rsa

Results 101 - 125 of 568Sort Results By: Published Date | Title | Company Name
Published By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 18, 2017
That’s why we’ve taken some of the old business preconceptions – whether service specific or not - ripped them up and rewritten five new business rules, designed to debunk some time-honoured myths and help you and your organisation take a leap towards that much-feted goal of customer centricity. Read on for the new rules we recommend, maybe take those and mix them with your own, why not share them @OracleCX? At a minimum we hope these new ways of looking at business will help provoke the questions you, and others, need to ask of your organisation – in fact, we’ve included key questions that will help provoke some conversations, so you can start to build a picture of what’s going well and where there may be room for more discussion and investigation.
Tags : 
customer service, customer behavior, sla, service metrics, business outcomes, vision for delivery, digital customer
    
Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
Published By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 18, 2017
The past five years have marked the beginning of the “Age of the Customer,” in which technology and economic forces have put customers in control of their interactions with businesses. These businesses, hoping to understand and serve customers in a global and digital economy, are almost universally undergoing digital transformation, which involves realigning and investing in new technology and business models with a specific focus on the customer experience.
Tags : 
online customer experience, cross channel, call center agent, improving mobile, store/branch, phone service, social computing
    
Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
Published By: Gigamon EMEA     Published Date: Feb 20, 2019
Pour vous conformer au RGPD, découvrez comment mieux gérer et sécuriser les données traversant votre réseau. Téléchargez ce livre blanc.
Tags : 
    
Gigamon EMEA
Published By: Oracle Marketing Cloud     Published Date: Oct 05, 2017
These days, everyone knows people use multiple channels for shopping, researching products, and communicating with friends and colleagues. Marketers have responded by using a variety of channels to communicate their message. In fact 55% of marketers use at least 10 channels within their marketing channel-mix according to the findings of recent Aberdeen research. The facts are: Utilizing multiple channels has become the ‘new normal.' Simply adding yet another channel within the channel-mix is not enough for marketers to differentiate their business. Instead, savvy marketers distinguish themselves by orchestrating campaigns across all channels to deliver truly personalized and consistent conversations. Download this guide to learn the business value marketers derive by mastering orchestration of omni-channel marketing campaigns. It’ll also reveal several building blocks marketers must use to achieve superior results.
Tags : 
    
Oracle Marketing Cloud
Published By: Dell SB     Published Date: Jan 24, 2019
The sections below contain relevant information about the key points of our PowerEdge server portfolio. Please use these to guide your conversations with prospects from introduction through to opportunity qualification and follow-up.
Tags : 
    
Dell SB
Published By: Cisco     Published Date: Dec 27, 2017
For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency. In these reports, we strive to alert defenders to the increasing sophistication of threats and the techniques that adversaries use to compromise users, steal information, and create disruption.
Tags : 
    
Cisco
Published By: Rackspace     Published Date: Mar 20, 2019
Banks embarking on any cloud activities must first overcome the compliance of rigorous security policies and regulations. For its 100th anniversary commemorative website, The Bank of East Asia (BEA) partnered Rackspace Professional Services – for expertise and advice on advanced cloud management, best practices and security – to help with the designing of a highly secured and compliant AWS environment to host the new, celebratory website.
Tags : 
    
Rackspace
Published By: Workday DACH     Published Date: May 01, 2019
"Die meisten Unternehmen betrachten Finanzen und HR als unterschiedliche Bereiche. Eine Trennung, die vielfältige Probleme verursacht. Die Überführung von Finanzen und HR in ein einziges System macht es einfacher, das Gesamtbild zu sehen, Änderungen vorzunehmen und das Wachstum zu planen. Lesen Sie unser aktuelles Whitepaper und erfahren Sie im Detail acht gute Gründe, warum eine kombinierte Finanz- und HR-Lösung der bessere Weg ist."
Tags : 
financiën, workforce-technologie, digitale strategie
    
Workday DACH
Published By: SAP EMEA Global     Published Date: Dec 06, 2017
In an era of morphing business models, and even fundamental shifts in the way capitalism is practiced around the world, no universal formula can guarantee a CFO’s success. Every country, every sector, and every organization dictates its own parameters for how an individual finance function operates. Nevertheless, our research demonstrates a clear correlation between strong finance leadership and strong enterprise performance— regardless of geography, industry, or company size.
Tags : 
finance, performance, efficiency, risk management, productivity, banking, retail, consumer products, utilities
    
SAP EMEA Global
Published By: Arbor     Published Date: Sep 15, 2014
In this whitepaper, noted industry analyst Richard Stiennon examines the emerging requirement in the ongoing arms race with threat actors. Despite years of investment in multiple layers of security defenses, every organization is still wide open to targeted attacks. It is practically impossible to stop all possible attacks. Even next-generation firewalls, complete alerting and logging collected in a SIEM, and universal patch management and vulnerability discovery has proven to be ineffective against threat actors who are motivated, skilled and determined. This paper answers the critical questions about security analytics and explains why it is one of the fastest growing product categories in security.
Tags : 
cyber defenses, threat actors, it security, security analytics
    
Arbor
Published By: CA Technologies EMEA     Published Date: Oct 20, 2017
Diebstahl und Missbrauch sensibler administrativer Anmeldeinformationen verursachen Sicherheitsverletzungen und Betriebsunterbrechungen. CA Privileged Access Manager verbessert die IT-Security, Unternehmenseffizienz und Compliance durch den Schutz privilegierter Anmeldeinformationen und Ressourcen sowie durch die effiziente Überwachung, Kontrolle und Verwaltung der Aktivitäten privilegierter Anwender.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it, datensicherheit, privilegierter accounts, privilegierte anwender
    
CA Technologies EMEA
Published By: Kaspersky Lab     Published Date: Oct 30, 2014
In recent years, threat actors have become increasingly focused on targeting corporations to obtain sensitive information for financial profit or economic espionage. Regardless of the adversaries’ motives, corporations understand the need to implement defensive measures to secure their infrastructure and sensitive data while mitigating the risk of future attacks.
Tags : 
financial profit, economic espionage, it security, risk mitigation, security, it management, knowledge management
    
Kaspersky Lab
Published By: iPass     Published Date: Aug 28, 2008
Read this whitepaper now to learn all about 4G. New technologies, benefits and features of 4G will all be discussed in this white paper. Read now if you are considering future 4G deployment and find out how iPass can help!
Tags : 
ipass, mobile, broadband, wimax, iptv, fourth-generation, ip-based architecture, ofdma, cdma, virtual collaboration, gsm, umts
    
iPass
Published By: Bazaarvoice     Published Date: Oct 15, 2012
Our survey of 100 members of The CMO Club reveals most CMOs gather insights from first-person, always-on online consumer conversations, and share them across their organizations, to power more than just marketing.
Tags : 
bazaar voice, social marketing, social data, research, social data, marketing data, consumer awareness
    
Bazaarvoice
Published By: Esker     Published Date: Dec 18, 2015
Read our eBook, The Great SAP Order Processing Predicament, to learn how 100% electronic order processing can be achieved via one universal automation platform.
Tags : 
esker, sap order, processing predicament, electronic order processing, universal automation, knowledge management, data management
    
Esker
Published By: Esker     Published Date: Jun 29, 2016
Order processing is most efficient when manual touch points are minimized. But when orders come in by fax or email, what’s the best way to handle them? Read our eBook, The Great SAP Order Processing Predicament, to learn how 100% electronic order processing can be achieved via one universal automation platform. Download this eBook to discover how to: - Make every order electronic - Allow customers to send fax/emails Increase speed, visibility & accuracy - Eliminate manual data entry - Manage growth without adding staff
Tags : 
best practices, business optimization, business management, productivity
    
Esker
Published By: Esker     Published Date: Feb 03, 2017
Order processing is most efficient when manual touch points are minimized. But when orders come in by fax or email, what’s the best way to handle them? Read our eBook, Addressing Manual Order Management, to learn how 100% electronic order processing can be achieved via one universal automation platform. Download this eBook to discover how to: Make every order electronic Allow customers to send fax/emails Increase speed, visibility & accuracy Eliminate manual data entry Manage growth without adding staff
Tags : 
best practices, business optimization, business management, productivity, business intelligence, business process automation, business process management
    
Esker
Published By: uberVU via HootSuite     Published Date: Jul 08, 2014
The Beginner’s Guide to Social Media Metrics will provide a blueprint for getting started with social analytics.
Tags : 
hootsuite, social media, social media marketing, social media metrics, insights, business analytics, social metrics, social media data, social conversations, social data
    
uberVU via HootSuite
Published By: Dell Software     Published Date: Oct 03, 2013
Industry analysts EMS interview three users of Foglight from Dell to underscore the appeal of UEM, its essential value to IT, as well as Foglight versatility in supporting UEM’s multiple facets. Download How Foglight Makes User Experience Management a Reality: Three Case Studies today.
Tags : 
web analytics, foglight, dell, user experience management, customer behavior tracking, customers, best practices, increase customer conversion, knowledge management, enterprise applications, data management, business technology
    
Dell Software
Published By: EMC     Published Date: Apr 18, 2013
The RSA business continuity white paper, BCM Regulatory Soup, will help you address: Which sources to comply with and why, how to handle conflicts between the sources, how to prioritize your efforts.
Tags : 
rsa, business continuity, disaster recovery, bcm, regulatory, compliance
    
EMC
Published By: EMC     Published Date: Apr 18, 2013
Read the Forrester Report: The Total Economic Impact of RSA Archer IT GRC and you'll be eligible to receive a free consultation from an RSA GRC expert who will calculate the projected ROI for your organization.
Tags : 
grc, rsa, archer, roi, compliance, risk, risk management
    
EMC
Published By: EMC     Published Date: Apr 18, 2013
See how RSA Archer Risk Management enables you to proactively address risks to your organization with a central GRC management system for identifying risks, evaluating their impact, relating them to mitigating controls, and tracking their resolution.
Tags : 
risk assessment, risk management, it infrastructure, governance, tracking resolution, compliance, grc
    
EMC
Published By: EMC     Published Date: Apr 18, 2013
See for yourself how easy it is to implement RSA Archer Business Continuity Management & Operations right out of the box. Try it free for 30 days, then take advantage of the special purchase offer through 7/31/13.
Tags : 
    
EMC
Published By: VersaSuite     Published Date: Aug 13, 2013
Healthcare providers do not have to live with functionality interruptions and budget strains created by an EHR that does not fit the facility. VersaSuite delivers a customizable EHR/HIS system to streamline the entire range of healthcare business processes.
Tags : 
ehr, electronic health records, ehr replacement, emr software, emr, electronic medical records, emar, ophthalmology, ent, cardiology, otolaryngology, cardiovascular, versasuite, practice management, pacs, hospital information system, his, budget, revenue cycle management, cpoe
    
VersaSuite
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee