metric

Results 1 - 25 of 722Sort Results By: Published Date | Title | Company Name

Are Bots Killing Your Business Intelligence?

Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Every kind of online interaction—website visits, API calls to mobile apps, and others—is being attacked by bots. Whether it's fraud, scraping, spam, DDoS, espionage, shilling, or simply altering your SEO ranking, bots are wreaking havoc on websites as well as mobile and business applications. But that’s not all: they’re also messing with your business intelligence (BI). They can skew audience metrics, customer journeys and even ad buys, making business decisions questionable and costly. According to Forrester, ad fraud alone was set to exceed $3.3 billion in 2018. Not all bots are bad. In fact, your business depends on them. Search engine bots, for example, give your web presence visibility and authority online. Other good bots help you deliver better customer experiences—perhaps a chatbot provides instant customer assistance on your site. What’s important is enabling the good bots and blocking the bad ones."
Tags : 
    
F5 Networks Singapore Pte Ltd

Protect Users Without Frustrating Them Using AI-driven Behavioral Biometrics

Published By: BehavioSec     Published Date: Oct 04, 2019
Authentication is evolving from static one-time user action, to transparent and continuous ways of validating digital identities without imposing frustration on end users. Behavioral biometrics technologies invisibly and unobtrusively authenticate users by validating the manner in which they physically interact online. Behavioral biometrics technologies learn how individual users hold mobile devices in their hands and press their fingers on the touchscreen. On computers, the system learns how users type on keyboards and move their mouse and cursor. The BehavioSec solution gathers this behavioral data and analyzes it using advanced techniques, to ensure that the user is who you expect them to be.
Tags : 
    
BehavioSec

Verifying Digital Identities Beyond One Time Passwords

Published By: BehavioSec     Published Date: Oct 04, 2019
A Global 2000 bank was evaluating new methods of authentication for their digital clients to protect accounts under constant attack by malware and fraudsters. In evaluating behavior biometric vendors, they selected BehavioSec, for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec

Remote Access Authentication Using Behavioral Biometrics

Published By: BehavioSec     Published Date: Oct 04, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec

Protecting High Net Worth Individuals Without Adding Friction

Published By: BehavioSec     Published Date: Oct 04, 2019
A well-known global bank was evaluating new ways of strengthening authentication for their High-Net-Worth Individuals (HNWI) to protect their high value accounts. These accounts are under constant attack by sophisticated, targeted fraud attempts. In evaluating behavioral biometric vendors, the bank selected BehavioSec, because of its accuracy and enterprise grade capabilities, to be deployed on-premise and to integrate with its existing security and risk management systems.
Tags : 
    
BehavioSec

eBook: Recruiting Metrics

Published By: Workable     Published Date: Oct 09, 2019
In every organization, the recruiting process generates data: how long it took to fill one role, how many candidates progressed to the final hiring stage or how many comments hiring teams exchanged until they made a hire. Through tracking metrics, you can get tangible evidence of how successful your recruiting process is, rather than relying on intuition. In this guide, we put together everything you need to know to start making the most out of your recruiting data. You’ll find: A list of common recruiting metrics to track. A detailed look into five of the most important KPIs. How to collect data and track metrics consistently over time.
Tags : 
    
Workable

Forrester Research on DevOps Quality Metrics that Matter

Published By: Tricentis     Published Date: Aug 19, 2019
The way that we develop and deliver software has changed dramatically in the past 5 years—but the metrics we use to measure quality remain largely the same. Despite seismic shifts in business expectations, development methodologies, system architectures, and team structures, most organizations still rely on quality metrics that were designed for a much different era. Every other aspect of application delivery has been scrutinized and optimized as we transform our processes for DevOps. Why not put quality metrics under the microscope as well? Are metrics like number of automated tests, test case coverage, and pass/fail rate important in the context of DevOps, where the goal is immediate insight into whether a given release candidate has an acceptable level of risk? What other metrics can help us ensure that the steady stream of updates don’t undermine the very user experience that we’re working so hard to enhance? To provide the DevOps community an objective perspective on what quality
Tags : 
    
Tricentis

Achieving Transformational Growth with Profit-Driven Marketing

Published By: Wpromote     Published Date: Sep 10, 2019
While profit-driven marketing isn’t new, many brands still focus on metrics that distract from the true goal: profit. The shift to profit-driven marketing begins with reevaluating traditional KPIs. Certain metrics have become so ingrained in marketing plans that there’s no consideration about whether they are still relevant. Ready to start prioritizing profit? Learn more about how Wpromote can help.
Tags : 
    
Wpromote

How to prepare for your cloud migration

Published By: Apptio     Published Date: Oct 09, 2019
Cloud migration is consistently one of the top priorities of technology leaders across the world today, but many are overwhelmed by trying to plan their cloud migration, struggling to prioritize workloads and unsure of the cost implications. Download this white paper to discover the 5 key steps for cloud migration based on the best practices of today’s most successful IT leaders: - Baseline TCO resources (cloud, on-premises, hybrid) - Map current on-premises resources to cloud offerings - Evaluate and prioritize migration strategy - Calculate migration costs - Define success metrics
Tags : 
    
Apptio

Apptio TBM Unified Model (ATUM): The standard cost model for IT

Published By: Apptio     Published Date: Oct 09, 2019
"Ready to communicate IT cost and value in terms your business unit partners understand? The Apptio TBM Unified Model® (ATUM®) standardizes the financial information necessary for IT leaders to manage their technology business. Use this poster as a resource to: • Establish better alignment between IT, Finance, and other business units by using common language around IT costs • Confidently manage the business of IT with the backing of peer-derived best practices • Understand 10 essential metrics you should track to communicate the business value of IT "
Tags : 
    
Apptio

Key Metrics to Evaluate Outside Counsel Performance

Published By: Quovant     Published Date: Oct 01, 2019
Even with the greatest level of talent on your in-house legal team, you will at some point, need the services of external counsel. When an organization rates its outside law firms, selecting just the right data might be a challenge. Business leaders may not be lawyers, so it may be necessary to rely on the self-assessment of firms to determine the “health” of their programs. But does it need to be that subjective? Hard data is an essential tool when it comes to performance evaluation. There are specific metrics organizations can use to evaluate law firm performance. While it may not be “all about the money,” these key metrics can provide insight into how your panel handles its work and the value of the results you receive.
Tags : 
    
Quovant

Business Analytics at your Fingertips

Published By: SAP     Published Date: Feb 05, 2011
Learn how best-in-class companies access information faster to improve key business performance metrics.
Tags : 
business performance, sap, real time analytics, business intelligence, analytics, business analytics, business process management, analytical applications
    
SAP

Real-time Business: Playing to win in the new global marketplace

Published By: SAP     Published Date: Jun 18, 2011
To stay ahead of the competition in a global marketplace, firms are increasingly speeding up operations, in many cases adopting real-time systems and tools to allow for instant decision-making and faster business cycles. Download here to learn how.
Tags : 
real-time business analytics, faster decision making, business automation, business metrics, analytical data, sap, best practices, business activity monitoring
    
SAP

The Evolution of IT Operations

Published By: ASG Software Solutions     Published Date: Jun 08, 2008
As organizations have improved service delivery, they have also turned their focus to presenting business value more positively. These organizations are beginning to develop true BSM systems in two ways: by understanding the metrics that successful businesses employ to determine the value of IT, and by linking these metrics and associated business services to IT infrastructure components.
Tags : 
asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm
    
ASG Software Solutions

The Definitive Guide to Marketing Metrics & Analytics

Published By: Marketo     Published Date: Sep 03, 2019
How much additional profit will a 10% increase in your marketing budget generate? 44% of qualified marketers have NO idea. If you fit into the 44% above, justifying your budget will be a serious challenge, as will asking for an increase. In fact, you'll likely find yourself asking the question the other way around: What will happen if my marketing budget gets cut by 10%? You can't expect your organization to place value on something you're unable to quantify. Our Definitive Guide to Marketing Metrics will help you do just that. You'll learn about: How Measurement Builds Respect and Accountability Planning for Marketing ROI A Framework for Measurement Revenue Analytics Marketing Performance Measurement The Art of Forecasting Dashboards Implementation: Team, Tactics, Technology Download the comprehensive 88-page guide and start taking your marketing to the next level.
Tags : 
    
Marketo

Cooling Capacity Factor (CCF) Reveals Stranded Capacity and Data Center Cost Savings

Published By: Upsite Technologies     Published Date: Sep 18, 2013
The average computer room today has cooling capacity that is nearly four times the IT heat load. Using data from 45 sites reviewed by Upsite Technologies, this white paper will show how you can calculate, benchmark, interpret, and benefit from a simple and practical metric called the Cooling Capacity Factor (CCF). Calculating the CCF is the quickest and easiest way to determine cooling infrastructure utilization and potential gains to be realized by AFM improvements.
Tags : 
ccf, upsite technologies, cooling capacity factor, energy costs, cooling, metrics, practical, benchmark
    
Upsite Technologies

How To Deliver Proactive Cybersecurity Remediation

Published By: Gigaom     Published Date: Oct 17, 2019
This free 1-hour webinar from GigaOm Research brings together experts in cybersecurity and automated remediation, featuring GigaOm analyst Jon Collins and a special guest from Puppet, Jonathan Stewart. The discussion will focus on how enterprise security and operations teams can significantly enhance their response to security threats via a collaborative, automated approach to resolution. Cybersecurity often feels like an asymmetric battle — while on one side, cybercriminals appear to manage their efforts efficiently on the dark web, enterprises often deal with the consequences individually, reliant on manual processes and tools. So, what can we learn from the perpetrators about how to coordinate a response to security threats when, or before, they happen? In this 1-hour webinar, you will learn: How cybercriminals and hackers work together to create and disseminate security threats What current challenges are faced by enterprises as they look to respond What options exist to deal wi
Tags : 
    
Gigaom

Increase application security and availability with Imperva

Published By: AWS     Published Date: Oct 07, 2019
Imperva, an APN Security Competency Partner, can help protect your application workloads on AWS with the Imperva SaaS Web Application Security platform. The Imperva high-capacity network of globally distributed security services protects websites against all types of DDoS threats, including networklevel Layer 3 and Layer 4 volumetric attacks—such as synchronized (SYN) floods and User Datagram Protocol (UDP) floods—and Layer 7 application-level attacks (including the OWASP Top 10 threats) that attempt to compromise application resources. Harnessing real data about current threats from a global customer base, both the Web Application Firewall (WAF) and DDoS protection, incorporate an advanced client classification system that blocks malicious traffic without interfering with legitimate users. Enterprises can easily create custom security rules in the GUI to enforce their specific security policy. In addition, this versatile solution supports hybrid environments, allowing you to manage th
Tags : 
    
AWS

eCommerce Email Metrics: Ways to Slice and Dice Your Email List and Measurement

Published By: Ability Commerce     Published Date: May 18, 2009
As direct marketers, you know "the devil is in the details." Being able to drill-down on results is important to determine future strategies. It takes discipline and the application of direct marketing tenets. But you can fine-tune your results, target better and reap the rewards.
Tags : 
ability commerce, seo, email frequency, metrics, roi, pci, ecommerce, e-commerce
    
Ability Commerce

Accelerating Business Transaction with Effortless Authentication

Published By: Entrust Datacard     Published Date: Mar 20, 2017
As digital business evolves, however, we’re finding that the best form of security and enablement will likely remove any real responsibility from users. They will not be required to carry tokens, recall passwords or execute on any security routines. Leveraging machine learning, artificial intelligence, device identity and other technologies will make security stronger, yet far more transparent. From a security standpoint, this will lead to better outcomes for enterprises in terms of breach prevention and data protection. Just as important, however, it will enable authorized users in new ways. They will be able to access the networks, data and collaboration tools they need without friction, saving time and frustration. More time drives increased employee productivity and frictionless access to critical data leads to business agility. Leveraging cloud, mobile and Internet of Things (IoT) infrastructures, enterprises will be able to transform key metrics such as productivity, profitabilit
Tags : 
    
Entrust Datacard

Data Protection: Downtime is Money

Published By: Hitachi Vantara     Published Date: Mar 08, 2019
Finding the right data protection and recovery solution for complex enterprise infrastructures is a formidable challenge. Traditional backup and recovery solutions cannot keep up with or meet today’s business-critical requirements. Read this white paper to learn smarter approaches to data protection and recovery. See how to radically improve key performance metrics – including business continuity – as well as backup windows, operational recovery and disaster recovery.
Tags : 
    
Hitachi Vantara

Take a Smarter Approach to Data Protection and Recovery

Published By: Hitachi Vantara     Published Date: Mar 08, 2019
Now is the time to take a smarter approach to data protection an recovery. Finding the right data protection and recovery solution for complex enterprise infrastructures is a formidable challenge. Traditional backup and recovery solutions cannot keep up with or meet today’s business-critical requirements. Read this white paper to learn how to radically improve key performance metrics – including business continuity – as well as backup windows, operational recovery and disaster recovery.
Tags : 
    
Hitachi Vantara

10 Top Things to Look For in a Cloud Security Solution Provider

Published By: Akamai Technologies     Published Date: May 05, 2017
Searching for a Cloud Security Provider can be confusing. Many providers appear the same at first glance: similar metrics, similar promises. The fact is, the information you need to make a real comparison requires asking questions and probing for details that cloud services vendors don’t always volunteer. Use this list to be sure you’ve covered the essential elements for choosing the right cloud security provider to protect your organization from malicious cyberattacks.
Tags : 
cloud security, cyberattacks, cloud service, security
    
Akamai Technologies

How Do You Measure Protection In The Cloud?

Published By: Akamai Technologies     Published Date: May 05, 2017
Every cloud security vendor will give you impressive-sounding metrics for cloud security. But what do they really mean? Our infographic explains which metrics really matter, and what questions you need to ask to get them.
Tags : 
cloud security, cloud, security, cloud protection
    
Akamai Technologies

Why Cloud: The Buyer's Guide to Cloud Security

Published By: Akamai Technologies     Published Date: May 05, 2017
To keep your organization and your data safe, it is crucial to consider forward-thinking approaches to cybersecurity. In this e-book, we discuss how you can augment your existing website infrastructure or within a data center with security measures in the cloud for a more robust security posture. We share Akamai’s approach to cloud security as well as those of other vendors. We then take a closer look at some commonly used, but sometimes misleading, metrics — so you can make more educated decisions about the best solutions for your needs.
Tags : 
cloud security, data, akamai
    
Akamai Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.