assessment

Results 51 - 75 of 520Sort Results By: Published Date | Title | Company Name
By: Datto Inc.     Published Date: Jan 31, 2013
Understanding RTO (recovery time objective) is a key to knowing the difference between BDR and intelligent business continuity. Read this article to learn more.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business, smb, downtime, instant virtualization, disaster recovery, managed-service provider, msp, recovery time objective, rto, recovery point objective, rpo, risk assessment, datto
    
Datto Inc.
By: Datto Inc.     Published Date: Jan 31, 2013
There’s a big difference between traditional backup methods and what intelligent business continuity offers. Get the facts.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business, smb, downtime, instant virtualization, disaster recovery, managed-service provider, msp, recovery time objective, rto, recovery point objective, rpo, risk assessment, datto
    
Datto Inc.
By: Datto Inc.     Published Date: Jan 31, 2013
Learn how an MSP uses Datto’s business continuity solutions as a valued profit center - all while giving their clients value peace of mind.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business, smb, downtime, instant virtualization, disaster recovery, managed-service provider, msp, recovery time objective, rto, recovery point objective, rpo, risk assessment, datto
    
Datto Inc.
By: Datto Inc.     Published Date: Jan 31, 2013
Not all backup and disaster recovery (BDR) solutions are created equal. Read how one MSP found the BDR solution that works best for them, and their clients.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business, smb, downtime, instant virtualization, disaster recovery, managed-service provider, msp, recovery time objective, rto, recovery point objective, rpo, risk assessment, datto
    
Datto Inc.
By: Datto Inc.     Published Date: Feb 05, 2013
In this white paper Datto explores the different types of risk in IT infrastructure and the ways intelligent business continuity can best mitigate that risk.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business, smb, downtime, instant virtualization, disaster recovery, managed-service provider, msp, recovery time objective, rto, recovery point objective, rpo, risk assessment, datto
    
Datto Inc.
By: MobileIron     Published Date: Aug 04, 2016
Is your organization's approach to enterprise mobility on the right track? Take our assessment today to find out! Learn how your progress in your mobile first journey compares to your industry peers Understand where you may have security risks Benchmark your performance in strategy, people, process, and technology Receive case study and best practice recommendations tailored to your situation Leverage MobileIron experts to analyze your results and guide you on a path to success
Tags : 
mobile maturity, mobileiron, mobile first, security risks
    
MobileIron
By: Red Hat     Published Date: May 11, 2016
This IDC study represents a vendor assessment of the public deployment-centric cloud application platform component of the platform-as-a-service market through the IDC MarketScape model. This assessment discusses both quantitative and qualitative characteristics that explain a vendor's success in this market. This IDC MarketScape covers a variety of vendors participating in the deployment-centric subset of the overall platform-as-a-service market. The evaluation is based on a comprehensive and rigorous framework that assesses vendors relative to the criteria and one another and highlights the factors expected to be the most influential for success in the market, both short term and long term.
Tags : 
red hat, idc, paas, cloud, application, platform
    
Red Hat
By: Juniper Networks     Published Date: Aug 10, 2017
Ellie Mae processes approximately 30 percent of residential U.S. mortgage applications through their Encompass® all-in-one mortgage management solution.Their customers include major lending institutions. By introducing extensive automation to the residential mortgage process, Ellie Mae has streamlined lenders’ ability to remain competitive, compliant, and efficient.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
Juniper Networks
By: CA Technologies EMEA     Published Date: Sep 11, 2018
Software drives competitive advantage more than ever at an increasing velocity for releases along with higher, overwhelming levels of deployment complexity. Dramatic growth in mobile applications, analytics, systems of engagement, and cloud demands that organizations respond adaptively, even as resource constraints make it challenging to nearly impossible to do so. As a result of these combined factors, IDC sees increased interest in, demand for, and adoption of agile approaches to development and also for business initiatives driving adoption of agile approaches to overall project, program, and portfolio management. As we receive inquiry on this area increasingly, it makes sense to assess this market.
Tags : 
    
CA Technologies EMEA
By: Cardinal Health     Published Date: Dec 28, 2017
Rising costs, declining reimbursements and the mandate to improve quality: these are key challenges that surgery centers face every day. For years, costs have continued to climb, while reimbursements have declined or, at best, remained stable. To address these issues and succeed in the future, surgery centers need to develop comprehensive plans that leverage both supply chain and clinical expertise. For many facilities, the next step is to conduct a clinical assessment that identifies new ways to improve inventory management and clinical practices. The heart of this approach from Cardinal Health is a clinical team that leverages OR and supply chain expertise to understand, prioritize and pursue opportunities for improving the health of patient and your practice alike. To learn more, read this case study and find out how two surgery centers have used a clinical assessment from Cardinal Health to improve performance.
Tags : 
    
Cardinal Health
By: Intapp     Published Date: Jan 08, 2019
Five global legal trends are testing the limits of even the best new business acceptance models. In this ebook, you’ll explore their effects, learn best practices on how to adapt to them, and evaluate your current processes with an assessment checklist.
Tags : 
law firm business acceptance, law firm business acceptance trends, law firm improving business acceptance, law firm better business acceptance, law firm business acceptance problems, law firm business acceptance issues, law firm client onboarding, law firm better client onboarding, law firm improving client onboarding, law firm conflicts, law firm conflicts clearance, law firm better conflicts clearance, law firm improving conflict clearance, law firm client terms, law firm managing client terms, law firm managing client terms better, law firm compliance, law firm better compliance, law firm improving compliance
    
Intapp
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
SecureWorks provides an early warning system for evolving cyber threats, enabling organisations to prevent, detect, rapidly respond to and predict cyber attacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform — our advanced data analytics and insights engine —SecureWorks minimises risk and delivers actionable, intelligence driven security solutions for clients around the world.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Cybercriminals can be goal-driven and patient, and they often have a singular focus, plenty of time and access to vast, modern technical resources. Both organized and forum-based criminals are working constantly to find innovative and efficient ways to steal information and money with the lowest risk to their personal freedom. If we wish to stay “one step ahead” of the threats detailed in this report, awareness of online criminal threats, techniques and markets is our best defense.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Achieving and maintaining a high level of information security requires information security professionals with robust skills as well as organisational, technical and operational capabilities. The gap between intent and ability to be secure is evident in our sample of UK large enterprises. Deficient companies will only close that gap when they acquire the necessary capabilities. Some of these capabilities can be purchased as information security tools or application solutions, but it is more prudent for an organisation to consider acquiring these capabilities through a service arrangement with a dedicated security services partner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Despite long-standing concerns captured in a myriad of surveys, security in the cloud has progressed to a more practical and achievable level. The cloud represents a shared security responsibility model whereby that responsibility is split between the Cloud Service Provider and the cloud customer. For organisations moving some or all of their applications and data to the cloud, acceptance of this model clears the way to more thoughtful consideration for how security can and should be architected — from the ground up. As a result, IT and IT Security leaders now have a much clearer trajectory to support their business operations in the cloud in a secure manner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Finding a strategic partnership with a trusted security expert that can assist you in all the aspects of information security is vital. SecureWorks is a market leader in security that can close the security gap in organisations by evaluating security maturity across an enterprise, help define security strategies and implement and manage security program plans. We are a true strategic partner that can help a CISO embed security at all levels of the organisation.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Technical Tests are designed to cover specific services. Each security test has its own objectives and acceptable levels of risk. There is not an individual technique that provides a comprehensive picture of an organisation’s security when executed alone. A qualified third party can work with you to determine what combination of techniques you should use to evaluate your security posture and controls to begin to determine where you may be vulnerable.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
GDPR will pose different challenges to each organisation. Understanding and acting on the implications for your own organisation is vital. That means taking a risk-based approach to ensure that you are doing what you need to do to manage your own specific risks to personal information. While virtually all organisations will have to implement changes to become GDPR compliant, some will be able to take partial advantage of existing compliance to other security mandates and frameworks, such as ISO 27001 and PCI by extending those measures to protection of personal data. Even so, further work will be required to comply with GDPR, both with regards to security and its other aspects.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
By: IBM     Published Date: Jul 07, 2015
This white paper describes the pervasive lack of resiliency planning in most cloud implementations today and discusses how better up-front assessment and planning can help organizations realize the enormous potential cloud offers for improved, more agile resiliency.
Tags : 
ibm, resilience, cloud, design, sustain
    
IBM
By: UL EduNeering     Published Date: Jul 05, 2012
SOPs are critical to efficient manufacturing operations, quality control, and regulatory compliance. This paper reviews best practices for the Life Science industry for training on SOPs, and how learning management technology has the potential to improve learner retention through automated assessments.
Tags : 
fda, gmp, gcp, gxp, cms, osha, qsr, 21 cfr part 11, regulatory compliance, pharmaceuticals, medical device, good manufacturing practices, quality system regulation, online compliance training, part 11 compliance, fda part 11 compliance, iso 13485, quality management system, life science, health care
    
UL EduNeering
By: Success Factors     Published Date: Feb 16, 2012
Do your leaders have what it takes to generate improved performance and execution from their employees. Get your report now, compliments of SuccessFactors, and ensure that your business has the leadership capital it needs.
Tags : 
employee performance, high performance culture, high performing workforce, smart goals, performance reviews, goal setting, performance management, business strategy, business execution, strategy execution, business strategy software, business results, talent management, learning management, recruiting management, workforce planning, workforce analytics, succession planning, compensation, core competencies
    
Success Factors
By: Success Factors     Published Date: Feb 16, 2012
Attracting the best talent is a never-ending challenge. Learn five strategies for getting ahead, even in the worst business environments. Get your report now, compliments of SuccessFactors.
Tags : 
employee performance, high performance culture, high performing workforce, smart goals, performance reviews, goal setting, performance management, business strategy, business execution, strategy execution, business strategy software, business results, talent management, learning management, recruiting management, workforce planning, workforce analytics, succession planning, compensation, core competencies
    
Success Factors
By: Success Factors     Published Date: Feb 16, 2012
With today's shortage of critical talent, strategic workforce planning is one of HR's most important responsibilities. Discover the common pitfalls that trap many companies-and how to avoid them. Get your compliments report from SuccessFactors now.
Tags : 
employee performance, high performance culture, high performing workforce, smart goals, performance reviews, goal setting, performance management, business strategy, business execution, strategy execution, business strategy software, business results, talent management, learning management, recruiting management, workforce planning, workforce analytics, succession planning, compensation, core competencies
    
Success Factors
By: Success Factors     Published Date: Feb 16, 2012
These days, a company success depends on whether it hired the right people to effectively execute its strategies. Download this paper, compliments of SuccessFactors, and learn the critical questions you should ask before interviewing talent.
Tags : 
employee performance, high performance culture, high performing workforce, smart goals, performance reviews, goal setting, performance management, business strategy, business execution, strategy execution, business strategy software, business results, talent management, learning management, recruiting management, workforce planning, workforce analytics, succession planning, compensation, core competencies
    
Success Factors
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Gateway      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.