post

Results 1 - 25 of 411Sort Results By: Published Date | Title | Company Name
Published By: ServiceNow     Published Date: May 14, 2019
The move to multicloud and DevOps comes complexity and accelerated development cycles. IT operations is being hindered by the lack of visibility between clouds and on-premise resources. Multicloud capabilities need to enable operations to move to a proactive posture, have end to end visibility, and operation at scale. Get the IDC brief to learn more.
Tags : 
    
ServiceNow
Published By: Group M_IBM Q2'19     Published Date: Apr 22, 2019
"Improving Cyber Resilience in the Insurance Industry Security automation plays a significant role when maintaining an organization's Cyber Resilience, according to IBM Resilient’s latest report, “The Ponemon Institute Study on the Cyber Resilient Organization.” Download this latest report to understand the key factors that hinder the ability for efficient and effective Cyber Resilience and gain insights and guidance for improving your security posture."
Tags : 
    
Group M_IBM Q2'19
Published By: ZoomInfo     Published Date: Sep 07, 2010
Find and connect quickly with the right people, prospects, and opportunities to grow your sales pipeline and boost conversion rates. The ZoomInfo™ Database is the only source of business information combining the business web, community contributors, and professionals who post their own profiles-updated 24 hours a day, 7 days a week. Unlock the power of this data with our next-generation prospecting tool, ZoomInfo™ Pro, featuring rich segmentation, export capabilities, and list building. Add custom appends and lists to streamline revenue generation and maximize ROI. Start your free trial today.
Tags : 
zoominfo, sales, marketing, pipeline, conversion rates
    
ZoomInfo
Published By: Cantaloupe     Published Date: Mar 30, 2010
Social media is all around us and has fundamentally changed the way many of us communicate--both personally and professionally. Video can make your social media better, and ultimately get more leads to your website. But how best to post, measure, and use to drive traffic to your website?
Tags : 
cantaloupe, online video, social media, communication, facebook, twitter, seo, engagement
    
Cantaloupe
Published By: SAP Hybris     Published Date: Oct 26, 2017
Supporting the Buyer Journey with Customer Service, which discusses the opportunity for customer service and support teams to improve the entire buyer experience through continuous pre and post-purchase engagement
Tags : 
    
SAP Hybris
Published By: SAP Hybris     Published Date: Oct 26, 2017
For companies and buyers alike, customer service has traditionally been used as a troubleshooting tool. Forrester found that companies believe that nearly 50% of all buyers still view customer service as a post-purchase resource, rather than a purchasing aid, and in response, companies have positioned their customer service capabilities to match that expectation. However, Forrester conducted a custom survey of 247 companies and found that this reactive, postpurchase-only customer service mindset can result in missed sales opportunities and contributes to greater purchase dissatisfaction.
Tags : 
    
SAP Hybris
Published By: HPE APAC     Published Date: Jun 16, 2017
This white paper examines the various threats faced by mid-sized businesses and explains why a comprehensive approach to protection and resilience makes good business sense, and helps IT managers benchmark their company’s security posture against their peers’.
Tags : 
    
HPE APAC
Published By: Cisco EMEA     Published Date: Jun 01, 2018
What if defenders could see the future? If they knew an attack was coming, they could stop it, or at least mitigate its impact and help ensure what they need to protect most is safe. The fact is, defenders can see what’s on the horizon. Many clues are out there—and obvious. The Cisco 2018 Annual Cybersecurity Report presents our latest security industry advances designed to help organizations and users defend against attacks. We also look at the techniques and strategies that adversaries use to break through those defenses and evade detection. The report also highlights major findings from the Cisco 2018 Security Capabilities Benchmark Study, which examines the security posture of enterprises and their perceptions of their preparedness to defend against attacks.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Jun 05, 2018
In Cisco abbiamo aiutato migliaia di aziende a prepararsi per il GDPR, il che significa che ci è stata fatta praticamente ogni domanda possibile sull’argomento. Così abbiamo pensato di riassumere le domande che ci sentiamo rivolgere più spesso e di fornire alcune risposte utili per chi si sta avviando sul percorso della conformità al GDPR.
Tags : 
    
Cisco EMEA
Published By: Akamai Technologies     Published Date: May 05, 2017
To keep your organization and your data safe, it is crucial to consider forward-thinking approaches to cybersecurity. In this e-book, we discuss how you can augment your existing website infrastructure or within a data center with security measures in the cloud for a more robust security posture. We share Akamai’s approach to cloud security as well as those of other vendors. We then take a closer look at some commonly used, but sometimes misleading, metrics — so you can make more educated decisions about the best solutions for your needs.
Tags : 
cloud security, data, akamai
    
Akamai Technologies
Published By: F5 Networks Inc     Published Date: Dec 08, 2017
The NSA’s Information Assurance Directorate left many people scratching their heads in the winter of 2015. The directive instructed those that follow its guidelines to postpone moving from RSA cryptography to elliptic curve cryptography (ECC) if they hadn’t already done so. “For those partners and vendors that have not yet made the transition to Suite B elliptic curve algorithms, we recommend not making a significant expenditure to do so at this point but instead to prepare for the upcoming quantum-resistant algorithm transition.” The timing of the announcement was curious. Many in the crypto community wondered if there had been a quantum computing breakthrough significant enough to warrant the NSA’s concern. A likely candidate for such a breakthrough came from the University of New South Wales, Australia, where researchers announced that they’d achieved quantum effects in silicon, which would be a massive jump forward for quantum computing.
Tags : 
quantum computing, quantum, computing, browser encryption. encryptionm
    
F5 Networks Inc
Published By: SAP SME     Published Date: May 09, 2017
As informações descritas abaixo são úteis para compreender o conteúdo deste white paper de proposta de valor. Elas fornecem detalhes sobre o objetivo e o escopo do artigo. As principais definições também são dadas para as seções selecionadas do artigo a fim de fornecer esclarecimentos adicionais.
Tags : 
    
SAP SME
Published By: Lenovo and Intel®     Published Date: Apr 28, 2017
Involved, informed patients are better able to manage their own care. Today’s technology plays a big role in helping patients to take ownership of their health and collaborate more closely with providers to achieve better outcomes. Here are 10 tips from Lenovo Health for putting technology to work to reach your patient engagement goals: • Mobile devices, tablets, and interactive technology improve the patient experience • Healthcare facilities can remotely monitor patient progress and health post-discharge • Providers can leverage patient portals and other tools to promote population health • Ensuring patient engagement success requires effective measurement • And more... Lenovo Health provides the solutions and expertise to help healthcare organizations engage patients and achieve the vision of customized care anywhere, from hospital to home. Are you meeting your patient engagement goals? Download this checklist now.
Tags : 
lenovo, lenovo health, healthcare, healthcare technology, improving patient experience, remote monitoring, lenovo health solutions, customized care, hospital to home, digital healthcare, power patient engagement
    
Lenovo and Intel®
Published By: VMware     Published Date: Feb 24, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware
Published By: Dell and Nutanix     Published Date: Oct 26, 2017
I database rappresentano spesso il motore su cui si basa l'attività missioncritical dell'azienda. Sono alla base di online store, dati riservati e sistemi di gestione dei clienti e una soluzione che supporta livelli elevati di attività del database può rappresentare un grande vantaggio per la crescita aziendale.
Tags : 
    
Dell and Nutanix
Published By: Dell EMC     Published Date: Nov 26, 2018
La tecnologia Dell EMC per la produzione digitale sfrutta le funzionalità combinate di workstation, HPC e storage per offrire prodotti migliori e processi di progettazione e produzione più efficienti, nonché per soddisfare le preferenze in rapida evoluzione dei clienti. La raccolta, il confronto e la sintesi di una quantità di dati sempre maggiore nell'intero ecosistema, dalla modellazione dei prodotti alle tendenze post-vendita, stanno facendo della produzione digitale una realtà potente e necessaria nello scenario della produzione. Scopri di più sulle soluzioni Dell in collaborazione con Intel® Xeon® processors
Tags : 
    
Dell EMC
Published By: Dome9     Published Date: Apr 25, 2018
Organizations continue to adopt cloud computing at a rapid pace to benefit from increased efficiency, better scalability, and faster deployments. As more workloads are shifting to the cloud, cybersecurity professionals remain concerned about security of data, systems, and services in the cloud. To cope with new security challenges, security teams are forced to reassess their security posture and strategies as traditional security tools are often not suited for the challenges of dynamic, virtual and distributed cloud environments. This technology challenge is only exacerbated by the dramatic shortage of skilled cybersecurity professionals.
Tags : 
    
Dome9
Published By: Dome9     Published Date: Apr 25, 2018
The term “Cloud First” was initially popularized by Vivek Kundra, who formerly held the post of White House CIO and launched this strategy for U.S. federal government IT modernization at the Cloud Security Alliance Summit 2011. The underlying philosophy of the cloud-first strategy is that organizations must initially evaluate the suitability of cloud computing to address emergent business requirements before other alternatives are considered. This paper offers guidance to help organizations establish a systematic and repeatable process for implementing a cloud-first strategy. It offers a high-level framework for identifying the right stakeholders and engaging with them at the right time to reduce the risk, liabilities, and inefficiencies that organizations can experience as a result of adhoc cloud decisions. The goal of this guidance is to help ensure that any new cloud program is secure, compliant, efficient, and successfully implements the organization’s key business initiatives.
Tags : 
    
Dome9
Published By: Dome9     Published Date: Apr 25, 2018
AWS provides powerful controls to manage the security of software-defined infrastructure and cloud workloads, including virtual networks for segmentation, DDoS mitigation, data encryption, and identity and access control. Because AWS enables rapid and elastic scalability, the key to securing cloud environments is using security automation and orchestration to effectively implement consistent protection across your AWS environment. The following eBook will discuss Dome9 best practices for using AWS controls to establish a strict security posture that addresses your unique business needs, and maintaining consistency across regions, accounts, and Virtual Private Clouds (VPCs) as your environment grows.
Tags : 
    
Dome9
Published By: B Channels     Published Date: May 01, 2018
All technology companies are continuing their investment in IoT technologies: targeting technology verticals or market segments like Smart Homes or IIoT. They all need partners and alliances to expand in these verticalized markets. This post looks at who, where and the implications of IoT expansion.
Tags : 
    
B Channels
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.