profile

Results 276 - 300 of 307Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Apr 25, 2016
Data is the key to doing this. But simply collecting it won’t take you all the way. You must use the data to create holistic customer profiles, then use those customer profiles to create interesting, personalised and memorable experiences. This three-part, step-bystep eBook series explains how to actually use data to provide each customer with the best experience possible.
Tags : 
customer experience, marketing, data management
    
Adobe
Published By: CA Technologies     Published Date: Jun 01, 2018
Thanks to numerous, headline-making incidents in recent years, cybercrime has risen toward the top of the concern list for many organizations—and the customers with whom they do business. You’ve heard many of the stories. Major health insurers, such as Anthem, Premera BlueCross and CareFirst had personal information for millions of their customers stolen. Sony Pictures experienced a breach that not only embarrassed employees and adversely impacted the release of the high-profile film, “The Interview,” but also damaged systems and applications—making it extremely difficult for the company to conduct business. The list goes on. Some you maybe haven’t heard, like the one about CodeSpaces, a provider of version management services to developers. When attackers were able to gain access to its cloud-based management consoles, they deleted the company’s entire infrastructure and backups—ultimately forcing CodeSpaces out of business. The bad news for organizations like yours is, thanks to the
Tags : 
    
CA Technologies
Published By: Mimecast     Published Date: Jun 04, 2013
With recent high profile cases, such as the News of the World hacking scandal, hitting the news headlines, the issue of email retention has quickly moved up the IT Director’s agenda.
Tags : 
email archiving, ediscovery, compliance, legal, intrusion prevention, security, access control, anti spam
    
Mimecast
Published By: Hitachi Vantara     Published Date: May 10, 2018
Digitizing communications governance is critical as banks adopt next-generation automation and RegTech solutions to address compliance and risk-mitigation measures. Regulations are changing risk profiles, requiring oversight of the culture of risk-taking, and preventing market abuse. Hitachi Vantara solutions enable you to centrally “capture, curate, consume” all regulated employee communications across the front office, middle office and back office.
Tags : 
    
Hitachi Vantara
Published By: NetApp     Published Date: Dec 05, 2016
How can hybrid-flash array users benefit from a move to all-flash? This case study profiles a large European organization that moved their VMware server and desktop environments from hybrid-flash to NetApp AFF all-flash systems.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Silver Peak     Published Date: Feb 12, 2013
An optimized WAN environment can increase network reliability and availability and improve cost profiles. It also improves the performance and reliability of data backup, replication, and recovery processes.
Tags : 
virtualization, wan, optimization, data center, network, reliability, high availability, business continuity
    
Silver Peak
Published By: McAfee     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt
    
McAfee
Published By: Intel Security     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt
    
Intel Security
Published By: McAfee Inc     Published Date: Nov 16, 2009
With all the benefits and opportunities the Internet provides, it can also be a very inhospitable place, requiring organizations' constant vigilance to protect themselves from attack. To better understand important security issues affecting organizations today, IDC recently completed a survey of more than 260 IT and Firewall managers and executives in the US and Europe that aimed to profile their organization's firewall deployments.
Tags : 
mcafee, email protection, firewall, it security, midsize, global threat intelligence, security, data protection
    
McAfee Inc
Published By: Adobe     Published Date: Jul 15, 2019
With an ever-growing array of customer interactions, especially digital, businesses are rapidly looking to gain competitive advantage by using data and insights at scale to create and activate 360-degree profiles of their customers to deliver a better experience. In a rush to accelerate digital growth and improve their business strategies, many global enterprises have built soiled, redundant technology environments, resulting in inaccurate, or worse, conflicting views of their customer's brand interactions. For example, Forrester's research reveals that 90% of enterprises use multiple analytics tools.
Tags : 
    
Adobe
Published By: Polycom     Published Date: Sep 15, 2015
Polycom voice solutions for Microsoft Lync helped the Organization profiled achieve the following benefits (risk and present value [PV] adjusted) over three years: Improved productivity and collaboration: $12,341,123. Employee relocation cost savings: $452,351. Phone purchase and installation savings: $1,988,182. Managed services cost savings: $582,269. Total cost savings and benefits: $15,363,925.
Tags : 
collaboration, communications, conferencing, lync, microsoft, phone, polycom, skype
    
Polycom
Published By: Genesys     Published Date: Feb 12, 2019
What if the cloud could radically improve your customer’s experience, your operations, and your bottom line? There’s a reason why many organisations are taking advantage of the benefits of cloud for contact centers. This eBook, focuses on two profiles for small contact centers, small business and small of large – a small contact center that is part of a much larger enterprise. Get key insights from independent market research that will help you make a case to take your customer communications platform to the cloud. With the right solution, your business can benefit from enterprise-quality capabilities at a price you can afford. And you can realise a return on investment in as little as three months! Download this eBook and learn: How to calculate ROI and time-to-value in different types of small contact center profiles What factors to consider when selecting a cloud vendor Three common myths about the cloud
Tags : 
    
Genesys
Published By: Citrix Systems     Published Date: Feb 27, 2014
New ways of working call for new ways of managing risk. Mobility, flexwork, bring-your-own device (BYOD) and increased collaboration across organizations have changed the risk profile and undermine existing IT architectures. The challenge is to allow people the flexibility they need for optimal business productivity while ensuring the security and compliance required by the enterprise. This paper describes how desktop virtualization can help regain control and reduce risk without sacrificing business productivity and growth.
Tags : 
citrix, information security, desktop virtualization, virtualization, it management
    
Citrix Systems
Published By: Business Software     Published Date: Apr 04, 2013
Today, there is unprecedented pressure on companies in all industry sectors to keep their supply chains running smoothly. This often means that these businesses with their ever-changing distribution channels and production centers feeding those supply chains, need to efficiently manage their warehouses. In this whitepaper, Business-software.com profiles the leading warehouse management software vendors.
Tags : 
top 10 warehouse management software, vendors, revealed, unprecedented pressure, companies, industry, sectors, supply chains
    
Business Software
Published By: Business Software     Published Date: Apr 04, 2013
More and more, manufacturers realize, that for increased productivity, they need a fully integrated, job-based manufacturing software system that has functionality for quoting, scheduling, job tracking, costing, purchasing, performance metrics and customer relationship management to name a few. In this white paper, Business-Software.com profiles the leading discrete manufacturing software vendors.
Tags : 
business-software.com, top 15 vendors, discrete manufacturing software, revealed
    
Business Software
Published By: Business Software     Published Date: Apr 04, 2013
With the advent of a new globally-based economy, process manufacturers face significant challenges. Rapidly shifting markets, more empowered buyers, increasing regulation, commodity volatility, and margin pressures, and the effects of a credit crunch bring a “new normal” of constant volatility, variability, and variety to today’s landscape. In order to survive, process manufacturers need to become far more flexible, risk aware, and responsive to generate healthy revenues and profits. But above all else, they need to understand the importance of finding the right software application to drive maximum return on their investment. Business-Software.com profiles the leading process manufacturing software vendors in this white paper, download it now!
Tags : 
top 15 process, manufacturing, software vendors revealed, business-software.com, rapidly shifting markets, increasing regulation commodity
    
Business Software
Published By: Business Software     Published Date: Apr 04, 2013
An ERP system combines methodologies with software and hardware components to integrate numerous critical back-office functions across a company. Made up of a series of “modules”, or applications that are seamlessly linked together through a common database, an ERP system enables various departments or operating units such as Accounting and Finance, Human Resources, Production, and Fulfillment and Distribution to coordinate activities, share information, and collaborate. In this white paper, Business-Software.com profiles the leading ERP software vendors. Download this white paper to learn more!
Tags : 
business-software.com, erp systems, methodologies, top 20, coordination, business software, knowledge management, enterprise applications
    
Business Software
Published By: HP     Published Date: May 14, 2014
HP commissioned Forrester Consulting in October 2013 to leverage existing Forrsights data and to survey IT hardware decision-makers in North America and Europe about their storage requirements for this Technology Adoption Profile.
Tags : 
forrester, it hardware, storage requirements, it decision makers, it management, enterprise applications
    
HP
Published By: HP     Published Date: Jun 05, 2014
HP commissioned Forrester Consulting in October 2013 to leverage existing Forrsights data and to survey IT hardware decision-makers in North America and Europe about their storage requirements for this Technology Adoption Profile.
Tags : 
hewlett packard, data, backup, . data protections, recovery, deduplication, storeonce, it management
    
HP
Published By: Adobe     Published Date: Jul 15, 2019
Mit einer ständig wachsenden Anzahl von Kundeninteraktionen, insbesondere im digitalen Bereich, wollen Unternehmen schnell Wettbewerbsvorteile erzielen, indem sie mithilfe von Daten und Einblicken maßgeschneiderte 360-Grad-Profile ihrer Kunden erstellen und aktivieren, um ein besseres Erlebnis zu bieten. Um das digitale Wachstum zu beschleunigen und ihre Geschäftsstrategien zu verbessern, haben viele globale Unternehmen isolierte, redundante Technologieumgebungen aufgebaut, die zu ungenauen oder sogar widersprüchlichen Ansichten über die Markeninteraktionen ihrer Kunden führen. Beispielsweise zeigen die Untersuchungen von Forrester, dass 90 % der Unternehmen mehrere Analysewerkzeuge verwenden
Tags : 
    
Adobe
Published By: CA Technologies     Published Date: Aug 22, 2017
The application programming interface (API) is an emerging technology for integrating applications using Web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think you can secure APIs using the same methods and technology with which we secured the browser-centric Web. APIs are fundamentally different from websites and have an entirely unique risk profile that must be addressed.
Tags : 
    
CA Technologies
Published By: Viavi Solutions     Published Date: Jan 04, 2017
In the age of information, staying on top of emerging threats requires IT teams to leverage existing tools in innovative ways, such as applying deep packet inspection and analysis from performance monitoring solutions for advanced security forensics. Based on recent insight gathered from 322 network engineers, IT directors and CIOs around the world, 85 percent of enterprise network teams are now involved with security investigations, indicating a major shift in the role of those teams within enterprises. Large-scale and high-profile security breaches have become more common as company data establishes itself as a valuable commodity on the black market. As such, enterprises are now dedicating more IT resources than ever before to protect data integrity.
Tags : 
    
Viavi Solutions
Published By: Viavi Solutions     Published Date: Apr 14, 2017
In the age of information, staying on top of emerging threats requires IT teams to leverage existing tools in innovative ways, such as applying deep packet inspection and analysis from performance monitoring solutions for advanced security forensics. Based on recent insight gathered from 322 network engineers, IT directors and CIOs around the world, 85 percent of enterprise network teams are now involved with security investigations, indicating a major shift in the role of those teams within enterprises. Large-scale and high-profile security breaches have become more common as company data establishes itself as a valuable commodity on the black market. As such, enterprises are now dedicating more IT resources than ever before to protect data integrity.
Tags : 
network security, security validation, technical security, cyber attacks, database security, it security, traffic analytics, data report
    
Viavi Solutions
Published By: DocuSign     Published Date: Jul 25, 2016
This short video profiles the use of DocuSign in Insurance with a special focus on our customer’s customer. See first hand how DocuSign improves customer experience, maximizes ROI, and ensures compliance as the global standard for Digital Transaction Management in Insurance
Tags : 
    
DocuSign
Published By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are an essential part of understanding your risk profile, it's simply not realistic to expect to eliminate all vulnerabilities from your environment. So, when your scan produces a long list of vulnerabilities, how do you prioritize which ones to remediate first? By data criticality? CVSS score? Asset value? Patch availability? Without understanding the context of the vulnerable systems on your network, you may waste time checking things off the list without really improving security. Join AlienVault for this session to learn: • The pros & cons of different types of vulnerability scans - passive, active, authenticated, unauthenticated • Vulnerability scores and how to interpret them • Best practices for prioritizing vulnerability remediation • How threat intelligence can help you pinpoint the vulnerabilities that matter most
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.