Whitepaper Library
 

dia

Results 1 - 25 of 2602Sort Results By: Published Date | Title | Company Name
Published By: MediaPass     Published Date: Apr 02, 2013
Read this paper to understand 3 sudden industry shifts that affect your site’s ability to survive in a changing landscape.
Tags : 
    
MediaPass
Published By: Tenable     Published Date: Aug 07, 2018
"Tenable Research’s analysis shows that how the race begins is a key indicator of how it will end. But, security teams have the power to reclaim the advantage by developing a risk-centric mindset and more agile vulnerability management. Download the report now to: - Find out more about Tenable Research’s analysis of the 50 most prevalent vulnerabilities - Get recommendations on how to reduce the attacker’s seven-day window of opportunity - Learn how real-world threat actor activity can be leveraged to prioritize vulnerabilities for remediation and mitigate the attacker’s first-mover advantage"
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security
    
Tenable
Published By: Butler Technologies     Published Date: Jul 02, 2018
A Next-Generation Approach to Attack Remediation
Tags : 
    
Butler Technologies
Published By: Butler Technologies     Published Date: Jul 02, 2018
Increasingly complex networks, require more than a one-size-fitsall approach to ensuring adequate performance and data integrity. In addition to the garden-variety performance issues such as slow applications, increased bandwidth requirements, and lack of visibility into cloud resources, there is also the strong likelihood of a malicious attack. While many security solutions like firewalls and intrusion detection systems (IDS) work to prevent security incidents, none are 100 percent effective. However, there are proactive measures that any IT team can implement now that can help ensure that a successful breach is found quickly, effectively remediated, and that evidential data is available in the event of civil and/or criminal proceedings.
Tags : 
    
Butler Technologies
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Application release automation (ARA) tools enable best practices in deploying and promoting applicationrelated artifacts, properties, configurations and even data across an application lifecycle in a safe, predictable and repeatable manner. Gartner reports that using an ARA tool is key to enabling DevOps and achieving continuous delivery. Wikipedia also defines five dimensions of scalability that can apply to ARA tools: • Administrative scalability • Functional scalability • Geographic scalability • Load scalability • Generational scalability This white paper will explain how each of these criteria is relevant when choosing an ARA product that is capable of scaling along with the growth of your enterprise.
Tags : 
    
CA Technologies_Business_Automation
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
You’ve made a major investment in Oracle E-Business Suite applications to run your critical enterprise processes. But these processes stretch beyond Oracle E-Business Suite and rely on a mix of custom and packaged applications. Management of your critical enterprise processes has become a pressing challenge. Too many staff are tied up in managing the process, as well as finding and diagnosing process errors. SLAs are frequently missed, and customers perceive poor quality of service due to the recurring errors and delays, which are now impacting your critical processes, such as financial period end close, invoicing, payroll and materials requirements planning (MRP) processing. You’ve decided it’s time to consider automation. Automating Oracle E-Business Suite processes end-to-end can eliminate 90% of business process errors. Download this whitepaper to find out how.
Tags : 
    
CA Technologies_Business_Automation
Published By: WorkBook from Deltek     Published Date: Jul 20, 2018
Profitability is the oil in your agency’s engine. Without it your agency could get by for a little while, but eventually it would lose momentum and stall. Ensuring agency profitability isn’t as difficult as it may seem. In this eGuide, you will find 10 actions that you can take immediately to turn your agency into a well-oiled profitability machine
Tags : 
    
WorkBook from Deltek
Published By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
    
Lookout
Published By: Abacus Labs     Published Date: Jul 12, 2018
As more pressure is placed on the finance team to provide meaningful insights more frequently, it is becoming increasingly necessary to speed up business processes, as well as have immediate access to the most up-to-date information. The traditional expense reporting process is a drain from both perspectives. Using software to manage employee expenses can provide a more efficient means of managing the process, however most solutions are simply a digital version of the traditional paper process. This can limit the amount of time savings you can gain. This paper will demonstrate the time savings you can accomplish by implementing a real time expense reporting solution versus one that relies on employee generated expense reports.
Tags : 
expense, reporting, roi, calculations, digital, employee, finance
    
Abacus Labs
Published By: KPMG     Published Date: Jul 10, 2018
As organisations increasingly leverage data, sophisticated analytics, robotics and AI in their operations, we ask who should be responsible for trusted analytics and what good governance looks like. Read this report to discover: • the four key anchors underpinning trust in analytics – and how to measure them • new risks emerging as the use of machine learning and AI increases • how to build governance of AI into core business processes • eight areas of essential controls for trusted data and analytics.
Tags : 
    
KPMG
Published By: Menlo Security     Published Date: Jun 01, 2018
"Uncover the Business Impact of Managing Risky Web Content Download this white paper to learn: How to safely manage ""uncategorized"" websites when sites are unknown to the secure web gateway (SWG) policies, which are largely based on website categories, such as news, entertainment, weather, social media, etc. The cost implications of securing web content, including staffing, clean-up and risk mitigation Isolation - a new technique for malware prevention to maintain end user & IT staff productivity Administrators can either be lenient in allowing access to uncategorized sites, increasing malware risk, or deny access and deprive employees of necessary information. There are hidden costs to both approaches. "
Tags : 
    
Menlo Security
Published By: XpertHR     Published Date: Jun 13, 2018
Multiple locations. Many hourly employees. Myriad pay rates and scheduled hours. Add multiple sick leave laws to the mix. The result: potential chaos and confusion. XpertHR can help. We take the complexity out of staying on top of the shifting paid sick leave law landscape to ensure compliance, understanding and clear employee communication. Michigan and Indiana are banning local sick leave laws. Cities from San Francisco to New York City are leading the pack in favor of them. These and other states and cities around the country are creating a complex playing field for HR professionals when it comes to ensuring compliance with paid sick leave laws. You don’t have the time, or resources, to stay on top of these trends. We do! ? Understanding variations and similarities in laws across jurisdictions ? Understanding how local laws relate to federal and state laws ? Identifying implications related to temporary and contract staff ? Ensuring compliance with notification, documentation, acc
Tags : 
paid sick, leave management, employee leave, compliance, leave laws, employee management, employee benefit
    
XpertHR
Published By: XpertHR     Published Date: Jun 13, 2018
Multiple locations. Many hourly employees. Myriad pay rates and scheduled hours. Add multiple sick leave laws to the mix. The result: potential chaos and confusion. XpertHR can help. We take the complexity out of staying on top of the shifting paid sick leave law landscape to ensure compliance, understanding and clear employee communication. Michigan and Indiana are banning local sick leave laws. Cities from San Francisco to New York City are leading the pack in favor of them. These and other states and cities around the country are creating a complex playing field for HR professionals when it comes to ensuring compliance with paid sick leave laws. You don’t have the time, or resources, to stay on top of these trends. We do!
Tags : 
paid sick, leave management, employee leave, compliance, leave laws, employee management, employee benefit
    
XpertHR
Published By: Workday Italy     Published Date: Aug 15, 2018
In our 35-criteria evaluation of software-as-a-service (SaaS) HR management systems providers, we identified the eight most significant ones — ADP, Ceridian, Meta4, Oracle, Ramco Systems, SAP SuccessFactors, Ultimate Software, and Workday — and researched, analyzed, and scored them. This report shows how each provider measures up and helps application development and delivery (AD&D) professionals and their HR business stakeholder clients make the right choice.
Tags : 
    
Workday Italy
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Nel suo libro Psicologia della scienza, pubblicato nel 1966, lo psicologo americano Abraham Maslow analizzò la teoria secondo cui coloro che operavano in ambito psicologico necessitavano di un approccio alla cura da più punti di vista per favorire la genesi di nuove idee, senza limitarsi a utilizzare le stesse teorie e le medesime tecniche create da Freud e dai suoi seguaci in un passato ormai remoto. Partendo dal presupposto che può risultare difficile cambiare il proprio punto di vista, Maslow scrisse: "[...] La tentazione, se l'unico strumento che hai è un martello, è di trattare tutti i problemi come se fossero chiodi". Abbiamo fatto tutti questa esperienza. Siamo talmente abituati a fare le cose come si facevano in passato che a volte non ci chiediamo neppure più il motivo per cui continuiamo a farle oggi.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
La protección del acceso con privilegios y la prevención de infracciones siguen constituyendo preocupaciones urgentes en empresas de todos los tamaños. Los atacantes recurren a una gama mayor de métodos más sofisticados para infiltrarse en sistemas vulnerables y, a pesar de que las noticias sobre infracciones externas ocupan con frecuencia los titulares, las organizaciones también deben ser capaces de defenderse contra las amenazas internas. De hecho, dado que en la actualidad se recurre de forma generalizada a la externalización y la asociación para acometer labores clave, un mayor número de usuarios tiene, hoy en día, acceso con privilegios a sistemas empresariales de fundamental importancia. Además, resulta primordial que los administradores actuales de los sistemas comprendan cómo se están utilizando estos últimos, quién los usa y en qué condiciones. Desafortunadamente, las soluciones estándar de seguridad no pueden proteger el acceso interno o con privilegios de manera eficaz y ad
Tags : 
    
CA Technologies EMEA
Published By: Acxiom Corporation     Published Date: Feb 24, 2011
A Chief Marketing Officer's Roadmap. In this paper Acxiom shows how Media Mix Optimization can help overcome the complex challenges of today's marketing. Herein we not only detail both the "Journey" of MMO and its rewards but also how to avoid several key hurdles along the way.
Tags : 
acxiom, optimization, media mix, mmo, halo effects, cmo, chief marketing officer
    
Acxiom Corporation
Published By: ChannelAdvisor     Published Date: Jul 20, 2018
"Social advertising has become one of the best ways to connect with e-commerce customers and grow sales channels. Retailers and brands are clearly aware of this shift, as evidenced by the explosion of social-focused digital marketing strategies. Two of the world’s most-frequented social platforms, Facebook and subsidiary Instagram, have proven to be the most profitable. But with more than 5 million businesses advertising each month, competition is fierce. In this eBook, you’ll learn: - Why Facebook and Instagram are essential to e-commerce success - Which advertising options should be on every seller’s radar - How to maximize your presence on these top-performing social networks"
Tags : 
    
ChannelAdvisor
Published By: ASG Software Solutions     Published Date: Aug 04, 2009
Businesses expect IT management to demonstrate their contributions to end-user benefits and the bottom line while addressing immediate needs and long-term performance management goals. This white paper presents IT2020, a new performance management paradigm for meeting both of these expectations.
Tags : 
asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm, workflow
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Jun 05, 2009
ASG's Business Service PortfolioT (BSPT) Virtualization Management provides comprehensive oversight, inspections, discoveries, warnings, diagnostics, and reporting for the critical technology and administrative disciplines involved in virtual workload management. This is all done in parallel with physical systems management.
Tags : 
asg, sla, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization
    
ASG Software Solutions
Published By: Context Optional     Published Date: Mar 09, 2010
If you're a brand marketer or digital agency looking to amplify your social marketing initiatives this year, this document will guide you through the growing world of Facebook apps. Today, there are more than 500,000 active applications on Facebook, but of these only 250 applications have more than one million monthly active users. You've downloaded this guide because you recognize that marketing today means creating a two-way dialogue with your customers.
Tags : 
context optional, social media, facebook, social networking, social applications, social marketing, email newsletters
    
Context Optional
Published By: Nuance     Published Date: Feb 09, 2011
Since Adobe debuted the PDF file format in the early 1990s, it has become the defacto standard for electronic documents in many markets. While engineers, publishers, and printers push the format to its technical limits with rich media and 3-D content, the general office worker comprises the PDF-using majority.
Tags : 
nuance, pdf, office environment, rich media, adobe, conversion
    
Nuance
Published By: BitGravity     Published Date: Dec 17, 2009
This paper outlines the seven essential buying criteria that every decision-maker needs to consider when making a decision on a video delivery provider. These buying criteria are shared across the gamut of small, video-centric startups and established, familiar media giants.
Tags : 
bitgravity, video delivery, legacy cdns, network architecture, internet video, file management, total cost ownership, proxy cache, bandwidth management, infrastructure, traffic management
    
BitGravity
Published By: StrongMail     Published Date: Jul 31, 2009
The rise of social media is intrinsically connected to email, which was itself the first social network. Email marketers must leverage this complementary channel to expand their reach beyond the email list, realizing the power of viral marketing in the social web.
Tags : 
strongmail, social media, email marketing, emarketing, roi, swyn, networks, social networking, twitter, youtube, rich media
    
StrongMail
Published By: StrongMail     Published Date: Jun 08, 2008
The growing trend towards insourcing marketing and transactional email is being driven by businesses that are looking for ways to improve their email programs, increase data security and lower costs. When evaluating whether it makes more sense to leverage an on-premise or outsourced solution, it's important to understand how the traditional arguments have changed.
Tags : 
strongmail, social media, email marketing, on-premise advantage, transactional email, insourcing, bounce management, spam trappers, emarketing, roi, networks, social networking
    
StrongMail
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.