business behavior

Results 26 - 50 of 101Sort Results By: Published Date | Title | Company Name

Privileged Access Management: A Roadmap to Calculating Total Cost of Ownership

Published By: CA Technologies     Published Date: Jun 01, 2018
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies

How Adaptive Signage Boosts Store Performance?

Published By: Intel     Published Date: Sep 14, 2018
Today’s tech savvy consumers are continually driving organizations to deliver a modernized shopping experience. To achieve this, retailers are pushing the edge on developing non-traditional ways in delivering sales messages. One of the best ways to engage shoppers with an in-store digital presence is through modern adaptive signages. Modern signages enable two-way interaction between customers and businesses, tapping onto cutting-edge technologies such as sensors and analytics to respond to customer behavior—helping retailers customize content on the fly. Find out how Giada Technology leveraged on Intel® processors to power up their cloud terminals to pre-process signage, sensor, and mobile data to efficiently exchange information with the cloud. Retailers are better positioned to present contextual promotions to the shoppers, delivering benefits of lesser wait-time and increased customer satisfaction.
Tags : 
    
Intel

Whitepaper: Your users have left the perimeter. Are you ready?  

Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Not long ago, even the most astute executives couldn’t fully anticipate how quickly emerging technologies would transform their business operations — and even their business models. Laptops, smartphones, and other mobile devices; high-bandwidth wireless networks; and cloud-based computing services have proven to be among the most impactful of these advances, collectively untethering workers from office environments and fundamentally altering work behaviors. employees today work anytime, anywhere while accessing applications and data that reside on company servers and in the cloud. Cisco Umbrella can help your business overcome these problems, download this whitepaper today to find out more.
Tags : 
    
Cisco Umbrella EMEA

Social, Mobile Research Results Reveal How to Boost Customer Satisfaction, Drive Revenue

Published By: Salesforce.com     Published Date: Oct 28, 2013
The ability to deliver exceptional customer experiences is proving to be a business differentiator – in fact, organizations that have a more mature customer experience strategy report between 10-20% greater impact on revenue generation outcomes than less mature businesses. This white paper reveals how your organization can better respond to changing consumer behaviors, needs, and expectations regarding customer experience and touch points.
Tags : 
custom service, contact center, supporting technology, customer service trends, best practices, customer relationship management, customer satisfaction, customer service, business technology
    
Salesforce.com

Beyond Web Analytics

Published By: Dell Software     Published Date: Oct 03, 2013
Download Beyond Web Analytics: Understanding the why behind the what of online customer behavior and see how Foglight User Experience Management can help your business better understand your customers’ online behavior and increase customer conversions.
Tags : 
web analytics, foglight, dell, user experience management, customer behavior tracking, customers, best practices, increase customer conversion, knowledge management, data management, business technology
    
Dell Software

Performance-Driven Project Management with PLM Analytics

Published By: Dassault Systèmes     Published Date: Jul 21, 2017
Project management relies primarily on past performance to predict future results, however many companies still lack forward-looking capabilities to predict project outcomes and ensure success. Enhancing project management with PLM analytics offers the opportunity to switch from task-based activities to performance-driven ones to improve success rates. Use PLM Analytics to: • Gain actionable insight and valuable intelligence • Dramatically boost business value and improve project management performance • Reduce error-prone behavior like manual data collection • Leverage big-data capabilities and project intelligence Learn how to extend the value of your PLM investment and improve business performance for your company.
Tags : 
product solutions, lifecycle management, tech products, data management tools, pdm, plm, process automation, product development speed, manufactures
    
Dassault Systèmes

Accidental or Malicious? Five Pillars of Insider Threat Risk Mitigation

Published By: Forcepoint     Published Date: Apr 20, 2016
Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness — “seeing” the extent of your user behavior — starts with five pillars and ends with unquestioned success.
Tags : 
risk, security, security programme, security, security application, anti spam, anti spyware, anti virus, application security, identity management, internet security, intrusion detection, intrusion prevention, security management, security policies
    
Forcepoint

The Rising Value of APIs

Published By: MuleSoft     Published Date: Jan 25, 2016
Data is one of the most valuable business assets. Companies are using data to provide more personalized, tailored experiences to their customers, analyzing customer and operational behavior to make better decisions, and providing web and mobile apps to their customers, employees, and partners. As the keys to that data, APIs are poised to become valuable business assets in and of themselves. In this whitepaper, we'll learn how APIs are currently transforming the enterprise, and how they will become even more integral to how we do business in the future.
Tags : 
data management, business practices, data center. data application, enterprise applications, api management, application integration, application performance management, best practices, business activity monitoring, business intelligence, business management, content integration, content management system
    
MuleSoft

SmartPaper: The next wave of business intelligence for the data-driven enterprise

Published By: IBM     Published Date: Nov 03, 2017
Massive shifts within the digital business landscape are sparking immense opportunities and reshaping every sector. In some cases, complete upheaval is happening at lightning-fast speed. In other instances, digital undercurrents are stirring beneath the surface as organizations scramble to monetize vast volumes and variety of data in an effort to sharpen their competitive edge and not be blindsided by unforeseen events that completely upend existing business models. While long-standing industry leadership might be no match for the next cool app, agility, speed and the ability to harness more data than was ever imagined is fueling powerful possibilities for reinvention among companies of every size. Data is following rapidly from mobile devices and social networks, as well as from every connected product, machine and infrastructure. This data holds the potential for deep insights that can replace guesswork and approximations as to locations, behaviors, patterns and preferences. As the w
Tags : 
digital business, data, data-driven enterprise, innovation, ibm
    
IBM

Uncovering Hidden Personalization Opportunities in Retail

Published By: Oracle OMC     Published Date: Nov 30, 2017
The headwinds facing traditional and online retailers in 2017 are numerous and well documented. Chief among the challenges: a sustained assault on established business models driven by changing consumer behavior and the competitive might of e-commerce giant Amazon. Large big-box players, such as Walmart and Target, are responding to the threat - and embracing the opportunity of e-commerce - by boosting online spending by hundreds of millions or even billions of dollars annually. Yet even the largest and most well-resourced players can’t simply spend their way to success. Competing with Amazon and adjusting to the changing demands of consumers means taking a hard look at the engines driving e-commerce and digital marketing operations, scouring for missed opportunities, and investing in the technologies that will fuel the innovations of tomorrow.
Tags : 
    
Oracle OMC

Uncovering Hidden Personalization Opportunities in Retail

Published By: Oracle OMC     Published Date: Nov 30, 2017
The headwinds facing traditional and online retailers in 2017 are numerous and well documented. Chief among the challenges: a sustained assault on established business models driven by changing consumer behavior and the competitive might of e-commerce giant Amazon. Large big-box players, such as Walmart and Target, are responding to the threat - and embracing the opportunity of e-commerce - by boosting online spending by hundreds of millions or even billions of dollars annually. Yet even the largest and most well-resourced players can’t simply spend their way to success. Competing with Amazon and adjusting to the changing demands of consumers means taking a hard look at the engines driving e-commerce and digital marketing operations, scouring for missed opportunities, and investing in the technologies that will fuel the innovations of tomorrow.
Tags : 
    
Oracle OMC

Preparing Your Business Services for the Future

Published By: BMC ESM     Published Date: Aug 19, 2009
Would you trust your network monitoring tools enough to know when something is truly halting a business service? While Mary Nugent won’t use this podcast to attempt to tell you technical details on the correct alarming thresholds, she will share some excellent stories about predicting a system’s behavior. Run Time: 11:30.
Tags : 
network, networking, monitoring, podcast, bmc, monitor, business service, business behavior, network, management, performance, network management, network performance, network performance management
    
BMC ESM

Higher Education and Income Do Not Guarantee a Resilient Employee

Published By: MeQuilibrium     Published Date: Jul 25, 2018
Change is inevitable. Any successful business manager knows their organization must continually evolve to stay relevant and competitive. Whether it’s the packaged goods company that has reached the limits of its market, or the financial giant integrating a new software platform, or the global corporation building teams, adaptability is imperative. Having resilient employees that are open to change and better equipped to cope with stress is key. But it may surprise you to learn who among your employees will weather the storm and who won’t. The Chief Technology Officer? Or the lead on the innovation project? Your top analyst? While some managers understandably assume that their highest earning, most highly educated employees are all highly resilient, they may need to think again. A study from meQuilibrium, the only clinically validated resilience building program on the market today, conducted by behavioral scientist Wendy Lynch, Ph.D., and psychologist Andrew Shatté, Ph.D., shows that a
Tags : 
    
MeQuilibrium

How Performance Management Maturity Drives Business Agility and Innovation

Published By: Riverbed     Published Date: Feb 15, 2018
Applications underpin today’s cloud and digital transformation initiatives. As a result, it’s imperative for modern IT organizations to implement a holistic, expert approach to managing applications for maximum performance and optimal business execution. Read this insights paper from ESG and Riverbed to discover: How performance management expertise drives critical business outcomes. Why mature organizations are better equipped to embrace DevOps and other modern IT practices. What tools, factors, and behaviors correlate to expert performance management practices.
Tags : 
    
Riverbed

7 Use Cases of Service Virtualization

Published By: CA Technologies     Published Date: Jun 03, 2015
"Are dev and test constraints holding back your digital transformation? Today, just about all businesses are scrambling to add digital components to their products and services with the hopes of capturing—and maintaining—the interest of an increasingly demanding customer base. As you undergo this digital transformation, your IT teams face tremendous pressure to not only develop innovative new experiences, but do so at an accelerated rate—lest competitors beat you to market with the next big thing. Take a new approach to solving the familiar challenge of doing more with less—and doing it faster than ever before -- remove the constraints holding you back. At its core, Service Virtualization is all about removing constraints within the SDLC by simulating dependent systems, services and behaviors. In order to understand the true depth and breadth of this concept, however, it helps to see how Service Virtualization can be utilized in different development scenarios.
Tags : 
    
CA Technologies

Marketing Beyond the Sales Funnel

Published By: GrowthIntel     Published Date: Feb 16, 2016
There are potentially tens of thousands of buyers who don’t know that they need your products or services. They are your passive, silent audience. And, if you want to grow quickly, that audience is absolutely vital. You can’t reach them using personas, content marketing, or retargeting – so how do you find buyers who’ve never even heard of you? This ebook explains how to reverse-engineer their digital footprints and follow the trail back to the owner.
Tags : 
advertising, medicine, clinical management, b2b, sales, business behavior, contact management, information management, productivity, project management, service management
    
GrowthIntel

Altocloud White Paper: Analyzing and Shaping Customer Journeys

Published By: Genesys     Published Date: Jun 11, 2018
When you can anticipate customer needs, you can provide a customer experience that reduces frustration, increases satisfaction and creates better business results. Genesys Altocloud uses live analytics, powered by machine learning, to give you real-time insight into the customer experience. You can anticipate customer behavior, personalize journeys and use feedback to continuously tune your analytics to achieve desired business outcomes. Download the white paper and learn how to make better use of your analytics: • Automate responses that optimize the journey • identify and engage with customers before they contact you • Use predictive analytics and machine learning to drive outcomes
Tags : 
customer needs, customer experience, customer behavior, customer journey
    
Genesys

Boost Agility with Hybrid Cloud and Containers eBook

Published By: Red Hat     Published Date: Jun 19, 2019
IT and business are changing rapidly. Growth opportunities in new markets, evolving customer behaviors and preferences, increased competitive pressure, and new standards in regulatory compliance are causing organizations to adapt their operations and processes.1 Even so, rigid legacy IT infrastructure can keep you from adjusting to change and reduce the business value of IT. These complex environments often limit flexibility, speed, and scalability, resulting in slow application and service delivery. As a result, your organization can experience broad effects, especially within your IT operations and development teams. Developers need resources to be provisioned and scaled quickly so they can begin work immediately when an idea strikes. They also want more control over those resources while they are in use. However, with complex, hard-to-manage environments and manual processes, IT operations teams often struggle to provide resources and services at the speed that developers demand. Th
Tags : 
    
Red Hat

IDC Infobrief: 5 Lessons Learned from Transitioning to the Cloud

Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint

IDC Infobrief: 5 Lessons Learned from Transitioning to the Cloud

Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint

IDC Infobrief: 5 Lessons Learned from Transitioning to the Cloud

Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint

Top 5 Ways Fleet Safety Technology Protects Your Drivers, Vehicles and Bottom Line

Published By: Vehicle Tracking Solutions     Published Date: May 31, 2018
Safety is a top priority for companies with a fleet of drivers and vehicles. It starts with hiring and screening new employees with safe driving records and qualifications. You may even have written safety policies. However, having visibility into your driver’s whereabouts and their behaviors behind the wheel is key in identifying and preventing risks before it costs your business. Do you wish that you could sit in the passenger seat of every vehicle in your fleet to watch driver behavior? With data-driven fleet safety management software from Silent Passenger you can. According to NHTSA, the cause of 94% of collisions is driver error. By monitoring unsafe driver behaviors such as speeding, hard braking, and fast acceleration is key to preserving fleet safety. A reliable fleet safety management software delivers key business intelligence that helps maintain fleet efficiency and productivity on the road. Improve Safety and Reduce Operational Costs Running a safer fleet can have a signif
Tags : 
    
Vehicle Tracking Solutions

Decision Optimization

Published By: FICO     Published Date: Nov 10, 2015
"ACG Michigan, a large auto insurance underwriter in the US state of Michigan, needed a user-friendly system that would enable its agents (internal and independent) to churn out precise and consistent policy quotes and underwriting decisions. They turned to FICO Blaze Advisor decision rules management system to create an enterprise decision management framework to execute decisions. Learn more on how FICO Blaze Advisor helped ACG Michigan automate its underwriting About FICO FICO (NYSE: FICO), formerly known as Fair Isaac, is a leading analytics software company, helping businesses in 90+ countries make better decisions that drive higher levels of growth, profitability and customer satisfaction. The company's groundbreaking use of Big Data and mathematical algorithms to predict consumer behavior has transformed entire industries. FICO provides analytics software and tools used across multiple industries to manage risk, fight fraud, build more profitable customer relationships, optimiz
Tags : 
decision analytics, optimization, profitability
    
FICO

Unlocking Business Success: The Five Pillars of User Risk Mitigation

Published By: Forcepoint     Published Date: Apr 19, 2016
Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness — “seeing” the extent of your user behavior — starts with five pillars and ends with unquestioned success.
Tags : 
    
Forcepoint

The International Language of Business

Published By: Citrix Online HiDef     Published Date: Aug 01, 2011
This Forrester infographic illustrates intriguing meeting and business communication behaviors around the globe.
Tags : 
hidef, citrix, meetings, online meetings, collaboration, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery, remote access, disaster recovery
    
Citrix Online HiDef
Start   Previous    1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.