corporate

Results 1 - 25 of 1031Sort Results By: Published Date | Title | Company Name
Published By: Unit4     Published Date: Apr 12, 2019
Looking to improve accuracy of enterprise budgeting and financial planning? Just 1% of firms can forecast costs at 90% accuracy 30 days out. This white paper by BPM Partners and sponsored by Unit4 shows how Artificial Intelligence (AI) makes a real impact on budgeting, planning, and analysis, and when complemented with deep machine learning, gives greater accuracy to data, budget rules and budget drivers. Download now and learn how AI can help auto-tune your FP&A.
Tags : 
    
Unit4
Published By: Group M_IBM Q2'19     Published Date: Apr 08, 2019
Empowering the Automotive Industry through Intelligent Orchestration With the increasing complexity and volume of cyberattacks, organizations must have the capacity to adapt quickly and confidently under changing conditions. Accelerating incident response times to safeguard the organization's infrastructure and data is paramount. Achieving this requires a thoughtful plan- one that addresses the security ecosystem, incorporates security orchestration and automation, and provides adaptive workflows to empower the security analysts. In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Tags : 
    
Group M_IBM Q2'19
Published By: PwC     Published Date: Apr 03, 2019
Not so very long ago, corporate executives commuted to a gleaming headquarters building, often in a beautifully landscaped suburban campus. Greeted by attentive security guards and smiling receptionists, they walked down well-appointed hallways lined with mahogany paneling and expensive artwork to their offices on the executive floor. There, they reviewed petitions that had percolated up the ladder, and dispatched decisions to be executed by the army of troops on the front lines. After decades of hard work, these individuals had ascended to the top of their pyramid, overseeing the processes and practices that made the enterprise work, and enjoying all the perquisites and power of a C-suite functional officer in the corporate center of a major company.
Tags : 
    
PwC
Published By: Group M_IBM Q2'19     Published Date: Apr 02, 2019
As the foundation for most critical business decisions, today's data environments are not just a vital piece of IT infrastructure, but key component of corporate strategy.
Tags : 
    
Group M_IBM Q2'19
Published By: Anaplan     Published Date: Mar 12, 2019
Old-school planning and budgeting can’t keep up In disruptive times, innovating and responding to change requires visibility into business conditions—and reliable planning and forecasting. However, it’s not always easy figuring out which cloud-based corporate performance management (CPM) system will best fit your budgeting, planning, analysis, and reporting needs. In this report, you will gain insight into: -The drawbacks of old-school, manual budgeting and planning -Benefits of cloud-based performance management systems -Four evaluation criteria for selecting cloud-based CPM technology
Tags : 
    
Anaplan
Published By: Anaplan     Published Date: Mar 12, 2019
Old-school planning and budgeting can’t keep up In disruptive times, innovating and responding to change requires visibility into business conditions—and reliable planning and forecasting. However, it’s not always easy figuring out which cloud-based corporate performance management (CPM) system will best fit your budgeting, planning, analysis, and reporting needs. In this report, you will gain insight into: • The drawbacks of old-school, manual budgeting and planning • Benefits of cloud-based performance management systems • Four evaluation criteria for selecting cloud-based CPM technology
Tags : 
    
Anaplan
Published By: Ricoh     Published Date: Mar 11, 2019
Today’s CIOs no longer just oversee technology. They are now key strategists who guide their organizations and give them the tools they need to stay competitive. A study by Forbes Research stated that five years ago, a CIO’s most critical skill was deploying technology. Now, the #1 way that CIOs provide value is by contributing to the corporate strategy, so they can advance business objectives and drive revenue.1 In particular, CEOs rely on the CIO for guidance around digital transformation. Organizations must transform how they operate and take advantage of new technologies to better engage customers and employees. Digital transformation falls squarely on the shoulders of IT leaders. CIOs are under pressure to drive transformation – overcoming barriers such as cultures that are resistant to change, employees who want to upload files anywhere, and increased concerns about data security. CEOs also expect CIOs to achieve results now. The longer you wait, the more likely you will fall beh
Tags : 
    
Ricoh
Published By: Hitachi Vantara     Published Date: Mar 08, 2019
Technology is a fast-moving target, and organizations need agility and flexibility to compete. By modernizing your data center and maximizing the value of your corporate data, your company can gain those qualities. In this Forbes Insights checklist, learn how to derive value from your corporate data and embrace three elements of a modernized data center: an agile data infrastructure, a modern approach to data protection, and intelligent data center operations.
Tags : 
    
Hitachi Vantara
Published By: Akamai Technologies     Published Date: Mar 07, 2019
Today’s globally distributed and diverse workforce needs flexible yet straightforward access to the corporate network, regardless of user location, device type, employee affiliation, and application location (on-premises, SaaS, IaaS). Expedience and fluidity can’t come at the cost of security, especially given the realities of modern cybercrime. Learn more about the five demands you should make of an updated comprehensive application access solution.
Tags : 
    
Akamai Technologies
Published By: Cool Effect     Published Date: Mar 05, 2019
Universities around the world are realizing the importance of sustainable practices and are working towards shrinking their carbon footprint by focusing on renewable energy resources, clean technology, and carbon offsets. This guide will provide complimentary information on carbon credits along with case studies where universities have incorporated them into their sustainability strategy. Also included: tips for identifying high-quality credits and avoiding low-quality credits that do not reduce carbon emissions. Read this guide to learn more about what carbon credits are and how to navigate the process of measuring, assessing, and obtaining carbon credits.
Tags : 
carbon offsets, carbon credits, carbon footprint, carbon neutral, carbon emissions, carbon management, tonnes, climate neutral, reduce emissions, greenhouse gas, climate impact, sustainability, corporate responsibility, environmental responsibility, clean technology, renewable energy, voluntary credits, university, higher education, college
    
Cool Effect
Published By: VMware SD-WAN by VeloCloud     Published Date: Feb 19, 2019
The network of yesterday is not the network that can take businesses into the future. As mission critical enterprise applications move to the cloud, wide area network (WAN) must adapt to become agile, flexible, and scale rapidly. Leading IT trends such as Internet of Things (IoT), Software as a Service (SaaS), cloud storage, enterprise mobility, emerging transport alternatives, and globalization increase the importance of how network assets are leveraged and how the network is conceptualized. The advantages of public and private data centers and cloud-based applications are significantly diminished if the network is slow, inflexible, and unpredictable. Erratic network performance with high latency, jitter and packet loss can significantly impact user adoption, satisfaction, and overall corporate productivity. As connectivity options continue to emerge, end users are no longer tethered to the office or to the localized applications and services that were trademarks of a primary or branc
Tags : 
sd-wan, saas, cloud storage
    
VMware SD-WAN by VeloCloud
Published By: AWS     Published Date: Feb 19, 2019
Microsoft Windows Server 2008 and SQL Server 2008 are nearing end of support, so now is the time to include these Microsoft workloads into your cloud migration strategy. Learn how this will set the stage to help you accelerate digital transformation, increase innovation and reduce the costs of your legacy and corporate applications.
Tags : 
    
AWS
Published By: Group M_IBM Q119     Published Date: Feb 15, 2019
With the increasing complexity and volume of cyberattacks, organizations must have the capacity to adapt quickly and confidently under changing conditions. Accelerating incident response times to safeguard the organization's infrastructure and data is paramount. Achieving this requires a thoughtful plan- one that addresses the security ecosystem, incorporates security orchestration and automation, and provides adaptive workflows to empower the security analysts. In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Tags : 
    
Group M_IBM Q119
Published By: MobileIron     Published Date: Feb 14, 2019
What if you could protect your company from data loss before a mobile attack occurs? The reality is that mobile threats are everywhere and the risks are escalating. But in the world of modern work, how can IT protect mobile devices while allowing users easy access to corporate data on a device of their choice anytime, anywhere? Watch this webinar on demand to learn how mobile threat defense is reducing risks amongst some of the largest mobility programs in the world. We will reveal: -How mobile attacks are targeting corporate data, bypassing traditional IT defenses -Why threat detection and remediation protects your data, without disrupting user productivity -Why mobile threat detection is an essential component of a layered defense architecture With one app, MobileIron Threat Defense delivers unparalleled mobile threat detection and remediation on-device without network connectivity required, and no need for users to take any action.
Tags : 
    
MobileIron
Published By: RSM US     Published Date: Feb 08, 2019
For decades, corporate social responsibility (CSR) plans have been used by companies in varying degrees to participate in select charities and causes; however, in recent years, CSR strategies have evolved as an important way for businesses to connect with their communities, demonstrate commitment to core values and deliver on brand promises.
Tags : 
    
RSM US
Published By: Location3     Published Date: Feb 07, 2019
In our experience as franchise marketers, Local Ad Fund dollars provide a solid foundation for paid search campaigns that drive consistent, high quality-low cost, leads. However many franchisees and local business owners could be doing more to support established corporate search marketing campaigns, ultimately capturing the maximum search interest for their services within their markets, driving increased local revenue.
Tags : 
marketing, local marketing, franchise, franchisor, digital marketing, local store revenue, franchise paid search
    
Location3
Published By: Lola Travel Company     Published Date: Jan 24, 2019
A well-thought-out, easy-to-create and easy-to-enforce business travel policy will contribute to transparency, a cultural mecca in any organization. By fostering fairness, a mutually beneficial corporate travel policy provides company travelers with the freedom they desire, without sacrificing company governance and control. As an HR or Finance leader, you've answered countless repetitive questions about per diems, business class vs. economy class, and hotel restrictions. A formalized travel policy is not as hard to create as it may seem, and it will eliminate the stress for both you and your travelers. In this ebook, you will learn the 10 easy steps to take in order to create a win-win corporate travel policy that works for you and your team.
Tags : 
    
Lola Travel Company
Published By: Lola Travel Company     Published Date: Jan 24, 2019
Think you can survive without a corporate travel policy, and continue having employees book trips on their own without harming your company? Think again. Check out this must-read e-book, "Do You Need a Corporate Travel Policy?" from Lola.com and learn: The 5 must-haves in a corporate travel policy Shocking stats about business travel impact on employee job satisfaction How to save time/money, lose stress with an employee-friendly travel policy Decide for yourself if a “wild west” business travel approach with “rogue employees” is smart for your business (hint: it’s not!). DOWNLOAD THE E-BOOK NOW!
Tags : 
    
Lola Travel Company
Published By: Lola Travel Company     Published Date: Jan 24, 2019
If you've ever felt overwhelmed trying to sort through all the corporate travel per diem guidelines out there, you are not alone. That's why we created this ebook, "Lola.com's ultimate guide to corporate travel per diems." You'll learn things like: -How to separate meal per diems from hotel per diems and other incidentals. -How to set smart guidelines for your employees that save your company money and give travelers a productive trip. -How to make sure you are spending money on the important things when it comes to daily travel expenses.
Tags : 
    
Lola Travel Company
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Great Bay Software     Published Date: Jan 09, 2019
IoT adoption is expected to generate a 21% increase in corporate profits by 2022. This business value comes from the ability to automate processes and collect and analyze massive amounts of data—so organizations can make better informed decisions and deliver powerful customer experiences. But how are organizations really putting IoT to work for their business? And how can IoT risks be mitigated so these rewards can truly be achieved? This e-book explores the potential of IoT in the enterprise, which industries are leading the way and how to secure your connected things. It also provides: • 7 best practices for data privacy and security policies • 7 items to consider for device security • 6 key considerations for network connection security
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jan 09, 2019
Ninety percent of business executives believe the Internet of Things (IoT) is important to the future of their organization. And, as IoT is expected to generate a whopping 21% increase in corporate profits by 2022, it’s clear there’s value in adoption. However, there are still plenty of risks that require mitigation through careful planning, cross-functional teamwork and mature security measures. This white paper explores the business benefits and the security complexities IoT introduces for business organizations, and provides key considerations and recommendations for securing IoT deployments. Download the white paper today!
Tags : 
    
Great Bay Software
Published By: Mimecast     Published Date: Dec 20, 2018
Your corporate email is a vital repository of critical business information. In the age of the cloud and mobility, empowering users accessing that information quickly and efficiently can’t be an afterthought. You may think you can get by with your old email archive, but your organization and your employees will suffer without the latest technology. Learn more in this TechTarget whitepaper Email Archiving: It’s Time for an Update. Download now to get the facts about: How archaic email archives slow down productivity and increase IT help desk burdens Why return-on-investment for old archiving solutions hurt your bottom line Ways poor e-discovery capabilities leave you vulnerable in legal challenges
Tags : 
    
Mimecast
Published By: Workday APAC     Published Date: Dec 18, 2018
"The vast possibilities of AI make it a must-have for any digital business strategy. Read this Gartner report to better understand what can be achieved with AI and how you can begin to incorporate it into your business strategies. Learn about other leading organizations and how they are currently using AI technology."
Tags : 
    
Workday APAC
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: