siem

Results 1 - 25 of 206Sort Results By: Published Date | Title | Company Name
Published By: Zendesk     Published Date: Dec 10, 2018
in importar cuál es tu negocio o el horario de atención, tu puerta siempre está abierta. Los clientes de hoy en día hacen preguntas a cualquier hora del día o de la noche y esperan recibir una respuesta, pero no esperan mucho tiempo. Ese hecho representa un reto para la mayoría de los negocios: ¿cómo prever qué canales necesitará o querrá tener un cliente y cómo determinar si esos canales son eficaces para su organización? En pocas palabras: sí, es necesario. Y esta guía tiene el propósito de ayudarle a explorar ese hecho. Para los clientes es importante poder contactar a una compañía de varias maneras y dan por hecho que cada interacción sigue el hilo de la anterior y de la siguiente. Más información sobre la solución omnicanal con Zendesk.
Tags : 
    
Zendesk
Published By: Zendesk     Published Date: Dec 10, 2018
Actualizaciones, actualizaciones, actualizaciones. Todo el mundo las hace, de modo que pregúntese: ¿debería también su negocio actualizar sus sistemas? Parece como si siempre hubiera una versión más reciente, o un mejor tipo de software. Es cierto que la implementación de sistemas nuevos y mejorados puede ayudar a su negocio a crecer y ahorrarle dinero, pero también es importante saber si de verdad merece la pena hacer la transición al nuevo software. Zendesk recientemente le encargó a Forrester Consulting que realizara un estudio para evaluar el impacto financiero de Zendesk en las organizaciones. Forrester entrevistó a cinco clientes y realizó un análisis financiero. En ese estudio, Forrester expone los beneficios y los costos de la familia de productos de atención al cliente de Zendesk, con resultados que indican que hay beneficios de más de $3,8 millones.
Tags : 
    
Zendesk
Published By: Zendesk     Published Date: Dec 10, 2018
"El cliente siempre tiene la razón" es una frase que Zendesk se toma muy en serio. ¿Qué es lo que el cliente necesita y desea? Esa es la idea esencial de todo lo que Zendesk hace. Sean las compañías pequeñas que tratan de crecer rápidamente y establecer su marca, o las grandes empresas que procuran conservar la lealtad de sus clientes, el objetivo de Zendesk es facultar a los negocios para que ofrezcan atención impecable a escala, estén presentes en los canales que sus clientes prefieren, y apliquen los datos y análisis en las interacciones con el cliente. En este eBook, descubrirás cómo las organizaciones como NatureBox, Uber e Instacart usan Zendesk de forma innovadora para crear experiencias del cliente sencillas y perfectas. También leerás acerca de: ? Ofrecer soporte omnicanal y personalizado a escala ? Personalizar y administrar fácilmente las operaciones de soporte ? Administrar flujos de trabajo avanzados para maximizar la productividad ? Conocer las perspectivas de los cliente
Tags : 
    
Zendesk
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
Case study briefs for Transguard, BiLFINGER, Aldermore PLC, PinkRoccade, Okinawa Cross Head, Siemens, Sogeti, Norrbottens, Dansk Supermarked Group, ITS Nordic.
Tags : 
    
Hewlett Packard Enterprise
Published By: Dell EMC EMEA     Published Date: Nov 22, 2018
Lidiar con el coste y la complejidad que impone la gestión de los PCs deja poco tiempo para la innovación. Las actuales tecnologías y necesidades comerciales, que evolucionan rápidamente, hacen que haya menos oportunidades para sacar provecho de las nuevas tendencias que están cambiando la forma en que se suministra y consume la tecnología. Y, por supuesto, la tecnología del hardware no dura para siempre. Tiene un ciclo de vida, un comienzo y un final medibles con respecto a su productividad y valor. El departamento de TI se encarga de optimizar el ciclo del ciclo de vida de los PC e impulsar al mismo tiempo avances estratégicos para la organización. Obtenga más información sobre las soluciones Dell con tecnología Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC     Published Date: Nov 09, 2015
The webinar is an excellent resource to provide attendees with the kind of comprehensive and collaborative perspective needed when exploring the implementation of big data solutions. The real-world examples provide information that can enable better decisions for designing best-of-breed big data solutions for organizations.
Tags : 
    
Dell EMC
Published By: Siemens     Published Date: Jun 02, 2016
Researchers of occupational electrical medical emergencies show that in a six-year period 32,840 serious but non-fatal injuries occurred, some 60% involving electric shock and 40% involving electric burns.
Tags : 
siemens, arc defense, fault-resistant, medium voltage
    
Siemens
Published By: Siemens     Published Date: Jul 15, 2016
This white paper will show how factors other than initial purchase price work together to generate a TCO for medium voltage VFDs. Although this paper is specific to medium voltage VFDs, many of the concepts covered are applicable to other long-lived assets that fulfill critical roles in industrial manufacturing facilities.
Tags : 
best practices, business optimization, business management, manufacturing, industrial
    
Siemens
Published By: CA Technologies     Published Date: Sep 25, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders. There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Protecting privileged access and preventing breaches remains an urgent concern for companies of all sizes. Attackers are using a wider range of more sophisticated methods to infiltrate vulnerable systems. And although news of external breaches often dominates headlines, organizations must also be able to defend against insider threats.
Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
    
CA Technologies
Published By: Dell PC Lifecycle     Published Date: Feb 13, 2018
Lidiar con el coste y la complejidad que impone la gestión de los PCs deja poco tiempo para la innovación. Las actuales tecnologías y necesidades comerciales, que evolucionan rápidamente, hacen que haya menos oportunidades para sacar provecho de las nuevas tendencias que están cambiando la forma en que se suministra y consume la tecnología. Y, por supuesto, la tecnología del hardware no dura para siempre. Tiene un ciclo de vida, un comienzo y un final medibles con respecto a su productividad y valor. El departamento de TI se encarga de optimizar el ciclo del ciclo de vida de los PC e impulsar al mismo tiempo avances estratégicos para la organización. Obtenga más información sobre las soluciones Dell con tecnología Intel®.
Tags : 
optimizacion, ciclo, intel, dell
    
Dell PC Lifecycle
Published By: NetIQ     Published Date: Jun 11, 2012
Learn about SIEM and Log Management use cases, differences, best practices and common mistakes. Receive Your Complimentary White Paper NOW!
Tags : 
netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs, enterprise applications
    
NetIQ
Published By: NetIQ     Published Date: Jun 11, 2012
Take the effort out of log management and gain the actionable information you need to improve your organization's security posture. Receive your complimentary whitepaper NOW!
Tags : 
netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs, enterprise applications
    
NetIQ
Published By: NetIQ     Published Date: Jun 11, 2012
This white paper examines some of the challenges that modern organizations face in their efforts to develop and adapt a compliance program that can solve today's needs and support new requirements in the future.
Tags : 
netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs, enterprise applications
    
NetIQ
Published By: NetIQ     Published Date: Jun 12, 2012
This report outlines the future look of Forrester's solution for security and risk (S&R) executives working on building an identity and access management strategy for the extended enterprise.
Tags : 
netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs, identity, identity-as-a-service, authentication, authorization, open web, iam, saml, oauth, openid, scim, spml, xacml
    
NetIQ
Published By: Siemens     Published Date: Jun 20, 2013
The management team at the Inspira Health Network reveals secrets to their successful HIE implementation in this Q&A-style whitepaper.
Tags : 
hie, physician affinity, mobilemd, care management, health information exchange, patient portal, clinical portal, care coordination
    
Siemens
Published By: Siemens     Published Date: Jun 20, 2013
The Charlotte Hungerford Hospital’s pioneering success shows that HIEs can deliver tremendous value by facilitating more coordinated care with community hospitals, small physician practices, and often-overlooked members of the healthcare community.
Tags : 
hie, physician affinity, mobilemd, care management, health information exchange, patient portal, clinical portal, care coordination
    
Siemens
Published By: HP - Enterprise     Published Date: Sep 27, 2013
Learn how Banca Intesa prepared themselves for future cyber attacks by teaming with HP and using their ArcSight security information and event management (SIEM) solution
Tags : 
banca intesa, threats, hp arcsight, cyber attacks, arcsight, security information, event mangement solutions, global cyber crime
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Sep 27, 2013
Learn how Obrela, an Enterprise information security service provider, leveraged HP ArcSight to improve and protect their complex work environment
Tags : 
obrela, hp arcsight, siem, security information, event management solution, security industries
    
HP - Enterprise
Published By: LogLogic     Published Date: Mar 15, 2012
"Big Data" is the latest buzzword, yet over 70% of companies don't know what Big Data means and how to solve the data management challenges, finds LogLogic survey.
Tags : 
log management, siem, big data, storage, sem, pci compliance, it operations, data storage, data forensics, security intelligence, splunk, rsa envision, logrhythm, arcsight, compliance, hipaa, nitro security, q1 labs, security event management, syslog
    
LogLogic
Published By: LogLogic     Published Date: Mar 15, 2012
IANS CUSTOM RESEARCH AND INFORMATION SECURITY INVESTMENT ANALYSIS (ISIA) REPORT on Log data management and compliance products
Tags : 
log management, siem, big data, storage, sem, pci compliance, it operations, data storage, data forensics, security intelligence, splunk, rsa envision, logrhythm, arcsight, compliance, hipaa, nitro security, q1 labs, security event management, syslog
    
LogLogic
Published By: LogLogic     Published Date: Mar 15, 2012
Garnering critical IT insight helps organizations and individuals make the right decisions to better serve customers, partners, regulatory bodies and internal employees and answer many important business challenges. This whitepaper describes LogLogic's philosophy and evolution of IT Data Management.
Tags : 
log management, siem, big data, storage, sem, pci compliance, it operations, data storage, data forensics, security intelligence, splunk, rsa envision, logrhythm, arcsight, compliance, hipaa, nitro security, q1 labs, security event management, syslog
    
LogLogic
Published By: Exabeam     Published Date: Sep 25, 2017
Most enterprises and government organizations that experience data breaches have traditional security point solutions, log management, and security information and event management (SIEM) solutions in place. However, SIEM is not a comprehensive solution on its own. There has been a great deal of focus on the attack-chain – or kill-chain – of steps in the process leading to these breaches.
Tags : 
    
Exabeam
Published By: Exabeam     Published Date: Sep 25, 2017
The Exabeam Security Intelligence Platform addresses every key weakness of existing SIEM solutions: Cost, Intelligence, and Productivity. This paper describes the challenges of security intelligence and how Exabeam specifically overcomes them.
Tags : 
    
Exabeam
Published By: Splunk     Published Date: Aug 21, 2018
SIEM (security information and event management) software offers a lot of promise, but legacy SIEMs simply can't keep up with the rate and sophistication of today's cyberattacks. Organizations today require access to analytics-driven SIEMs that combine a big data platform that is optimized for machine data with advanced analytics, threat detection, monitoring tools, incident response tools and multiple forms of threat intelligence. Download your complimentary copy of “The Six Essential Capabilities of an Analytics-Driven SIEM” and learn how to dramatically improve your security posture, advanced threat detection and incident response.
Tags : 
    
Splunk
Start   Previous   1 2 3 4 5 6 7 8 9    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee