HIT Consultant Insightful coverage of healthcare innovation
 

user management

Results 151 - 175 of 378Sort Results By: Published Date | Title | Company Name
Published By: ServiceNow     Published Date: Sep 02, 2015
See why Gartner's 2015 Magic Quadrant recognizes ServiceNow as a leader for the second year in a row. Each year Gartner assesses the viability and competitive strength of vendors in the IT service support management (ITSSM) space. This valuable report helps users determine which solutions best fit their needs, based on the tool capabilities, the integration with IT Operations Management solutions and more than a dozen other factors. For the 2nd year in a row, ServiceNow is recognized as a Leader in this Gartner Magic Quadrant. Check out what makes us different. Get the full, complimentary report to: • Receive an assessment of key vendors • Get a snapshot of the overall market overview • Learn why ServiceNow remains a leader
Tags : 
    
ServiceNow
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
Au cours de ces dernières années, la gestion des accès à forts privilèges, un processus englobant différentes fonctionnalités de contrôle, de supervision et d’audit visant à réduire les risques associés aux utilisateurs, aux comptes et aux identifiants à forts privilèges, est devenue une priorité majeure pour les entreprises et organisations de tous secteurs. Cet intérêt accru est motivé par différents facteurs.
Tags : 
identification à forts privilèges, activités à forts privilèges, sécurité, entreprise, violations de données, menaces internes, infrastructure de l’entreprise, privileged user access, privileged access management, security, privileged credentials, secure it
    
CA Technologies EMEA
Published By: IBM     Published Date: Jan 02, 2014
Business users need a simple but powerful way to navigate through data and find the insights to make timely, critical business decisions. Unfortunately, many users have become frustrated at their inability to quickly access and analyze the information they require. This data typically includes a combination of personal and corporate data locked in various enterprise systems. It exists in different formats and can be hard to analyze, change or share — making it difficult for people to get fast answers to business questions.
Tags : 
ibm, cognos insight guide, navigating data, interactivity, analytic functionality, enterprise analytics, personal analytics, customer service, business users, analytic solution, share data, performance management, supply chain management, customer relationship, cognos insight
    
IBM
Published By: Aternity     Published Date: Sep 10, 2012
Don't try to fit a square peg into a round hole by using infrastructure performance tools that are not equipped to monitor and measure true end user experience in VDI environments. Join EMA Research Director Julie Craig and Aternity President & CEO Trevor Matz to learn how to close the VDI end user experience visibility gap.
Tags : 
desktop virtualization, infrastructure performance, user experience, vdi environments, end user experience management, aternity
    
Aternity
Published By: Alcatel Lucent Enterprise     Published Date: Aug 31, 2017
More agile and mobile ways of working need more agile and flexible networks. Wave 2 Wi-Fi, powered by ALE, delivers the capabilities needed to create future-ready organizations. Alcatel-Lucent OmniAccess® Stellar WLAN is optimized for Wave 2 infrastructures, with a distributed intelligence architecture, simplified management and support.
Tags : 
performance, iot readiness, simplicity, user centricity, analytics capability, unified management
    
Alcatel Lucent Enterprise
Published By: Oracle     Published Date: Nov 16, 2017
Two trends are pushing all lines of business—across all industries—toward cloud IT. First, IT is being stretched more than ever. IT organizations are expected to expand services and meet tighter SLAs while having fewer resources, personnel, and skills to work with. With the IT queue growing longer than ever, both IT and LOB leaders are interested in using the cloud to quickly deploy the services users need. For most IT organizations, the current way of doing business does not map to growth or enable the flexibility to compete in the digital age. Rigid and periodic hardware-refresh cycles cannot adequately scale, and applications built for on-premises resources using traditional development and management tools are no longer flexible enough to deliver the agility businesses need to grow or compete.
Tags : 
    
Oracle
Published By: Dell Software     Published Date: May 02, 2014
These interviews with three Foglight customers underscore UEM’s diverse appeal, its essential values to IT, and Foglight’s proven versatility in supporting the multiple faces of UEM.
Tags : 
dell, dell software, foglight, dell foglight, user experience management, user experience, customer service, customer satisfaction, application support, apm
    
Dell Software
Published By: Dell Software     Published Date: Apr 17, 2013
This white paper includes interviews with three diverse companies using User Experience Monitoring (UEM). It underscores UEM’s diverse appeal, its values to IT, and Dell’s versatility in UEM. The paper shows how Dell is combining critical insights into business outcomes and user behaviors with performance and application design.
Tags : 
foglight, user experience, user experience management, cast studies, dell, quest software
    
Dell Software
Published By: Dell Software     Published Date: Oct 03, 2013
Industry analysts EMS interview three users of Foglight from Dell to underscore the appeal of UEM, its essential value to IT, as well as Foglight versatility in supporting UEM’s multiple facets. Download How Foglight Makes User Experience Management a Reality: Three Case Studies today.
Tags : 
web analytics, foglight, dell, user experience management, customer behavior tracking, customers, best practices, increase customer conversion
    
Dell Software
Published By: Pivotal CRM     Published Date: Dec 21, 2007
In this paper, learn how with the right CRM solution, information workers can increase productivity, improve customer service, and boost collaboration, while the business simplifies complex processes, increases sales, and reduces costs.
Tags : 
information worker, crm, microsoft, office, customer relationship management, user adoption, information management, data management, information overload, productivity, integration, pivotal, pivotal crm, quinstreet
    
Pivotal CRM
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Find out how companies have deployed remote access SSL VPNs to increase remote user satisfaction, improve accessibility to corporate resources, support business continuity planning, and reduce overall implementation and ongoing management costs. The white paper also covers how cloud-based SSL VPN services address high availability requirements, support unforeseen spikes in activity and optimize network performance. Lastly, learn how a single SSL VPN platform can support all your mobile access, telecommuting and partner extranet requirements to improve your ROI.
Tags : 
virtela, healthcare, remote user satisfaction, roi
    
Virtela Communications, Inc.
Published By: Curalate     Published Date: Jul 17, 2014
In today's visual web, consumers are sharing brands’ images at record pace, taking content from brands' websites and saving it to visual social media like Pinterest, where relevancy trumps recency. This behavior significantly extends the life of products, creating engagement with images long after they've been sold out or removed from brands' (digital) shelves. In fact, nearly 50% of Pinterest's top pins send users to expired product pages, dead links and 404 pages. This is a major, major red flag...
Tags : 
instagram marketing, pinterest marketing, tumblr marketing, visual marketing, pinterest analytics, instagram analytics, pinterest for business, instagram for business, user generated content, social media management tools, visual social marketing, social media marketing tools, instagram tool, pinterest tool, curalate
    
Curalate
Published By: Crownpeak     Published Date: Jun 03, 2015
Enterprises have long personalized their visitor's web experiences, typically through product recommendations or basic user segmentation. However, today's customers demand more real-time, in-the-moment experiences that meet their needs whenever, wherever. The technology behind this level of personalized marketing continues to advance by adding situational, predictive and real-time elements to keep up with customer expectations.
Tags : 
forrester research, personalization, next generation personalization, personalized experience, customer experience, personalized marketing, digital experience, contextual experience, user experience, emerging marketing, internet marketing, web content management, wcm, crm, customer care
    
Crownpeak
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Mar 20, 2019
Know how LTI leveraged SAP SuccessFactors to simplify the employee lifecycle process and enabled rapid move to an intelligent enterprise. A globally-integrated Cloud-based HR Platform for 27000+ users across 30 countries aided higher employee engagement and talent management. Download Complete Case Study.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: DocuSign     Published Date: Jul 12, 2019
As you know, HR plays a critical role in recruiting, hiring, training, and retaining the lifeblood of your business: people. But despite HR’s strategic role, it has traditionally lagged behind other departments in terms of adopting user-friendly, employee-focused technology investments. Legacy tools and reams of paper are still often used to prepare, sign, act upon, and manage the overwhelming document load, from recruitment and onboarding to performance management and off-boarding.1 The combination of outdated processes and additional paperwork limits HR staff’s ability to do their most important job: hire and support employees. That’s changing as HR turns to the cloud to digitize the agreement process. According to a 2018 PwC survey of HR executives, 75 percent of respondents said that they’ve moved at least one HR process to the cloud, while 40 percent have core systems (talent and acquisition management and HR information systems, for example) in the cloud.2 And those efforts are
Tags : 
    
DocuSign
Published By: IBM     Published Date: Apr 09, 2015
This buyer’s guide can help you select the right identity and access management solution to successfully manage and control user access within, across and between organizations. The guide outlines the most common identity and access management challenges organizations face from the perspective of CSOs, IT operations staff, line-of-business managers and enterprise architects. It then provides a checklist for evaluating solutions and defines the capabilities required to address security complexity, compliance and cost.
Tags : 
access management solution, ibm, security risk, security compliance
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
In today’s highly digital world, many users and employees are accessing information from multiple devices and from many locations. Enterprise mobile management tools are becoming a must have for most businesses in order to deliver an optimal user experience. The IBM MaaS360 suite allows for a robust app development platform where you can increase portability and interoperability to enable and support every mobile user in your organization. Download this e-book to see how you can create the best mobile environment for your users and employees. All of the Enterprise Mobile Management tools and services needed to deliver the optimal user experience to every user, wherever they are, whatever app they are using, and whenever they need resources, are well-integrated into the MaaS360 suite from IBM.
Tags : 
enterprise management, mobile management, organization optimization, security management, malware protection, data protection, bug prevention, information management
    
IBM
Published By: IBM     Published Date: May 01, 2017
MaaS360 delivers robust UEM capabilities across all major computing platforms, including iOS, macOS, Android and Windows devices. And where competing solutions offer incomplete support for legacy Microsoft platforms, MaaS360 supports Windows XP SP3, Microsoft Windows Vista, Microsoft Windows 7, Microsoft Windows 8, Windows 10 and Microsoft Windows 10 Mobile. These capabilities include: Identity and access management (IAM) that allows a shift from a device-based context to a more comprehensive, userbased context Application management, including an intuitive, universal application catalog for iOS, macOS, Android and Windows, advanced bundling and promotion features, bulk application purchase and distribution capabilities, and fine-grained data controls Download now to learn more!
Tags : 
microsoft, ibm, competing solutions, it support, device based, identity access management, universal application, promotion features
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
Many organizations face access management chaos. As applications and resources have spread across on-premise data centers and multiple cloud providers, users are often accessing these resources from anywhere and on multiple devices. These simultaneous trends have left access management systems fragmented and access polices inconsistent, resulting in an environment that is expensive to maintain and challenging to secure.
Tags : 
access management, integrated platform, cloud security, enterprise security, data security
    
IBM
Published By: IBM Smart Business     Published Date: May 29, 2009
This demo shows how Intuit Quickbooks Enterprise Solutions enabled by IBM Smart Business offers a smarter way to acquire, use and support business applications. Find out how you can use this software solution for your business to simplify inventory, purchasing, sales, and payroll, enabling you to cut costs and complexity. 
Tags : 
ibm, smart business, intuit, quickbooks, enterprise solutions, cost-cutting, purchasing, sales, payroll, dashboard, enterprise, business software solutions, smart market, smart cube, smart desk, smart support, finance, accounting, erp, smb
    
IBM Smart Business
Published By: IBM     Published Date: Sep 10, 2009
IDC studied 14 mobile and fixed-line service providers that implemented Tivoli Netcool and found that IBM Tivoli Netcool can help in big ways. It reduces costs by improving operational efficiencies and still allows you to deliver a high-quality custom management.
Tags : 
ibm, tivoli, netcool, roi, future proofing, data integration, operations productivity, cost reduction, user productivity, business value analysis, performance management, service quality management, and network fault management, cost efficiencies from consolidation, operations staff productivity, integrated solution
    
IBM
Published By: Aternity     Published Date: Sep 29, 2011
Published by Aternity, the paper includes 8 real-world cases detailing how Aternity empowers SAP customers with a user-centric approach to proactive IT management.
Tags : 
aternity, sap, application performance, it management, training, real-time
    
Aternity
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.