box

Results 26 - 50 of 424Sort Results By: Published Date | Title | Company Name
Published By: Box     Published Date: Nov 24, 2015
One of the biggest problems with any organization is complete alignment among all teams. A lot of this breakdown is due to outdated methods of sharing important documents and information. Teams function best when they are able to access and collaborate on critical documents, presentations and files. Download this whitepaper to learn the top five ways any business can benefit from Box and see how it will allow your organization to operate faster across all departments to ensure everyone is aligned while driving growth to maintain security of your files to keep your projects running smoothly.
Tags : 
sharing documents, driving growth, maintain security, sharing files
    
Box
Published By: Box     Published Date: Nov 24, 2015
With the cloud being an essential part of so many IT organizations, best practices have emerged to help IT evaluate the right vendors’ ability to meet mission critical security needs. Download this whitepaper to learn the best practices for determining file sharing provider’s capabilities and see how it will allow you to select the right vendor to meet mission critical operational and security needs.
Tags : 
file sharing, file sharing providers, secure files, security needs
    
Box
Published By: Box     Published Date: Nov 24, 2015
Breakthroughs in collaboration technology are helping companies of all sizes foster engagement with employees, customers, and partners. However, some organizations are still struggling to align all facets of their organization and as a result misalignment between teams is still a likely scenario. Download this whitepaper to learn how online collaboration can help push productivity in order to allow your organization a competitive edge as a result of increased productivity and a positive return-on-investment.
Tags : 
collaboration technology, customer engagement, productivity, competitive edge, return on investment
    
Box
Published By: Okta     Published Date: Jul 01, 2015
Amadeus Capital Partners needed to centrally manage employee identities to successfully deploy Dropbox for Business. See how Amadeus gained significant IT savings, end-user productivity and security benefits with Okta in this short video.
Tags : 
    
Okta
Published By: Okta     Published Date: Aug 24, 2015
Amadeus Capital Partners needed to centrally manage employee identities to successfully deploy Dropbox for Business. See how Amadeus gained significant IT savings, end-user productivity and security benefits with Okta in this short video.
Tags : 
    
Okta
Published By: IBM     Published Date: Sep 22, 2011
Find and solve performance problems without adding costs IBM InfoSphere Optim puts performance management in the spotlight! Optim solutions are designed to deploy quickly and easily out of the box for immediate benefit. Business-value assessment services are also available to help you design a custom solution - complete with full financial analysis. Either way, you can realize immediate ROI interms of cost and performance if you keep performance-management best practices in mind.
Tags : 
ibm, data management, dba, productivity, infrastructure, development, productivity
    
IBM
Published By: Cisco     Published Date: Oct 06, 2015
Learn how Cisco combines the power of Cisco Collaboration Cloud with the versatile toolbox of Cisco Unified Contact Center Express (Unified CCX) to provide multiple channels for customer engagement.
Tags : 
cisco, cisco collaboration cloud, customer care, unified ccx, customer engagement, legacy metrics
    
Cisco
Published By: MobileIron     Published Date: Nov 14, 2017
Watch this on-demand Ask Us Anything HIMSS webinar as we engage with a panel of experts from St. Joseph Health, Box, and MobileIron. We'll uncover St. Joseph Health’s recent deployment of Box cloud storage with MobileIron to their employees’ mobile devices, major changes we’re seeing in the healthcare industry, and so much more!
Tags : 
healthcare, webinar, cloud storage, data usage, mobile device
    
MobileIron
Published By: Vectra Networks     Published Date: Nov 05, 2015
Covert communications are key enablers of cyber attacks that allow remote humans to patiently manage and direct their attacks undetected. Attackers choose these vehicles specifically for their ability to evade signatures, malware sandboxes and reputation lists. To learn how Vectra empowers security teams to automatically pinpoint active cyber attacks as they’re happening, correlate threats with the hosts that are under attack, prioritize attacks that pose the greatest business risk, and quickly prevent or mitigate loss, register to get the white paper Detecting Covert Communications.
Tags : 
malicious covert communications, cyber attacks, undetected attacks, business risk, prevent and mitigate loss
    
Vectra Networks
Published By: CA Technologies     Published Date: Aug 24, 2017
• Use CA Live API Creator to deliver running prototypes in hours. Convert business requirements into working software. • Not just for wireframes, but also for running systems, databases, logic and user interfaces. It’s as simple as a spreadsheet and just as fast. • Impress your business users with results in hours to get their feedback on the data model and logic. Iterate instantly. • All you need is in the box. No IDE to install or configure. Just use your browser.
Tags : 
    
CA Technologies
Published By: Juniper Networks     Published Date: Aug 10, 2017
OpenLab is a centre of innovation provided by Juniper, for business leaders who want to build network-integrated software applications and solutions quickly and securely. This is done by offering hands-on and cloud-based access to Juniper and third-party solutions including SDN sandboxes and NFV interoperability testing.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
Juniper Networks
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Challenge Some SAP systems can take up to 10 days to complete a SAP system copy. That’s 10 days of unproductive time. Why? SAP does not provide the necessary tools out-of-the-box to automate and handle the process efficiently. This means you must use highly skilled SAP BASIS staff to manage the process. Manual steps, along with hundreds of configuration settings, can take days to complete—and like many organizations, you have also experienced too many delays, causing non-production systems to be unavailable, which stalls development, testing and training activities. Opportunity So you’ve concluded your SAP system copy process is hindering innovation and productivity. You’re considering automating the process to ensure system copies are available for all environments on time, every time. Benefits What are the key capabilities you actually need to address SAP system copy inefficiency once and for all?
Tags : 
    
CA Technologies_Business_Automation
Published By: Proofpoint     Published Date: Aug 10, 2017
BEC attacks are a growing threat to businesses because they prey on vulnerabilities that can’t be patched: people. That’s why employee training, financial controls, and especially technology are the keys to a strong defense and timely response. You need need a solution that does not solely depend on reputation and basic email filtering. With granular controls, advanced email solutions can identify and quarantine impostor emails before they reach an employee’s inbox.
Tags : 
security awareness, social engineering, impostor emails, email flags, financial institution, bec threats, suspicious messages
    
Proofpoint
Published By: CA Mainframe     Published Date: Sep 12, 2008
This White Paper discusses end-to-end application performance management in the context of the impact to the business. It then highlights CA’s application quality and performance manage­ment solutions for both Web and mainframe applications, with particular focus on the integration of CA Wily with AQM Solutions’ TRILOGexpert APCTM for TriTuneTM with Performance Desktop.  It concludes with the Enterprise Management Associates (EMA) perspective on the market in general, and on the CA solution in particular.
Tags : 
ca mainframe, application performace management, quality management, application quality, mainframe
    
CA Mainframe
Published By: SumTotal Systems     Published Date: Oct 10, 2013
What you see isn’t always what you get with HR, talent, and learning software. Did you know that, even with the rigour frequently put into selection, two-thirds of HR software projects fail to produce at least half of the expected benefits? Or how about that a recent research project from Clarkson University determined that there was no link between HR software and HR’s ability to be more strategic? Even though HR technology is often sold as “best practices in a box,” looks can be deceiving. To avoid being duped by pretty demos of software with no substance and find a partner that can meet the hidden complexities that exist in your unique processes, you need to ask the right questions.
Tags : 
sumtotal, sumtotal systems, hr technology, hr buyers, hr technology buyers, human resources, hr software, strategy, decision making process
    
SumTotal Systems
Published By: MobileIron     Published Date: Sep 22, 2014
Agent-based security solutions such as anti-virus software rely on controlling all processes on a system. This approach breaks in sandboxed environments as one process cannot control other aspects of the system. To secure mobile, IT has to replace traditional PC management tools with purpose-built enterprise mobility management (EMM) Platforms, designed to enable end-user productivity while securing apps, content and devices.
Tags : 
mobile security, mobile first era, mobile operating systems, agent-based security, emm platforms, user productivity
    
MobileIron
Published By: Box     Published Date: Nov 24, 2015
Explore the ways combining Box and Office 365 makes collaboration more powerful, productive and secure.
Tags : 
box, office 365, collaboration, productivity, content
    
Box
Published By: Box     Published Date: Nov 24, 2015
This report will discuss why EFSS tools will be the next- generation content management platforms. We’ll also briefly explore the emergence of Information Governance and how ECM delivers some of the required functionality.
Tags : 
ecm, content, management, box, efss tools, consumer oriented
    
Box
Published By: Box     Published Date: Nov 24, 2015
This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help enterprise architecture (EA) professionals select the right partner to manage their business’ critical content.
Tags : 
ecm, content management, forrester, box, productivity
    
Box
Published By: Box     Published Date: Nov 24, 2015
Today's EFSS market offers a range of maturing options to IT leaders as well as mobile and collaboration planners. New capabilities for corporate system integration and enhanced content collaboration continue to add to standard EFSS functionality.
Tags : 
file sync, sharing, box, efss, ecm, collaboration, productivity
    
Box
Published By: Box     Published Date: Nov 24, 2015
By leveraging Microsoft productivity applications and the Box content platform, companies are collaborating more securely and seamlessly across their organizations, with outside parties and on any device.
Tags : 
box, office 365, productivity, collaboration, content management
    
Box
Published By: Box     Published Date: Nov 24, 2015
Based on feedback we’ve heard from customers and prospects, along with analyst and industry reports, we’ve pulled together the following considerations when evaluating Dropbox for Business.
Tags : 
box, cloud, productivity, business, enterprise, collaboration
    
Box
Published By: Box     Published Date: Nov 24, 2015
The adoption of enterprise content collaboration solutions has exploded as individuals sought ways to easily access, manage, and collaborate on content. Accordingly, businesses want to leverage those easy-to-use solutions but can’t compromise when it comes to enterprise-grade administrative control, security, and business insights.
Tags : 
box, dropbox, business, productivity, collaboration, content, enterprise
    
Box
Published By: Box     Published Date: Nov 24, 2015
Organizations are struggling to ensure their content is appropriately secure, while remaining easily searchable, accessible and shareable both inside and outside of the enterprise.
Tags : 
box, business, enterprise, information governance, content, security
    
Box
Published By: Dynatrace     Published Date: Mar 06, 2017
Dynatrace application performance monitoring simplifies your complex application environment, helping you and your team perform better. You'll learn how you can take a different approach to APM with an AI-powered, automated full-stack solution that gives you operational insights out of the box.
Tags : 
dynatrace, apm, automation, global distribution, microservices, saas
    
Dynatrace
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: