• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

vendor management

Results 151 - 175 of 233Sort Results By: Published Date | Title | Company Name
By: BitSight Technologies     Published Date: Jan 11, 2016
Need some assistance with the creation of your vendor security risk assessment? This eBook contains vital questions you should be incorporating into your vendor risk management program.
Tags : 
networking, security, it management, knowledge management, enterprise applications, data management, human resource technology
    
BitSight Technologies
By: BitSight Technologies     Published Date: Mar 02, 2016
Cybersecurity in the financial services industry is rapidly evolving. Do you know how to stay ahead of the curve? The financial sector has been a pioneer for vendor risk management (VRM) best practices for a long time. Yes cybersecurity practices are continuing to evolve, and regulatory bodies are focusing more on third-party risk. Are you prepared for these changes? We'll dive further into this topic in this white paper and exploe: - How the threat landscape has been changing - and what can you do about it. - Some challenges the financial industries face in taking on VRM. - Four proactive tips for better VRM practices that you can put into place today. Download this free white paper now to better understand the changes to cybersecurity in the financial industry and what you can do about it.
Tags : 
bitsight, risk management, cybersecurity, vrm practices, vendor risk management, financial sector, it management, knowledge management, enterprise applications
    
BitSight Technologies
By: BitSight Technologies     Published Date: May 26, 2016
With this guide, you’ll never have to wonder about that again. You’ll learn: - How to nail down your presentation goals and style. - How to select metrics your board will care about. - Things to keep in mind before and after a board presentation.
Tags : 
bitsight, risk management, cybersecurity, vrm practices, vendor risk management, cybersecurity, security, enterprise applications
    
BitSight Technologies
By: BitSight Technologies     Published Date: Jul 07, 2016
Download this white paper to learn: - Why vendor risk management is becoming a standard business practice - About the challenges organizations face in building formalized vendor risk programs - How to move beyond "point-in-time" tools and begin continuously monitoring your vendors.
Tags : 
bitsight, risk management, cybersecurity, vrm practices, vendor risk management, cybersecurity, security, enterprise applications
    
BitSight Technologies
By: Equinix     Published Date: Mar 26, 2015
Enterprises grapple with a host of challenges that are spurring the creation of hybrid clouds: collections of computing infrastructure spread across multiple data centers and multiple cloud providers. This new concept often provokes uncertainty, which must be addressed head on. As more applications and computing resources move to the cloud, enterprises will become more dependent on cloud vendors, whether the issue is access, hosting, management, or any number of other services. Cloud consumers want to avoid vendor lock-in—having only one cloud provider. They want to know that they will have visibility into data and systems across multiple platforms and providers. They want to be able to move servers and storage around without a negative impact on application availability. The good news is that more solutions become available every day, but with a learning curve and numerous management challenges and considerations. This CITO Research paper provides advice for managers about how to c
Tags : 
hybrid cloud, computing infrastructure, enterprises, storage, application availability, it management
    
Equinix
By: Qualys     Published Date: Nov 05, 2013
A zero-day threat is a vulnerability that becomes known to the vendor on the same day it becomes known to the public, meaning IT assets targeted by a zero-day threat won't have a patch available when it's needed. However, zero-day attacks operate in a realm of the probable - they work only because there are exploitable vulnerabilities within IT systems. Many of these can, and should be prevented. This guide describes why organizations are vulnerable to zero-day attacks, and what you can do to add a zero-day offense to your existing vulnerability management processes to protect your organization's assets and data.
Tags : 
qualys, qualys zero-day risk analyzer, zero-day, zero-day offense, vulnerability, vulnerability management, zero-day threat, patch availablity, zero-day attacks, it systems, security, data security, resiliency layers, hardened assets, identification, network security, application security, hacker detection, internet security, intrusion detection
    
Qualys
By: Janrain, Inc.     Published Date: Apr 25, 2012
A comprehensive user management platform provides the essential tools for improving acquisition, creating engagement and building intelligence. Use this guide when evaluating prospective vendors to select the right user management platform partner.
Tags : 
janrain, marketing, social media, emerging marketing, internet marketing, website, social networks, interactive, web analytics
    
Janrain, Inc.
By: Tealium     Published Date: Jun 15, 2015
Deploying digital marketing vendor ‘tags’ across a global online network can be a daunting task. Learn how Tealium helped Lenovo’s Scott W. Lee solve this complex challenge and increase operational efficiency by 75 percent. With Tealium’s market-leading tag management solution as the core of Lenovo’s global digital marketing operations, Scott’s life is a lot easier and more productive.
Tags : 
tealium, digital marketing, vendor tags, tag management, lenovo
    
Tealium
By: Jobvite     Published Date: Aug 25, 2016
The talent acquisition market has changed dramatically. It is no longer just about placing ads on different sites and waiting for the resumes to roll in. Rather, it’s ferreting out those passive candidates and convincing them that your company is where they can shine and grow in their profession. Today’s recruiters must proactively search, find, and nurture candidates in this tough job market, and they need good tools to do this. In Forrester’s 45 criteria evaluation of talent acquisition vendors, we identified the 12 most significant software providers — ADP, Cornerstone OnDemand, Findly, IBM Kenexa, iCIMS, Jobvite, Lumesse, Oracle, PageUp People, PeopleFluent, SuccessFactors, and Technomedia — in the talent acquisition category that provide both applicant tracking system (ATS) and various levels of talent relationship management (TRM) functionality in their recruiting offering. This report details our findings about how well each vendor fulfills our criteria and where they stand in r
Tags : 
    
Jobvite
By: VMware AirWatch     Published Date: May 19, 2016
In Forrester’s 25-criteria evaluation of enterprise mobile management (EMM) vendors, we identified the 11 most significant EMM providers — AirWatch by VMware, BlackBerry, Citrix, Good Technology, IBM, Landesk, Microsoft, MobileIron, SAP, Sophos, and Soti — and analyzed their offerings. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help infrastructure and operations (I&O) professionals select the right partner for their enterprise mobile management.
Tags : 
mobile management, best practices, providers, vendors, enterprise, network management, business analytics, business management, customer experience management, productivity
    
VMware AirWatch
By: Sitecore     Published Date: Feb 04, 2015
This detailed Forrester Wave Model assesses the vendors of Web Content management (WCM) and discovers their focus on marketing scenarios, mobile device support and cloud deployment story.
Tags : 
wcm, mobile, marketing, cloud
    
Sitecore
By: Cornerstone OnDemand     Published Date: Sep 13, 2016
Investing in talent management software leads to bottom line results, but only if you’ve identified your company’s needs and goals, and know what questions to ask vendors. Instead of taking a “shop ‘till you drop” approach (where you risk looking forever, but end up with nothing except headaches and wasted resources), check out this how-to guide for successfully finding the right talent management tools to truly implement your company’s vision!
Tags : 
    
Cornerstone OnDemand
By: Asure Software     Published Date: Sep 10, 2012
In this case study, you'll learn how DPT's research into time and attendance systems lead them to Asure Software. After reviewing various vendors, DPT selected Asure Software as their vendor and partner because they knew AsureForceT Time & Labor Management Solutions would provide accuracy and room for company growth.
Tags : 
time and attendance systems, workforce management, payroll solutions, human resources, web-based applications
    
Asure Software
By: Panorama     Published Date: Jan 22, 2014
To help organizations evaluate their Business Intelligence needs, Panorama Software has built a vendor agnostic multi-vendor evaluation work sheet. Organizations can rank as many vendors as they wish in a spread sheet that contains over 150 features. All data is then aggregated into a results sheet, displaying your top options.
Tags : 
panorama, business intelligence, bi vendors, free tools, bi matrix, intelligence, buyers guide, data management, business analytics, business activity monitoring, total cost of ownership
    
Panorama
By: Forrester     Published Date: Feb 24, 2014
ECM delivers solid business benefits to IT leaders as the market shows continued growth. The 23 vendors in this magic quadrant are addressing increased demands for better mobile and cloud capabilities, as well as more rigorous exceptions for vertically specific needs.
Tags : 
gartner, report, vendors, enterprise content management, ecm, magic quadrant
    
Forrester
By: Samanage     Published Date: Aug 22, 2014
One of the oldest and largest global private equity firms, The Riverside Company was fed up with their complex ITSM solution, the costly consultants it required to maintain, and the sub-par customer service they received from their vendor. In this webinar, Eric Feldman, Director of IT at Riverside, shares behind-the-scenes details of how they regained control of their domain, including: "IT"SM…and Beyond – Cross functional business challenges that drove their requirements The journey – What they learned about cloud ITSM along the way The tangible benefits – Immediate business impact and what’s now possible including more accurate budgeting and building economies of scale If you’re actively looking at, or merely thinking about a new IT Service Management (ITSM) solution for your organization, this is one conversation you don’t want to miss. Like Riverside, you can get control and become master of your own IT domain.
Tags : 
samanage, itsm, riverside, itsm solutions, vendors, it management, knowledge management, enterprise applications
    
Samanage
By: Intel Security     Published Date: Jan 12, 2016
As organizations try to simplify vendor management, many are asking if consolidating on a single endpoint security vendor makes sense. This white paper examines the questions IT executives should ask themselves and their security technology partners.
Tags : 
endpoint, security, vendor, iot, it management
    
Intel Security
By: BitSight Technologies     Published Date: Jun 12, 2015
Gartner has named BitSight Technologies a “Cool Vendor” in Vendor Management for 2015. This report highlights three vendors for offering “tools and services to support vendor risk management and improve performance visibility.” Download this paper to learn how BitSight processes and synthesizes terabytes of data to create security ratings, and how a leading North American Bank uses BitSight Security Ratings in their vendor risk management program.
Tags : 
bitsight, technologies, gartner, cool, vendor, data, risk
    
BitSight Technologies
By: BitSight Technologies     Published Date: Jul 23, 2015
Since Vendor Security Risk Management is a relatively new field, there are plenty of intricacies to come to terms with. To help your introduction to VRM go a little more smoothly, we have compiled a list of FAQs and tips to get you started.
Tags : 
vendor risk management, vrm, risk management program, penetration tests, risk management strategy, security requirements, compliance, data security standards, network management, network performance management, internet security, intrusion detection, intrusion prevention, network security appliance, security management, pci compliance, vulnerability management
    
BitSight Technologies
By: Symantec     Published Date: Jun 13, 2018
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices desktops, laptops, tablets, and smartphones with various operating systems to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. In the wake of this disruption, vendors offered myriad point products that solve only a portion of the security problem. These products usually require costly custom integrations and high management overhead to boot. Making matters worse, traditional security approaches can’t address an evolving threat landscape that includes ransomware, stealthy attacks that dwell in a customer’s environment for months, and threats targeting iOS and Android devices. In fact, the mobile workforce is more vulnerable than ever before.
Tags : 
    
Symantec
By: IBM MaaS360     Published Date: Jul 09, 2015
Read about 27 critical criteria of mobile concern, 15 vendors ranked on current offering and strategy, and the 10 providers leading the pack.
Tags : 
enterprise mobile management, emm, ibm, vendors, mobile management strategy, networking, security, it management, wireless
    
IBM MaaS360
By: IBM MaaS360     Published Date: Jul 01, 2016
In Forrester’s 25-criteria evaluation of enterprise mobile management (EMM) vendors, we identified the 11 most significant EMM providers — AirWatch by VMware, BlackBerry, Citrix, Good Technology, IBM, Landesk, Microsoft, MobileIron, SAP, Sophos, and Soti — and analyzed their offerings. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help infrastructure and operations (I&O) professionals select the right partner for their enterprise mobile management.
Tags : 
ibm, forrester, enterprise mobile management, mobile, security, wireless
    
IBM MaaS360
By: IBM     Published Date: Oct 02, 2015
IBM BigFix is recognized as a leader in Gartner's Magic Quadrant for the fourth year in a row. Despite being a relatively mature technology, new product capabilities and diverging vendor strategies make selecting a client management tool vendor as challenging as ever for end-user computing and support managers.
Tags : 
client management, ibm, bigfix, gartner magic quadrant, cmt, business management, customer interaction service, customer relationship management, project management, service management
    
IBM
By: IBM     Published Date: Apr 04, 2016
IBM BigFix is recognized as a leader in Gartner's Magic Quadrant for the fourth year in a row. Despite being a relatively mature technology, new product capabilities and diverging vendor strategies make selecting a client management tool vendor as challenging as ever for end-user computing and support managers.
Tags : 
ibm, ibm bigfix, gartner, magic quadrant, client management tools, knowledge management, enterprise applications
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter