nec

Results 376 - 400 of 3456Sort Results By: Published Date | Title | Company Name
Published By: BillingPlatform     Published Date: Jul 30, 2019
Organization leaders and companies of all sizes are leveraging digital transformation in their industry, market, and business using a myriad of disruptive technologies like connectivity, the Internet of Things, blockchain, business intelligence and big data. CFOs who manage to get in front of these technologies will lead their businesses to greater success. This eBook illustrates how cloud-based billing management offers the quickest path toward this transformation. Download this eBook to explore how the right solution can help you: • Monetize IoT and increase revenue • Launch product innovations quickly • Automate billing to improve customer retention • Leverage the cloud to reduce costs Adapting today can mean the difference between success and obsolescence. With the right billing solution your business can thrive in these challenging times. Discover how today.
Tags : 
    
BillingPlatform
Published By: Bitium     Published Date: Dec 09, 2013
As enterprises large and small shift their information to the cloud, an explosion of SaaS tools are making it easier than ever for employees to collaborate and innovate. Much of this sharing is being done across time zones and physical locations, by workers who are telecommuting, working in shared or public spaces, and from open networks. Information is stored on central, third-party servers that are accessible across the company and the world by anyone with an internet connection. As a result, online security is increasingly being pushed to the forefront as a major corporate expense. Yet, 89% of the global information workforce lack clarity on how security applies to the cloud. “Data is suddenly everywhere, and so are the number of people, access points and administrators who can control – or worse, copy – the data." Please download the white paper to learn more.
Tags : 
single sign on, sso, identity as a service, idaas, access and identity management, identity access management, password management, password manager, networking, it management, wireless, knowledge management, enterprise applications, business technology
    
Bitium
Published By: BitSight Technologies     Published Date: Feb 29, 2016
Cybersecurity is an issue facing nearly every organization today—and if you aren’t taking the necessary precautions, your company, customers, and vendors could all suffer.
Tags : 
cybersecurity, security risk, security ratings, security, it management, enterprise applications, data management, business technology
    
BitSight Technologies
Published By: BitSight Technologies     Published Date: Aug 02, 2016
Organizations today aren’t just single entities—they are networks of partners, vendors, and third parties. While interconnected networks are critical for success in most businesses, they also leave data more vulnerable to exposure from bad actors. Because of this, vendor risk management (VRM) is a critical business practice.
Tags : 
    
BitSight Technologies
Published By: Black Duck Software     Published Date: May 18, 2016
Using open source code is not necessarily a problem, but not knowing what open source you’re using can be extremely dangerous, particularly when so much open source contains security flaws. In fact, the latest Future of Open Source Survey found that: - 55 percent of respondents had no formal policy or procedure for open source consumption - 98 percent were unaware of the open source code they were using "Application Security in 2016," a complimentary report from Black Duck Software, considers the key application security challenges your organization will face, with a special focus on staying both agile and secure with open source. Download the report today!
Tags : 
black duck, application security, security, open source, code, enterprise applications, business technology
    
Black Duck Software
Published By: BlackBerry     Published Date: Jun 11, 2008
By now, most organizations are clear on the advantages and benefits of wireless data solutions in the enterprise: namely, increased productivity, improved efficiency and improved response times resulting in decreased costs and increased revenue opportunities. But with these advantages come risks, and most have to do with controlling the data contained on wireless devices and the networks and applications to which they connect.
Tags : 
blackberry, corporate mobile policy, enterprise solution, crm, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Feb 25, 2009
When interactivity is combined with unified communications and location awareness, next-generation social networks will have significant business value. Unified communications integrates the wide variety of voice, data, video and collaboration tools that business professionals use today into a single environment. This can dramatically improve the speed of decision-making by connecting collaborators quickly, regardless of their location.
Tags : 
blackberry, ecosystem, social networking, unified communications, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Mar 23, 2010
Mobility is the future of business; more business is conducted in real time and between geographically dispersed situations than ever before. Also, mobility ties closely into important collaboration trends including the increasing use of social networking tools such as Facebook, LinkedIn and Twitter. The smartphone- a symbol of an increasingly mobile and interconnected population-is a familiar piece of technology for most employees.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: May 03, 2010
Any IT person with a pulse knows that employees are flooding IT departments with requests to connect their personal smartphones to the company IT infrastructure. Notwithstanding the real productivity benefits from connected employees, until now many IT departments have turned down all such requests as a matter of policy. They calculated that the security and control risks outweighed the benefits from collaboration.
Tags : 
blackberry, smartphones, wireless, pda, enterprise servers, it management, budget, mobility, software costs
    
BlackBerry
Published By: BlackBerry     Published Date: Jun 22, 2010
Fast, accurate communications are the underpinnings of patient care and safety. Yet, today's hospital staff carry so many pagers and other devices, it's become cumbersome. With Amcom Mobile Connect, you can simplify communications and strengthen care by using your BlackBerry smartphone for code alerts, patient updates, lab results, consult requests, and much more. In short, everything.
Tags : 
blackberry, smartphones, wireless, pda, pagers, healthcare, enterprise servers, it management, budget, mobility, software costs
    
BlackBerry
Published By: BlackBerry     Published Date: Oct 03, 2012
An overview of BlackBerry PlayBook OS 2.0 security capabilities and features, including: BlackBerry® Balance technology, BlackBerry® Bridge, data-at-rest protection, and secure connectivity to support native email and corporate intranet access.
Tags : 
mobile security, corporate intranet, blackberry, secure connectivity, business technology
    
BlackBerry
Published By: BlackBerry     Published Date: Feb 01, 2019
The Enterprise of Things (EoT) is the network of people, endpoints, and digital assets owned by and connected to the enterprise (or public sector organisation, in this context). It casts a wide net, to include content, communication, collaboration, transportation, and facilities – that is, anyone and anything connected to the internet. The EoT represents a powerful opportunity to transform existing public sector processes and create entirely new ones. Governments are moving on these initiatives because policymakers are legislating it, constituents are demanding it and because it presents an opportunity to do more with less.
Tags : 
    
BlackBerry
Published By: Blackberry     Published Date: Jul 12, 2019
Technology is changing the way that businesses across industries operate. Often referred to as “digital transformation” or “digitization,” this change is rapid, and it is relentless. It touches everything in the legal profession from the completion of everyday tasks to the way information is secured and shared
Tags : 
    
Blackberry
Published By: BlackBerry APAC     Published Date: Jan 29, 2019
The Enterprise of Things (EoT) is the network of people, endpoints, and digital assets owned by and connected to the enterprise (or public sector organisation, in this context). It casts a wide net, to include content, communication, collaboration, transportation, and facilities – that is, anyone and anything connected to the internet. The EoT represents a powerful opportunity to transform existing public sector processes and create entirely new ones. Governments are moving on these initiatives because policymakers are legislating it, constituents are demanding it and because it presents an opportunity to do more with less.
Tags : 
    
BlackBerry APAC
Published By: BlackBerry Cylance     Published Date: Aug 22, 2018
Cylance engaged SE Labs to independently assess CylancePROTECT’s ability to predict and prevent previously unknown threats. SE Labs pitted the May 2015 version of CylancePROTECT® — without a cloud connection or updates — against some of the most destructive and disruptive threats that appeared between 2016 and 2018, after the model was trained and deployed.
Tags : 
predictive, advantage, cylance, protect, cloud, connect
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
“More than 70 percent of cyber attacks target small businesses," according to a National Cyber Security Alliance estimate. Yet 68 percent of small business owners in a recent survey seemed oblivious to the threat. Why the disconnect? What should they be doing to protect their business-critical systems and data? How can small businesses wring maximum value from their cybersecurity investments? Where do AI-based endpoint protection, detection, and response platforms fit into the mix? Read this BlackBerry Cylance sponsored white paper, Small Organizations Still Need Big Security, to find out.
Tags : 
    
BlackBerry Cylance
Published By: BlackLine     Published Date: Feb 04, 2019
For accounting professionals, change offers the chance to be more creative, come up with new solutions, and grow both personally and professionally. For organizations, change necessitates agility and flexibility, qualities crucial to thriving in the future economy.
Tags : 
    
BlackLine
Published By: Blend     Published Date: Oct 07, 2019
Every lender, bank, and credit union has different product mixes and marketing priorities, but one thing they all share is the goal of winning, retaining, and growing our customer relationships. Typically, there are two ways to maximize customer engagement: seek margin with products like credit cards, or seek volume and deeper relationships with products like home equity. This report analyzes both of these options through three key lenses: current market conditions, access to today’s high-quality borrowers, and the rich opportunity for integrated, targeted marketing. Our goal is to enable you to determine the best way to fine-tune your strategic customer engagement for 2019 by helping you: Review current market conditions. Connect with higher-quality borrowers. Develop a 360-degree, integrated marketing mix.
Tags : 
    
Blend
Published By: Blue Coat Systems     Published Date: Aug 12, 2013
There is no question that security attacks targeting your organization will continue to grow and evolve. The question is, how can you respond to malware and other risks without unnecessarily constraining your workforce? How can you get beyond the fear and anxiety that leads to excessive prohibition, prevention, blocking, and excluding – so that you can use security technology to both protect and empower people? The answer is with a multi-layered defense – one that uses advanced security technologies and sophisticated operational practices in combination to cover the full spectrum of threat vectors. This solution brief explores the growing importance of multi-layered defense in today’s fast-changing web environment, and key considerations in implementing an effective multi-layered defense strategy.
Tags : 
av defense, blue coat, web environment
    
Blue Coat Systems
Published By: Blue Lane     Published Date: Oct 01, 2007
The healthcare industry has benefited from the breakneck pace of digitization - spanning everything from payments to patient records to X-ray film - but it has also been increasingly exposed to greater risk. Efforts to increase healthcare provider productivity via increased digitization and system interconnectivity have to be counterbalanced against the growing concerns for patient privacy and a backdrop of increasing liability.
Tags : 
healthcare, health care, patient privacy, privacy, patch management, patch, patch server, hipaa, hippa, hipaa compliance, sox, sox compliance, risk management, records management, medical records, bluelane, blue lane
    
Blue Lane
Published By: BlueCat     Published Date: Aug 20, 2013
To enable always-on application access and business connectivity, you need a rock-solid network foundation. The increasingly complex, dynamic and fluid relationship between networks and devices requires a new approach to IP Address Management (IPAM) – one that unifies mobile security, address management, automation and self-service to provide actionable network intelligence and a broad span of control. This paper discusses the critical role of IPAM in providing a smarter way to connect mobile devices, applications, virtual environments and clouds.
Tags : 
device management, ipam, ip address management, ip management, dns management, dhcp management, network security, network management, network intelligence, ip networks, network management
    
BlueCat
Published By: Bluecore     Published Date: Mar 04, 2019
For a company that sells wool products, the dog days of summer can be tough. Despite this challenge, Pendleton has managed to stay relevant even during the hottest days of the year thanks to Bluecore. “In June and July, having Bluecore send people emails based on what they browsed is especially helpful because we don’t have as many messages or new products going out. So as often as people come to our site is as often as they’ll get emails, and those emails are guaranteed to be relevant to them. If the onus was on blast emails, then we’d be showing people products that are not necessarily relevant to them or that they might think are terribly out of season,”
Tags : 
email marketing, triggered emails, audience segmentation, email capture
    
Bluecore
Published By: BlueVolt     Published Date: May 04, 2012
It's a Dog-Eat-Company world so maximizing your partner connections is important to your organization's success. Read the Maximizing your Partner Connections: The Role of your Online Presence in Reaching Your Market white paper from BlueVolt to learn how to optimize your extended enterprise.
Tags : 
bluevolt, extended enterprise, lms, learning management system, channel, training
    
BlueVolt
Published By: Bluewater Learning     Published Date: Apr 30, 2018
Addressing the frustration that people experience with their LMS or TMS does not necessarily mean going through the involved process of selecting and implementing a new system. Often, it simply requires a realignment of business drivers, supporting processes Bluewater experts will lead you through examining User Experience, Administration, Process, Content, Data, Reporting and Technology.
Tags : 
    
Bluewater Learning
Published By: BMC ESM     Published Date: Aug 20, 2009
IT infrastructures have become exceedingly complex, resulting in a highly interconnected network of old and new technologies. In a world where IT budgets are shrinking and mergers are common, how do you get the most value from your IT resources?
Tags : 
it costs, it resources, it infrastructure, it budget, spend management, bmc, mergers, podcast, virtualization, legacy, mainframe computing, automation, enterprise applications
    
BMC ESM
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee