mba

Results 1 - 25 of 369Sort Results By: Published Date | Title | Company Name

Is Noise Pollution Making Your Data Less Secure?

Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Security analysts have a tougher job than ever. New vulnerabilities and security attacks used to be a monthly occurrence, but now they make the headlines almost every day. It’s become much more difficult to effectively monitor and protect all the data passing through your systems. Automated attacks from bad bots that mimic human behavior have raised the stakes, allowing criminals to have machines do the work for them. Not only that, these bots leave an overwhelming number of alert bells, false positives, and inherent stress in their wake for security practitioners to sift through. Today, you really need a significant edge when combating automated threats launched from all parts of the world. Where to start? With spending less time investigating all that noise in your logs."
Tags : 
    
F5 Networks Singapore Pte Ltd

Frost & Sullivan What you need to know about migrating to SAP S/4 HANA

Published By: Group M_IBM Q4'19     Published Date: Sep 26, 2019
'Just 50% of organizations embarking on a digital transformation journey report execution of their strategy as very or completely successful. Download the Forrester study to learn what the leaders are doing and get a roadmap to winning at digital transformation.
Tags : 
    
Group M_IBM Q4'19

Transforming Banking with Speed, Scalability and Savings

Published By: IBM APAC     Published Date: Oct 11, 2019
Several countries in the Asian region are experiencing strong growth in their economies, but a large part of the population of many of these countries remains unbanked. In such a scenario, Techcombank, a bank in Vietnam, knew it had to deliver a differentiated banking experience for its prospective customers. The bank had to transform its IT infrastructure and it zeroed in on IBM LinuxONE because of its ability to handle very large and variable workloads, combined with strong security and cost-efficiency. As a result, it was able to handle 4X the transactions during peak season effortlessly along with 44% lower total cost of ownership while also winning new customers. Find out more.
Tags : 
    
IBM APAC

O primeiro Citizens Bank une sistemas, serviços e satisfação do cliente

Published By: TIBCO Software     Published Date: Sep 16, 2019
A transformação digital da maior instituição de serviços financeiros familiar dos Estados Unidos, com uma história que remonta a três gerações. Saiba como o papel dos dados mudou no banco durante uma evolução contínua da experiência do cliente. O First Citizens Bank vem utilizando a tecnologia de integração e análise avançada da TIBCO para oferecer uma experiência de autoatendimento contínuo e consistente ao cliente, com o objetivo de combater fraudes e fornecer serviços financeiros mais precisos e proativos.
Tags : 
    
TIBCO Software

First Citizens Bank une sistemas, servicios y satisfacción del cliente

Published By: TIBCO Software     Published Date: Sep 16, 2019
La transformación digital de la institución de servicios financiera familiar más grande de América, con una historia que data de tres generaciones atrás. Entérese de cómo la función de los datos cambió en el banco durante la evolución de la experiencia del cliente. First Citizens Bank ha estado utilizando la integración y la tecnología analítica avanzada de TIBCO para ofrecer a sus clientes una experiencia de autoservicio consistente y continua, con el propósito de combatir el fraude y brindar servicios financieros más precisos y proactivos.
Tags : 
    
TIBCO Software

The Changing Face of Online Banking and Financial Fraud

Published By: Iovation     Published Date: Aug 02, 2019
Account takeover. Synthetic identities. The security risks that financial services and online merchants face are endless, and the fraud landscape is changing dramatically. You not only need to be aware of how it’s evolving, but how to address these threats, protect your customers and your brand. iovation has analyzed data from our consortium made up of six billion devices seen, 55 million fraud reports, and thousands of fraud analysts to determine the most significant fraud trends and what you can do to combat them.
Tags : 
    
Iovation

Simplifying Data Connectivity in a Data-Driven Enterprise

Published By: Simba by Magnitude     Published Date: Jul 12, 2019
Today’s C-level executives expect data and analytics to provide them with speed and agility to deliver competitive advantage and to disrupt new markets. But, in today’s complex data environment exists a near paradox between these expectations, that companies will be able to rapidly deliver value using data and analytics--and the complexities of the data landscape, making it more difficult to find, govern, connect to and access the data needed to deliver that value. Once thing is clear: if management expectation is to be met, simplifying connectivity is a must.In this white paper, veteran analyst Mike Ferguson, Managing Director of Intelligent Business Strategies explores how simplifying data access –connectivity –aligns expectations with data realities thus decreasing time to value.
Tags : 
    
Simba by Magnitude

Why Connectivity Has Become a Strategic Business Priority: Q&A with Magnitude's Tony Fisher

Published By: Simba by Magnitude     Published Date: Sep 20, 2019
In this Q&Asession, data industry veteran Tony Fisher shares his insights on how –and why –connectivity unleashes an enterprise’s greatest asset -its data.Learn:?What macro trends are driving how companies think about data today??Why has data connectivity shifted from being just a tactical tool to becoming a strategic business priority??Where are businesses falling short in their ability to access and connect to their data?
Tags : 
    
Simba by Magnitude

Optimización de la red mediante virtualización: ¿dónde, cuándo, qué y cómo?

Published By: Cisco     Published Date: Jan 04, 2016
Sin embargo, los costes operativos se dispararon, ya que se necesitó una serie de procesos complejos y laboriosos. Con el tiempo, estos costes se controlaron gracias a una mayor integración de los servidores y la infraestructura de la red, así como a capacidades de software más avanzadas.
Tags : 
cisco, virtualization, sdn, wan, cloud, networking, wireless, data center
    
Cisco

Advanced Malware Protection: A Buyer’s Guide

Published By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: • Advanced analytics • Collective global security threat intelligence • Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) • Continuous analysis and retrospective security
Tags : 
    
Cisco

Data Analytics to Combat the Opioid Epidemic

Published By: SAS     Published Date: Jan 17, 2018
We have conditioned patients not only to expect opioids for pain relief, but to utilize more and more of them, and the addiction is both psychological and physical. To remedy the situation, a lot of policies and practices and behaviors must change around how the health care system approaches pain. But we do not yet have the data and analytics we need to determine what specifically to do at the patient level or the policy level. Download this whitepaper to learn more about the resources available and how we can fix this issue.
Tags : 
    
SAS

Tech WP: Harnessing the Power of Metadata for Security

Published By: Gigamon     Published Date: Oct 19, 2017
Read the Gigamon white paper, Harnessing the Power of Metadata for Security, to see why metadata is the new security super power for enterprises looking to separate signals from noise, reduce time to threat detection, and improve overall security efficacy to combat ever more advanced and persistent cyber attacks. Download now!
Tags : 
    
Gigamon

The Business Value of Dell EMC Flash Storage

Published By: Dell EMC Storage     Published Date: Nov 28, 2018
Technology is quickly moving to the forefront as organizations undertake digital and information technology (IT) transformation projects that enable strategic differentiation in a world where users are leveraging applications and data in new ways. The reality is, most organizations were not born digital but instead have legacy business processes, applications, and infrastructure that require modernization and automation. As a result, businesses must embark on IT transformation to modernize and automate their legacy infrastructure and prime themselves to achieve their digital business goals. IDC interviewed organizations of various sizes to understand the impact of moving significant parts of their storage environments to Dell EMC Flash Storage, powered by Intel® Xeon® processors. Download this report to learn more.
Tags : 
    
Dell EMC Storage

The Business Value of Dell EMC Flash Storage (Infographic)

Published By: Dell EMC Storage     Published Date: Nov 29, 2018
Technology is quickly moving to the forefront as organizations undertake digital and information technology (IT) transformation projects that enable strategic differentiation in a world where users are leveraging applications and data in new ways. The reality is, most organizations were not born digital but instead have legacy business processes, applications, and infrastructure that require modernization and automation. As a result, businesses must embark on IT transformation to modernize and automate their legacy infrastructure and prime themselves to achieve their digital business goals. IDC interviewed organizations of various sizes to understand the impact of moving significant parts of their storage environments to Dell EMC solutions, powered by Intel®. Download this report to learn more.
Tags : 
    
Dell EMC Storage

Optimización del ciclo de vida de los PC

Published By: Dell EMC EMEA     Published Date: Nov 22, 2018
La tecnología del hardware no dura para siempre. Tiene un ciclo de vida, un comienzo y un final medibles con respecto a su productividad y valor. El departamento de TI se encarga de optimizar el ciclo del ciclo de vida de los PC e impulsar al mismo tiempo avances estratégicos para la organización. Sin embargo, lidiar con el coste alto y la complejidad que impone la gestión de los PC deja poco tiempo para la innovación. Ofrecemos opciones de financiación flexibles que ayudan a garantizar que el departamento de TI siempre tenga todo lo que necesita y cuando lo necesita para que los usuarios finales nunca tengan que interrumpir su trabajo por problemas de este tipo. Obtenga más información acerca de las soluciones Dell con tecnología Intel®.
Tags : 
    
Dell EMC EMEA

Ovum White Paper

Published By: Cisco     Published Date: Jun 21, 2016
Businesses must become agile and provide differentiated service as customer demands and expectations change. Moving beyond simple phone transactions, customers are taking matters into their own hands and turning to their peers, the web and social media to find answers. Contact centers play a major role in determining the customer’s perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video.
Tags : 
    
Cisco

Sept conseils pour créer une entreprise imbattable

Published By: CA Technologies     Published Date: Nov 07, 2014
Guide pratique à l’attention des responsables métier et IT sur les actions à entreprendre dès MAINTENANT pour gérer la mobilité future de l’entreprise.
Tags : 
enterprise mobility, delivering a mobile strategy, flexible and secure infrastructures, byod, adopting mobility strategies, mobile computing, mobile data systems, mobile workers
    
CA Technologies

The Business Value of Modernizing Infrastructure with Hyper-Converged Systems

Published By: Dell EMC     Published Date: Feb 07, 2018
Technology is quickly moving to the forefront of business priorities as organizations undertake digital and IT transformation projects that enable strategic differentiation in a world where users leverage applications and data in new ways. Organizations in all industries must better align with changing customer preferences to avoid being disrupted by a new crop of nimble competitors. Technology will increasingly determine how businesses define and distinguish themselves in the market. IDC has noted that most organizations were not born digital but instead have legacy business processes, applications, and infrastructure that require modernization and automation. As a result, businesses must embark on an IT transformation initiative to modernize and automate their legacy infrastructure to prime themselves to achieve their digital business goals and initiatives. Intel Inside®. Powerful Productivity Outside. Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. a
Tags : 
    
Dell EMC

End-To-End Server Security: The IT Leader's Guide

Published By: Dell EMC     Published Date: Feb 07, 2018
This paper is organized into sections describing the importance of IT infrastructure security and presents essential criteria IT leaders should use to identify end-to-end server security. 1. Trust and the Modern IT Infrastructure Why you should be concerned about server security (or the lack thereof). 2. End-to-end Server Security How Dell EMC defines end-to-end server security. In this section, we also provide crucial characteristics business and IT leaders can use to classify prospective server vendors. 3. Key Security Criteria for the Modern IT Infrastructure The security questions every IT leader should ask of their server vendor before embarking on an IT transformation. 4. Conclusion & Additional Resources The objective of this paper is to highlight the Dell EMC comprehensive approach to server security. PowerEdge servers come with security built-in, not bolted-on. Using a Cyber Resilient Architecture, Dell EMC commits to end-to-end server security on all PowerEdge servers.
Tags : 
    
Dell EMC

Modern Infrastructure for Dummies

Published By: Dell EMC     Published Date: May 09, 2018
Modern businesses are increasingly embracing digital transformation — leveraging new technologies to reinvent core processes, business models, product offerings, and the customer experience. As businesses embark on the digital transformation journey, they need to modernize their underlying technology infrastructure to enable a more agile, customerfocused, flexible, and innovative digital workplace to drive greater human and operational efficiencies. Intel Inside®. Powerful Productivity Outside. Intel® Xeon® processor
Tags : 
    
Dell EMC

Case Study: Lodi School Combats Device Explosion and Growing Capacity Demands

Published By: Ruckus Wireless     Published Date: Jan 19, 2016
Lodi USD needed a long-lasting wireless infrastructure with enough headroom to support media-rich apps running on tens of thousands of Chromebooks. This case study explains why the school district turned to Ruckus Wireless.
Tags : 
lodi school, student-to-mobile, students, wlan, wifi, mobile devise, network, wireless
    
Ruckus Wireless

Governments Embracing the Latest Tech Advancements to Better Serve Constituents

Published By: Pega     Published Date: Aug 11, 2016
Citizens rely on government social services programs to help combat poverty, disease, disabilities, and economic and physical hardships. Governments are also tasked with providing healthcare, security, and infrastructure services.
Tags : 
    
Pega

Got Bots? How to Evaluate Solutions for Bot Management & Mitigation

Published By: Akamai Technologies     Published Date: Mar 19, 2019
If you have a website, you most likely have an infestation of bots. While some bots are beneficial, bots can make up a significant portion of your daily website traffic. Malicious bots bombard websites with direct and specific attack goals, such as stealing customer information, scraping content, and even initiating DDoS attacks. Our latest eBook explores the differences between good bots and bad bots, and explains the best way to manage harmful bots.
Tags : 
    
Akamai Technologies

Vision: A Key Solution for Your Clients' Wellness Needs

Published By: VSP     Published Date: Sep 08, 2017
Research shows that wellness plans are extremely important to your clients. Employers have very solid reasons for embarking on a wellness program, including increased productivity and lower health costs for their employees. They are struggling to achieve their goals, however. Many employers aren’t sure how to begin a program; even the most advanced employers in terms of wellness are seeking ways to improve their wellness activities
Tags : 
    
VSP

Time to dictate your future

Published By: Nuance EMEA     Published Date: Jun 04, 2019
New market entrants are shifting the way the financial sector operates, new business models are changing customer expectations, and ever-changing client demographics are forcing businesses to adapt the way they work. As we move into a decade of artificial intelligence (AI) and digital innovation, huge opportunities are opening up for the financial sector to combat these changes. But with this comes new challenges, and exponential increases in available information must be accompanied by smart tools and processes to make sense of it, ensure regulatory compliance, and add real value to clients. To find out more, download this ebook!
Tags : 
    
Nuance EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.