ics

Results 351 - 375 of 5507Sort Results By: Published Date | Title | Company Name
Published By: Apptio     Published Date: Jul 16, 2019
We know that digital transformation is changing the economics of IT, but is this influencing CXO dynamics and strategic decision-making? To determine this, the Financial Times (FT) Focus partnered with Apptio to survey more than 550 C-suite leaders in technology and finance globally. Download this FT Focus report to discover how to: - Bridge the trust gap and ease tensions between the Office of the CIO and the CFO with accountability and real-time data - Leverage digital transformation to foster greater collaboration and avoid creating blurred responsibilities across the C-suite - Help leaders at global brands embrace AI, reskilling, cloud, Agile, and decentralized decision-making to move at hyperspeed and deliver value.
Tags : 
    
Apptio
Published By: Apptio     Published Date: Jul 16, 2019
Cloud migration is consistently one of the top priorities of technology leaders across the world today, but many are overwhelmed by trying to plan their cloud migration, struggling to prioritize workloads and unsure of the cost implications.. Download this white paper to discover the 5 key steps for cloud migration based on the best practices of today’s most successful IT leaders: - Baseline TCO resources (cloud, on-premises, hybrid) - Map current on-premises resources to cloud offerings - Evaluate and prioritize migration strategy - Calculate migration costs - Define success metrics
Tags : 
    
Apptio
Published By: Apptio     Published Date: Jul 16, 2019
Ready to communicate IT cost and value in terms your business unit partners understand? The Apptio TBM Unified Model® (ATUM®) standardizes the financial information necessary for IT leaders to manage their technology business. Use this poster as a resource to: • Establish better alignment between IT, Finance, and other business units by using common language around IT costs • Confidently manage the business of IT with the backing of peer-derived best practices • Understand 10 essential metrics you should track to communicate the business value of IT
Tags : 
    
Apptio
Published By: Aprimo     Published Date: Apr 09, 2012
The key best practices for next best action in CRM are to align it with key business imperatives; deliver it through priority customer-interaction channels; inform targeted offers with trustworthy customer data; drive it from advanced analytics and rules; and use it to shape multichannel conversations with customers.
Tags : 
aprimo, marketing, customer relations, crm, customer satisfaction, customer data, marketing strategy
    
Aprimo
Published By: Aprimo     Published Date: May 01, 2012
The key best practices for next best action in CRM are to align it with key business imperatives; deliver it through priority customer-interaction channels; inform targeted offers with trustworthy customer data; drive it from advanced analytics and rules; and use it to shape multichannel conversations with customers.
Tags : 
aprimo, marketing, customer relations, crm, customer satisfaction, customer data, marketing strategy
    
Aprimo
Published By: Aprimo     Published Date: May 01, 2012
The real-time buzzword is back. Marketers, vendors, and service providers use this term in a variety of scenarios to describe technologies, analytics, customer service, and processes. In this report, Forrester outlines how firms should evaluate the need to build an agile and real-time environment using a combination of analytics, technology, and business processes.
Tags : 
aprimo, marketing, customer relations, crm, customer satisfaction, customer data, marketing strategy
    
Aprimo
Published By: Aprimo, Inc.     Published Date: Dec 19, 2008
Financial Company Marketing maintains all key functions of marketing in-house to include: marketing strategy, creative services, direct mail, lead management, eCommerce, emerging markets, database, reporting analytics, strategic partnerships & cross-sell, and print vendor management.
Tags : 
marketing process improvement, marketing resource management, aprimo, marketing productivity, data management
    
Aprimo, Inc.
Published By: Aquire     Published Date: Oct 07, 2011
Gain a clear understanding of what workforce analytics are and how they are integral for strategic planning to support your company's overall strategies from the creators of Human Resource Executive's 2010 Top Product, Aquire InSight.
Tags : 
workforce analytics, aquire, aquire insight, workforce analytics software, hr reports, hr metrics, hr trends, hr dashboard, hr benchmarking, hr measurement, hr benchmark, hr reporting, measuring hr, roi of hr, hr metrics dashboard, human resource reports, hr kpi, hr indicators, key hr metrics, workforce analysis tool
    
Aquire
Published By: Aquire     Published Date: Feb 10, 2012
Learn how savvy business leaders and HR professionals are making data-driven decisions by leveraging the power of workforce analytics. This white paper walks you through common obstacles executives face when it comes to strategic workforce analysis.
Tags : 
    
Aquire
Published By: Arbor     Published Date: Mar 06, 2013
Read this Whitepaper to see the results of Infonetics Research on how the DDoS market is shifting and where it is going.
Tags : 
ddos, market trends, infonetics, ddos prevention, arbor networks, security, network, intrusion prevention
    
Arbor
Published By: Arbor     Published Date: Sep 15, 2014
In this whitepaper, noted industry analyst Richard Stiennon examines the emerging requirement in the ongoing arms race with threat actors. Despite years of investment in multiple layers of security defenses, every organization is still wide open to targeted attacks. It is practically impossible to stop all possible attacks. Even next-generation firewalls, complete alerting and logging collected in a SIEM, and universal patch management and vulnerability discovery has proven to be ineffective against threat actors who are motivated, skilled and determined. This paper answers the critical questions about security analytics and explains why it is one of the fastest growing product categories in security.
Tags : 
cyber defenses, threat actors, it security, security analytics
    
Arbor
Published By: Arbor     Published Date: Sep 15, 2014
Sicherheitsanalysen stellen eine neue Anforderung im laufenden Wettrüsten zwischen Angegriffenen und Angreifern dar
Tags : 
security analytics, it security, cyber defenses
    
Arbor
Published By: Arbor Networks     Published Date: Mar 06, 2013
Read this Whitepaper to see the results of Infonetics Research on how the DDoS market is shifting and where it is going.
Tags : 
ddos, cyber attacks, research, enterprise, mobile, cloud, security
    
Arbor Networks
Published By: Arbor Networks     Published Date: Mar 06, 2013
According to Infonetics Research, the DDoS market is being driven by high visibility attacks, Internet traffic growth, enterprise, mobile and managed security services demand. Learn more with this Infonetics Research report on DDoS.
Tags : 
arbor networks, ddos, security, infonetics, prevention appliance report, data management, business technology, data center
    
Arbor Networks
Published By: ArborNetworks     Published Date: Sep 16, 2015
This paper examines the four stages of evolution as security organizations move from reactively responding to incidents to proactively identifying and hunting for threats.
Tags : 
networking, security, it management, data management, business technology, data center
    
ArborNetworks
Published By: ArborNetworks     Published Date: Feb 12, 2016
Ask any cybersecurity professional and she’ll tell you that her job is getting increasingly difficult. Why? Most will point to a combination of the dangerous threat landscape, IT complexity, and their overwhelming workload. These issues are driving a major transition in enterprise security. Large organizations must move beyond a threat prevention mentality to become proactive cyber-¬-attack “hunters” that constantly monitor their networks for signs of trouble. This shift to proactive hunting will require new technologies that collect, process, and analyze massive amounts of security data, offer intelligent security analytics for real-¬-time incident detection, integrate threat intelligence to align suspicious internal activities with external threats, and provide analysts with the right data analytics features to query and manipulate data for historical investigations.
Tags : 
arbor networks, enterprise, cyber attack, network, data, security, business technology
    
ArborNetworks
Published By: ArborNetworks     Published Date: Feb 12, 2016
Security Analytics is one of the two fastest growing product categories in security.
Tags : 
arbor networks, insegment, security analytics, data protection, cyber defense, cyber security, security, data management
    
ArborNetworks
Published By: Arcserve     Published Date: Jul 23, 2010
This white paper describes an approach that provides these performance metrics for specific IT stakeholders, all drawn from data collection and analytics that support a holistic, integrated approach to optimizing IT service delivery.
Tags : 
ca technologies, performance metric, it service, monitoring, productivity, customer retention, service assurance
    
Arcserve
Published By: Arcserve     Published Date: Jun 11, 2014
Is it the end of data protection as we know it? Download this whitepaper to learn how to define a next generation architecture.
Tags : 
arcserve, next generation architecture, data protection, data protection operations, metrics, security, it management
    
Arcserve
Published By: Arcserve     Published Date: Jun 11, 2014
Virtualization has without doubt enabled IT organizations to obtain maximum efficiency from their physical hardware, but virtualization has also increased the complexity these organizations have to manage, and that includes data protection. This paper discusses some of the hidden complexities virtualization introduces to backup and recovery requirements, and the challenges created when backup involves a combination of physical servers and virtual machines. It also discusses ways that backup and recovery processes can be simplified by avoiding point solutions.
Tags : 
arcserve, next generation architecture, data protection, data protection operations, metrics, security, it management
    
Arcserve
Published By: Arcserve     Published Date: Jun 11, 2014
Many small and midsized businesses are at a crossroads when it comes to selecting the right backup solution to protect their environments. Many now have a mix of physical and virtual servers to protect and when they try to use their existing backup software to protect it or, alternatively, search for new backup software that better matches their new infrastructure demands they often encounter several issues. Download to learn more!
Tags : 
arcserve, next generation architecture, data protection, data protection operations, metrics, networking, it management
    
Arcserve
Published By: Arcserve     Published Date: May 29, 2015
The traditional taxonomy of data protection appliances – also known as Purpose Built Backup Appliances (PBBAs) – covers two primary categories: • Backup Appliances • Deduplication Appliances Let’s explore this taxonomy and market dynamics.
Tags : 
data protection appliances, purpose built backup appliances, deduplication, market dynamics, security, it management, knowledge management, data management
    
Arcserve
Published By: ArcSight     Published Date: Mar 03, 2009
This whitepaper presents ArcSight EnterpriseView, a solution designed to help customers understand who is on the network, what data they are seeing, and which actions they are taking with that data. While doing so, EnterpriseView provides the context to understand whether the business faces additional risk of data loss, compliance breach, or fraud.
Tags : 
idm, identity management, user monitoring, identityview, enterpriseview, logs, siem, event logs, security, compliance, regulatory audits, forensics, investigations, log analysis
    
ArcSight
Published By: ArcSight     Published Date: Mar 04, 2009
This whitepaper will outline the drivers for log management as well as their underlying challenges and drive towards a common set of requirements for evaluation of log management tools.
Tags : 
log management, logs, siem, arcsight logger, event logs, security, compliance, regulatory audits, forensics, investigations, log analysis
    
ArcSight
Published By: ARKE University     Published Date: Dec 02, 2015
In this module, you’ll learn how marketers harness the power of data analytics to deliver measurable, value-added results.
Tags : 
arke, arke university, data analytics, digital marketing, big data, data scientist
    
ARKE University
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee