profile

Results 76 - 100 of 303Sort Results By: Published Date | Title | Company Name
Published By: Proofpoint     Published Date: Aug 21, 2017
Angreifer gehen heute kreativ vor und nutzen automatisierte Tools, um in Profilen bei sozialen Netzwerken (die häufig öffentlich zugänglich sind) nach Informationen über ihre Opfer zu suchen. Die Angreifer wissen daher, wo Sie arbeiten (und in welcher Position), ob Sie verheiratet sind und wo Sie in der Vergangenheit gearbeitet haben. Sie kennen Ihre Interessen, Hobbys und viele weitere Details. All diese Informationen werden zum Verfassen äußerst überzeugender E-Mail-Nachrichten verwendet, die Sie zum Klicken auf eine schädliche URL oder angehängte Datei verleiten sollen. Und sobald Sie geklickt haben, werden die Schaddaten auf Ihrem System abgelegt.
Tags : 
phishing, malware, bec, angriffe zielen auf menschen ab, für sicherheitsteams
    
Proofpoint
Published By: Salesforce     Published Date: Nov 18, 2014
Find out which type of sales rep is mostly likely to succeed in the current economy. Corporate Executive Board asked over 450 front-line sales managers and their direct reports questions across 44 different attributes, covering areas such as attitudes, skills, behaviors, activities, and knowledge. Get the eBook to find out which sales profile wins the most deals and how all your sales reps can be more successful.
Tags : 
sales, economy, skills, attitudes, behaviors, knowledge, sales reps
    
Salesforce
Published By: KPMG     Published Date: Jul 10, 2018
Working out what consumers want – and why – is getting harder. Transactional data and traditional market research and demographic profiles no longer do the job. Our ‘Five Mys’ report proposes a radical new framework for navigating complex consumer decision-making. Read the report to find out: • what the ‘Five Mys’ are and how they affect spending decisions • how to get better at predicting consumers’ changing needs • where different generations are directing their spending • how changing life patterns are creating new opportunities for businesses that can pick up on signals from consumers
Tags : 
    
KPMG
Published By: IBM     Published Date: Jul 08, 2015
For years, organizations have recognized that a better understanding of customers can translate to more sales, increased customer satisfaction and reduced customer churn. Initiatives focused on a 360-degree view of the customer have gone a long way toward providing those benefits by synthesizing customer profiles, sales history and other structured data from multiple sources across the enterprise. But today, customer-centric organizations are discovering that there is more opportunity for growth when they enhance that 360-degree view with information from more sources, both within and beyond the enterprise (see Figure 1). Information in email messages, unstructured documents and social media sentiments—previously beyond reach—is now extending the 360-degree view.
Tags : 
ibm, e360, customer satisfaction, customer retention, sales history, big data, it management, knowledge management, enterprise applications
    
IBM
Published By: Genesys     Published Date: Nov 17, 2017
This eBook focuses on two profiles for small contact centers, small business and small of large - a small contact center that is part of a much larger enterprise. Get key insights from independent market research that will help you make a case to take your customer communications platform to the cloud. With the right solution, your business can benefit from enterprise-quality capabilities at a price you can afford. And you can realize a return on investment in as little as three months!
Tags : 
ebook, contact centers, cloud, customer experience
    
Genesys
Published By: Genesys     Published Date: Feb 27, 2018
What if the cloud could radically improve your customer’s experience, your operations, and your bottom line? There’s a reason why many organizations are taking advantage of the benefits of cloud for contact centers. This eBook, focuses on two profiles for small contact centers, small business and small of large - a small contact center that is part of a much larger enterprise. Get key insights from independent market research that will help you make a case to take your customer communications platform to the cloud. With the right solution, your business can benefit from enterprise-quality capabilities at a price you can afford. And you can realize a return on investment in as little as three months! Download this eBook and learn: • How to calculate ROI and time-to-value in different types of small contact center profiles • What factors to consider when selecting a cloud vendor • Three common myths about the cloud
Tags : 
ebook, cloud, customer experience
    
Genesys
Published By: IBM     Published Date: Jul 19, 2016
Learn how IBM Cognos Analytics incorporates many governed discovery features, with which business users can easily expose the underlying data modelling of existing reports and modify it to an individual or departmental requirements
Tags : 
ibm, ibm cognos analytics, analytics, business intelligence, business analytics, business integration, business management, business metrics
    
IBM
Published By: IBM     Published Date: Sep 15, 2014
This white paper highlights how a real world FIS client’s utilization of IBM FlashSystem together with the FIS Profile® banking solution1 yielded dramatic performance improvements, truly accelerating the pace of global banking. This client has been an FIS outsourcing client for 14+ years and counting.
Tags : 
global banking, banking solutions, fis outsourcing, banking information technology, flash technology, business activity monitoring, business analytics, business process automation, project management, service management
    
IBM
Published By: IBM     Published Date: May 22, 2013
Enterprise Management Associates (EMA) has conducted extensive research investigating the integration and management challenges created by the convergence of on-premise and public Cloud hosted applications. Research conducted in mid-2012 uncovered some compelling statistics about the role of Cloud integration in today's companies: Nearly 50% of the companies surveyed have already deployed tiered transactions spanning public Cloud and on-premise computing environments (one form of "hybrid Cloud") Approximately 35% have integrated (or are in the process of integrating) multiple Software as a Service (SaaS) applications. As one IT professional put it, "Everything is connected to everything." Because of this fact, any discussionof public Cloud as a standalone technology is outmoded. Few modern on-premise applications exist as"silos," and the same is true of Cloud-delivered applications.
Tags : 
ibm, cloud, cloud computing, integration, cast iron, ema, hosted, cloud hosting, remote access, application integration, service oriented architecture, colocation and web hosting
    
IBM
Published By: Arcserve     Published Date: Jul 23, 2010
This report is designed to help IT organizations more effectively plan for the adoption of solutions that can help bring together a unified view of IT service performance as it impacts business outcomes. Download now!
Tags : 
ca technologies, ema radar, business service management, bsm, vendor, application performance management, infrastructure manager, service desk, infrastructure, business management, service management, desktop management
    
Arcserve
Published By: OpTier     Published Date: Mar 11, 2013
EMA Radar™ for Advanced Performance Analytics (APA) Use Cases: Q4 2012 Report Summary & OpTier Profile
Tags : 
optier, ema radar report, apa case studies, enterprise management associates
    
OpTier
Published By: Mimecast     Published Date: Apr 18, 2017
"To tackle today’s cyber threats, IT security leaders must rethink traditional security strategies. Email security in particular has become a victim of its own success and requires a radical rethink, having played a key role in several high-profile security breaches. Today’s threats, like spear-phishing, are designed to bypass traditional Secure Email Gateway defenses, often taking advantage of end users who are considered the weakest link in business email security armor. A zero-trust approach to email security is needed. This white paper discusses how: - CISO’s should carefully assess email security as part of a strategic security review - IT Managers can evaluate the state of current email defenses and take tactical action to strengthen them - Security Administrators can deliver best-practice defense in depth for email - Organizations can remove a reliance on trust to more effectively protect information, their network and employees. "
Tags : 
email security, cyber threats, it security, phishing
    
Mimecast
Published By: EMC Backup & Recovery Solutions     Published Date: Mar 29, 2010
VMware sites create more storage to manage and protect than their physical counterparts. This report showcases how EMC Backup and Recovery Solutions for VMware have helped customers redesign their backup operations.
Tags : 
emc, data domain, efficiency, vmware, server consolidation, servers, data integrity, backup, recovery, idc, roi, it costs, infrastructure, dedupe, deduplication, storage virtualization, server virtualization, data center design and management
    
EMC Backup & Recovery Solutions
Published By: IBM     Published Date: Oct 07, 2016
The new capabilities of WebSphere Application Server Liberty profile, based on Java EE 7 standards, are designed for enhanced developer productivity, dynamic scale, resilient production deployments and ease of integration into modern DevOps workflows. These new production ready capabilities of Liberty profile enable development and delivery of engaging and responsive applications by providing the application infrastructure that meets expectations for speed, agility and user friendliness.
Tags : 
ibm, middleware, cloud, platform services, websphere application server, java ee 7, websphere application server liberty, networking, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Jul 31, 2015
In its "Restoring Connections" paper based on research of telecommunications firms, IBM ‘s top ranked Institute for Business Value identified actions CSPs can take to reset customer experience and build brand loyalty through innovative, compelling, personalized services based on deep customer insight. Join us as we discuss how to leverage network and subscriber data to create unique customer profiles, personalize engagement, and improve marketing offers.
Tags : 
ibm, telco, customer analytics, csps, consumer behavior, brand loyalty, personalized engagement, big data
    
IBM
Published By: IBM     Published Date: Dec 04, 2015
Join us as we discuss how to leverage network and subscriber data to create unique customer profiles, personalize engagement, and improve marketing offers.
Tags : 
ibm, engagement, marketing, customer profiles, customer insight, telecommunication, telecom
    
IBM
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Feb 19, 2013
This Taneja Group Solution Profile takes a closer look at what business continuity means in a storage system, and examines the approaches that vendors typically take to providing it. This paper looks into HP3PAR StoreServ 7000 and more.
Tags : 
san storage, intel, intel, hp 3par, hp storeserv, it management, data management, data center
    
Sponsored by HP and Intel® Xeon® processors
Published By: Symantec     Published Date: Jul 11, 2017
CloudSOC can help you more easily determine which apps should be blocked and which should be allowed within your organization by assisting in identifying unsanctioned Shadow IT, providing customized Business Readiness Ratings™ for each cloud app tailored to your organization’s risk profile, and applying User Behavior Analytics (UBA) to identify hackers and malicious usage. Here you’ll learn how to guide your organization through the process of safely adopting cloud apps and services using Symantec CloudSOC.
Tags : 
cloud application, cloud app adoption, cloud security, cloud protection, shadow it
    
Symantec
Published By: CA Technologies     Published Date: Apr 06, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
cyber security, cyber attack, it security, threat analytics, risk mitigation, data security
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders. There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
    
CA Technologies
Published By: IBM     Published Date: Oct 24, 2012
Enterprise Marketing Management, is a software technology solution for marketing organizations that provides a comprehensive marketing platform for managing customer and prospect interactions throughout the customer life-cycle. Read on to learn more.
Tags : 
ibm, emm, enterprise marketing mangement, knowledge, integration, enterprise applications, cross channel profile
    
IBM
Published By: Sponsored by Marin Software     Published Date: Aug 11, 2015
Get this free 48 page report and find the best paid media campaign management tool for your organization. Includes vendor profiles and updates on the current trends and issues, including how marketers, search advertisers and vendors are keeping pace with changing ad formats. Download now.
Tags : 
paid media management, ad platforms, search marketing, audience targeting, search tools, marketing campaign, marketing budget, marketing automation
    
Sponsored by Marin Software
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.