text

Results 176 - 200 of 713Sort Results By: Published Date | Title | Company Name

IBM Storwize V5000 – Ease of Use for All Environments

Published By: IBM APAC     Published Date: Jul 19, 2019
Today’s IT organisations want simple, flexible storage infrastructures. IBM’s Storwize V5000 family of solutions are a fast, highly flexible, easy-to-use virtualised storage system that helps businesses to meet the challenges of rapid data growth in the context of limited IT budgets. This ESG report looks at the role the IBM Storwize V5000 family can have on addressing the storage needs of companies today.
Tags : 
    
IBM APAC

Threat Hunting for Dummies

Published By: Carbon Black     Published Date: Apr 11, 2018
Adversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to “go on the hunt.” Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able t
Tags : 
    
Carbon Black

Threat Hunting For Dummies: Carbon Black Special Edition

Published By: Carbon Black     Published Date: Aug 14, 2018
Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able to carry out their attack objectives.
Tags : 
    
Carbon Black

Mit Chat zum Erfolg

Published By: Zendesk GmbH     Published Date: Apr 20, 2018
Überzeugte Kunden geben mehr aus Kunden geben mehr Geld aus, nachdem sie mit Ihnen gechattet haben – und 83 % aller Online-Käufer brauchen Hilfe, um einen Kauf zu tätigen. Lassen Sie Ihre Kunden nicht im Regen stehen, sondern greifen Sie ihnen unter die Arme, damit sie den Kauf abschließen. Warenkorbabbruch reduzieren Die Wahrscheinlichkeit, dass ein Kunde einen Kauf tätigt, ist dreimal höher, wenn Sie ihn mit proaktivem Chat ansprechen. Senden Sie zielgerichtete Nachrichten, um Kunden im Kontext zu helfen. Höherer Web-Umsatz Nachdem Spartan Race Live-Chat zu seinem Online-Store hinzugefügt hatte, ließ sich ein Anstieg des Retail-Umsatzes um 27 % und ein Kundenzufriedenheitswert für Live-Chat von 97 % verzeichnen. Mehr Markentreue Genau wie bei Interaktionen in einem normalen Geschäft können Live-ChatAgenten eine persönliche Beziehung zu Kunden knüpfen und die OnlineMarkentreue erhöhen.
Tags : 
    
Zendesk GmbH

Crowdtesting 101 Rethinking Your Qa Lab

Published By: Applause Israel     Published Date: Jun 19, 2018
APPLAUSE CASE STUDY ACCELLION THE INCREASING IMPORTANCE AND COMPLEXITY OF DIGITAL EXPERIENCES Maintaining a strong digital presence is critical as digital experiences are now the front door for your brand. Websites, mobile apps, and connected devices are all different ways for you to connect with your customers on a deeper level, and foster a stronger relationship of trust and loyalty. While you now have a wide-open avenue to reach customers more effectively, you also need to account for a whole new level of complexity, especially in the mobile space. Millions of people can download the same mobile app and have entirely unique experiences. This is a result of how fragmented the digital world has become. ScientiaMobile counted 45,000 different device profiles on the market today, and estimates that this rate of fragmentation will only increase heading into the future. On top of this variability is the wide range on contexts in which your customers can be relying on your mobile app to wo
Tags : 
    
Applause Israel

Miercom: Cisco Advanced Malware Protection for Endpoints Security Testing

Published By: Cisco DWA Security     Published Date: Sep 14, 2018
Cisco Advanced Malware Protection (AMP) offers an integrated, comprehensive approach to endpoint security. Continuous analysis and telemetry features keep its finger on the pulse of network anomalies, and all suspicious activity is investigated. Contextual reporting highlights trends for administers, helping them reassess network architecture to close vulnerable points of entry. Also important is its flexible deployment, which makes it simple for any organization to tailor its endpoint security.
Tags : 
    
Cisco DWA Security

To PostgreSQL & Beyond: The Definitive Guide to Deploying PostgreSQL in Various Environments

Published By: Stratoscale     Published Date: Feb 01, 2019
This eBook offers a practical hands-on guide to deploying, managing and scaling PostgreSQL in various environments, in the public cloud and on-premises. With the ongoing shift towards open-source database solutions, it’s no surprise that PostgreSQL is the fastest growing database. While it’s tempting to simply compare the licensing costs of proprietary systems against that of open source, it is both a misleading and incorrect approach when evaluating the potential for return on investment of a database technology migration. The eBook provides a detailed analysis of planning, day-one, and day-two challenges of PostgreSQL deployments, in the context of potential operating environments: ? Public cloud ? Private cloud ? Private DC (bare metal / VM)
Tags : 
    
Stratoscale

The New Face of the Modern Workplace

Published By: Cisco     Published Date: Sep 27, 2018
The pace of innovation for collaboration and unified communications (UC) technologies has been nothing short of incredible during the past few years. IT teams are now able to deliver consistent, simple and high- quality experiences with voice, video, messaging and chat from any smartphone, tablet, laptop or conference room system. Users can move seamlessly and securely from one device to the next, escalate from one communication mode to another and share content—all while retaining the context of the meeting or discussion.
Tags : 
    
