information management

Results 176 - 200 of 641Sort Results By: Published Date | Title | Company Name
Published By: OpenText     Published Date: Sep 27, 2017
Today’s fast-moving consumer market is putting pressure on manufacturers to be able to share digital product information seamlessly and quickly across retail and distribution channels. A centralized digital asset management platform helps to simplify the distribution of digital information across the extended enterprise.
Tags : 
openttext, manufacturing, digital, retailer engagement, distributor engagement
    
OpenText
Published By: HotSchedules     Published Date: Apr 19, 2017
Studies show that small bursts of information – micro-learning – have a higher retention rate when training your team, making employee management easier and more successful. Plus, this method puts learners in complete control, giving them materials that fit THEIR lifestyles: on-the-go, mobile and often informal.
Tags : 
content, optimization, workforce, lifestyle, mobile
    
HotSchedules
Published By: WorkBook from Deltek     Published Date: Apr 26, 2018
With its clients’ needs as the cornerstone of its mission, a research and consulting firm in the healthcare industry wanted a better way to manage its business. The company had been using various spreadsheets and systems to track project and financial information, which made finding data time consuming and inefficient. As a project based business, with the majority of its projects ranging from 2-6 weeks in duration, the organization wanted an integrated solution to help optimize its overall project management approach. The firm selected Deltek and since implementation has experienced numerous benefits, including increased time savings, improved visibility into financial data and enhanced performance.
Tags : 
research, consulting, healthcare, marketing, firm, performance
    
WorkBook from Deltek
Published By: OnBase by Hyland     Published Date: Apr 26, 2017
Sprawl isn’t just a problem for cities. IT sprawl can hurt organizations, too. If left unchecked, multiple systems and platforms can cause inefficiency to rise and customer satisfaction to fall. Instead, think like an urban planner and manage growth with a master plan. In this white paper, see how you can put IT sprawl in its place with a single, scalable information management platform.
Tags : 
sprawl, applications, content, information, management, systems, cio, hyland, onbase, platform, ecm, infrastructure, repository, hub, enterprise, data, white, paper, storage
    
OnBase by Hyland
Published By: OnBase by Hyland     Published Date: Apr 26, 2017
IT sprawl can be a serious roadblock to your organization's future success, as disconnected information systems and multiple applications get in the way of overall performance. Instead, put sprawl in its place by thinking like an urban planner. In the complimentary e-book, learn how to manage growth with a master plan that uses a single enterprise information platform.
Tags : 
sprawl, application, content, information, management, system, cio, hyland, onbase, platform, ecm, infrastructure, ebook, scalable, silo, enterprise, data, e-book, storage
    
OnBase by Hyland
Published By: Insight Software     Published Date: May 22, 2018
Don’t settle. Forward-thinking finance professionals know that there is a better way. Though BI tools have provided visibility to data, they have in fact failed to provide direct access to enterprise information. However, evolution does not stop there: Next-gen corporate performance management solutions are among us and promise to deliver interconnected, flexible, and realtime data access. Agility achieved.
Tags : 
erp, enterprise, finance, evolution, performance
    
Insight Software
Published By: Global Software     Published Date: Aug 13, 2018
Streamlining the close process is the new imperative for many financial executives in order to keep pace with the speed of information coming from various mediums. When financial information is released weeks after the period end, the risk is that this information is perceived and received as old news and less relevant for management decision making. This amplifies the perception of the finance department acting as the “back office” and just another cost center inside the organization.
Tags : 
financial, executives, management, organization
    
Global Software
Published By: Intel Security     Published Date: Feb 23, 2015
This report reveals the key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.
Tags : 
security information, security connected framework, big security data, big data, log management, cyber-attacks, hackers, reference archecture, siem, security event management
    
Intel Security
Published By: Intel Security     Published Date: Feb 23, 2015
This White Paper illustrates a magic quadrant analysis including vendors that have technologies designed for SIEM purposes.
Tags : 
gartner, magic quadrant, security connected framework, big security data, big data, log management, siem, security information, event management
    
Intel Security
Published By: Intel Security     Published Date: Feb 23, 2015
This paper reveals how cloud and compliance could be in one thanks to McAfee Enterprise Security Manager.
Tags : 
security information, security connected framework, big security data, big data, log management, siem, security event management
    
Intel Security
Published By: Brainloop     Published Date: Nov 03, 2011
Online collaboration has allowed companies to leapfrog their competition. But how do they avoid risk? This paper explores options for high-productivity collaboration supporting security and compliance. Must reading for anyone interested in strategic IT and compliance!
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, document protection, document security, document sharing, electronic document management, file protection, governance, grc, information risk, it risk management, mergers acquisitions due diligence, mobile collaboration, online collaboration, online document sharing
    
Brainloop
Published By: Brainloop     Published Date: Nov 09, 2011
This paper advocates that for any document sharing application to genuinely add value, it must augment or complement the organization's existing document security infrastructure.
Tags : 
brainloop, enterprise, information management, security options, technology, business
    
Brainloop
Published By: Brainloop     Published Date: Nov 09, 2011
This white paper by Cheryl Klein, CPA, CISA, CITP, analyzes 10 questions that help identify compliance risks in your company. The 10 scenarios illustrate smart, cost-effective strategies for SOX, PII, HIPPA and security policy issues.
Tags : 
brainloop, security, compliance risks, sharing information, security management, data protection
    
Brainloop
Published By: CCMI     Published Date: Sep 19, 2012
In this whitepaper, you'll discover the five essential elements to consider when evaluating tools for telecom management.
Tags : 
information technology, telecommunications, telecom, telecom management, business technology
    
CCMI
Published By: Oracle     Published Date: Apr 22, 2015
This white paper provides information on how the marriage of social collaboration, CRM, and performance management presents new opportunities for great sales managers to scale their skills more effectively.
Tags : 
future of sales performance management, crm, social, sales, get better sales results, sales managers
    
Oracle
Published By: CA Service Assurance     Published Date: May 15, 2011
Evolving to the next level of IT effectiveness requires a new level of integration and analysis of cross-silo management information. This involves linking application status and root-cause information with infrastructure status and relating that to impact on IT service quality. Read this brief to learn how this approach to IT management can benefit your organization.
Tags : 
it operational efficiency, cross-silo, infrastructure status, it service quality, it management, business service analytics, reporting
    
CA Service Assurance
Published By: HP - Enterprise     Published Date: Oct 16, 2008
If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement:  Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow.  Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, pci, compliance, payment card industry, data security standards, data management
    
HP - Enterprise
Published By: SAP Inc.     Published Date: Jun 16, 2009
As the sheer amount of information available for Business Intelligence (BI) applications has grown, and the sophistication of BI capabilities has accelerated, organizations are striving to improve time-to-information for business users.
Tags : 
sap, data management, business intelligence, data storage, laggards, best-in-class, time-to-information, data management infrastructure costs, enterprise applications
    
SAP Inc.
Published By: SAP Inc.     Published Date: Jul 28, 2009
In this paper, Frank Dravis, Six Factors Consulting, discusses how even with the finest marketing organizations, the success of marketing ultimately comes down to the data.
Tags : 
single platform, data integration, data quality, quality management, soa, architecture, soa, sap businessobjects data services, platform, sap, service-oriented architecture, xl 3.0, data management, developer, source, data integration, business intelligence, legacy, crm, customer relationship management
    
SAP Inc.
Published By: Symantec.cloud     Published Date: Apr 28, 2011
This whitepaper discusses key considerations for conducting effective eDiscovery.
Tags : 
symantec.cloud, ediscovery, frcp, fre, edrm, imrm, data management, information management, content preservation, business content, electronic data content, litigation, esi
    
Symantec.cloud
Published By: Oracle     Published Date: Apr 03, 2012
Although more than two-thirds of confidential information is regulated through database management systems, no computer security program offers adequate protection for the databases against the main threats affecting them today. Oracle, the leader in databases technologies, offers security solutions for the protection of all layers of the database.
Tags : 
grid computing, oracle, database applications, enterprise applications
    
Oracle
Published By: Actiance     Published Date: Jul 09, 2012
SharePoint is used for a variety of information management tasks, the majority of which are subject to regulatory, e-Discovery, and legal mandates, as well as existing corporate policies.
Tags : 
sharepoint, double positive, microsoft, business technology
    
Actiance
Published By: HP - Intel®     Published Date: Oct 05, 2012
This whitepaper is a rich media document, and includes industry viewpoints, multimedia content, and up to three detailed customer case studies embedded within this single dossier.
Tags : 
security, security practices, enterprise security, security information management, government, application security, security services, business technology
    
HP - Intel®
Published By: Tripwire     Published Date: Nov 07, 2012
Many professionals in information security espouse the belief-and commitment to-"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Ironically, the analysis of the responses collected by the survey indicated that despite their stated intentions, most of the respondents and their organizations were not acting in ways that reflected this commitment.
Tags : 
security, tripwire, security management, security based management, data management, business technology, data center
    
Tripwire
Published By: Tripwire     Published Date: Jan 29, 2013
Download this paper to learn five actions that will enhance your approach to information risk management and security and help you stay one step ahead of the information age adversary.
Tags : 
risk management, irms, it security, security
    
Tripwire
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee