ema

Results 1 - 25 of 4421Sort Results By: Published Date | Title | Company Name
Published By: Box     Published Date: Jun 22, 2018
• Enterprise Content Management is a market in transition. And as demand for modernization becomes widespread, long-time leaders are investing in new capabilities to keep up — and bringing more of the market to the cloud to meet the needs of users and IT managers alike. • • This report shows how a range of providers measure up to help companies make the right choice when • requirements are skewed to the needs of information workers who need to create, collaborate on, share, and find enterprise content. • • Use the 2017 Forrester Wave™ report to: o Get educated. Gain an understanding of how the ECM market is changing and why complex, on-premises ECM suites are giving way to Cloud Content Management platforms like Box. o Define your needs. Forrester ranks the top 15 ECM business content vendors based on current offerings, strategy and market presence to help you evaluate vendors that suit your needs. o Select a vendor. Learn how cloud content management platforms like Box are designed
Tags : 
    
Box
Published By: Akamai Technologies     Published Date: Jun 14, 2018
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : 
dns< security breach, cyber security
    
Akamai Technologies
Published By: Hewlett Packard Enterprise     Published Date: Jul 19, 2018
"The Enterprise Strategy Group put HPE SimpliVity hyperconverged infrastructure through its paces in a series of hands-on performance and stress tests simulating real-world configurations and load conditions. Read this report to learn how an HPE SimpliVity infrastructure: Ran nine workloads simultaneously, with an average response time across all applications of 3.9ms Showed little to no performance impact as a virtual controller, drive, and node were systematically failed on a two-node cluster."
Tags : 
hyperconverged, infrastructure, simplivity
    
Hewlett Packard Enterprise
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Today every business is focused on their customers, and finding ways to better understand and serve them with differentiated digital experiences. With all of the choices available, users have become highly demanding, and quickly lose patience and trust when web and mobile app experiences are poor. Today’s digital user demands rich, engaging content that is fresh, personalized, and fast. If your websites and mobile apps can’t deliver, they’re gone. This eBook will give you insight into: Monitor how users interact with your online applications by leveraging real user data Optimize behaviors that drive the most revenue impact across user locations and devices Validate whether the optimizations resulted in desired business outcomes using real-world situations
Tags : 
monitor, optimize, validate, digital, experiences
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Today every business is focused on their customers, and finding ways to better understand and serve them with differentiated digital experiences. With all of the choices available, users have become highly demanding, and quickly lose patience and trust when web and mobile app experiences are poor. Today’s digital user demands rich, engaging content that is fresh, personalized, and fast. If your websites and mobile apps can’t deliver, they’re gone. This eBook will give you insight into: Monitor how users interact with your online applications by leveraging real user data Optimize behaviors that drive the most revenue impact across user locations and devices Validate whether the optimizations resulted in desired business outcomes using real-world situations
Tags : 
monitor, optimize, validate, digital, experiences
    
Akamai Technologies
Published By: Butler Technologies     Published Date: Jul 02, 2018
The Tenth Annual State of the Network Global Study focuses a lens on the network team’s role in security investigations. Results indicate that 88 percent of network teams are now spending time on security issues. In fact, out of 1,035 respondents, nearly 3 out of 4 spend up to 10 hours per week working exclusively on these types of problems - in addition to managing network upgrades, SDN, cloud, and big data initiatives. When it comes to technology adoption, both cloud and 100 GbE deployment continue to grow aggressively. VoIP adoption is closing in on 60 percent and software-defined networking (SDN) is projected to cross the halfway mark, indicating compounding network complexity amidst the ongoing struggle to ID security threats. With growth comes change and some trends identified in this year’s survey include a rise in email and browser-based malware attacks (63 percent) and an increase in sophistication (52 percent). Nearly 1 in 3 also report a surge in DDoS attacks, signaling a ne
Tags : 
    
Butler Technologies
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Gartner’s Continuous Delivery Automation Magic Quadrant (MQ) analyzes the current market solutions and their effectiveness in responding to the demands of the modern business. The MQ is created on a tool’s ‘ability to execute’ and its ‘completeness of vision.’ When assessing CA Continuous Delivery Automation, Gartner highlights its ability to ‘provide scalability, resilience, security and enterprise management connectivity.’ The analysis also goes much deeper to cover the strengths, weaknesses and various nuances of all the automation products on the market.
Tags : 
    
CA Technologies_Business_Automation
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Challenge Enterprises today face the major challenge of how to fully orchestrate the apps that define their business and automate the IT processes underpinning them when much of the infrastructure used to run them is outsourced to cloud providers. Opportunity Some cloud service providers offer their own orchestration tools, and each on-premises tool has automation capabilities. But while we own our apps, providers are interchangeable depending on what they can offer and for what price. We should be able to switch between cloud providers and between cloud, on-premises and hybrid infrastructure as and when the business requires, with minimal effort and without losing any control. Sometimes we might want to use more than one provider at the same time, leveraging the advantages of each provider simultaneously. Benefits What is needed is an orchestration layer that remains constant while cloud services come and go; one that enterprises own along with their core apps.
Tags : 
    
CA Technologies_Business_Automation
Published By: WorkBook from Deltek     Published Date: Jul 20, 2018
Competitive threats and mushrooming client demands erode the bottom line for many agencies. This eBook provides actionable steps to help you keep your best employees and deliver profit growth, by: • Ensuring you get paid enough for every engagement • Empowering your staff to reign in over-servicing • Making your strategic value clear to clients
Tags : 
    
WorkBook from Deltek
Published By: Lookout     Published Date: Apr 18, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2018
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile specifc security. To encourage this evolution, Lookout developed the Mobile Risk Matrix. Its purpose is to help security organizations understand the spectrum of risk on mobile devices and to provide data that demonstrates the prevalence of mobile risk.
Tags : 
    
Lookout
Published By: Zendesk GmbH     Published Date: Apr 20, 2018
Überzeugte Kunden geben mehr aus Kunden geben mehr Geld aus, nachdem sie mit Ihnen gechattet haben – und 83 % aller Online-Käufer brauchen Hilfe, um einen Kauf zu tätigen. Lassen Sie Ihre Kunden nicht im Regen stehen, sondern greifen Sie ihnen unter die Arme, damit sie den Kauf abschließen. Warenkorbabbruch reduzieren Die Wahrscheinlichkeit, dass ein Kunde einen Kauf tätigt, ist dreimal höher, wenn Sie ihn mit proaktivem Chat ansprechen. Senden Sie zielgerichtete Nachrichten, um Kunden im Kontext zu helfen. Höherer Web-Umsatz Nachdem Spartan Race Live-Chat zu seinem Online-Store hinzugefügt hatte, ließ sich ein Anstieg des Retail-Umsatzes um 27 % und ein Kundenzufriedenheitswert für Live-Chat von 97 % verzeichnen. Mehr Markentreue Genau wie bei Interaktionen in einem normalen Geschäft können Live-ChatAgenten eine persönliche Beziehung zu Kunden knüpfen und die OnlineMarkentreue erhöhen.
Tags : 
    
Zendesk GmbH
Published By: KPMG     Published Date: Jul 10, 2018
Stakeholders increasingly expect more from the finance function than transactional processing and historical reporting. Will you meet the challenge or are you at risk of getting left behind? Read this report to understand: • what CEOs are looking for from their finance functions • six priority areas CFOs should focus on to meet new demands from the business • how leading companies are transforming their finance functions • five steps for turning disruption into opportunity.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jul 10, 2018
Modern regulation demands connected thinking, leading-practice processes, optimal data management and insightful reporting – all of which makes the finance function the ideal catalyst for change. Read this report to find out: • how to structure a transformation plan and strategy • how to create the optimal team for transformation • what leading companies are doing to drive transformation through regulatory change.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jul 11, 2018
Looking for a smarter approach to workforce planning? With robotics and artificial intelligence transforming the workplace, analysing supply and demand over 3–5 years doesn’t make sense. HR leaders need to find a more flexible approach to workforce shaping. Read this report to discover: • the key trends that will shape the future workforce • what early movers into intelligent automation can teach us • what’s involved in agile workforce shaping • how to use our 5C Framework to navigate the changes ahead.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jul 11, 2018
The traditional IT organisation is struggling to meet the insatiable demand for new digital capabilities from business stakeholders. It’s time for a new IT operating model – ¬but what will it look like? Read this insight to find out: • what three new roles the future IT operating model must encompass • what new skills and positions will be required in the IT function • which integration needs the future IT function must address • what the priorities should be in terms of orchestrating the IT ecosystem. Read this insight now
Tags : 
    
KPMG
Published By: IBM     Published Date: Jul 16, 2018
IBM Planning Analytics Local is the on-premises version of the planning solution built on the powerful, in-memory OLAP engine of IBM TM1. It automates your planning, budgeting and forecasting, and helps you link operational tactics with financial plans. Watch this on-demand webinar to learn about the latest innovations in IBM Planning Analytics Local, including: Workspace: The interactive interface that enables you to quickly drill through to supporting detail to understand the underlying assumptions in your plans. It lets you create custom dashboards and colorful, compelling visualizations with ease. IBM Planning Analytics for Microsoft Excel: The next-generation Microsoft Excel add-in that lets you retain Excel functionality and formatting when moving data between IBM TM1 and Excel. Hierarchies: The new capability that enables you to model and drill into attributes as if they were a dimension -- without having to create a new dimension or add elements (members) to the hierarchy, for unprecedented insight into your IBM TM1 data.
Tags : 
    
IBM
Published By: Bluecore     Published Date: Jun 21, 2018
If you’re like most email marketers, you do a lot of “hurry up and wait.” Download now to learn more about a solution from Bluecore.
Tags : 
    
Bluecore
Published By: Bluecore     Published Date: Jun 21, 2018
Learn how Bluecore helped Discount School Supply with their eCommerce Marketing.
Tags : 
    
Bluecore
Published By: Menlo Security     Published Date: Jun 01, 2018
"Financial services institutions are high-value targets for cyberattacks because of the capital they control, the personal information on customers they maintain, and the fear an attack on a bank generates in the public. Phishing attacks on FSIs have risen steadily, especially employee credential theft - because once an employee’s credentials are stolen, cyberattackers can access customer information, employee data, even finances. While legacy security solutions claim to block up to 99.9 percent of cyberattacks, all it takes is one employee or contractor to open an email from an unknown source, download a file from a compromised website, or in any other way fall victim to a cyberattack. So, it’s time for a new approach: Isolation, also known as, remote browsing. Download this Financial Services Best Practices Guide to Isolation to learn how to best eliminate phishing attacks and web malware. "
Tags : 
    
Menlo Security
Published By: Menlo Security     Published Date: Jun 05, 2018
"2017 was marked by a significant number of high-profile cyber breaches. Web malware and phishing played a critical role in the vast majority of these attacks. Watch this webinar to learn from two of the industry’s leading experts – Gartner Research Analyst Peter Firstbrook and Menlo Security CTO Kowsik Guruswamy: *Why web malware and phishing are so pervasive in today's cyber attacks *What the shortcomings of today’s reactive security philosophy are *Why the web continues to present a risk to businesses *How organizations rethink their security strategy moving forward"
Tags : 
    
Menlo Security
Published By: Menlo Security     Published Date: Jun 01, 2018
"Multi-stage attacks are an increasingly popular approach used by cybercriminals. By sending a malicious attachment in a phishing email that contains an embedded URL, with no malevolent code, attackers can evade existing security solutions, like sandboxes and AV. How do you prevent these attacks before they happen? Download this white paper to find out: *How Menlo Security Labs recently isolated a multi-stage document attack *What tools, techniques and procedures ( TTPs ) are attackers using to infect victims’ devices *How Isolation can foil the attack before it can even start "
Tags : 
    
Menlo Security
Published By: Proofpoint     Published Date: May 30, 2018
Email fraud is rife – business email compromise (BEC) is costing companies billions, and consumer phishing is at an all-time high. The majority of these email attacks are also preventable. Utilising the power of email authentication, Email Fraud Defence protects your organisation from all phishing attacks that spoof trusted domains. Visibility of who is sending email across your email ecosystem allows you to authorise all legitimate senders and block fraudulent emails before they reach your employees, customers and business partners. Protect your email ecosystem from today’s advanced email threats including business email compromise (BEC) and consumer phishing. Proofpoint Email Fraud Defence gives you the visibility, toolset and services needed to authorise legitimate email senders and block fraudulent messages before they reach the inbox.
Tags : 
    
Proofpoint
Published By: Workday     Published Date: Aug 07, 2018
From the rise of data analytics to new needs in budgeting, the shift to value-based medicine is bringing a fresh set of challenges to healthcare CFOs. How can you best meet these new demands and turn change into opportunity? This Becker’s Hospital Review eBook compiles 10 must-read articles that offer executive tips, actionable insights, and noteworthy trends for healthcare finance technology.
Tags : 
    
Workday
Published By: Workday     Published Date: Aug 07, 2018
Read the whitepaper “Rochester Regional Health – Equipping HR to support the evolving demands of the health care industry” to learn how cloud-based technology helps respond to critical M&A business needs and drivers, improves operational effectiveness and efficiency, and enhances capabilities and streamline regulatory compliance.
Tags : 
    
Workday
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.