industry

Results 226 - 250 of 2252Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Sep 03, 2019
The attacks and tools being used against financial services organizations are part of a complex ecosystem. This may seem like an obvious statement at first glance. When you read most industry reports, they tend to focus on a single aspect of the whole ecosystem, as if it were unrelated to other types of attacks. To be honest, we’ve been just as guilty of having a myopic view of attack traffic as anyone else. We wanted to do something different for this report. Instead of looking at a single type of attack, we stepped back to look at attacks against banks, credit unions, trading companies, and other organizations that make up financial services as a whole. Most defenders only see a very small segment of the overall traffic, whether they’re the target or the vendor supplying defensive tools. The breadth of Akamai’s products and our visibility into a significant portion of Internet traffic allows us to research multiple stages of the attack economy.
Tags : 
    
Akamai Technologies
Published By: Dun & Bradstreet     Published Date: Mar 03, 2017
Creating predictive analytics from alternative data has become the current focus of the biggest quant trading firms in the industry The democratization of financial services data and technology, together with more intense competition, makes the needs of today’s market participants vastly different from those of previous generations. Firms must locate untapped sources of data for both public and non-public companies. This alternative data, such as payment data and other non-public information, from sources beyond the common channels, can be a predictive indicator of market performance; a difference maker in assisting firms as they develop models to evaluate their investments. By combining our unique data sets with advanced analytics, traders, analysts and managers can seek predictive signals and actionable information utilizing their own models. View our research report to learn how alternative data, our 'Information Alpha,' can help you earn differentiated investment returns.
Tags : 
    
Dun & Bradstreet
Published By: Aventri     Published Date: Apr 11, 2019
"Quite a lot has happened since the first edition of The Future of Event Marketing. The second edition of The Future of Event Marketing will help you navigate through the overarching trends in our industry today. We are introducing a new wealth of quantitative and qualitative research as well as an update on our tools section, looking back at what is still relevant in 2019 and what will be relevant going forward. Download the latest guide today!"
Tags : 
    
Aventri
Published By: VMware     Published Date: Sep 12, 2019
cloud is no longer an option — it’s inevitable. But cloud strategies differ extensively, based on the context of your organization and investments. drivers such as industry, risk tolerance, and preparation dictate the pace, scope, and technologies you need. However, every cloud strategy should share key activities. This report guides infrastructure and operations (i&O) pros through forrester’s cloud maturity assessment so they can gauge where their firms are on their journeys and discover which core competencies they need to strengthen or develop to enable their pragmatic cloud reality. This is an update of a previously published report; forrester reviews and revises it periodically for continued relevance and accuracy.
Tags : 
    
VMware
Published By: VMware     Published Date: Sep 12, 2019
It’s time to acknowledge that the tech industry has failed our customers when it comes to cybersecurity and data protection.
Tags : 
    
VMware
Published By: Akamai Technologies     Published Date: Dec 07, 2016
Many industry experts advise financial services institutions (FSIs) to embrace digital transformation. At the heart of that mandate is the need to satisfy rising customer expectations for fast, secure, always-on services delivered seamlessly across all channels and devices. While it’s important to harness the digital technologies today’s customers turn to — especially when it comes to engaging the millennial generation — FSIs need to optimize web and mobile performance to deliver exceptional end-user experiences. Here are eight considerations. Get started on your journey – download the whitepaper today
Tags : 
online banking service, online banking services, online banking application, online banking applications, online banking app, online banking apps, financial services it, online banking solutions, digital transformation, digital disruption, infrastructure, cloud security, ddos, security breaches, web application security, cyber threats, cyber security, cloud applications
    
Akamai Technologies
Published By: Oracle     Published Date: Feb 28, 2018
So, while the advertising industry is in the midst of profound change, it’s hard to be certain about the form that it will take in future. There’s good reason to be optimistic, rather than pessimistic. Firstly, as we saw earlier, the proliferation of digital platforms means that there are now more canvases for creativity than ever before. And secondly, recent discoveries in psychology and behavioural science have highlighted how human decision making – in any context – is often unconscious or non-rational. As a result, the range of problems where creative communication can offer a solution is wider than ever previously realised.
Tags : 
    
Oracle
Published By: SAP     Published Date: Sep 19, 2017
Everything is changing in retail. Stores are becoming an omni channel experience; fulfilment and service centers and smart showrooms are enabling endless-aisle commerce. eCommerce and mobile customer experiences are changing retail, as retailers are now entering the third generation of ecommerce, in which IDC identifies eight core capabilities at the heart of the transformation of key operating models. Omni-channel fulfilment practices and new merchandise planning archetypes are emerging to drive profit, and retail technology is fundamentally changing, as digital transformations take shape in the industry. Websites, smartphones, the Internet of Things (IoT), and wearables change customers and their journeys, while 3D printing changes value chains and products, while IoT changes products, stores, and logistics, and artificial intelligence (AI), probably the most pervasive agent of change, will underpin new levels of customer individualization and workforce efficiencies.
Tags : 
business models, innovation, omni channel, ecommerce, commerce platform, retail
    
