reach

Results 1 - 25 of 1526Sort Results By: Published Date | Title | Company Name

How Italy’s largest service provider leverages security to drive digitalization & raise revenues

Published By: Cisco Umbrella EMEA     Published Date: Nov 15, 2019
As Italy’s businesses grew increasingly vulnerable to the threat of ransomware, data breaches, and other malicious malware attacks, service provider Telecom Italia sought an innovative solution to effectively and efficiently protect the network and data of its business users. In this case study, you’ll read about how Italy’s largest service provider partnered with Cisco Umbrella to increase value for customers and accelerate their revenues with cloud security.
Tags : 
    
Cisco Umbrella EMEA

How Italy’s largest service provider leverages security to drive digitalization & raise revenues

Published By: Cisco Umbrella EMEA     Published Date: Nov 15, 2019
As Italy’s businesses grew increasingly vulnerable to the threat of ransomware, data breaches, and other malicious malware attacks, service provider Telecom Italia sought an innovative solution to effectively and efficiently protect the network and data of its business users. In this case study, you’ll read about how Italy’s largest service provider partnered with Cisco Umbrella to increase value for customers and accelerate their revenues with cloud security.
Tags : 
    
Cisco Umbrella EMEA

eGuide: Exploring the path from AI theory to business value

Published By: Intel     Published Date: Nov 14, 2019
Infrastructure considerations for IT leaders By 2020, deep learning will have reached a fundamentally different stage of maturity. Deployment and adoption will no longer be confined to experimentation, becoming a core part of day-to-day business operations across most fields of research and industries. Why? Because advancements in the speed and accuracy of the hardware and software that underpin deep learning workloads have made it both viable and cost-effective. Much of this added value will be generated by deep learning inference – that is, using a model to infer something about data it has never seen before. Models can be deployed in the cloud or data center, but more and more we will see them on end devices like cameras and phones. Intel predicts that there will be a shift in the ratio between cycles of inference and training from 1:1 in the early days of deep learning, to well over 5:1 by 2020¹. Intel calls this the shift to ‘inference at scale’ and, with inference also taking up
Tags : 
    
Intel

Isolation: Separating Malware from the Network, Not Device

Published By: Menlo Security     Published Date: Nov 11, 2019
"Internet Isolation Provides 100% Protection from Web-based Attacks without Changing the Native User Experience. The breach of 1.5 million patient records—including patient data for the prime minister—at SingHealth, Singapore’s largest group of healthcare institutions, has been called the most serious breach of personal data in the nation’s history. The breach was of great concern and created a chill of fear in many public and private organizations throughout the region and the world. If Singapore, one of the world’s most connected countries, as well as one of the world’s most cybersecure, could have a breach of this magnitude perpetrated against a national institution, why couldn’t this happen to any organization, anywhere? In This White Paper We Will Discuss: - What is the network separation concept? - Who uses network separation? - What is Isolation and how it can separation networks?"
Tags : 
    
Menlo Security

Zero Trust Internet Is the Answer for 100% Email and Web Security

Published By: Menlo Security     Published Date: Nov 11, 2019
"The “detect and prevent” approach has reached its potential, and attackers have learned how to bypass this defense method. Verizon reports that 2018 was a record year, with 41,686 reported security incidents and 2,013 confirmed cybersecurity breaches. What’s more appalling is that studies have shown that 68 percent of breaches take months or longer to detect. Menlo Security’s Internet Isolation Platform enables the Zero Trust Internet, which takes the guesswork out of security by assuming that all Internet content and websites are malicious. Learn: - How companies are able to separate their enterprise network from the public web while still allowing employees to have seamless access to the Internet. - How you can warn employees that they are on a phishing site when they’ve fallen for a real phishing attack. - How you never have to worry about malware, viruses, or ransomware being downloaded."
Tags : 
    
Menlo Security

Sentiment Continues to Climb Among Users as BI Tools Migrate to Cloud

Published By: MicroStrategy     Published Date: Nov 08, 2019
The adoption of cloud BI and analytics is reaching a tipping point. According to the new report from Dresner Advisory Services, there are now more cloud-based deployment options than on-prem offerings available. To learn more about the rising tide of cloud BI, and how sentiment is changing around these offerings, read this new research report based on a 2019 market study. The report covers: A summary of the current cloud BI and analytics landscape An overview of changing user sentiment in the market How organizations are planning to deploy public, private, or hybrid cloud models Read the report for a full list of enterprise challenges and tips on how to address them.
Tags : 
    
MicroStrategy

Sentiment Continues to Climb Among Users as BI Tools Migrate to Cloud

Published By: MicroStrategy     Published Date: Nov 08, 2019
The adoption of cloud BI and analytics is reaching a tipping point. According to the new report from Dresner Advisory Services, there are now more cloud-based deployment options than on-prem offerings available. To learn more about the rising tide of cloud BI, and how sentiment is changing around these offerings, read this new research report based on a 2019 market study. The report covers: A summary of the current cloud BI and analytics landscape An overview of changing user sentiment in the market How organizations are planning to deploy public, private, or hybrid cloud models Read the report for a full list of enterprise challenges and tips on how to address them.
Tags : 
    
MicroStrategy

How to Break through the Automation Ceiling. And Get your Business using RPA at Scale

Published By: Automation Anywhere     Published Date: Nov 06, 2019
Learn why companies aren’t currently embracing RPA at scale and understand how to tackle different scaling challenges, from reaching the ceiling of a small Proof of Concept to keeping your people and RPA strategies aligned. Find out how scale was successfully achieved for some of Automation Anywhere’s customers, including Bancolombia.
Tags : 
scaling challenges, proof of concept, bancolombia
    
Automation Anywhere

Come rompere il muro dell'automazione E fare in modo che l'azienda sfrutti la RPA su larga scala

Published By: Automation Anywhere     Published Date: Nov 06, 2019
Learn why companies aren’t currently embracing RPA at scale and understand how to tackle different scaling challenges, from reaching the ceiling of a small Proof of Concept to keeping your people and RPA strategies aligned. Find out how scale was successfully achieved for some of Automation Anywhere’s customers, including Bancolombia.
Tags : 
scaling challenges, proof of concept, bancolombia
    
Automation Anywhere

2020 Fundraising Predictions

Published By: Intralinks     Published Date: Nov 04, 2019
When it comes to tailoring your investment products for 2020, it’s important to gain an understanding of how LPs are thinking about their alternative allocation programs – from GP selection criteria to investment vehicle preferences. How will the industry shape up in 2020? Here is a brief recap of Intralinks survey predictions from last year: • Preferred GP size: USD 100 to USD 500 million AUM range • Most favorable investment method: direct investing • Highest confidence: private equity In conjunction with Private Equity Wire, Intralinks reached out to over 180 LPs across the globe. We asked for their thoughts on a variety of topics including where they’re looking to invest capital over the next 12 months. Their answers helped us craft our thoughts on the forthcoming fundraising environment. Now, what follows is Intralinks’ 2020 forecast.
Tags : 
    
Intralinks

McKinsey Digital: Unlocking business acceleration in a hybrid world

Published By: Google     Published Date: Nov 04, 2019
"McKinsey conducted a study of CIOs and CTOs of large enterprises from 17 industries. 80% said they hadn’t reached the agility their business needs due to costly trade-offs like sacrificing speed for security or preferred tools for uniformity. Get the report, “Unlocking business acceleration in a hybrid cloud world,” to discover the top perceived trade-offs and how some CIOs have avoided them and steps to unlock the next stage of your IT modernization journey
Tags : 
cloud as a service, cloud computing, enterprise security, cloud infrastructure, cloud providers
    
Google

Location data strategies to improve customer experiences

Published By: HERE Technologies     Published Date: Nov 04, 2019
Accurate, contextual location data is essential to providing customers with a compelling marketing experience. K nowing where your customers are, how to reach them and understanding their needs in those moments can be the difference between campaign success and failure. Have a listen to HERE location marketing experts Hervé Utheza and Jason Bettinger , along with Cami Zimmer (EVP Busi ness & Marketing at Glympse), as they explain how to leverage location insights to create a more engaging customer experience . Learn how location technologies bring together the geometry of the world and the movements of consumers in order to to improve th e consumer journey at each touchpoint of the shopping experience – from the first time the y see the personalized promotion to the actual delivery of their purchase . View this webinar and learn : ? How to innovate around location insights to create personali zed experiences . ? How location technologies help to r efine segmentatio
Tags : 
    
