world wide

Results 51 - 75 of 434Sort Results By: Published Date | Title | Company Name
Published By: HP Inc.     Published Date: Feb 03, 2016
Every day an average of 30,000 new websites are identified as distributing malicious code to site visitors. This helped contribute to the 43% of U.S. companies that experienced data breaches in 2014 alone. But not all dangers to computers and laptops come from malicious code picked up over the Internet. A study by IDC and the National University of Singapore revealed that in 2014, businesses worldwide would spend nearly $500 billion to deal with the problems caused by malware on pirated software.
Tags : 
    
HP Inc.
Published By: Panasonic Business Mobility Solutions     Published Date: Sep 06, 2016
A surprising 80% of the 30 million1 warehouse workers worldwide, in the field of transportation and logistics, are still using pen and paper in a physically-intensive environment that increasingly demands accuracy and real time feedback. With warehouse efficiency, so closely tied to customer satisfaction in areas like ecommerce, the low penetration of digital solutions—20% as recent as 2014, is surprising. Unless an organization has a fully automated warehouse, the job is heavily labor-intensive. VDC research reveals that as long as human labor plays a dominant role in warehousing, any technology that optimizes workflows and improves accuracy will add tremendous value
Tags : 
mobile workforce, laptops, tablet, mobile computing, productivity, rugged, mobile handheld, mobile scanner
    
Panasonic Business Mobility Solutions
Published By: CA Technologies     Published Date: Apr 06, 2017
CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate—across mobile, private and public cloud, distributed and mainframe environments.
Tags : 
enterprise security, it security, payment card fraud, risk management, cyber attacks, risk, data protection, threat analytics
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate—across mobile, private and public cloud, distributed and mainframe environments.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
CA Technologies
Published By: Adobe     Published Date: Jul 04, 2016
Of course customers want great content, but understanding what defines great isn’t so easy. Adobe surveyed 12,000 customers worldwide about their content cravings and learned what it takes to make content irresistible.
Tags : 
content, content management, customer experience, customer interaction, customer interaction service, content delivery, content management system, customer experience management
    
Adobe
Published By: Adobe     Published Date: Oct 05, 2016
Of course customers want great content, but understanding what defines great isn’t so easy. Adobe surveyed 12,000 customers worldwide about their content cravings and learned what it takes to make content irresistible.
Tags : 
content, content management, customer experience, customer interaction, customer interaction service, customer relationship management, customer satisfaction, customer experience management
    
Adobe
Published By: Adobe     Published Date: Oct 05, 2016
Of course customers want great content, but understanding what defines great isn’t so easy. Adobe surveyed 12,000 customers worldwide about their content cravings and learned what it takes to make content irresistible.
Tags : 
content, content management, customer experience, customer interaction, customer interaction service, customer relationship management, customer satisfaction, customer service
    
Adobe
Published By: Adobe     Published Date: Oct 10, 2016
We make it our duty to understand all aspects of digital marketing. For seven years, we’ve surveyed hundreds of marketers worldwide to learn how companies are maturing digitally.
Tags : 
    
Adobe
Published By: Okta     Published Date: Mar 10, 2016
Gartner has named Okta as the only leader in its 2015 Identity & Access Management as a Service (IDaaS) Magic Quadrant. Access your complimentary Gartner report today.
Tags : 
    
Okta
Published By: IBM APAC     Published Date: Jun 13, 2017
Using more than 70 criteria and combining feedback from customer interviews, IDC found that the providers in this evaluation bring diverse capabilities for modernizing SAP applications. Download this paper to find out more.
Tags : 
ibm, sap, applications, modernization, application services
    
IBM APAC
Published By: Sage People     Published Date: Dec 04, 2017
With over 2,200 employees in 11 countries worldwide, SolarWinds’ rapid growth has earned it a place in the Forbes list of the top ten fastest growing technology companies. Their mission is to provide software that makes IT professionals’ jobs easier giving them tools to solve IT management problems of all kinds. Great service and real value are at the heart of their approach. SolarWinds puts users first and refuses to inflate the prices of its cutting edge, corporategrade products. These principles have brought them 250,000+ customers worldwide and a continuing path of growth and profit.
Tags : 
business, workforce, adp, payroll, icms, management, sage, service
    
Sage People
Published By: Proofpoint     Published Date: Jun 22, 2017
Human targeted attacks continued to lead the pack in 2016. Attackers’ used automation and personalisation to increase the volume and click-through rates of their campaigns. Taking a page from the B2B e-marketer’s playbook, cyber criminals are adopting marketing best practices and sending their campaigns on Tuesdays and Thursdays when click-through rates are higher. Meanwhile, BEC and credential phishing attacks targeted the human factor directly--no technical exploits needed. Instead, they used social engineering to persuade victims into sending money, sensitive information and account credentials. Timing is everything—attackers know that hitting your employees with a well-crafted email at the just the right time produces the best results. Of course, this varies by region. So if you are responsible for worldwide SecOps, you need visibility into not only attack patterns but also when and which employees tend to click.
Tags : 
security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
    
Proofpoint
Published By: Salesforce     Published Date: Dec 29, 2015
See why Gartner named Salesforce a leader in aPaaS.
Tags : 
salesforce, gartner, enterprise application platform, paas, enterprise applications, data management
    
Salesforce
Published By: Salesforce     Published Date: Jan 14, 2016
See why Gartner named Salesforce a leader in aPaaS.
Tags : 
salesforce, gartner, enterprise application platform, paas, enterprise applications, data management
    
Salesforce
Published By: NetApp     Published Date: Aug 26, 2016
In competitive business environments, speed is a key differentiator. IT organizations worldwide have realized significant value in transitioning from traditional disk to flash-based storage architectures, paving the path to making businesses more responsive and ultimately more competitive. Learn how to transform traditional IT with high-speed data delivery while reducing the costs and risks.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: CA Technologies     Published Date: Mar 21, 2014
This study of 1,300 senior IT decision-makers worldwide proves IT leaders recognize they must change how their organizations work to accelerate time to market, improve software quality, speed application development and meet growing customer demand.
Tags : 
devops, software, it automation, visualization, application, application integration, application performance management, software testing
    
CA Technologies
Published By: Dell PC Lifecycle     Published Date: Mar 13, 2018
Fresenius Medical Care North America is the premier provider of the highest quality healthcare to people with renal and other chronic conditions. In the US, 640,000 people live their lives with end-stage renal disease. Worldwide, more than three million people suffer from chronic kidney failure. Through its industry-leading network of 2,200 dialysis centers in the U.S., outpatient cardiac and vascular labs, and urgent care centers—as well as North America’s largest practice of hospital and post-acute care providers—Fresenius Medical Care North America provides coordinated care for over 180,000 U.S. patients.
Tags : 
    
Dell PC Lifecycle
Published By: Schneider Electric     Published Date: May 31, 2019
Colocation facilities are rapidly designing and building new facilities in order to capitalize on market opportunity. Getting the facility up and running is the first challenge. The second? Recruiting, training, and retaining qualified data center staff. In this webinar, co-hosted by Tony DeSpirito, VP & General Manager Data Center Operations at Schneider Electric, & Brian Gisi, Infrastructure Management & Services Manager at IBM, to access field-tested methods & strategies that can help you: 1. Overcome the worldwide shortage of experienced data center professionals 2. Understand how out-tasking data center operations can benefit you & your clients 3. Identify key characteristics of a strong data center operations partner
Tags : 
data center, business growth, schneider electric
    
Schneider Electric
Published By: Okta     Published Date: Jul 01, 2015
Gartner has named Okta as the only leader in its 2015 Identity & Access Management as a Service (IDaaS) Magic Quadrant. Access your complimentary Gartner report today.
Tags : 
    
Okta
Published By: Okta     Published Date: Aug 24, 2015
Gartner has named Okta as the only leader in its 2015 Identity & Access Management as a Service (IDaaS) Magic Quadrant. Access your complimentary Gartner report today.
Tags : 
    
Okta
Published By: HP     Published Date: Jan 17, 2013
Today, HP is a leader in the industry for support services, for customers worldwide who need to keep their systems running, reduce costs, and avoid issues. Learn how HP can help you deploy, operate, and evolve your data center.
Tags : 
deploy, operate, evolve, data center, it infrastructure, flexibility, it management, data management
    
HP
Published By: MobileIron     Published Date: Feb 05, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : 
mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
    
MobileIron
Published By: MobileIron     Published Date: Aug 04, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : 
mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
    
MobileIron
Published By: MobileIron     Published Date: Aug 02, 2017
Reasonable, common-sense security standards are becoming law in many regions of the world. In Europe, the General Data Protection Regulation (GDPR), enacted in April 2016, will become fully applicable on May 25, 2018. GDPR will bring the European Union (EU) under one comprehensive and harmonised legal system for data protection and privacy. The monetary penalties and reputational damage of noncompliance with GDPR are substantial – the maximum fines are the greater of 20 million euros or 4% of the company’s worldwide revenue.
Tags : 
data security, regulation, legal system, data protection
    
MobileIron
Published By: Dell EMC     Published Date: Nov 02, 2015
Learn about Workload Awareness findings documented in a recent worldwide IDC survey of 683 enterprise IT decision makers.
Tags : 
emc, enterprise, hybrid, cloud, strategy, networking, security, it management
    
Dell EMC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.