SAP
Published By: SAP     Published Date: Sep 28, 2017
Everything is changing in retail. Stores are becoming an omni channel experience; fulfilment and service centers and smart showrooms are enabling endless-aisle commerce. eCommerce and mobile customer experiences are changing retail, as retailers are now entering the third generation of ecommerce, in which IDC identifies eight core capabilities at the heart of the transformation of key operating models. Omni-channel fulfilment practices and new merchandise planning archetypes are emerging to drive profit, and retail technology is fundamentally changing, as digital transformations take shape in the industry. Websites, smartphones, the Internet of Things (IoT), and wearables change customers and their journeys, while 3D printing changes value chains and products, while IoT changes products, stores, and logistics, and artificial intelligence (AI), probably the most pervasive agent of change, will underpin new levels of customer individualization and workforce efficiencies.
Tags : 
business models, innovation, omni channel, ecommerce, commerce platform, retail
    
SAP
Published By: SAP     Published Date: Sep 28, 2017
Everything is changing in retail. Stores are becoming an omni channel experience; fulfilment and service centers and smart showrooms are enabling endless-aisle commerce. eCommerce and mobile customer experiences are changing retail, as retailers are now entering the third generation of ecommerce, in which IDC identifies eight core capabilities at the heart of the transformation of key operating models. Omni-channel fulfilment practices and new merchandise planning archetypes are emerging to drive profit, and retail technology is fundamentally changing, as digital transformations take shape in the industry.
Tags : 
business models, innovation, omni channel, ecommerce, commerce platform, retail
    
SAP
Published By: EMC Converged Platforms     Published Date: Jan 27, 2016
In the spring of 2015, the IDC organized a study on the business value Vblock systems bring VCE customers. The organizations that took part in this study ranged from 400 employees to 200,000 employees, with an average employee count of 27,113. These organizations represent a wide array of industries and countries. The results of this study were published in the VCE-sponsored IDC white paper entitled, “The Business Value of VCE Vblock Systems: Leveraging Convergence to Drive Business Agility, May 2015”. This report identifies the challenges faced by financial services industry today and how VCE’s Vblock Systems are being used to address them.
Tags : 
vce, vblock systems, idc analysis, innovation, customer experience, it solutions, financial benefits, security, it management, wireless, enterprise applications, data management, business technology
    
EMC Converged Platforms
Published By: EMC Converged Platforms     Published Date: Jan 27, 2016
In the spring of 2015, IDC organized a study on the business value Vblock systems bring VCE customers. The organizations that took part in this study ranged from 400 employees to 200,000 employees, with an average employee count of 27,113. These organizations represent a wide array of industries and countries. The results of this study were published in the VCE-sponsored IDC white paper entitled, “The Business Value of VCE Vblock Systems: Leveraging Convergence to Drive Business Agility, May 2015”. This report discusses how Vblock Systems empowers IT teams to move quickly and more flexibly.
Tags : 
vce, vblock systems, it management, it solutions, oil and gas industry, innovation, customer experience, financial benefits, business solutions, networking, software development, knowledge management, enterprise applications, data management, business technology
    
EMC Converged Platforms
Published By: Dell     Published Date: Nov 09, 2017
Dell’s approach to PC Lifecycle management is designed to help customers make the change from IT maintenance to innovation all while controlling their PC infrastructure costs. With this eGuide IT professionals will learn how to deploy, secure, and support PCs with unparalleled efficiency leveraging Dell’s industry-leading hardware, services, and security solutions. Access the eGuide from Dell and Intel® and you will learn: • Why IT needs to take a different approach PC lifecycle management • The four critical stages of the PC lifecycle (Plan, Deploy, Manage, and Retire) • How to partner with Dell to strategically migrate to Windows 10 • What solutions can help in each phase to reduce costs and increase IT productivity • The latest security solutions to protect data and employees Intel Inside®. Powerful Productivity Outside. Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell
Published By: 3D Systems     Published Date: May 15, 2019
3D printing emerged as a prototyping technology in the 1980s, and has been rapidly evolving ever since. The ongoing developments of the last few decades have transformed 3D printing (also called additive manufacturing), into a viable and cost-effective technology throughout the production environment: from prototyping, to production enablement, to direct 3D production. Companies that utilize 3D printing can attain and cement a leadership position in their industry through the time, cost, and capability advancements 3D printing makes possible. This ebook provides an overview of the 3D printing technology and material advancements in 3D Systems’ plastic additive manufacturing that extend the addressable range of production applications.
Tags : 
    
3D Systems
Published By: Sage EMEA     Published Date: Jan 29, 2019
Sage pays close attention to what your business demands For nearly 40 years, Sage has followed through on its founding commitment: Making sure we deliver what our customers need. That dedication has helped us become one of the world’s largest suppliers of enterprise management solutions, used by more than 3 million businesses of all types and sizes around the world. Sage helps drive today’s business builders with a new generation of solutions to manage everything from money to people wherever they’re needed, offering the freedom to work with mobility. Above all else, we’re driven to satisfy our customers and keep them coming back. That commitment has paid off. We beat SAP (19), Oracle (25) and Microsoft (34) with our Net Promoter Score (NPS)—a respected customer-satisfaction, customer-experience, and loyalty indicator widely used by Fortune 500 companies. The industry NPS average is 31.75, meaning we are 58% better than the average, and 88% above our closest competition. It shows t
Tags : 
    
Sage EMEA
Published By: Cisco     Published Date: Sep 14, 2017
Businesses are battling immense competitive pressures. In order to succeed—or even survive—they must rapidly adapt to constantly changing environments, in every industry and sector.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Sep 21, 2017
Businesses are battling immense competitive pressures. In order to succeed—or even survive—they must rapidly adapt to constantly changing environments, in every industry and sector. What does this mean for IT leaders? Transformation, on all fronts. Download this whitepaper to find out the benefits of Cisco ASAP Data Center Architecture.
Tags : 
it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits, user authentication
    
Cisco
Published By: NetApp     Published Date: Dec 05, 2016
See how IT professionals in your industry are leveraging automation in the next generation data center. Download The Storage Automation Report to find out: - 300 IT professionals' drivers behind storage automation and the benefits they've realized - How the rise of the DevOps approach has fueled the need for automation at the storage layer - Preferences around storage management plug-ins and software development kits
Tags : 
    
NetApp
Published By: ClickSoftware     Published Date: Nov 17, 2014
From calculator watches to smart glasses, this paper will guide you through the evolution of wearable technology and its impact on the service industry. This whitepaper will help you to understand how your business can benefit by getting ahead of the trend through implementing wearable technology within your organisation.
Tags : 
shift scheduling, wearable technology, the evolution of wearable technology, byow, it management, business technology
    
ClickSoftware
Published By: IBM APAC     Published Date: May 18, 2017
According to industry analyst IDC, the mean cost of an hour of downtime can range from USD 224,952 to USD 1,659,428, depending on the size of your organization.1 And each instance of downtime increases your total cost of ownership (TCO) and eats away at your IT budget.
Tags : 
tco, idc, ibm, cloud, mobile, hardware
    
IBM APAC
Published By: Entrust Datacard     Published Date: Apr 26, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). The integrity of the CA and the extended services offered through a certificate management platform (CtaaS) can produce a truly secure IT environment for website transactions according to industry analysts, Frost & Sullivan, in their in-depth analysis, SSL/TLS Certificates Market, Finding the Business Model in an All Encrypt World. Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions. In this condensed report, catch the highlights of current industry trends and the ever important need to secure your server with a reputable CA.
Tags : 
    
Entrust Datacard
Published By: MicroStrategy     Published Date: Aug 12, 2012
MicroStrategy Mobile Apps are transforming the Retail Industry by providing unprecedented insights into store operations,inventory,and customer satisfaction.
Tags : 
microstrategy, mobile, apps, retail, business technology
    
MicroStrategy
Published By: MicroStrategy     Published Date: Aug 12, 2012
A panel of industry experts, including Steve Cornett, Director of Enterprise Information Services with Lowe's Companies, Inc.,
Tags : 
microstrategy, mobile, steve cornett, lowe's, roi, business technology
    
MicroStrategy
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
"While free Wi-Fi is ubiquitous in airports, coffee shops, hotels, and other highly trafficked areas, this service is no longer unique to these locales. Guest Wi-Fi is now expected in nearly every industry – but how do you deliver Wi-Fi while enforcing acceptable use policies and meeting compliance regulations? Dive into the requirements for Wi-Fi security by consulting this brief resource today. Inside, find five essential recommendations to help you make Wi-Fi security your business reality – read on to get started now."
Tags : 
free wi-fi, security, acceptable use
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Data breaches have become a fact of life for organizations of all sizes, in every industry and in many parts of the globe. While many organizations anticipate that at some point a non-malicious or malicious data breach will occur, the focus of this study is to understand the steps organizations are taking—or not taking--to deal with the aftermath of a breach or what we call the Post Breach Boom. Sponsored by Solera Networks, The Post Breach Boom study was conducted by Ponemon Institute to understand the differences between non-malicious and malicious data breaches and what lessons are to be learned from the investigation and forensic activities organizations conduct following the loss or theft of sensitive and confidential information. The majority of respondents in this study believe it is critical that a thorough post-breach analysis and forensic investigation be conducted following either a non-malicious or malicious security breach.
Tags : 
data, non-malicious, malicious, ponemon, solera network
    
Blue Coat Systems
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.