dynamic it

Results 226 - 250 of 464Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Mar 03, 2017
The goal of a more positive and seamless engagement of clients is no longer a desire for the healthcare industry. It’s an absolute necessity. See how the right tools can help you create a dynamic enrollment process that you can continually adjust, test, and optimize in our guide, The New Doctor’s Order. Read the guide to learn the key components of a modern digital enrollment program, including: • Streamlined, mobile-optimized forms and digital signatures • Integrated workflows • Personalized communication and engagement
Tags : 
healthcare, workflow integration, digital enrollment, engagement, mobile-optimization
    
Adobe
Published By: Adobe     Published Date: Jun 22, 2017
The goal of more positive and seamless engagement of clients is no longer a desire for the healthcare industry. It’s an absolute necessity. See how the right tools can help you create a dynamic enrollment process that you can continually adjust, test, and optimize in our guide, The New Doctor’s Order. Read the guide to learn the key components of a modern digital enrollment program, including: • Streamlined, mobile-optimized forms and digital signatures • Integrated workflows • Personalized communication and engagement
Tags : 
mobile optimization, integration, communication, engagement, streamlining
    
Adobe
Published By: Adobe     Published Date: Oct 24, 2018
in our 24-criteria evaluation of experience optimization platform (EoP) providers, we identified the eight most significant ones — Adobe, dynamic Yield, Evergage, Monetate, optimizely, oracle, sAs, and sitespect — and researched, analyzed, and scored them. this report shows how each provider measures up and helps customer insights (Ci) professionals make the right choice.
Tags : 
    
Adobe
Published By: CA Technologies     Published Date: Jun 03, 2015
"Three key market dynamics are currently driving the need for transformation in almost every industry: 1) The need to leverage digital technologies to drive the core business 2) Next generation online consumers and socially networked buyers 3) The financial crisis Companies are under tremendous pressure to bring digital technologies at the center of their business to remain competitive, innovate, create new revenue streams, and drive greater customer intimacy. As a result the need to leverage technology to significantly reduce the cost of going to market while driving growth has led to increasing interest in software-based business models. "
Tags : 
    
CA Technologies
Published By: Adobe     Published Date: Apr 04, 2018
Recently the S&P 500 experienced something new: its top four most valuable companies at closing were Apple, Google, Microsoft, and Amazon—all tech companies. It’s a tech world out there, and one increasingly driven by a mastery of mobile. This reality is changing not only consumer expectations, market conditions, and competitive dynamics, but it’s also changing—and challenging— traditional approaches to corporate strategy.
Tags : 
    
Adobe
Published By: Forcepoint     Published Date: May 14, 2019
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Organizations need to fundamentally rethink how they address cybersecurity for today’s modern threats. Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment. See how Dynamic Data Protection, an industry-first solution, uses human-centric behavior analytics to continuously determine the risk cyber identities pose, based on their actions.
Tags : 
    
Forcepoint
Published By: Tenable     Published Date: Feb 07, 2018
"Securing the modern attack surface is a critical challenge you must effectively address to reduce cyber exposure and protect your enterprise. By reading this ebook you’ll learn what’s working – and what’s not – from 29 global infosec leaders, representing a diverse array of industries and perspectives. Download your copy today for insights and lessons learned about: - Securing a dynamic IT environment - Rethinking security for cloud environments - Moving security to the application layer - Focusing on data security - Automating security testing and controls"
Tags : 
secure devops, web application security, attack surface, cloud, container security, ciso, cyber, experts, ebook
    
Tenable
Published By: Vehicle Tracking Solutions     Published Date: May 31, 2018
When implementing an enterprise fleet management and telematics solution, enterprise fleets, large and small, see significant value, cost-savings, and operational excellence that result in maximized profits across your organization's bottom line. This guide will assist you in learning about the wide range of benefits from a dynamic enterprise fleet management and telematics software and the latest features empowering fleets to make data-driven decisions that improve safety, efficiency, and productivity to drive long-term quantifiable success.
Tags : 
    
Vehicle Tracking Solutions
Published By: Zilliant     Published Date: Oct 11, 2019
Professional buyers increasingly expect a hassle-free, fully digital experience with visibility into pricing. Electrical products in particular are a major growth area for Amazon Business and other digital entrants, some of whom undercut the market with bottom-barrel prices. It can be scary out there, but only if you don’t have a plan. This whitepaper provides a playbook for: • Reimagining how you tackle pricing challenges • Dynamically responding to cost changes • Embracing the right technology • Going the extra mile with services that Amazon can’t match If you’re making the leap to eCommerce or bolstering an existing online presence to meet customer expectations, pricing cannot be an afterthought. In digital channels, pricing rigor - including effectively maintaining market-aligned customer-specific and system prices and setting up relevant price profiles - becomes even more important as it is more transparent to customers. Give your buyers what they want without sacrificing the marg
Tags : 
    
Zilliant
Published By: BMC ASEAN     Published Date: Dec 18, 2018
Today’s IT environments are so dynamic and complex that traditional manual administration makes it virtually impossible to keep pace with changing business opportunities and challenges, such as scaling to support new applications and users. Manual administration is not just unsustainable—it’s dangerous. Delays in responding to security threats and compliance issues can have devastating effects: • Security breaches • Failed audits • Financial losses • Loss of customers and reputation • Other serious business consequences To sustain a high level of security and compliance, IT teams must implement a comprehensive, aggressive automation strategy that establishes and tracks key performance indicators. Automation helps to optimize resources, increase efficiencies, lower costs and improve quality of service. This white paper describes principles and best practices for implementing automation as a strategic asset in the ongoing effort to achieve security and compliance excellence in a dynamic
Tags : 
    
BMC ASEAN
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Challenge Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure. Opportunity Knowing your privileged users is knowing your risk. Privileged access management tools themselves must be able to support automation in the authorization process and enable scalability through support for both dynamic operations and ephemeral infrastructure. Benefits Better pinpointing attacks exploiting credential theft isn’t simply a question of accumulating more data but involves incorporating better data about privileged user behaviour, which can identify significant changes that represent real risk.
Tags : 
    
CA Technologies EMEA
Published By: Brightpearl     Published Date: Nov 19, 2012
Smart, dynamic and ambitious retailers like you know that good systems and processes are key to growing a business. Learn about commerce acceleration and the keys to it's framework.
Tags : 
brightpearl, commerce acceleration 101, retailers, profit, automation, customers, suppliers
    
Brightpearl
Published By: HP     Published Date: Oct 09, 2008
Increase utilization, decrease energy costs with data center virtualization In the past, IT departments have responded to demands for new services and better performance by adding more hardware, resulting in underutilized technology silos and server sprawl. Today, many organizations are turning to virtualization technologies that facilitate consolidation and increased utilization. In short, virtualization brings the ability to pool, share and dynamically reallocate data center resources – and helps fulfill the promise of higher utilization and lower energy consumption and lower costs.Join us and learn why HP is well prepared to help you assess and address your needs. Find out what key virtualization partners -- such as VMware, Microsoft and Citrix – bring to the table and how HP can help you leverage their technology and expertise.
Tags : 
mission critical, virtualization, hewlett-packard company
    
HP
Published By: Marketo     Published Date: Sep 22, 2015
The challenge of meeting the modern buyers expectation of a continuous, cross-channel, and personal experience is met with new ad technology and innovations that continue to advance at break-neck speeds. New ad technology platforms, types of ads, methods of tracking, dynamic ad content, and advances such as the Internet of Things now provide endless opportunities for marketers and advertisers to engage their customers personally and across channels.
Tags : 
marketo, digital advertising, strategy, ads, technology, measure, acquisition, loyalty, nurture, branding, search marketing, email marketing, emerging marketing, social media, advertising agencies, internet marketing, crm & customer care, e-commerce, traditional marketing
    
Marketo
Published By: BMC Control M     Published Date: Jul 22, 2009
Companies running legacy job scheduling products suffer from higher costs, inefficient use of resources, and greater IT complexity, according to independent analyst firm Enterprise Management Associates. Read their findings, and see why consolidating on a single, comprehensive workload automation solution is an easy win for IT and the business.
Tags : 
smart, modular, cost-effective, ema, enterprise management associates, it complexity, workload automation, bmc, product suite, wla, end-to-end workflow, enterprise visibility, management, service-driven management, dynamic workflow resourcing, simple, measurable, achievable, realistic, timely
    
BMC Control M
Published By: Trend Micro Inc.     Published Date: Aug 25, 2011
This white paper reviews the challenges with endpoint security in virtualized environments - including the inherent risks of dynamic virtual machines and the resource impact of security software such as virus-scanners in multiple guest virtual machines, on a single physical host.
Tags : 
trend micro, antivirus, virtual datacenter, enterprise security, virtual machines, virtualization, internet content security, smart protection network, trend micro internet security, enterprise business security, worry-free business security, web threat management, medium business, mid-sized business, mid-size, medium, anti-spam, antispam, spam filter service
    
Trend Micro Inc.
Published By: Cotendo     Published Date: Nov 18, 2011
Learn what's slowing down your dynamic mobile websites and mobile apps-and how to fix it. In this on-demand webinar, join Mobile IT leaders discussing best practices and a new case study on how to speed up the mobile end user experience.
Tags : 
mobile web best practices, mobile content delivery, mobile acceleration, mobile web performance, mobile website performance, mobile cdn, mobile cloud, mobile application performance, cotendo, redfin, webinar, online real estate, mobile user experience
    
Cotendo
Published By: Infosys Limited     Published Date: Aug 02, 2019
The consumer packaged goods landscape is a sum of many complex and moving parts – a demanding and ever changing customer universe, with a subset of digital natives; a complex distribution system; and legacy IT systems from internal silos and mergers. In such a dynamic environment, we help our clients accelerate growth by transforming their organization to become a thriving Live Enterprise by augmenting their core digital capabilities. The cloud is an integral part of this digital transformation ushering CPG enterprises into a new era of hyper performance. Cloud promises to deliver several significant benefits including reduced costs, increased scalability, flexibility, and agility, leading to improved business performance and therefore growth. To better understand the specifics of cloud initiatives, we surveyed 167 senior executives from organizations in the CRL industry, with over USD 1 billion in revenues across the United States, Europe, Australia and New Zealand. Download thi
Tags : 
    
Infosys Limited
Published By: Riverbed     Published Date: Oct 17, 2012
As your business needs become more dynamic, monitoring systems will be key to understanding how applications fulfill business needs. With complexity growing at a fast rate, application discovery and mapping will soon be mandatory.
Tags : 
riverbed, application visibility, infrastructure monitoring, it infrastructure
    
Riverbed
Published By: Riverbed     Published Date: Nov 12, 2012
This Forrester white paper examines the trends driving the new wave of dynamic web content in enterprises to understand its sources, its shape, and its impact on current web architectures and networks. Learn more about the keys to content management
Tags : 
dynamic web, web content management, wcm, web architecture
    
Riverbed
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: May 07, 2012
Discover how the shift from "buy and hold" data center strategy to the next generation of HP ProLiant servers can tackle today's IT constraints and tomorrow's business opportunities in this new IDC dynamic white paper.
Tags : 
intel, storage, 2.0, infrastructure, trends, storage, flexibility, drivers, market dynamics, trends, converged, custom requirement, deduplication, tiering, protocol, foundation
    
Sponsored by HP and Intel® Xeon® processors
Published By: McAfee     Published Date: Feb 06, 2013
Protect fixed-function devices from threats, including zero-day attacks and other forms of malware, and prevent system downtime, control costs, and ultimately extend the life of devices.
Tags : 
fixed function device security, fixed function devices, pos systems, pos system security, atm security, medical equipment security, industrial control systems, mobile device security, printer security, automotive system security, aeronautical system security, pci dss, nerc, dynamic whitelisting, zero day attacks
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Application whitelisting used in conjunction with existing antivirus solutions provides a strong defense against emerging threats like APT and targeted malware, and also contributes to reduced operational costs by controlling the sprawl of unauthoriz
Tags : 
desktop security, malware, coe security, common image desktops, fixed function desktops, security management, coe environments, whitelisting, application control, antivirus, application whitelisting, global threat intelligence, dynamic whitelisting
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Protect systems from unknown, advanced persistent threats with centrally managed whitelisting
Tags : 
application control, whitelisting, zero day protection, endpoint security, dynamic whitelisting, memory protection
    
McAfee
Published By: Viavi Solutions     Published Date: Apr 14, 2017
Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success. This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management, data breach
    
Viavi Solutions
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.