tech

Results 1 - 25 of 7459Sort Results By: Published Date | Title | Company Name
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
The SecureWorks Security and Risk Consulting practice provides expertise and analysis to help you enhance your security posture, reduce your risk, facilitate compliance and improve your operational efficiency.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
Secureworks ABM UK 2017
Published By: Entrust Datacard     Published Date: Sep 28, 2016
This guide describes the technical and business impact of SHA-1 migration as it pertains to SSL certificates only. It will outline a recommended migration path to minimise the cost and operational impact of replacing affected SSL certificates.
Tags : 
security, security application, ssl, ssl certificates, sha
    
Entrust Datacard
Published By: G Suite     Published Date: Jun 28, 2016
Now you can experience the ease and flexibility of open, collaborative tools while gaining better protection for your data. As Google security experts and customers share their vision for a safer Internet, discover how Google’s innovative security technology meets the unique challenges of working and living in the cloud.
Tags : 
    
G Suite
Published By: uberVU via HootSuite     Published Date: Jan 17, 2014
Customers now expect the same level of service on social media from financial firms, insurance providers, and other regulated enterprises as they receive from technology and retail companies. But without the right compliance controls in place, your organization could violate customer privacy rules and other regulatory guidelines. Are you taking the right steps to ensure compliance?
Tags : 
compliance, social media, social media management, enterprise, hootsuite
    
uberVU via HootSuite
Published By: Adobe     Published Date: Jan 20, 2017
?De nos jours, les clients échappent à vos systèmes de gestion de la relation client (CRM) et aux technologies de suivi du parcours de navigation qui vous permettaient de les suivre. Ils naviguent désormais de device en device et de canal en canal, imprévisibles et souvent anonymes. Ils se sont également éloignés de l’entonnoir des ventes, qui autrefois les conduisait lentement mais sûrement de la découverte à l’achat.
Tags : 
    
Adobe
Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
IASIS Healthcare LLC executives challenged the Arizona-based supply chain team to find innovative ways to manage inventory and reduce cost. Targeting areas with some of the most expensive supplies—catheterization laboratories and interventional radiology (IR)rooms—the team sought a new way to drive down costs while still providing a wide variety of products, offering patients innovation and high quality, and maintaining physician satisfaction. Read this case study to learn how Arizona Hospitals use STANLEY Healthcare's SpaceTRAX® Point of Use™ Inventory Management System to overcome the challenges of managing inventory in Cath Labs and IR Rooms.
Tags : 
inventory management, healthcare, cath labs, ir room, supply chain, cost reduction, physician satisfaction, medical technology
    
STANLEY Healthcare
Published By: Pega     Published Date: May 24, 2016
Millennials are different than any other generation before them. They are making major decisions later in life—from choosing a career, getting married, buying a home and yes, investing in life insurance. And while they are more tech savvy than their predecessors and want to make purchasing from any device of their choosing, they still value face-to-face interaction, contrary to popular belief. Insurance and financial companies need to understand the unique dynamics of the millennial generation in order to better service and exceed expectations of this growing consumer base. They need to meet their tech-savvy expectations, while also understanding Millennials still value one-to-one attention. In fact, 48% of Millennials said they would be more likely to make a speedy financial or insurance-related decision if a person who they trusted took the time to explain the benefits and risks. Download this whitepaper and learn how to better tap into the growing millennial market.
Tags : 
    
Pega
Published By: OKTA     Published Date: Sep 26, 2017
Traditional web applications pre-date modern standards like SAML and OpenIDConnect, so they often use legacy authentication methods to grant end users access. Historically, providing Single Sign-On and centralized access management for end users across these legacy applications required a Web Access Management, or WAM, product. These on-premises software tools could be expensive to maintain and complex to deploy. Now, modern identity providers like Okta in conjunction with best-of-breed network management technologies offer a better way. This white paper describes how web applications that lack modern standard support can be integrated into a cloud-based Identity-as-a-service architecture.
Tags : 
    
OKTA
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
Cloud technology has changed everything—it has been one of the biggest transitions in the IT industry over the past three to four decades. Today’s customers require greater agility and faster innovation, and need the flexibility to run their workloads both in the public cloud and on premises with a predictable and transparent IT cost structure. Learn more in this new mini digi book. (Digital awareness asset/.pdf of value proposition for OCM and new Oracle Exadata Cloud Machine)
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Technical Tests are designed to cover specific services. Each security test has its own objectives and acceptable levels of risk. There is not an individual technique that provides a comprehensive picture of an organisation’s security when executed alone. A qualified third party can work with you to determine what combination of techniques you should use to evaluate your security posture and controls to begin to determine where you may be vulnerable.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
Secureworks ABM UK 2017
Published By: Dassault Systèmes     Published Date: Aug 08, 2017
Business leaders today face the challenge of moving their enterprises to the next level, that of digital business transformation and revolution — coupling digital technologies with organizational, operationaland business model innovation to create new ways of operating and growing the business. The "4th Industrial Revolution" enables enterprises to drive changes in their business models and ecosystems, leveraging digital competences and facilitating accelerated revenue and profit growth going forward.
Tags : 
industrial, business leaders, enterprises, digital technologies, organizational, dassault, revenue, profit
    
Dassault Systèmes
Published By: Adobe     Published Date: Feb 08, 2016
Today, customers make decisions about brands on a moment-by-moment basis. They expect personal and authentic experiences that build connections and deepen relationships with their favorite brands. New technology makes it possible to deliver on these expectations and succeed in today’s new era of marketing.
Tags : 
adobe, marketing, new era, crm, brands, experience, customer expectations, enterprise applications
    
Adobe
Published By: Polycom     Published Date: Apr 30, 2013
Wearable operational video (such as helmet cams), mobile cameras and sensors, and other visual technologies can provide crucial intelligence, which then can be gathered, communicated to personnel in disparate locations, and integrated to enable unified collaboration for public security responses. The possibility is emerging for a new generation of video applications that will enhance public security and disaster management.
Tags : 
videoconferencing, telepresence, video application, real time video, intelligence, security, crisis management, technology
    
Polycom
Published By: BAE Systems     Published Date: Dec 29, 2015
This framework will help you decide which MSSP best meets the needs of your financial institution
Tags : 
bae systems, applied intelligence, financial institution, managed security, managed security services, managed security service provider, mssp, data breach
    
BAE Systems
Published By: Bronto     Published Date: Mar 28, 2014
For this paper, sponsored by Magento and Bronto Software, over 1,000 online shoppers were surveyed about their awareness of shopping cart technology.
Tags : 
bronto, magneto, shopping cart adandonment, ecommerce, online shopping, marketing, online marketing, purchasing
    
Bronto
Published By: iCims     Published Date: Apr 01, 2015
Achieving your strategic goals starts with finding the best-fit recruitment technology for your business. Learn how iCIMS' solution can give you the competitive advantage in today's hiring landscape.
Tags : 
recruiting, staffing, hiring
    
iCims
Published By: IBM     Published Date: May 16, 2017
Technology has always enabled companies to reinvent how they engage with customers. But now we are seeing a profound shift – the convergence of physical and digital customer interactions – which is fundamentally changing how customers will interact and transact with brands and businesses everywhere. To better understand these dynamics, the IBV is conducting a Customer Experience (CX) study, published as a series, with multiple reports organized by topic.
Tags : 
customer experience, digital perforamnce, it performance, digital experience, digital experience monitoring
    
IBM
Published By: IBM     Published Date: Jul 14, 2017
Technology has always enabled companies to reinvent how they engage with customers. But now we are seeing a profound shift – the convergence of physical and digital customer interactions – which is fundamentally changing how customers will interact and transact with brands and businesses everywhere. To better understand these dynamics, the IBV is conducting a Customer Experience (CX) study, published as a series, with multiple reports organized by topic.
Tags : 
    
IBM
Published By: IBM     Published Date: Jul 14, 2017
Technology has always enabled companies to reinvent how they engage with customers. But now we are seeing a profound shift – the convergence of physical and digital customer interactions – which is fundamentally changing how customers will interact and transact with brands and businesses everywhere. To better understand these dynamics, the IBV is conducting a Customer Experience (CX) study, published as a series, with multiple reports organized by topic.
Tags : 
digital interaction, experience design, interactive experience, cross functional collaboration, customer experience, integrated data
    
IBM
Published By: Aria Systems     Published Date: Jun 15, 2016
Expanding and enriching the educational experience through a streamlined, broadened networkBYOD in the classroom and one-student-one-device trends meant Kentucky’s Bullitt County Public Schools needed an easily configurable, reliable and scalable network. Read this case study to discover the benefits of WLAN technology in the educational world >
Tags : 
    
Aria Systems
Published By: Avaya     Published Date: Jun 15, 2016
Expanding and enriching the educational experience through a streamlined, broadened networkBYOD in the classroom and one-student-one-device trends meant Kentucky’s Bullitt County Public Schools needed an easily configurable, reliable and scalable network. Read this case study to discover the benefits of WLAN technology in the educational world.
Tags : 
mobile device, best practices, networks, technology
    
Avaya
Published By: Lumesse     Published Date: May 15, 2015
This paper explores how critical it is to have an agile talent management strategy in place. Being mobile and social are key to attracting, developing and retaining the cream of Gen Z.
Tags : 
gen z, employees, retain talent, talent management, strategy, generation z, workplace, hr trends
    
Lumesse
Published By: Kaspersky     Published Date: Feb 05, 2015
This Kaspersky guide shows the benefits that only and Integrated Platform Security Solution can bring.
Tags : 
integrated platform security, security solution, integrated security technologies, endpoint protection platforms, epps
    
Kaspersky
Published By: Clicktale     Published Date: Dec 04, 2012
In this guide, we'll be introducing the full gamut of web solutions, starting with tools that evaluate your entire site traffic, and ending with techniques and best practices for understanding the individual user.
Tags : 
customer experience analytics, web optimization, web analytics
    
Clicktale
Published By: PC Mall     Published Date: Dec 07, 2011
This white paper discusses critical best practices including approaches for both policy and technology.
Tags : 
sonicwall, mobile security, mobile phone security, mobile device security, mobile device management, mobile antivirus, data loss prevention, malware
    
PC Mall
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.