pts

Results 1 - 25 of 380Sort Results By: Published Date | Title | Company Name
Published By: BehavioSec     Published Date: Oct 04, 2019
A well-known global bank was evaluating new ways of strengthening authentication for their High-Net-Worth Individuals (HNWI) to protect their high value accounts. These accounts are under constant attack by sophisticated, targeted fraud attempts. In evaluating behavioral biometric vendors, the bank selected BehavioSec, because of its accuracy and enterprise grade capabilities, to be deployed on-premise and to integrate with its existing security and risk management systems.
Tags : 
    
BehavioSec
Published By: Rackspace     Published Date: Nov 11, 2019
Real-time scalability and analytics available through Google Cloud Platform help this living-well retailer build a healthy bottom line.
Tags : 
    
Rackspace
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Sep 05, 2019
Both the speed of innovation and the uniqueness of cloud technology is forcing security teams everywhere to rethink classic security concepts and processes. In order to keep their cloud environment secure, businesses are implementing new security strategies that address the distributed nature of cloud infrastructure. Security in the cloud involves policies, procedures, controls, and technologies working together to protect your cloud resources, which includes stored data, deployed applications, and more. But how do you know which cloud service provider offers the best security services? And what do you do if you’re working on improving security for a hybrid or multicloud environment? This ebook provides a security comparison across the three main public cloud providers: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). With insight from leading cloud experts, we also analyze the differences between security in the cloud and on-premises infrastructure, debunk
Tags : 
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Sep 05, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
    
CloudHealth by VMware
Published By: Jamf     Published Date: Oct 18, 2019
If you’re an Apple admin who is terrified of scripting, lift high your courage: this guide is for you! You can improve your speed, accuracy and the satisfaction of your end users with just a handful of simple scripts.
Tags : 
    
Jamf
Published By: AppZen     Published Date: Oct 21, 2019
Go beyond just matching invoices, receipts and purchase orders Identify duplicates Check prices and payment terms Enforce discounts Highlight compliance issues Validate contractor activity Discover fraud Confirm fulfillment of goods and services
Tags : 
    
AppZen
Published By: Quantum Metric     Published Date: Oct 18, 2019
At Quantum Metric, helping companies improve digital customer experience is our passion. We’ve harnessed the learnings and observations we’ve had across dozens of Fortune 500 organizations to develop a methodology that companies can use to achieve meaningful results quickly - helping leadership and teams highlight the lowest hanging fruit in their organizations. The principles for our guide are: Be Easy to Understand. Five clear steps with specific goals and outcomes. Provide Value from Day One. No month-long assessments required. Deliver Quantifiable Outcomes. Clear, objective, and measurable improvements. Be Consistent. Produce repeatable results. Be Universal. Applicable to a wide-variety of businesses and situations. Using the concepts illustrated within this methodology, digital teams from every industry have been able to consistently deliver stellar customer experiences that encourage and maintain long term brand loyalty.
Tags : 
    
Quantum Metric
Published By: Veeam '18     Published Date: Oct 28, 2019
The damage caused by ransomware is widely discussed in the media. But this is far from the only danger that threatens the availability of your data. In this webinar, you will learn about the basic concepts of IT system availability and how Veeam® can help you implement these concepts in your company. The following issues will be highlighted: backup rule "3-2-1"; why snapshots are not a backup; how to prevent implicit data corruption.
Tags : 
    
Veeam '18
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
The idea of load balancing is well defined in the IT world: A network device accepts traffic on behalf ofa group of servers, and distributes that traffic according to load balancing algorithms and the availabilityof the services that the servers provide. From network administrators to server administrators to applicationdevelopers, this is a generally well understood concept.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network
    
Coyote Point Systems
Published By: Infosys     Published Date: Nov 04, 2019
Utilities are embracing new technologies to modernize their electric grid and cope with the changing load profiles created by distributed energy resources such as solar, electric vehicles and battery storage. The path forward for trailblazers is often the most challenging. In the spirit of the early pioneers, this paper attempts to share some of the lessons learned. In previous papers we discussed the case for grid modernization and grid modernization capabilities. In this paper we will discuss the top 10 lessons learned from pioneering grid modernization efforts in order to assist others on their journey. While such efforts span both grid operations and planning and engineering, this paper focuses primarily on planning and engineering.
Tags : 
    
Infosys
Published By: Icertis     Published Date: Oct 24, 2019
As the global economy adapts to a period of long-term uncertainty, procurement teams are being tasked with diversifying the supplier base of the organization in order to maintain business continuity and avoid risks, all while delivering quality outcomes. This report seeks to contextualize the performance and alignment of Procurement departments both within the larger organizations they serve and amid their place in the global economy.
Tags : 
    
Icertis
Published By: Adobe     Published Date: Sep 23, 2019
No matter where they are, your customers expect you to be there too, offering fluid, consistent experiences across channels SUPPORTING CONCEPTS: Customer choices continue to expand - 5.5 million new smart things are connected every day, and by 2020, Gartner predicts there will be 20.8 billion connected things worldwide. 76% of marketers agree that personalization is driving increased need for more assets. 88% of marketers agree that they need an easier way to discover and share assets that generate the best engagement. With a hybrid content and experience solution, Synopsys saw: o A 40% increase in productivity o Reduction from 2 weeks to 2 hours to restructure content WHY SHOULD THE TARGET AUDIENCE CARE? Companies need to transform their businesses to meet the demands of customers in an omnichannel world.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Sep 23, 2019
Why data-driven businesses stand out from the crowd. Why Should the Target Audience Care? Enterprises need to become more data-driven by using more mature analytics tools to stand out from the crowd Supporting Concepts Smart, effective customer analytics tools helps organizations reap the rewards of increased customer satisfaction and brand loyalty. Neglecting advances in customer analytics technology could seriously impact a company's ability to compete in the future marketplace. Where do your customers and prospects sit on the customer analyticsmaturity scale? Are they leaders or are they laggards? Read "Customer Analytics: The 20 Attributes that Lead to Business Success" for insights into: • the key drivers needed within an organisation that help grow customer analytics maturity • why companies using paid analytics solutions experience more tangible benefits than those using free analytics • how to distinguish customer analytics leaders from laggards
Tags : 
    
Adobe
Published By: Adobe     Published Date: Sep 23, 2019
An excellent CMS solution provides your business with the flexibility to grow into a broad experience delivery platform. It should enable your business to scale and add new capabilities as it grows, and easily integrate with other marketing technologies. Why should the target audience care? Customer expectations have increased. They now expect their in-store experiences to be continuous and consistent extensions of the online journey. And the online journey provides fast, dynamic, and interactive experiences. If your business is not well informed on what is needed from a content management solution, it may come up short on customer experience. A successful and growing business will choose a solution that helps them future-proof for emerging channels and effectively manage mature ones. Supporting Concepts: Navigate your business through the noise. Apply these questions and insights to your selection process and avoid the pitfalls of costly and rigid content management systems.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Sep 23, 2019
Across every industry, many of the world's best and fastest-growing brands are using Adobe Experience Manager to deliver personalised content accurately and on time. Why should the target audience care? 86% of buyers will pay more for a better customer experience. What’s more, customer experience will overtake price and product as the key brand differentiator among consumers by 2020. Supporting Concepts: With Adobe Experience Manager, high levels of customer experience personalization, workflow efficiency, and data analysis are no longer cost- and resource-prohibitive dreams for only the biggest players. Brands featured include Silicon Labs, Morningstar, Swisscom, Raiffeisen, Hyatt, Nissan, Sony, SAS, Informatica, Jefferson Health.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Oct 08, 2019
You cannot accurately predict what your customer will want next. Artificial intelligence can. WHY SHOULD THE TARGET AUDIENCE CARE? By 2020, businesses that use AI and related technologies like machine learning and deep learning to uncover new insights will take $1.2 trillion each year from competitors that don't. (Source: Forrester.) SUPPORTING CONCEPTS: At any moment, anywhere in the world, on any kind of device, a prospect or customer is raising her hand and saying, "I'm your best opportunity. Don't ignore me." She's telling you that by every action she's taken and every interaction you've had up to that point. You can consider each bit of data you've collected across her journey a meaningful expression of intent. And with that, you will know how to give her an experience that's above her expectations and beyond her imagination. You need many different technologies in your marketing stack to manage personalization, but AI makes them all work together seamlessly. You can: –
Tags : 
    
Adobe
Published By: Dependable Solutions     Published Date: Feb 16, 2010
A critical challenge for many companies in 2009 was to stay on top of licensees' obligations, payments, receipts and royalties, along with growing volume of approvals.
Tags : 
dependable solutions, licensing, edi, electronic data interchange, sku
    
Dependable Solutions
Published By: Dell APAC     Published Date: May 30, 2019
IT Transformation is a concept that resonates with companies even more now than it did 12 months ago. Although not synonymous with digital transformation, the two concepts are fundamentally linked together, as effective digital transformation cannot happen without IT Transformation
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 30, 2019
IT Transformation is a concept that resonates with companies even more now than it did 12 months ago. Although not synonymous with digital transformation, the two concepts are fundamentally linked together, as effective digital transformation cannot happen without IT Transformation
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 30, 2019
IT Transformation is a concept that resonates with companies even more now than it did 12 months ago. Although not synonymous with digital transformation, the two concepts are fundamentally linked together, as effective digital transformation cannot happen without IT Transformation
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 30, 2019
IT Transformation is a concept that resonates with companies even more now than it did 12 months ago. Although not synonymous with digital transformation, the two concepts are fundamentally linked together, as effective digital transformation cannot happen without IT Transformation
Tags : 
    
Dell APAC
Published By: Spectrum Enterprise     Published Date: Oct 29, 2018
Bandwidth. Speed. Throughput. These terms are not interchangeable. They are interrelated concepts in data networking that help measure capacity, the time it takes to get from one point to the next and the actual amount of data you’re receiving, respectively. When you buy an Internet connection from Spectrum Enterprise, you’re buying a pipe between your office and the Internet with a set capacity, whether it is 25 Mbps, 10 Gbps, or any increment in between. However, the bandwidth we provide does not tell the whole story; it is the throughput of the entire system that matters. Throughput is affected by obstacles, overhead and latency, meaning the throughput of the system will never equal the bandwidth of your Internet connection. The good news is that an Internet connection from Spectrum Enterprise is engineered to ensure you receive the capacity you purchase; we proactively monitor your bandwidth to ensure problems are dealt with promptly, and we are your advocates across the Internet w
Tags : 
    
Spectrum Enterprise
Published By: Akamai Technologies     Published Date: May 24, 2017
Sicherheit und Performance wurden einst als separate Aspekte angesehen, für die ganz unterschiedliche Lösungen erforderlich sein sollten. Cyberkriminelle haben jedoch neue und überaus effektive Möglichkeiten gefunden, die Ihre Website in beiderlei Hinsicht gefährden. Erfolgreiche Lösungen müssen daher Sicherheitslöcher stopfen und parallel die Performance am Frontend optimieren. Wie ist das möglich? In diesem Bericht gehen wir auf browserbasierte Lösungen ein, welche gleichzeitig die Sicherheit optimieren und die Performance für den Endnutzer verbessern. Wir untersuchen verschiedene Techniken für den Umgang mit inhaltsbezogenen Browserproblemen, wie z. B. HSTS, Inlineframe und Prefetching. Der Bericht behandelt zudem Service-Worker- und browserbasierte Skripts, die viele Sicherheits- und Performanceoptionen bieten. Laden Sie den Bericht jetzt herunter und erfahren Sie, wie Sie Sicherheit und Performance gleichermaßen verbessern können.
Tags : 
    
Akamai Technologies
Published By: Cisco     Published Date: Dec 11, 2018
You need to be ready to host any application anywhere. Our solution adapts to support all of your applications with the simplicity of hyperconvergence. If your IT organization is like most, you are stretched thin to support your developers as they create multicloud-native applications that they deploy across public and private clouds. And you still need to support line-of-business managers with traditional applications as they use both monolithic and cloud deployment models. I would like to receive email communications about products & offerings from Cisco & its Affiliates. I understand I can unsubscribe at any time. For more information on how Cisco collects and uses personal information, please see the Cisco Online Privacy Statement.
Tags : 
    
Cisco
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee