rest

Results 1 - 25 of 1870Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night – and we know because we asked you.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unk
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
For more than a decade, Cisco's security reports have been a definitive source of intelligence for security professionals interested in the state of the global industry. These comprehensive reports provided detailed accounts of the threat landscape and their organisational implications. Today, Cisco is publishing its second report for 2019: Defending against today's critical threats. This white paper looks back at the threat landscape over the past year, highlighting some of the key cyber security incidents during that timeframe. However, this isn't just another retrospective report, fondly looking back at events that have already come to pass.
Tags : 
    
Cisco EMEA
Published By: Here Technologies     Published Date: Mar 29, 2019
Advertisers have made great strides in understanding consumers’ digital journeys. But in order to truly map the steps of the consumer, including bridging the journeys between digital and physical worlds, you need advanced location-enabled intelligence. Find out how precise real-world geometry gives you the context you require to create personalized consumer experiences with the HERE and Location-Based Marketing Association (LBMA) white paper. HERE Technologies gives you the location context you need to make sense of your dynamic user data. Mapping consumer movements to real-world elements such as points of interest, retailers and their building shapes allows you to observe consumer journeys to within meters, and deliver more timely, accurate campaign messages.
Tags : 
location data, ad tech, location targeting
    
Here Technologies
Published By: Schneider Electric     Published Date: Mar 28, 2019
Because electricity is a key commodity for business it represents significant financial risk. Yet many power management systems remain isolated and separate from the rest of the business enterprise. The result is poor access to incomplete information, with only limited knowledge of risk exposure. An integrated, comprehensive power management system that includes metering, software, and power quality mitigation equipment offers the most holistic, systems-based approach to managing this risk exposure.
Tags : 
financial risk, power management system, quality migration, schneider electric, pms
    
Schneider Electric
Published By: Intel     Published Date: Apr 15, 2019
o With foot traffic falling and online shopping options growing, retailers must find new ways to “digitize” and understand real-world behavioral data—such as in-store browsing patterns, staff attentiveness, and specific product interest— in the same way that online retail utilizes big data to optimize online experiences. They must also find innovative ways to keep customers engaged with their brands, especially in expensive brick-and-mortar locations. In this environment, managing labor costs is critical, as these costs are second only to real estate. Assigning and enabling sales associates cost-effectively is key to profitability. Retailers have an opportunity to meet their challenges by putting new data and Internet of Things (IoT) technologies to work
Tags : 
    
Intel
Published By: Location3     Published Date: Feb 07, 2019
In our experience as franchise marketers, Local Ad Fund dollars provide a solid foundation for paid search campaigns that drive consistent, high quality-low cost, leads. However many franchisees and local business owners could be doing more to support established corporate search marketing campaigns, ultimately capturing the maximum search interest for their services within their markets, driving increased local revenue.
Tags : 
marketing, local marketing, franchise, franchisor, digital marketing, local store revenue, franchise paid search
    
Location3
Published By: Illusive Networks     Published Date: Apr 10, 2019
Do you know how attackers can move once they’re inside your network? The access footprint changes constantly as users log on and off, restart systems, change roles, and access resources. Until now, these conditions have only been visible when skilled analysts inspect individual systems. Attack Surface Manager reveals hidden credentials and paths to critical systems so you can continuously impede attacker movement—without impeding the business.
Tags : 
attack surface, cyber hygiene, vulnerability management, vulnerabilities, network vulnerability, threat management, vulnerability assessment, network security, privileged access management, identity access management, illusive networks
    
Illusive Networks
Published By: HotSchedules     Published Date: Mar 28, 2019
Let’s just say it — inefficient restaurant employee scheduling practices can be Hell for managers. Trying to manage schedules with spreadsheets, sticky notes, missed phone calls and text messages isn’t just source of pain for your employees — it can also do more damage to your business than you might expect, including unnecessary labor spend, increased employee turnover and decreased customer satisfaction. In this eBook, we’re going to take a journey through the 9 Circles of Restaurant Employee Scheduling Hell and outline tangible paths to scheduling and labor management salvation.
Tags : 
    
HotSchedules
Published By: Group M_IBM Q2'19     Published Date: Apr 01, 2019
In Forrester's evaluation of the emerging market for conversational computing platforms, we identified the seven most significant providers — Amazon, Google, IBM, Microsoft, Nuance Communications, Oracle, and Rulai — in the category and evaluated them. This report details our findings about how each vendor scored against nine criteria and where they stand in relation to each other. Application developers should use this review to select the right partners for their conversational computing platform needs.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 08, 2019
IBM provides a security incident response (IR) solution called Resilient that helps its customers address security incidents quickly in an automated and orchestrated manner. IBM commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Resilient. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the Resilient platform on their organizations.
Tags : 
    
Group M_IBM Q2'19
Published By: MicroStrategy     Published Date: Apr 11, 2019
By 2025, the total amount of data produced will grow to 175 zettabytes, according to IDC’s Data Age 2025 Report. How will enterprises evolve over the next year to manage and make the most of this unprecedented growth? Download 10 Enterprise Analytics Trends to Watch in 2019 to learn how leading organizations will win with embedded and augmented analytics, HyperIntelligence, collaboration, enterprise AI strategies, and more. This eBook details the transformational technologies data-driven organizations will need to leverage to get and stay ahead in 2019 and beyond, with contributions from thought leaders, including: Mike Gualtieri of Forrester Research Ray Wang and Doug Henschen of Constellation Research Mark Smith and David Menninger of Ventana Research Chandana Gopal of IDC Ronald van Loon, and more. Is your organization ready for the data-driven future? Read 10 Enterprise Analytics Trends to Watch in 2019 today to find out.
Tags : 
    
MicroStrategy
Published By: Epicor     Published Date: Apr 12, 2019
As a business leader of a manufacturing company, you may be experiencing the challenges of competing in a digitally transformed marketplace. In our increasingly digital world, your ability to grow depends on how your business leverages the latest best-practice technology. Is your enterprise resource planning (ERP) system keeping pace? In this Forrester Research report—presented by Epicor Software—you’ll discover the latest insights on software as a service (SaaS) business solutions. SaaS business applications will evolve in the cloud to new levels of value in: Intelligence Flexibility Connectivity User experience The report also provides predictions and recommendations that will help guide your manufacturing business with its strategic growth initiatives. Download the report to learn more, and discover why you should change the way you think about cloud.
Tags : 
epicor erp, saas, applications
    
Epicor
Published By: Intel     Published Date: Mar 19, 2019
Digital kiosks are fast becoming ubiquitous in quick-service restaurants, cinemas and retail stores as retailers grapple to embrace automated, digital solutions to keep up with rising labour costs, customer expectations and stiff competition. To maximise the value of self-ordering kiosks, retailers should not perceive digital kiosks as a means to an end but a critical touchpoint within the customer journey. Download the whitepaper to discover how the new generation of self-order kiosks— • Can resolve the challenges of acquiring, training and maintaining a workforce • Can enhance customer experiences throughout the entire shopping and purchasing process • Can facilitate better business decision making through access to valuable customer data
Tags : 
    
Intel
Published By: Intel     Published Date: Mar 19, 2019
Fast-food giants McDonald’s, Wendy’s, Burger King amongst others, have begun deploying self-order kiosks in their respective outlets. The burning question is: “Are self-order kiosks worth the hype and what is their potential return on investment?” While the hefty upfront investment might prove to be a determent for cost-conscious F&B establishments, the evidence has shown that the initial investments would more than pay off in the long run in the form of greater revenue, reduced waiting time and even an increase in both footfall and customer-satisfaction levels. Download the whitepaper to learn how self-order kiosks— • Can help chain restaurants enjoy huge revenue growth • Can influence and alter the buying habits of consumers • Can improve customer satisfaction levels and improve footfall by eliminating language barriers
Tags : 
    
Intel
Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane, mobility management, research
    
Virtela Communications, Inc.
Published By: Infosys BPM Ltd     Published Date: Feb 12, 2019
A global infrastructure management company entered into a factoring agreement with a leading US financial institution in Australia. However, it realized that it was paying unreasonably high interest payments to the financial institution and wanted to trace the reason for the same. Infosys BPM took the initiative to analyze interest payments to the banker, and the customer payments pattern to provide insights on cost saving opportunities. Read on to know more on how did Infosys BPM help the client lead to a cash flow of $138M and also save $562,000 in factoring fees.
Tags : 
    
Infosys BPM Ltd
Published By: Recorded Future     Published Date: Apr 18, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more
Tags : 
    
Recorded Future
Published By: ASG Software Solutions     Published Date: Apr 20, 2010
Application modernization is a powerful method for extending the life and improving the business value of a company's critical application assets. It provides an attractive and cost effective alternative to application development, enabling companies to defer investment in replacement initiatives without compromising business support.
Tags : 
application modernization, forrester consulting, apo, asg, application portfolio optimization
    
ASG Software Solutions
Published By: AppAssure Software     Published Date: Jul 14, 2010
All those employees who access email, financial systems, human resources, and other core corporate applications; Replay for Exchange continuously protects and monitors the health of your Exchange data stores and allows administrators to quickly search, recover, and analyze mailbox content. With Replay for Exchange you can restore individual email messages, folders, or mailboxes to a live Exchange server or directly to a PST, thereby solving some of your most costly and time consuming challenges. Take advantage of these Free Trial Offer!!
Tags : 
appassure, sql, hyper-v, windows, vmware, replay, windows server, application server, disaster recovery
    
AppAssure Software
Published By: Astaro     Published Date: Jan 19, 2011
Botnets are based on similar principles as legitimate clouds, but serve malicious business interests. Find out more about how botnets work and the right steps after having detected infected machines within your own network.
Tags : 
astaro, cloud computing, botnets, network, security
    
Astaro
Published By: SAP     Published Date: Feb 03, 2017
To better understand the benefits, costs, and risks associated with implementation of SAP Business Objects Analytics solutions, Forrester interviewed four organizations with multiple years of experience using these analytics solutions from SAP across one or more of the following key analytics areas: planning, business intelligence, and predictive analytics. A composite, or representative, organization was developed to provide the conclusions of this cost and benefit analysis.
Tags : 
    
SAP
Published By: SAP     Published Date: Feb 03, 2017
To better understand the benefits, costs, and risks associated with implementation of SAP BusinessObjects Analytics solutions, Forrester interviewed four organizations with multiple years of experience using these analytics solutions from SAP across one or more of the following key analytics areas: planning, business intelligence, and predictive analytics. A composite, or representative, organization was developed to report cost and benefit findings
Tags : 
    
SAP
Published By: SAP     Published Date: Mar 09, 2017
In April 2016, SAP commissioned Forrester Consulting to evaluate how enterprises are taking advantage of IoT, how IoT fits into broader digital transformation initiatives, and the role of immediate insights in realizing the benefits that IoT can deliver.
Tags : 
    
SAP
Published By: SAP Hybris     Published Date: Oct 26, 2017
The Forrester Wave: B2C Commerce Suites, which identifies the top 13 B2B commerce suite providers and evaluates them on how well they meet the needs of the market.
Tags : 
    
SAP Hybris
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.