartner review, controllers, enterprise applications, data center
     F5
By: IBM     Published Date: Oct 10, 2013
Like many financial institutions today, the full-service Swedish bank featured in this case study has responded to changing customer needs, evolving from its original founding more than 100 years ago. As a result, the bank has realized remarkable success. Of course, along with that success have come significant challenges. New business growth, plus the rise in Internet and mobile banking, intensified the bank’s need for continuous availability of its IT infrastructure. IBM Resiliency Consulting Services helped the bank strengthen and streamline its environment. In the case study, you can read how teaming with IBM helped the bank meet recovery point and recovery time objectives; mitigate risk; and provide the flexibility to meet business demands without added IT expense.
Tags : ibm, resiliency consulting, ibm, full-service swedish bank, hyperswap, optimizing risk management, risk management, bank optimization, management capabilities, swedish banks, resiliency consulting, consulting solution
     IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com