Cisco

2017 EMEA & APAC Whistleblower Hotline Benchmark Report

Published By: NAVEX Global     Published Date: Jul 17, 2017
The 2017 EMEA & APAC Whistleblower Hotline Benchmark report was produced with data from companies of all sizes and industries across the region. Use the findings to put your company’s whistleblowing report data in context or gain organisational alignment to start your whistleblower programme. Use this report to answer questions like: • Am I getting too few or too many reports compared to like-sized companies? • Is my organisation following up on cases in an appropriate timeframe? • How can I more effectively follow-up on anonymous reports?
Tags : 
emea, apac, ethics, whistleblowing, incident management, reporting data, case closure, reporting systems, anti-retaliation
    
NAVEX Global

The Incredible Journey The Transformative Power Of A Holistic Customer Journey Strategy

Published By: IBM Marketing Cloud     Published Date: Sep 26, 2016
Download this commissioned study by Forrester Consulting on behalf of IBM, and learn how you can understand what your customers want and need, and serve them best in that context.
Tags : 
customer experience, customer, customer engagement, customer relationship, customer service, customer interaction service, customer relationship management, customer satisfaction
    
IBM Marketing Cloud

Ventajas y desventajas de modificar su solución ERP

Published By: Infor     Published Date: Jun 13, 2017
Las modificaciones suelen crear polémica entre muchos profesionales del sector informático de la fabricación. El término "estándar" también tiene connotaciones muy diversas, ya que se suele asociar con las antiguas soluciones genéricas para empresas que ofrecían funcionalidades rudimentarias con el pretexto de que su aplicación era muy simple.
Tags : 
    
Infor

Control The Flood of Information in Any Case

Published By: LexisNexis     Published Date: Mar 25, 2013
After 24 years as a partner with two law firms, an attorney opens his own solo practice in which he also provides litigation support services for another attorney's law firms.
Tags : 
control information, any case, case study, textmap, casemap, notemap, lexisnexis, litigation
    
LexisNexis

Accidental or Malicious? Five Pillars of Insider Threat Risk Mitigation

Published By: Forcepoint     Published Date: Apr 20, 2016
Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness — “seeing” the extent of your user behavior — starts with five pillars and ends with unquestioned success.
Tags : 
risk, security, security programme, security, security application, anti spam, anti spyware, anti virus, application security, identity management, internet security, intrusion detection, intrusion prevention, security management, security policies
    
Forcepoint

Taking Operational Decision Management to the Next Level

Published By: IBM     Published Date: Apr 11, 2016
This paper explores why your business needs the latest operational decision management (ODM) solutions to help turn data insights into action. Discover how IBM Operational Decision Manager software and the IBM Business Process Manager platform work together to: *Recognize patterns that suggest opportunity or risk *Create and shape business events by automating decisions *Bring more dimension and precision to decision making by applying analytics to big data *Help you implement the right business processes by understanding data in context.
Tags : 
ibm, smarter process, operational decision management, odm, knowledge management, enterprise applications, business technology
    
IBM

The Forrester Wave™: Dynamic Case Management, Q1 2016

Published By: IBM     Published Date: Jul 08, 2016
In our 21-criteria evaluation of the dynamic case management (DCM) market, we identified the 14 most significant software vendors — Appian, bpm’online, Column Technologies, DST Systems, Eccentex, IBM, Isis Papyrus, Lexmark Enterprise Software, MicroPact, Newgen Software, OnBase by Hyland, OpenText, Pegasystems, and TIBCO Software — and researched, analyzed, and scored them. The evaluation focused on providers’ adaptive, analytics, and mobile features, all critical to helping enterprises tackle increasing volumes of varied and unstructured work. This report helps enterprise architecture (EA) professionals select the best providers to meet their unique needs.
Tags : 
ibm, forrester, forrester wave, dynamic case management, dcm, networking, software development, enterprise applications
    
IBM

The MDM advantage: Creating insight from big data

Published By: IBM     Published Date: Jan 27, 2017
A solid information integration and governance program must become a natural part of big data projects, supporting automated discovery, profiling and understanding of diverse data sets to provide context and enable employees to make informed decisions. It must be agile to accommodate a wide variety of data and seamlessly integrate with diverse technologies, from data marts to Apache Hadoop systems. And it must automatically discover, protect and monitor sensitive information as part of big data applications.
Tags : 
    
IBM

Mitigating Targeted Attacks Requires An Integrated Solution

Published By: Trend Micro     Published Date: Feb 01, 2013
Despite increased awareness and focus on defending against targeted attacks from both business and security leaders, organizations continue to be breached and suffer the consequences. Many of today’s security investments are simply not aligned to defend against these targeted threat vectors. Advanced threat detection and response should not be a point solution but rather a combination of technologies and core competencies. Detecting and responding to advanced threats should involve tight integration of multiple security technologies, network analysis and visibility (NAV) tools, the ability to automatically generate content such as security rules and signatures, context on attacker history, and overall customization and flexibility to ensure that the solution is fine-tuned for your specific IT environment.
Tags : 
security, advance threat detection, nav
    
Trend Micro

Top 6 Security Use Cases for Automated Asset Inventory

Published By: Qualys     Published Date: Feb 17, 2016
Automated asset inventory might not be the first thing that comes to mind when considering cutting-edge security technologies. In the context of today’s distributed enterprise, however, it’s essential. Since the apps, systems, and services your users access to conduct business are already in the cloud, it makes sense to consider looking to cloud-based technologies to keep track of them all. For the security and compliance professional, it’s critical to have access to a reliable and accurate asset inventory, especially when investigating security incidents and verifying and demonstrating compliance.
Tags : 
qualys, security technology, cloud based technology, best practices, networking, security, it management, knowledge management, enterprise applications
    
Qualys

Bloor White Paper: Complex Event Processing

Published By: Progress Software Corporation CEP     Published Date: Mar 26, 2008
We all have an intuitive idea of what an event is. However, when it comes to the use of the term "event" within a business context then it is easy to get confused. This papers seeks to explain what events are, whey they are important to your business, and what the options are for processing and managing these events (depending on their type and volume).
Tags : 
bloor, progressive, software, complex event processing, cep, mission critical, rules-and-model, event pattern, detection, bpm, business process management, latency, soa, smartblocks, apama, correlator, event processing technical society, epts, rfid, scada
    
Progress Software Corporation CEP

Video Cloud Helps Puma Drive Customer Engagement Across Every Screen

Published By: Brightcove     Published Date: Sep 17, 2014
PUMA produces and publishes a wide range of video content around the world to support its products but also to bring customers on a journey. While PUMA is known for its cutting-edge products, its brand really comes alive through the context that the company puts the products in and the lifestyle that the brand portrays. PUMA looks to video as an opportunity for engagement and a way to direct customers to a cadence-specific, multiscreen experience.
Tags : 
video cloud, video content, live video content
    
Brightcove

This Time, It’s Personal

Published By: Data Stax     Published Date: Oct 05, 2016
Customers demand speed, convenience, and in-context experiences. Netflix, Mint Bills, and Clear Capital know their customers won’t give them a second chance. Learn how these leaders use DataStax Enterprise to provide an experience their customers can’t get anywhere else.
Tags : 
datastax, netflix, mint bills, digital, personalization
    
Data Stax

Mobile Marketing: Three Principles For Success

Published By: Forrester     Published Date: May 10, 2012
More people own smartphones than ever before and they're using them more often too. This makes a mobile marketing strategy crucial for any interactive marketer. Yet today we find that although mobile budgets are beginning to increase, the majority of interactive marketers are just starting to experiment, and many still treat mobile phones as mini-PCs. This report explains how marketers at each phase of mobile marketing evolution should craft successful mobile campaigns by hewing to three key principles: immediacy, simplicity, and context.
Tags : 
emerging methods, brand tactics, mobile channel for consumers, ecommerce, consumer mobile activities, mobile marketing, media mix, emerging media, consumer mobile devices, mobile advertising
    
Forrester

Delivering Exceptional Multi-channel Customer Service

Published By: Genesys     Published Date: May 14, 2013
Today, the gap between a customer’s expecta-tions and the service they receive is huge. Customers are increasingly knowledgeable about the products they use, and demand value-added, personalized customer service in real-time, using voice, text-based media types like email and chat, and social media.
Tags : 
genesys, customer service, social media, personalized customer service, text-based media, people management
    
Genesys

Meeting the Needs of the Mobile-First Consumer

Published By: LivePerson     Published Date: May 17, 2016
At the end of last year, the US alone had 435 million smart mobile devices in use — that’s 35% higher than the total US population. Among smartphone users, 68% use messaging apps regularly. And 84% of smartphone engagement with apps is spent communicating via text, email, and social channels. What does this mean for brands? The current state of CX is broken. Brands focus too much on channel and transaction, ignoring the customer’s preferences, and, ultimately, negatively affecting their bottom line. But wherever there’s a disconnect, there’s also opportunity. In increasing numbers brands are turning to messaging platforms and apps to offer more efficient, convenient customer service.
Tags : 
liveperson, idc, consumer relations, mobile, smartphones, mobile apps, brand engagement, mobile computing, mobile data systems, mobile workers, smart phones, wireless application software, wireless phones, business intelligence, customer interaction service, customer relationship management, customer satisfaction
    
LivePerson

3 Ways Text Messaging Exposes Financial Services Firms to Massive Risk

Published By: Smarsh     Published Date: Dec 07, 2016
Text messaging is simple, concise and compatible with virtually every mobile device, operating system and wireless carrier, making it very appealing to financial advisors and their customers. However, if used for business communications, texts can create tremendous risk. Less than a third of financial firms have a text supervision solution in place according to the Smarsh 2016 Electronic Communications Compliance Survey, the largest compliance gap facing financial firms today. Text messaging can’t be ignored by firms any longer.
Tags : 
    
Smarsh
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.