pr role

Results 176 - 200 of 506Sort Results By: Published Date | Title | Company Name
Published By: CrowdStrike     Published Date: Feb 05, 2018
Learn how cyber threat intelligence (CTI) helps you bolster defenses, hunt down adversaries,investigate incidents and make better security decisions. While once considered a “nice to have”, Cyber Threat Intelligence (CTI) is now widely considered an essential weapon against breaches. A recent study by Enterprise Strategy Group (ESG) found that 72 percent of organizations plan to increase CTI spending — further validation of its important role in your security strategy. Yet, because threat intelligence comes in many shapes and forms, it is often misunderstood. This white paper, “Threat Intelligence, Cybersecurity’s Best Kept Secret,” offers in-depth coverage of CTI, including the different categories of threat intelligence and use cases that demonstrate CTI’s effectiveness in thwarting today’s most dangerous and sophisticated attackers. You’ll also learn how the right CTI can empower better security and executive decisions, while dramatically improving your organization's security pos
Tags : 
    
CrowdStrike
Published By: New Voice Media     Published Date: Apr 03, 2017
Are you a sales manager who’s new to inside sales? Or, are you already running an inside sales team but just want to polish up your knowledge? The Ultimate Guide to Inside Sales is the place to start. You’ll learn how to staff, train, organize and motivate your inside sales team for peak performance. Welcome to the complete guide on inside sales. Everything you need to know to staff, train, organise, motivate and optimise your inside sales team for peak performance is in this guide. The guide has been specially crafted to walk you through building and growing a highly successful inside sales team and give you actionable insights and tips to start making improvements today. In this guide you will learn: • How to identify your key inside sales roles • How to hire the best talent to accelerate your sales performance • How to coach your inside sales teams • How to craft your sales funnel for deeper insight into sales performance • How to structure your team’s daily activity to improve ac
Tags : 
    
New Voice Media
Published By: FinancialForce     Published Date: Aug 20, 2019
Removing Barriers to Growth The Professional Services industry is growing rapidly with technology playing an increasingly important role in maintaining that trend. However with growth comes challenges ranging from increased competition, maintaining and improving utilisation rates, forecasting profitability and the lack of available, skilled resources, all within decreasing project timeframes. To help navigate this promising but challenging environment, we've identified five common mistakes seen within Professional Services teams, as well as practical strategies for avoiding them. Find out how you can overcome these challenges and take full advantage of sector growth. Download this eBook and learn:
Tags : 
    
FinancialForce
Published By: OneLogin     Published Date: Oct 24, 2017
Corporate data spreads across an ever-growing number of applications. Users (employees, contractors, partners, and customers) access those applications over a wide range of devices. Those devices take different forms: desktops, laptops, tablets, smartphones, smartwatches. Each device may use a different operating system. The locations from where people access your data can be on-premises or off, and in any number of places around the globe. Data, users, apps, devices, locations—the sheer number of permutations and combinations is mind-boggling. This complex nature of today’s IT environment opens security gaps and exposes your business to undue risk. To illustrate, try to envision all the permutations and possible entry points for risk in your organization. Imagine that you have 400 users, each using 25 apps. When you multiply those together, that’s 10,000 potential access permissions to manage. Access permissions change as users come and go, roles change, new apps are added, and
Tags : 
    
OneLogin
Published By: Trintech EMEA ABM Pilot     Published Date: Nov 03, 2017
Over the past few years, terms such as: ‘Modern Finance,’ ‘Continuous Accounting’ and ‘Robotic Process Automation’ have all created buzz across the finance industry. These have been launched as a response to the challenges facing finance around attracting and retaining high quality employees, the rising risks due to the difficulty in certifying accurate data, today, and the expectation that finance has a role in driving the business forward.
Tags : 
account reconciliation, accounting automation, finance shared services, finance transformation program, finance transformation strategy, financial close, financial close process, reconciliation software, adjusting journal entries, recuing journal entries
    
Trintech EMEA ABM Pilot
Published By: IBM     Published Date: Aug 08, 2018
IBM Cloud Private For Dummies provides insights into the role of the private cloud and how it supports changing requirements for computing.
Tags : 
    
IBM
Published By: Menlo Security     Published Date: Jun 05, 2018
"2017 was marked by a significant number of high-profile cyber breaches. Web malware and phishing played a critical role in the vast majority of these attacks. Watch this webinar to learn from two of the industry’s leading experts – Gartner Research Analyst Peter Firstbrook and Menlo Security CTO Kowsik Guruswamy: *Why web malware and phishing are so pervasive in today's cyber attacks *What the shortcomings of today’s reactive security philosophy are *Why the web continues to present a risk to businesses *How organizations rethink their security strategy moving forward"
Tags : 
    
Menlo Security
Published By: Group M_IBM Q119     Published Date: Jan 08, 2019
The discipline of data quality assurance ensures that data is "fit for purpose" in the context of existing business operations, analytics and emerging digital business scenarios. It covers much more than just technology. It includes program management, roles, organizational structures, use cases and processes (such as those for monitoring, reporting and remediating data quality issues). It is also linked to broader initiatives in the field of enterprise information management (EIM), including information governance and master data management (MDM)
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q2'19     Published Date: Apr 22, 2019
"Improving Cyber Resilience in the Insurance Industry Security automation plays a significant role when maintaining an organization's Cyber Resilience, according to IBM Resilient’s latest report, “The Ponemon Institute Study on the Cyber Resilient Organization.” Download this latest report to understand the key factors that hinder the ability for efficient and effective Cyber Resilience and gain insights and guidance for improving your security posture."
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: May 21, 2019
The age of digital transformation is firmly here, and with it comes a seismic shift in how businesses must operate if they intend to stay relevant and profitable. Though the role of process in digital transformation is often over-hyped, in truth, it remains a critical element in the fight to win, serve, and retain customers. In this digital age, businesses must holistically reframe their investment in process automation. In short, a compelling vision for process excellence must underpin this digital transformation, thereby transforming customerfacing processes and digitizing operational processes. The change is so profound that Forrester has renamed the category from business process management (BPM) to digital process automation (DPA). This shift, while continuing to drive down costs and drive up employee productivity, makes customer experience and digital transformation the primary success factors. This represents a powerful and necessary change of focus. In July 2017, IBM commission
Tags : 
    
Group M_IBM Q2'19
Published By: Kaseya     Published Date: Mar 01, 2019
Three common types of software make you more vulnerable than you realize. While complete and thorough vulnerability management is next to impossible, a few simple steps go a long way toward reducing risk. Download this ebook to discover what steps to take to begin evolving away from patch management toward software and vulnerability management. The hidden threat in securing your infrastructure from vulnerabilities lies with IT’s difficulty in managing third-party software. 2017 was billed as the worst on record for cybersecurity. No doubt, the continued rise of modern threat vectors has IT on high alert. In essence, IT professionals view their role as responsible for keeping the door shut. However, even with IT administrators keenly aware that most exploits can be averted simply by keeping the environment current, the task is no small feat and often isn’t done as well as it needs to be.
Tags : 
    
Kaseya
Published By: Rackspace - Google Cloud     Published Date: Jul 26, 2019
In today’s digital world, technologies such as cloud have become commonplace to take digital transformation projects to the next level. But while cloud is critical to business transformation success, Australian IT decision-makers (ITDMs) still feel that the C-suite does not understand the time and complexity of the journey. This paper explores: • Insights on challenges faced by Australian ITDMs when rolling out cloud projects • The role of the ITDM today • Key blockages IT stakeholders encounter when driving digital change, and; • What they need from the business and wider technology ecosystem to navigate the risks associated with starting a cloud project or moving to a full cloud-first model.
Tags : 
    
Rackspace - Google Cloud
Published By: Amazon Web Services     Published Date: Feb 01, 2018
Machine learning is proving its power across virtually every industry in ways that add actionable insight and efficiency. But one can look at the rise of this transformative paradigm with a more focused lens to see AI technologies as a business tool of the highest order, one that improves processes and inspires new models. AI, in other words, has a big role to play on the balance sheet. Two leading brands in very different spaces — Capital One in financial services, John Deere in agriculture — are seeing efforts that stretch back decades come to fruition with the launch of cloud-based AI platforms. Capital One is developing digital products and experiences using machine learning to help millions of customers with their financial lives; John Deere’s Precision Agriculture solution helps farmers gain precise information about their machines and crops. In both instances, AI and a cloud platform combine to enable transformation.
Tags : 
digital, technologies, optimization, amazon
    
Amazon Web Services
Published By: Tricentis     Published Date: Mar 13, 2018
Quality testing has a cross-functional, strategic impact on corporate risk management, revenue and reputation, but it often doesn’t garner full appreciation for its role, often evidenced by a lack of investment in a best-in-class QA platform. Signs that an existing solution isn’t sufficient include:
Tags : 
    
Tricentis
Published By: Cranfield University     Published Date: Jan 16, 2015
Get the insight and knowledge you need to develop as a manager and take a leap forward.
Tags : 
progress to management roles, business knowledge, development programme, management roles, high potencial managers, become a manager
    
Cranfield University
Published By: Oracle     Published Date: Mar 22, 2019
If you’re like other HR professionals, you wonder what more you could do to drive business growth. In our latest research, we asked 2,000 decision-makers their views of the role of innovation in driving business growth. You’ll learn: • Why HR feels limited by innovation teams being too separated from their organisation’s core business • The six processes for idea generation and project delivery • Which leadership behaviours HR finds valuable in supporting innovation culture Our research uncovers the key innovation challenges they face, key execution issues, and the barriers to true innovation. See what HR leaders think
Tags : 
    
Oracle
Published By: Diligent     Published Date: Jul 10, 2017
The Corporate Secretaries International Association (CSIA) is a Geneva-registered global organisation whose mission is ‘‘to develop and grow the study and practice of Secretaryship, to improve professional standards, the quality of governance practice and organisational performance.’’ CSIA was established in 2010 as a not-for-profit organisation committed to improving the recognition and understanding of the practice of corporate secretaryship and the role of the corporate secretary. Its structure as an international federation of professional bodies enables it to effectively represent those practitioners who work at the frontline of governance.
Tags : 
communication, client-agency relationships, budgeting, digital marketing, personal relation improvement, resource management
    
Diligent
Published By: CA Tech     Published Date: Jan 04, 2016
This white paper illustrates how Mobile application analytics can play a vital role in your DevOps strategy that can help your company create a superior end-user experience. Providing deep insight, this discipline produces benefits for a variety roles across the organisation.
Tags : 
customer experience, mobility, mobile application, mobile app, mobile application analytics, devops, application management
    
CA Tech
Published By: Alere Wellbeing     Published Date: Feb 15, 2012
Dr. Ron Goetzel of Emory and Thomson Reuters discusses the rising health and productivity-related expenditures that employers face, the top 10 most costly chronic conditions, and the role obesity plays in creating these conditions.
Tags : 
obesity, workplace, economics, chronic conditions, exacerbating, success factors, weight loss, worksite health, alere
    
Alere Wellbeing
Published By: Alere Wellbeing     Published Date: Apr 06, 2012
This white paper, based on a webinar presented by Dr. Ron Goetzel of Emory University and Thomson Reuters, discusses the cost of health and productivity-related expenditures that employers face, the role obesity plays in creating or exacerbating these conditions, and employer strategies for how to offer the best support for obese and overweight employees.
Tags : 
alere, human resources, hr management, employee, talent management, employee management
    
Alere Wellbeing
Published By: Workday     Published Date: Aug 07, 2018
Healthcare leaders are facing increasing pressure to eliminate inefficiencies and add value across the entire organization. And many are turning to the cloud. Read the Becker’s Hospital Review brief “The Role Cloud Applications Play in Improving Hospitals’ Bottom Line” for important considerations when choosing a cloud-based system.
Tags : 
    
Workday
Published By: Workday     Published Date: Jul 30, 2019
Healthcare providers today are constantly looking for ways to increase efficiency. Knowing that supply chain management can play a key role in these efforts, a more strategic approach to managing supply chain is critical. By combining transactions, analytics, and planning in a single system, Workday can help you make better decisions and contain costs. To dive deeper into how Workday supports supply chain management for healthcare, watch this quick demo.
Tags : 
    
Workday
Published By: McAfee     Published Date: Sep 04, 2014
El tipo más amenazante de ataque cibernético es invisible. El riesgo para las empresas es real según lo evidenciado por los recientes ataques de alto nivel. Las organizaciones necesitan controles de seguridad por capas que funcionen en conjunto para detectar la presencia y las acciones de hackers y malwares furtivos.
Tags : 
ataques furtivos, malware, sistema de prevención de intrusiones, siem, controle de seguridad en capas
    
McAfee
Published By: McAfee     Published Date: Nov 07, 2014
Usando técnicas sofisticadas para ocultar sua presença, um ataque furtivo pode operar fora do sistema operacional ou mover-se dinamicamente entre terminais (endpoints) para camuflar as ações dos hackers. O risco para as empresas é real e ataques de grande escala como a “Operação High Roller” prejudicam empresas em todo o mundo. Os antivírus e sistemas de prevenção de intrusões tradicionais não dão conta desse novo tipo de ataque: em vez disso, as empresas precisam de controles de segurança em camadas que funcionam em conjunto para detectar a presença e as ações de hackers e malwares furtivos.
Tags : 
ataques furtivos, malware, sistema de prevenção de intrusões, siem, controles de segurança em camadas
    
McAfee
Published By: CEB     Published Date: Sep 23, 2013
Global executives believe the key to delivering profitable growth is a 20% increase in staff productivity, above current levels. However, employees are stretched to their limit; 80% report increased workloads and 55% say they can no longer handle the resulting levels of stress. Effective talent measurement can improve performance and productivity across the workforce by placing the right people in the right roles, and identifying and nurturing those that are most likely to succeed.
Tags : 
talent management, workforce management, workforce efficiency, talent management solutions, hr solutions
    
CEB
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: