key

Results 1 - 25 of 3413Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA     Published Date: Mar 26, 2019
For more than a decade, Cisco's security reports have been a definitive source of intelligence for security professionals interested in the state of the global industry. These comprehensive reports provided detailed accounts of the threat landscape and their organisational implications. Today, Cisco is publishing its second report for 2019: Defending against today's critical threats. This white paper looks back at the threat landscape over the past year, highlighting some of the key cyber security incidents during that timeframe. However, this isn't just another retrospective report, fondly looking back at events that have already come to pass.
Tags : 
    
Cisco EMEA
Published By: ServiceNow     Published Date: May 14, 2019
Behind every successful CMDB deployment is a detailed configuration management plan for implementing, designing, and sustaining a configuration management capability. Learn the 4 key stages to deploying a healthy CMDB with this ebook including real-life examples that you can put into practice today.
Tags : 
    
ServiceNow
Published By: ServiceNow     Published Date: May 14, 2019
In this report Gartner provides recommendations to address the key challenges I&O leaders are facing such as the inability to identify and remediate issues quickly, lack of insights to connect increasing volumes of data, and executive level sponsorship in tool replacement and consolidation.
Tags : 
    
ServiceNow
Published By: ServiceNow     Published Date: May 14, 2019
Most organizations face challenges when implementing a configuration management capability. In this book, you will learn basics of configuration management, how to build and maintain an effective configuration management capability for your organization, use cases, and key milestones on your journey.
Tags : 
    
ServiceNow
Published By: Nice Systems     Published Date: Feb 26, 2019
NICE WFM 7.0’s Forecaster unlocks a high level of transparency into interaction history, allowing you to centrally forecast, schedule and manage contacts between multiple locations and ensure that site- and enterpriselevel objectives are met. With more than two thousand customers and two million users depending on its unparalleled ability to fine-tune the most precise forecasts, Forecaster allows you to plan and respond to the peaks and valleys of customer history through automatic collection of key historical data from all types of contact sources: • Automatic call distributors (ACDs) • Outbound dialers • Multi-channel routing platforms • Back-office employee desktops Download today to learn more.
Tags : 
    
Nice Systems
Published By: 3D Systems     Published Date: May 14, 2019
For more than two centuries, industrial factory production has excelled in four key aspects: repeatability of the process, durability of parts produced, productivity of the workflow, and an economical total cost of operation. Factory workflows have been optimized to produce the best possible parts in volume, as inexpensively as possible. Any new production method or workflow process that hopes to be accepted alongside this standard process must meet or improve on these time-tested elements. To learn more, download this whitepaper today.
Tags : 
    
3D Systems
Published By: 3D Systems     Published Date: May 17, 2019
This new world is not only delivering better quality components at lower cost but is offering whole new design possibilities, new business models and new markets. The key is to know when to use metal additive manufacturing instead of or complementing conventional milling or casting. Read this executive brief to learn about the transformative value of the fifth wave of metal 3D printing, as well as compelling use cases for direct metal printing from the aerospace, automotive and industrial sectors.
Tags : 
    
3D Systems
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Apr 10, 2019
This LTI Point of View explores how ‘Digital’ is a key enabler for enterprise transformation, and the change in thinking and culture, is it’s real driver. To compete in today's tough marketplace, organizations need a strong digital core. It highlights the fact that an effective digital transformation is built on people, processes, hardware, and software. And true transformation occurs when these elements can be intelligently harnessed in real-time.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Rackspace     Published Date: May 09, 2019
Closing the communication gap around security and digital transformation: According to a recent report, 95% of CIOs expect cyber-threats to increase over the next three years. But, despite cybersecurity being front of mind for board members and IT decision-makers, many admit they do not have an appropriate security strategy in place. In this eBook we will: • Discuss why organisations do not have a strategy in place for cybersecurity, despite the board and ITDMs recognising it as a key priority • Explore the challenges ITDMs face communicating with the board about organisational priorities and skills disconnect • Reveal what ITDMs can do to help close the looming 'security strategy gap' that is widening day by day, and could be detrimental to the organisation's cloud security Download our eBook now to learn how to close the security gap in your organisation.
Tags : 
    
Rackspace
Published By: IBM APAC     Published Date: May 14, 2019
Machine Learning For Dummies, IBM Limited Edition, gives you insights into what machine learning is all about and how it can impact the way you can weaponize data to gain unimaginable insights. Your data is only as good as what you do with it and how you manage it. In this book, you discover types of machine learning techniques, models, and algorithms that can help achieve results for your company. This information helps both business and technical leaders learn how to apply machine learning to anticipate and predict the future. You will find topics like: - What is machine learning? - Explaining the business imperative - The key machine learning algorithms - Skills for your data science team - How businesses are using machine learning - The future of machine learning
Tags : 
    
IBM APAC
Published By: Here Technologies     Published Date: Mar 29, 2019
This is an at-a-glance guide to the key innovation trends in fleet management that leverage location data to improve last-mile efficiency and road safety. Presented to you by HERE, one of the world’s leading location platforms in 2018.
Tags : 
here technologies, transport and logistics
    
Here Technologies
Published By: Zscaler     Published Date: May 15, 2019
Cloud sandboxing protection is as essential to security as keys are to encryption. Preventing CIOs and CISOs from having to make excuses when it comes to APTs, zero-days, and ransomware.
Tags : 
    
Zscaler
Published By: CheckMarx     Published Date: Apr 03, 2019
Data breaches continuing to make the headlines and enterprises are no longer questioning "if" a breach will occur, but "when." With the organization's data assets and reputation at stake, having a breach response plan in place is becoming increasingly important. Join security thought leaders and experts for an interactive Q&A to learn more about: - Today’s cybersecurity threat landscape - The true costs of a breach - Preventing breaches: Key factors to consider - Why early breach detection is critical - How to develop an effective incident response plan and get C-Suite buy-in - How to keep your company secure in 2019"
Tags : 
    
CheckMarx
Published By: Group M_IBM Q2'19     Published Date: Apr 02, 2019
As the foundation for most critical business decisions, today's data environments are not just a vital piece of IT infrastructure, but key component of corporate strategy.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
The increase in sophisticated, targeted security threats by both external attackers and malicious insiders have made it extremely difficult for organizations to properly protect critical and sensitive information. The task of protecting these assets has only grown harder as IT environments have become more complex and widely distributed across geographic locations and in the cloud. Many recent high-profile breaches have one thing in common: They were accomplished through the compromise of passwords. In many cases, end-user passwords are initially hacked through various social engineering techniques. Then permissions are escalated to gain access to more privileged accounts — the keys to the kingdom. This unauthorized access can easily go undetected for weeks or even months, allowing hackers to see and steal information at their convenience. Unfortunately, many IT users lack a full understanding of how privileged accounts function, as well as the risks associated with their compromise an
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 22, 2019
"Improving Cyber Resilience in the Insurance Industry Security automation plays a significant role when maintaining an organization's Cyber Resilience, according to IBM Resilient’s latest report, “The Ponemon Institute Study on the Cyber Resilient Organization.” Download this latest report to understand the key factors that hinder the ability for efficient and effective Cyber Resilience and gain insights and guidance for improving your security posture."
Tags : 
    
Group M_IBM Q2'19
Published By: MicroStrategy     Published Date: Apr 11, 2019
The MicroStrategy 2018 Global State of Enterprise Analytics Report, which surveyed 500 decision-makers from around the globe, reveals that leading organizations create a competitive edge through their use of data, with 63% experiencing improved efficiency and productivity, 57% realizing faster, more effective decision making, and 51% achieving better financial performance. Other top benefits include improved customer experiences, improved customer acquisition and retention, and the identification and creation of new revenue streams—all keys to digital transformation. What else did the 2018 report reveal? Read all the insights with both global and geo-specific views here. This infographic shares a few highlights from the new 44-page report which serves as a benchmarking resource for all data-driven organizations.
Tags : 
    
MicroStrategy
Published By: Workday     Published Date: Mar 26, 2019
Changing student demographics can pose big challenges to higher education institutions. The ability to adapt is key to creating a place where everyone can succeed. This report from Inside Higher Ed dives deep into what these changes mean for your campus and how technology can help you meet the needs of a new generation of students.
Tags : 
    
Workday
Published By: Genesys     Published Date: Feb 12, 2019
To remain competitive in an increasingly customer-centric world, mid-sized organizations are undergoing digital transformations of their contact centres. IDC surveyed companies in 27 countries globally, including companies from Europe, Middle East and Africa (EMEA), to examine the current market dynamics of cloud-enabled customer service environments. Eighty-five percent of the respondents fell within the small to mid-sized category with contact centres with 300 seats or fewer. Get this paper to access complete survey results for EMEA and to gain key insights including: Nearly 65% of respondents in EMEA already use or are in the process of implementing cloud-based contact centre solutions Only 13% of respondents in EMEA indicated that they currently are using a public cloud environment, the lowest among all geographies worldwide Drivers, benefits and challenges for adopting cloud contact centre technology
Tags : 
    
Genesys
Published By: Genesys     Published Date: Feb 12, 2019
The maturity of cloud platforms inspires new confidence in moving mission critical systems to the cloud to gain agility, scale, and cost benefits. How can your company achieve these benefits? What steps are necessary to begin your contact centre’s inevitable move to the cloud? Choosing the right contact centre partner will ensure your cloud journey success. Do you know how to find the right contact centre partner to help move to the cloud? This eBook offers ten key considerations for selecting a partner and moving to a cloud-based contact centre. Having a good sense for your business requirements, your prospective partner’s capabilities, and the cultural fit will pay off in helping you realize your business goals in the long run.
Tags : 
    
Genesys
Published By: Genesys     Published Date: Feb 12, 2019
What if the cloud could radically improve your customer’s experience, your operations, and your bottom line? There’s a reason why many organisations are taking advantage of the benefits of cloud for contact centers. This eBook, focuses on two profiles for small contact centers, small business and small of large – a small contact center that is part of a much larger enterprise. Get key insights from independent market research that will help you make a case to take your customer communications platform to the cloud. With the right solution, your business can benefit from enterprise-quality capabilities at a price you can afford. And you can realise a return on investment in as little as three months! Download this eBook and learn: How to calculate ROI and time-to-value in different types of small contact center profiles What factors to consider when selecting a cloud vendor Three common myths about the cloud
Tags : 
    
Genesys
Published By: Anaplan     Published Date: Apr 09, 2019
What’s the state of planning in finance? Our annual benchmarking report, The State of Connected Planning, investigates how leading organizations accelerate business value through Connected Planning. We surveyed over 1,000 planning professionals across all business functions in 45 countries and 18 industries to uncover leading planning trends. This finance-focused brief contains: • Key findings from finance professionals • Challenges faced by finance professionals • How they believe they can improve their planning processes
Tags : 
    
Anaplan
Published By: Forcepoint     Published Date: May 14, 2019
All Clouds are not Equal Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
The EU General Data Protection Regulation (GDPR) is not in effect, requiring global organizations to significantly address how they process and protect the personal data of EU citizens. Yet, Gartner predicted, “Less than 50% of all organizations impacted will fully comply with GDPR.”* Confused about the requirements and what next steps to take? Read our GDPR eBook to learn about the regulation and its key requirements. *Gartner, GDPR Clarity: 19 Frequently Asked Questions Answered, by Bart Wilemsen, 29 August 2017
Tags : 
    
Forcepoint
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.