epo

Results 76 - 100 of 4833Sort Results By: Published Date | Title | Company Name
Published By: HireRight     Published Date: Jul 31, 2013
As talent management leaders create and refine their hiring policies, increasingly they are driven by overarching strategic themes,
Tags : 
hireright, human resources, 2013 employment screening, benchmarking report, employment screening practices
    
HireRight
Published By: SumTotal     Published Date: May 24, 2013
Forrester Research, Inc.’s 2013 evaluation of Talent Management vendors against 57 criteria named SumTotal Systems a Leader and “the largest of the pure-play talent management vendors” (The Forrester Wave™: Talent Management, Q1 2013). Download the full report to jump-start your knowledge of the talent management solution landscape.
Tags : 
forrester, talent management, talent management solutions, talent management systems
    
SumTotal
Published By: Salesforce.com     Published Date: Sep 16, 2013
New Gartner research positions salesforce.com in the Leaders Quadrant for Sales Force Automation. Download the 2013 Gartner Magic Quadrant Report and find out what Gartner analysts have to say about Salesforce.
Tags : 
gartner, salesforce.com, leaders quadrant, automation, report, best practices, cloud, enterprise applications, business technology, data center
    
Salesforce.com
Published By: LogMeIn     Published Date: Aug 27, 2013
Built on the results of an annual survey of Internet shoppers worldwide, the 2013 Live Chat Effectiveness report outlines Internet shopper communication and purchasing behavior and preferences. The report includes findings specific to live chat technology, as well as other engagement channels, such as phone, email and social media. In this year’s report, we explore how Internet shoppers use these various channels to inform purchase decisions and seek help from customer service. Readers will learn the channels that shoppers prefer in given scenarios and how to prepare their teams for optimal engagement.
Tags : 
live chat report, social media, purchasing behavior, logmein, internet shoppers, optimal engagement, business technology, telecom
    
LogMeIn
Published By: join.me     Published Date: Jan 29, 2014
Built on the results of an annual survey of Internet shoppers worldwide, the 2013 Live Chat Effectiveness report outlines Internet shopper communication and purchasing behavior and preferences. The report includes findings specific to live chat technology, as well as other engagement channels, such as phone, email and social media. In this year’s report, we explore how Internet shoppers use these various channels to inform purchase decisions and seek help from customer service. Readers will learn the channels that shoppers prefer in given scenarios and how to prepare their teams for optimal engagement.
Tags : 
live chat report, social media, purchasing behavior, logmein, internet shoppers, optimal engagement, telecom
    
join.me
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, networking, wireless, business technology, data center
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile, malware, security, scams, bluecoat, data loss
    
Blue Coat Systems
Published By: Bit9     Published Date: Apr 01, 2013
Targeted Malware continues to be the top server security concern for 52 percent of survey respondents—up 15 percent from 2011.
Tags : 
bit9, malware, targeted malware, security survey, server security, business technology
    
Bit9
Published By: HireRight     Published Date: Jul 31, 2013
HireRight Employment Screening Benchmarking Survey 2013 Edition.
Tags : 
hireright, background checks, talent management, screening employees, small business report
    
HireRight
Published By: Oracle     Published Date: Apr 22, 2014
This report looks at some of the important changes in the customer experience and interaction market, detailing how technologies are  evolving to meet new consumer demands, and providing  recommendations for both enterprises and vendors.
Tags : 
customer experience, interaction, 2013 trends
    
Oracle
Published By: Cisco     Published Date: Aug 18, 2014
You have to know the threats to stop them. It's not a question of if – but when and how – Internet criminals will get into your network. The Cisco 2014 Annual Security Report highlights the most current security concerns, such as shifts in malware, trends in vulnerabilities, and the revival of distributed denial-of-service (DDoS) attacks.
Tags : 
security report, internet criminals, concerns, malware, denial-of-service, attacks, ddos, network, vulnerabilities, security
    
Cisco
Published By: NETIQ     Published Date: Jun 20, 2014
CyberEdge provides insight on both the current state of cyberthreat defense and projections for the future.
Tags : 
netiq, cyberthreat, cyberedge, cyber security, cyberthreat, security
    
NETIQ
Published By: Coupa Software     Published Date: Nov 04, 2014
The benefits of eInvoicing include fewer lost invoices, quicker approval cycles, increased on-time payments, and improved vendor satisfaction. Yet only 20% of companies receive more than 50% of their invoices electronically. This Paystream Advisors survey report includes data on how eInvoicing is improving AP efficiency and why some organizations are still slow to adopt (and why they shouldn't be).
Tags : 
einvoicing, approval cycles, vendor satisfaction, efficiency, on-time payments, invoicing, enterprise applications
    
