internal

Results 276 - 300 of 588Sort Results By: Published Date | Title | Company Name
Published By: Rizepoint     Published Date: Feb 13, 2017
Every successful multi-unit food service or hospitality organization understands the importance of consistent audits and recognizes the essential function they provide. Today, thousands of businesses—from giant multi-national chains to small family-owned businesses—depend on regular internal and third-party audits to monitor, control, and manage everything from sanitation and food safety regulations to internal facility standards and brand consistency.
Tags : 
    
Rizepoint
Published By: Kronos     Published Date: Jul 26, 2017
Employers want to recruit and hire the best talent in their industry and avoid making costly hiring mistakes. But what if your organization’s internal processes aren’t set up to support efficient and effective hiring? If HR lacks the support they need to effectively manage online applications, screening, applicant tracking, hiring, and reporting, they may end up making poor hiring decisions that could impact your organization's employee engagement and business results.
Tags : 
recruiting, hiring mistakes, effective hiring, online applications, human resources
    
Kronos
Published By: Amazon Web Services     Published Date: Apr 11, 2018
Connecting your VPC and corporate data helps make the AWS Cloud a valuable extension of your data center. Using IPsec AWS managed VPN connections and secure gateways provides secure access to seamlessly connect to AWS hosted resources just like any other internally facing resource.
Tags : 
    
Amazon Web Services
Published By: Infosys     Published Date: Jun 12, 2018
In the wake of data hacks and privacy concerns, enterprises are working extra hard to make sure they secure customer data from external threats. But what about securing data internally? Organizations unknowingly leave a big security hole in their own systems when they fail to have structured internal processes to handle access requests for employees, which could have disastrous implications for data security. A leading US bank sought to move its internal applications to a secure system for a standard and consistent access rights experience. See how Infosys helped and the five key takeaways from the project.
Tags : 
internal, applications, data, hacks, privacy, enterprises
    
Infosys
Published By: Okta APAC     Published Date: Dec 19, 2018
Multifactor authentication (MFA) is a critical security requirement for every organization, regardless of size and industry. But not every MFA solution is created equal. Your investment in MFA should be well-thought-out. Not only does your chosen MFA solution need to meet the requirements you have today, but it needs to enable and secure the future growth and evolution of your business. This evaluation guide will help you understand the key factors you need to consider when investing in MFA. Your MFA choice determines how well you can protect access to all your internal resources, as well as your ability to provide frictionless experiences for your internal employees and external customers. Your MFA choice also impacts your ability to grow your business and take advantage of emerging technologies and future innovations. As part of Okta’s identity-led security framework, Okta Adaptive MFA delivers on the key considerations that need to be part of your search for a solution that meets a
Tags : 
    
Okta APAC
Published By: Okta APAC     Published Date: Dec 19, 2018
Okta was recognized as a strong performer in Zero Trust Security. Analyst firm Forrester Research has named Okta a Strong Performer in its report, The Forrester Wave™: Zero Trust eXtended (ZTX) Ecosystem Providers, Q4 2018. The research ranks Okta with the highest possible score in the evaluation criteria “people/workforce security,” “ZTX vision and strategy” and “market approach.” According to Forrester, “Zero Trust is going mainstream. The entire security industry is talking about Zero Trust, and numerous vendors have embraced it and now use it to market and position their capabilities as well as guide their future road maps; the time to formalize the evaluation criteria for vendors in this space is now. The Forrester Wave helps security professionals identify which vendors have internalized and most closely align to Forrester’s Zero Trust eXtended (ZTE) framework. This evaluation also shows how each vendor’s portfolio maps and delivers on specific components of the ZTX framework
Tags : 
    
Okta APAC
Published By: Recorded Future     Published Date: Apr 18, 2019
Enterprises increasingly operate in a digitally interconnected world where third parties like suppliers, customers, channel partners, and others are often directly connected to their internal IT systems, and where their underlying IT infrastructure may be owned and managed by an outside organization. These business relationships can knowingly or unknowingly introduce different types of risks that need to be identified and managed as if these third parties were part of the enterprise itself. Recorded Future's latest risk intelligence offering enables threat intelligence teams to better understand, monitor, and measure their real-time exposure to these third-party risks. Armed with this information, organizations can better assess and prioritize risk mitigation actions.
Tags : 
    
Recorded Future
Published By: Apstra     Published Date: Feb 21, 2019
IT organizations are facing new challenges as a result of digital transformation, widespread cloud and SaaS adoption, mobile proliferation and pervasive IoT deployments. They must build and operate their internal data centers to deliver high availability for mission critical applications, rapidly onboard new applications and scale capacity on demand – all within the mandate to be cost competitive with infrastructure as a service providers (IaaS) like AWS and Azure. They are architecting and building new Intent-Based Data Centers to deliver private cloud services to their internal and external customers.
Tags : 
saas, data center automation
    
Apstra
Published By: Enventys Partners     Published Date: Jul 02, 2019
A good product development company is often faster on its feet compared to developing a product internally. Get your initial concept to a prototype, and hit the accelerator from there. You can give decision makers within your company something they can see and touch, rather than a nebulous pitch during the concept stage. This whitepaper outlines how outsourcing or augmenting your internal product development capabilities can get you great results while providing additional value at each step of the process.
Tags : 
product development, blueprint, iot connectivity, enventys partners
    
Enventys Partners
Published By: Oracle HCM Cloud     Published Date: May 25, 2017
The journey to digital healthcare begins with simply moving HR and other healthcare information to a digital format. An important next step is moving back-office operations to the cloud. Use the checklists of industry, technology and internal challenges facing healthcare organizations contained within this white paper to determine where you are on the cloud readiness spectrum, and begin creating a digital healthcare transformation plan for your organization.
Tags : 
    
Oracle HCM Cloud
Published By: Certent UK     Published Date: Apr 25, 2018
In organizations where internal reporting is done manually, it can feel much more like a chore than a critical, strategic activity. Read this report to find out how much of a difference an insight-led approach can make when the finance team has time to analyze the figures and provide meaningful insight for senior management.
Tags : 
    
Certent UK
Published By: EMC     Published Date: May 21, 2014
IDC report on its findings in relation to cloud computer models, firms approaches to building an infrastructure platform and insights about implementing an internal or private cloud technology model.
Tags : 
private cloud, sdc, emc, infrastructure, platforms
    
EMC
Published By: F5 Networks Inc     Published Date: Feb 18, 2015
As a website building service for consumers, Weebly is often the target of DDoS attacks. Previously they mitigated attacks through an internally built security infrastructure but the increasing scale and complexity of DDoS attacks had the company evaluating secondary protection. Learn how Weebly is well protected from DDoS threats of all sizes and complexities after incorporating an added layer of protection and resulting uninterrupted DDoS mitigation and analysis.
Tags : 
ddos attacks, ddos protection, ddos solutions, mitgation
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jul 22, 2016
The new matrix of technology deployment for IT is a real challenge—handling both customer-facing issues and internal, departmental challenges.
Tags : 
f5 networks, cisco, devops, software-defined networks, sdn, technology integration
    
F5 Networks Inc
Published By: Smartling     Published Date: Aug 01, 2014
Using Smartling’s translation software platform, Vimeo, a popular video-sharing platform, has streamlined its entire translation process, growing its international business without straining its internal resources. In this case study, you’ll learn about how Vimeo was able to expand into 3 new languages, Spanish, German, and French, in just a few months.
Tags : 
smartling, vimeo, case study, native-language, software, translation
    
Smartling
Published By: Riverbed     Published Date: Nov 02, 2016
When apps run efficiently, employees are more likely to use them. The promise of unified communications (UC) is that it is supposed to increase efficiencies and make internal operations more seamless. But that only happens when it’s working properly. According to Robin Gareiss, president and founder of Nemertes Research, “Companies devote 33% more IT staff to managing IP telephony and 31% more to UC when they don’t use monitoring tools. The tools are instrumental to identifying, isolating, and resolving performance issues—and preventing them from happening again. When apps run efficiently, employees are more likely to use them.” That’s one reason 36% more people actually use UC in large companies that use monitoring tools. Join Robin Gareiss, president and founder, Nemertes Research and David Roberts, director of product management, Riverbed, as they explore the different approaches to monitoring UC—network probes vs endpoint telemetry—and why taking a combined approach hel
Tags : 
    
Riverbed
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Security and risk management leaders should know that while IDPSs are being absorbed by firewall placements at the perimeter, they give the best protection. They're also responding to pressure from uptake of other threat defense solutions, and providing credible internal and cloud placement options.
Tags : 
magic quadrant, intrusion, detection, prevention, systems, cloud, internal
    
McAfee EMEA
Published By: MuleSoft     Published Date: Nov 27, 2018
The market for financial services is changing fast. To evolve, banks are transforming their organizations into digital ecosystems using APIs. APIs have emerged as critical enablers to help financial services firms meet new consumer expectations. Through collaboration with fintechs, banks will use APIs to add new functionality from business partners and deliver internally-developed service offers to partner value chain and ecosystems. Read this whitepaper to learn more about the role of APIs and how this new ecosystem will allow banks to: Drive horizontal and vertical integration Foster a culture of collaboration Create new revenue streams and get solutions to market faster Deliver innovation and functionality to the business
Tags : 
    
MuleSoft
Published By: Smarp     Published Date: Feb 22, 2019
As workplaces become more and more digital, diverse and scattered, internal communications are facing challenges at an accelerating speed. The emergence of digital services has brought us new ways to communicate and measure the success of our communications, and the importance of social media and internal platforms has altered the way we communicate with each other. In 2025, it is estimated 75 percent of the workforce will be comprised of millennials*. We are seeing a new, tech-savvy generation to take over the workplaces, and ensuring internal communications tackles the challenges of cross-generational workplaces. Effective communication correlates with high employee engagement, and companies who invest in communications are companies who understand the importance of an engaged workforce. Organizations with effective change and communication are 3.5 times more likely to significantly outperform their peers**. With significant changes occurring in workplaces and trough that, in intern
Tags : 
internal communication, employee engagement, enterprise communication
    
Smarp
Published By: Datalink     Published Date: Jun 01, 2012
Assembling an internal private cloud or migrating to an external one is a challenge - both technically and organizationally. Datalink has answers - and a unified solution with the Datalink V-Scape Reference Architecture.
Tags : 
v-scape, vscape, datalink, architecture, infrastructure, migration, storage, networking, cloud, virtualization
    
Datalink
Published By: Datalink     Published Date: Jul 27, 2012
Running IT as a service (ITaaS) is not necessarily a new concept. But, the era of cloud computing now places a whole new spin on ITaaS. In this white paper, you'll learn why there is so much buzz around cloud services and the role IT should play in this new cloud-based era. You'll also learn a useful model to help transform your company's IT data center into a private cloud that can ultimately manage and oversee the delivery of both internal and external cloud services to the business.
Tags : 
datalink, cloud, buy, build, itaas, infrastructure, cloud computing
    
Datalink
Published By: Computhink     Published Date: Dec 10, 2007
To properly serve their customers, Cortes & Hay must create files of documents that need to be distributed to appropriate parties. The documents that comprise a title insurance binder come from two places. There are documents generated internally, and documents that come from external sources.
Tags : 
document management, title insurance, paperless, cortes & hay, insurance, documents, electronic document management, best practices, computhink, viewwise, viewise
    
Computhink
Published By: Achievers     Published Date: Jan 17, 2014
Knowledge and strategic relationships fuel many organizations in today’s rapidly changing, global economy. As such, organizations need to leverage the individuals—and their networks—that possess the most relevant knowledge, whether they are current employees or are only loosely connected to the organization. To do this, organizations should create and leverage peer collaboration networks that enable them to identify and connect with individuals who have the unique skills, knowledge, and capabilities these organizations need. Bersin’s Research, Why Reputations and Networks Matter in the Open Talent Economy, indicates that this approach works in driving value—organizations that have effectively used internal reputation networks and profile databases have been able to increase key metrics such as employees’ time to productivity and innovation levels.
Tags : 
talent management, employee enagement, human resources
    
Achievers
Published By: Asure Software     Published Date: Jun 22, 2012
Meeting Room Manager now gives you the option to share your company's reservations and events with others via SocialView - an innovative new optional add-on that's essentially a public, shared online calendar, view-only interface that you control. Integrate this online calendar creator option into your internal or external website, and you'll be able to announce event information and room availability in an instant.
Tags : 
asure software, desktop, technology, business, content management, application integration
    
Asure Software
Published By: NETIQ     Published Date: Dec 03, 2013
A poll of CIOs and IT managers reports why departments must defend against complex internal and external threats while mitigating regulatory and compliance concerns. The results provide data about how enterprises view compliance.
Tags : 
security compliance, users access management, it management compliance
    
NETIQ
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.