Find White Papers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

it contractors

Results 1 - 25 of 39Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night – and we know because we asked you.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unk
Tags : 
    
Cisco EMEA
Published By: Commvault     Published Date: Jul 06, 2016
How do you maintain the security and confidentiality of your organization’s data in a world in which your employees, contractors and partners are now working, file sharing and collaborating on a growing number of mobile devices? Makes you long for the day when data could be kept behind firewalls and employees were, more or less, working on standardized equipment. Now, people literally work on the edge, using various devices and sending often unprotected data to the cloud. This dramatic shift to this diversified way of working has made secure backup, recovery and sharing of data an exponentially more difficult problem to solve. The best approach is to start with a complete solution that can intelligently protect, manage and access data and information across users, heterogeneous devices and infrastructure from a single console - one that can efficiently manage your data for today's mobile environment and that applies rigorous security standards to this function.
Tags : 
commvault, mobile data, file sharing, backup recovery, access, personal cloud approach, data protection, endpoint, end user recovery, control governance, networking, security, it management, enterprise applications, data management
    
Commvault
Published By: Eaton     Published Date: Jul 09, 2018
Code updates happen for one main reason: safety improvement. NEC (National Electrical Code) Article 408.3 helps take electrical safety for service entrance panels to a new level. The code, updated in 2017, includes provisions to provide shock protection via panelboard barriers. The barriers protect from energized conductors on the line terminals of the main overcurrent protection device (OCPD) in a panelboard. When the main circuit breaker in a panel is turned off, line side terminals and conductors remain energized from upstream via the utility or another panelboard. With these barriers in place and the main OCPD turned off, installers are better protected when pulling wires into the panelboard. Today, all panelboards are shipped with shock-protective barriers. However, barriers are new to installation procedures, so contractors may not recognize them and accidentally throw them out—easily and often.
Tags : 
    
Eaton
Published By: CA Technologies     Published Date: Apr 06, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
cyber security, cyber attack, it security, threat analytics, risk mitigation, data security
    
CA Technologies
Published By: Absolute Software     Published Date: May 31, 2016
The OCR conducts HIPAA audits of covered entities and their business associates and subcontractors. If HIPAA violations are discovered during these audits, the OCR will implement significant penalties. Additionally, since OCR is posting the details of every breach affecting 500 or more individuals on a public website1 , the organizations involved have become susceptible to class-action lawsuits.
Tags : 
best practices, business analytics, productivity, business intelligence, business management
    
Absolute Software
Published By: CA Technologies     Published Date: Sep 25, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders. There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
Data security risk caused by third parties is a pervasive problem. Yet, many organizations granting remote privileged access to third-party users leave gaps that represent significant security risks. If you’re like most organizations today, you frequently grant vendors, contractors and other non-staff members access to internal networks and systems. These privileged users remotely administer your operating systems, databases or applications using their own endpoint devices. Download the eBook to learn the five best practices to control security risk brought on by third parties.
Tags : 
    
CA Technologies EMEA
    
ClickSoftware
Published By: Procore     Published Date: May 28, 2019
The successful construction companies of tomorrow will be those that have critically reviewed how they manage their business and how they run their projects, making changes to their systems and processes to become more efficient at delivering client value. Download this eBook to learn exactly how construction technology can help your business remain competitive by: ? Increasing efficiency and productivity ? Reducing delays and costs ? Enabling better communication and collaboration ? Improving customer satisfaction ? Engaging an ever-evolving, tech savvy workforce Procore is a construction management platform that improves efficiency and reduces risk by giving contractors complete control and visibility of their business. Project Management, Quality & Safety, Construction Financials, and Field Productivity tools give office and site-based users access to the information and functionality they need, on any mobile device. As a platform, Procore’s ability to integrate with other leading
Tags : 
    
Procore
Published By: Procore     Published Date: May 28, 2019
Looking for Construction Project Management Software? Ensure you don’t make an expensive mistake. Downloading this eBook will help you build a framework for evaluating and choosing the construction management software solution to fit your business. What you’ll learn: ? How to identify and define your needs ? The functionality you should assess ? Specific features to look for ? How to evaluate a software vendor Procore is a construction management platform that improves efficiency and reduces risk by giving contractors complete control and visibility of their projects. Project Management, Quality & Safety, Construction Financials, and Field Productivity tools give office and site-based users access to the information and functionality they need, on any mobile device. As a platform, Procore’s ability to integrate with other leading applications streamlines process and insights across all aspects of a contractor’s projects and business.
Tags : 
    
Procore
Published By: Procore     Published Date: Jul 08, 2019
Download the ebook to learn how construction technology is making UK & Ireland contractors more resilient and competitive. And follow the 7-step practical guide for kick-starting a digital construction strategy in your business, regardless of its size and complexity. Procore is a construction management platform that improves efficiency and reduces risk by giving contractors complete control and visibility of their business. Project Management, Quality & Safety, Construction Financials, and Field Productivity tools give office and site-based users access to the information and functionality they need, on any mobile device. As a platform, Procore’s ability to integrate with other leading applications streamlines process and insights across all aspects of a contractor’s projects and business.
Tags : 
    
Procore
Published By: IBM     Published Date: Jan 19, 2017
Read this article to understand how Box can revolutionize the way your marketing team creates campaigns in just five ways: 1. Complete projects, fast 2. Work with outside contractors and agencies, securely 3. Access files here, there and everywhere 4. Equip sales team with winning tools 5. Distribute campaign content easily
Tags : 
ibm, marketing, box, ibm box, campaigns, knowledge management
    
IBM
Published By: CyberX     Published Date: Aug 21, 2017
Today, a range of diverse cyber-adversaries — including nation-states, cybercriminals, competitors, hacktivists, and insiders/contractors — pose financial, reputational and regulatory risk to industrial and critical infrastructure organizations. The business impact can include costly production downtime, safety failures, and environmental release of hazardous materials, as well as theft of corporate secrets such as sensitive information about formulas and proprietary manufacturing processes. The challenge is compounded as organizations adopt digitization initiatives and IT/OT convergence to support the business — removing any “air-gaps” that may have existed in the past. To help security and operations teams stay ahead of the latest ICS/SCADA threats, CyberX — the industrial cybersecurity company founded by military cyber experts with nation-state experience securing critical infrastructure — has partnered with SANS to create educational content about emerging ICS threat vectors and
Tags : 
ics, scada, cyberx, cyber security, hacking, randomware
    
CyberX
Published By: Canon Business Process Services, Inc.     Published Date: Aug 17, 2015
Every business day, corporate campuses across the country function like small cities requiring highly specialized facilities and logistics management services. This paper will explore effective and efficient Corporate Campus Logistics Services to ensure the efficient flow of materials and people at large multi-building office campuses serving thousands of employees. Corporate facilities, real estate management, logistics and procurement teams as well as commercial real estate management companies are charged with sourcing the services that are the underpinnings of these mega-campuses. It’s an effort that spans a wide range—coordinating the receipt and distribution of supplies, equipment and packages; safely transporting thousands of employees as well as suppliers and contractors to locations within the campus; tracking and warehousing countless materials to support daily planned and unplanned workplace needs. Learn more about lowering costs, streamlining operational efficiency and gaining high employee satisfaction.
Tags : 
canon business process services, outsourcing services, managed services, logistics services, warehouse management, facilities management, commercial real estate management, corporate real estate management, business operations, vendor management, performance management, service level agreements, slas, knowledge management
    
Canon Business Process Services, Inc.
Published By: Maxwell Systems     Published Date: Sep 11, 2013
The construction game's changed. In order to stay competitive, you need increased visibility and control of your projects, from bid to cash. That's why contractors have turned to optimized, comprehensive solutions to get the end-to-end control they need for success.
Tags : 
optimization, construction business, construction, profitable growth, increased visibility, contractors, comprhensive solutions, best practices, business management
    
Maxwell Systems
Published By: Cielo     Published Date: Jan 30, 2019
For healthcare organizations, talent shortages mean lost revenue from having to cancel procedures and turn away patients. And with the aging population and increased competition for great healthcare talent, organizations like yours need a new, flexible workforce solution. That solution is Total Talent Acquisition (TTA). TTA can break down hiring silos by unifying your organization’s efforts in acquiring all types of workers, whether they’re full-time staff, consultants, freelance contractors, temporary staff or project-based workers. It can rein in costs, help assess your current and future talent needs, and create a better experience for candidates and, most importantly, patients. We created this guide to help you learn more about Total Talent and to assess how your organization can benefit from it. Download it to learn: ? What is Total Talent Acquisition ? How TTA creates a competitive advantage in the healthcare industry ? The positive impacts this model can have on healthcare organ
Tags : 
    
Cielo
Published By: Cisco Wireless     Published Date: Apr 14, 2017
Teamwork: In today’s workplace, it’s the new normal. Organizations of nearly all sizes and industries find that activating high-performance teams can deliver dramatic results. These teams, unlike those of the recent past, prominently include people from outside the organization, such as contractors, suppliers, and consultants as well as colleagues in disparate locations. Read this Harvard Business Review study to learn how your organization can respond to todays collaboration challenges: Integrating workers who might be telecommuting or working flexible hours. Reacting to new business drivers such as speed to market, mobility, and globalization. Present collaboration tools that fall short on supporting the depth, pace, and style of teamwork now required to remain competitive.
Tags : 
    
Cisco Wireless
Published By: Deltek - Nethawk     Published Date: Mar 05, 2013
In this white paper we explore how smaller contractors can now have access to robust and compliant solutions via the cloud, thus removing the IT and cost barriers that previously kept these solutions out of reach.
Tags : 
smb, government contractors, cloud solutions, cloud computing, cloud, project management, accounting solutions, spreadsheets, application integration, application performance management, best practices, business activity monitoring, business analytics, business integration, business intelligence, business management, business process management, enterprise resource planning
    
Deltek - Nethawk
Published By: Aruba Networks     Published Date: Nov 15, 2013
With more Internet-connected mobile devices than people in the world in 2013, IT must provide seamless connectivity to every class of user — employees, contractors, guests and even customers — appropriate to their role and type of device. Mobility in the workplace isn’t just for user benefit and productivity. The migration to mobility begets several IT benefits.
Tags : 
just media, aruba networks, workplace benefits, wire-like wireless, context-aware security, user experience, automate adds, reduce network costs, rightsizing, mobile devices, seamless connectivity, mobility, productivity, migration to mobility, it benefits, high density, aruba clientmatch, aruba apprf, context-based security, mobility controller
    
Aruba Networks
Published By: Aruba Networks     Published Date: Jul 03, 2013
The next-generation workplace is all about mobility. With more Internet-connected mobile devices than people in the world in 2013, IT must provide seamless connectivity to every class of user — employees, contractors, guests and even customers — appropriate to their role and type of device. It turns out, mobility in the workplace isn't just for user benefit and productivity. The migration to mobility begets several IT benefits. Download this white paper to find out the benefits…
Tags : 
aruba clientmatch, aruba apprf, mobility controllers, lans
    
Aruba Networks
Published By: Motorola     Published Date: Feb 06, 2008
Webcor's industry is highly competitive. To maintain and build on its leadership position, the company's employees must be able to clearly communicate and quickly respond to a wide range of stakeholders, including customers, architects, contractors and manufacturers. This case study details how Good™ Mobile Messaging helped Webcor employees stay on top of things.
Tags : 
motorola, case study, motorola good, wireless communications, productivity
    
Motorola
Published By: NETIQ     Published Date: Jun 20, 2014
Contractors entail a unique challenge for businesses and for IT. They’re necessary, but provisioning them correctly and deprovisioning them at the right time is difficult. Read this paper to learn to minimize risk and streamline provisioning for contractors and others.
Tags : 
netiq, it contractors, security, enterprise security, risk issues, employee performance, project management
    
NETIQ
Published By: Polycom     Published Date: Mar 27, 2017
Engineering firms are under increasing pressure to deliver on billable ratios, while the IT teams that support them are asked to minimize their administrative burden on the firm. What if a lead engineer could visit a job site without leaving the office? What if you could meet face-to-face with clients, partners, or subcontractors more frequently while budgeting less for travel costs? Watch this video to learn how collaboration technology allows you to be more agile, efficient, and effective. In under 30 minutes, we'll explain: • Common use cases for video collaboration - going way beyond team meetings to the tasks at the heart of engineering • Collaboration solution innovations - if you think an expensive, wall-mounted, on-premises solution is your only option, you may be surprised by what's available • Success stories - hear how a leading engineering firm is putting these solutions to use and the impact it has on their business
Tags : 
engineer, engineering, collaboration, billable, video, communication, content-sharing, client, contractor, consulting, consultant, technology, polycom, microsoft, skype, lync, project
    
Polycom
Previous   1 2    Next    
Search