Coupa Software
Published By: Coupa Software     Published Date: Nov 04, 2014
Modern eProcurement solutions promise greater efficiency through improved AP integration, tighter controls, standardized processes, and supplier connectivity. This Paystream Advisors survey report focuses on current attitudes toward eProcurement solutions, how they're being used, and why (and how) that usage is changing. The report also includes an overview of eProcurement capabilities, best practices, and selection criteria.
Tags : 
eprocurement solutions, efficiency, integration, tighter controls, standardized process, best practices, procurement, p2p
    
Coupa Software
Published By: IBM MaaS360     Published Date: Oct 27, 2014
Find the best EMM solution for your needs. Evaluate vendors based on customer satisfaction, ease of use and more. Learn about the BYOD and EMM landscape from top industry analysts in this in-depth research report.
Tags : 
maas360, fiberlink, ibm, emm solution, emm, enterprise mobility management, enterprise mobility management suites, byod, emm solution, mobility, it management, enterprise applications
    
IBM MaaS360
Published By: Teradata     Published Date: Feb 04, 2015
Optimize your customer experience with Teradata Integrated Marketing Cloud Teradata is recognized for vision, innovation and broad set of marketing capabilities. The 2014 Gartner Magic Quadrant for Integrated Marketing Management is an invaluable resource with insights that can help you execute your marketing initiatives.
Tags : 
teradata, integrated, marketing, vendors, executional, operational, analytical, campaign, management, resources, research, oracle, infor, microsoft, direxxis, sdl, repoint global, adobe, market, sap
    
Teradata
Published By: IBM     Published Date: Jan 09, 2015
This quarterly report from the IBM X-Force research and development team provides a closer look at today’s security risks – from new threats arising from within the Internet of Things, to the sources of malware and botnet infections.
Tags : 
security solutions, it security, security risks, threat intelligence report, malware, botnet infections, security, it management, knowledge management, enterprise applications
    
IBM
Published By: Gigya     Published Date: Jun 08, 2015
To get a look at the current state of data privacy and personalization, Gigya recently commissioned a survey with OnePoll to collect the perspectives of modern consumers. The results reveal that, when it comes to sharing their data with brands, consumers across the globe are demanding 3 key values: transparency, relevance and convenience.
Tags : 
data privacy and personalization, modern consumers, social login, consumer concerns, data privacy, enterprise applications
    
Gigya
Published By: Visier     Published Date: Jul 08, 2014
Read the results of the 2014 Workforce Analytics and Planning survey where over 300 U.S.-based employers answered questions about their current workforce analytics and planning practices, investments, and future plans. Download the full report and discover key trends, including how 91% of companies aspire to increase their workforce analytics maturity over the next 24 months.
Tags : 
visier, workforce analytics, hr metrics, planning
    
Visier
Published By: Polycom     Published Date: Jul 24, 2014
Download this survey to learn what 5,000 business professionals around the world say are their biggest collaboration challenges—and discover the strategies they deploy to overcome them. In late 2013, Polycom invited customers and partners around the world to participate in a survey that focused on collaboration challenges. More than 5,000 business professionals from all job levels, functions and vertical sectors responded, candidly sharing insights about their obstacles and the strategies they deploy to overcome them. The survey reveals that 85% of the respondents believe video conferencing helps them achieve their business goals. See how they successfully use video in their profession and how you can leverage technology to defy distance and improve remote collaboration within your organization as well.
Tags : 
polycom, collaboration video conferencing, defy distance, networking, it management
    
Polycom
Published By: ThreatTrack Security     Published Date: May 21, 2015
This report provides a 360 degree view of organizations' security threats, response plans, processes, and investments. More than 800 security decision makers and practitioners were surveyed in December 2014 across North America and Europe.
Tags : 
cyberthreat, security, malware, defense, it management, knowledge management, data management
    
ThreatTrack Security
Published By: Citrix Systems     Published Date: Jul 28, 2015
CyberEdge Group’s second annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them.
Tags : 
    
Citrix Systems
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Learn how web applications and mobile devices impact IT’s ability to successfully defend against cyberthreats, and find out why SDN may be the solution.
Tags : 
citrix, cyberthreat, report, defense
    
Citrix Systems, Inc.
Published By: Citrix Systems     Published Date: Jul 28, 2015
CyberEdge Group’s second annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them.
Tags : 
    
Citrix Systems
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee