RSS feed Get our RSS feed

News by Topic

act

Results 13651 - 13675 of 13993Sort Results By: Published Date | Title | Company Name
By: LogRhythm     Published Date: Jun 19, 2018
Every year, organizations spend millions of frustrating hours and countless sums of money trying to reverse the damage done by malware attacks. The harm caused by malware can be astronomical, going well beyond intellectual property loss and huge fines levied for non-compliance. In 2014, the cost of malware attacks and resulting breaches was estimated at $491 billion. i And these costs include more than just the money spent trying to directly respond to security breaches. Productivity, long-term profitability, and brand reputation are often severely impacted as well. The malware threat is growing larger and becoming more challenging to respond to every year. It seems like every month there are more major breaches. Target, Neiman Marcus, and UPS have all been victims of costly breaches in the past couple years, with each event showing signs that the breaches could have been prevented. Phishing-based malware was the starting point 95 percent of the time in state-sponsored attacks, and 67
Tags : hack, malware, intellectual, property, compliance
     LogRhythm
By: CA Technologies     Published Date: Jul 19, 2017
• Digital transformation is essential in the modern software factory, and mainframes are mission-essential elements in many industries, including, finance, transportation, insurance and others • The industry is adopting agile and DevOps practices throughout IT to increase business agility • Explore the potential for DevOps in your organization, told from a mainframer’s point of view
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Jul 19, 2017
• Bringing DevOps to Mainframe enables organizations to increase business agility and sustain innovation velocity • CA solutions deliver DevOps for the mainframe and support agile development, continuous testing, continuous delivery and agile operations
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 24, 2017
Pour gérer votre IT de manière professionnelle, vous avez besoin d’outils qui vous permettent de garantir la fiabilité de vos services de manière proactive, tout en renforçant votre agilité opérationnelle. Cela implique d’opter pour une nouvelle approche de la gestion de l’infrastructure IT et de sélectionner un fournisseur de solutions de gestion de l’infrastructure qui soit en mesure de répondre à vos nouvelles exigences IT et métier.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Jun 01, 2018
Thanks to numerous, headline-making incidents in recent years, cybercrime has risen toward the top of the concern list for many organizations—and the customers with whom they do business. You’ve heard many of the stories. Major health insurers, such as Anthem, Premera BlueCross and CareFirst had personal information for millions of their customers stolen. Sony Pictures experienced a breach that not only embarrassed employees and adversely impacted the release of the high-profile film, “The Interview,” but also damaged systems and applications—making it extremely difficult for the company to conduct business. The list goes on. Some you maybe haven’t heard, like the one about CodeSpaces, a provider of version management services to developers. When attackers were able to gain access to its cloud-based management consoles, they deleted the company’s entire infrastructure and backups—ultimately forcing CodeSpaces out of business. The bad news for organizations like yours is, thanks to the
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Jun 01, 2018
Within any organization, the most dangerous users are those with privileged access to the company’s most valuable and sensitive data assets. This includes systems administrators, business managers, partners, suppliers, and service providers, and also takes into account the automated interactions between business machines, systems, and applications. Privileged access has always been a high-risk issue, but for too long, organizations have not understood or have chosen to ignore the risks, preferring instead to rely on the integrity of the individuals and systems involved. A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solution
Tags : 
     CA Technologies
By: Zendesk     Published Date: Jun 26, 2018
In the global market for customer service software, Zendesk is once again recognized as a leader in the 2018 Gartner Magic Quadrant for the CRM Customer Engagement Center. Every year, Gartner conducts a thorough analysis of service providers in the customer service and support application space. We believe the Gartner Magic Quadrant for the CRM Customer Engagement Center report provides valuable information for business leaders who seek technology solutions for interacting and engaging with their customers. Zendesk can again be found in the 2018 report’s Leader quadrant, which we consider a reflection of the success of our 125,000 customers, including enterprise clients like Airbnb, Tesco, and the University of Tennessee. The past year alone has included a number of significant milestones for us, including the release of AI-enhanced features for self-service and surpassing $500 million run rate in revenue. As our customer base continues to grow, we strive to be a dynamic vendor for bus
Tags : 
     Zendesk
By: Determine (Selectica)     Published Date: Sep 13, 2016
Budgeting is one of the main aspects within your control to influence profits and avoid maverick spend. Budgeting and planning help your organization invests resources to best benefit, based on cautious consideration rather than the urgency to make a short-term decision. Budgets are essential to sustain your company’s economic growth and implementing best practices will guarantee a bright future to your company.
Tags : 
     Determine (Selectica)
By: Determine (Selectica)     Published Date: Sep 13, 2016
The sponsor named below commissioned Ardent Partners to write this report. While the report topic In 2015, collaboration is the name of the game in procurement and frequently entails working with key internal stakeholders (like line-of-business managers and legal departments) or preferred suppliers to drive greater value through sourcing and procurement. For Chief Procurement Officers ("CPOs") and other supply management leaders, collaboration has taken on many new and innovative forms over the years, causing these executives to leverage new (and, in some cases, existing) processes, relationships, and technologies to enhance compliance, decrease risk, and increase savings. One such business process, contract management, has been reborn with digital, automated features that can shift the way procurement teams collaborate, mitigate risk, drive performance, and realize greater savings for the enterprise.
Tags : 
     Determine (Selectica)
By: Evariant     Published Date: Apr 09, 2018
If you're going to commit to providing the highest quality care to patients, improving the customer experience and providing proactive service that builds lifetime relationships with patients is a requirement. By creating a comprehensive 360 view of the caller, agents are armed with the right context and talking points to provide a highly personalized, more informed experiences on-the-fly. Watch this presentation to capitalize on every customer interaction to build deeper, more personalized relationships with their prospects and existing patients, effectively transforming the call center into a profit center. Watch the presentation now.
Tags : patient experience, call center, improved care continuum, access center, customer experience, patient journey
     Evariant
By: Evariant     Published Date: Jul 02, 2018
When call center agents don’t have access to an EMR, consumer demographic, sociological and other data, nor an understanding of marketing campaigns, agents are inefficient, reactive and unable to personalize interactions with patients and consumers. The disjointed call center experience harms the health system’s ability to find, guide, and keep patients for life. The call center is often the first touch for many prospective healthcare customers, and Scripps Health recognized these challenges. They made the pivot from call center as cost center to strategic lynch pin in their patient experience strategy. Call center agents are now delivering a world-class patient experience as they provide physician referrals, take class registrations, and serve as a clearing house for general information . An added bonus of the shift is they can now integrate outbound calling into campaign efforts, and measure the full impact of marketing efforts and strengthen marketing’s ROI. Get your free copy of
Tags : call center, conversions, health, proactive
     Evariant
By: Xactly Corp     Published Date: Sep 16, 2016
At the corporate level, buying software of any sort can be an overwhelming and time consuming process. There are various vendors to consider, different features to prioritize, and the need to align decision-makers across multiple departments in order to come to a conclusion. It can be especially tricky to navigate if you are selecting a vendor for a job previously accomplished without software.
Tags : sales compensation, sales compensation software, incentive compensation software, sales commission, sales payout, sales technology, sales best practices, sales performance management
     Xactly Corp
By: Adobe     Published Date: Sep 28, 2016
Marketers shouldn’t work in the dark. The science of online testing shines a light on your marketing, showing you what to optimize throughout the entire customer journey. The new Adobe guide, Finding Eureka, shows you how. Read the guide to learn: - Strategies and best practice approaches to online testing - Incremental steps to improving your online testing - The benefits of different test types including A/B, A/Bn, multivariate, and multichannel
Tags : adobe, marketing, marketers, market research, emerging marketing, marketing research, traditional marketing
     Adobe
By: DellEMC and Intel®     Published Date: Sep 25, 2017
L’optimisation des infrastructures IT par des serveurs de pointe et régulièrement actualisés permet aux organisations d’améliorer l’agilité, d’augmenter l’efficacité et de réduire les OPEX. La gamme Dell EMC PowerEdge, équipée des processeurs Intel® Xeon® Platinum, offre plus d’automatisation, d’évolutivité et de sécurité pour s’assurer que les infrastructures IT fonctionnent au maximum. En savoir plus sur la nouvelle génération de serveurs PowerEdge. Des options de financement souples sont disponibles auprès de Dell Financial Services. Processeur Intel® Xeon® Intel Inside® pour une productivité exceptionnelle. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : ultrabook, celeron, celeron inside, core inside, intel, le logo intel, intel atom, intel atom inside
     DellEMC and  Intel®
By: DellEMC and Intel®     Published Date: Sep 25, 2017
Une transformation fondamentale englobant le personnel, les processus et la technologie permet aux entreprises de rester compétitives dans l’économie d’aujourd’hui, basée sur l’innovation. Des initiatives telles que la sécurité avancée, les services de détection des fraudes, l’Internet des objets (IoT) avec ses consommateurs connectés, l’expérience de réalité virtuelle ou augmentée, l’apprentissage machine et approfondi et les applications cognitives optimisent les avantages pour l’entreprise comme la maintenance et le marketing prédictifs. Processeur Intel® Xeon® Intel Inside® pour une productivité exceptionnelle. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : ultrabook, celeron, celeron inside, core inside, intel, le logo intel, intel atom, intel atom inside
     DellEMC and  Intel®
By: DellEMC and Intel®     Published Date: Sep 25, 2017
Grâce à une actualisation menée au bon moment, l’informatique peut éviter l’augmentation significative des coûts d’exploitation d’un serveur entre 4 et 6 ans après l’installation, tout en bénéficiant de meilleurs niveaux de performance et d’agilité. En effet, dans la période comprise entre la 4e et la 6e année de la vie d’un serveur, les coûts d’exploitation représentent jusqu’à 10 fois son coût initial d’achat. Processeur Intel® Xeon® Intel Inside® pour une productivité exceptionnelle. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : ultrabook, celeron, celeron inside, core inside, intel, le logo intel, intel atom, intel atom inside
     DellEMC and  Intel®
By: DellEMC and Intel®     Published Date: Sep 25, 2017
Les serveurs Dell EMC PowerEdge, optimisés par la gamme de processeurs Intel® Xeon® Platinum, offrent des performances plus fiables pour la virtualisation, l’IT convergée, le Cloud hybride et le Big Data. Optimisez l’automatisation, l’évolutivité et la sécurité grâce à la mise à niveau vers la nouvelle génération de serveurs PowerEdge. Des options de financement souples sont disponibles auprès de Dell Financial Services. Processeur Intel® Xeon® Intel Inside® pour une productivité exceptionnelle. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : ultrabook, celeron, celeron inside, core inside, intel, le logo intel, intel atom, intel atom inside
     DellEMC and  Intel®
By: DellEMC and Intel®     Published Date: Sep 25, 2017
By refreshing servers in a timely fashion, IT can avoid operating costs that increase significantly in years 4-6 of a server’s life span while benefiting from improved performance and agility. In fact, operating costs in years 4-6 of a server’s life span increase to 10x the cost of the initial server acquisition cost. Procesador Intel® Xeon® Intel Inside®. Produtividade poderosa no exterior. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : ultrabook, celeron, celeron inside, core inside, intel, el logotipo de intel, intel atom, intel atom inside
     DellEMC and  Intel®
By: DellEMC and Intel®     Published Date: Oct 18, 2017
By refreshing servers in a timely fashion, IT can avoid operating costs that increase significantly in years 4-6 of a server’s life span while benefiting from improved performance and agility. In fact, operating costs in years 4-6 of a server’s life span increase to 10x the cost of the initial server acquisition cost. Intel Inside®. New Possibilities Outside. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside
     DellEMC and  Intel®
By: Palo Alto Networks     Published Date: Sep 30, 2016
Great thinkers like Aristotle, Descartes and Elon Musk have said that, in order to solve really hard problems, you have to get back to first principles. First principles in a designated problem space are so fundamental as to be self-evident; so true that no expert in the field can argue against them. They are atomic. Experts use them like building blocks to derive everything else that is worth knowing in the problem domain. In this paper, I propose that the first principle for all network defenders is to prevent high-risk material impact to the organization.
Tags : palo alto, network defenders, security practitioners, security
     Palo Alto Networks
By: Palo Alto Networks     Published Date: Sep 30, 2016
While few corporate executives and boards of directors would dispute the importance of cybersecurity, some may feel ill-prepared to begin the process of managing these risks given the myriad technical and non-technical elements of the issue. The goal of this document is to address this gap by providing corporate leaders a practical framework for addressing the people, process, and technology elements of the cybersecurity challenge
Tags : palo alto, security framework, security, business leaders, digital
     Palo Alto Networks
By: CBRE     Published Date: Aug 02, 2017
Reasonable, common-sense security standards are becoming law in many regions of the world. In Europe, the General Data Protection Regulation (GDPR), enacted in April 2016, will become fully applicable on May 25, 2018. GDPR will bring the European Union (EU) under one comprehensive and harmonised legal system for data protection and privacy. The monetary penalties and reputational damage of noncompliance with GDPR are substantial – the maximum fines are the greater of 20 million euros or 4% of the company’s worldwide revenue.
Tags : 
     CBRE
By: CBRE     Published Date: Aug 02, 2017
This three-part video blog series is my perspective on Microsoft’s strategy, the evolution of Microsoft Intune, and the critical role MobileIron plays in a Microsoft shop. My opinions are based on publicly available and third-party data plus my analysis of Microsoft’s actions. Part I of this series gives an overview of Microsoft’s strategy, and Part II provides a high-level comparison of MobileIron and Microsoft Intune.
Tags : microsoft strategy, mobileiron, data analysis, video blog
     CBRE
By: Veracode     Published Date: Oct 26, 2016
When a high-profile, or simply branded, vulnerability is disclosed, security teams are expected to abandon their planned activities and react. But, these responses can be time-consuming and costly. Even if the vulnerability is achieving mainstream awareness, enterprises need to balance responses against risk. Download this handy report for guidance on preparing for a high-profile vulnerability disclosure so risk-management or security teams can respond with the appropriate level of urgency.
Tags : veracode, security, vulnerability, high-profile vulnerability disclosure, vulnerability disclosure
     Veracode
By: Veracode     Published Date: Oct 26, 2016
20% of enterprises have suffered a security incident related to a business application or IT service consumed from external partners. With breaches like these making headlines, and enterprises’ growing reliance on third-party software, security of the cyber supply chain will garner increased attention. Download this joint Veracode/Enterprise Strategy Group (ESG) report to explore enterprises’ challenges in securing their cyber supply chain and get best practices for ensuring that every application – regardless of its origin – is secure.
Tags : veracode, security, supply chain security, web applications, application security
     Veracode
Start   Previous    540 541 542 543 544 545 546 547 548 549 550 551 552 553 554    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics