Whitepaper Library
 

it strategy

Results 326 - 350 of 1769Sort Results By: Published Date | Title | Company Name
Published By: LifeLock     Published Date: Mar 02, 2015
Find out why LifeLock identify theft protection is the right choice for your business with this quick guide to our technology, leadership team, marketing strategy and more.
Tags : 
    
LifeLock
Published By: SAP     Published Date: Jun 12, 2015
Competition for talent is fierce, and employer branding – or communicating why your company is a great place to work – is becoming a more sophisticated and more critical part of a recruiting strategy. While you communicate an employer brand in many ways, it’s most important on the corporate career site, where you have the opportunity to convert people you’ve touched through other channels into potential future employees. A poor user experience on your career site negatively impacts your employer brand and greatly reduces the chance that people will fill out an application. Download this white paper to discover five best practices that can help make your career site your # 1 recruiting asset.
Tags : 
    
SAP
Published By: SAP     Published Date: Jun 12, 2015
In this white paper you will find: • Five ways to create a high-performing global culture • Six ways to dial in your talent strategy • Five tactics for compensation managers to shift the business • Six moves for recruiting mangers to build a talent powerhouse • Five ways learning managers can make a strategic contribution
Tags : 
    
SAP
Published By: Dell EMC     Published Date: Aug 22, 2017
Data is the foundation of the digital economy, but managing data growth poses a big challenge as organizations ramp up cloud adoption. Whether your organization is adopting a hybrid cloud strategy or building modern apps in the cloud, there are many challenges that can limit your effectiveness. With Isilon CloudPools and ECS, you can take advantage of cloud capabilities without a disruptive time-consuming migration of your data. In this webinar, we’ll discuss how Dell EMC puts you in control with a flexible cloud design, allowing you to take an application-centric approach to your data platform.
Tags : 
    
Dell EMC
Published By: SuccessFactors, an SAP Company     Published Date: Jun 18, 2015
Competition for talent is fierce, and employer branding – or communicating why your company is a great place to work – is becoming a more sophisticated and more critical part of a recruiting strategy. While you communicate an employer brand in many ways, it’s most important on the corporate career site, where you have the opportunity to convert people you’ve touched through other channels into potential future employees. A poor user experience on your career site negatively impacts your employer brand and greatly reduces the chance that people will fill out an application.
Tags : 
    
SuccessFactors, an SAP Company
Published By: SuccessFactors, an SAP Company     Published Date: Jun 18, 2015
In this white paper you will find: • Five ways to create a high-performing global culture • Six ways to dial in your talent strategy • Five tactics for compensation managers to shift the business • Six moves for recruiting mangers to build a talent powerhouse • Five ways learning managers can make a strategic contribution
Tags : 
    
SuccessFactors, an SAP Company
Published By: Dynatrace     Published Date: Jul 29, 2016
Gap free data helps you create and manage high-performing applications that deliver flawless end-user experience and customer loyalty. To be gap free, you must capture data from every single method in your application infrastructure, end-to-end, including timing and code-level context for all transactions, services and tiers, and make the data available for analysis. This eBook gives you technical and business case details that will show you why gap free data is a critical part of your application management strategy.
Tags : 
dynatrace, gap free data, applications, application performance, development, devops, application infrastructure, application performance management, user experience, application management
    
Dynatrace
Published By: Genesys     Published Date: May 10, 2016
This white paper will identify the key components of a comprehensive outbound engagement strategy and detail the benefits organizations can achieve with outbound communications.
Tags : 
genesys, frost & sullivan, communication, conversation, proactive, outbound engagement, customer experience
    
Genesys
Published By: Genesys     Published Date: Aug 11, 2016
This white paper will identify the key components of a comprehensive outbound engagement strategy and detail the benefits organizations can achieve with outbound communications. Are you ready to lean how?
Tags : 
outbound engagement strategy, outbound communications, genesys, support costs
    
Genesys
Published By: CA Technologies     Published Date: Jun 26, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Challenge Understanding, managing and containing risk has become a critical factor for many organizations as they plot their hybrid architecture strategy. Access by an expanding array of privileged identities looms large as a risk concern once organizations look beyond tactically using cloud services for cost and agility efficiencies. Existing approaches developed for static infrastructure can address initial risk concerns, but fall short in providing consistent policy enforcement and continuous visibility for dynamic, distributed infrastructure. Opportunity Multiple elements factor into how effectively an enterprise can embrace automation and advance the maturity of their transformation. However, security tools are central to enabling a structured and measured approach to managing critical access risks at each stage of the maturity model journey. With the right privileged access platform and set of tools, enterprises can progressively automate and scale access management to align risk
Tags : 
    
CA Technologies
Published By: Lucidworks     Published Date: Aug 24, 2016
This white paper discusses the imperative demand faced by organizations to create satisfying and relevant search experiences for their users. Executives who read this white paper will learn what it means to the overall organization to provide unified information access; the impact and benefits of and challenges to pursuing a strategy to unite information across an organization; and the strategies and examples of organizations that have effectively utilized tools to support unified information access in the pursuit of delivering a superior and more relevant search experience for their users.
Tags : 
search experience, unified information access, lucidworks, information strategy, relevant search, ecommerce search
    
Lucidworks
Published By: Skillsoft     Published Date: Dec 06, 2016
Millennials are the first true “digital natives,” and because of this, they are often associated with driving new work practices and expectations. However, it is actually the ubiquity of technology, the accelerated pace of work and our consumer experiences that are driving new work practices, not millennials. New research tells us that to be engaging, L&D teams need to focus on modern learning rather than millennials.The formula for modern learning is: • Learner-centric • Micro/modular • Varied treatments • Retention-driven • Embedded • Mobile Download “Millennial Learning Myths and Misconceptions Prescriptions for a Modern Learning Strategy” for tips for enabling modern learning at your organization.
Tags : 
learning, engagement, millennials, learning and development
    
Skillsoft
Published By: GE Power     Published Date: Jan 27, 2017
Don’t wait to implement your cyber protection program. An excellent place to begin developing your approach is with the newly published The U.S. Homeland Security Strategies for Defending Industrial Control Systems. See the 7 recommended strategies and learn and how digital solutions can help fulfill steps toward a more secure operating environment.
Tags : 
cyber security, power plants, utilities, power producers, power plant, cyber attacks, power grids, power industry, power plant software, us homeland security, cyber security strategy, powerplant security, powerplants, cyber security assessment, network security
    
GE Power
Published By: Veracode     Published Date: Oct 26, 2016
Web and mobile applications are now top attack vectors for cyber attackers, accounting for more than a third of data breaches. As a result, securing the application layer has now become a high priority for enterprises. Enterprise application security testing solutions for Web, native, cloud and mobile applications are key to this strategy. In the latest Gartner 2015 Magic Quadrant for Application Security Testing, Veracode has been positioned as a Leader for the third year in a row based on our completeness of vision and ability to execute in the AST market. Download the report for more on why Veracode's automated cloud-based service is in Gartner's “Leaders” quadrant.
Tags : 
veracode, gartner, magic quadrant, application security testing, security, application security
    
Veracode
Published By: Sprinklr     Published Date: Nov 22, 2016
A whitepaper that details why user generated content is important, and using UGC in your marketing strategy
Tags : 
user generated content, ugc, marketing strategy, social media strategy, social strategy, ugc strategy, ugc marketing strategy
    
Sprinklr
Published By: Sprinklr     Published Date: Nov 29, 2016
A whitepaper that discusses the impact of social media on customer service models, and how companies need to shift their strategy to effectively manage customer experience.
Tags : 
customer service, customer experience, customer retention, voice of the customer, social customer service, social customer care, customer care
    
Sprinklr
Published By: Progress     Published Date: Oct 09, 2017
Tailoring experiences for customers is critical to make your business standout. Customization works well for organizations that want to enhance their standard customer experience but don’t have the necessary tools or strategy for in-depth personalization. Learn about the 5 best practices for customizing websites and the 5 biggest challenges marketers face while customizing their websites.
Tags : 
    
Progress
Published By: CrowdStrike     Published Date: Feb 01, 2017
The frequency of “mega breaches” continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. This report asserts that many such breaches could be prevented by deploying next-generation endpoint protection technology in concert with an aggressive proactive hunting strategy. This potent combination provides the most effective means to reduce attack surfaces and defend against advanced adversaries.
Tags : 
    
CrowdStrike
Published By: Carbonite     Published Date: Aug 02, 2017
Every day, a new product launch promises speed, efficiency or savings for businesses eager to stay a step ahead. But if you’re an IT pro, and it’s your job to onboard the new system, the allure gives way to practical considerations: How are you going to move all that critical data—including dependencies, settings and custom configurations—from one system to another so it all talks to each other the way it’s supposed to? Whether you’re tackling a oneoff project or looking to improve your in-house skills, these eight tips for mastering migration will help you form a strategy, determine costs and find technical solutions to ensure successful migration no matter what platform you’re on or which one you’re moving to.
Tags : 
migration, technical solutions
    
Carbonite
Published By: Carbonite     Published Date: Oct 12, 2017
Today it is possible, even for smaller organizations, to establish both backup and full-fledged hybrid data protection under one robust onsite/offsite underpinning. ESG has four recommendations to assist such organizations as they try to pursue a disk-to-disk-to-cloud data protection strategy in the right way, with particular consideration for EVault by Carbonite.
Tags : 
evault, midsized businesses, data protection strategy, hybrid data protection, backup, recovery
    
Carbonite
Published By: RedPoint Global     Published Date: May 11, 2017
Marketing organizations are often limited in their ability to progress marketing tactics from single channel to cross-channel and real-time customer engagement. While marketing organizations might have a robust customer engagement strategy in place, often times there is a gap between their strategy and their ability to execute, with the right personalization and context that customers prefer. Over 62 percent of customers are always-on and readily addressable, but marketers aren’t implementing the right strategies to reach them. This eBook discusses data-driven marketing tactics that can help marketers mind the gap – bridging customer strategy and ability to execute, with the right personalization and context that customers prefer.
Tags : 
customer engagement, customer data, customer data platform, data quality, customer data management, customer experience, data-driven marketing
    
RedPoint Global
Published By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 18, 2017
By creating a connected field service ecosystem, organizations can increase their response time, reduce mean time-to-resolution and eventually, power a more predictive service model. This will enable a new level of field service productivity and cost-savings from increased efficiencies. Organizations will also be able to provide exceptional customer experiences consistently. Customer disruption and asset downtime will be minimized, and organizations will be able to empower their field service resources with insight into the issue before they arrive at the customer site. All thanks to a unified field service and IoT strategy.
Tags : 
internet of things, iot, daily activity, industry innovation, field service, organization management, device efficiency, telecommunications
    
Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
Published By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 18, 2017
If you’re looking to improve sales performance, optimize ecommerce, implement marketing automation, expand social media, deliver better customer service, or utilize accurate Configure-Price-Quote (CPQ) – it’s all Oracle. And, the icing on the cake? All of these solutions are integrated, but modular. We offer a breadth of solutions that you can not only buy individually, but can also easily integrate with existing or additional solutions as your business needs grow. Adapt your customer experience strategy to new technology in Forrester's navigate the future of CRM in 2017 Report.
Tags : 
mobile, artificial intelligence, chatbots, internet of things, integrated suite, cloud solutions
    
Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.