HERE Technologies

Make IT Smarter with Intelligent Storage

Published By: Hewlett Packard Enterprise     Published Date: Nov 01, 2019
Discover how HPE is responding to the massive growth in enterprise data with intelligent storage. Data helps enterprises find new ways to reach and serve customers to grow profitability, but only when it is available at the right place and the right time. The growing complexity of managing and securing data prevents businesses from gaining its full value. Hewlett Packard Enterprise delivers the world’s most intelligent storage for the hybrid cloud world by providing storage that is driven by artificial intelligence, built for the cloud, and delivered as a service.
Tags : 
    
Hewlett Packard Enterprise

Unlock Data’s Potential With Intelligent Storage

Published By: Hewlett Packard Enterprise     Published Date: Nov 01, 2019
"Extracting value from data is central to the digital transformation required for businesses to succeed in the decades to come. Buried in data are insights that reveals what your customers need and how they want to receive it, how sales, manufacturing, distribution, and other aspects of business operations are functioning, what risks are arising to threaten the business, and more. That insight empowers your businesses to reach new customers, develop and deliver new products, to operate more efficiently and more effectively, and even to develop new business models. "
Tags : 
    
Hewlett Packard Enterprise

Printing on the Point-of-Use Level: How to Maximize Productivity with Distributed 3D Printing

Published By: ASME     Published Date: Oct 22, 2019
Historically, businesses and organizations have been using 3D printing in one centralized lab such as a rapid prototyping (RP) shop or manufacturing lab. As 3D printing has become more affordable and easier to use, office-friendly 3D printers are now appearing within arm’s reach of designers and engineers. Distributed 3D printing – or point-of-use 3D printing – refers to placing (or distributing) 3D printing systems and post-processing equipment throughout the organization in the spaces where designers and engineers are doing most of their work. Having 3D printers close at hand allows for real-time design testing, adjusting and iteration that’s often desired in the early stages of the design cycle. This e-Book explores: When to use distributed 3D printing 4 questions to consider How to choose a 3D printer
Tags : 
    
ASME

The Future of Manufacturing

Published By: Sage     Published Date: Oct 17, 2019
Imagine a factory which connects information and interconnectivity—a model of quiet efficiency. Where intelligent machines collaborate with each other, run by a team of analytical, well-trained workers. A center of innovation—the hub of a supply chain that combines customers, suppliers, distributors, and partners with advanced analytical systems. Now imagine the future—the Smart Factory, where there’s minimal downtime, neglect, waste, and inefficiency. Where factory managers, financial experts and boardroom executives use cutting-edge technology to understand data and production—reaching the pinnacle of technology and manufacturing development. The Smart Factory dream is closer than you think.
Tags : 
    
Sage

Why Contact Centres Are Essential in a Digital-First World

Published By: ttec     Published Date: Oct 16, 2019
In an age of tech-savvy customers and self-service channels, do companies still need to invest in contact centre and staff to provide support? The answer is, yes. Consumers have been trained to find the information they need on their own online or with their mobile device. But when they do pick up to the phone and reach out to customer service, they expect representatives to solve what are often complex questions. They expect human interactions. This enormous shift in which customer service representatives are perceived as a last resort puts increased pressure on contact centre associates who already have the odds stacked against them. The staff must be trained to quickly handle issues that frequently require access to a wide variety of information, but a lack of investment means many associates are often unprepared and lack the right resources to help customers. To change the outcome, customer service representatives need the right training and tools to not only understand the issue,
Tags : 
    
ttec

3 Ways to Break Through Barriers to Omnichannel Success

Published By: ttec     Published Date: Oct 16, 2019
Omnichannel, in its most complete definition, means taking into account individual customer needs and perspectives to create seamless customer experience within and across multiple channels. The customer is in control, which creates amazing customer experiences and reduces friction for users and the business. With a true omnichannel experience, each conversation is a continuation from the last and customers don’t have to reiterate their problems multiple times to multiple people. It provides better insights into a customer’s next action, and it enables more personalized product recommendations and proactive outreach. Through technology and analytics, brands can improve their operational efficiency, optimize their channel mix, and take advantage of lower-cost channels, all while enabling a better experience for their customers.
Tags : 
    
ttec

API security best practices: Protect your APIs with Anypoint Platform

Published By: MuleSoft     Published Date: Oct 10, 2019
API security has become a strategic necessity for your business. APIs facilitate agility and innovation. However, the financial incentive associated with this agility is often tempered with the fear of undue exposure of the valuable information that these APIs expose. With data breaches now costing $400m or more, senior IT decision-makers are right to be concerned about API security. In this whitepaper, you'll learn: The top API security concerns for today's enterprises. How IT leaders can protect identity, integrity, and confidentiality of information without risking availability. The top three qualifications you need to keep your APIs secure.
Tags : 
    
MuleSoft

Managing the Complexities of Information Security in a Post NDB Environment

Published By: Canon     Published Date: Oct 09, 2019
THE NOTIFIABLE DATA BREACHES (NDB) SCHEME came into effect on Feb 22nd 2018 making it obligatory for every organisation covered by the Australian Privacy Act to notify the Australian government of certain security breaches. The 2019 Canon Security Report is a guide to understanding which organisations are affected by this policy, the types of security breaches that require notification and what your organisation can do to help mitigate the risk of such breaches happening in the first place. Download this handy guide and protect your business from the business costs and legal ramifications of security breaches.
Tags : 
    
Canon

Instagram is the New Guidebook

Published By: Adobe     Published Date: Oct 08, 2019
This consumer based research was designed to support Travel Brands globally by understanding critical shifts in both “customer mindset and behaviors”. Although this research is focused on Generation Z, we designed our full research around all of the generations for context: Boomer, Gen X, Millennials and Gen Z. If you would like to hear more about consumer habits and behaviors for what matters throughout the Travel Customer Journey, please reach out, we’re here to help.
Tags : 
    
Adobe

A complete guide to SCA

Published By: GoCardless     Published Date: Oct 08, 2019
The PSD2 is the 2nd EU Payments Service Directive. The directive builds on three key areas of legislation first brought in with the original 2007 Directive. These areas include increased consumer rights in payments, creating a level playing field by bringing into scope the regulation of third-party access to account information and enhanced security. Enhanced security refers specifically to a set of requirements called Strong Customer Authentication (SCA). These requirements have far-reaching implications for any business with an online presence. This guide will explore SCA, who and what it affects and how businesses can prepare for the requirements taking effect.
Tags : 
    
GoCardless

Automate Your Cloud Compliance Journey in 6 Steps

Published By: AWS     Published Date: Oct 07, 2019
Securing cloud environments is different from securing traditional data centers and endpoints. The dynamic nature of the cloud requires continuous assessment and automation to avoid misconfigurations, compromises, and breaches. It can also be difficult to gain complete visibility across dynamic and rapidly changing cloud environments — limiting your ability to enforce security at scale. On top of these challenges, cloud governance is critical to maintain compliance with regulatory requirements and security policies as they evolve. Because cloud deployments are not just implemented once and left untouched, organizations need to consider how to integrate security into their CI/CD pipeline and software development lifecycle. Implementing a security solution that addresses cloud challenges requires deep security and cloud expertise that organizations often do not have. Once in the cloud, organizations manage and create environments via automation, adapt their workloads to changes by automa
Tags : 
    
AWS

Tips for Evaluating The True Cost and Value of Your Local Marketing Programs

Published By: Location3     Published Date: Oct 07, 2019
The Association of National Advertisers revealed in an independent study that several agency powerhouses were marking up media inventory 30-90% on top of the fees they were already charging. These practices combined with highly publicized data breaches have contributed to an increasingly contentious environment surrounding agencies and the brands they work with directly. This white paper examines how brand marketers and corporate teams can identify potentially harmful practices undertaken by their vendors, while also offering tips for brands and franchisees to make sure they’re getting the most value out of their agency partnerships. Key Takeaways Include: Identifying Non-Transparent Marketing Fees Tips for Assessing the Value of Your Marketing
Tags : 
    
Location3

Modern architecture for business agility

Published By: Amazon Web Services EMEA     Published Date: Oct 07, 2019
The proliferation of fast, affordable computing has allowed companies of all sizes to create internal efficiencies and reach more customers through digital products. However, the ubiquity of tools, multiple paths to market, and changing consumer preferences means that businesses must innovate faster than ever to remain competitive. The way that digital products have been traditionally built just isn’t fast enough to enable the innovation that’s needed to win in the market.
Tags : 
    
Amazon Web Services EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.