RSS feed Get our RSS feed

News by Topic

leading information

Results 1 - 25 of 47Sort Results By: Published Date | Title | Company Name
By: Cisco EMEA     Published Date: Jun 01, 2018
Collaboration, leading to innovation, leading to success. Based upon gathering together to share ideas and information. Working together as a team to bring ideas to life. And putting together a consistently reliable, secure, scalable, easy-to-use, and easy-to-integrate system to empower all of it. Cisco collaboration solutions learn as they work together with your team. Frictionless collaboration experiences make customers happy to work together with you. Work with Cisco Webex. And your teams will work better together.
Tags : cisco, collaboration, innovation, webex
     Cisco EMEA
By: SAP     Published Date: Nov 17, 2016
Culture has become one of the most important business topics of 2016. CEOs and HR leaders now recognize that culture drives people's behavior, innovation, and customer service: 82 percent of survey respondents believe that "culture is a potential competitive advantage." Knowing that leadership behavior and reward systems directly impact organizational performance, customer service, employee engagement, and retention, leading companies are using data and behavioral information to manage and influence their culture.
Tags : sap, human resources, employee, deloitte, culture
     SAP
By: SAP     Published Date: May 18, 2014
Leading companies and technology providers are rethinking the fundamental model of analytics, and the contours of a new paradigm are emerging. The new generation of analytics goes beyond Big Data (information that is too large and complex to manipulate without robust software), and the traditional narrow approach of analytics which was restricted to analysing customer and financial data collected from their interactions on social media. Today companies are embracing the social revolution, using real-time technologies to unlock deep insights about customers and others and enable better-informed decisions and richer collaboration in real-time.
Tags : sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management
     SAP
By: SAS     Published Date: Apr 16, 2015
As big data shifts away from a more theoretical concept (only adopted by those on the leading edge), the fun can really begin. How do you prepare for more information than you’ve ever collected before? How can you manage this information with the same standards you applied in the past? These are questions that are causing both IT and business sides to start actively preparing for – and implementing – big data.
Tags : 
     SAS
By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
     Proofpoint
By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
     Proofpoint
By: SambaSaftey     Published Date: Mar 15, 2019
Collaboration among compliance safety, and risk DS Services, a distributor of leading beverage brands to residential and business customers, employs more than 3,500 drivers nationwide. Tracking its drivers – and ensuring they’re qualified to be behind the wheel – isn’t easy. “Reviewing motor vehicle records (MVRs) can take weeks, as every state reports violation information differently,” says Jason Gay, DOT compliance administrator for DS Services. “I was spending 12 to 15 hours a week on paperwork alone. It was time to simplify the process.” DS Services originally turned to SambaSafety to help reduce paperwork and increase efficiency; however, by incorporating continuous driver monitoring into its safety program, DS Services is able to impact its business in . other positive ways.
Tags : 
     SambaSaftey
By: Brother     Published Date: Mar 08, 2018
The last decade has seen many exciting advances in connectivity accelerated by the near universal availability of smartphones and tablets – leading to a highly interconnected world. The security of networks - and the businesses and individuals that rely on them - has become top of mind for the IT Security professionals who are responsible for ensuring the safety of the data and the networks where this information is utilized. As high-visibility security breaches occur - affecting ecommerce, banking, retail and other industries - the critical importance of the security of the infrastructure these businesses rely on continues to grow. Security in the workplace is a daily fact of life. From using ID cards to control physical access, to entering passwords to join the network, to using software to monitor and prevent unauthorized access, all are routinely used to protect critical assets and information. However, there is one key area where many organizations still have potential vulnerabili
Tags : network security, security breaches, pci, dss, hippa
     Brother
By: HERE Technologies     Published Date: Sep 28, 2018
How do you keep people safe in a ‘once in a 1,000 years’ weather event? Hurricane Harvey was a category four hurricane which struck the coast of Texas, eastern Texas and southwestern Louisiana in August 2017. HERE was able to track the storm and accurately report more than 2,100 road closures and blockages in real-time helping people stay out of harm’s way. HERE is the world’s leading provider of traffic incident information to the automotive industry. This eBook shows how HERE’s deploys its people and artificial intelligence to gather the data, check it for accuracy and produce insights which keeps drivers safe.
Tags : 
     HERE Technologies
By: HERE Technologies     Published Date: Feb 12, 2019
How does a transport authority to provide the safest and most efficient road network possible? How does it ensure the supply of data on road closures, accidents and disruptive events used in its decision-making is of the highest quality? This ebook examines the process used by HERE Technologies to produce industry-leading traffic content. As the foremost global provider of traffic incident information, HERE is well placed to help transport authorities exceed expectations as it produces evermore precise and granular data around the incidents that impact traffic flow.
Tags : public sector, urbanization, traffic management
     HERE Technologies
By: Rosetta Stone     Published Date: Mar 22, 2012
MarketBridge, a leading global provider of sales and marketing services, surveyed 493 senior and upper management-level business professionals in a variety of functional roles at leading international corporations to learn more about their company's language-learning needs. Please download this free white paper for more information.
Tags : bilingual, human resources, rosetta stone, global human resources, business research
     Rosetta Stone
By: Dassault Systèmes     Published Date: Jul 21, 2017
Obtaining a first-mover competitive advantage or faster time-to-market requires a new wave in analytics. Dassault Systèmes remains a leading innovator in Product Lifecycle Management (PLM) and has invested heavily in analytical technologies to further drive business benefits for its customers in the related areas of planning, simulation, insight and optimization. This white paper examines the challenges peculiar to PLM and why Dassault Systèmes’ EXALEAD offers the most appropriate solution. It also clearly positions EXALEAD PLM Analytics alongside related technologies like BI, data-warehousing and Big Data solutions. Understand and implement PLM Analytics to access actionable information, support accurate decision-making, and drive performance.
Tags : product solutions, lifecycle management, tech products, data management tools, pdm, plm, process automation, product development speed
     Dassault Systèmes
By: CEB     Published Date: Oct 21, 2014
The impact of information is changing and while this change provides great opportunities, it also presents greater risks. Traditional monitoring processes and technology advancements alone no longer deliver effective identification, management, and prevention of business risks, instead the changing impact of information demands early detection and root cause analysis. Learn how leading companies are magnifying exploitation of information security risks, along with advancing identification and protection of compliance risks.
Tags : corporate executive board, ceb, legal, risk, compliance, assurance teams, audit
     CEB
By: CloudHealth by VMware     Published Date: Aug 22, 2019
Compiling a cloud services comparison is a daunting task in the rapidlyevolving cloud environment. There are thousands of cloud services, dozens of cloud service providers, and numerous Infrastructure-as-aService (IaaS) providers offering pay-as-you-go pricing models—each one frequently changing and upgrading their portfolios. We have chosen to limit our cloud services comparison to the top three IaaS providers providing service in the Western Hemisphere—Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP)—because, not only are these the IaaS providers most organizations are familiar with, they are also the IaaS providers whose services most organizations are likely to compare. This eBook provides an introduction to the range of services offered by the leading cloud service providers, information on regions and availability zones, a breakdown of cloud storage services, and more, to help inform you on your multicloud journey.
Tags : 
     CloudHealth by VMware
By: Palo Alto Networks     Published Date: Jun 09, 2014
Cybersecurity has become a leading topic both within and beyond the corporate boardroom. This attention is well-founded and marks a transition from information security being a concern primarily for businesses and governments to it being broadly acknowledged as an issue that impacts and requires the attention of everyone, from individual consumers to entire countries.
Tags : palo alto, security, network security, threats, malware, zero trust, breach, security breaches
     Palo Alto Networks
By: Amazon Web Services     Published Date: Feb 01, 2018
Machine learning is proving its power across virtually every industry in ways that add actionable insight and efficiency. But one can look at the rise of this transformative paradigm with a more focused lens to see AI technologies as a business tool of the highest order, one that improves processes and inspires new models. AI, in other words, has a big role to play on the balance sheet. Two leading brands in very different spaces — Capital One in financial services, John Deere in agriculture — are seeing efforts that stretch back decades come to fruition with the launch of cloud-based AI platforms. Capital One is developing digital products and experiences using machine learning to help millions of customers with their financial lives; John Deere’s Precision Agriculture solution helps farmers gain precise information about their machines and crops. In both instances, AI and a cloud platform combine to enable transformation.
Tags : digital, technologies, optimization, amazon
     Amazon Web Services
By: Fujitsu     Published Date: Dec 08, 2017
Join leading industry experts from Fujitsu, Salesforce and a special guest from Canon, as they share their expert insights on the future of Digital Enterprise and how manufacturing companies can accelerate their digital transformation journey. During this interactive discussion, they will: • Reveal how to identify and prioritize your critical issues; • Show how Canon Information & Imaging Solutions, is driving growth through an innovative outcome-based service model; • Demo a real-life digital transformation story; • Show how to see more, act fast, optimize, anticipate and power innovates your way to success. This webinar also features Fujitsu's unique digital transformation approach to help you understand where you are in your digital transformation journey and the actions you can take to accelerate it. Watch for this amazing webinar and a link will be sent to you via email.
Tags : fujitsu glovia, glovia enterprise planning software, digital transformation, fujitsu webinar
     Fujitsu
By: Websense     Published Date: Oct 18, 2010
Data Loss Prevention (DLP) solutions are moving targets. They keep changing to meet evolving regulatory requirements and business needs. It's tough to select the best DLP solution. This white paper from leading information security research firm Securosis gives you an overview of the DLP industry, technologies, and architectures.
Tags : websense, dlp, data loss prevention, securosis, security, data management, testing
     Websense
By: OKTA     Published Date: Oct 23, 2017
As organizations and workplaces evolve, less control is exercised over devices, services, and people, leading to a gap with traditional security tools. Identity not only becomes the critical control point, but the information stemmed from it can be leveraged to strengthen existing processes as well as integrate with other security investments. Join this webinar to learn why identity isn’t simply just a "first step" but also the foundation modern security should be built on. Then explore what characteristics a strong authentication solution should include as we demo Okta’s Adaptive MFA solution.
Tags : 
     OKTA
By: LogMeIn     Published Date: Jan 15, 2014
With this whitepaper, you will be given tips on global solution for audio and web conferencing at an affordable price with meetings being hassle-free.
Tags : logmein, getronics, leading information, communications technology, integrated itc services, public sector markets, global conferencing, collaboration tool
     LogMeIn
By: McAfee     Published Date: Oct 28, 2014
Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Vendors are improving threat intelligence and security analytics. Read this report from leading analyst firm Gartner, to learn why they have placed McAfee as a Leader in the Magic Quadrant for Security Information and Event Management.
Tags : siem, mcafee enterprise security manager, gartner, magic quadrant, threat management, collect, store, forensics and regulatory compliance
     McAfee
By: MuleSoft     Published Date: Jan 16, 2018
Every company today is a software company and, as a result, business and technology strategies ought to be very intertwined. But often, those strategies aren’t in alignment, leading to challenges in information technology. And in today’s hyper-competitive business environment, that can be disastrous. Companies have to ask themselves: How can we tackle challenges of information technology? Are we doing IT wrong? Today’s CIOs are the key players who enable organizations to respond to the disruptive forces and information technology challenges impacting all industries — mobile, IoT, and SaaS among others. In order to increase speed and agility there must be a strong partnership between IT and the rest of the business. Read this e-book to learn: Why we have been doing IT wrong, and how putting culture first and technology second, valuing reuse, and leveraging KPIs can push CIOs to the right direction. How IT teams can address their delivery gap and increase project delivery speed by ado
Tags : 
     MuleSoft
By: MuleSoft     Published Date: Nov 27, 2018
Every company today is a software company and, as a result, business and technology strategies ought to be very intertwined. But often, those strategies aren’t in alignment, leading to challenges in information technology. And in today’s hyper-competitive business environment, that can be disastrous. Companies have to ask themselves: How can we tackle challenges of information technology? Are we doing IT wrong? Today’s CIOs are the key players who enable organizations to respond to the disruptive forces and information technology challenges impacting all industries — mobile, IoT and SaaS among others. In order to increase speed and agility there must be a strong partnership between IT and the rest of the business. Read this eBook to learn: Why we have been doing IT wrong and how putting culture first and technology second, valuing reuse and leveraging KPIs can push CIOs to the right direction. How IT teams can address their delivery gap and increase project delivery speed by adoptin
Tags : 
     MuleSoft
By: Marketo     Published Date: Feb 11, 2019
Lead generation has become an important strategy for modern marketers, as they strive to create demand and get their messages heard by increasingly sophisticated, multi-channel buyers. In today’s complex world, marketers should use lead generation to build brand awareness, nurture prospects and customers, qualify leads, and ultimately generate measurable revenue. In this comprehensive, 160 page guide, we cover topics ranging from content marketing and website SEO to telesales and content syndication — all through the lens of lead generation. Packed full of checklists, charts, and thought leadership from the leading experts in marketing today, TheDefinitive Guide to Lead Generation will teach you how to collect information from prospects across every channel, and deliver the highest quality leads to your sales team. ResizedImage389253 dog with laptop lead generation You’ll learn how to: Define a lead and understand his or her buying journey Build a robust lead generation strategy t
Tags : 
     Marketo
By: Marketo     Published Date: Dec 12, 2016
In this comprehensive, 160 page guide, we cover topics ranging from content marketing and website SEO to telesales and content syndication — all through the lens of lead generation. Packed full of checklists, charts, and thought leadership from the leading experts in marketing today, TheDefinitive Guide to Lead Generation will teach you how to collect information from prospects across every channel, and deliver the highest quality leads to your sales team.
Tags : marketo, mareting, lead generation, leads, marketers, emerging marketing, marketing research, traditional marketing
     Marketo
Previous   1 2    Next    
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics