back as service

Results 26 - 50 of 84Sort Results By: Published Date | Title | Company Name
Published By: Riskified     Published Date: Aug 06, 2019
By partnering with an end-to-end solution, merchants can increase approval rates and eliminate costly chargebacks and manual reviews. Those have been Riskified’s traditional benefits since we first struck out to change the eCommerce world in 2013. But in 2019, that’s simply not enough anymore. As eCommerce merchants continue to innovate, the expectations of American consumers have also risen. They expect a multitude of fulfillment options, and they demand that merchants provide them securely. For a business to stand out, offering an excellent product or service is not enough — it’s also about limiting confusion, limiting friction, providing reassurance, and creating the smoothest possible purchase journey every single time. It’s hard to do that alone. That’s what we’re here for.
Tags : 
    
Riskified
Published By: IBM APAC     Published Date: Mar 06, 2019
The 2019 IBM X-Force Threat Intelligence Index looks back at the threats, tactics, and trends that emerged in 2018 based on insights from IBM X-Force Security Research Team. Deriving data and insights from security clients, incident response services and penetration testing engagements, the IBM X-Force Threat Intelligence Index 2019 report outlines the most prominent threats and provides key insights into various industries, attack tactics, and major vulnerabilities that emerged during the year.
Tags : 
    
IBM APAC
Published By: Schneider Electric     Published Date: Jan 26, 2018
Part 2 in our Partnering with Certainty Webinar Series, "Customer Demands at the Edge." In our last webinar, we discussed how trends & technologies like IoT and its many applications have helped drive an Always On, Always Connected mentality that has completely evolved customer experience standards. These demands are driving a need for resiliency in local edge environments, meaning compute & storage capacity is now coming back on premise for many applications – especially in industries like Healthcare, Retail, Finance, and Education. In other words, this highly distributed access layer is now becoming a compute layer – one that is mission-critical to delivering a flawless (or at least acceptable) customer experience. These environments are often make-shift wiring closets (janitor’s closets, back rooms, etc.) with no dedicated IT staff per each location. More than ever before, Healthcare, Retail, Finance, and Education customers are turning to solution providers to be that “dedicated IT staff” to find and fix problems before they start, so that the customer (or patient, or student) experience they’re working to provide remains a good one. APC by Schneider Electric has: Connected Products making it easy to remotely monitor your customers’ environments Including our NEW Smart-UPS with APC SmartConnect – the industry’s first cloud-connected UPS! A Managed Service Program to help you develop & monetize power as a managed service Fill out your information and click "Register" to watch part 2 of our Partnering with Certainty Webinar Series, “Customer Demands at the Edge: Fix My Problem Before it Starts.” This webinar originally aired on October 19th, 2017.
Tags : 
    
Schneider Electric
Published By: Carbonite     Published Date: Oct 10, 2018
In the last few years, businesses have changed the way they protect data. Studies show they’re abandoning traditional backup and recovery in favor of disaster recovery as a service (DRaaS).1 With DRaaS, businesses enjoy the luxury of keeping a replica of their data hosted at a remote site that they can fail over to in an emergency—without bearing any of the infrastructure costs or maintenance responsibilities. All infrastructure and maintenance is the responsibility of the provider. Gartner predicts that global DRaaS revenue will reach $3.4 billion by 2019. The firm cited several reasons for the shift:
Tags : 
    
Carbonite
Published By: Wasabi     Published Date: Nov 13, 2018
As state and local governments join the digital revolution, it’s increasingly important that they find safe, effective and efficient ways to store the data they’re creating. In this case study you’ll see how an integrated solution from Wasabi Hot Cloud Storage and Commvault Complete Backup gave one municipality the security they needed while increasing performance and cutting costs. This city had been using Amazon Glacier but was frustrated with the speed and unpredictable fees associated with retrieving their data. In turning to Wasabi they were able reduce costs by 80% and increase speed over 6x. Plus since Wasabi offers just one tier of service with one price and no fees to retrieve your data they were able to simplify both the process and budgeting. Between Wasabi and Commvault their skyrocketing data needs now scalable solution that gives them the security and performance they need for significantly less than they were paying before. To learn more please download the case study.
Tags : 
    
Wasabi
Published By: Veritas     Published Date: Dec 08, 2016
The latest version - Veritas NetBackup Platform 8.0 - delivers unified data protection for organizations of all sizes, with proven enterprise-class scale, high performance, extensive workload integration, and self-service. No matter where data resides, NetBackup is trusted today in small to the largest and most complex heterogeneous environments.
Tags : 
cloud, cloud computing, data management
    
Veritas
Published By: Redstor UK     Published Date: Mar 12, 2018
The General Data Protection Regulation is set to shake up modern data protection laws. With large-scale data breaches making news headlines on a weekly basis throughout 2017, data regulation authorities across Europe will be hoping this can help resolve the challenges of data protection. However, with so many questions around how to comply it is still unclear how far this regulation spreads. Technologists are now looking for answers, wanting to know how the GDPR will affect backup and nonprimary data sets and what needs to be done to be compliant. This white paper will explore and understand aspects of the regulation to help answer questions and give clarity over what data is covered by the GDPR and what organisations need to do to be compliant. Redstor have specialised in assisting organisations with data protection and management for almost two decades. Providing compliant services around the areas of Data Backup, Disaster Recovery and Archiving.
Tags : 
    
Redstor UK
Published By: Druva     Published Date: Nov 09, 2018
The all-encompassing data center is a thing of the past. Modern data environments are distributed and include remote and branch offices, mobile devices, and the Internet of Things (IoT) as well as cloud solutions such as infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). There’s more critical data to back up than ever before. Plus, data silos and fragmented management mean poor visibility, which can make it difficult to comply with regional data residency and security rules as well as service-level agreements (SLAs). On-premises data protection has not kept pace. According to a survey by Fujitsu, 45% of IT managers said they had lost data or productivity related to data protection inefficiency within the last year.1 Often, this is because on-premises backups are cumbersome and do not always happen on time.
Tags : 
    
Druva
Published By: Group M_IBM Q418     Published Date: Oct 23, 2018
The General Data Protection Regulation (GDPR) framework seeks to create a harmonized data protection framework across the European Union, and aims to give back EU citizens control of their personal data by imposing stricter requirements for those hosting and processing this data, anywhere in the world. IBM is committed to putting data responsibility first and providing solutions that are secure to the core for all customers. As such, IBM Cloud has fully adopted the EU Data Protection Code of Conduct for Cloud Service providers – meaning we agree to meet the entirety of its stringent requirements.
Tags : 
    
Group M_IBM Q418
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Today’s security appliances and agents must wait until malware reaches the perimeter or endpoint before they can detect or prevent it. OpenDNS arrests attacks earlier in the kill chain. Enforcing security at the DNS layer prevents a malicious IP connection from ever being established or a malicious file from ever being downloaded. This same DNS layer of network security can contain malware and any compromised system from exfiltrating data. Command & control (C2) callbacks to the attacker’s botnet infrastructure are blocked over any port or protocol. Unlike appliances, the cloud service protects devices both on and off the corporate network. Unlike agents, the DNS layer protects every device connected to the network — even IoT. It is the easiest and fastest layer of security to deploy everywhere.
Tags : 
    
Cisco Umbrella EMEA
Published By: Epicor     Published Date: Jun 27, 2017
Lumber and building materials (LBM) supply businesses today are facing pressure from increased competition and the need to keep pace with digital transformation. Against this backdrop, some businesses struggle while others thrive. The difference is having people who understand what it takes to get set for growth—individuals with the vision and drive to take your business to the next level. We call these people the Grow Getters. Download our report to discover 10 characteristics that set the Grow Getters apart from their competitors in the LBM industry, like: • Investing in new technology and innovation • Focusing on the customer • Applying a positive mindset At Epicor, we have a suite of industry-specific solutions for LBM distributors, as well as an industry-leading service team to help you grow your business. Take a look at our report to see how you compare to the Grow Getters.
Tags : 
lumber, building materials, lbm, erp, bistrack, building materials distributors, lumber distributors, lumber manufacturers
    
Epicor
Published By: Nasuni     Published Date: Nov 19, 2014
The global architecture and engineering firm Environmental Systems Design, Inc., had enough capacity to handle its data. The challenge was protecting that data. The firm would often have 15TB of data in production at a given time and its existing backup solutions simply could not keep pace. After quickly outgrowing several other systems, ESD turned to Nasuni’s enterprise storage as a service. Now, thanks to Nasuni’s automated backup, which delivers unlimited versioning, fast disaster recovery and an unmatched RPO, IT can stop worrying about backup and focus on its core mission of enhancing business productivity.
Tags : 
automated protection, enhanced productivity, data protection, backup solutions
    
Nasuni
Published By: Dassault Systèmes     Published Date: May 09, 2018
Today’s thriving High-Tech sector is driven by shrinking product lifecycles, rapid innovation, distributed engineering/manufacturing—and highly demanding customer expectations. The industry needs to deliver on multiple fronts, including: • Embed customer-centric innovation throughout the lifecycle: Only with customer experience at the core can companies stay ahead. • Tame ideas into executable products: Detecting early trends and using customer feedback is vital. • Manage complexity better: Increasing visibility of all product data helps build and manage digital models to use in every business function from R&D to field service. • Create relevant connected systems: High-Tech innovators use IoT for an ongoing dialogue of customers, devices and manufacturers. • Provide agility to compete on software, hardware and service: Customers want value from every interaction. Download your targeted industry analysis to learn more.
Tags : 
    
Dassault Systèmes
Published By: TIBCO Software     Published Date: Feb 26, 2019
Digital Transformation of America's largest family controlled financial services institution with a history dating back to three generations. Learn how the role of data changed at the bank during a continued evolution of customer experience. First Citizens Bank has been using TIBCO's integration and advanced analytics technology to provide a seamless, consistent, customer self-service experience, to tackle fraud, or to provide more accurate and proactive financial services.
Tags : 
financial services, digital transformation, banking, fraud
    
TIBCO Software
Published By: Oracle     Published Date: Oct 20, 2017
Traditional backup systems fail to meet the needs of modern organizations by focusing on backup, not recovery. They treat databases as generic files to be copied, rather than as transactional workloads with specific data integrity, consistency, performance, and availability requirements. Additionally, highly regulated industries, such as financial services, are subject to ever?increasing regulatory mandates that require stringent protection against data breaches, data loss, malware, ransomware, and other risks. These risks require fiduciary?class data recovery to eliminate data loss exposure and ensure data integrity and compliance
Tags : 
    
Oracle
Published By: Intacct Corporation     Published Date: Sep 18, 2014
The professional services market is back—and more competitive than ever. How will you outperform your competitors? By monitoring the financial metrics that matter. Through years of thorough research, Service Performance Insight has analyzed and identified the profit-centric measures that are highly correlated with financial success in professional services. Download the white paper, "The 5 KPIs that Matter for Professional Services," to learn: • The importance and primary characteristics of financial maturity. • The 5 financial metrics critical to service organizations. • Where successful service organizations fall in these metrics.
Tags : 
intacct, kpi, professional services, financial metrics, service performance insight
    
Intacct Corporation
Published By: CA Technologies     Published Date: Jun 03, 2015
"Are dev and test constraints holding back your digital transformation? Today, just about all businesses are scrambling to add digital components to their products and services with the hopes of capturing—and maintaining—the interest of an increasingly demanding customer base. As you undergo this digital transformation, your IT teams face tremendous pressure to not only develop innovative new experiences, but do so at an accelerated rate—lest competitors beat you to market with the next big thing. Take a new approach to solving the familiar challenge of doing more with less—and doing it faster than ever before -- remove the constraints holding you back. At its core, Service Virtualization is all about removing constraints within the SDLC by simulating dependent systems, services and behaviors. In order to understand the true depth and breadth of this concept, however, it helps to see how Service Virtualization can be utilized in different development scenarios.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: May 23, 2018
CA Live API Creator creates application back-ends exposing enterprise-class REST/JSON APIs, including access to existing data and applications. It enables developers to create new REST endpoints that join data across diverse data sources using a point–and–click approach. API owners can extend the API with declarative business rules, JavaScript event processing, role-based security and interactive testing. The CA Live API Creator Reactive Logic model yields systems that are highly scalable and reliable. Its optimized services run more efficiently and with less fragility than services manually coded by skilled developers and architects.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 24, 2018
L’outil de création d’API, CA Live API Creator, crée des back-ends applicatifs exposant des API REST/JSON à l’échelle de l’entreprise pour l’accès aux données et aux applications existantes. Cet outil permet aux développeurs de créer de nouvelles API REST rassemblant les données de différentes sources, par simple configuration. Ils peuvent étendre ces dernières en mettant en place des règles métier déclaratives, un traitement des événements via JavaScript et de la sécurité basée sur les rôles.Le modèle déclaratif de CA Live API Creator permet également de disposer de systèmes très évolutifs et fiables. Ses services optimisés sont plus efficaces et moins fragiles que les services codés manuellement par des développeurs et des architectes qualifiés
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 25, 2018
CA Live API Creator erstellt Back Ends von Anwendungen, die REST/JSON-APIs der Enterprise-Klasse offenlegen und den Zugriff auf bestehende Daten und Anwendungen ermöglichen. So können Entwickler neue REST-Endpunkte erstellen, durch die sich Daten per Mausklick mit unterschiedlichen Datenquellen verbinden lassen. Verantwortliche erhalten die Möglichkeit, APIs mit deklarativen Unternehmensregeln, JavaScript-Ereignisverarbeitung, rollenbasierter Security und interaktivem Testing zu erweitern.Durch das deklarative Modell von CA Live API Creator entstehen zudem hochgradig skalierbare und zuverlässige Systeme. Diese optimierten Services sind viel effizienter und weniger anfällig als die von versierten Entwicklern und Architekten manuell programmierten Services.
Tags : 
    
CA Technologies EMEA
Published By: Tenable     Published Date: Nov 06, 2018
"What steps should you take to enable the effective and secure use of public cloud services? According to Gartner, “CIOs need to ensure their security teams are not holding back cloud initiatives with unsubstantiated cloud security worries. Instead, they should encourage their teams to apply imagination and energy to develop new approaches to securely and reliably leverage the benefits of SaaS, PaaS and IaaS.” By reading, “Clouds Are Secure: Are You Using Them Securely?,” you will gain insight into Gartner’s recommended practices for effective and secure adoption of public cloud services, including: Develop an enterprise cloud strategy, including guidance on what data can be placed into which clouds and under what circumstances. Implement and enforce policies on cloud ownership, responsibility and risk acceptance by outlining expectations for form, significance and control of public cloud use. Follow a life cycle approach to cloud governance that emphasizes the operational control of
Tags : 
    
Tenable
Published By: F5 Networks Inc     Published Date: Jan 21, 2014
Applications are the lifeblood of any business. If you spent time or budget to develop or acquire an application, then it’s important—and it should work. However, tectonic shifts in technology are making it increasingly difficult to achieve this simple objective. Today, the majority of applications are accessed via the web and cloud become the preferred application development platform. Against this backdrop of change, the sheer volume of applications is staggering. Given these rapid, drastic changes, organizations are left to grapple with how to deliver applications in a secure, timely, and reliable manner. Read this whitepaper to learn how your business can tackle this feat by implementing a new architectural vision for delivering application services.
Tags : 
f5 networks, f5 synthesis, applications, constraint, application performance, application development, application development platform, cloud, mobile, application deployment, application delivery
    
F5 Networks Inc
Published By: Citrix Systems     Published Date: Nov 10, 2014
We’ve all come to expect the same security, performance and reliability from our mobile applications as we do with native applications. But these apps don’t just run on our mobile devices. They are powered by a variety of backend infrastructure – a hidden but important layer of application components and network devices. NetScaler helps this invisible layer of infrastructure to perform and communicate, improving security as well as quality of service. And by integrating with XenMobile, you can offer greater support and a better experience for mobile users. Learn more about delivering improved security, reliability and performance through mobile environments by reading our full report, Defend Hidden Mobile Web Properties (link).
Tags : 
mobile, web properties, applications, infrastructure, network devices, performance, communicate, security, reliability, netscaler
    
Citrix Systems
Published By: ServiceNow     Published Date: Oct 11, 2017
Customer service and contact centers are on the front lines representing organizations. Their successful handling of service issues helps deliver on the promise of a great customer experience. To continue meeting the demands of customers — while fulfilling the organizational goal of delivering a differentiated service experience — the modern customer service organization requires a seamlessly integrated front-office to back-office enterprise applications architecture and set of processes. As products and services become more technical in nature — think IoT devices — this interconnectedness is essential. Systems and customer support staff must be informed and enabled through technology to provide a contextualized experience that meets the customer's needs. Consistency across channels, proactive service, knowledge of a customer's past service requirements, technical skills, and rapid assessment and response will be essential requirements for modern customer service, which in turn creates
Tags : 
    
ServiceNow
Published By: Epson     Published Date: May 14, 2018
Consumers worldwide continue to adopt and use technology in their shopping experience. Faced with rising customer expectations and increasing competitive pressures, retailers now are prioritizing in-store innovation. Many retailers have adopted multichannel implementations, in which mobile, web, and in-store shopping are enabled but not delivered consistently to the customer. The next step in this evolution is an omnichannel strategy, now being deployed by some retailers, which presents a consistent shopping experience across mobile, web, and in-store channels. Omnichannel also enables retailers to integrate back-end infrastructure technologies (e.g., servers, databases, etc.) and cloud-based services (e.g., loyalty programs, personalized recommendations, inventory management, etc.) to improve many aspects of store and enterprise operations. An omnichannel strategy relies on several core and supporting technologies. The key factors in evaluating any omnichannel-enabling solution includ
Tags : 
    
Epson
Start   Previous    1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.